Majorppt

V
Data Sensing & Secured Data Forwarding in multi-hop Wireless Sensor Network  using MICAz based motes,[object Object],Presented by,[object Object],JayantPathak (2006ECS22),[object Object],Kumar Vikramjeet (2006ECS50)                    ,[object Object], ,[object Object],Under the Supervision of,[object Object],Mrs. Sonika Gupta ,[object Object]
Introduction to WSN,[object Object],   A wireless  sensor network  (WSN)  is  a wireless network consisting of  spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants at different locations.,[object Object],Characteristics of WSN ,[object Object],	 Very Limited Resources,[object Object],	 Unreliable Communication,[object Object],	 Unattended Operation,[object Object]
Wireless Sensor Networks,[object Object],Sensor nodes sense the data & send it upward in the network hierarchy,[object Object],Base Station logs the collective data. ,[object Object],Sensor nodes/motes may act as router & perform data aggregation   ,[object Object]
APPLICATIONS Of WIRELESS SENSOR NETWORKS,[object Object]
Benefits of Multi-hop network,[object Object],Access Point  based Network,[object Object],Multi-hop network,[object Object],AP-based topology with maximum coverage and throughput environment is challenging.,[object Object],Range & data transfer is affected by,[object Object],        - node location,[object Object],	  -  type of house,[object Object],Multi-hop topology - design of future home wireless networks and requirements for future wifi-enabled consumer electronic devices,[object Object],Advantages ,[object Object],          - wide coverage attained      by nodes location ,[object Object],          - implementation of mesh   ,[object Object]
Security threats in Sensor Networks,[object Object],Adversaries can easily sniff on, intercept, inject and alter transmitted data.,[object Object],Adversaries can Interact with networks from a distance by inexpensive radio transceivers and powerful workstations.,[object Object],Resource consumption attacks - Adversaries can repeatedly send packets to drain nodes battery and waste network bandwidth, can steal nodes.,[object Object]
Example of Intruder,[object Object],Attacks,[object Object],Type 1,[object Object],Type 2,[object Object],Battery consumed,[object Object],Bandwidth loss,[object Object],Data packet,[object Object],Data packet,[object Object],A,[object Object],B,[object Object],Attacked(packet spoofed),[object Object],IN,[object Object],False packet,[object Object],False packet,[object Object],False packet,[object Object]
 Solutions of threat,[object Object],A specific frequency channel is allocated to WSN at a time which is designated by RF_Channel,[object Object],Group_id should be altered manually ,[object Object],RF_Channel altered manually after regular interval,[object Object],Each pair of motes share different symmetric keys.,[object Object],All communication are encrypted symmetric keys between motes.,[object Object]
Diffie-Hellman Key Exchange Algorithm ,[object Object],[object Object]
Each side then generates a public key (letter B), which is a derivative of the private key.
The two systems then exchange their public keys. Each side of the communication now has their own private key and the other systems public key (letter C).
The Diffie-Hellman protocol generates “shared secrets” – identical cryptographic key shared by each side of the communication.,[object Object]
Sensor node Architecture,[object Object],[object Object]
 processes data and controls the functionality of other components in the sensor node.
 The functionality of both transmitter and receiver are combined into a single device know as transceivers
 Sensors sense or measure physical data of the area to be monitored.
The continual analog signal sensed by the sensors is digitized by an Analog-to-digital converter and sent to controllers for further processing.
Power consumption in the sensor node is for the Sensing, Communication and Data Processing.
kinds of memory are on-chip memory of a microcontroller and Flash memory
Micro-controller:ATMEGA 128
Transceiver: TI CC2420 802.15.4/ZigBee compliant radio 2.4-2.48 GHz (250 kbps data rate)
External Memory: 128K Flash
Program + Data Memory: 4K RAM
Programming : nesC
Platforms: TinyOS, SOS, MantisOS and Nano-RK Support
2.6-3.3 V power supplyIn Context of MICAz motes,[object Object]
Appropriate encryption for WSN,[object Object],Encryption security depends on Key size & No. of rounds ,[object Object],Key length is limited by the limited processing power of motes,[object Object],Keysize         Processing  energy         Battery life,[object Object],Skipjack is probable candidate ,[object Object],Block size = 64 bits,[object Object],Key length = 80 bits 		No. of Rounds = 32  ,[object Object],More No. of Rounds ,[object Object],More time needed to crack the key  ,[object Object]
1 de 27

