SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1322
Robustness Strategy for Securing Data from Cyber Attacks
Tanay P. Vartak1, Harshada V. Ankam2, Komal K. Randive3, Amrita A. Shirode4
1,2,3Student, Dept. of Computer Engineering, AISSMS Polytechnic, Maharashtra, India.
4Professor, Dept. of Computer Engineering, AISSMS Polytechnic, Maharashtra, India.
----------------------------------------------------------------***---------------------------------------------------------------
Abstract - This paper first presents a new modeling
strategy to generate scale-free network topologies, which
considers the constraints in WSNs, such as thecommunication
range and the threshold on the maximum node degree. ROSE,
a robustness increasing algorithm for scale free wireless
sensor network, is proposed. Given a scale-freetopology, ROSE
utilize the position and degree information of nodes to
rearrange the edges to similar to an onion-like structure,
which has been proven to be robust against malicious attacks.
Meanwhile, ROSE does not change the degree of node such
that the resulting topology remains scale-free. The extensive
experimental results verify that our new modeling strategy
indeed generates scale-free network topologies for WSNs, and
ROSE can significantly improve the robustness of the network
topologies generated by our modeling strategy.
Key Words: Wireless sensor networks (WSNs), Node,
Layers, Degree, and Bandwidth
1. INTRODUCTION
Wireless sensor networks(WSNs)areanimportanttype
of network for sensing the environment and collecting
information. In order to sense environmental parameters, a
large number of sensor nodes, such as sink nodesandsensor
nodes, are deployed in distributed areas.Thesenodesforma
multi-hop ad hocnetwork systemand executeassignedtasks
according to the application requirements. WSNs have been
deployed in homes, buildings, forests, mountains, etc. The
sensor network topology describes the wireless
communications among the various sensor nodes in WSNs
and is the basis for the design of various network
communication protocolsandroutingprotocolswhichplaya
vital role in network properties, such as network lifetime,
energy consumption, reliability, and data latency.Inrandom
attacks, the attacker randomly choosesnodesinthenetwork
topology as the targets, whereas in malicious attacks, the
attacker chooses the nodes with high node degrees as the
targets. It is known that some types of network topologies
are resistant to random attacks and some are resistant to
malicious attacks. In this project, the proposed systemROSE
can significantly improve the robustness of the network
topologies generated by our modeling strategy. The scale-
free topology belongs to the field of complexnetwork theory
which has broad applications in the real world, such as in
global transportation networks cooperation networks of
social networks and mobile networks. The main contribute
in this paper malicious detected by using distributed
network.
1.1 ROSE Overview
ROSE is designed to be processed in a centralized
system. Before ROSE operates, each node sends its own
coordinates and neighbor list to the centralized system
through the multi-hop system. After we achieve the
optimization results according to ROSE, the centralized
system sends the new neighbor list to each nodethroughthe
multi-hop system. To help explain ROSE, we first introduce
the basic ideas of ROSE in this section. Then, we provide the
details of ROSE in the following section. In general, the
design of ROSE is based on the observation of Schneider et
al. that graphs exhibiting an onion-like structure are robust
to malicious attacks. Schneider etal.describedtheonion-like
structure as a structure “consisting of a core of highly
connected nodeshierarchicallysurroundedbyringsofnodes
with decreasing degrees.”NotethatSchneider etal. validated
their observation only by extensive simulations. One year
later, the theoretical analysis supporting this observation
was provided by Tanizawaet al. Since the onion-like
structure encompasses a family of network topologies,
Tanizawa et al. analyzed one specific topology called the
“interconnected random regular graphs” of this family, and
proved its robustness against malicious attacks. Given that
the above observation about the onion-like structure has
been validated both experimentally and theoretically, the
ROSE algorithm is aimed to transform network topologiesto
exhibit the onion-like structure. Specifically, ROSE involves
two phases: a degree difference operation and angle sum
operation.
2. Metrics of Robustness:
Under a local node failure or attacks, some nodes or
edges of the topology are destroyed in WSNs, which leads in
general to separation of the initial connected network. We
assume the WSNs suffer random and malicious attacks.
