SlideShare a Scribd company logo
1 of 5
Download to read offline
B. Srinivasulu et al. Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 4), September 2014, pp.109-113 
www.ijera.com 109 | P a g e 
Hack Recognition In Wireless Sensor Network B. Srinivasulu1, K. J. Pavithran Kumar2, S. Ramachandra3, Md. Roshini4 1,2,3,4 Department of Computer Science and Engineering, Mother Teresa Institute of Engineering and Technology, Chittoor, AP, India. Abstract: A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a ―cut‖. In this article we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows like every node to detect when the connectivity to a specially designated node has been lost, and one or more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious ―electrical potential‖ of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network. Key Terms: Wireless networks, sensor networks, network separation, detection and estimation, iterative computation. 
I. INTRODUCTION 
Wireless sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial and temporal resolution. In fact, node failure is expected to be quite common due to the typically limited energy budget of the nodes that are powered by small batteries. Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes – that have not failed – to become disconnected from the rest, resulting in a ―cut‖. Two nodes are said to be disconnected if there is no path between them. We consider the problem of detecting cuts by the nodes of a wireless network. We assume that there is a specially designated node in the network, which we call the source node. The source node may be a base station that serves as an interface between the network and its users. Since a cut may or may not separate a node from the source node, we distinguish between two distinct outcomes of a cut for a particular node. When a node u is disconnected from the source, we say that a DOS (Disconnected from Source) event has occurred for u. When a cut occurs in the network that does not separate a node u from the source node, we say that CCOS (Connected, but a Cut Occurred Somewhere) event has occurred for u. By cut detection we mean: Detection by each node of a DOS event when it occurs, and Detection of CCOS events by the nodes close to a cut, and the approximate location of the cut. By ―approximate location‖ of a cut we mean the location of one or more active nodes that lie at the boundary of the cut and that are connected to the source. Nodes that detect the occurrence and approximate locations of the cuts can then alert the source node or the base station. To see the benefits of a cut detection capability, imagine that a sensor that wants to send data to the source node has been disconnected from the source node. Without the knowledge of the network‘s disconnected state, it may simply forward the data to the next node in the routing tree, which will do the same to its next node, and so on. However, this message passing merely wastes precious energy of the nodes; the cut prevents the data from reaching the destination. Therefore, on one hand, if a node were able to detect the occurrence of a cut, it could simply wait for the network to be repaired and eventually reconnected, which saves onboard energy of multiple nodes and prolongs their lives. On the other hand, the ability of the source node to detect the occurrence and location of a cut will allow it to undertake network repair. Thus, the ability to detect cuts by both the disconnected nodes and the source node will lead to the increase in the operational lifetime of the network as a whole. A method of repairing a disconnected network by using mobile nodes has been proposed. Algorithms for detecting cuts, as the one proposed here, can serve as useful tools for such network repairing methods. A review of prior work on cut detection in sensor networks and others, is included in the Supplementary Material .In this article we propose a distributed algorithm to detect cuts, named the Distributed Cut Detection (DCD) algorithm. The algorithm allows each node to detect DOS events and a subset of nodes to detect CCOS events. The algorithm we propose is distributed and asynchronous: it involves only local communication 
RESEARCH ARTICLE OPEN ACCESS
B. Srinivasulu et al. Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 4), September 2014, pp.109-113 
www.ijera.com 110 | P a g e 
between neighboring nodes, and is robust to temporary communication failure between node pairs. A key component of the DCD algorithm is a distributed iterative computational step through which the nodes compute their (fictitious) electrical potentials. The convergence rate of the computation is independent of the size and structure of the network. The DOS detection part of the algorithm is applicable to arbitrary networks; a node only needs to communicate a scalar variable to its eighbors. The CCOS detection part of the algorithm is limited to networks that are deployed in 2D Euclidean spaces, and nodes need to know their own positions. The position information need not be highly accurate. The proposed algorithm is an extension of our previous work, which partially examined the DOS detection problem. II. SYSTEM ANALYSIS 2.1 EXISTING SYSTEM Wireless Multimedia Sensor Networks (WMSNs) has many challenges such as nature of wireless media and multimedia information transmission. Consequently traditional mechanisms for network layers are no longer acceptable or applicable for these networks. Wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a ―cut‖. Existing cut detection system deployed only for wired networks. Disadvantages 1. Unsuitable for dynamic network reconfiguration. 2. Single path routing approach. 
2.2 PROPOSED SYSTEM 
Wireless sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial and temporal resolution .Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes – that have not failed – to become disconnected from the rest, resulting in a ―cut‖. Two nodes are said to be disconnected if there is no path between them. We consider the problem of detecting cuts by the nodes of a wireless network. We assume that there is a specially designated node in the network, which we call the source node .Since a cut may or may not separate a node from the source node, we distinguish between two distinct outcomes of a cut for a particular node. When a node u is disconnected from the source, we say that a DOS (Disconnected frOm Source) event has occurred for u. When a cut occurs in the network that does not separate a node u from the source node, we say that CCOS (Connected, but a Cut Occurred Somewhere) event has occurred for u. By cut detection we mean detection by each node of a DOS event when it occurs, and detection of CCOS events by the nodes close to a cut, and the approximate location of the cut. In this article we propose a distributed algorithm to detect cuts, named the Distributed Cut Detection (DCD) algorithm. The algorithm allows each node to detect DOS events and a subset of nodes to detect CCOS events. The algorithm we propose is distributed and asynchronous: it involves only local communication between neighboring nodes, and is robust to temporary communication failure between node pairs The convergence rate of the computation is independent of the size and structure of the network. 2.3 SYSTEM STUDY The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is to ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the major requirements for the system is essential. Three key considerations involved in the feasibility analysis are 
 ECONOMICAL FEASIBILITY 
 TECHNICAL FEASIBILITY 
 SOCIAL FEASIBILITY 
2.3.1 ECONOMICAL FEASIBILITY This study is carried out to check the economic impact that the system will have on the organization. The amount of fund that the company can pour into the research and development of the system is limited. The expenditures must be justified. Thus the developed system as well within the budget and this was achieved because most of the technologies used are freely available. Only the customized products had to be purchased. 
2.3.2 TECHNICAL FEASIBILITY 
This study is carried out to check the technical feasibility, that is, the technical requirements of the system. Any system developed must not have a high demand on the available technical resources. This will lead to high demands on the available technical resources. This will lead to high demands being placed on the client. The developed system must have a modest requirement, as only minimal or null changes are required for implementing this system. 2.3.3 SOCIAL FEASIBILITY 
The aspect of study is to check the level of acceptance of the system by the user. This includes the process of training the user to use the system efficiently. The user must not feel threatened by the system, instead must accept it as a necessity. The
B. Srinivasulu et al. Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 4), September 2014, pp.109-113 
www.ijera.com 111 | P a g e 
level of acceptance by the users solely depends on the 
methods that are employed to educate the user about 
the system and to make him familiar with it. His level 
of confidence must be raised so that he is also able to 
make some constructive criticism, which is 
welcomed, as he is the final user of the system. 
III. IMPLEMENTATION 
Implementation is the stage of the project when 
the theoretical design is turned out into a working 
system. Thus it can be considered to be the most 
critical stage in achieving a successful new system 
and in giving the user, confidence that the new 
system will work and be effective. The 
implementation stage involves careful planning, 
investigation of the existing system and it‘s 
constraints on implementation, designing of methods 
to achieve changeover and evaluation of changeover 
methods. 
Class Diagram: 
SOURCE NODE 
StringBuffer :sb 
srvint: in 
static sourcenodewin: nw 
sourcenode() 
sendfile(String,String,String,StringBuffer) 
NODE A 
StringBuffer :sb 
srvint: in 
static nodeAwin: nw 
nodeA() 
sendfile(String,String,String,StringBuffer) 
NODE B 
StringBuffer :sb 
srvint: in 
static nodeBwin: nw 
nodeB() 
sendfile(String,String,String,StringBuffer) 
NODE C 
StringBuffer :sb 
srvint: in 
static nodeCwin: nw 
nodeC() 
sendfile(String,String,String,StringBuffer) 
NODE F 
StringBuffer :sb 
srvint: in 
static nodeFwin: nw 
nodeF() 
sendfile(String,String,String,StringBuffer) 
NODE E 
StringBuffer :sb 
srvint: in 
static nodeEwin: nw 
nodeE() 
sendfile(String,String,String,StringBuffer) 
NODE D 
StringBuffer :sb 
srvint: in 
static nodeDwin: nw 
nodeD() 
sendfile(String,String,String,StringBuffer) 
Module Description 
Distributed Cut Detection 
The algorithm allows each node to detect DOS 
events and a subset of nodes to detect CCOS events. 
The algorithm we propose is distributed and 
asynchronous: it involves only local communication 
between neighboring nodes, and is robust to 
temporary communication failure between node 
pairs. A key component of the DCD algorithm is a 
distributed iterative computational step through 
which the nodes compute their (fictitious) electrical 
potentials. The convergence rate of the computation 
is independent of the size and structure of the 
network. 
Cut 
Wireless sensor networks (WSNs) are a promising 
technology for monitoring large regions at high 
spatial and temporal resolution. In fact, node failure 
is expected to be quite common due to the typically 
limited energy budget of the nodes that are powered 
by small batteries. Failure of a set of nodes will 
reduce the number of multi-hop paths in the network. 
Such failures can cause a subset of nodes – that have 
not failed – to become disconnected from the rest, 
resulting in a ―cut‖. Two nodes are said to be 
disconnected if there is no path between them. 
Source Node 
We consider the problem of detecting cuts by the 
nodes of a wireless network. We assume that there is 
a specially designated node in the network, which we 
call the source node. The source node may be a base 
station that serves as an interface between the 
network and its users.Since a cut may or may not 
separate a node from the source node, we distinguish 
between two distinct outcomes of a cut for a 
particular node. 
Ccos and Dos 
When a node u is disconnected from the source, we 
say that a DOS (Disconnected frOm Source) event 
has occurred for u. When a cut occurs in the network 
that does not separate a node u from the source node, 
we say that CCOS (Connected, but a Cut Occurred 
Somewhere) event has occurred for u. By cut 
detection we mean 
(i) Detection by each node of a DOS event 
when it occurs, and 
(ii) Detection of CCOS events by the nodes 
close to a cut, and the approximate location 
of the cut. 
Network Separation 
Failure of a set of nodes will reduce the number of 
multi-hop paths in the network. Such failures can 
cause a subset of nodes – that have not failed – to 
become disconnected from the rest, resulting in a 
