Вы находитесь на странице: 1из 40

ForgereyNode Detect and Path Redirection Scheduling

Presented By
K.KarpagaSeetha
952613621009

Under the Guidance of


Mr.M.RAMU

Abstract
A common technique to detect this forgery node behaviour is
monitoring using local watchdogs.

network

A nodes watchdog consists on overhearing the packets transmitted and


received by its neighbours in order to detect anomalies, such as the ratio
between packets received to packets being retransmitted.
By using this technique, the local watchdog can generate a positive (or
negative) detection in case the node is acting forgery node
(or not).
As this technology is applied monitoring and retransmit process
with paires of node

Objective
The goal is to obtain the detection time (and overhead) of a forgery
node in a network.
The main objective is to reduce the time and improve the
effectiveness of detecting forgery nodes, reducing the harmful effect
of false positives, false negatives and malicious nodes.

Existing system
In the Existing System, it provides two main strategies to deal with
forgery behaviour:
a) motivation or incentive based approaches, and
b) detection and exclusion.
The rst approach, tries to motivate nodes to actively participate in
the forwarding activities.

These approaches are usually based on virtual currency and/or


game theory models.

The detection and exclusion approach is a straight forward way to


cope with forgery nodes and several solutions have been presented.

Disadvantage
There is no forgery prevention mechanism is present.

The packet delivery rates become seriously degraded.

Nevertheless, watchdogs can fail on this detection, generating false


positives and false negatives that seriously degrade the behaviour of
the system.
The packet is not retransmitted, therefore being lost.

Proposed system
It combines local watchdog detections and the dissemination of this
information on the network.
A nodes watchdog consists on overhearing the packets transmitted and
received by its neighbours in order to detect anomalies, such as the ratio
between packets received to packets being retransmitted.

It is based on the combination of a local watchdog and the diffusion of


information when contacts between pairs of nodes occurs.

A contact is dened as an opportunity of transmission between a pair of


nodes.

Advantages
It takes less detection time (and overhead) of a forgery node in a
network.
It reduce the time and improve the effectiveness of detecting forgery
nodes, reducing the harmful effect of false positives, false negatives
and malicious nodes.
It can reduce the overall detection time with respect to the original
detection time when no collaboration scheme is used, with a reduced
overhead (message cost).

System Requirements
SOFTWARE REQUIREMENTS:
Domain

Mobile Computing

Operating System

Front End

Back End

Windows XP.
C# .NET

Microsoft SQL Server 2005

System Requirements
HARDWARE REQUIREMENTS:

Processor

: Any Processor above 500 MHz

RAM

: 512 MB.

Hard Disk

: 320 GB.

Input Device

: Standard Keyboard & Mouse.

Output Device

: VGA & High Resolution Monitor

Use Case Diagram

Data Flow Diagram


Level 0

DFD for upload file

Level 1

DFD For Node Initialization

Level 2

DFD For Range value process

Level 3

DFD For Retransmit process

Level 4

DFD For Time analysis process

Level 5

DFD For File Compare

Database Design

Modules
Network Creation
Packet Transmission
Local Watchdog
Diffusion Module
Information Update Module
Predict forgery Nodes

Network Creation
The system assume that sensors are randomly deployed in the
interested area which is very dense and all the sensors have a
common transmission range.
The system assume that each sensor node has at least 3 neighboring
nodes.
Even in networks where the nodes could be deployed nonuniformly.

In this module to deploy the network using nodes. After that have
to select the source node and destination node in that network.

Packet Transmission
Packet Generation
A packet
generator
or
packet
builder that
generates
random packets or allows the user to construct detailed custom
packets.

Depending on the network medium and operating system, packet


generators utilize raw sockets, or direct access to the network
adapter kernel-mode driver.

Packet Routing
Routing is the process during which data packets are forwarded
from one machine or device to another on a network until they reach
their destinations.
Data packets have to cross through a lot of routers to reach their
destination
The work these routers do is called routing. The packets go each one
its own way and can move through different networks and take
different paths.

They all finally get routed to one same destination machine.

Local Watchdog
The Local Watchdog has two functions: the detection of selsh
nodes and the detection of new contacts.
The local watchdog can generate the following events about
neighbour nodes: PosEvt ( positive event ) when the watchdog
detects a forgery node,
NegEvt ( negative event )when the watch dog detects that a node is
not forgery behaviour, and
NoDetEvt ( no detection event ) when the watchdog does not have
enough information about a node.

Contd..
The detection of new contacts is based on neighbourhood packet
overhearing;
Thus, when the watchdog overhears packets from a new node it is
assumed to be a new contact, and so it generates an event to the
network information module.

Diffusion Module
After the local watchdog function is completed, and then go for
diffusion process.
The diffusion module receives a new contact event from the
watchdog, it transmits a message including this information to the
new neighbour node.
When the neighbor node receives a message, it generates an event to
the network information module with the list of these positive (and
negative) detections.

Information Update Module


The function of the Information Update module. A node can have
the following internal information about other nodes: NoInfo state,
Positive state and Negative state.
A NoInfo state means that it has no information about a node, a
Positive state means it believes that a node is forgery node, and a
Negative state means it believes that a node is not forgery node.

A node can have direct information (from the local watchdog) and
indirect information (from neighbour nodes).

Predict forgery Nodes


After the Local Watchdog, diffusion module and information module has been
completed.

Predict forgery nodes by using the node behaviors and states of the nodes
and events of the nodes in the network.

By using these type of information's update the status of the nodes in the
network.
Finally predict the detection time and overhead and packet transmission time.
By using these parameters can evaluate the performance of existing system
and proposed system.

Network status

Figure1. Network status

Figure 10.1.2 Node create form

Node creation

Figure 2. Node create

Node Initialization

Figure 3. Node Initialization

Path calculate

Figure4 .Path calculate

Selvalue

Figure 5. Selvalue

Node connection

Figure 6 .Node connection

File Compare

Figure 7. File Compare

Time Analysis Graph

Figure 8.Time Analysis Graph

Retransmit path Graph

Figure 9. Retransmit path Graph

Conclusion
Supporting this cooperation is a cost intensive activity for mobile
nodes
Nodes could have a forgery behaviour, being unwilling to forward
packets for others.
This can reduce the time and improve the effectiveness of detecting
forgery nodes, reducing the harmful effect of false positives, false
negatives and malicious nodes.

Future Enhancement
In future work the forgery node have been repaired and transmit
through the same node
Rich data packets , such as animation and audio, video files
transmit time to be reduced

Reference
S. Abbas, M. Merabti, D. Llewellyn-Jones, K. Kifayat,Lightweight Sybil attack
detection in manets, 2013.
Y. Zhang, L. Lazos, and W. Kozma, AMD: Audit-based misbehavior detection in
wireless ad hoc networks, 2012.
E. Hern_andez-Orallo, M. D. Serrat, J.-C. Cano, C. M. T. Calafate,and P. Manzoni,
Improving selfish node detection in MANETs using a collaborative watchdog, 2012.

Website Reference
http://www.doi.ieeecomputersociety
www.computer.org/publications/dlib

Вам также может понравиться