Random attacks comprise random selection and removal of
nodes in a WSN to destroy the connectivity of the entire
network. However, malicious attacks are aimed to destroy
the most important node in a WSN and achieve the worst
damage to the entire network topology. We determine the
importance of nodes according to the degree. A node with a
higher degree is more important than that with a lower
degree. We determine a malicious attack scheme that is
based on node degree to enhance the robustness of scale-
free networks against malicious attacks. First, the degree of
each node in the scale-free network is counted and the node
with highest degree is removed. The edges connected to it
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1323
are removed at the same time. Then, we reorder the
remaining nodes by their degree.Thecurrenthighestdegree
node is removed. This process is repeated until all the nodes
are isolated in the network. If more than one node has the
highest degree, we randomly select a node to attack. This
attack scheme is more hostile, and therefore, the metrics of
robustness based on this attack scheme can reflect the
robustness against malicious attacks “more obvious.”
Fig -1: Scale free network
Ref: ROSE: Robustness Strategy for Scale-Free
Wireless Sensor Networks
In a recent paper, a new metric of robustness based on
the percolation theory was proposed by Schneider et al. It
considers the maximal connected sub graphs after the
repeated removal of the highest degree node to measurethe
robustness of the network topology. We combined this
metric with the malicious attacks scheme presented above,
and describe network connectivity through calculating the
proportion of maximal connected sub graphs of the entire
network, and evaluate the extent of the damage. In a
network with N nodes, the robustness metric R isdefined as,
R=1N+1∑n=0N−1MCSnN (3) in our topology construction
strategy for WSNs, we restrict the order in which each node
adds edges. For this reason, the nodes near the center of the
network tend to have larger degrees than those near the
boundary of the network. If the distance of two nodes from
the coordinates of the centroid is the same, they have the
greatest probability of having the same or similar degrees.
3. Methodology
Due to the recent proliferation of cyber-attacks,
improving the robustness of wireless sensor networks
(WSNs), so that they can withstandnodefailureshasbecome
a critical issue. Scale-free WSNs are important, because they
tolerate random attacks very well; however, they are not
protected from malicious attacks, which particularly target
certain important nodes. In recent years, becauseoftherush
in cyber-attacks increasing the robustness of the WSNs has
become a critical issue. In existing a hill climbing algorithm
introduced which is based on robustness metric R, which
makes the network topologies resemble a stable distributed
network structure through swapping edges. However, the
multimodal phenomenon may prevent the algorithm from
jumping out of the local optimum.
The proposed methodology ROSE enhances the
robustness of scale-free networks against malicious attacks
without changing the node degree distribution. ROSE
consists of two phases: the degree difference and the angle
sum operation. Both operations are aimed to transform the
network topology toward the distributednetwork structure,
which was shown in to be robust against the malicious
attacks. The degree is assigned to each node to form the
ROSE structure. The degree is just like weight or BW or
capacity or range of node which is assigned by the system
randomly at the time of registration or network topology
creation.
Fig -2: System Architecture
In this higher degree node is cover up by the lower degree
nodes. In an distributed network structure, the nodes that
have the same or similar degrees are connected with each
other. All the neighbors of a high degree node have high
degrees. The main contributions in this paper malicious are
detected using distributed network.
3.1 Degree Difference operation
The degree is assigned to each node to form the ROSE
structure (distributed network –like structure). The degree
is just like weight or BW or capacity or range of node which
is assigned by the system randomly at the time of
registration or network topology creation. In this higher
degree node is cover up by the lower degree nodes. In a
distributed network -like structure, the nodes that have the
same or similar degrees are connected with each other. All
the neighbors of a high degree node have high degrees.
When the node fails, its neighbors can replace its original
function and ensure theconnectivityoftheresidual network.
Thus, the destruction of malicious attacks is weakened to a
great extent in WSNs. At the same time, the distributed
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1324
network -like structure retains the propertyofthescale-free
network. The majority of nodeshavelowdegrees.Theadmin
will send the signature or witness message to each node at
time of registration.
Depends on this signature or witness messages the
malicious nodes aredetected whichareaffected bymalicious
or random attacks. When attacker attacks the node the
signature / witness message will automatically changes.
These signatures are stored at admin side in form of digest
by using MD5 algorithm.
