Detection, Characterization and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks
Detection, Characterization and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks
CHAPTER 1
INTRODUCTION
From the very first deployments of Wireless Sensor Networks (WSNs), motivated by military
applications, security has been a major concern. Nowadays, WSNs are popular for IoT applications, such as smart
cities, smart grids and healthcare but security threats could still pose costly and even life-threatening problems.
WSNs are by nature exposed to severe vulnerabilities, since they are often physically accessible, unattended, and
continuously evolving because of sensors joining and leaving the network. Moreover, the use of security
mechanisms such as complex cryptographic mechanisms is restricted because of computational constraints. Thus,
the cost of exploiting such vulnerabilities is less a deterrent for malicious activities. In particular, the
measurements’ integrity may be impaired: we refer to this attack as malicious data injections.
Even when common security mechanisms are in place, they cannot prevent some of the attacks. In
particular, an attacker can gain control over the WSN by physically tampering with sensor devices or
manipulating the environment itself. In several scenarios, these cannot be prevented with proactive security
mechanisms. For example, urban traffic sensors may be deliberately biased at the time they are implanted to
silence alarms for road accidents. In such cases, the only mean to counteract malicious data injections is detection
through analysis of the measurements themselves. This is possible because of inter-measurements correlation.
Wireless Sensor Networks carry a high risk of being compromised since their deployments are often unattended,
physically accessible and the wireless medium is difficult to secure.
Malicious data injections take place when the sensed measurements are maliciously altered to trigger
wrong and potentially dangerous responses. When many sensors are compromised, they can collude with each
other to alter the measurements making such changes difficult to detect. Distinguishing between genuine and
malicious measurements is even more difficult when significant variations may be introduced because of events,
especially if more events occur simultaneously. We propose a novel methodology based on wavelet transform to
detect malicious data injections, to characterise the responsible sensors, and to distinguish malicious interference
from faulty behaviours. The results, both with simulated and real measurements, show that our approach is able to
counteract sophisticated attacks, achieving a significant improvement over state-of-the-art approaches.
1
Detection, Characterization and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks
CHAPTER 2
SYSTEM ANALYSIS
2.1 EXISTING SYSTEM:
We present the problem of detecting, characterizing and diagnosing malicious data injections in WSNs,
propose a complete methodology to deal with each of these tasks and test its validity on two datasets. A synthetic
set of temperature measurements in a wildfire monitoring WSN and a real dataset of seismic measurements in an
earthquake monitoring WSN.
DISADVANTAGES:
Our novel approach uses a variation of Continuous Wavelet Transform (CWT) for non-evenly spaced
samples to isolate the events trends at specific locations and granularities that are respectively referred
to as translations and scales.
The wavelet transform has been previously applied in its discrete form (discrete wavelet transform) for
detecting faulty sensors during event detection. Because of temporal correlation, the wavelet coefficients
at the lowest scale fluctuate more in the presence of events.
2.2PROPOSED SYSTEM:
Most of these techniques have been proposed to detect generic anomalies rather than deliberate malicious
injections so they are not designed to cope with collusion which drastically decreases the chances of detection.
The measurements distribution is assumed homogeneous and this assumption does not hold especially when
particular events of interest occur, such as wildfires, earthquakes, pathological conditions, etc.
ADVANTAGES:
We propose a method for detection of malicious data injections in the presence of sophisticated collusion
strategies, based on a cross-scale analysis of the measurements wavelet transform in the spatial domain.
Yet we highlight that detecting anomalies in the measurements is not sufficient to effectively counteract
them. The alterations in the malicious measurements and the affected sensors need to be identified. We
refer to this task as characterization.
2
Detection, Characterization and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks
CHAPTER 3
SYSTEM REQUIREMENT SPECIFICATION
System Requirement Specification (SRS) is a central report, which frames the establishment of the
product advancement process. It records the necessities of aframe work as well as has a depiction of its
significant highlight. A SRS is essentially an association's seeing (in composing) of a client or potential
customer's frame work necessities and conditions at a specific point in time (generally) before any genuine
configuration or improvement work. It's a two-way protection approach that guarantees that both the
customer and the association comprehend alternate's necessities from that viewpoint at a given point in
time.
The composition of programming necessity detail lessens advancement exertion,as watchful audit
of the report can uncover oversights, mistaken assumptions, and irregularities ahead of schedule in the
improvement cycle when these issues are less demanding to right. The SRS talks about the item however
not the venture that created it consequently the SRS serves as a premise for later improvement of the
completed item.
