IJRIT International Journal of Research in Information Technology, Volume 1, Issue 5, May 2013, Pg. 257-264

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

IMPROVING THE QUALITY OF SERVICE (QOS) IN WSN ROUTING USING TRUST AND ENERGY WEIGHT-AGE 1

1

Mr. Mohammed Fayaz, 2 Mr. Sangamesh Patil

Lecturer, DEP OF E&CE, BTL Institute of technology and Management Bangalore, India. 2

M. Tech (DC&N), BTL Institute of technology and Management Bangalore, India. 1

[email protected], 2 [email protected]

Abstract The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF (Trust aware routing framework) a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an antidetection mechanism.

KEYWORDS: - Multi-hop Routing, WSNs (wireless sensor networks), RF-shielding, Mobile target detection.

Mr. Sangamesh Patil, IJRIT

257

1. Introduction Wireless sensor networks (WSNs) are ideal candidates for applications to report detected events of interest, such as military surveillance and forest fire monitoring. A WSN comprises battery-powered senor nodes with extremely limited processing capabilities. With a narrow radio communication range, a sensor node wirelessly sends messages to a base station via a multi-hop path. However, the multi-hop routing of WSNs often becomes the target of malicious attacks. An attacker may tamper nodes physically, create traffic collision with seemingly valid transmission, drop or misdirect messages in routes, or jam the communication channel by creating radio interference. Based on identity deception, the adversary is capable of launching harmful and hard-to-detect attacks against routing, such as selective forwarding, wormhole attacks, sinkhole attacks and Sybil attacks. As a harmful and easy-to implement type of attack, a malicious node simply replays all the outgoing routing packets from a valid node to forge the latter node’s identity the malicious node then uses this forged identity to participate in the network routing, thus disrupting the network traffic. Those routing packets, including their original headers, are replayed without any modification. Even if this malicious node cannot directly overhear the valid node’s wireless transmission, it can collude with other malicious nodes to receive those routing packets and replay them somewhere far away from the original valid node, which is known as a wormhole attack. For instance, it may drop packets received, forward packets to another node not supposed to be in the routing path, or even form a transmission loop through which packets are passed among a few malicious nodes infinitely.

2. Related work For a TARF-enabled node N to route a data packet to the base station, N only needs to decide to which neighboring node it should forward the data packet considering both the trustworthiness and the energy efficiency. Once the data packet is forwarded to that next-hop node, the remaining task to deliver the data to the base station is fully delegated to it, and N is totally unaware of what routing decision its next-hop node makes. N maintains a neighborhood table with trust level values and energy cost values for certain known neighbors. It is sometimes necessary to delete some neighbors’ entries to keep the table size acceptable. In TARF, in addition to data packet transmission, there are two types of routing information that need to be exchanged broadcast messages from the base station about data delivery and energy cost report messages from each node. Neither message needs acknowledgement. A broadcast message from the base station is flooded to the whole network. The freshness of a broadcast message is checked through its field of source sequence number. The other type of exchanged routing information is the energy cost report message from each node, which is broadcast to only its neighbors once. Any node receiving such an energy cost report message will not forward it. For each node N in a WSN, to maintain such a neighborhood table with trust level values and energy cost values for certain known neighbors, two components, Energy Watcher and Trust Manager, run on the node. Energy Watcher is responsible for recording the energy cost for each known neighbor, based on N’s observation of one-hop transmission to reach its neighbors and the energy cost report from those neighbors.

Mr. Sangamesh Patil, IJRIT

258

Fig 1: Each node selects a next-hop node based on its neighborhood table, and broadcast its energy cost within its neighborhood.

3. System design 3.1 Logical Design Design for Web Apps encompasses technical and non-technical activities. The look and feel of content is developed as part of graphic design; the aesthetic layout of the user interface is created as part of interface design; and the technical structure of the Web App is modeled as part of architectural and navigational design. This argues that a Web engineer must design an interface so that it answers three primary questions for the enduser: Where am I? – The interface should (1) provide an indication of the Web App has been accessed and (2) inform the user of her location in the content. What can I do now? – The interface should always help the user understand his current options- what functions are available, what links are live, what content is relevant. Design goals – the following are the design goals that are applicable to virtually every Web App regardless of application domain, size, or complexity.

1.Simplicity 2.Consistency. 3.Identity.

Design leads to a model that contains the appropriate mix of aesthetics, content, and technology. The mix will vary depending upon the nature of the Web App, and as a consequence the design activities that are emphasized will also vary. Mr. Sangamesh Patil, IJRIT

259

3.2 Physical design

Fig 2: Trust Aware routing Framework System Architecture.