3.2 Distributed Network
The admin will send request to all nodes for witness
message to detect the malicious node in the network. Upon
receiving the request from the admin the node will send the
signature to admin. (The victim i.e. the infected nodedoesn’t
know about the attack). Once admin receives the signature
the system generates the digest of that message and
validation of digest message which is available at admin and
received digest is done. If doesn’t matches the system will
gives the alert for malicious node in the network.
4. CONCLUSION
A newly proposed algorithm called ROSE was designed
for enhancing the robustness of scale-free networks against
malicious attacks. The combination of a degree difference
operation and an angle sum operation in the algorithm
makes scale-free network topologies rapidly approach an
onion-like structure without changing the original power-
law distribution. Finally, the performance of ROSE was
evaluated on scale-free network topologies having different
sizes and edge densities. The simulation results show that
ROSE significantly improves robustness against malicious
attacks and retains the original scale-free property in WSNs
at the same time. ROSE shows better robustness
enhancement results and consumes less computation time.
REFERENCES
[1] F. M. Al-Turjman, H. S. Hassanein, and M. Ibnkahla,
“Towards prolonged lifetime for deployed WSNs in outdoor
environment monitoring,” Ad Hoc Netw., vol. 24, pp. 172–
185, Jan. 2015.
[2] S. Ji, R. Beyah, and Z. Cai, “Snapshot and continuous data
collection in probabilistic wireless sensor networks,” IEEE
Trans. Mobile Comput., vol. 13, no. 3, pp. 626–637, Mar.
2014.
[3] J. Long, A. Liu, M. Dong, and Z. Li, “An energy-efficientand
sinklocation privacy enhanced scheme for WSNs through
ring based routing,” J. Parallel Distrib. Comput., vols. 81–82,
pp. 47–65, Jul. 2015.
[4] A. Munir, A. Gordon-Ross, and S. Ranka, “Multi-core
embedded wireless sensor networks: Architecture and
applications,” IEEE Trans. Parallel Distrib.Syst.,vol.25, no.6,
pp. 1553–1562, Jun. 2014.
[5] P. Eugster, V. Sundaram, and X. Zhang, “Debugging the
Internet of Things: The case of wireless sensor networks,”
IEEE Softw., vol. 32, no. 1, pp. 38–49, Jan. 2015.
[6] T. Qiu, R. Qiao, and D. Wu, “EABS: An event-aware
backpressure scheduling scheme for emergency Internet of
Things,” IEEE Trans. Mobile Comput., to be published,doi:
10.1109/TMC.2017.2702670.
[7] Z. Li and H. Shen, “A QoS-oriented distributed routing
protocol for hybrid wireless networks,” IEEE Trans. Mobile
Comput., vol. 13, no. 3, pp. 693–708, Mar. 2014.

More Related Content

DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
PDF
Modelling of A Trust and Reputation Model in Wireless Networks
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
PDF
SURVEY ON MOBILE AD HOC NETWORK
PDF
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
PDF
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
PDF
Reliability in wsn for security
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
Modelling of A Trust and Reputation Model in Wireless Networks
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
SURVEY ON MOBILE AD HOC NETWORK
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
Reliability in wsn for security

What's hot (19)

PDF
Maximizing network interruption in wireless
PDF
A survey on bio inspired security in wireless sensor networks
PDF
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
PDF
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
PDF
O010528791
PDF
Research Challenges and Characteristic Features in Wireless Sensor Networks
PDF
11.a new scheme for secured on demand routing
PDF
A modified clustered based routing protocol to secure wireless sensor network...
PDF
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
PDF
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
PDF
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
PDF
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PDF
Ao03402350245
PDF
Investigation of detection & prevention sinkhole attack in manet
PDF
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
PDF
Energy Consumption Minimization in WSN using BFO
PDF
A Security Framework for Replication Attacks in Wireless Sensor Networks
PPTX
Security in wireless sensor network
PDF
Br33421423
Maximizing network interruption in wireless
A survey on bio inspired security in wireless sensor networks
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
Defending Against Energy Draining Attacks In Wireless Sensor Networks Using T...