―cut‖. Because of cut, some nodes may separate from 
the network, that results the separated nodes can‘t 
receive the data from the source node. 
CCOS Detection Performance 
Recall that the CCOS detection part of the algorithm 
is not applicable to 3D networks, so it was only tested 
on networks, the path of the probes and their 
originating nodes in the network. Two probes were 
triggered by nodes close to the cut on the upper right 
corner; both of them were absorbed when the length 
of their path traversed exceeded ‗max hops, which 
led to correctly detecting CCOS events. Among three 
probes that were triggered by nodes near small holes 
in this network, one of them—near the hole in the 
upper left corner—failed to find a path back to its
B. Srinivasulu et al. Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 4), September 2014, pp.109-113 
www.ijera.com 112 | P a g e 
originating node, leading to an erroneous declaration of an CCOS event by the absorbing node. The probability of a CCOS1/0 error in this case is therefore 0.33. It summarizes the performance of the CCOS detection part of algorithm. The CCOS detection error probabilities are 0 except in case of the network. Simulation studies reported in the Supplementary Material, which can be found on the Computer Society Digital Library at that imprecise position information has little effect on the performance of the CCOS detection part of the algorithm. IV SCREEN SHOTS 
V CONCLUSION 
The DCD algorithm we propose here enables every node of a wireless sensor network to detect DOS (Disconnected frOm Source) events if they occur. Second, it enables a subset of nodes that experience CCOS (Connected, but Cut Occurred Somewhere) events to detect them and estimate the approximate location of the cut in the form of a list of active nodes that lie at the boundary of the cut/hole.
B. Srinivasulu et al. Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 4), September 2014, pp.109-113 
www.ijera.com 113 | P a g e 
The DOS and CCOS events are defined with respect 
to a specially designated source node. The algorithm 
is based on ideas from electrical network theory and 
parallel iterative solution of linear equations. 
Numerical simulations, as well as experimental 
evaluation on a real WSN system consisting of micaZ 
motes, show that the algorithm works effectively 
with a large classes of graphs of varying size and 
structure, without requiring changes in the 
parameters. For certain scenarios, the algorithm is 
assured to detect connection and disconnection to the 
source node without error. A key strength of the 
DCD algorithm is that the convergence rate of the 
underlying iterative scheme is quite fast and 
independent of the size and structure of the network, 
which makes detection using this algorithm quite 
fast. Application of the DCD algorithm to detect node 
separation and reconnection to the source in mobile 
networks is a topic of ongoing research. 
REFERNCES 
[1] G. Dini, M. Pelagatti, and I. M. Savino, ―An 
algorithm for reconnecting wireless sensor 
network partitions,‖ in European Conference 
on Wireless Sensor Networks, 2008, pp. 253– 
267. 
[2] N. Shrivastava, S. Suri, and C. D. T´oth, 
―Detecting cuts in sensor networks,‖ ACM 
Trans. Sen. Netw., vol. 4, no. 2, pp. 1–25, 
2008. 
[3] H. Ritter, R. Winter, and J. Schiller, ―A 
partition detection system for mobile ad-hoc 
networks,‖ in First Annual IEEE 
Communications Society Conference on 
Sensor and Ad Hoc Communications and 
Networks (IEEE SECON 2004), Oct. 2004, 
pp. 489–497. 
[4] M. Hauspie, J. Carle, and D. Simplot, 
―Partition detection in mobile ad-hoc 
networks,‖ in 2nd Mediterranean Workshop on 
Ad-Hoc Networks, 2003, pp. 25–27. 
[5] P. Barooah, ―Distributed cut detection in 
sensor networks,‖ in 47th IEEE Conference on 
Decision and Control, December 2008, pp. 
1097– 1102. 
[6] A. D. Wood, J. A. Stankovic, and S. H. Son, 
―Jam: A jammed-area mapping service for 
sensor networks,‖ in IEEE Real Time System 
Symposium, 2003. 
[7] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. 
Culler, and K. Pister, ―System architecture 
directions for networked sensors,‖ in 
Proceedings of international conference on 
Architectural support for Programming 
languages and operating systems (ASPLOS), 
2000. 
Author’s Profile 
Mr. B.Srinivasulu, Post Graduated 
in Computer Science Engineering 
(M.Tech) From JNTU, Hyderabad in 
2010 and Graduated in Computer 
Science Engineering (B.Tech) from 
JNTUH, in 2008. He is working as 
Assistant Professor in Department of Computer Science 
& Engineering in Mother Theresa Institute of 
Engineering & Technology, Palamaner, Chittoor Dt., 
AP, India. He has 5+ years of Teaching Experience. His 
research interests include Network Security, Cloud 
Computing & Data Warehousing and Data Mining. 
Mr. K.J. Pavithran Kumar, Post 
Graduated in Computer Science & 
Engineering (M.Tech), SRI 
VENKATESWARA UNIVERSITY 
COLLEGE OF ENGINEERING, 2013 
and Graduated in Computer Science & 
Engineering (B.Tech), Sri Krishna Devaraya University, 
2007. He is working presently as an Assistant Professor 
in the Department of Computer Science & Engineering 
in Mother Theresa Institute of Engineering 
&Technology, Palamaner, Chittoor Dt., A.P, INDIA. 
He has 5 years Experience. He has interest in Cloud 
Computing, Data Mining, Image Processing, Parallel 
and Distributed computing and Computer Networks. 
Mr. S.Ramachandra Post Graduated 
in Computer Science & Engineering 
(M.Tech), Madanapalle Institute Of 
Technology And Sciences, 2012 and 
Graduated in Computer Science & 
Engineering (B.Tech), Madanapalle 
Institute Of Technology And Sceinces, 
2009. He is working presently as an Assistant Professor 
in the Department of Computer Science & Engineering 
in Mother Theresa Institute of Engineering 
&Technology, Palamaner, Chittoor Dt., A.P, INDIA. 
He has 5 years Experience. He has interest in Cloud 
Computing, Data Mining, Image Processing, Parallel 
and Distributed computing and Computer Networks. 
Mrs. M. ROSHINI Post Graduated in 
Computer Science & Engineering 
(M.Tech), Madina Engineering 
College, KADAPA, 2011. She is 
working presently as an Assistant 
Professor in the Department of 
Computer Science & Engineering in 
Mother Theresa Institute of Engineering 
&Technology, Palamaner, Chittoor Dt., A.P, INDIA. 
She has 3+ years Experience. Her interest in Cloud 
Computing, Data Mining, Image Processing, Parallel 
and Distributed computing and Computer Networks.

