Home > Information technology essays > An approach of monitoring and detecting the data transmission over multiple channels in wireless sensor networks

Essay: An approach of monitoring and detecting the data transmission over multiple channels in wireless sensor networks

Essay details and download:

  • Subject area(s): Information technology essays
  • Reading time: 6 minutes
  • Price: Free download
  • Published: 12 October 2015*
  • File format: Text
  • Words: 1,736 (approx)
  • Number of pages: 7 (approx)

Text preview of this essay:

This page of the essay has 1,736 words. Download the full version above.

Abstract — In wireless sensor networks,the protocols relay on secure data transmission to attains a secure and active channel conditions. They call such protocol as channel aware. Each user reports the measured channel condition to a wireless resource manager. The channel aware protocol use these reports to determines how resources are allocate to user. The deployment of channel aware protocol increases the risk of false channel condition feedback. This channel aware network protocols understand how an attack use false feedback and how much the attack affects network performance. A secure channel condition estimation algorithm is defend against the channel condition misreporting attack. The potential impacts of attacker that falsely reports its channel condition and propose a defense mechanism to securely estimate channel condition. To design an algorithm the evaluation through analysis and simulations. This algorithm enhances the security and performance level in secure channel conditions. In proposed system a false channel condition reporting attack is introduced. This attack is performed by modified user equipment register to a network. The advantage of proposed system is the source node schedules packet stream to neighbors on queuing channel condition to reduce transmission time and increase network capacity.
I. Introduction:
In wireless networks the channel condition information protocol is the input parameter. This protocol is the channel aware protocol. The channel aware protocols are focused on how channel condition information can use. The maintenance of channel condition is a challenging task. The security of channel aware protocol shows specific network environment by simulation.
Secure handover algorithm and defense mechanism is the proposed work. It is used for secure channel condition estimations. A wireless networks is widely used in these days for communications. But the days passes the issue of security evolved due to various types of attacks. These attacks may affect the reliability and performance of networks.
The research plan in wireless network include various routing protocols. It is used to find the destination fastly and also utilize the available resources in a network. This two parameters of the counter measure must be avoid the affect of reliability and performance of a wireless networks. The wireless networks of each node act as a host and router. For receiving datas the nodes need to cooperate with each other to forward the data packets. In security point of view it is one of the drawback. In network the pesence and collaboration of malicious nodes terminates the communication process and to broke the network operations.
The false channel condition reporting attack is one of the attack and it accept the false condition about channel to source and the communication channel gets closed. In communication channels the nodes are detected and discard the channels.
The various channel aware wireless network protocol includes cooperative relaying protocol,routing metrics in wireless ad-hoc network and opportunistic schedulers. A secure channel condition estimation algorithm is used to construct a secure channel aware protocol in single hop settings.
II. Attack Overview:
This section introduce attack concept and perform case studies to quantize the attack effects on specific channel aware network protocol.
A. Attack concept:
This study assumes that network resource scheduler exploits channel condition information of each user to enhance network performance and each user reports own channel condition to the scheduler. The user can falsely report its own channel condition. The two types of false report is underclaiming and overclaiming. To detect the underclaiming attack is difficult.The overclaiming attack can be consider in the defence.
B. Attack Feasibility:
An attacker can implement false channel condition reporting attack is modify a subcomponent. This subcomponent of user equipment implements hardware and software. The software control of user equipment make false channel condition reporting attack.
III. Defense
This section discuss possible solution for false channel feedback attack. To defend against the attack in false channel condition reports to secure estimation channel condition. Then develop secure channel condition estimation algorithm.
A. Solution Spectrum:
To defend an attack that misreports the channel condition have the possible approaches.
First approache is anomaly detection. It is a tool to monitor each user performance to identify the attacker. The response mechanism then disconnect attackers from the network.
Second approach is a fair schedular to provide fair share of network bandwidth to exploit channel aware property.
Third approach is to measure throughput of a node and compare it to theoretical throughput on reported channel condition. This approaches can reduce the effectiveness of the attack. Anomaly detection are used to detect errors and the result is incorrect termination of normal user service or failure to detect attacker. The fair scheduler is used to reduce effect of attack.
B. Scope of Algorithm
To consider channel condition misreporting attack two cases are used. First case get the report of a nodes channel condition to the trusted entity. Second case get the report of a nodes channel condition to other node from an untrusted node. The further case happens the deployment of adhoc network routing metrics but it is difficult to identify the attackers. So the first case can be focus to defense against an attack.
C. Secure Channel Condition Estimation:
The secure channel condition estimation scheme is to prevent attacker from overclaiming. The purpose is to describe how the attackers defends that overclaims the condition of single link. In intuition the trusted entity is ‘base station’ and untrusted entity is ‘user’. The base station is to secure each users channel condition. The application of this algorithm is to detect an attacker by compare reported channel and estimated channel conditions. Then select a node with good channel condition. After selecting node,a sender node determines reported channel condition modulation and reduce loss probability.
IV. System performance:
The system performance is the evaluation of secure channel condition estimation algorithm. The reference system implements cooperative relaying network and opportunistic scheduler. To consider single hop cooperative relaying network,each user reports channel condition to the base station.
A. Cooperative Relaying Network:
In wireless network the mobile nodes have different channel condition due to different locations. The fig shows poor channel condition to route its packets through a node with good channel condition to improve throughput. To find such route a cooperative relaying protocol can distribute channel condition information for each path and find relay path also motivate the nodes to forward packets for other nodes. The user equipement has two wireless adaptors. That is High Data Rate (HDR) cellular interface and IEEE 802.11 interface. The HDR is used for base station communication. The IEEE 802.11 is used for peer to peer communication with other user in a network.
The cooperative relaying architectures has various forms to know the genuine channel condition of each users relaying nodes to find the appropriate relaying node. The purpose is to maximize system efficiency and the best routed channel condition is selected. The underclaiming attack is not effective in cooperative relaying. The designation of attackers relaying node provides the opportunity to impact network performance.
Fig : Cooperative Relaying Network
B. Opportunistic Scheduler:
Opportunistic scheduler is a centralized resource schedular performs the channel condition information of each user for efficient resource management. One of the example is allocates resources to user with best channel condition in a time slot.
Fig : Opportunistic Scheduler
V. Related Work:
A. Attack on Hybrid Network:
A hybrid network implements cooperative relaying use two distint data link technologies. Carbunar et al. Propose JANUS for defending malicious behavior for establishing routes in hybrid networks. In JANUS a base station sends request packets to nodes. But it is not cryptographically secured,so the attackers guess where the response packet sends and to hide the attack from base station. Haas et al. Propose SUCAN for defending byzantine behavior in hybrid network. They donot consider attacks that misreports channel condition.
B. Attacks on Routing Protocols in Adhoc Networks:
In adhoc routing protocol an attacker inject routing packets into a network to separate routing. Most of the researcher studied defense mechanism against attacks,so there is no study on false channel condition attacks routing metrics.
C. Attacks on Opportunistic Schedulers:
Bali et al. explains vulnerability in PF scheduler that induced by a malicious traffic pattern. Bursty traffic enable a single flow to occupy several consecutive slots. They measure this attack on real EV-DO network. Racic et al work PF scheduler is consider the attack effect of falsely reporting channel condition and conclude that doesnot do harm other user in networks using PF scheduler. They find falsely reports with handover and occupy many time slots. Then other users opportunity to be served. In this work false reporting channel condition affect other users performance in other networks.
VI. Conclusion:
In this section the falsely reporting users channel condition is studied. This report can reduce the performance of other users. The false channel feedback attack arise in any channel aware protocol where a user reports its own channel condition. To against such attack, a secure channel condition estimation algorithm can proposed. This algorithm prevents the overclaiming attack. The analysis and simulation shows proper parameters and prevent the overclaiming attack.
References:
1. Jalali, A., Padovani, R., Pankaj, R.: Data throughput of cdma-hdr a high efficiencyhigh data rate personal communication wireless system. In: Proc. IEEE VTC. vol. 3, pp. 1854’1858 (May 2000).
2. Luo, H., Ramjee, R., Sinha, P., Li, L.E., Lu, S.: Ucan: a unified cellular and adhoc network architecture. In: ACM MobiCom.pp.353’367.ACM, New York, NY, USA (2003).
3. De Couto, D.S.J., Aguayo, D., Bicket, J., Morris, R.: A high-throughput path metric for multi-hop wireless routing. In: ACM MobiCom. pp. 134’146. ACM, New York, NY, USA (2003).
4. Draves, R., Padhye, J., Zill, B.: Comparison of routing metrics for static multi-hop wireless networks. In: ACM SIGCOMM.pp.133’144.ACM,New York,NY,USA (2004).
5. Y.-C. Hu and A. Perrig, ‘A survey of secure wireless ad hoc routing,’ IEEE Security Privacy, vol. 2, no. 3, pp. 28’39, May/Jun.2004.
6. R. Draves, J. Padhye, and B. Zill, ‘ Comparison of routing metrics for static multi-hop wireless networks,’ in Proc. ACM SIGCOMM, Portland, OR, USA, 2004, pp. 133’144.
7. Bali,S.,Machiraju,S.,Zang, H.,Frost,V.:A measurement study of schedulerbased attacks in 3g wireless networks. In: Proc. PAM (2007).
8. Racic, R., Ma, D., Chen, H., Liu, X.: Exploiting opportunistic scheduling in cellular data networks. In: NDSS (2008).
9. Carbunar, B., Ioannis, I., Nita-Rotaru, C.: Janus: A framework for scalable and secure routing in hybrid wireless networks.IEEE Transactions on Dependable and Secure Computing (2008).
10. J. J. Haas and Y.-C. Hu, ‘Secure unified cellular ad hoc network routing,’ in Proc. IEEE Globecom, Honolulu, HI, USA, 2009.

...(download the rest of the essay above)

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, An approach of monitoring and detecting the data transmission over multiple channels in wireless sensor networks. Available from:<https://www.essaysauce.com/information-technology-essays/essay-an-approach/> [Accessed 30-04-24].

These Information technology essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on Essay.uk.com at an earlier date.