Secure and Efficient Data Transmission (SET) protocols for cluster based wireless sensor network (CWSN), called SET-IBS and SET-IBOOS, by using the identity-based digital signature (IBS) scheme and the identity-based online/offline digital signature (IBOOS) scheme, respectively.
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
Secure and Efficient Data Transmission forCluster-based Wireless Sensor Networks
1. STUDENT NAME:
• AKSHAY PATIL
• AJIT KARANJKAR
• SUYASH GHATE
• DHAVAL AHIR
Secure and Efficient Data Transmission for
Cluster-based Wireless Sensor Networks
GUIDED BY
Prof. P.P.Gawali
1
2. CONTENTS:
INTRODUCTION
NETWORK ARCHITECTURE
LITERATURE SURVEY
OBJECTIVE
PROPOSED SYSTEM
MATHEMATICAL MODEL
DIAGRAM
SOFTWARE & HARDWARE REQUIREMENT
CONCLUSION
REFERENCES
2
3. INTRODUCTION:
Wireless sensor network (WSN) is a network system comprised of
spatially distributed devices using wireless sensor nodes to monitor
physical or environmental conditions, such as sound, temperature,
and motion
Clustering is an effective and practical way to enhance the system
performance of WSNs. Clusters are formed dynamically and
periodically.
Secure and Efficient data transmission is thus especially necessary
and is demanded in many such practical WSNs.
3
5. LITERATURE SURVEY:
The Author Abbasi and M. Younis proposed “A Survey on Clustering Algorithms for Wireless
Sensor Networks ,” system.
In this system Clustering is introduced to WSNs because it has proven to be an effective approach to
provide better data aggregation and scalability for large WSNs.
S. Sharma and S.K. Jena, proposed a system “A Survey on Secure Hierarchical Routing
Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security
(ICCCS), pp. 146-151, 2011.
In this technique Hierarchical or cluster-base routing protocol for WSNs is the most energy-efficient
among other routing protocols.
5
6. CONTINUED……
The Author R. Yasmin, E. Ritter, and G. Wang, “Authentication Framework for
Wireless Sensor Networks Using Identity-Based Signatures,” Proc. IEEE Int’l
Conf. Computer and Information Technology (CIT), pp. 882-889, 2010.
The system authentication is a crucial security requirement to avoid attacks
against secure communication, and to mitigate DoS attacks exploiting the limited
resources of sensor nodes.
The Author K. Pradeepa, W. R. Anne, and S. Duraisamy, Proposed a system
“Design and Implementation Issues of Clustering in Wireless Sensor
Networks,” Int. J. Comput. Applications, vol. 47, no. 11, 2012.
In this system Clustering in Wireless Sensor Network, Design Issues in Clustering,
and Implementation Issues in Clustering.
6
7. OBJECTIVE :
The objective of the secure data transmission for cluster
based wireless sensor network( CWSN) is to guarantee a
secure and efficient data transmission between leaf nodes
and cluster head(CH), as well as transmission between
cluster head(CH) and the base station(BS)
• Reduce Operation Time.
• Data security.
• Reduce the computation and storage cost
7
8. PROPOSED SYSTEM :
8
In Proposed System, there are two proposed Secure and Efficient data
Transmission (SET) protocols called SET-IBS and SET-IBOOS, by using
the Identity-Based digital Signature (IBS) scheme and the Identity-Based
Online/Offline digital Signature (IBOOS) scheme, respectively.
The key idea of both SET-IBS and SET-IBOOS protocol is to authenticate
the encrypted sensed data by applying digital signature to message which
are efficient in communication and applying the key management for
security
It has been proposed in order to reduce the computation and storage costs
17. 17 Fig. 6 State Chart Diagram
STATE CHART DIAGRAM
18. PERT DIAGRAM:
18
Task
Year 2015-16
Jul Aug Sep Oct Nov Dec Jan Fe
b
Mar
Literature
Study
Requirement
Gathering
Analysis
Design
Implementation
Testing
Final Project
Documentation
19. SOFTWARE &HARDWARE :
Software Hardware
Operating system : -
Windows 7 OS
Coding Language : java
IDE: Net beans
Simulation tool :
OMNeT++ 3.0
System : Dual core
processor
Hard Disk : 40 GB.
Ram : 1 GB
19
20. CONCLUSION :
20
In this project two Secure and Efficient Data
Transmission (SET) protocols for cluster based wireless
sensor network (CWSN), called SET-IBS and SET-
IBOOS, by using the identity-based digital signature (IBS)
scheme and the identity-based online/offline digital
signature (IBOOS) scheme, respectively.
The results show that the proposed protocols have better
performance than the existing secure protocols for
CWSNs, in terms of security overhead and energy
consumption.
21. REFERENCE:
T. Hara, V. I. Zadorozhny, and E. Buchmann, Wireless Sensor
Network Technologies for the Info. Explosion Era, Stud. Comput.
Intell. Springer-Verlag, 2010, vol. 278.
Y.Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security
Issues in Wireless Sensor Networks,” IEEE Commun. Surveys Tuts.,
vol. 8, no. 2, 2006.
A. A. Abbasi and M. Younis, “A survey on clustering algorithms for
wireless sensor networks,” Comput. Commun., vol. 30, no. 14-15,
2007.
• L. B. Oliveira, A. Ferreira, M. A. Vilac¸a et al., “SecLEACH-On the
security of clustered sensor networks,” Signal Process., vol. 87,
2007.
• P. Banerjee, D. Jacobson, and S. Lahiri, “Security and performance
analysis of a secure clustering protocol for sensor networks,” in Proc.
21
22. 22
K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol
for Cluster-Based
Wireless Sensor Networks Using Group Key Management,” in
Proc. WiCOM, 2008.
R. Yasmin, E. Ritter, and G. Wang, “Anuthentication Framework
for Wireless Sensor Networks Using Identity-Based Signatures,”
Proc. IEEE Int’l Conf. Computer and Information Technology
(CIT), pp. 882-889, 2010.
S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical
Routing Protocols in Wireless Sensor Networks,” Proc. Int’l
Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011.
K. Pradeepa, W. R. Anne, and S. Duraisamy, “Design and
Implementation Issues of Clustering in Wireless Sensor
Networks,” Int. J. Comput. Applications, vol. 47, no. 11, 2012.