More Related Content

What's hot

A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
 
Energy efficient intrusion detection system
Energy efficient intrusion detection systemEnergy efficient intrusion detection system
Energy efficient intrusion detection systemiaemedu
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...ijasuc
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...Munisekhar Gunapati
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
 
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...IJCNC
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...paperpublications3
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network dilip pareek
 

What's hot (20)

A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
O026084087
O026084087O026084087
O026084087
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
 
Energy efficient intrusion detection system
Energy efficient intrusion detection systemEnergy efficient intrusion detection system
Energy efficient intrusion detection system
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...PREDICTING COMMUNICATION DELAY AND  ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGB...
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
 
D0606032413 Paper
D0606032413 PaperD0606032413 Paper
D0606032413 Paper
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
 

Viewers also liked

The Heart Of Anatolia (Düzce)
The Heart Of Anatolia (Düzce)The Heart Of Anatolia (Düzce)
The Heart Of Anatolia (Düzce)İbrahim DAL
 
Jcl distribuidores sac
Jcl distribuidores sacJcl distribuidores sac
Jcl distribuidores sacJUAN CARLOS
 
Manual de hack
Manual de hackManual de hack
Manual de hackPanchito
 
PORTAFOLIO DE DISEÑO 6 B
PORTAFOLIO DE DISEÑO 6 BPORTAFOLIO DE DISEÑO 6 B
PORTAFOLIO DE DISEÑO 6 BEfre Velez
 
Trabajo del equipo 4 cva
Trabajo del equipo 4 cvaTrabajo del equipo 4 cva
Trabajo del equipo 4 cvaSEP
 
Transparenzfalle Internet - Wie sich Händler unverwechselbarer machen
Transparenzfalle Internet - Wie sich Händler unverwechselbarer machenTransparenzfalle Internet - Wie sich Händler unverwechselbarer machen
Transparenzfalle Internet - Wie sich Händler unverwechselbarer machenJochen Krisch
 
WaveBoat - Give Space to Your Emotions
WaveBoat - Give Space to Your EmotionsWaveBoat - Give Space to Your Emotions
WaveBoat - Give Space to Your Emotionslikwidlife
 
Geometria plana espacial
Geometria plana espacialGeometria plana espacial
Geometria plana espacialLeni Brito
 
