0
Submitted to
I.Anitha Rani
Submitted by
Y.Keerthi Reddy(10JM1517),
V.Triveni(10JM1A0530),
K.T.V.N.Lakshmi(10JM1A0527).
PRI...
ABSTRACT
• two-tiered sensor networks
• benefits of power and storage
saving for sensors as well as the
efficiency of quer...
EXISTING SYSTEM
Existing Wireless sensor networks once sensor nodes have been
deployed, there will be minimal manual inter...
PROPOSED SYSTEM
To preserve the privacy and integrity of range queries in
sensor networks
uses the bucket-partitioning f...
REQUIREMENTS
Software Requirements:
• O S : Windows XP or more
• Technology :JAVA, Swing
• Database : MS- Access
Hardware ...
MODULES
• SafeQ
• Integrity
• Privacy
• Range Queries
• Sink
• Storage Node
SAFEQ
• SafeQ is a protocol that prevents attackers from gaining
information from both sensor collected data and sink issu...
INTEGRITY
The sink needs to detect whether a query result from a
storage node includes forged data items or does not incl...
PRIVACY
To preserve privacy, SafeQ uses a novel technique to encode
both data and queries such that a storage node can co...
RANGE QURIES
The queries from the sink are range queries. A range query “is
a common database operation finding all the d...
SINK
The sink is the point of contact for users of the sensor
network.
 Each time the sink receives a question from a us...
STORAGE NODE
 Storage nodes are powerful wireless devices that are
equipped with much more storage capacity and computing...
DATAFLOW DIAGRAM
DATAFLOW DIAGRAM
SINK
USECASE DIAGRAM
CLASS DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
SCREEN SHOTS
Sensor node sends file
Negative acknowledgement
False Positive
File stores in Storage Node
Sink
View File Details
Receive File
Authentication to View
Authentication Valid
Authentication Invalid
CONCLUSION
We make three key contributions in this paper.
SafeQ significantly strengthens the security of two-tiered
sens...
Any Queries????????
Privacy and integrity-preserving range queries
Upcoming SlideShare
Loading in...5
×

Privacy and integrity-preserving range queries

368

Published on

In two tiered wireless sensor network Storage is node is being attacked by hacker so we provide solution by using SafeQ protocol

Published in: Education, Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
368
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
25
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Privacy and integrity-preserving range queries"

  1. 1. Submitted to I.Anitha Rani Submitted by Y.Keerthi Reddy(10JM1517), V.Triveni(10JM1A0530), K.T.V.N.Lakshmi(10JM1A0527). PRIVACY- AND INTEGRITY- PRESERVING RANGE QUERIES IN SENSOR NETWORKS
  2. 2. ABSTRACT • two-tiered sensor networks • benefits of power and storage saving for sensors as well as the efficiency of query processing • Attackers attracted on storage nodes • SafeQ also allows a sink to detect compromised storage nodes • To preserve integrity and privacy, SafeQ • propose two schemes—one using Merkle hash trees and another using a new data structure called neighborhood chains • To reduce communication cost we use bloom filters
  3. 3. EXISTING SYSTEM Existing Wireless sensor networks once sensor nodes have been deployed, there will be minimal manual intervention and monitoring. But, when nodes are deployed in a hostile environment and there is no manual monitoring. DRAWBACKS • First, the attacker may obtain sensitive data that has been, or will be, stored in the storage node. • Second, the compromised storage node may return forged data for a query. • Third, this storage node may not include all data items that satisfy the query.
  4. 4. PROPOSED SYSTEM To preserve the privacy and integrity of range queries in sensor networks uses the bucket-partitioning for database privacy. The basic idea is to divide the domain of data values into multiple buckets. SafeQ also allows a sink to detect compromised storage nodes when they misbehave. The sink is the point of contact for users of the sensor network.
  5. 5. REQUIREMENTS Software Requirements: • O S : Windows XP or more • Technology :JAVA, Swing • Database : MS- Access Hardware Requirements: • Processor : Pentium IV • Hard Disk : 40 GB. • RAM :256 Mb.
  6. 6. MODULES • SafeQ • Integrity • Privacy • Range Queries • Sink • Storage Node
  7. 7. SAFEQ • SafeQ is a protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries. • SafeQ also allows a sink to detect compromised storage nodes when they misbehave. • To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values.
  8. 8. INTEGRITY The sink needs to detect whether a query result from a storage node includes forged data items or does not include all the data that satisfy the query. There are two key challenges in solving the privacyand integrity-preserving range query problem.  First, a storage node needs to correctly process encoded queries over encoded data without knowing their actual values.  Second, a sink needs to verify that the result of a query contains all the data items that satisfy the query and does not contain any forged data.
  9. 9. PRIVACY To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their actual values. A compromised storage node cannot gain information from sensor collected data and sink issued queries A storage node can perform query processing
  10. 10. RANGE QURIES The queries from the sink are range queries. A range query “is a common database operation finding all the data items collected at time-slot in the range”. Note that the queries in most sensor network applications can be easily modelled as range queries.
  11. 11. SINK The sink is the point of contact for users of the sensor network.  Each time the sink receives a question from a user, it first translates the question into multiple queries and then disseminates the queries to the corresponding storage nodes The sink unifies the query results from multiple storage nodes into the final answer and sends it back to the user. Sink can detect compromised storage nodes when they misbehave.
  12. 12. STORAGE NODE  Storage nodes are powerful wireless devices that are equipped with much more storage capacity and computing power than sensors. The storage node collects all data from the sensor nodes. The storage node can’t view the actual value of sensor node data. If the storage node trying to view the sensor node data, sink detect misbehave of storage node.
  13. 13. DATAFLOW DIAGRAM
  14. 14. DATAFLOW DIAGRAM SINK
  15. 15. USECASE DIAGRAM
  16. 16. CLASS DIAGRAM
  17. 17. SEQUENCE DIAGRAM
  18. 18. ACTIVITY DIAGRAM
  19. 19. SCREEN SHOTS
  20. 20. Sensor node sends file
  21. 21. Negative acknowledgement
  22. 22. False Positive
  23. 23. File stores in Storage Node
  24. 24. Sink
  25. 25. View File Details
  26. 26. Receive File
  27. 27. Authentication to View
  28. 28. Authentication Valid
  29. 29. Authentication Invalid
  30. 30. CONCLUSION We make three key contributions in this paper. SafeQ significantly strengthens the security of two-tiered sensor networks. We used Merkle Hash trees and neighbourhood chain to preserve integrity we propose an optimization technique using Bloom filters to significantly reduce the communication cost between sensors and storage nodes. we propose a solution to adapt SafeQ for event-driven sensor networks.
  31. 31. Any Queries????????
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×