The SRS may need to be changed, however it does give an establishment to proceed with creation
assessment. In straightforward words, programming necessity determination is the beginning stage of the
product improvement action. The SRS means deciphering the thoughts in thebrains of the customers – the
information, into a formal archive – the yield of the prerequisite stage. Subsequently the yield of the stage
is a situated of formally determined necessities, which ideally are finished and steady, while the data has
none of these properties.
3
Detection, Characterization and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks
Chapter 4
SYSTEM STUDY
Feasibility study:
A feasibility study aims to objectively and rationally uncover the strengths and weaknesses of
an existing business or proposed venture, opportunities and threats present in the environment,
the resources required to carry through, and ultimately the prospects for success. In its simplest terms, the
two criteria to judge feasibility are cost required and value to be attained.
A well-designed feasibility study should provide a historical background of the business or project,
a description of the product or service, accounting statements, details of
the operations and management, marketing research and policies, financial data, legal requirements and
tax obligations. Generally, feasibility studies precede technical development and project implementation.
A feasibility study evaluates the project's potential for success; therefore, perceived objectivity is an
important factor in the credibility of the study for potential investors and lending institutions. It must
therefore be conducted with an objective, unbiased approach to provide information upon which decisions
can be based.
Technical Feasibility:
A brief description of the business to assess more possible factors which could affect the study
The part of the business being examined
The human and economic factor
The possible solutions to the problem
At this level, the concern is whether the proposal is both technically andfeasible (assuming
moderate cost). The assessment is focused on gaining an understanding of the present technical resources
of the organization and their applicability to the expected needs of the proposed system. It is an evaluation
of the hardware and software and how it meets the need of the proposed system.
4
Detection, Characterization and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks
ECONOMICAL FEASIBILITY
The purpose of the economic feasibility assessment is to determine the positive economic benefits
to the organization that the proposed system will provide. It includes quantification and identification.
SYSTEM DESIGN
System Design is the process of defining the architecture, components, modules, interfaces and
data for a system to satisfy specified requirements. System design could be seen as the application of the
systems theory to product development. The system design process builds up general framework building
design. Programming outline includes speaking to the product framework works in a shape that may be
changed into one or more projects. The prerequisite indicated by the end client must be put in a
systematical manner. Outline is an inventive procedure; a great configuration is the way to viable
framework. The framework "Outline" is characterized as "The procedure of applying different systems
and standards with the end goal of characterizing a procedure or a framework in adequate point of interest
to allow its physical acknowledgment". Different configuration components are taken after to add to the
framework. The configuration detail portrays the components of the framework, the segments or
components of the framework and their appearance to end-clients.
DESIGN CONSIDERATION
The reason for the design is to arrange the arrangement of the issue determined by the necessities report.
This stage is the initial phase in moving from issue to the arrangement space. As such, beginning with what is
obliged; outline takes us to work towards how tofullfill those needs. The configuration of the framework is maybe
the most basic component influencing the nature of the product and has a noteworthy effect on the later stages,
5
Detection, Characterization and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks
especially testing and upkeep. Framework outline depicts all the significant information structure, document
arrangement, yield and real modules in the frameworkand their Specification is chosen.
This system has input screens in almost all the modules. Error messages are developed to alert the
user whenever he commits some mistakes and guides him in the right way so that invalid entries are not made.
Input design is the process of converting the user created input into a computer-based format. The goal of
the input design is to make the data entry logical and free from errors. The error is in the input are controlled by
the input design. The application has been developed in user-friendly manner. The forms have been designed in
such a way during the processing the cursor is placed in the position where must be entered. The user is also
provided within an option to select an appropriate input from various alternatives related to the field in certain
cases. Validations are required for each data entered. Whenever a user enters an erroneous data, error message is
displayed and the user can move on to the subsequent pages after completing all the entries in the current page.
6
Detection, Characterization and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks
will serve as the administrator while the other connected systems can act as the clients. The developed system is
highly user friendly and can be easily understood by anyone using it even for the first time.
7
Detection, Characterization and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks
8
Detection, Characterization and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks
CONCLUSION
In this paper we have focused on detecting malicious data injections in WSNs, in particular when one or
more events can occur and collusion between compromised sensors exploits the loss in correlation brought in by
them. We have proposed a novel methodology to detect malicious data injections, based on the measurements
cross-scale relationship. In addition, we have provided an approach to characterize malicious colluding nodes, by
partitioning the sensor nodes based on the correlation between their measurements. This approach considers the
effects of events, hence it is able to detect groups of sensors that elicit or mask events. Finally, we provided a
novel measurements-based diagnosis technique to distinguish fault-induced anomalies from malicious anomalies.