Subscribe



Enter Email address for Daily FREE New Projects, Projects Ideas, IEEE Projects...etc :

Thursday, December 27, 2012

2

IEEE Dot Net Project- BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks

  • Thursday, December 27, 2012
  • prakash chalumuri
  • Share

  • BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks

    Abstract

    Injecting false data attack is a well known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden of the sink. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high filtering probability and energy saving.









    Architecture
    Fig. 1

    Existing System

    Wireless sensor networks are usually deployed at unattended or hostile environments. Therefore, they are very vulnerable to various security attacks, such as selective forwarding, wormholes, and sybil attacks. In addition, wireless sensor networks may also suffer from injecting false data attack. For an injecting false data attack, an adversary first compromises several sensor nodes, accesses all keying materials stored in the compromised nodes, and then controls these compromised nodes to inject bogus information and send the false data to the sink to cause upper level error decision, as well as energy wasted in en-route nodes.
    Disadvantages

    1.      Energy wasted in en-route nodes.
    2.      Heavy verification burdens.
    3.      Gang injecting false data attack.
    4.      No Cooperative Authentication.

    Proposed System

    In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden of the sink. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high filtering probability and energy saving.
    Advantages

    1.     High filtering probability and energy saving.
    2.     Detect injecting false data attack.
    3.     BECAN Scheme in terms of en-routing filtering probability and false negative rate on true reports.
    4.     Early detecting the injected false data by the en-route sensor nodes.
    5.     Sink Verification
    6.     Prevent/Mitigate the gang injecting false data attack from mobile compromised sensor nodes.

    Modules

    1.     BECAN Scheme
    A novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data in wireless sensor networks. Compared with the previously reported mechanisms, the BECAN scheme achieves not only high filtering probability but also high reliability.
    •) First, we study the random graph characteristics of wireless sensor node deployment, and estimate the probability of k-neighbors, which provides the necessary condition for BECAN authentication;
    •)  Second, we propose the BECAN scheme to filter the injected false data with cooperative bit-compressed authentication technique. With the proposed mechanism, injected false data can be early detected and filtered by the en-route sensor nodes. In addition, the accompanied authentication information is bandwidth-efficient; and
    •) Third, we develop a custom simulator to demonstrate the effectiveness of the proposed BECAN scheme in terms of en-routing filtering probability and false negative rate on true reports.

    2.     Early detecting the injected false data by the en-route sensor nodes
    The sink is a powerful data collection device. Nevertheless, if all authentication tasks are fulfilled at the sink, it is undoubted that the sink becomes a bottleneck. At the same time, if too many injected false data flood into the sink, the sink will surly suffer from the Denial of Service (DoS) attack. Therefore, it is critical to share the authentication tasks with the en-route sensor nodes such that the injected false data can be detected and discarded early. The earlier the injected false data are detected, the more energy can be saved in the whole network.

    3.     Gang Injecting False Data Attack
    We introduce a new stronger injecting false data attack, called gang injecting false data attack, in wireless sensor networks. This kind of attack is usually launched by a gang of compromised sensor nodes controlled and moved by an adversary A. As shown in Fig. 2, when a compromised source node is ready to send a false data, several compromised nodes will first move and aggregate at the source node, and then collude to inject the false data. Because of the mobility, the gang injecting false data attack is more challenging and hard to resist.

    Fig.
    4.     Reliability of the BECAN scheme
                       In addition to the high (en-routing) filtering probability, the BECAN scheme also has high reliability, i.e., even though some sensor nodes are compromised, the true event reports still can reach the sink with high probability. Let FNR be the false negative rate on the true reports and tested as
    If FNR is small, the BECAN scheme is demonstrated high reliability.

    HARDWARE & SOFTWARE REQUIREMENTS
    HARDWARE REQUIREMENTS
    ·                     System                        :           Pentium IV 2.4 GHz.
    ·                     Hard Disk                   :           40 GB.
    ·                     Floppy Drive               :           1.44 Mb.
    ·                     Monitor                       :           15 VGA Color.
    SOFTWARE REQUIREMENTS
    ·                     Operating system        :           Windows XP Professional.
    ·                     Coding Language       :           C#.NET

    2 Responses to “IEEE Dot Net Project- BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks”

    Arun Kumar said...
    April 12, 2013 at 7:48 PM

    Can i get the source code for this project


    Arun Kumar said...
    April 14, 2013 at 7:36 PM

    Please send me the code of this project or tell me the price and order process.


    Post a Comment