SlideShare a Scribd company logo
1 of 34
PERFORMANCE EVALUATION OF SECURE
DATA TRANSMISSION IN WIRELESS
SENSOR NETWORK USING IEEE 802.11X
STANDARDS
Presented by:
Sunny Sall
Department of Information
Technology
Under Guidance
Dr. Rajesh Bansode
(H.O.D)
Department of Information
Technology
Registration No. & Date: 18/18-12-2019
Presentation Outline
I. Introduction
II. Motivation
III. Proposed Methodology
IV. Research Objectives
V. Scope
VI. Problem Statement
VII. General outline of Hypothesis
VIII. Literature Survey
IX. Problem Definition( from
Research Gaps and Findings)
X. Tools and Dataset Required
XI. Expected Outcomes
XII. Discussion on Published
Results
XIII. Timeline for Research work
XIV. Conclusion
XV. Publications related to work
References
I. Introduction
• The evolution of Wireless
Communication techniques from
1G to 4G, showing the data rate
against mobility/ coverage.
• It shows unlicensed/ licensed,
Circuit/ packet switched, spectral
efficiency, Wi-Fi, Blue tooth, Wi-
Max.
• The inference from Figure 1,
indicates that the Mobility in
terms of outdoor, indoor can be
observed through 4G and beyond
heterogeneous Networks (5G).
Figure 1: Evolution of Wireless Technology
A Survey of 5G Network: Architecture and Emerging Technologies by Akhil Gupta in IEEE Access vol. 3, August 2015
II. Motivation
• In Figure 2, it is observed
that in the year 2020 the
graph has reached up to 21
billion Mobile to Mobile
Connections.
• And by 2022 this is
expected to reach
approximately 26 billion
and that is the motivation.
Figure 2: Number of Machine to Machine Connection in
Mobile
A Survey of 5G Network: Architecture and Emerging Technologies by Akhil Gupta in IEEE Access vol. 3, August 2015
III. Proposed Methodology
• Figure 3, presents an example of
Cluster Based Data Aggregation [6].
• In Cluster Based Data Aggregation,
sensor nodes are subdivided into
clusters.
• Cluster heads can communicate with
the sink directly via long range radio
transmission.
• Thus, cluster heads usually form a
tree structure to transmit aggregated
data by multi hopping through other
cluster heads which results in
significant energy savings.
Figure 3: Cluster Based Data Aggregation
IV. Research Objectives
• The work is to be carried out with following objectives as mentioned
below.
a) To enhance the network lifetime in Wireless Sensor Network (WSN).
PHASE III
b) To design and develop an approach for Cluster Head (CH). PHASE I
DEC 2019 Completed Implementation and published.
c) Design and develop a suitable data aggregation technique when data
transmission. PHASE II JUN 2020 Implementation in process.
d) To design Broadcast Tree Construction (BTC) for energy conservation
protocol during data transmission. PHASE III
e) To develop secure HMAC technique for authentication. PHASE IV
f) To validate the proposed system performance evaluation. PHASE IV
V. Scope
• Data aggregation is done using priority of packet type like
normal, high, low etc.
• The data transmission packet size is 512 kbps using CBR, TCP
and FTP traffic.
• The system analysis is done using packet throughput 620 bps,
communication cost 750 bps, transmission energy 60 Joules,
receiving energy 42 Joules based on given parameters.
• The proposed protocols effectiveness has measure with various
energy consumption and conservation protocols, like AODV,
DSDV, DSR etc.
• Each node we set random energy between (100-3000 Joules)
and each node having 500 m circular radius.
• Based on Protocols, designer can decide their best
optimized Secure WLAN infrastructure.
• Here, one can analyse the effectiveness of such solution,
based on measurement of network life time and energy
consumption implementation.
• Evaluating the performance of Data Transmission in WSN
for various 802.11x standards, would be a foreseeable
extension to this work.
• There are several areas of potential future work in this area
that could be explored.
V. Scope
VI. Problem Statement
• The research gaps addressed from literature survey table
resulting into design and develop a system for energy
conservation protocol in Wireless Sensor Network (WSN).
This is to eliminate the network data overhead using data
aggregation mechanism. The authentication system generally
deals with Hash Mandatory Access Control (HMAC)
protocol to prevent the various network attacks.
VII. General Outline of Hypothesis
• Design and Development of a system for energy conservation protocol in
Wireless Sensor Network (WSN), with eliminating the network data
overhead using data aggregation technique.
• To provide defence mechanism from various network attacks in untrusted
network environment.
• How to select Cluster Head?
• How to Enhance Security?
• How to minimise Energy Consumption?
• How to improve Network Life Time?
• How to perform Data Aggregation?
• How to minimise Data loss and Data leakage?
• How to minimise Network Overheads?
