Preview

5.1 Use Case Diagram

Best Essays
Open Document
Open Document
2225 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
5.1 Use Case Diagram
5. System design
5.1 Use case diagram
A use case diagram at its simplest is a representation of a user's interaction with the system that shows the relationship between the user and the different use cases in which the user is involved. A use case diagram can identify the different types of users of a system. The different use cases and will often be accompanied by other types of diagrams as well.

Figure 5.2: Use case Diagram

5.3 Use Case Analysis
5.3.1 Activity Diagram
The following activity diagram represents the flow where the node is checked for attacker and honest node.
Steps:
1. Initially network starts the transfer of packets through the AODV protocol.
2. Next the type of node is identified as normal node or attacker node(malicious
…show more content…
By using central authentication we can achieve our goal by saving the energy of nodes.

Figure 7.23 : Energy loss vs Time

7.3 Route Tracking Technique
7.3.1 Execution of Route Tracking Technique
Route tracking technique is trust based system which is used to avoid vampire attack. In this technique, trust value is provided to each and every node. Node with the trust value 1 is considered as trusted node and node with the trust value is considered as untrusted node. So that, untrusted nodes are getting neglected and packets are sent only through the nodes having trusted value.
In the figure 7.24, scenario shows that node number 14 is source node and node number 2 is destination node. Figure 7.24: Route Tracking Technique (a)
Figure 7.25 shows the Trust Manager, which defines the trust values for each and every node. As we can see in the previous scenario which is shown in the figure 7.18, Node 14 is source node which is having node number 5 as shortest distance neighbor but it includes node number 6 instead of node number 5. Because node number 5 having the trust value 0 so that it may b consider as malicious node.

Figure 7.25: Trust
…show more content…
586-590.
[112] Er.Richa Sharma, Dr.Rajiv Mahajan, Er.Satish Kumar,” Evaluating the performance of wireless network with & without load balancing using OPNET modeller”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol. 3, Issue 6, June 2014, pp. 2076-2080.
2. Vasserman E.Y., Hopper N.,”Vampire Attacks: Draining Life from Wireless Ad Hoc Networks”, Mobile Computing, IEEE Transactions on, vol.12, no.2, Feb. 2013, pp.318-332.
3. S.Prasanna, Srinivasa Rao, “An Overview of Wireless Sensor Networks Applications and Security”, International Journal of Soft Computing and Engineering, vol.2, no.2, May 2012, pp. 538-540.
4. Shio Kumar Singh, M P Singh, and D K Singh, “Energy Efficient Homogenous Clustering Algorithm for Wireless Sensor Networks”, International Journal of Wireless & Mobile Networks, vol.2, no.3, Aug. 2010, pp. 49-61.
5. D. G. Reina, M. Askalani, S. L. Toral, F. Barrero, E. Asimakopoulou, and N. Bessis, “A Survey on Multihop Ad Hoc Networks for Disaster Response Scenarios”, International Journal of Distributed Sensor Networks,

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 7 Exercise 1

    • 489 Words
    • 2 Pages

    The neighbor nodes forward the Route Request (RREQ) to the destination node. If Rushing attacks send duplicate Route Request (RREQ) to the neighbor node. If Request RREQ is from the true source address, then the system is regular and begins to transmit data packets otherwise repeat the process. This process is illustrated in Fig 1.…

    • 489 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Step 1: Construct a network diagram for the project. (NOTE: EF for activity H should be 19)…

    • 552 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    If node1 is a "man in the middle" then node4 is an "odd man out." In particular, node4 was unaccounted for in section 2 "Recording actual address mappings." Later you arp poisoned node2 and node0 from node1; how about arp poisoning node 4 from node1? You accomplish poisoning by sending a crafted arp message to a node. Comment on the ways and means of poisoning node4 from node1.…

    • 2570 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    PROJ 586 Final Exam

    • 872 Words
    • 4 Pages

    9. (TCO C) In addition to showing the technical constraints among activities, how does the network diagram logic also take into account resource constraints?…

    • 872 Words
    • 4 Pages
    Powerful Essays
  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Better Essays

    Case Study

    • 1118 Words
    • 5 Pages

    All the nodes are connected as of now. We have to add one more bridge between nodes A and L to make all the nodes have even degree. So, add a bridge between Altstadt and Kneiphof.…

    • 1118 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    LYT2 Task2

    • 4061 Words
    • 12 Pages

    This book provides generic approach architecture for the implementation of the wireless sensor networks. It proposes for a move into the routing protocols and improvement of networks through routing optimization, medium access and control of power while at the same time fulfilling the daily goals. It emphasizes on the importance to node information in the many wireless sensor network applications as well as the communication protocol. This solution can be applicable in the case of NHS since the use of wireless sensor networks can greatly help in transferring large data files, including the imaging files to…

    • 4061 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    net204 week 1 quiz

    • 534 Words
    • 5 Pages

    Every router makes its routing decisions based on the information it has in its routing table and on the information in its neighbor routing tables.…

    • 534 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    PROJ 586 Final Exam

    • 814 Words
    • 4 Pages

    9. (TCO C) Why are activities drawn in a serial relationship on a network diagram?…

    • 814 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Data Flow Diagram

    • 3020 Words
    • 13 Pages

    Data flow diagram is used by system analyst to put together a graphical representation of data processes throughout the organization. It depicts the broadest possible overview of system inputs, processes, and outputs. A series of layered data flow diagrams may be used to represent and analyze detailed procedures in the larger system.…

    • 3020 Words
    • 13 Pages
    Good Essays
  • Better Essays

    References: [1] J. Yick, B. Mukherjee, D. Ghosal, Wireless sensor network survey, Comput. Networks 52 (12) 2292–2330 (2008). [2] Suat Ozdemir a, Yang Xiao, Secure data aggregation in wireless sensor networks: A comprehensive overview, Computer Networks. 53, 2022–2037 (2009) [3] Wei Zhang, Yonghe Liu, Sajal K. Das, Pradip De, Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach, Pervasive and Mobile Computing. 4, 658–680 (2008) [4] S. Zhu, S. Setia, S. Jajodia, P. Ning, An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, in: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, pp. 260–272 (2004) [5] Wen TaoZhu, Jianying Zhou, Robert H. Deng, Feng Bao, Detecting node replication attacks in wireless sensor networks: A survey, Computer Networks 53, 945–960 (2009) [6] A. Perrig, R. Szewczyk, D. Tygar, V. Wen, D. Culler, SPINS: security protocols for sensor networks, Wireless Networks J. (WINE) 2 (5), 521 –534 (2002).…

    • 2530 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Stochastic Process

    • 326 Words
    • 2 Pages

    With the increasing trend towards wireless, WSNs are becoming popular due to their use in civil and military applications and for environmental monitoring. WSNs consist of large number of sensor nodes but power has limitations and they also communicate with radio. WSNs have potential applications in the places which are normally inaccessible, such as glaciers, war fields, disaster hit areas.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    - Longest match / Lowest AD / Lowest Metric / Overlapping Routes(Multiple routes to the same destination in the routing table) / Policy Routing (Will override all the above steps)…

    • 832 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In the past few years research is going on wireless sensor network. Due to their vast application potential in diverse field they are attracting attention .It can be used in almost every environment to collect information.…

    • 732 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    burning girls in borama city

    • 4510 Words
    • 19 Pages

    2.1.2 Network Flow . . . . . . . . . . . . . . . . . . . .…

    • 4510 Words
    • 19 Pages
    Powerful Essays