Sunteți pe pagina 1din 14

Multipath Routing for Intrusion

Tolerance in Heterogeneous Wireless


Sensor Networks

Under Guidance

Presented by:

of:

M.Srikanth,

Ms.Ch.Suneetha,
Assistance Professor

Y12MC24054

Contents

Statement of the problem

Existing System

Drawbacks of Existing System

Functional & Nonfunctional Requirements

Use Case Diagram

Class Diagram

Sequence Diagram

Activity

Problem Statement
The key concept of our redundancy management is to
exploit the tradeoff between energy consumption vs.
the gain in reliability, timeliness, and security to
maximize the system useful lifetime.
They develop a novel probability model to analyze the
best redundancy level in terms of path redundancy
and source redundancy, as well as the best intrusion
detection settings in terms of the number of voters
and the intrusion invocation interval under which the
lifetime of a HWSN is maximized.

Existing System
In

Existing

System,

effective

redundancy

management of a clustered HWSN to prolong its lifetime


operation in the presence of unreliable and malicious
nodes.

We

address

the

tradeoff

between

energy

consumption vs. QoS gain in reliability, timeliness and


security with the goal to maximize the lifetime of a
clustered

HWSN

while

satisfying

application

QoS

requirements in the context of multipath routing. More


specifically,

we

analyze

the

optimal

amount

of

redundancy through which data are routed to a remote


sink in the presence of unreliable and malicious nodes, so
that the query success probability is maximized while
maximizing the HWSN lifetime.

Drawbacks of Existing System


Security
Timeliness
Reliability
Energy Consumption
Life time of Sensors

Functional Requirements
Descriptions of data to into the source system .
Descriptions of operations performed by each
screen.
Descriptions of work-flows performed by the
system .
Descriptions of system reports or other outputs .

Non Functional Requirements


Accessibility
Security
Quality
Efficiency
Hardware Requirements

Use Case Diagram


IP Adress

Source

Socket Connection

Destinati on

Send Msg

Transmission
Static Approch
Receive Msg

Energy Consumpti on

Security & Reli ability

HWSNs

Full Deli very

Graph

Dynamic Approch

Class Diagram
Souce
IPAddress
PortNumber
Message
Filebytes
Length
ACK

Destination
Repatch
Restatus
Filebytes
Length
ACK
SocketCon()
Receive()
Graph()

SocketCon()
Send()

Router
FileName
IPAdderss
Filebytes
Length
Router
RNDNO
ACK
NodePosition
ACK()
Send()
Graph()
HWSN()

Sequence Diagram
Souse

Static

Dynamic

Destination

Start Msg Trasfer


Socket Connection
Start Msg Transfer
Socket Connection

Routing
Socket Connection
Bytes Transferred

Enargy Consumption
Secure & Transfres
Bytes Receive

Static Approach
HWSN
Routing finish

Full Delivery
Routing Succes
Msg Transferred Success
Acknowledgement
Msg
Received

Activity Diagram for Source


Source

IP Adderss

Browse file

Coneccting

No

Socket
Connection

Yes
Msg Transfered

Activity Diagram for Destination


Source

IP Adderss

Coneccting
No
Socket
Connection
Yes
Msg Receive

Fuii Delivery

Activity Diagram for Router


Source

IP Adderss

Client Socket
Connection
Intrusion
Detection
Yes
No

Secure &
Reliability

HWSN

Enargy
Consumption

Graph

u
o
Y
k
n
a
h
T

S-ar putea să vă placă și