Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs – projects

projects 2012

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs – projects 2012

Abstract:Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs – projects 2012

The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions.

AIM

To focus on the kind of attacks in which adversaries misdirect network traffic by identity deception through replaying routing information. Based on identity deception, the adversary is capable of launching harmful and hard-to-detect attacks against routing, such as selective forwarding, wormhole attacks, sinkhole attacks and Sybil attacks


INTRODUCTION

Wireless sensor networks (WSNs) are ideal candidates for applications to report detected events of interest, such as military surveillance and forest fire monitoring. A WSN comprises battery-powered senor nodes with extremely limited processing capabilities. With a narrow radio communication range, a sensor node wirelessly sends messages to a base station via a multi-hop path. However, the multi-hop routing of WSNs often becomes the target of malicious attacks. An attacker may tamper nodes physically, create traffic collision with seemingly valid transmission, drop or misdirect messages in routes, or jam the communication channel by creating radio interference.

PROBLEM STATEMENT

As a harmful and easy-to-implement type of attack, a malicious node simply replays all the outgoing routing packets from a valid node to forge the latter node’s identity; the malicious node then uses this forged identity to participate in the network routing, thus disrupting the network traffic. Even if this malicious node cannot directly overhear the valid node’s wireless transmission, it can collude with other malicious nodes to receive those routing packets, which is known as a wormhole attack.

A node in a WSN relies solely on the packets received to know about the sender’s identity, replaying routing packets allows the malicious node to forge the identity of this valid node. After “stealing” that valid identity, this malicious node is able to misdirect the network traffic. It may drop packets received, forward packets to another node not supposed to be in the routing path, or form a transmission loop through which packets are passed among a few malicious nodes infinitely.

Sinkhole attacks can be launched after stealing a valid identity, in which a malicious node may claim itself to be a base station through replaying all the packets from a real base station. Such a fake base station could lure more than half the traffic, creating a “black hole.” This same technique can be employed to conduct another strong form of attack Sybil attack: through replaying the routing information of multiple legitimate nodes, an attacker may present multiple identities to the network. A valid node, if compromised, can also launch all these attacks.

PROBLEM SOLUTION

v     To protect WSNs from the harmful attacks exploiting the replay of routing information, designed and implemented a robust trust-aware routing framework, TARF, to secure routing solutions in wireless sensor networks.

v     Based on the unique characteristics of resource-constrained WSNs, the design of TARF centers on trustworthiness and energy efficiency.

v     TARF requires neither tight time synchronization nor known geographic information.

v     TARF proves resilient under various attacks exploiting the replay of routing information, which is not achieved by previous security protocols.

v     Even under strong attacks such as sinkhole attacks, wormhole attacks as well as Sybil attacks, and hostile mobile network condition, TARF demonstrates steady improvement in network performance.

v     Implemented a ready-to-use TARF module with low overhead, which as demonstrated can be integrated into existing routing protocols with ease.


EXISTING SYSTEM

Most existing routing protocols for WSNs either assume the honesty of nodes and focus on energy efficiency, or attempt to exclude unauthorized participation by encrypting data and authenticating packets. Examples of these encryption and authentication schemes for WSNs include TinySec, Spins, TinyPK, and TinyECC.

In addition to the cryptographic methods, trust and reputation management has been employed in generic ad hoc networks and WSNs to secure routing protocols. Basically, a system of trust and reputation management assigns each node a trust value according to its past performance in routing. Then such trust values are used to help decide a secure and efficient route. However, the proposed trust and reputation management systems for generic ad hoc networks target only relatively powerful hardware platforms such as laptops and smartphones.

Disadvantages

v     Various types of attacks are avoided

v     Trust and reputation management systems can not be applied to WSNs due to the excessive overhead for resource-constrained sensor nodes powered by batteries.

PROPOSED SYSTEM

To protect WSNs from the harmful attacks exploiting the replay of routing information, TARF, a robust trust-aware routing framework is designed, to secure routing solutions in wireless sensor networks.

TARF can be developed into a complete and independent routing protocol, the purpose is to allow existing routing protocols to incorporate our implementation of TARF with the least effort and thus producing a secure and efficient fully-functional protocol.


Advantages

v     Based on the unique characteristics of resource-constrained WSNs, the design of TARF centers on trustworthiness and energy efficiency.

v     TARF requires neither tight time synchronization nor known geographic information.

v     TARF proves resilient under various attacks exploiting the replay of routing information, which is not achieved by previous security protocols.

v     Even under strong attacks such as sinkhole attacks, wormhole attacks as well as Sybil attacks, and hostile mobile network condition, TARF demonstrates steady improvement in network performance.

v     TARF module proves low overhead.

 

Technology Used: Java

Thanks for installing the Bottom of every post plugin by Corey Salzano. Contact me if you need custom WordPress plugins or website design.

18 thoughts on “Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs – projects

  • September 10, 2012 at 9:19 am
    Permalink

    sir
    please send me the detail report of comparison between the Trust aware Routing framework and the previously existing system …
    It’s required me for the presentation as i selected this topic for my Final year project in Information technology branch..

    so sir/MAM please send me the my requirement

    Reply
  • September 20, 2012 at 6:35 am
    Permalink

    sir how can i get a project?

    Reply
  • January 8, 2013 at 5:53 am
    Permalink

    i am implemet the project in own pls any one guide me..

    Reply
  • January 28, 2013 at 8:43 am
    Permalink

    sir please give a new innovation about TRAF

    Reply
  • January 28, 2013 at 8:45 am
    Permalink

    sir give a new idea about traf

    Reply
  • February 1, 2013 at 2:11 am
    Permalink

    can u guide this project sir?

    Reply
  • February 13, 2013 at 9:28 am
    Permalink

    sir please tell about the attacks and their functions

    Reply
  • February 21, 2013 at 11:13 am
    Permalink

    sir plz give how the attacks are overcome and based upon which conditions the trusted network will be selected.please give me sir a will take it as my final year project

    Reply
  • March 6, 2013 at 10:09 am
    Permalink

    sir plz say wat kind of algorithm used.
    how the attacks are overcome and based upon which conditions the trusted network will be selected.please give me sir a will take it as my final year project

    Reply
  • March 6, 2013 at 1:23 pm
    Permalink

    i am implemet the project in own please any one guide me..

    Reply
  • March 11, 2013 at 5:01 pm
    Permalink

    Sir by using tarf how the tarf file safe and it was not in normalform then how can we get real file how it is encrypted please

    Reply
  • March 14, 2013 at 6:24 pm
    Permalink

    sir plz say wat kind of algorithm used.
    how the attacks are overcome and based upon which conditions the trusted network will be selected.please give me sir a will take it as my final year project

    Reply
  • March 14, 2013 at 6:25 pm
    Permalink

    sir plz say wat kind of algorithm used.
    how the attacks are overcome and based upon which conditions the trusted network will be selected.please give me sir a will take it as my final year project

    Reply
  • April 22, 2013 at 5:32 am
    Permalink

    What is the System maintenance for the Design and Implementation of TARF ?

    Reply
  • May 22, 2013 at 12:39 pm
    Permalink

    plz send me the implementation and design .. Algorithms,,, report

    Reply
  • May 26, 2013 at 7:47 am
    Permalink

    If anyone have detail knowledge abt dis project plz share it

    Reply
  • June 27, 2013 at 11:15 am
    Permalink

    what is the algorithm used in the existing system..
    how the energy is calculated.
    how is trust-value is calculated

    Reply
  • March 4, 2014 at 3:03 pm
    Permalink

    pls explain me about dis project

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *