+ All Categories
Home > Engineering > Secure and efficient data transmission for cluster based wireless sensor network

Secure and efficient data transmission for cluster based wireless sensor network

Date post: 15-Aug-2015
Category:
Upload: raja-shekhar
View: 401 times
Download: 4 times
Share this document with a friend
Popular Tags:
25
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks Under the guidance of: Presented by: Prof Mr. RAMESH JADHAV Rajashekhar Assist professor CSE Dept 3AE13SCN12 AIET Kalaburagi
Transcript

Secure and Efficient Data Transmission

for Cluster-Based Wireless Sensor Networks

Under the guidance of: Presented by:

Prof Mr. RAMESH JADHAV Rajashekhar

Assist professor CSE Dept 3AE13SCN12

AIET Kalaburagi

CONTENTS

INTRODUCTION

LITERATURE REVIEW

PROBLEM STATEMENT AND OBJECTIVE

SYSTEM ANALYSIS

SYSTEM SPECIFICATION

FEASIBILITY STUDY

SYSTEM DESIGN

CONCLUSION

REFERENCES

INTRODUCTION

Clustering is an effective and practical way

to enhance the system performance of WSNs.

• clusters are formed dynamically and

periodically.

TWO SECURE DATA TRANSMISSION PROTOCOLS

SET-IBS.

secure and efficient data transmission by using

the identity-based digital signature.

SET-IBOOS.

secure and efficient data transmission by using

he identity-based online/offline digital

signature.

CONTINUED……

SET-IBS.

security relies on the hardness of the Diffie-

Hellman problem in the pairing domain.

D-H is a method of digital encryption that

uses numbers raised to specific powers to produce

decryption keys on the basis of components

that are never directly transmitted.

CONTINUED……

SET-IBOOS. security relies on the hardness of

the discrete logarithm problem.

Reduces the computational overhead for protocol security, which is

crucial for WSNs.

LITERATURE SURVEY

A.A. Abbasi and M. Younis, “A Survey on

Clustering Algorithms for Wireless Sensor

Networks,”Computer Comm., vol. 30, nos. 14/

15, pp. 2826-2841, 2007.

Clustering is introduced to WSNs because it has

proven to be an effective approach to provide better

data aggregation and scalability for large WSNs.

CONTINUED……

S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007.

The main goal of this research is concerning clustering protocols to minimize the energy consumption of each node, and maximize the network lifetime of wireless sensor networks.

CONTINUED……

S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011.

Hierarchical or cluster-base routing protocol for WSNs is the most energy-efficient among other routing protocols.

CONTINUED……

R. Yasmin, E. Ritter, and G. Wang, “Anuthentication

Framework for Wireless Sensor Networks Using

Identity-Based Signatures,” Proc. IEEE Int’l Conf.

Computer and Information Technology (CIT), pp. 882-

889, 2010.

Authentication is a crucial security requirement to avoid

attacks against secure communication, and to mitigate DoS

attacks exploiting the limited resources of sensor nodes.

CONTINUED……

W.Heinzelman,A.Chandrakasan,andH.Balakrishnan

, “An Application-Specific Protocol Architecture for

Wireless Micro sensor Networks,” IEEE Trans.

Wireless Comm., vol. 1, no. 4, pp. 660 670, Oct.

2002.

Networking together hundreds or thousands of cheap

micro sensor nodes allows users to accurately monitor a

remote environment by intelligently combining the data

from the individual nodes.

Statement of Problem

To provide Secure and Efficient Data

Transmission for Cluster-Based Wireless

Sensor Networks

Objective

The objective of the secure data

transmission for CWSNs is to guarantee a

secure and efficient data transmission

between leaf nodes and CHs, as well as

transmission between CHs and the BS.

SYSTEM ANALYSIS

EXISTING SYSTEM ALGORITHMSec LEACH Protocol

LEACH Protocol.• DISADVANTAGES• THERE IS NO FIXED ROUTING PATH WITH LESS

ENERGY CONSUMPTION.• THE ROUTING TECHNIQUE IS FLOODING.• WITH RESPECT TO BOTH COMPUTATION AND

COMMUNICATION COSTS

CONTINUED..

PROPOSED SYSTEMPROPOSED ALGORITHMSSET-IBS SET-IBOOS

ADVANTAGES OF PROPOSED SYSTEM OVERCOME OF COMPUTATION AND

COMMUNICATION OVERHEADFINDING SHORTEST PATH ALGORITHM

SYSTEM SPECIFICATION

FUNCTIONAL REQUIREMENTS.SERVICE PROVIDERGROUP OF CLUSTERFINIDING SHORTEST PATHWHILE FORDING CHECKS ATTACKERS

CONTINUED..

NON-FUNCTIONAL REQUIREMENTSSECURITYINTEGRITYENERGY EFFICIENCYRELIABLE

FEASIBILITY STUDY

ECONOMICAL STUDYTECHNICAL STUDYOPERATIONAL STUDY

SYSTEM DESIGN

DATA FLOW DIAGRAMSEQUENCE DIAGRAMUSE CASE DIAGRAM

Attacker Type: - 1).Passive Attack 2).Active Attack 3). Node Compromising Attack

REFERENCES

[1] Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.

[2] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007.

[3] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.

CONTINUED…

[4] A. Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, “An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol,” IEEE Trans. Parallel & Distributed Systems, vol. 13, no. 12, pp. 1290-1302, Dec. 2002.

[5] S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007.

THANK YOU


Recommended