4. Existing system In Existing system, when the file send from base station in that situation hackers aggravated network conditions. A traditional cryptographic techniques effort does not address the severe problems. That time the file could be affected by hackers. So, the network will be damaged. An attacker may tamper nodes physically, create traffic collision with seemingly valid transmission, drop or misdirect messages in routes, or jam the communication channel by creating radio interference. 4.1 Disadvantages of Existing System • • •

In Existing system, next hop selection is based on distance, it will not consider Energy level and Trust level. Since Energy level is not consider, same node is select to transmit the data, which in turn reduce the battery life and that node become dead quickly. If some nodes are attacked by harmful programs, there is no mechanism to skip the node.

5. Proposed system In Proposed System, focuses on the kind of attacks in which adversaries misdirect network traffic by identity deception through replaying routing information. Based on identity deception the adversary is capable of launching harmful and hard to detect attacks against routing, such as selective forwarding, wormhole attacks, sinkhole attacks, and Sybil attacks.

Mr. Sangamesh Patil, IJRIT

260

5.1 Advantages of the Proposed System • • • •

TARF proves effective against those harmful attacks developed out of identity deception. TARF gives High Throughput, Throughput is defined as the ratio of the number of all data packets delivered to the base station to destination station. Energy is saved in TARF, since it is selecting the next hop based on Trust and Energy Level. While selecting the next hop TARF consider energy level and pick the node with high energy level, so that network or single senor node will not come down quickly.

6. Methodology 6.1 Modules 1. Routing the Network. 2. Transfer File. 3. Sinkhole and Wormhole Attacks. 4. Energy Watcher & Trust Manager.

6.2 Modules description

6.2.1. Routing the network In this module, the networks embedded on the physical fiber topology. However, assessing the performance reliability achieved independent logical links can share the same physical link, which can lead to correlated failures. Mainly, we focus on assessing the reliability of energy level and trusted network. 6.2.2. Transfer file In this module, Analysis the Shortest Path algorithm independently routes each logical link on a physical path with the minimum number of hops in trusted network basis. Since we are assuming that every physical link fails with the same probability, the failure probability of path is minimized when it is routed over the shortest path. Hence, under the algorithm Shortest Path, each light- path greedily takes the most reliable route and transfers the file. 6.2.3. Sinkhole and warm hole attacks Prevent the base station from obtaining complete and correct sensing data Particularly severe for wireless sensor networks Some secure or geographic based routing protocols resist to the sinkhole attacks in certain level Many current routing protocols in sensor networks are susceptible to the sinkhole attack Set of sensor nodes continuously.

Mr. Sangamesh Patil, IJRIT

261

6.2.4. Energy watcher and trust manager In this module Cluster-based WSNs allows for the great savings of energy and bandwidth through aggregating data from children nodes and performing routing and transmission for children nodes. In a cluster-based WSN, the cluster headers themselves form a sub-network, after certain data reach a cluster header, the aggregated data will be routed to a base station only through such a sub network consisting of the cluster headers. Our framework can then be applied to this sub-network to achieve secure routing for cluster based WSNs.

7. Algorithms

7.1 Intruder Attack Process Algorithm • • •

Intruder will select one node from the Level 1 and Level 2 nodes randomly. For the selected node Intruder will keep sending the packets and make the node busy. If any legitimate node send any data to compromised node it will not accept the data in turn it will not give any acknowledgement and gradually trust percentage of this node goes down.

7.2 Algorithm - Selection of next hop node (Source) • • • •

Source will select the next hop node from level 1 nodes. Before selecting, source will check the Node weight of each node . The node which is having more node weight that respective node will be selected as a Next Hop Node. Node weight is the combination of Trust Percentage and Energy Percentage of a respective node. Trust percentage is calculated based on the total files received and for each received file it has to acknowledge to source with success message.

7.3 Algorithm - Selection of next hop node (Level 1 Nodes) • • • • •

Level 1 will select the next hop node from level 2 nodes. Before selecting Level 1 will check the Node weight of each node. The node which is having more node weight that respective node will be selected as a Next Hop Node from Level 2. Node weight is the combination of Trust Percentage and Energy Percentage of a respective node. Trust percentage is calculated based on the total files received and for each received file it has to acknowledge to Level 1 with success message. Finally Level 2 will forward the data to destination.

7.4 Energy Watcher algorithm Here we describe how a node N’s Energy Watcher computes the energy cost ENb for its neighbor b in N’s neighborhood table and how N decides its own energy cost EN. Before going further, we will clarify some notations.

