SlideShare a Scribd company logo
1 of 23
STUDENT NAME:
• AKSHAY PATIL
• AJIT KARANJKAR
• SUYASH GHATE
• DHAVAL AHIR
Secure and Efficient Data Transmission for
Cluster-based Wireless Sensor Networks
GUIDED BY
Prof. P.P.Gawali
1
CONTENTS:
 INTRODUCTION
 NETWORK ARCHITECTURE
 LITERATURE SURVEY
 OBJECTIVE
 PROPOSED SYSTEM
 MATHEMATICAL MODEL
 DIAGRAM
 SOFTWARE & HARDWARE REQUIREMENT
 CONCLUSION
 REFERENCES
2
INTRODUCTION:
Wireless sensor network (WSN) is a network system comprised of
spatially distributed devices using wireless sensor nodes to monitor
physical or environmental conditions, such as sound, temperature,
and motion
Clustering is an effective and practical way to enhance the system
performance of WSNs. Clusters are formed dynamically and
periodically.
Secure and Efficient data transmission is thus especially necessary
and is demanded in many such practical WSNs.
3
NETWORK ARCHITECTURE:
4
Fig. 1 Network Architecture
LITERATURE SURVEY:
 The Author Abbasi and M. Younis proposed “A Survey on Clustering Algorithms for Wireless
Sensor Networks ,” system.
In this system Clustering is introduced to WSNs because it has proven to be an effective approach to
provide better data aggregation and scalability for large WSNs.
 S. Sharma and S.K. Jena, proposed a system “A Survey on Secure Hierarchical Routing
Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security
(ICCCS), pp. 146-151, 2011.
In this technique Hierarchical or cluster-base routing protocol for WSNs is the most energy-efficient
among other routing protocols.
5
CONTINUED……
 The Author R. Yasmin, E. Ritter, and G. Wang, “Authentication Framework for
Wireless Sensor Networks Using Identity-Based Signatures,” Proc. IEEE Int’l
Conf. Computer and Information Technology (CIT), pp. 882-889, 2010.
The system authentication is a crucial security requirement to avoid attacks
against secure communication, and to mitigate DoS attacks exploiting the limited
resources of sensor nodes.
 The Author K. Pradeepa, W. R. Anne, and S. Duraisamy, Proposed a system
“Design and Implementation Issues of Clustering in Wireless Sensor
Networks,” Int. J. Comput. Applications, vol. 47, no. 11, 2012.
In this system Clustering in Wireless Sensor Network, Design Issues in Clustering,
and Implementation Issues in Clustering.
6
OBJECTIVE :
 The objective of the secure data transmission for cluster
based wireless sensor network( CWSN) is to guarantee a
secure and efficient data transmission between leaf nodes
and cluster head(CH), as well as transmission between
cluster head(CH) and the base station(BS)
• Reduce Operation Time.
• Data security.
• Reduce the computation and storage cost
7
PROPOSED SYSTEM :
8
 In Proposed System, there are two proposed Secure and Efficient data
Transmission (SET) protocols called SET-IBS and SET-IBOOS, by using
the Identity-Based digital Signature (IBS) scheme and the Identity-Based
Online/Offline digital Signature (IBOOS) scheme, respectively.
 The key idea of both SET-IBS and SET-IBOOS protocol is to authenticate
the encrypted sensed data by applying digital signature to message which
are efficient in communication and applying the key management for
security
 It has been proposed in order to reduce the computation and storage costs
MATHEMATICAL MODEL :
9
10
11
12
UML(Unified Modelling Language)
Diagrams
13
Fig. 2 Activity diagram
ACTIVITY DIAGRAM
14 Fig. 3 Use Case Diagram
USE CASE DIAGRAM
15
Fig. 4 Sequence Diagram
SEQUENCE DIAGRAM
16
Fig. 5 Class Diagram
CLASS DIAGRAM
17 Fig. 6 State Chart Diagram
STATE CHART DIAGRAM
PERT DIAGRAM:
18
Task
Year 2015-16
Jul Aug Sep Oct Nov Dec Jan Fe
b
Mar
Literature
Study
Requirement
Gathering
Analysis
Design
Implementation
Testing
Final Project
Documentation
SOFTWARE &HARDWARE :
 Software  Hardware
 Operating system : -
Windows 7 OS
 Coding Language : java
 IDE: Net beans
 Simulation tool :
OMNeT++ 3.0
 System : Dual core
processor
 Hard Disk : 40 GB.
 Ram : 1 GB
19
CONCLUSION :
20
 In this project two Secure and Efficient Data
Transmission (SET) protocols for cluster based wireless
sensor network (CWSN), called SET-IBS and SET-
IBOOS, by using the identity-based digital signature (IBS)
scheme and the identity-based online/offline digital
signature (IBOOS) scheme, respectively.
 The results show that the proposed protocols have better
performance than the existing secure protocols for
CWSNs, in terms of security overhead and energy
consumption.
REFERENCE:
 T. Hara, V. I. Zadorozhny, and E. Buchmann, Wireless Sensor
Network Technologies for the Info. Explosion Era, Stud. Comput.
Intell. Springer-Verlag, 2010, vol. 278.
 Y.Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security
Issues in Wireless Sensor Networks,” IEEE Commun. Surveys Tuts.,
vol. 8, no. 2, 2006.
 A. A. Abbasi and M. Younis, “A survey on clustering algorithms for
wireless sensor networks,” Comput. Commun., vol. 30, no. 14-15,
2007.
• L. B. Oliveira, A. Ferreira, M. A. Vilac¸a et al., “SecLEACH-On the
security of clustered sensor networks,” Signal Process., vol. 87,
2007.
• P. Banerjee, D. Jacobson, and S. Lahiri, “Security and performance
analysis of a secure clustering protocol for sensor networks,” in Proc.
21
22
 K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol
for Cluster-Based
Wireless Sensor Networks Using Group Key Management,” in
Proc. WiCOM, 2008.
 R. Yasmin, E. Ritter, and G. Wang, “Anuthentication Framework
for Wireless Sensor Networks Using Identity-Based Signatures,”
Proc. IEEE Int’l Conf. Computer and Information Technology
(CIT), pp. 882-889, 2010.
 S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical
Routing Protocols in Wireless Sensor Networks,” Proc. Int’l
Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011.
 K. Pradeepa, W. R. Anne, and S. Duraisamy, “Design and
Implementation Issues of Clustering in Wireless Sensor
Networks,” Int. J. Comput. Applications, vol. 47, no. 11, 2012.
THANK
YOU
23