Recomendados

Wsn handbook por
Wsn handbookWsn handbook
Wsn handbooknarmada alaparthi
81 vistas39 diapositivas
Wireless_Sensor_security por
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
168 vistas66 diapositivas
Remote authentication via biometrics1 por
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1Omkar Salunke
393 vistas22 diapositivas
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall por
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET Journal
12 vistas3 diapositivas

Más contenido relacionado

La actualidad más candente

Wireless Sensor Networks por
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksAbbas Ali Qureshi
980 vistas18 diapositivas
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net... por
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...Walchand college of Engineering,Sangli
850 vistas39 diapositivas
Data acquisition and storage in Wireless Sensor Network por
Data acquisition and storage in Wireless Sensor NetworkData acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkRutvik Pensionwar
502 vistas25 diapositivas
Design of Real-time Self Establish Wireless Sensor For Dynamic Network por
Design of Real-time Self Establish Wireless Sensor For Dynamic NetworkDesign of Real-time Self Establish Wireless Sensor For Dynamic Network
Design of Real-time Self Establish Wireless Sensor For Dynamic NetworkIJTET Journal
233 vistas4 diapositivas
Sem por
SemSem
SemHitesh Mohapatra
105 vistas30 diapositivas
Presentation on Wireless border security system por
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security systemStudent
3.1K vistas14 diapositivas

La actualidad más candente(20)

Data acquisition and storage in Wireless Sensor Network por Rutvik Pensionwar
Data acquisition and storage in Wireless Sensor NetworkData acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor Network
Rutvik Pensionwar502 vistas
Design of Real-time Self Establish Wireless Sensor For Dynamic Network por IJTET Journal
Design of Real-time Self Establish Wireless Sensor For Dynamic NetworkDesign of Real-time Self Establish Wireless Sensor For Dynamic Network
Design of Real-time Self Establish Wireless Sensor For Dynamic Network
IJTET Journal233 vistas
Presentation on Wireless border security system por Student
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security system
Student3.1K vistas
Wireless border security system por Bllu
Wireless border security systemWireless border security system
Wireless border security system
Bllu3.1K vistas
Border security using wireless integrated network sensors(wins) por PRADEEP Cheekatla
Border security using wireless integrated network sensors(wins)Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)
PRADEEP Cheekatla33.7K vistas
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02 por Sindhu Nathan
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Sindhu Nathan1.1K vistas
Black hole attack por Richa Kumari
Black hole attackBlack hole attack
Black hole attack
Richa Kumari4.8K vistas
6. security in wireless sensor netwoks por Rushin Shah
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
Rushin Shah1.3K vistas
Border security por Farah Naaz
Border securityBorder security
Border security
Farah Naaz4.5K vistas
VET4SBO Level 3 module 1 - unit 2 - 0.009 en por Karel Van Isacker
VET4SBO Level 3   module 1 - unit 2 - 0.009 enVET4SBO Level 3   module 1 - unit 2 - 0.009 en
VET4SBO Level 3 module 1 - unit 2 - 0.009 en
Karel Van Isacker42 vistas
Wireless Mesh Networking - A development path por everyunitone
Wireless Mesh Networking - A development pathWireless Mesh Networking - A development path
Wireless Mesh Networking - A development path
everyunitone1.1K vistas
Sustainable Lightweight Wireless Communication Stack por IJERA Editor
Sustainable Lightweight Wireless Communication StackSustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication Stack
IJERA Editor27 vistas
SENSOR NETWORK PLATFORMS AND TOOLS por juno susi
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
juno susi450 vistas
Wireless sensor networks dcs por Abhishek Raj
Wireless sensor networks dcsWireless sensor networks dcs
Wireless sensor networks dcs
Abhishek Raj451 vistas

Destacado

Crosswind Kite energy por
Crosswind Kite energyCrosswind Kite energy
Crosswind Kite energyAndrea Vitali
429 vistas20 diapositivas
ENERGY KITES por
ENERGY KITESENERGY KITES
ENERGY KITESAswathy K
12.4K vistas23 diapositivas
Energy kite por
Energy kiteEnergy kite
Energy kiteMonica Murarisetti
10K vistas18 diapositivas
Airborne wind energy system ppt por
Airborne wind energy system pptAirborne wind energy system ppt
Airborne wind energy system pptAnkit Panghal
14.2K vistas25 diapositivas
Kites wind power generation por
Kites wind power generationKites wind power generation
Kites wind power generationsuresh kakavakam
7.1K vistas19 diapositivas
Kites por
KitesKites
Kitesrobert ponzio
971 vistas16 diapositivas

Destacado(9)

