Top Banner
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks Under the guidance of: Presented by: Prof Mr. RAMESH JADHAV Rajashekhar Assist professor CSE Dept 3AE13SCN12 AIET Kalaburagi
25

Secure and efficient data transmission for cluster based wireless sensor network

Aug 15, 2015

Download

Engineering

Raja Shekhar
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Secure and efficient data transmission for cluster based wireless sensor network

Secure and Efficient Data Transmission

for Cluster-Based Wireless Sensor Networks

Under the guidance of: Presented by:

Prof Mr. RAMESH JADHAV Rajashekhar

Assist professor CSE Dept 3AE13SCN12

AIET Kalaburagi

Page 2: Secure and efficient data transmission for cluster based wireless sensor network

CONTENTS

INTRODUCTION

LITERATURE REVIEW

PROBLEM STATEMENT AND OBJECTIVE

SYSTEM ANALYSIS

SYSTEM SPECIFICATION

FEASIBILITY STUDY

SYSTEM DESIGN

CONCLUSION

REFERENCES

Page 3: Secure and efficient data transmission for cluster based wireless sensor network

INTRODUCTION

Clustering is an effective and practical way

to enhance the system performance of WSNs.

• clusters are formed dynamically and

periodically.

Page 4: Secure and efficient data transmission for cluster based wireless sensor network

TWO SECURE DATA TRANSMISSION PROTOCOLS

SET-IBS.

secure and efficient data transmission by using

the identity-based digital signature.

SET-IBOOS.

secure and efficient data transmission by using

he identity-based online/offline digital

signature.

Page 5: Secure and efficient data transmission for cluster based wireless sensor network

CONTINUED……

SET-IBS.

security relies on the hardness of the Diffie-

Hellman problem in the pairing domain.

D-H is a method of digital encryption that

uses numbers raised to specific powers to produce

decryption keys on the basis of components

that are never directly transmitted.

Page 6: Secure and efficient data transmission for cluster based wireless sensor network

CONTINUED……

SET-IBOOS. security relies on the hardness of

the discrete logarithm problem.

Reduces the computational overhead for protocol security, which is

crucial for WSNs.

Page 7: Secure and efficient data transmission for cluster based wireless sensor network

LITERATURE SURVEY

A.A. Abbasi and M. Younis, “A Survey on

Clustering Algorithms for Wireless Sensor

Networks,”Computer Comm., vol. 30, nos. 14/

15, pp. 2826-2841, 2007.

Clustering is introduced to WSNs because it has

proven to be an effective approach to provide better

data aggregation and scalability for large WSNs.

Page 8: Secure and efficient data transmission for cluster based wireless sensor network

CONTINUED……

S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007.

The main goal of this research is concerning clustering protocols to minimize the energy consumption of each node, and maximize the network lifetime of wireless sensor networks.

Page 9: Secure and efficient data transmission for cluster based wireless sensor network

CONTINUED……

S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011.

Hierarchical or cluster-base routing protocol for WSNs is the most energy-efficient among other routing protocols.

Page 10: Secure and efficient data transmission for cluster based wireless sensor network

CONTINUED……

R. Yasmin, E. Ritter, and G. Wang, “Anuthentication

Framework for Wireless Sensor Networks Using

Identity-Based Signatures,” Proc. IEEE Int’l Conf.

Computer and Information Technology (CIT), pp. 882-

889, 2010.

Authentication is a crucial security requirement to avoid

attacks against secure communication, and to mitigate DoS

attacks exploiting the limited resources of sensor nodes.

Page 11: Secure and efficient data transmission for cluster based wireless sensor network

CONTINUED……

W.Heinzelman,A.Chandrakasan,andH.Balakrishnan

, “An Application-Specific Protocol Architecture for

Wireless Micro sensor Networks,” IEEE Trans.

Wireless Comm., vol. 1, no. 4, pp. 660 670, Oct.

2002.

Networking together hundreds or thousands of cheap

micro sensor nodes allows users to accurately monitor a

remote environment by intelligently combining the data

from the individual nodes.

Page 12: Secure and efficient data transmission for cluster based wireless sensor network

Statement of Problem

To provide Secure and Efficient Data

Transmission for Cluster-Based Wireless

Sensor Networks

Page 13: Secure and efficient data transmission for cluster based wireless sensor network

Objective

The objective of the secure data

transmission for CWSNs is to guarantee a

secure and efficient data transmission

between leaf nodes and CHs, as well as

transmission between CHs and the BS.

Page 14: Secure and efficient data transmission for cluster based wireless sensor network

SYSTEM ANALYSIS

EXISTING SYSTEM ALGORITHMSec LEACH Protocol

LEACH Protocol.• DISADVANTAGES• THERE IS NO FIXED ROUTING PATH WITH LESS

ENERGY CONSUMPTION.• THE ROUTING TECHNIQUE IS FLOODING.• WITH RESPECT TO BOTH COMPUTATION AND

COMMUNICATION COSTS

Page 15: Secure and efficient data transmission for cluster based wireless sensor network

CONTINUED..

PROPOSED SYSTEMPROPOSED ALGORITHMSSET-IBS SET-IBOOS

ADVANTAGES OF PROPOSED SYSTEM OVERCOME OF COMPUTATION AND

COMMUNICATION OVERHEADFINDING SHORTEST PATH ALGORITHM

Page 16: Secure and efficient data transmission for cluster based wireless sensor network

SYSTEM SPECIFICATION

FUNCTIONAL REQUIREMENTS.SERVICE PROVIDERGROUP OF CLUSTERFINIDING SHORTEST PATHWHILE FORDING CHECKS ATTACKERS

Page 17: Secure and efficient data transmission for cluster based wireless sensor network

CONTINUED..

NON-FUNCTIONAL REQUIREMENTSSECURITYINTEGRITYENERGY EFFICIENCYRELIABLE

Page 18: Secure and efficient data transmission for cluster based wireless sensor network

FEASIBILITY STUDY

ECONOMICAL STUDYTECHNICAL STUDYOPERATIONAL STUDY

Page 19: Secure and efficient data transmission for cluster based wireless sensor network

SYSTEM DESIGN

DATA FLOW DIAGRAMSEQUENCE DIAGRAMUSE CASE DIAGRAM

Page 20: Secure and efficient data transmission for cluster based wireless sensor network

Attacker Type: - 1).Passive Attack 2).Active Attack 3). Node Compromising Attack

Page 21: Secure and efficient data transmission for cluster based wireless sensor network
Page 22: Secure and efficient data transmission for cluster based wireless sensor network
Page 23: Secure and efficient data transmission for cluster based wireless sensor network

REFERENCES

[1] Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.

[2] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007.

[3] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.

Page 24: Secure and efficient data transmission for cluster based wireless sensor network

CONTINUED…

[4] A. Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, “An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol,” IEEE Trans. Parallel & Distributed Systems, vol. 13, no. 12, pp. 1290-1302, Dec. 2002.

[5] S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007.

Page 25: Secure and efficient data transmission for cluster based wireless sensor network

THANK YOU