More Related Content

What's hot

Electronic Walking Stick
Electronic Walking StickElectronic Walking Stick
Electronic Walking StickManav Mittal
 
Wireless Charging of Electric Vehicles
Wireless Charging of Electric VehiclesWireless Charging of Electric Vehicles
Wireless Charging of Electric VehiclesPritam Kumar Singh
 
Indian Railways - Lifeline of the Nation
Indian Railways - Lifeline of the NationIndian Railways - Lifeline of the Nation
Indian Railways - Lifeline of the NationDINESH GERA
 
Smart shopping trolley using rfid and remote controlling report
Smart shopping trolley using rfid and remote controlling reportSmart shopping trolley using rfid and remote controlling report
Smart shopping trolley using rfid and remote controlling reportPranav Veerani
 
Charging in electric vehicles(ev)
Charging  in electric vehicles(ev)Charging  in electric vehicles(ev)
Charging in electric vehicles(ev)UrmilasSrinivasan
 
Case Study on Consumer Protection Act
Case Study on Consumer Protection Act Case Study on Consumer Protection Act
Case Study on Consumer Protection Act salonibansal21
 
Small industries services institutes
Small industries services institutesSmall industries services institutes
Small industries services institutesSimran Kaur
 
RFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemRFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemlaharipothula
 
Robocop final year project presentation by Abhimanyu Kumar
Robocop final year project presentation by Abhimanyu KumarRobocop final year project presentation by Abhimanyu Kumar
Robocop final year project presentation by Abhimanyu KumarAbhimanyu Kumar
 
Automation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFIDAutomation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFIDSudher Sun
 
Fire Fighting Robot using arduino UNO PPT
Fire Fighting Robot using arduino UNO PPTFire Fighting Robot using arduino UNO PPT
Fire Fighting Robot using arduino UNO PPTFarhanAhmade
 
Railway Industrial Training
Railway Industrial TrainingRailway Industrial Training
Railway Industrial TrainingLokesh Parihar
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring systemVikram Purohit
 
Machine learning Summer Training report
Machine learning Summer Training reportMachine learning Summer Training report
Machine learning Summer Training reportSubhadip Mondal
 
Advanced Traction Systems
Advanced Traction SystemsAdvanced Traction Systems
Advanced Traction SystemsSubrata Dey
 