The Heart Of Anatolia (Giresun 2)
The Heart Of Anatolia (Giresun 2)The Heart Of Anatolia (Giresun 2)
The Heart Of Anatolia (Giresun 2)İbrahim DAL
 

Viewers also liked (20)

The Heart Of Anatolia (Düzce)
The Heart Of Anatolia (Düzce)The Heart Of Anatolia (Düzce)
The Heart Of Anatolia (Düzce)
 
Jcl distribuidores sac
Jcl distribuidores sacJcl distribuidores sac
Jcl distribuidores sac
 
Uharte Arakil
Uharte ArakilUharte Arakil
Uharte Arakil
 
Manual de hack
Manual de hackManual de hack
Manual de hack
 
PORTAFOLIO DE DISEÑO 6 B
PORTAFOLIO DE DISEÑO 6 BPORTAFOLIO DE DISEÑO 6 B
PORTAFOLIO DE DISEÑO 6 B
 
Trabajo del equipo 4 cva
Trabajo del equipo 4 cvaTrabajo del equipo 4 cva
Trabajo del equipo 4 cva
 
Aula extra 03
Aula extra 03Aula extra 03
Aula extra 03
 
Angels
AngelsAngels
Angels
 
Transparenzfalle Internet - Wie sich Händler unverwechselbarer machen
Transparenzfalle Internet - Wie sich Händler unverwechselbarer machenTransparenzfalle Internet - Wie sich Händler unverwechselbarer machen
Transparenzfalle Internet - Wie sich Händler unverwechselbarer machen
 
1
11
1
 
1
11
1
 
1º telf
1º telf1º telf
1º telf
 
Valores humanos
Valores humanosValores humanos
Valores humanos
 
2 disjuntores moldada
2 disjuntores moldada2 disjuntores moldada
2 disjuntores moldada
 
WaveBoat - Give Space to Your Emotions
WaveBoat - Give Space to Your EmotionsWaveBoat - Give Space to Your Emotions
WaveBoat - Give Space to Your Emotions
 
Geometria plana espacial
Geometria plana espacialGeometria plana espacial
Geometria plana espacial
 
Ouksé n°1
Ouksé n°1Ouksé n°1
Ouksé n°1
 
Human Camouflage
Human CamouflageHuman Camouflage
Human Camouflage
 
The Heart Of Anatolia (Giresun 2)
The Heart Of Anatolia (Giresun 2)The Heart Of Anatolia (Giresun 2)
The Heart Of Anatolia (Giresun 2)
 
Masaa Egypt logo
Masaa Egypt logoMasaa Egypt logo
Masaa Egypt logo
 

Similar to Hack Recognition In Wireless Sensor Network

Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksEditor IJCATR
 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolIOSR Journals
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...eSAT Publishing House
 
18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septianIAESIJEECS
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Data Analysis In The Cloud
Data Analysis In The CloudData Analysis In The Cloud
Data Analysis In The CloudMonica Carter
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...IJTET Journal
 

Similar to Hack Recognition In Wireless Sensor Network (20)

Cut detection
Cut detectionCut detection
Cut detection
 
Cut detection
Cut detectionCut detection
Cut detection
 
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing Protocol
 
B010130508
B010130508B010130508
B010130508
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
 
18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian18 9254 eeem diminishing connectivity edit septian
18 9254 eeem diminishing connectivity edit septian
 
F04503057062
F04503057062F04503057062
F04503057062
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
F0361026033
F0361026033F0361026033
F0361026033
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Pulkit 10103644
Pulkit 10103644Pulkit 10103644
Pulkit 10103644
 
Energy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networks
 
C1804011117
C1804011117C1804011117
C1804011117
 
Data Analysis In The Cloud
Data Analysis In The CloudData Analysis In The Cloud
Data Analysis In The Cloud
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Hack Recognition In Wireless Sensor Network

