Project Login
Registration No:
Password:
MAIL ALERTS SMS ALERTS
 
     
   
     

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks

Platform : IEEE PARALLEL AND DISTRIBUTED SYSTEMS

IEEE Projects Years : 2012

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks

Abstract

 

Injecting false data attack is a well known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden of the sink. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high filtering probability and energy saving.

 

 

 

 

 

 

 

 

 

Architecture

 Fig. 1

 

 

 

 

 

 

 

 

Existing System

 

Wireless sensor networks are usually deployed at unattended or hostile environments. Therefore, they are very vulnerable to various security attacks, such as selective forwarding, wormholes, and sybil attacks. In addition, wireless sensor networks may also suffer from injecting false data attack. For an injecting false data attack, an adversary first compromises several sensor nodes, accesses all keying materials stored in the compromised nodes, and then controls these compromised nodes to inject bogus information and send the false data to the sink to cause upper level error decision, as well as energy wasted in en-route nodes.

Disadvantages

 

  1. Energy wasted in en-route nodes.
  2. Heavy verification burdens.
  3. Gang injecting false data attack.
  4. No Cooperative Authentication.

 

Proposed System

 

In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden of the sink. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high filtering probability and energy saving.

Advantages

 

  1. High filtering probability and energy saving.
  2. Detect injecting false data attack.
  3. BECAN Scheme in terms of en-routing filtering probability and false negative rate on true reports.
  4. Early detecting the injected false data by the en-route sensor nodes.
  5. Sink Verification
  6. Prevent/Mitigate the gang injecting false data attack from mobile compromised sensor nodes.

 

Modules

 

  1. 1.     BECAN Scheme

A novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data in wireless sensor networks. Compared with the previously reported mechanisms, the BECAN scheme achieves not only high filtering probability but also high reliability.

•) First, we study the random graph characteristics of wireless sensor node deployment, and estimate the probability of k-neighbors, which provides the necessary condition for BECAN authentication;

•)  Second, we propose the BECAN scheme to filter the injected false data with cooperative bit-compressed authentication technique. With the proposed mechanism, injected false data can be early detected and filtered by the en-route sensor nodes. In addition, the accompanied authentication information is bandwidth-efficient; and

•) Third, we develop a custom simulator to demonstrate the effectiveness of the proposed BECAN scheme in terms of en-routing filtering probability and false negative rate on true reports.

 

  1. 2.     Early detecting the injected false data by the en-route sensor nodes

The sink is a powerful data collection device. Nevertheless, if all authentication tasks are fulfilled at the sink, it is undoubted that the sink becomes a bottleneck. At the same time, if too many injected false data flood into the sink, the sink will surly suffer from the Denial of Service (DoS) attack. Therefore, it is critical to share the authentication tasks with the en-route sensor nodes such that the injected false data can be detected and discarded early. The earlier the injected false data are detected, the more energy can be saved in the whole network.

 

  1. Gang Injecting False Data Attack

We introduce a new stronger injecting false data attack, called gang injecting false data attack, in wireless sensor networks. This kind of attack is usually launched by a gang of compromised sensor nodes controlled and moved by an adversary A. As shown in Fig. 2, when a compromised source node is ready to send a false data, several compromised nodes will first move and aggregate at the source node, and then collude to inject the false data. Because of the mobility, the gang injecting false data attack is more challenging and hard to resist.

 

 Fig. 2

  1. 4.     Reliability of the BECAN scheme

                   In addition to the high (en-routing) filtering probability, the BECAN scheme also has high reliability, i.e., even though some sensor nodes are compromised, the true event reports still can reach the sink with high probability. Let FNR be the false negative rate on the true reports and tested as

 

If FNR is small, the BECAN scheme is demonstrated high reliability.

 

HARDWARE & SOFTWARE REQUIREMENTS

HARDWARE REQUIREMENTS

  • System                         :           Pentium IV 2.4 GHz.
  • Hard Disk                    :           40 GB.
  • Floppy Drive                :           1.44 Mb.
  • Monitor                        :           15 VGA Color.

SOFTWARE REQUIREMENTS

  • Operating system          :           Windows XP Professional.

Coding Language          :           C#.NET


NOW GET PROJECTS ! GET TRAINED ! GET PLACED !

IEEE, NON-IEEE, REAL TIME LIVE ACADEMIC PROJECTS,

PROJECTS WITH COMPLETE COURSES,SOFT SKILLS & PLACEMENTS

ALLOVER INDIA & WORLD WIDE,

HOSTEL FACILITY AVAILABLE FOR GIRLS & BOYS SEPARATELY,

CALL: 08985129129 ,  E-Mail Id: support@ascentit.in

REGISTER FOR PROJECTS NOW ! GET DISCOUNT
   
1