Академический Документы
Профессиональный Документы
Культура Документы
Presented By
K.KarpagaSeetha
952613621009
Abstract
A common technique to detect this forgery node behaviour is
monitoring using local watchdogs.
network
Objective
The goal is to obtain the detection time (and overhead) of a forgery
node in a network.
The main objective is to reduce the time and improve the
effectiveness of detecting forgery nodes, reducing the harmful effect
of false positives, false negatives and malicious nodes.
Existing system
In the Existing System, it provides two main strategies to deal with
forgery behaviour:
a) motivation or incentive based approaches, and
b) detection and exclusion.
The rst approach, tries to motivate nodes to actively participate in
the forwarding activities.
Disadvantage
There is no forgery prevention mechanism is present.
Proposed system
It combines local watchdog detections and the dissemination of this
information on the network.
A nodes watchdog consists on overhearing the packets transmitted and
received by its neighbours in order to detect anomalies, such as the ratio
between packets received to packets being retransmitted.
Advantages
It takes less detection time (and overhead) of a forgery node in a
network.
It reduce the time and improve the effectiveness of detecting forgery
nodes, reducing the harmful effect of false positives, false negatives
and malicious nodes.
It can reduce the overall detection time with respect to the original
detection time when no collaboration scheme is used, with a reduced
overhead (message cost).
System Requirements
SOFTWARE REQUIREMENTS:
Domain
Mobile Computing
Operating System
Front End
Back End
Windows XP.
C# .NET
System Requirements
HARDWARE REQUIREMENTS:
Processor
RAM
: 512 MB.
Hard Disk
: 320 GB.
Input Device
Output Device
Level 1
Level 2
Level 3
Level 4
Level 5
Database Design
Modules
Network Creation
Packet Transmission
Local Watchdog
Diffusion Module
Information Update Module
Predict forgery Nodes
Network Creation
The system assume that sensors are randomly deployed in the
interested area which is very dense and all the sensors have a
common transmission range.
The system assume that each sensor node has at least 3 neighboring
nodes.
Even in networks where the nodes could be deployed nonuniformly.
In this module to deploy the network using nodes. After that have
to select the source node and destination node in that network.
Packet Transmission
Packet Generation
A packet
generator
or
packet
builder that
generates
random packets or allows the user to construct detailed custom
packets.
Packet Routing
Routing is the process during which data packets are forwarded
from one machine or device to another on a network until they reach
their destinations.
Data packets have to cross through a lot of routers to reach their
destination
The work these routers do is called routing. The packets go each one
its own way and can move through different networks and take
different paths.
Local Watchdog
The Local Watchdog has two functions: the detection of selsh
nodes and the detection of new contacts.
The local watchdog can generate the following events about
neighbour nodes: PosEvt ( positive event ) when the watchdog
detects a forgery node,
NegEvt ( negative event )when the watch dog detects that a node is
not forgery behaviour, and
NoDetEvt ( no detection event ) when the watchdog does not have
enough information about a node.
Contd..
The detection of new contacts is based on neighbourhood packet
overhearing;
Thus, when the watchdog overhears packets from a new node it is
assumed to be a new contact, and so it generates an event to the
network information module.
Diffusion Module
After the local watchdog function is completed, and then go for
diffusion process.
The diffusion module receives a new contact event from the
watchdog, it transmits a message including this information to the
new neighbour node.
When the neighbor node receives a message, it generates an event to
the network information module with the list of these positive (and
negative) detections.
A node can have direct information (from the local watchdog) and
indirect information (from neighbour nodes).
Predict forgery nodes by using the node behaviors and states of the nodes
and events of the nodes in the network.
By using these type of information's update the status of the nodes in the
network.
Finally predict the detection time and overhead and packet transmission time.
By using these parameters can evaluate the performance of existing system
and proposed system.
Network status
Node creation
Node Initialization
Path calculate
Selvalue
Figure 5. Selvalue
Node connection
File Compare
Conclusion
Supporting this cooperation is a cost intensive activity for mobile
nodes
Nodes could have a forgery behaviour, being unwilling to forward
packets for others.
This can reduce the time and improve the effectiveness of detecting
forgery nodes, reducing the harmful effect of false positives, false
negatives and malicious nodes.
Future Enhancement
In future work the forgery node have been repaired and transmit
through the same node
Rich data packets , such as animation and audio, video files
transmit time to be reduced
Reference
S. Abbas, M. Merabti, D. Llewellyn-Jones, K. Kifayat,Lightweight Sybil attack
detection in manets, 2013.
Y. Zhang, L. Lazos, and W. Kozma, AMD: Audit-based misbehavior detection in
wireless ad hoc networks, 2012.
E. Hern_andez-Orallo, M. D. Serrat, J.-C. Cano, C. M. T. Calafate,and P. Manzoni,
Improving selfish node detection in MANETs using a collaborative watchdog, 2012.
Website Reference
http://www.doi.ieeecomputersociety
www.computer.org/publications/dlib