Professional Documents
Culture Documents
70 74, Tesma208, Ijeast
70 74, Tesma208, Ijeast
Abstract: Data security and access control plays an intrusion detection system. In the host based intrusion
efficacious role in protecting centralized server to restrict detection systems, the process of detection is to be refined by
unauthorized/unauthenticated users in misusing the introducing automatic detection system. The various possible
system. The security is imperious for outsourced classified chances of occurring attacks are to be predicted and need to be
data. This paper emphasizes the issues related to tracked for taking protecting sensitive data. Physical layer
protecting centralized data from access by illegal users. attacks, data link layer attacks and network layer attacks
The proposed a novel technique uses sensor approach to definitely do some harm to server databases. Apart from that
protect data whenever it is trapped. Use of sensor attack against clock synchronization and symmetric key
networks in restricted places provides utmost facility in cryptography effects security factor of the server database.
handling the problem automatically without out the The minimization of self stabilization of network is done using
intervention of manual process. The proposed solution clustering mechanisms [2].Self-stabilizing algorithms in
prevents data tampering as traffic analysis is done sensor networks helps in detection of malicious nodes and
automatically using sensors in both inter and intra cluster later they will re organized using clustering algorithms. This
communication. approach targeted to put limit on unreliable communication.
Cluster Gateway Switch Routing Protocol(CGSR) is used to
Keywords: Data tampering, attacks, clustering, hidden cover maximum number of nodes in the cluster. Proactive
terminal problem routing protocols are discussed to update routing information
from node to node time to time and Reactive protocols are
I. INTRODUCTION used to update information when the route to the destination is
required[3]. Optimal rank aggregation methods and Markov
The data hosted on the web is accessible to all the users if no chain models[12]reduces the overhead of computation while
security is provided. Suppose, if the data is confidential and doing meta-search operations. In distributed sensor networks
only allowed users are required to access, then username and data is collected by individual sensors and sent to central
password are required or some key exchange process is to be nodes for processing as the bandwidth of sensors is very much
done to allow authorized users to access data and restrict low[6,13].
others not to access. This leads to major problem because In this paper, Section 1 describes previous work related to
attackers find several means to break passwords and unauthorized data access by attackers and by other means.
tampering of data. In this paper, novel mechanisms are Section 2 illustrates schematic representation accessing
proposed to detect and trace the path of illegal access. The centralized server data accessed by various devices. In Section
various issues related to trapping data are discussed the 3, the various means of accessing data by authorized users is
possible solutions are suggested based on the type attack illustrated. And in Section 4, proposed solutions to Feebleness
occurred. The solution analysis includes traffic analysis, issues in Centralized Server Data using Sensors are discussed.
identifying type of attacks, how to handle localization issues, The prototype of trapping central server data using OPNET
adopting cluster head mechanisms. Also rules for analyzing modeler is elaborated in Section 5. In conclusion, the effective
integrity violation are discussed. usage of sensor in automatic detection of attacks is
emphasized.
II. RELATED WORK
70
International Journal of Engineering Applied Sciences and Technology, 2017
Vol. 2, Issue 8, ISSN No. 2455-2143, Pages 70-74
Published Online December 2017 in IJEAST (http://www.ijeast.com)
71
International Journal of Engineering Applied Sciences and Technology, 2017
Vol. 2, Issue 8, ISSN No. 2455-2143, Pages 70-74
Published Online December 2017 in IJEAST (http://www.ijeast.com)
72
International Journal of Engineering Applied Sciences and Technology, 2017
Vol. 2, Issue 8, ISSN No. 2455-2143, Pages 70-74
Published Online December 2017 in IJEAST (http://www.ijeast.com)
VII. REFERENCES
[1] L.ToddHeberlein,GihanV.Dias,KarlN.Levitt,Biswant
hMukherjee,Jeff Wood and David Wolber,”A
Network Security Monitor”,Division of Computer
science,Dept.of Electrical Engineering and Computer
Fig.5.3. Traffic Flow from node_1 Science,University of California,Davis CA,
Research in Security and Privacy, Proceedings.,
The prototype for data capturing process is developed using IEEE Computer Society Symposium on 7-9 May
OPNET modeler. This modeler is convenient for tracking 1990.
packet flow and for modeling data flow from centralized [2] Andreas Larsson,”Security and Self-stablilization in
server to its workstations. Sensor Network Services,Division of Networks and
Systems”,Department of Computer Science and
Table 5.1. Benefits of Proposed methodologies Engineering,Chalmers University of
Sl.No. Methodology Fringe benefit Technology,Sweden 2012.
name [3] Kumar Nikhil and SwathiAgarwal and
Traffic analysis at Traffic analysis is done using PankajSharma,”Application of Genetic Algorithm in
1 routers sensors to facilitate automatic Designing a Security Model for Mobile
alerts. Adhocnetwork”,Department of IT,ABES Engineering
Identifying the Adoption of micro sensors College,Ghaziabad(U.P),India.
types of attacks and motions sensors at ISO [4] Jamal N. AI-Karaki Ahmed E.Kamal,”Routing
2 Techniques in Wireless Sensor
layers provides security
layerwise. Networks:ASurvey”,Department of Electrical and
Handling Keeps track of geographic Computer Engineering,lowa State
3 Localization issues locations through mobile University,Ames,lowa 50011
sensors. [5] Prof Ram Meghe et al,“Database Tampering and
Incorporating Cluster based message Detection of Data Fraud by Using the Forensic
4 Cluster Head transmission helps in quick Scrutiny Technique”, ISSN 2250-2459, ISO
mechanism. message transmission. 9001:2008, Volume 3, Issue 2, February 2013.
Managing Routing The decoding of header [6] ToshishigeShimamura et al,A Fingerprint Sensor
Protocols information is accurate if the with Impedance Sensing for Fraud Detection,2008
5 IEEE International Solid-State Circuits Conference -
message transmission is by
using RFID tags or sensor. Digest of Technical Papers,University of
Checking for Intra cluster communication Pennsylvania,3-7 Feb. 2008.
integrity of the data through Bluetooth [7] V.Priyadharshini et al,Prevention of DDOS Attacks
received communication helps in using New Cracking Algorithm, International Journal
6 avoiding integrity violation as of Engineering Research and Applications (IJERA)
the intra cluster distance is ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 3,
very small which results in May-Jun 2012, pp.2263-2267.
accurate transmission. [8] Ms. Madhavi N. Shrikhande et al,EMBEDDED WEB
TECHNOLOGY IN TRAFFIC MONITORING
SYSTEM, International Journal of Innovative
VI. CONCLUSIONS Research in Advanced Engineering (IJIRAE) ISSN:
By applying possible solutions at various levels, the intensity 2349-2163 Volume 1 Issue 4 (May 2014).
of data sensing by the attackers can be minimized. And by [9] V.Ilango et al, Cluster Analysis Research Design
applying Aggregation techniques using sensors, the threat of model, problems, issues, challenges, trends and tools,
73
International Journal of Engineering Applied Sciences and Technology, 2017
Vol. 2, Issue 8, ISSN No. 2455-2143, Pages 70-74
Published Online December 2017 in IJEAST (http://www.ijeast.com)
74