Professional Documents
Culture Documents
On
INTRUSION DETECTION USING WIRELESS SENSOR NETWORKS
Submitted to
Amity University Uttar Pradesh
Bachelor of Technology
In
Electronics and Communication
RISHI DEB
under the guidance of
Prof (Col) R.K Kapur
DEPARMENT ………………………………………………………..
AMITY SCHOOL OF ENGINEERING AND TECHNOLOGY
AMITY UNIVERSITY UTTAR PRADESH,NOIDA (U.P.)
NOVEMBER 2019
DECLARATION
I/We, ……………………….., student(s) of B.Tech (….) hereby declare that the project titled
……………………………., Amity School of Engineering and Technology, Amity University Uttar Pradesh,
Noida, in partial fulfillment of requirement for the award of the degree of Bachelor of Technology in ….. ,
has not been previously formed the basis for the award of any degree, diploma or other similar title or recognition.
Noida
CERTIFICATE
To the best of my knowledge this work has not been submitted in part or full for any Degree or
Noida
Department of ……………….
Amity School of Engineering and Technology
Amity University Uttar Pradesh, Noida
Project Plan
TABLE OF CONTENTS
INTRODUCTION 1
PURPOSE OF PLAN 1
BACKGROUND INFORMATION/AVAILABLE ALTERNATIVES 1
PROJECT GOALS AND OBJECTIVES 1
SCOPE 2
SCOPE DEFINITION 2
PROJECTED BUDGET 2
CONSTRAINTS 2
PROJECT CONSTRAINTS 2
PROJECT MANAGEMENT APPROACH 3
PROJECT TIMELINE 3
PROJECT ROLES AND RESPONSIBILITIES 4
RISK ASSESSMENT 5
PROJECT RISK ASSESSMENT 5
LITERATURE REVIEW 3
INTRODUCTION
Purpose of Plan
This project proposes to reduce the rate of infiltration into protected areas. It makes
use of a network of sensors which will be planted in regions where the presence of
security forces is comparatively less in number. The aim of this project is to in turn
reduce the casualty rates in border areas by acting as reporting mechanism in the case
of any infiltration being picked up the system.
SCOPE
Scope Definition
The scope of the project is to realize a Wireless Sensor Network which will act as an
Early warning alarm system, covering at least 200-300 meters of length facing the
infiltration path, the sensor network will progress inwards by about 20 meters in a
grid fashion, so that there is some redundancy of sensors and the activity is picked by
one if missed by another, the inward progression of the sensor network will also act
as a path way for the distant sensors to relay any information to the gateway sensor.
The sensors in the middle will act as routers, routing the message to the gateway
node which has paramount connectivity.
Projected Budget
The budget includes several micro-controllers (7-10) and a host of sensors including
pressure, heat, humidity and a low powered camera which is triggered only when the
pressure and heat sensor pick up a relevant reading. The micro-controller of choice is
arduino uno, chosen considering the ease of modelling it as per our needs as well as
the digital and analog pins provided by it will suffice the needs of this project.
Furthermore Atmega-16 microprocessor is efficient and computationally capable
enough to run various WSN routing protocols needed for this project.
CONSTRAINTS
Project Constraints
In case if project is to be done in groups then the role and responsibility of each
member is defined in following table
Risk Assessment
LITERATURE REVIEW
On demand or reactive routing protocols create routes only when they are needed
Reactive protocols use two different operations to find routes as well as maintain
them the first one is the route discovery process operation and the second one is the
route maintenance operation. When a node requires a route to the destination, it starts
the route discovery process inside the scope of the Ad-HOC network. This process is
completed as soon as a viable route is found to the destination node or all possible
route permutations are scrutinized.
Route maintenance is the process of reacting to changes in topology that happen after
the route was initially created. When link is broken, the nodes in the network detect
the link breakages on the already discovered routes.
5
The study is based on two different experiments which will help us decide which
protocol is better suited considering the requirements of the project. The two
experiments are stated as follows -
1. Number of nodes change ( keeping other parameters fixed )
This experiment will help in deciding which protocol would be better suited in
different case involving varying node density which in practical situations can arise
due to shortage of nodes available for deployment as well as in the off chance of
some nodes not working as time passes after the deployment.
Considering the use case of the project, the network deployed will be majorly static
with all the nodes being at their initial position. This test will give us an insight as to
which protocol will be the most robust if the nodes were displaced for their initial
position, though the displacement will not be continuous, the mobile node will
become static again and the system will become static again but in the spirit of
robustness this testing has also been performed.
The performance will be rated based on 4 parameters, namely -
End to End Delay - Time taken by the packet to reach from source to
destination.
This parameter depends on the throughput as well, this will highlight high
buffer
times in the nodes if the throughput is not good.
Normalized Routing Load - Number of routing packets required for each data
packet
to be communicated successfully. This parameter directly effects throughput
which in
will effect Packet Delivery Ratio and End to End Delay.
When a neighbour B of A finds out that A isn't any longer accessible, it advertises
the route to A with AN infinite metric and a sequence favourite larger than the most
recent sequence range for the route forcing any nodes with B on the trail to A, to
reset their routing tables.
The routing table is updated in two ways, both of these ways involve varying levels
of traffic in the network.
Full Dump - This method is resorted to less frequently as it requires more number of
Network protocol data units, this is used when the update is big in size and all the
routing information is to be forwarded.
Incremental - This method is much more efficient as fas as the load on the network is
concerned, this broadcasts only that metric which has changed since the full dump
update.