O010528791
Research Challenges and Characteristic Features in Wireless Sensor Networks
11.a new scheme for secured on demand routing
A modified clustered based routing protocol to secure wireless sensor network...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
Ao03402350245
Investigation of detection & prevention sinkhole attack in manet
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
Energy Consumption Minimization in WSN using BFO
A Security Framework for Replication Attacks in Wireless Sensor Networks
Security in wireless sensor network
Br33421423
Ad

Similar to IRJET- Robustness Strategy for Securing Data from Cyber Attacks (20)

PDF
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
PDF
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
PDF
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
PDF
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
PDF
Enhance the Throughput of Wireless Network Using Multicast Routing
PDF
Enhance the Throughput of Wireless Network Using Multicast Routing
PDF
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
PDF
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
PDF
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
PDF
Denial of Service (DoS) Attacks at Network Layer in WSN
PDF
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
PDF
C0511318
PDF
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
PDF
Improvement of quality of service parameters using
PDF
Improvement of quality of service parameters using reinvented fsmac protocol ...
PDF
Characterization of directed diffusion protocol in wireless sensor network
PDF
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
DOC
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
PDF
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
PDF
The International Journal of Engineering and Science (IJES)
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Denial of Service (DoS) Attacks at Network Layer in WSN
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
C0511318
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
Improvement of quality of service parameters using
Improvement of quality of service parameters using reinvented fsmac protocol ...
Characterization of directed diffusion protocol in wireless sensor network
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
IRJET- Heterogeneous Network Based Intrusion Detection System in Mobile Ad Ho...
The International Journal of Engineering and Science (IJES)
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
Welding lecture in detail for understanding
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
OOP with Java - Java Introduction (Basics)
DOCX
573137875-Attendance-Management-System-original
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
additive manufacturing of ss316l using mig welding
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Digital Logic Computer Design lecture notes
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Welding lecture in detail for understanding
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Operating System & Kernel Study Guide-1 - converted.pdf
OOP with Java - Java Introduction (Basics)
573137875-Attendance-Management-System-original
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
additive manufacturing of ss316l using mig welding
Mechanical Engineering MATERIALS Selection
Foundation to blockchain - A guide to Blockchain Tech
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Geodesy 1.pptx...............................................
bas. eng. economics group 4 presentation 1.pptx
Digital Logic Computer Design lecture notes
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf

IRJET- Robustness Strategy for Securing Data from Cyber Attacks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1322 Robustness Strategy for Securing Data from Cyber Attacks Tanay P. Vartak1, Harshada V. Ankam2, Komal K. Randive3, Amrita A. Shirode4 1,2,3Student, Dept. of Computer Engineering, AISSMS Polytechnic, Maharashtra, India. 4Professor, Dept. of Computer Engineering, AISSMS Polytechnic, Maharashtra, India. ----------------------------------------------------------------***--------------------------------------------------------------- Abstract - This paper first presents a new modeling strategy to generate scale-free network topologies, which considers the constraints in WSNs, such as thecommunication range and the threshold on the maximum node degree. ROSE, a robustness increasing algorithm for scale free wireless sensor network, is proposed. Given a scale-freetopology, ROSE utilize the position and degree information of nodes to rearrange the edges to similar to an onion-like structure, which has been proven to be robust against malicious attacks. Meanwhile, ROSE does not change the degree of node such that the resulting topology remains scale-free. The extensive experimental results verify that our new modeling strategy indeed generates scale-free network topologies for WSNs, and ROSE can significantly improve the robustness of the network topologies generated by our modeling strategy. Key Words: Wireless sensor networks (WSNs), Node, Layers, Degree, and Bandwidth 1. INTRODUCTION Wireless sensor networks(WSNs)areanimportanttype of network for sensing the environment and collecting information. In order to sense environmental parameters, a large number of sensor nodes, such as sink nodesandsensor nodes, are deployed in distributed areas.Thesenodesforma multi-hop ad hocnetwork