Mr. Sangamesh Patil, IJRIT

262

ENb mentioned is the average energy cost of successfully delivering a unit-sized data packet from N to the base station, with b as N’s next-hop node being responsible for the remaining route. Here, one-hop re-transmission may occur until the acknowledgement is received or the number of re-transmissions reaches a certain threshold. The cost caused by one-hop retransmissions should be included when computing ENb. Suppose N decides that A should be its next-hop node after comparing energy cost and trust level. Then N’s energy cost is EN = ENA. Denote EN!b as the average energy cost of successfully delivering a data packet from N to its neighbor b with one hop. Note that the retransmission cost needs to be considered. With the above notations, it is straightforward to establish the following relation: ENb = EN!b + Eb.

8. Conclusion •

We have designed and implemented TARF, a robust trust-aware routing framework for WSNs, to secure multi-hop routing in dynamic WSNs against harmful attackers exploiting the replay of routing information.



TARF focuses on trustworthiness and energy efficiency, which are vital to the survival of a WSN in a hostile environment. With the idea of trust management, TARF enables a node to keep track of the trustworthiness of its neighbors and thus to select a reliable route.



Our main contributions are listed as follows. (1) Unlike previous efforts at secure routing for WSNs, TARF effectively protects WSNs from severe attacks through replaying routing information; it requires neither tight time synchronization nor known geographic information.

9. References [1] F. Zhao and L. Guibas, Wireless Sensor Networks: An Information Processing Approach. Morgan Kaufmann Publishers, 2004. [2] A. Wood and J. Stankovic, “Denial of service in sensor networks, ”Computer, vol. 35, no. 10, pp. 54–62, Oct 2002. [3] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and

countermeasures,”in

Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003. [4] M. Jain and H. Kandwal, “A survey on complex wormhole attack in wireless ad hoc networks,”in Proceedings of International Con-ference on Advances in Computing, Control,and Telecommunication Technologies (ACT ’09), 28-29 2009, pp. 55 –558.

Mr. Sangamesh Patil, IJRIT

263

[5] I. Krontiris, T. Giannetsos, and T. Dimitriou, “Launching a sinkhole attack in wireless sensor networks; the intruder side in Proceedings of IEEE Internation conference on wireless and mobile computing. [6] J. Newsome, E. Shi, D. Song, and A. Perrig, “The sybil attackin sensor networks: Analysis and defenses,” in Proc. of the 3rd International Conference on Information Processing in Sensor Networks (IPSN’04), Apr. 2004. [7] L. Bai, F. Ferrese, K. Ploskina, and S. Biswas, “Performance analysis of mobile agent- based wireless sensor network,” in Proceedings of the 8th International Conference on Reliability, Maintainability and Safety (ICRMS 2009), 20-24 2009, pp. 16 –19. [8] L. Zhang, Q. Wang, and X. Shu, “A mobile- agent-based middleware for wireless sensor networks data fusion,” in Proceedings of Instrumentation and Measurement Technology Conference (I2MTC’09), 5-7 2009, pp. 378 –383. [9] W. Xue, J. Aiguo, and W. Sheng, “Mobile agent based moving target methods in wireless sensor networks,” in IEEE International Symposium on Communications and Information Technology(ISCIT2005),vol.1,12-14 2005, pp. 22 – 26. [10] J. Hee-Jin, N. Choon-Sung, J. Yi-Seok, and S. Dong-Ryeol, “A mobile agent based leach in wireless sensor networks,” in Proceed-ings of the 10th International Conference on Advanced Communication Technology (ICACT 2008), vol. 1, 17-20 2008, pp. 75 – 78. [11] J. Al-Karaki and A. Kamal, “Routing techniques in wireless sensor networks: a survey,” Wireless Communications, vol. 11, no. 6, pp.6–28, Dec. 2004. [12] C. Karlof, N. Sastry, and D.Wagner, “Tiny sec: A link layer security architecture for wireless sensor networks,” in Proc. of ACM SenSys2004, Nov. 2004. [13] A. Perrig, R. Szewczyk, W. Wen, D. Culler, and J. Tygar, “SPINS: Security protocols for sensor networks,” Wireless Networks Journal(WINET), vol. 8, no. 5, pp. 521–534, Sep. 2002. [14] R. Watro, D. Kong, S. Cuti, C. Gardiner, C.Lynn, and P. Kruus,“Tinypk: securing sensor networks with public key technology” in Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN ’04). New York, NY, USA: ACM, 2004, pp.59–64.networks (IPSN ’08). IEEE Computer Society, 2008, pp.245–256.

Mr. Sangamesh Patil, IJRIT

264

improving the quality of service (qos) in wsn routing ...

In this module Cluster-based WSNs allows for the great savings of energy .... Conference on Information Processing in Sensor Networks (IPSN'04), Apr. 2004.