  • 1. B. Srinivasulu et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 4), September 2014, pp.109-113 www.ijera.com 109 | P a g e Hack Recognition In Wireless Sensor Network B. Srinivasulu1, K. J. Pavithran Kumar2, S. Ramachandra3, Md. Roshini4 1,2,3,4 Department of Computer Science and Engineering, Mother Teresa Institute of Engineering and Technology, Chittoor, AP, India. Abstract: A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a ―cut‖. In this article we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. We propose an algorithm that allows like every node to detect when the connectivity to a specially designated node has been lost, and one or more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is based on the iterative computation of a fictitious ―electrical potential‖ of the nodes. The convergence rate of the underlying iterative scheme is independent of the size and structure of the network. Key Terms: Wireless networks, sensor networks, network separation, detection and estimation, iterative computation. I. INTRODUCTION Wireless sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial and temporal resolution. In fact, node failure is expected to be quite common due to the typically limited energy budget of the nodes that are powered by small batteries. Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes – that have not failed – to become disconnected from the rest, resulting in a ―cut‖. Two nodes are said to be disconnected if there is no path between them. We consider the problem of detecting cuts by the nodes of a wireless network. We assume that there is a specially designated node in the network, which we call the source node. The source node may be a base station that serves as an interface between the network and its users. Since a cut may or may not separate a node from the source node, we distinguish between two distinct outcomes of a cut for a particular node. When a node u is disconnected from the source, we say that a DOS (Disconnected from Source) event has occurred for u. When a cut occurs in the network that does not separate a node u from the source node, we say that CCOS (Connected, but a Cut Occurred Somewhere) event has occurred for u. By cut detection we mean: Detection by each node of a DOS event when it occurs, and Detection of CCOS events by the nodes close to a cut, and the approximate location of the cut. By ―approximate location‖ of a cut we mean the location of one or more active nodes that lie at the boundary of the cut and that are connected to the source. Nodes that detect the occurrence and approximate locations of the cuts can then alert the source node or the base station. To see the benefits of a cut detection capability, imagine that a sensor that wants to send data to the source node has been disconnected from the source node. Without the knowledge of the network‘s disconnected state, it may simply forward the data to the next node in the routing tree, which will do the same to its next node, and so on. However, this message passing merely wastes precious energy of the nodes; the cut prevents the data from reaching the destination. Therefore, on one hand, if a node were able to detect the occurrence of a cut, it could simply wait for the network to be repaired and eventually reconnected, which saves onboard energy of multiple nodes and prolongs their lives. On the other hand, the ability of the source node to detect the occurrence and location of a cut will allow it to undertake network repair. Thus, the ability to detect cuts by both the disconnected nodes and the source node will lead to the increase in the operational lifetime of the network as a whole. A method of repairing a disconnected network by using mobile nodes has been proposed. Algorithms for detecting cuts, as the one proposed here, can serve as useful tools for such network repairing methods. A review of prior work on cut detection in sensor networks and others, is included in the Supplementary Material .In this article we propose a distributed algorithm to detect cuts, named the Distributed Cut Detection (DCD) algorithm. The algorithm allows each node to detect DOS events and a subset of nodes to detect CCOS events. The algorithm we propose is distributed and asynchronous: it involves only local communication RESEARCH ARTICLE OPEN ACCESS
  • 2. B. Srinivasulu et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 4), September 2014, pp.109-113 www.ijera.com 110 | P a g e between neighboring nodes, and is robust to temporary communication failure between node pairs. A key component of the DCD algorithm is a distributed iterative computational step through which the nodes compute their (fictitious) electrical potentials. The convergence rate of the computation is independent of the size and structure of the network. The DOS detection part of the algorithm is applicable to arbitrary networks; a node only needs to communicate a scalar variable to its eighbors. The CCOS detection part of the algorithm is limited to networks that are deployed in 2D Euclidean spaces, and nodes need to know their own positions. The position information need not be highly accurate. The proposed algorithm is an extension of our previous work, which partially examined the DOS detection problem. II. SYSTEM ANALYSIS 2.1 EXISTING SYSTEM Wireless Multimedia Sensor Networks (WMSNs) has many challenges such as nature of wireless media and multimedia information transmission. Consequently traditional mechanisms for network layers are no longer acceptable or applicable for these networks. Wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a ―cut‖. Existing cut detection system deployed only for wired networks. Disadvantages 1. Unsuitable for dynamic network reconfiguration. 2. Single path routing approach. 2.2 PROPOSED SYSTEM Wireless sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial and temporal resolution .Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes – that have not failed – to become disconnected from the rest, resulting in a ―cut‖. Two nodes are said to be disconnected if there is no path between them. We consider the problem of detecting cuts by the nodes of a wireless network. We assume that there is a specially designated node in the network, which we call the source node .Since a cut may or may not separate a node from the source node, we distinguish between two distinct outcomes of a cut for a particular node. When a node u is disconnected from the source, we say that a DOS (Disconnected frOm Source) event has occurred for u. When a cut occurs in the network that does not separate a node u from the source node, we say that CCOS (Connected, but a Cut Occurred Somewhere) event has occurred for u. By cut detection we mean detection by each node of a DOS event when it occurs, and detection of CCOS events by the nodes close to a cut, and the approximate location of the cut. In this article we propose a distributed algorithm to detect cuts, named the Distributed Cut Detection (DCD) algorithm. The algorithm allows each node to detect DOS events and a subset of nodes to detect CCOS events. The algorithm we propose is distributed and asynchronous: it involves only local communication between neighboring nodes, and is robust to temporary communication failure between node pairs The convergence rate of the computation is independent of the size and structure of the network. 2.3 SYSTEM STUDY The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is to ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the major requirements for the system is essential. Three key considerations involved in the feasibility analysis are  ECONOMICAL FEASIBILITY  TECHNICAL FEASIBILITY  SOCIAL FEASIBILITY 2.3.1 ECONOMICAL FEASIBILITY This study is carried out to check the economic impact that the system will have on the organization. The amount of fund that the company can pour into the research and development of the system is limited. The expenditures must be justified. Thus the developed system as well within the budget and this was achieved because most of the technologies used are freely available. Only the customized products had to be purchased. 2.3.2 TECHNICAL FEASIBILITY This study is carried out to check the technical feasibility, that is, the technical requirements of the system. Any system developed must not have a high demand on the available technical resources. This will lead to high demands on the available technical resources. This will lead to high demands being placed on the client. The developed system must have a modest requirement, as only minimal or null changes are required for implementing this system. 2.3.3 SOCIAL FEASIBILITY The aspect of study is to check the level of acceptance of the system by the user. This includes the process of training the user to use the system efficiently. The user must not feel threatened by the system, instead must accept it as a necessity. The
  • 3. B. Srinivasulu et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 4), September 2014, pp.109-113 www.ijera.com 111 | P a g e level of acceptance by the users solely depends on the methods that are employed to educate the user about the system and to make him familiar with it. His level of confidence must be raised so that he is also able to make some constructive criticism, which is welcomed, as he is the final user of the system. III. IMPLEMENTATION Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it‘s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Class Diagram: SOURCE NODE StringBuffer :sb srvint: in static sourcenodewin: nw sourcenode() sendfile(String,String,String,StringBuffer) NODE A StringBuffer :sb srvint: in static nodeAwin: nw nodeA() sendfile(String,String,String,StringBuffer) NODE B StringBuffer :sb srvint: in static nodeBwin: nw nodeB() sendfile(String,String,String,StringBuffer) NODE C StringBuffer :sb srvint: in static nodeCwin: nw nodeC() sendfile(String,String,String,StringBuffer) NODE F StringBuffer :sb srvint: in static nodeFwin: nw nodeF() sendfile(String,String,String,StringBuffer) NODE E StringBuffer :sb srvint: in static nodeEwin: nw nodeE() sendfile(String,String,String,StringBuffer) NODE D StringBuffer :sb srvint: in static nodeDwin: nw nodeD() sendfile(String,String,String,StringBuffer) Module Description Distributed Cut Detection The algorithm allows each node to detect DOS events and a subset of nodes to detect CCOS events. The algorithm we propose is distributed and asynchronous: it involves only local communication between neighboring nodes, and is robust to temporary communication failure between node pairs. A key component of the DCD algorithm is a distributed iterative computational step through which the nodes compute their (fictitious) electrical potentials. The convergence rate of the computation is independent of the size and structure of the network. Cut Wireless sensor networks (WSNs) are a promising technology for monitoring large regions at high spatial and temporal resolution. In fact, node failure is expected to be quite common due to the typically limited energy budget of the nodes that are powered by small batteries. Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes – that have not failed – to become disconnected from the rest, resulting in a ―cut‖. Two nodes are said to be disconnected if there is no path between them. Source Node We consider the problem of detecting cuts by the nodes of a wireless network. We assume that there is a specially designated node in the network, which we call the source node. The source node may be a base station that serves as an interface between the network and its users.Since a cut may or may not separate a node from the source node, we distinguish between two distinct outcomes of a cut for a particular node. Ccos and Dos When a node u is disconnected from the source, we say that a DOS (Disconnected frOm Source) event has occurred for u. When a cut occurs in the network that does not separate a node u from the source node, we say that CCOS (Connected, but a Cut Occurred Somewhere) event has occurred for u. By cut detection we mean (i) Detection by each node of a DOS event when it occurs, and (ii) Detection of CCOS events by the nodes close to a cut, and the approximate location of the cut. Network Separation Failure of a set of nodes will reduce the number of multi-hop paths in the network. Such failures can cause a subset of nodes – that have not failed – to become disconnected from the rest, resulting in a ―cut‖. Because of cut, some nodes may separate from the network, that results the separated nodes can‘t receive the data from the source node. CCOS Detection Performance Recall that the CCOS detection part of the algorithm is not applicable to 3D networks, so it was only tested on networks, the path of the probes and their originating nodes in the network. Two probes were triggered by nodes close to the cut on the upper right corner; both of them were absorbed when the length of their path traversed exceeded ‗max hops, which led to correctly detecting CCOS events. Among three probes that were triggered by nodes near small holes in this network, one of them—near the hole in the upper left corner—failed to find a path back to its