systemand executeassignedtasks according to the application requirements. WSNs have been deployed in homes, buildings, forests, mountains, etc. The sensor network topology describes the wireless communications among the various sensor nodes in WSNs and is the basis for the design of various network communication protocolsandroutingprotocolswhichplaya vital role in network properties, such as network lifetime, energy consumption, reliability, and data latency.Inrandom attacks, the attacker randomly choosesnodesinthenetwork topology as the targets, whereas in malicious attacks, the attacker chooses the nodes with high node degrees as the targets. It is known that some types of network topologies are resistant to random attacks and some are resistant to malicious attacks. In this project, the proposed systemROSE can significantly improve the robustness of the network topologies generated by our modeling strategy. The scale- free topology belongs to the field of complexnetwork theory which has broad applications in the real world, such as in global transportation networks cooperation networks of social networks and mobile networks. The main contribute in this paper malicious detected by using distributed network. 1.1 ROSE Overview ROSE is designed to be processed in a centralized system. Before ROSE operates, each node sends its own coordinates and neighbor list to the centralized system through the multi-hop system. After we achieve the optimization results according to ROSE, the centralized system sends the new neighbor list to each nodethroughthe multi-hop system. To help explain ROSE, we first introduce the basic ideas of ROSE in this section. Then, we provide the details of ROSE in the following section. In general, the design of ROSE is based on the observation of Schneider et al. that graphs exhibiting an onion-like structure are robust to malicious attacks. Schneider etal.describedtheonion-like structure as a structure “consisting of a core of highly connected nodeshierarchicallysurroundedbyringsofnodes with decreasing degrees.”NotethatSchneider etal. validated their observation only by extensive simulations. One year later, the theoretical analysis supporting this observation was provided by Tanizawaet al. Since the onion-like structure encompasses a family of network topologies, Tanizawa et al. analyzed one specific topology called the “interconnected random regular graphs” of this family, and proved its robustness against malicious attacks. Given that the above observation about the onion-like structure has been validated both experimentally and theoretically, the ROSE algorithm is aimed to transform network topologiesto exhibit the onion-like structure. Specifically, ROSE involves two phases: a degree difference operation and angle sum operation. 2. Metrics of Robustness: Under a local node failure or attacks, some nodes or edges of the topology are destroyed in WSNs, which leads in general to separation of the initial connected network. We assume the WSNs suffer random and malicious attacks. Random attacks comprise random selection and removal of nodes in a WSN to destroy the connectivity of the entire network. However, malicious attacks are aimed to destroy the most important node in a WSN and achieve the worst damage to the entire network topology. We determine the importance of nodes according to the degree. A node with a higher degree is more important than that with a lower degree. We determine a malicious attack scheme that is based on node degree to enhance the robustness of scale- free networks against malicious attacks. First, the degree of each node in the scale-free network is counted and the node with highest degree is removed. The edges connected to it
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1323 are removed at the same time. Then, we reorder the remaining nodes by their degree.Thecurrenthighestdegree node is removed. This process is repeated until all the nodes are isolated in the network. If more than one node has the highest degree, we randomly select a node to attack. This attack scheme is more hostile, and therefore, the metrics of robustness based on this attack scheme can reflect the robustness against malicious attacks “more obvious.” Fig -1: Scale free network Ref: ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks In a recent paper, a new metric of robustness based on the percolation theory was proposed by Schneider et al. It considers the maximal connected sub graphs after the repeated removal of the highest degree node to measurethe robustness of the network topology. We combined this metric with the malicious attacks scheme presented above, and describe network connectivity through calculating the proportion of maximal connected sub graphs of the entire network, and evaluate the extent of the damage. In a network with N nodes, the robustness metric R isdefined as, R=1N+1∑n=0N−1MCSnN (3) in our topology construction strategy for WSNs, we restrict the order in which each node adds edges. For this reason, the nodes near the center of the network tend to have larger degrees than those near the boundary of the network. If the distance of two nodes from the coordinates of the centroid is the same, they have the greatest probability of having the same or similar degrees. 