a_three-tier_framework_for_intruder_information_sharing_in_sensor_networks srs.doc
TRANSCRIPT
-
7/23/2019 A_Three-Tier_Framework_for_Intruder_Information_Sharing_in_Sensor_Networks srs.doc
1/21
A Three-Tier Framework forIntruder Information
Sharing in Sensor Networks
-
7/23/2019 A_Three-Tier_Framework_for_Intruder_Information_Sharing_in_Sensor_Networks srs.doc
2/21
CONTENTS
Abstract
Organization Profile
Introduction
Object Oriented Analysis and Design (OOAD)
Requirement Analysis Document
1. Introduction
a. Purose of t!e system
b. "coe of t!e system
c. Objecti#es and "uccess $riteria of t!e Project
d. Definitions% acronyms and abbre#iations
&. $urrent "ystem
'. Proosed "ystem
a. O#er#ie
b. unctional Requirements
c. *on unctional Requirements
i. +sability
ii. Reliability
iii. Performance
i#. "uortability
#. Imlementation
#i. Interface
#ii. Pac,aging
#iii. -egal
d. "ystem odels
i. "cenarios
ii. +se $ase odel
iii. Object odel
-
7/23/2019 A_Three-Tier_Framework_for_Intruder_Information_Sharing_in_Sensor_Networks srs.doc
3/21
i#. Dynamic odel
#. +ser interface / *a#igational Pat!s and "creen oc,us
0. lossary
"ystem Design Document
1. Introduction
a. Purose of t!e "ystem
b. Design oals
c. Definitions% acronyms and abbre#iations
d. References
$urrent "oftare Arc!itecture
&. Proosed "oftare Arc!itecture
a. O#er#ie
b. "ubsystem Decomosition
c. 2ardare 3 "oftare maing
d. Persistent Data management
e. Access $ontrol and "ecurity
f. lobal "oftare $ontrol
g. 4oundary $onditions
'. "ubsystem "er#ices
0. lossary
Imlementation "creens
5esting
$onclusion
4ibliogra!y
-
7/23/2019 A_Three-Tier_Framework_for_Intruder_Information_Sharing_in_Sensor_Networks srs.doc
4/21
ABSTRACT
In sensor netor,s% an intruder (i.e.% comromised node) identified and isolated in one lace can berelocated and3or dulicated to ot!er laces to continue attac,s6 !ence% detection and isolation of t!e same
intruder or its clones may !a#e to be conducted reeatedly% asting scarce netor, resources.
5!erefore% once an intruder is identified% it s!ould be ,non to all innocent nodes suc! t!at t!e
intruder or its clones can be recognized !en aearing else!ere. 2oe#er% secure% efficient and scalable
s!aring of intruder information remains a c!allenging and unsol#ed roblem.
5o address t!is roblem% e roose a t!ree7tier frameor,% consisting of a #erifiable intruder
reorting (8IR) sc!eme% a quorum based cac!ing (94$) sc!eme for efficiently roagating intruder reorts
to t!e !ole netor,% and a collaborati#e 4loom ilter ($4) sc!eme for !andling intruder information
locally. :;tensi#e analysis and e#aluations are also conducted to #erify t!e efficiency and scalability of t!e
roosed frameor,.
-
7/23/2019 A_Three-Tier_Framework_for_Intruder_Information_Sharing_in_Sensor_Networks srs.doc
5/21
INTRODUCTION
Due to unattended deloyment en#ironment and absence of tamer resistance% sensor netor,s are
#ulnerable to #arious attac,s. In resonse% sc!emes !a#e been roosed to identify intruders (i.e.%
comromised nodes) misbe!a#ing in routing% localization% and ot!er scenarios.
Once an intruder is identified% it is isolated by its detectors. 2oe#er% t!is is inadequate. *odes ot!er
t!an t!ese detectors s!ould also be aare of t!e intruder6 ot!erise% t!e intruder can be relocated or
dulicated to ot!er laces to continue attac,s.
5o s!are intruder information it! all sensor nodes% t!e detectors may generate and flood intruder
reorts to t!e !ole netor,% directly or t!roug! trusted members!i ser#ers6 ot!er nodes recei#e and
record t!e reorts to maintain t!eir ,noledge of intruders. 5!is aroac!% !oe#er% !as folloing security
and erformance issues