Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks Under the guidance of: Presented by: Prof Mr. RAMESH JADHAV Rajashekhar Assist professor CSE Dept 3AE13SCN12 AIET Kalaburagi
CONTENTS  INTRODUCTION  LITERATURE REVIEW  PROBLEM STATEMENT AND OBJECTIVE  SYSTEM ANALYSIS  SYSTEM SPECIFICATION  FEASIBILITY STUDY  SYSTEM DESIGN  CONCLUSION  REFERENCES
INTRODUCTION  Clustering is an effective and practical way to enhance the system performance of WSNs. • clusters are formed dynamically and periodically.
TWO SECURE DATA TRANSMISSION PROTOCOLS  SET-IBS. secure and efficient data transmission by using the identity-based digital signature.  SET-IBOOS. secure and efficient data transmission by using he identity-based online/offline digital signature.
CONTINUED……  SET-IBS. security relies on the hardness of the Diffie- Hellman problem in the pairing domain. D-H is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted.
CONTINUED……  SET-IBOOS. security relies on the hardness of the discrete logarithm problem. Reduces the computational overhead for protocol security, which is crucial for WSNs.
LITERATURE SURVEY  A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007. Clustering is introduced to WSNs because it has proven to be an effective approach to provide better data aggregation and scalability for large WSNs.
CONTINUED……  S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007. The main goal of this research is concerning clustering protocols to minimize the energy consumption of each node, and maximize the network lifetime of wireless sensor networks.
CONTINUED……  S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011. Hierarchical or cluster-base routing protocol for WSNs is the most energy-efficient among other routing protocols.
CONTINUED……  R. Yasmin, E. Ritter, and G. Wang, “Anuthentication Framework for Wireless Sensor Networks Using Identity- Based Signatures,” Proc. IEEE Int’l Conf. Computer and Information Technology (CIT), pp. 882-889, 2010. Authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploiting the limited resources of sensor nodes.
CONTINUED……  W.Heinzelman,A.Chandrakasan,andH.Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Micro sensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660 670, Oct. 2002. Networking together hundreds or thousands of cheap micro sensor nodes allows users to accurately monitor a remote environment by intelligently combining the data from the individual nodes.
Statement of Problem To provide Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
Objective  The objective of the secure data transmission for CWSNs is to guarantee a secure and efficient data transmission between leaf nodes and CHs, as well as transmission between CHs and the BS.
SYSTEM ANALYSIS  EXISTING SYSTEM ALGORITHM  Sec LEACH Protocol  LEACH Protocol. • DISADVANTAGES • THERE IS NO FIXED ROUTING PATH WITH LESS ENERGY CONSUMPTION. • THE ROUTING TECHNIQUE IS FLOODING. • WITH RESPECT TO BOTH COMPUTATION AND COMMUNICATION COSTS
CONTINUED..  PROPOSED SYSTEM  PROPOSED ALGORITHMS  SET-IBS  SET-IBOOS  ADVANTAGES OF PROPOSED SYSTEM  OVERCOME OF COMPUTATION AND COMMUNICATION OVERHEAD  FINDING SHORTEST PATH ALGORITHM
SYSTEM SPECIFICATION  FUNCTIONAL REQUIREMENTS.  SERVICE PROVIDER  GROUP OF CLUSTER  FINIDING SHORTEST PATH  WHILE FORDING CHECKS ATTACKERS
CONTINUED..  NON-FUNCTIONAL REQUIREMENTS  SECURITY  INTEGRITY  ENERGY EFFICIENCY  RELIABLE
FEASIBILITY STUDY  ECONOMICAL STUDY  TECHNICAL STUDY  OPERATIONAL STUDY
SYSTEM DESIGN  DATA FLOW DIAGRAM  SEQUENCE DIAGRAM  USE CASE DIAGRAM
 Attacker Type: - 1).Passive Attack 2).Active Attack 3). Node Compromising Attack
REFERENCES  [1] Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.  [2] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007.  [3] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.
CONTINUED…  [4] A. Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, “An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol,” IEEE Trans. Parallel & Distributed Systems, vol. 13, no. 12, pp. 1290-1302, Dec. 2002.  [5] S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007.
THANK YOU

Secure and efficient data transmission for cluster based wireless sensor network

  • 1.
    Secure and EfficientData Transmission for Cluster-Based Wireless Sensor Networks Under the guidance of: Presented by: Prof Mr. RAMESH JADHAV Rajashekhar Assist professor CSE Dept 3AE13SCN12 AIET Kalaburagi
  • 2.