  • 4. B. Srinivasulu et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 4), September 2014, pp.109-113 www.ijera.com 112 | P a g e originating node, leading to an erroneous declaration of an CCOS event by the absorbing node. The probability of a CCOS1/0 error in this case is therefore 0.33. It summarizes the performance of the CCOS detection part of algorithm. The CCOS detection error probabilities are 0 except in case of the network. Simulation studies reported in the Supplementary Material, which can be found on the Computer Society Digital Library at that imprecise position information has little effect on the performance of the CCOS detection part of the algorithm. IV SCREEN SHOTS V CONCLUSION The DCD algorithm we propose here enables every node of a wireless sensor network to detect DOS (Disconnected frOm Source) events if they occur. Second, it enables a subset of nodes that experience CCOS (Connected, but Cut Occurred Somewhere) events to detect them and estimate the approximate location of the cut in the form of a list of active nodes that lie at the boundary of the cut/hole.
  • 5. B. Srinivasulu et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 4), September 2014, pp.109-113 www.ijera.com 113 | P a g e The DOS and CCOS events are defined with respect to a specially designated source node. The algorithm is based on ideas from electrical network theory and parallel iterative solution of linear equations. Numerical simulations, as well as experimental evaluation on a real WSN system consisting of micaZ motes, show that the algorithm works effectively with a large classes of graphs of varying size and structure, without requiring changes in the parameters. For certain scenarios, the algorithm is assured to detect connection and disconnection to the source node without error. A key strength of the DCD algorithm is that the convergence rate of the underlying iterative scheme is quite fast and independent of the size and structure of the network, which makes detection using this algorithm quite fast. Application of the DCD algorithm to detect node separation and reconnection to the source in mobile networks is a topic of ongoing research. REFERNCES [1] G. Dini, M. Pelagatti, and I. M. Savino, ―An algorithm for reconnecting wireless sensor network partitions,‖ in European Conference on Wireless Sensor Networks, 2008, pp. 253– 267. [2] N. Shrivastava, S. Suri, and C. D. T´oth, ―Detecting cuts in sensor networks,‖ ACM Trans. Sen. Netw., vol. 4, no. 2, pp. 1–25, 2008. [3] H. Ritter, R. Winter, and J. Schiller, ―A partition detection system for mobile ad-hoc networks,‖ in First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (IEEE SECON 2004), Oct. 2004, pp. 489–497. [4] M. Hauspie, J. Carle, and D. Simplot, ―Partition detection in mobile ad-hoc networks,‖ in 2nd Mediterranean Workshop on Ad-Hoc Networks, 2003, pp. 25–27. [5] P. Barooah, ―Distributed cut detection in sensor networks,‖ in 47th IEEE Conference on Decision and Control, December 2008, pp. 1097– 1102. [6] A. D. Wood, J. A. Stankovic, and S. H. Son, ―Jam: A jammed-area mapping service for sensor networks,‖ in IEEE Real Time System Symposium, 2003. [7] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, ―System architecture directions for networked sensors,‖ in Proceedings of international conference on Architectural support for Programming languages and operating systems (ASPLOS), 2000. Author’s Profile Mr. B.Srinivasulu, Post Graduated in Computer Science Engineering (M.Tech) From JNTU, Hyderabad in 2010 and Graduated in Computer Science Engineering (B.Tech) from JNTUH, in 2008. He is working as Assistant Professor in Department of Computer Science & Engineering in Mother Theresa Institute of Engineering & Technology, Palamaner, Chittoor Dt., AP, India. He has 5+ years of Teaching Experience. His research interests include Network Security, Cloud Computing & Data Warehousing and Data Mining. Mr. K.J. Pavithran Kumar, Post Graduated in Computer Science & Engineering (M.Tech), SRI VENKATESWARA UNIVERSITY COLLEGE OF ENGINEERING, 2013 and Graduated in Computer Science & Engineering (B.Tech), Sri Krishna Devaraya University, 2007. He is working presently as an Assistant Professor in the Department of Computer Science & Engineering in Mother Theresa Institute of Engineering &Technology, Palamaner, Chittoor Dt., A.P, INDIA. He has 5 years Experience. He has interest in Cloud Computing, Data Mining, Image Processing, Parallel and Distributed computing and Computer Networks. Mr. S.Ramachandra Post Graduated in Computer Science & Engineering (M.Tech), Madanapalle Institute Of Technology And Sciences, 2012 and Graduated in Computer Science & Engineering (B.Tech), Madanapalle Institute Of Technology And Sceinces, 2009. He is working presently as an Assistant Professor in the Department of Computer Science & Engineering in Mother Theresa Institute of Engineering &Technology, Palamaner, Chittoor Dt., A.P, INDIA. He has 5 years Experience. He has interest in Cloud Computing, Data Mining, Image Processing, Parallel and Distributed computing and Computer Networks. Mrs. M. ROSHINI Post Graduated in Computer Science & Engineering (M.Tech), Madina Engineering College, KADAPA, 2011. She is working presently as an Assistant Professor in the Department of Computer Science & Engineering in Mother Theresa Institute of Engineering &Technology, Palamaner, Chittoor Dt., A.P, INDIA. She has 3+ years Experience. Her interest in Cloud Computing, Data Mining, Image Processing, Parallel and Distributed computing and Computer Networks.