A secure barrier coverage scheduling framework for WSN-based IoT applications
ABSTARCT :
Barrier coverage scheduling is an energy conservation scheme in which a subset of sensor nodes with overlapped sensing area (also called barrier) is activated to meet the key Quality of Service (QoS) requirements such as energy-efficiency, coverage, and connectivity. However, sudden and unexpected node failures in a barrier due to security attacks such as Denial of Service (DoS) poses a challenge for maintaining the desired QoS levels. In this paper, we propose a secure barrier coverage scheduling scheme called SEC2 , which prevents QoS degradation in the event of security breaches. This scheme uses a fully weighted attributed dynamic graph model in which a novel attribute-based weight balancing greedy strategy is used to construct barriers. A weighted averaging-based K-means Spectral, and Hierarchical (WKSH) cluster ensemble scheme is proposed to secure a barrier from malicious attacks. WKSH is a graph-based anomaly detection scheme based on weighted Euclidean distance computation and weighted average consensus. The experimental result shows that SEC2 guarantees the required QoS at all times. Moreover, the proposed WKSH shows better accuracy in the classification and detection of attacks in the barrier.
EXISTING SYSTEM :
? Smart connectivity with existing networks and contextaware computation using network resources is an indispensable part of IoT.
? The IoT is likely to replace the traffic information provided by the existing sensor networks of inductive loop vehicle detectors employed at the intersections of existing traffic control systems.
? Existing/new applications deployed as a hosted service and accessed over the Internet is referred to as SaaS.
? Energy is the main consideration for the existing routing protocols.
? In such a scenario, the existing routing protocols should suffice in practical implementation with minor modifications.
DISADVANTAGE :
? The coverage problem in wireless sensor networks (WSNs) can be generally defined as a measure of how effectively a network field is monitored by its sensor nodes.
? The failures of sensor nodes in the barrier can significantly impact the efficacy of barrier scheduling to meet QoS requirements.
? However, to the best of our knowledge, none of the existing studies analyze, review and provide a clear description of all features that cover all factors as well as classify the coverage problems in its entirety.
? The protocols were mainly classified, into two categories: k-coverage verification protocols and sleep scheduling protocols for k-coverage problems.
PROPOSED SYSTEM :
• The proposed Cloud centric vision comprises of a flexible and open architecture that is user centric and enables different players to interact in the IoT framework.
• It allows interaction in a manner suitable for their own requirements, rather than the IoT being thrust upon them.
• An architecture based on cloud computing at the center has been proposed in this paper.
• Several MAC protocols have been proposed for various domains with TDMA (collision free), CSMA (low traffic efficiency) and FDMA (collision free but requires additional circuitry in nodes) schemes available to the user.
ADVANTAGE :
? We give a thorough discussion on the open issues associated with the design of realistic energy-efficient coverage protocols for WSNs.
? Moreover, the performance of these protocols is limited by the challenges on determining an accurate radio model for the sensor nodes in the network.
? However, developing solutions with high-performance EA for the coverage problem in WSNs remains an open issue.
? We found that the performance of these protocols is mainly limited by challenges related to determining a more realistic coverage model for the sensor nodes in the networks.
? A weight coefficient between the two metrics is employed to model the trade-off between coverage rate and energy efficiency.
|