Sunteți pe pagina 1din 4

ENERGY EFFICIENT COMMUNICATION

PROTOCOL IN WSN USING INTERNET OF


THINGS
R.Karthick1,C.Manikandan2
1
PG student,Dept of ECE, Arunai Engineering College, Tiruvanamalai.
2
Assistant professor,
Dept of ECE, Arunai Engineering College, Tiruvanamalai.
1
karthickece80@gmail.com,2manikandan.aec@gmail.com

Abstract--- The exponential growth of connected autonomous powered which are shielded with a limited energy resource
embedded devices will pose huge challenges with regard to [2] and is one of the exigent demands when it comes to
devices and inter device communication security. Features like network design consideration. Prolonging the lifetime of
encrypted communication, device authentication and device sensor networks is quite challenging which requires careful
authorisation must be appropriately addressed in order to
selection of sensor nodes to perform a given task. Recently
provide a reliable and penetration-resistant device network.
In recent years, applications of WSN have been increased due there has been an extensive on going research in the field
to its vast potential to connect the physical world to the virtual of reliable routing protocols to provide secure routing and
world. It becomes a trend to deploy the large number of increase the network lifetime. The reliable routing, network
portable wireless sensors in wireless sensor networks to latency, secure data aggregation and network scalability are
increase the QOS. AODV is an effective method for clustering the important issues in wireless sensor networks.
in a homogeneous WSN .Removing the malicious node
increases the energy efficiency and security in wireless sensor II. RELATED WORKS
network.
Internet of Things (IOT) devices is rapidly becoming
KeywordsWSN (Wireless Sensor Network), QOS (Quality Of
Service), AODV (Ad hoc On- demand Distance Vector),IOT
important while IOT services are becoming pervasive. A
(Internet Of Things). thread is an action that takes advantage of security
weaknesses in a system and has a negative impact on it. In
I. INTRODUCTION this paper security challenges and security threats to IOT
were introduced[1]. Public key infrastructures (PKI) and
Internet of things (IOT) is the inter-connecting of digital certificates are important of todays secure Internet
physical devices, vehicles, buildings and other items with infrastructure. In this analyses the benefits, limitations and
electronics, software, sensors, actuators and network suitability of both concepts for IOT combination with
connectivity that enables to collect and exchange the data. secure communication protocols [2]. The Internet of Things
In this wireless sensor network they are achieving (IOT) aspect of smart home from a security identity, and
significance important in the information and adapt an advanced malware technique for the IOT. We
communication technologies with the development of design several attacks including cyber physical system
internet of things. However security is considered as attacks and advanced cyber-attacks, and then evaluate their
important challenge in internet of things. In the wireless impact in practical evaluations [3].WSNs are achieving
sensor network (WSN) there will be presence of more significance importance in the information and
number of cluster. Cluster which is used for sharing the communication technologies with the development of
information between the different nodes. There will be the Internet-of-Things (IOT). WSNs are connected with the
presence of cluster header in each WSN. From that it also Internet in many industrial applications. Optimized location
has the malicious node which is act as false node. Wireless of cluster heads (CHs) for energy efficiency in a different
Sensor Networks are known for their fault tolerance and WSN (that consists of few energy harvesting sensors and
good sensing coverage. Recently, Wireless Sensor mostly non-renewable sensors) is used [4]. In order to
Networks are tremendously being used in various increase the network delay and rectify the security induced
applications [1] like monitoring, detection, process control, by the malicious nodes in Wireless Sensor Networks, the
data gathering and many more. In spite of all these leads, residual energy and reliability values are used to form a
WSNs are highly susceptible to security ultimatum, energy secured clustering. The simulated experimental results in
constraints and impingement by malicious nodes. The NS2 platform show that the proposed method can reduce
camouflaged malicious nodes in the sensor networks can the effect of malicious nodes and improve the network
seriously distort the normal functioning of wireless sensor lifetime for the sensor network. Wireless Sensor Networks
networks. Once the malicious nodes launch the attack, the are known for their fault clearance and good sensing
incursions are hard to identify. Sensory nodes are battery coverage.
III. PROPOSED TECHNIQUE When the source node receives the RERR packet
then it restarts the route or stops sending data.
Increased automation and digitization creates new
security concerns. Finding the cluster header and malicious
node can increases the data transmission between the
sources and destination. Security challenges, such as
privacy and entity trust were identified. Proposed
approaches are based on reducing energy consumption and
improving the lifetime of the network.

