Your SlideShare is downloading. ×
0
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
paper sensor dhe shnderrues
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

paper sensor dhe shnderrues

231

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
231
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Kontrolli i sigurt me ane te pershtatjes se topologjise ne rrjetat me sensor wireless (Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks) Ing.Bsc Arvit VARFAJ
  • 2. 11 1 2 7 4 5 6 3 8 9 10 Literatura te meparshme SADTCA Faza I: Detektimi i antinyjeve Faza II: Krijimi i grupimeve Zgjedhja e nyjes gateway Faza III: Shperndarja e celesave Faza IV: Rifreskimi i celesave Percaktimi i zonave ne karantine Karantina per grupimet & Karantina per nyjet Zonat e infektuara Simulimi Perfundime 4 4.1
  • 3. Literatura te meparshme <ul><li>SULMET SPAM </li></ul><ul><li>Acknowledgement spoofing. </li></ul><ul><li>Selective forwarding. </li></ul><ul><li>Sybil attacks. </li></ul><ul><li>Wormholes attacks. </li></ul><ul><li>Sinkhole attacks. </li></ul><ul><li>Hello flood attacks. </li></ul><ul><li>Algoritma te meparshem </li></ul><ul><li>DADS (Detect and Defend Spam) </li></ul><ul><li>QRS (Quarantine Region Scheme) </li></ul>
  • 4. SADTCA <ul><li>Fazat e SADTCA </li></ul><ul><li>Detektimi i antinyjeve </li></ul><ul><li>Krijimi i grupimeve </li></ul><ul><li>Shperndarja e celesave </li></ul><ul><li>Rifreskimi i celesave </li></ul><ul><li>Cdo nyje permban: </li></ul><ul><li>Celesi i Parashperndare, Celesi i Grupimit, Celesi Gateway </li></ul><ul><li>Mesazh Identifikimi </li></ul><ul><li>Stack i Celesave </li></ul>
  • 5. Faza I: Detektimi i antinyjeve <ul><li>Cdo sensor ne momentin fillestar i transmeton te gjithe fqinjeve nje mesazh Hello qe te identifikoje fqinjet e tij , enkripton kete informacion (tekst i thjeshte) dhe me pas e transmeton; kur sensori fqinj merr mesazhin Hello , ai e dekripton ate. Nqs dekriptimi eshte i sukseshem nyja konsiderohet normale perndryshe kemi te bejme me antinyje </li></ul>
  • 6. Faza II: Krijimi i Grupimeve
  • 7.  
  • 8. Zgjedhja Gateway
  • 9.  
  • 10. <ul><li>Ne kete faze, Celesi I Grupimit dhe Celesi Gateway , enkriptohen me Celesin e parashperndare shperndahen lokalisht. </li></ul><ul><li>Celesi I Grupimit eshte nje celes I cili shperndahet nga nyja kryesore e grupimit ne te gjithe anetaret e grupimit , ky celes perdoret per sigurimin e mesazheve qe transmetohen lokalisht . </li></ul><ul><li>Ne menyre qe te krijojme nje kanal te sigurt komunikimi ndernjet grupimeve ,perdoren Celesat Gateways ndermjet grupimeve fqinje </li></ul>Faza III: Shperndarja e Celesave
  • 11. Faza IV: Rifreskimi i celesave
  • 12. <ul><li>Metoda 1: Karantina per Grupimet </li></ul><ul><li>Metoda 2: Karantina per Nyjet </li></ul><ul><li>Metoda 3: Zonat e Infektuara </li></ul>Percaktimi i zonave ne karantine
  • 13. Karantina per Grupimet & Karantina per Nyjet
  • 14. Zonat e Infektuara
  • 15. Rasti I: Karantina per Grupimet Rasti II: Karantina per Nyjet
  • 16. Karantina per Zonat e Infektuara <ul><li>O =1/3 O=1/5 </li></ul>
  • 17. Conclusions <ul><li>We describe a secure protocol for topology management in wireless sensor networks. By adaptively forming quarantine regions, the proposed secure protocol is demonstrated to reach a network security agreement and can effectively protect the network from energy-exhaustion attacks. </li></ul><ul><li>Therefore, in a hierarchical network topology, the SADTCA scheme can adapt cluster control and neighborhood control in order to achieve dynamic topology management of the spam attacks. </li></ul>

×