    CONTENTS  INTRODUCTION  LITERATUREREVIEW  PROBLEM STATEMENT AND OBJECTIVE  SYSTEM ANALYSIS  SYSTEM SPECIFICATION  FEASIBILITY STUDY  SYSTEM DESIGN  CONCLUSION  REFERENCES
  • 3.
    INTRODUCTION  Clustering isan effective and practical way to enhance the system performance of WSNs. • clusters are formed dynamically and periodically.
  • 4.
    TWO SECURE DATATRANSMISSION PROTOCOLS  SET-IBS. secure and efficient data transmission by using the identity-based digital signature.  SET-IBOOS. secure and efficient data transmission by using he identity-based online/offline digital signature.
  • 5.
    CONTINUED……  SET-IBS. security relieson the hardness of the Diffie- Hellman problem in the pairing domain. D-H is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted.
  • 6.
    CONTINUED……  SET-IBOOS. security relieson the hardness of the discrete logarithm problem. Reduces the computational overhead for protocol security, which is crucial for WSNs.
  • 7.
    LITERATURE SURVEY  A.A.Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007. Clustering is introduced to WSNs because it has proven to be an effective approach to provide better data aggregation and scalability for large WSNs.
  • 8.
    CONTINUED……  S. Yiet al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007. The main goal of this research is concerning clustering protocols to minimize the energy consumption of each node, and maximize the network lifetime of wireless sensor networks.
  • 9.
    CONTINUED……  S. Sharmaand S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011. Hierarchical or cluster-base routing protocol for WSNs is the most energy-efficient among other routing protocols.
  • 10.
    CONTINUED……  R. Yasmin,E. Ritter, and G. Wang, “Anuthentication Framework for Wireless Sensor Networks Using Identity- Based Signatures,” Proc. IEEE Int’l Conf. Computer and Information Technology (CIT), pp. 882-889, 2010. Authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploiting the limited resources of sensor nodes.
  • 11.
    CONTINUED……  W.Heinzelman,A.Chandrakasan,andH.Balakrishnan, “An Application-SpecificProtocol Architecture for Wireless Micro sensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660 670, Oct. 2002. Networking together hundreds or thousands of cheap micro sensor nodes allows users to accurately monitor a remote environment by intelligently combining the data from the individual nodes.
  • 12.
    Statement of Problem Toprovide Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
  • 13.
    Objective  The objectiveof the secure data transmission for CWSNs is to guarantee a secure and efficient data transmission between leaf nodes and CHs, as well as transmission between CHs and the BS.
  • 14.
    SYSTEM ANALYSIS  EXISTINGSYSTEM ALGORITHM  Sec LEACH Protocol  LEACH Protocol. • DISADVANTAGES • THERE IS NO FIXED ROUTING PATH WITH LESS ENERGY CONSUMPTION. • THE ROUTING TECHNIQUE IS FLOODING. • WITH RESPECT TO BOTH COMPUTATION AND COMMUNICATION COSTS
  • 15.
    CONTINUED..  PROPOSED SYSTEM PROPOSED ALGORITHMS  SET-IBS  SET-IBOOS  ADVANTAGES OF PROPOSED SYSTEM  OVERCOME OF COMPUTATION AND COMMUNICATION OVERHEAD  FINDING SHORTEST PATH ALGORITHM
  • 16.
    SYSTEM SPECIFICATION  FUNCTIONALREQUIREMENTS.  SERVICE PROVIDER  GROUP OF CLUSTER  FINIDING SHORTEST PATH  WHILE FORDING CHECKS ATTACKERS
  • 17.
    CONTINUED..  NON-FUNCTIONAL REQUIREMENTS SECURITY  INTEGRITY  ENERGY EFFICIENCY  RELIABLE
  • 18.
    FEASIBILITY STUDY  ECONOMICALSTUDY  TECHNICAL STUDY  OPERATIONAL STUDY
  • 19.
    SYSTEM DESIGN  DATAFLOW DIAGRAM  SEQUENCE DIAGRAM  USE CASE DIAGRAM
  • 20.
     Attacker Type:- 1).Passive Attack 2).Active Attack 3). Node Compromising Attack
  • 23.
    REFERENCES  [1] Y.Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.  [2] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007.  [3] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.
  • 24.
    CONTINUED…  [4] A.Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, “An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol,” IEEE Trans. Parallel & Distributed Systems, vol. 13, no. 12, pp. 1290-1302, Dec. 2002.  [5] S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007.
  • 25.