ENERGY KITES por Aswathy K
ENERGY KITESENERGY KITES
ENERGY KITES
Aswathy K12.4K vistas
Airborne wind energy system ppt por Ankit Panghal
Airborne wind energy system pptAirborne wind energy system ppt
Airborne wind energy system ppt
Ankit Panghal14.2K vistas
Kite wind generator por MD NAWAZ
Kite wind generatorKite wind generator
Kite wind generator
MD NAWAZ1.2K vistas
Kite wind generator 1 (sai).pptx (sai raju) por MD NAWAZ
Kite wind generator 1 (sai).pptx (sai raju)Kite wind generator 1 (sai).pptx (sai raju)
Kite wind generator 1 (sai).pptx (sai raju)
MD NAWAZ1.6K vistas

Similar a Majorppt

Sensor net por
Sensor netSensor net
Sensor netInes Bahram
1.3K vistas52 diapositivas
gcettb presentation on sensor network por
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
349 vistas25 diapositivas
Resilience in the ZigBee Residential Mode por
Resilience in the ZigBee Residential ModeResilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential ModeAleph Tav Technologies Private Limited
516 vistas13 diapositivas
Energy aware routing for wireless sensor networks por
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksThesis Scientist Private Limited
750 vistas71 diapositivas
Nt1310 Unit 5 Paper por
Nt1310 Unit 5 PaperNt1310 Unit 5 Paper
Nt1310 Unit 5 PaperShannon Gutierrez
2 vistas46 diapositivas
CS6003 AD HOC AND SENSOR NETWORKS por
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
13.3K vistas96 diapositivas

Similar a Majorppt(20)

gcettb presentation on sensor network por rahulkumargiri
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
rahulkumargiri349 vistas
Sensor networks a survey por wsnapple
Sensor networks a surveySensor networks a survey
Sensor networks a survey
wsnapple4.5K vistas
Security in wireless sensor network por Adit Pathak
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
Adit Pathak5.7K vistas
Cdma Security por guestb2cc28
Cdma SecurityCdma Security
Cdma Security
guestb2cc284.3K vistas
Ppt on low power wireless sensor network 5th sem por shikhathegreat
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
shikhathegreat5.3K vistas
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO... por cscpconf
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
cscpconf61 vistas
Experimental Analysis of an Energy-Efficient WSN por idescitation
Experimental Analysis of an Energy-Efficient WSNExperimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSN
idescitation697 vistas
CISSP Week 6 por jemtallon
CISSP Week 6CISSP Week 6
CISSP Week 6
jemtallon1.5K vistas
Data Center Network Design Using Metrics And Their Results... por Sharon Roberts
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
Sharon Roberts3 vistas

Último

Volf work.pdf por
Volf work.pdfVolf work.pdf
Volf work.pdfMariaKenney3
66 vistas43 diapositivas
Monthly Information Session for MV Asterix (November) por
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)Esquimalt MFRC
91 vistas26 diapositivas
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx por
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxISSIP
407 vistas50 diapositivas
GCSE Media por
GCSE MediaGCSE Media
GCSE MediaWestHatch
48 vistas46 diapositivas
REPRESENTATION - GAUNTLET.pptx por
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptxiammrhaywood
151 vistas26 diapositivas
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptx por
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptxCollective Bargaining and Understanding a Teacher Contract(16793704.1).pptx
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptxCenter for Integrated Training & Education
96 vistas57 diapositivas

Último(20)

Monthly Information Session for MV Asterix (November) por Esquimalt MFRC
Monthly Information Session for MV Asterix (November)Monthly Information Session for MV Asterix (November)
Monthly Information Session for MV Asterix (November)
Esquimalt MFRC91 vistas
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx por ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP407 vistas
GCSE Media por WestHatch
GCSE MediaGCSE Media
GCSE Media
WestHatch48 vistas
REPRESENTATION - GAUNTLET.pptx por iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood151 vistas
How to empty an One2many field in Odoo por Celine George
How to empty an One2many field in OdooHow to empty an One2many field in Odoo
How to empty an One2many field in Odoo
Celine George97 vistas
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... por Ms. Pooja Bhandare
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Ms. Pooja Bhandare166 vistas
The Accursed House by Émile Gaboriau por DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta234 vistas
Create a Structure in VBNet.pptx por Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P80 vistas
The basics - information, data, technology and systems.pdf por JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena1156 vistas
Classification of crude drugs.pptx por GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra14104 vistas
Relationship of psychology with other subjects. por palswagata2003
Relationship of psychology with other subjects.Relationship of psychology with other subjects.
Relationship of psychology with other subjects.
palswagata200377 vistas

Majorppt