New microsoft power point presentation
New microsoft power point presentationNew microsoft power point presentation
New microsoft power point presentationJosita Rodrigues
 

What's hot (20)

Electronic Walking Stick
Electronic Walking StickElectronic Walking Stick
Electronic Walking Stick
 
Wireless Charging of Electric Vehicles
Wireless Charging of Electric VehiclesWireless Charging of Electric Vehicles
Wireless Charging of Electric Vehicles
 
Indian Railways - Lifeline of the Nation
Indian Railways - Lifeline of the NationIndian Railways - Lifeline of the Nation
Indian Railways - Lifeline of the Nation
 
Smart shopping trolley using rfid and remote controlling report
Smart shopping trolley using rfid and remote controlling reportSmart shopping trolley using rfid and remote controlling report
Smart shopping trolley using rfid and remote controlling report
 
Charging in electric vehicles(ev)
Charging  in electric vehicles(ev)Charging  in electric vehicles(ev)
Charging in electric vehicles(ev)
 
Case Study on Consumer Protection Act
Case Study on Consumer Protection Act Case Study on Consumer Protection Act
Case Study on Consumer Protection Act
 
Small industries services institutes
Small industries services institutesSmall industries services institutes
Small industries services institutes
 
Smart Shopping System
Smart Shopping SystemSmart Shopping System
Smart Shopping System
 
RFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemRFID based smart shopping cart and billing system
RFID based smart shopping cart and billing system
 
Robocop final year project presentation by Abhimanyu Kumar
Robocop final year project presentation by Abhimanyu KumarRobocop final year project presentation by Abhimanyu Kumar
Robocop final year project presentation by Abhimanyu Kumar
 
Automation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFIDAutomation of shopping cart to ease queue in malls by using RFID
Automation of shopping cart to ease queue in malls by using RFID
 
SIDCO
SIDCOSIDCO
SIDCO
 
Fire Fighting Robot using arduino UNO PPT
Fire Fighting Robot using arduino UNO PPTFire Fighting Robot using arduino UNO PPT
Fire Fighting Robot using arduino UNO PPT
 
Railway Industrial Training
Railway Industrial TrainingRailway Industrial Training
Railway Industrial Training
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring system
 
Tech mahindra
Tech mahindraTech mahindra
Tech mahindra
 
Machine learning Summer Training report
Machine learning Summer Training reportMachine learning Summer Training report
Machine learning Summer Training report
 
Report smart dustbin
Report smart dustbinReport smart dustbin
Report smart dustbin
 
Advanced Traction Systems
Advanced Traction SystemsAdvanced Traction Systems
Advanced Traction Systems
 
New microsoft power point presentation
New microsoft power point presentationNew microsoft power point presentation
New microsoft power point presentation
 

Similar to Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks

Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Raja Shekhar
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkRaja Shekhar
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...IEEEFINALSEMSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...Dr. Amarjeet Singh
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...chennaijp
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSai Sirisha
 
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...IJAAS Team
 
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area NetworkIRJET Journal
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...IJTET Journal
 
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...IJECEIAES
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network dilip pareek
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network subhradeep mitra
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
 

Similar to Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks (20)

Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)Ppt (secure and efficient data transmission 2)
Ppt (secure and efficient data transmission 2)
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
 
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
 
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
 
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
 
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
 
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
 
Wireless body area network
Wireless body area network Wireless body area network
Wireless body area network
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 

Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks

  • 1. STUDENT NAME: • AKSHAY PATIL • AJIT KARANJKAR • SUYASH GHATE • DHAVAL AHIR Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks GUIDED BY Prof. P.P.Gawali 1
  • 2. CONTENTS:  INTRODUCTION  NETWORK ARCHITECTURE  LITERATURE SURVEY  OBJECTIVE  PROPOSED SYSTEM  MATHEMATICAL MODEL  DIAGRAM  SOFTWARE & HARDWARE REQUIREMENT  CONCLUSION  REFERENCES 2
  • 3. INTRODUCTION: Wireless sensor network (WSN) is a network system comprised of spatially distributed devices using wireless sensor nodes to monitor physical or environmental conditions, such as sound, temperature, and motion Clustering is an effective and practical way to enhance the system performance of WSNs. Clusters are formed dynamically and periodically. Secure and Efficient data transmission is thus especially necessary and is demanded in many such practical WSNs. 3
  • 4. NETWORK ARCHITECTURE: 4 Fig. 1 Network Architecture
  • 5. LITERATURE SURVEY:  The Author Abbasi and M. Younis proposed “A Survey on Clustering Algorithms for Wireless Sensor Networks ,” system. In this system Clustering is introduced to WSNs because it has proven to be an effective approach to provide better data aggregation and scalability for large WSNs.  S. Sharma and S.K. Jena, proposed a system “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011. In this technique Hierarchical or cluster-base routing protocol for WSNs is the most energy-efficient among other routing protocols. 5
  • 6. CONTINUED……  The Author R. Yasmin, E. Ritter, and G. Wang, “Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures,” Proc. IEEE Int’l Conf. Computer and Information Technology (CIT), pp. 882-889, 2010. The system authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploiting the limited resources of sensor nodes.  The Author K. Pradeepa, W. R. Anne, and S. Duraisamy, Proposed a system “Design and Implementation Issues of Clustering in Wireless Sensor Networks,” Int. J. Comput. Applications, vol. 47, no. 11, 2012. In this system Clustering in Wireless Sensor Network, Design Issues in Clustering, and Implementation Issues in Clustering. 6
  • 7. OBJECTIVE :  The objective of the secure data transmission for cluster based wireless sensor network( CWSN) is to guarantee a secure and efficient data transmission between leaf nodes and cluster head(CH), as well as transmission between cluster head(CH) and the base station(BS) • Reduce Operation Time. • Data security. • Reduce the computation and storage cost 7
  • 8. PROPOSED SYSTEM : 8  In Proposed System, there are two proposed Secure and Efficient data Transmission (SET) protocols called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively.  The key idea of both SET-IBS and SET-IBOOS protocol is to authenticate the encrypted sensed data by applying digital signature to message which are efficient in communication and applying the key management for security  It has been proposed in order to reduce the computation and storage costs
  • 10. 10
  • 11. 11
  • 13. 13 Fig. 2 Activity diagram ACTIVITY DIAGRAM
  • 14. 14 Fig. 3 Use Case Diagram USE CASE DIAGRAM
  • 15. 15 Fig. 4 Sequence Diagram SEQUENCE DIAGRAM
  • 16. 16 Fig. 5 Class Diagram CLASS DIAGRAM
  • 17. 17 Fig. 6 State Chart Diagram STATE CHART DIAGRAM
  • 18. PERT DIAGRAM: 18 Task Year 2015-16 Jul Aug Sep Oct Nov Dec Jan Fe b Mar Literature Study Requirement Gathering Analysis Design Implementation Testing Final Project Documentation
  • 19. SOFTWARE &HARDWARE :  Software  Hardware  Operating system : - Windows 7 OS  Coding Language : java  IDE: Net beans  Simulation tool : OMNeT++ 3.0  System : Dual core processor  Hard Disk : 40 GB.  Ram : 1 GB 19
  • 20. CONCLUSION : 20  In this project two Secure and Efficient Data Transmission (SET) protocols for cluster based wireless sensor network (CWSN), called SET-IBS and SET- IBOOS, by using the identity-based digital signature (IBS) scheme and the identity-based online/offline digital signature (IBOOS) scheme, respectively.  The results show that the proposed protocols have better performance than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption.
  • 21. REFERENCE:  T. Hara, V. I. Zadorozhny, and E. Buchmann, Wireless Sensor Network Technologies for the Info. Explosion Era, Stud. Comput. Intell. Springer-Verlag, 2010, vol. 278.  Y.Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Commun. Surveys Tuts., vol. 8, no. 2, 2006.  A. A. Abbasi and M. Younis, “A survey on clustering algorithms for wireless sensor networks,” Comput. Commun., vol. 30, no. 14-15, 2007. • L. B. Oliveira, A. Ferreira, M. A. Vilac¸a et al., “SecLEACH-On the security of clustered sensor networks,” Signal Process., vol. 87, 2007. • P. Banerjee, D. Jacobson, and S. Lahiri, “Security and performance analysis of a secure clustering protocol for sensor networks,” in Proc. 21
  • 22. 22  K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management,” in Proc. WiCOM, 2008.  R. Yasmin, E. Ritter, and G. Wang, “Anuthentication Framework for Wireless Sensor Networks Using Identity-Based Signatures,” Proc. IEEE Int’l Conf. Computer and Information Technology (CIT), pp. 882-889, 2010.  S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011.  K. Pradeepa, W. R. Anne, and S. Duraisamy, “Design and Implementation Issues of Clustering in Wireless Sensor Networks,” Int. J. Comput. Applications, vol. 47, no. 11, 2012.