The most important field determining performance in a major way is the sequence
number, the larger the sequence number the better and more tested the route will be,
this helps in avoiding stale routes which lead to degradation in performance. An even
sequence number symbolizes that the node is correctly working whereas an odd one
means malfunctioning node and the number of hops are subsequently set to infinity.
Ad-HOC on Demand Distance Vector routing - This protocol builds routes as and
when required by the network, control packets are used for the discovery and freeing
of routes.
AODV being a reactive protocol will find the route to the destination node when the
need arises. It will broadcast a route request packet in the wireless sensor network,
with the destination I.D of the desired destination node. This happens under the route
discovery process. If a node receives two of the same RREPs then the redundant
packet is pushed off the network this way unnecessary traffic is reduced in the
wireless sensor network.
After the route has been discovered by the matching of the destination I.D and the
node, the destination node unicasts the route reply packet back to the source node
and all the intermediate nodes store the immediate addresses of their respective
neighbours. Now the data packet is sent to the destination node on a hop by hop
basis..
6
Route Request ( RREQ ) : This packet is broadcasted throughout the network in
order to discover new routes, such a packet is discarded by a node if a similar one has
already been received by it, this reduces congestion and confusion within the
network. These packets have a TTL – time to live field, which is reduced by 1 after
each hop, if TTL becomes 0, the particular RREQ packet is dislodged form the
wireless sensor network, this way over population of RREQ packets is countered in
AODV.
A route reply packet (RREP) is unicasted to the source if a node has route with
sequence number greater than or equal to the sequence number of the route request
packet.
Hello messages ; These are broadcasted by active node to check the functionality of
the neighboring links as well as update the tables incase some node mal functions.
RERR - Nodes monitor the link standing of next hops in active routes. once a link
breakage in a lively route is detected, a RERR message is employed to send word
different nodes of the loss of the link. so as to modify this coverage mechanism,
every node keeps a ``precursor list'', containing the IP address {for every|for every}
its neighbours that area unit doubtless to use it as the next hop towards each
destination.
Dynamic Source Routing – The only difference this has with AODV is that the
source node supplies the whole route to be taken by the packet in order to reach the
destination node, this increases the packet overhead and is heavily dependent on
making prior changes to the address which reduces the reactiveness of this protocol
as compared to AODV which is based on independent-hopping.
DSR is a reactive protocol for wireless sensor networks. This protocol decides the
route to a destination once the request on need is felt . Route Discovery phase is the
first process it runs, where it gets the route to the destination node, this route is
copied into the header of the data packet which is to be routed to the destination
node. Then comes the route maintenance process which keeps the stale routes off the
network and in turn keeps the throughput and Packet Delivery Ratio high..
DSR route discovery - Diagramatic representation.
Simulations
The following simulations are carried out in NS2 and the trace files generated are
passed as arguments to the GNUplot using which are graphs are made.
Scenario 1: Different Node Density
The parameters used in the simulation are mentioned above, only the number of
nodes is kept variable.
DSDV performs the best in this case as it pro-actively finds the route and updates the
routing table in every node. AODV and DSR have to go through a route discovery
phase first before being able to transmit. As the network size increases DSR performs
worse than AODV as it is more aggressive in caching destination address at the
source node itself.
Normalized Routing load-
DSDV here also performs better than the other two as it needs to send less routing
packets for route discovery given it uses a pro-active approach to find routes. AODV
and DSR being reactive in nature need to use a lot of routing packets to finalize the
route for transmission to take place.
9
All the three protocols are tested based on varying pause time of mobile nodes. Rest of the
parameters are kept fixed in this testing.
10
Throughput
DSR’s aggressive caching provides benefit upto a certain extent only, AODV and
DSDV perform similarly but here the better one is AODV as it is much more
dynamic compared to DSDV and is able to counter mobility better, DSDV’s pro-
active approach is a bit rigid when it comes to better mobility of nodes in the
network.
End to End Delay-
Delay encountered in DSDV is less again because of no route discovery phase, DSR
suffers heavily as it is not based on independent hops as AODV.
Normalized Routing Load
As DSDV updates the routing tables pro-actively the number of routing packets sent
are high when the pause time is small ,whereas in AODV it is the small as it is the
most dynamic. As the pause time of the mobile node increases the performance of
DSDV becomes better
Energy-efficiency
This factor is the most important factor which will determine the life of the wireless
sensor network, in order for this network to be feasible the its life span should be
long otherwise it would require redeployment and that would be problematic, hence
battery consumption should be optimized and the protocol used should also foster
energy savings.
Low Cost
Since a lot of nodes will be deployed in the wireless sensor network, the cost per
sensor node should be justified taking into consideration its utility and the host of
sensors it possesses.
Distributed sensing
A host of sensors should be interfaced with each node, this would increase the
robustness of the node as it would detect more parameters and then fire up the
protocol, it will also reduce the false alarm rate as the decision of an alarm will be
taken after processing various readings.
Wireless
The medium of communication should be majorly wireless as the infrastructure is minimal is the wireless sensor
network. So appropriate wireless modules need to be interfaced to provide the required range.
Multi-hop
The communication channel length should be broken between a number of
intermediate nodes, this will reduce the stress on just two nodes acting as receiver
and transmitter.
Architecture of the node
Components required
Arduino nano - for the nodes as well as the gate way node.
Wireless Transciever - module for carrying out communication ( REES52 )