A. Route discovery using AODV protocol:


The route in between the nodes is introduced by
the entries in routing table. It conformed that the
routing table is the current updated routing table,
as the nodes are not stable. The network topology
always changes because the nodes in mobile
Adhoc network always moves to different
position. According the routing table the data
packet is transmitted to the next destination or to
the intermediate node. In the process of route Fig. 1 Route discovery procedure in AODV
starting the route request (RREQ) and the route
response (RREP) packets are created. The source
node creates the RREQ packet which consists of a) Malicious node:
IP source address, sequence number, destination The message transferring attack is highly possible
IP address and broadcast. In this broadcast is in the WSN and it is highly dangerous. This attack
increased every time whenever source sends the can be occurred using the malicious nodes. Thus
request packet. In connection to the both route malicious node accepts the route request and route
request and route response is sent back by the reply but it drops the data packets. So these
destination node. The RREQ is transmitted to all malicious nodes have to be detected and prevented
the near nodes for particular time limit. In this in the network, as the main goal of these malicious
time limit the route reverse has to be created nodes is to stop the data transfer between the
between source and destination nodes. If the source and destination.
reverse route is not created within the particular
time or the RREQ loss in packets occur in the net- b) Step to find correct node:
work then again the source node sends the RREQ Rule 1: If a node transmits many data packets to
packet and is broadcasted in network. When the destinations, it is assumed as a good node.
route reverse has been introduced which means Rule 2: If a node receives more number of packets
the RREQ has reached the destination node then but do not sent same data packets, it is possible
the RREP packet follows the route reverse to that the current node is a malicious node.
reach to the source node. When it arrived to the Rule 3: When the rule2 is correct about a node, if
source node the forward route has been the current node has sent number RREP packets;
introduced. When the forward route has been therefore surely the current node is miss
introduced now both the nodes can exchange the behaviour.
data between each other. Rule 4: When the rule2 is correct about a node, if
the current node has not sent any RREP packets;
1. Maintaing route therefore the current node is a failed node.

After the establishment of route the data IV. SIMULATION SCENARIO


is exchanged between the source and destination.
But in this mobile network nodes are always The following performance parameters are used to
mobile. If the source node moves from the compare the performance of the routing protocols in the
original position then the route discovery is restart simulation:
as to find the new path using RREQ packet. Or in i. Throughput: It is the amount of data delivered
engage to it if the intermediate nodes or per unit time from one node to another through a
destination nodes move then RERR packet is communication link. Throughput is expressed as
created and propagated to the neighbour nodes in bytes or bits per sec (byte/sec or bit/sec).
the network until it reaches to the source node.
Throughput = (Number of packets Received
*Packet size * 8) /Simulation
Time.

ii. Packet Loss: Packet loss may occur at both the


network layer and the MAC layer. In this work,
packet loss occurs only in network layer.
Packet loss = Data Packet Sent Data
Packet Received.

iii. Packet delivery ratio (PDF): It is ratio between


number of packets received by destination and
number of packet start by application (CBR).
PDF = (Data Packet Received / Data Packet Fig.2 Packet loss.
Sent ) * 100.
From the above figure data packet drop when data
The basic goal of our malicious node is to drop the transmit between node. Because in the presence of
packet so that there do not have any communication malicious node data loss can occurred.
between source and destination. We added following things
to modify our code.

// if malicious node
If (malicious == true ) {
drop (p, DROP_RTR_ROUTE_LOOP);
// DROP_RTR_ROUTE_LOOP is added for no
reason.

TABLE-1
PARAMETER USED IN SIMULATION

PARAMETER VALUE Fig.3 Throughput for different malicious node.

Channel type Wireless channel

Number of nodes 6

Pause time 10 sec

Traffic time CBR

Node placement Random

Fig.4 Number of packets send and received.

V. RESULT ANALYSIS

The parameters used for contrast during


simulation are throughput, packets delivery
ratio and packets lost. Thus throughput is
the data delivered per unit time during data
transmission between nodes.

Fig.5 Packet Delivery Ratio.


VI. CONCLUSION REFERENCE
[1] L. Atzori, A. Iera, and G. Morabito, The internet of things: A survey,
The techniques proposed are used to remove and
Computer networks, vol. 54, no. 15, pp. 27872805, 2015.
finding the malicious nodes present in the particular [2] S. Andreev and Y. Koucheryavy, Internet of things, smart spaces, and
network. Due to the presence of these nodes the per- next generation networking, Springer, LNCS, vol. 7469, p. 464, 2015.
formance, throughput, packet delivery ratio is reduced and [3] H. B. Pandya and T. A. Champaneria, Internet of things: Survey and
case studies, in Electrical, Electronics, Signals, Communication and
the impact of the AODV protocol is dropped. These attacks
Optimization (EESCO), 2015 International Conference on, Jan 2015,pp.
make the node malicious so that the transmission of the 16.
packets from the source to destination never happens. Thus [4] Pavithra Bhat, K.Satyanarayan Reddy. Energy Efficient Detection of
AODV protocol helps to detect and prevent the malicious Malicious Nodes Using Secure Clustering With Load Balance and
Reliable Node Disjoint Multipath Routing in Wireless Sensor Networks.
nodes and also provides the good data transmission of the
[5] Sye Loong, K, Kumar, SS & Tschofenig, H 2014, Securing the
packets between the nodes. This increases the networks Internet of Things: A Standardization Perspective, IEEE Internet of
performance, network lifetime, routing and the throughput Things, vol.1, no. 3, pp. 265-75.
and the results are calculated using ns2. [6] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, Internet of
things: Vision, applications and research challenges, Ad Hoc Networks,
vol. 10, no. 7, pp. 14971516, Sep. 2012.
[7] Mohamed Abo mare and Geir M. Kien, Cyber Security and the
Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
(2015)

S-ar putea să vă placă și