Abstract

The key concept of my redundancy management is to exploit the tradeoff between energy consumption vs. to the gain of reliability, timeliness, and also security for maximizing the system useful lifetime in this paper I am proposing to explore more extensive malicious attacks in addition to packet dropping and bad mouthing attacks, each and every with some different implications for energy, security and also reliability, and the investigate intrusion detection and multipath routing based tolerance protocols to react to these attacks. Intrusion detection is a security mechanism which is used to identify those who are trying to break and misuse the system without authorization and also those who have legitimate access but misusing their privileges. Intrusion detection system (IDS) design for CPSs has attracted considerable attention. Detection techniques in general can be classified into three types: the signature based, the anomaly based, and the specification based techniques. In the area of signature based IDS techniques, an IDS for CPSs that tests an automated transform from XML parole to Snort signature in an electricity distribution laboratory. An IDS for CPSs that takes a multi trust hybrid approach using signature based detection and traffic analysis. My work is different from these studies in that I use specification based detection rather than signature based detection to deal with unknown attacker patterns. Wireless sensor networks are deployed in an unattended environment in which energy replenishment is difficult if not impossible. Due to some limited resources, a WSN must not be only satisfied by the application specific QoS requirements such as reliability, timelines and also security, but also minimize the consumption of energy to prolong the system's useful lifetime. Where the tradeoff between the energy consumption vs. reliability gain with that of the goal to maximize the WSN system lifetime has been well explored in the literature. However, here no before work exists to consider that the tradeoff in the presence of malicious attackers. The Intrusion detection system monitors the activities of the system, analyze the activities to determine, any of the activity is violating the security rules. Once an IDS determines that an unusual activity or an event that is known to cause an attack happens, it then generates an Introduction. Thus, very likely the system would employ an intrusion detection system (IDS) with the goal to detect and remove malicious node .Multipath routing is considered an effective mechanism for fault and intrusion tolerance to improve data delivery in WSNs. It satisfies the energy consumption through turn off the sensor nodes for period of time to save energy. The basic idea is that the probability of at least one path reaching the sink node or base station increases as I have more paths doing data delivery. While the most priority prior research focused on using multipath routing to improve the reliability, some attention has to be paid for using multipath routing to tolerate insider attacks. A cyber physical system (CPS) typically comprises sensors, actuators, control units, and physical objects for controlling and protecting a physical infrastructure. Because of the dire consequence of a CPS failure, protecting a CPS from malicious attacks is of paramount importance. In this paper, we address the reliability issue of a CPS designed to sustain malicious attacks over a prolonged mission period without energy replenishment. A CPS often operates in a rough environment wherein energy replenishment is not possible, and nodes may be compromised (or captured) at that times. Thus, an intrusion detection and response system (IDRS) must be detected as malicious nodes without unnecessarily wasting energy to prolong the system lifetime. Multipath routing is considered an effective mechanism for fault and intrusion tolerance to improve data delivery in WSNs. The basic possibility is that the probability of at least one path reaching the sink node or base station increases as I have more paths doing data delivery. While the most priority prior research focused on using multipath routing to improve reliability some attention has been paid to using multipath routing to tolerate insider attacks. Coming to these studies, however, largely (highly) ignored the tradeoff between QoS gain vs. energy consumption with which it can adversely shortens the system lifetime.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call