360KB Sizes 0 Downloads 194 Views

Recommend Documents

improving the quality of service (qos) in wsn routing using trust and ...
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the

Fuzzy Based QOS in WSN - IJRIT
Keywords: Fuzzy Logic, Quality of Service (QOS), Wireless Sensor Network (Wsn). 1. ... requirement such as the performance measure associated with event ...

Fuzzy Based QOS in WSN - IJRIT
The system results are studied and compared using MATLAB. It gives better and .... yes/no; high/low etc. Fuzzy logic provides an alternative way to represent.

Improved Secure Routing Scheme in WSN - International Journal of ...
we will assign keys manually with Hash Function which is Blowfish. ... Authentication and encryption based on symmetrical cryptography are lightweight security ...

Improved Secure Routing Scheme in WSN - International Journal of ...
evaluate the performance of Ad hoc On Demand Distance Vector (AODV) routing protocol for monitoring of critical conditions with the help of important metrics like delay, throughput and network load with different techniques in different scenarios for

Performance evaluation of QoS routing algorithms - Computer ...
led researchers, service providers and network operators to seriously consider quality of service policies. Several models were proposed to provide QoS in IP ...

A Quality of Service Routing Scheme for Packet ...
Abstract. Quality of Service (QoS) guarantees must be supported in a network that intends to carry real-time multimedia traffic effectively. A key problem in providing. QoS guarantees is routing which consists of finding a path in a network that sati

Quality-of-Service Routing Using Maximally Disjoint Paths
destination so that any link with low resource availability is highly unlikely to belong .... node of the current domain or peer group). Crankback in. Phase I is ..... Name. Number Diameter Core. C2C PROB MAX of Links (hops). Nodes. DEGREE.

Quality of Service Routing and Admission Control for ...
1. Quality of Service Routing and Admission Control for Mobile. Ad-hoc Networks with a Contention-based MAC Layer. L. Hanzo (II.) and R. Tafazolli. Centre for ...

The challenges of six sigma in improving service quality
Department of Management, The College of New Jersey, Ewing, .... The concept of service quality is a technical term in the marketing literature that usually.

New QoS and Geographical Routing in Wireless ...
The data traffic is classified into several ... of this paper is data traffic based QoS with regard to ..... module at node, vi estimates velocity offered by neigh-.

Entropy Based QoS Routing Algorithm in MANET Using ...
A Mobile Ad Hoc Network (MANET) is a dynamic wireless network that can be formed without the need of any pre-existing infrastructure in which each node can ...

Entropy Based QoS Routing Algorithm in MANET Using ...
1Department of Information Technology, ABES Engineering College, Ghaziabad, .... 2.1.2 Divisive: This is a "top down" approach: all observations start in one ..... Conference on Nctworking , Sensing and Control (ICNSC06), Florida, USA, 23-.

The challenges of six sigma in improving service ... - Semantic Scholar
The current issue and full text archive of this journal is available at ... Recently, a number of articles has focused on the importance of six sigma for ...... Rylander, D.H. and Provost, T. (2006), “Improving the odds: combining six sigma and onl

New QoS and Geographical Routing in Wireless ...
Networks. Djamel Djenouri1, Ilangko Balasingham2. 1 Department of Electronics and ... the considered QoS metrics) [4, 3], several services but with respect to ...

QoS routing in ad hoc wireless networks
show this improvement. Index Terms—Ad hoc wireless networks, code division multiple ...... degree in the Department of Computer and Infor- mation Science ...

Lightweight Routing with QoS Support in Wireless ...
Abstract—Wireless sensor and actor networks (WSANs) can be used ... tions with different quality of service (QoS) requirements. QoS ..... compared to traditional internet routing scenarios. ... less when we compare dropped Interest 2 packets.

An Overview of Quality-of-Service Routing for the Next Generation ...
wide-area networks is likely to be connection-oriented for the real-time traffic.1 This ... contract between the service provider and the user applications. The QoS ...

An Overview of Quality-of-Service Routing for the Next Generation ...
and (2) achieving the global efficiency in resource utilization. Many unicast/multicast ... First, distributed applications such as Internet phone. 1. At the transport ...

An Overview of Quality-of-Service Routing for the Next Generation ...
In the current Internet, data packets of a session may follow different paths ... upper bound. A feasible path (tree) is one that has sufficient residual. (unused) resources to satisfy the QoS constraints of a connection. The basic function of QoS ro

Control of Multiple Packet Schedulers for Improving QoS ... - IEEE Xplore
Abstract—Packet scheduling is essential to properly support applications on Software-Defined Networking (SDN) model. How- ever, on OpenFlow/SDN, QoS is ...

The MEQUAL scale: measure of service quality in ...
Nov 17, 2017 - well as providing an extensive range of online products and additional customer resources and services. Emerald is ... management program to keep pace with the current changes in the corporate and industrial .... Banking Service Qualit