3. Methodology Due to the recent proliferation of cyber-attacks, improving the robustness of wireless sensor networks (WSNs), so that they can withstandnodefailureshasbecome a critical issue. Scale-free WSNs are important, because they tolerate random attacks very well; however, they are not protected from malicious attacks, which particularly target certain important nodes. In recent years, becauseoftherush in cyber-attacks increasing the robustness of the WSNs has become a critical issue. In existing a hill climbing algorithm introduced which is based on robustness metric R, which makes the network topologies resemble a stable distributed network structure through swapping edges. However, the multimodal phenomenon may prevent the algorithm from jumping out of the local optimum. The proposed methodology ROSE enhances the robustness of scale-free networks against malicious attacks without changing the node degree distribution. ROSE consists of two phases: the degree difference and the angle sum operation. Both operations are aimed to transform the network topology toward the distributednetwork structure, which was shown in to be robust against the malicious attacks. The degree is assigned to each node to form the ROSE structure. The degree is just like weight or BW or capacity or range of node which is assigned by the system randomly at the time of registration or network topology creation. Fig -2: System Architecture In this higher degree node is cover up by the lower degree nodes. In an distributed network structure, the nodes that have the same or similar degrees are connected with each other. All the neighbors of a high degree node have high degrees. The main contributions in this paper malicious are detected using distributed network. 3.1 Degree Difference operation The degree is assigned to each node to form the ROSE structure (distributed network –like structure). The degree is just like weight or BW or capacity or range of node which is assigned by the system randomly at the time of registration or network topology creation. In this higher degree node is cover up by the lower degree nodes. In a distributed network -like structure, the nodes that have the same or similar degrees are connected with each other. All the neighbors of a high degree node have high degrees. When the node fails, its neighbors can replace its original function and ensure theconnectivityoftheresidual network. Thus, the destruction of malicious attacks is weakened to a great extent in WSNs. At the same time, the distributed
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1324 network -like structure retains the propertyofthescale-free network. The majority of nodeshavelowdegrees.Theadmin will send the signature or witness message to each node at time of registration. Depends on this signature or witness messages the malicious nodes aredetected whichareaffected bymalicious or random attacks. When attacker attacks the node the signature / witness message will automatically changes. These signatures are stored at admin side in form of digest by using MD5 algorithm. 3.2 Distributed Network The admin will send request to all nodes for witness message to detect the malicious node in the network. Upon receiving the request from the admin the node will send the signature to admin. (The victim i.e. the infected nodedoesn’t know about the attack). Once admin receives the signature the system generates the digest of that message and validation of digest message which is available at admin and received digest is done. If doesn’t matches the system will gives the alert for malicious node in the network. 4. CONCLUSION A newly proposed algorithm called ROSE was designed for enhancing the robustness of scale-free networks against malicious attacks. The combination of a degree difference operation and an angle sum operation in the algorithm makes scale-free network topologies rapidly approach an onion-like structure without changing the original power- law distribution. Finally, the performance of ROSE was evaluated on scale-free network topologies having different sizes and edge densities. The simulation results show that ROSE significantly improves robustness against malicious attacks and retains the original scale-free property in WSNs at the same time. ROSE shows better robustness enhancement results and consumes less computation time. REFERENCES [1] F. M. Al-Turjman, H. S. Hassanein, and M. Ibnkahla, “Towards prolonged lifetime for deployed WSNs in outdoor environment monitoring,” Ad Hoc Netw., vol. 24, pp. 172– 185, Jan. 2015. [2] S. Ji, R. Beyah, and Z. Cai, “Snapshot and continuous data collection in probabilistic wireless sensor networks,” IEEE Trans. Mobile Comput., vol. 13, no. 3, pp. 626–637, Mar. 2014. [3] J. Long, A. Liu, M. Dong, and Z. Li, “An energy-efficientand sinklocation privacy enhanced scheme for WSNs through ring based routing,” J. Parallel Distrib. Comput., vols. 81–82, pp. 47–65, Jul. 2015. [4] A. Munir, A. Gordon-Ross, and S. Ranka, “Multi-core embedded wireless sensor networks: Architecture and applications,” IEEE Trans. Parallel Distrib.Syst.,vol.25, no.6, pp. 1553–1562, Jun. 2014. [5] P. Eugster, V. Sundaram, and X. Zhang, “Debugging the Internet of Things: The case of wireless sensor networks,” IEEE Softw., vol. 32, no. 1, pp. 38–49, Jan. 2015. [6] T. Qiu, R. Qiao, and D. Wu, “EABS: An event-aware backpressure scheduling scheme for emergency Internet of Things,” IEEE Trans. Mobile Comput., to be published,doi: 10.1109/TMC.2017.2702670. [7] Z. Li and H. Shen, “A QoS-oriented distributed routing protocol for hybrid wireless networks,” IEEE Trans. Mobile Comput., vol. 13, no. 3, pp. 693–708, Mar. 2014.