Redundancy Management of Multipath Routing
for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
ABSTRACT
In this paper we
propose redundancy management of heterogeneous wireless sensor networks
(HWSNs), utilizing multipath routing to answer user queries in the presence of unreliable
and malicious nodes. The key concept of our redundancy management is to exploit
the tradeoff between energy consumption vs. the gain in reliability,
timeliness, and security to maximize the system useful lifetime. We formulate
the tradeoff as an optimization problem for dynamically determining the best
redundancy level to apply to multipath routing for intrusion tolerance so that
the query response success probability is maximized while prolonging the useful
lifetime. Furthermore, we consider this optimization problem for the case in
which a voting-based distributed intrusion detection algorithm is applied to
detect and evict malicious nodes in a HWSN. We develop a novel probability
model to analyze the best redundancy level in terms of path redundancy and
source redundancy, as well as the best intrusion detection settings in terms of
the number of voters and the intrusion invocation interval under which the
lifetime of
a HWSN is maximized. We then apply the
analysis results obtained to the design of a dynamic redundancy management algorithm
to identify and apply the best design parameter settings at runtime in response
to environment changes, to maximize the HWSN lifetime.
Existing System
In
Existing System, effective redundancy management of a clustered HWSN to prolong
its lifetime operation in the presence of unreliable and malicious nodes. We
address the tradeoff between energy consumption vs. QoS gain in reliability,
timeliness and security with the goal to maximize the lifetime of a clustered
HWSN while satisfying application QoS requirements in the context of multipath
routing. More specifically, we analyze the optimal amount of redundancy through
which data are routed to a remote sink in the presence of unreliable and
malicious nodes,
so that the query success probability is
maximized while maximizing the HWSN lifetime.
Proposed System
In
Proposed System, the optimal communication range and communication mode were
derived to maximize the HWSN lifetime. In intra-cluster scheduling and
inter-cluster multi-hop routing schemes to maximize the network lifetime. They
considered a hierarchal HWSN with CH nodes having larger energy and processing
capabilities than normal SNs.
The solution is formulated as an optimization
problem to balance energy consumption across all nodes with their roles. In
either work cited above, no consideration was given to the existence of
malicious nodes.
A two-tier HWSN
with the objective of maximizing network lifetime while fulfilling power
management and coverage objectives. They determined the optimal density ratio
of the two tier’s nodes to maximize the system lifetime.
MODULES
- Multi – Path Routing
- Intrusion Tolerance
- Energy Efficient
- Simulation Process
Modules Description
Multi – Path Routing
In
this module, Multipath routing is considered an effective mechanism for fault
and intrusion tolerance to improve data delivery in WSNs. The basic idea is
that the probability of atleast one path reaching the sink node or base station
increases as we have more paths doing data delivery. While most prior research focused
on using multipath routing to improve reliability, some attention has been paid
to using multipath routing to tolerate insider attacks. These studies, however,
largely ignored the tradeoff between QoS gain vs. energy consumption which can
adversely shorten the system lifetime.
Intrusion Tolerance
In
this Modules, intrusion tolerance through multipath routing, there are two
major problems to solve:
(1) How many paths to use and
(2) What paths to use.
To the best of our knowledge, we are the
first to address the “how many paths to use” problem. For the “what paths to
use” problem, our approach is distinct from existing work in that we do not consider
specific routing protocols.
Energy Efficient
In
this module, there are two approaches by which energy efficient IDS can be
implemented in WSNs. One approach especially applicable to flat WSNs is for an
intermediate node to feedback maliciousness and energy status of its neighbor nodes
to the sender node (e.g., the source or sink node) who can then utilize the
knowledge to route packets to avoid nodes with unacceptable maliciousness or
energy status. Another approach which we adopt in this paper is to use local host-based
IDS for energy conservation.
Simulation Process
In
this module, the cost of executing the dynamic redundancy management algorithm
described above, including periodic clustering, periodic intrusion detection,
and query processing through multipath routing, in terms of energy consumption.
System Requirements:
Hardware Requirements:
•
System
: Pentium IV 2.4 GHz.
•
Hard Disk : 40 GB.
•
Floppy Drive : 1.44 Mb.
•
Monitor :
15 VGA Color.
•
Mouse :
Logitech.
•
Ram :
512 Mb.
Software Requirements:
•
Operating system :
- Windows 7 Ultimate (32-bit) / Windows XP
•
Coding Language :
C#.Net
•
Front End :
Visual Studio 2008