secure and efficient data transmission for cluster based wireless sensor network
TRANSCRIPT
Secure and Efficient Data Transmission
for Cluster-Based Wireless Sensor Networks
Under the guidance of: Presented by:
Prof Mr. RAMESH JADHAV Rajashekhar
Assist professor CSE Dept 3AE13SCN12
AIET Kalaburagi
CONTENTS
INTRODUCTION
LITERATURE REVIEW
PROBLEM STATEMENT AND OBJECTIVE
SYSTEM ANALYSIS
SYSTEM SPECIFICATION
FEASIBILITY STUDY
SYSTEM DESIGN
CONCLUSION
REFERENCES
INTRODUCTION
Clustering is an effective and practical way
to enhance the system performance of WSNs.
• clusters are formed dynamically and
periodically.
TWO SECURE DATA TRANSMISSION PROTOCOLS
SET-IBS.
secure and efficient data transmission by using
the identity-based digital signature.
SET-IBOOS.
secure and efficient data transmission by using
he identity-based online/offline digital
signature.
CONTINUED……
SET-IBS.
security relies on the hardness of the Diffie-
Hellman problem in the pairing domain.
D-H is a method of digital encryption that
uses numbers raised to specific powers to produce
decryption keys on the basis of components
that are never directly transmitted.
CONTINUED……
SET-IBOOS. security relies on the hardness of
the discrete logarithm problem.
Reduces the computational overhead for protocol security, which is
crucial for WSNs.
LITERATURE SURVEY
A.A. Abbasi and M. Younis, “A Survey on
Clustering Algorithms for Wireless Sensor
Networks,”Computer Comm., vol. 30, nos. 14/
15, pp. 2826-2841, 2007.
Clustering is introduced to WSNs because it has
proven to be an effective approach to provide better
data aggregation and scalability for large WSNs.
CONTINUED……
S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007.
The main goal of this research is concerning clustering protocols to minimize the energy consumption of each node, and maximize the network lifetime of wireless sensor networks.
CONTINUED……
S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011.
Hierarchical or cluster-base routing protocol for WSNs is the most energy-efficient among other routing protocols.
CONTINUED……
R. Yasmin, E. Ritter, and G. Wang, “Anuthentication
Framework for Wireless Sensor Networks Using
Identity-Based Signatures,” Proc. IEEE Int’l Conf.
Computer and Information Technology (CIT), pp. 882-
889, 2010.
Authentication is a crucial security requirement to avoid
attacks against secure communication, and to mitigate DoS
attacks exploiting the limited resources of sensor nodes.
CONTINUED……
W.Heinzelman,A.Chandrakasan,andH.Balakrishnan
, “An Application-Specific Protocol Architecture for
Wireless Micro sensor Networks,” IEEE Trans.
Wireless Comm., vol. 1, no. 4, pp. 660 670, Oct.
2002.
Networking together hundreds or thousands of cheap
micro sensor nodes allows users to accurately monitor a
remote environment by intelligently combining the data
from the individual nodes.
Statement of Problem
To provide Secure and Efficient Data
Transmission for Cluster-Based Wireless
Sensor Networks
Objective
The objective of the secure data
transmission for CWSNs is to guarantee a
secure and efficient data transmission
between leaf nodes and CHs, as well as
transmission between CHs and the BS.
SYSTEM ANALYSIS
EXISTING SYSTEM ALGORITHMSec LEACH Protocol
LEACH Protocol.• DISADVANTAGES• THERE IS NO FIXED ROUTING PATH WITH LESS
ENERGY CONSUMPTION.• THE ROUTING TECHNIQUE IS FLOODING.• WITH RESPECT TO BOTH COMPUTATION AND
COMMUNICATION COSTS
CONTINUED..
PROPOSED SYSTEMPROPOSED ALGORITHMSSET-IBS SET-IBOOS
ADVANTAGES OF PROPOSED SYSTEM OVERCOME OF COMPUTATION AND
COMMUNICATION OVERHEADFINDING SHORTEST PATH ALGORITHM
SYSTEM SPECIFICATION
FUNCTIONAL REQUIREMENTS.SERVICE PROVIDERGROUP OF CLUSTERFINIDING SHORTEST PATHWHILE FORDING CHECKS ATTACKERS
REFERENCES
[1] Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.
[2] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007.
[3] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.
CONTINUED…
[4] A. Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, “An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol,” IEEE Trans. Parallel & Distributed Systems, vol. 13, no. 12, pp. 1290-1302, Dec. 2002.
[5] S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007.