VIII. Literature Survey
Ref. No. Authors and Title Method Used Key Findings Research Gaps
[1] Firoj Ahamad and Rakesh Kumar
Energy Efficient Region Based
Clustering Algorithm for WSN using
Fuzzy Logic
Provides an approach to prolong
the WSN lifetime using fuzzy logic
based selection of cluster head that
provides completely non
probabilistic approach.
Use multi hop for data
transmission which
eliminates packets loss
issues
Every round CH selection
consumes higher energy
that generate lifetime loss
issues
Low data transmission
rates.
High computation when
data size is large
[2] I.S. AKILA AND R. VENKATESAN
A Fuzzy Based Energy-aware Clustering
Architecture for Cooperative
Communication in WSN
Cluster Head (CH) is chosen based
on the parameters residual energy,
using Partial Swarm Optimization
(PSO) trust, signal-to-interference-
plus-noise ratio and load.
Proposed technique
Enhances the network
lifetime and energy
efficiency.
[3] Wael Y. Alghamdi, Hui Wu, Salil S.
Kanhere
Reliable and Secure End-to-End Data
Aggregation Using Secret Sharing in
WSNs
Reliable and Secure End-to-End
Data Aggregation Using Secret
Sharing in WSNs
Data aggregation eliminates
the network overhead
Ref. No. Authors and Title Method Used Key Findings Research Gaps
[4] OZDEMIR et. Al.
Energy Efficient & Secured
Data Routing Through
Aggregation Node in WSN
Detect the attack on all nodes including cluster
member, cluster head and aggregator node as
well as checks data truthfulness on cluster
head when data is received from all cluster
members. SHA1 algorithm is used for
integrity checking
improves the energy
utilization, memory
management
and security of data along
with attack detection on CH.
It can’t recover the
compromised node and use
it again in the
Network instead of leaving
it.
Time complexity higher
than traditional LEACH
System does not reflect how
better for time complexity
that traditional approaches.
[5] Basavaraj G. N, Dr. Jaidhar
C.D
H-LEACH Protocol with
Modified Cluster Head
selection for WSN
A new threshold condition
T (n) for electing Cluster Heads (CHs) among
the Sensor Nodes (SNs).
Provides balancing or
efficient energy
management
[6] T M Behera, S K Mohapatra,
Proshikshya Mukherjee, H K
Sahoo
Work-In-Progress: DEEC-
VD: A Hybrid Energy
Utilization Cluster-based
Routing Protocol for WSN for
application in IoT
DEEC-VD not only uses cluster and active
cluster head forming with the help of vector
quantization but also it uses Dijkstra
Algorithm to find the shortest path between
the active cluster heads (CHs) to provide high
energy utilization.
Improves the average
energy
Utilization of the network
has increased to almost
60%.
VIII. Literature Survey
Ref. No. Authors and Title Method Used Key Findings Research Gaps
[7] Dhiviya.S, Sariga A Dr. P. Sujata
SURVEY ON WSN USING
CLUSTERING
The survey on a distinct clustering
algorithm for WSN which is classified
based on distinct clustering attributes
Describes the strategy of
clustering to eliminate data
leakage
Not implemented in real
time environment
Data reduction issues has
generated
Generate high time
complexity for encryption
and decryption.
[8] Abhay Gupta, Narendra Shekokar
A Novel K-Means L-Layer
Algorithm for uneven Clustering
in WSN
A modification of the K Means
algorithm which provides even
clustering as well as the study of
energy consumption of the nodes with
regards to the data packet optimization.
This system provides energy
consumption of the nodes with
regards to the data packet
optimization.
[9] K. Hamsha and Nagaraja G.S
Analysis of Security Mechanism
Using Threshold Cryptography
for Hierarchical Wireless Sensor
Networks
The Sink node shares the secret group
key to the entire sensor node in the
network. Threshold cryptography
protects the shared key by malicious or
intruder node in the network.
Threshold cryptography has
used for data encryption
VIII. Literature Survey
Ref. No. Authors and Title Method Used Key Findings Research Gaps
[10] Yasha Istwal, Shashi Kant Verma
DUAL CLUSTER HEAD
ROUTING PROTOCOL IN
WSN
DCHRP (Dual Cluster Head Routing
Protocol) having dual cluster head with
three level of heterogeneity to improve
the life span of a Wireless Sensor
Network (WSN).
Proposed routing approach
provides dual CH for routing.
Dual CH creation takes high
computation
This protocol takes link
reliability into account when
forming clusters.
Evolutionary optimization
algorithm has used which
increased the delay.
[11] Wang Jin, Wang Bin
Adaptive clustering approach
over unreliable links for WSN
Design an energy-efficient cluster
forming protocol for WSN based on
relative difference between energy level
of an ordinary node and its cluster head
node in the previous round.
System unreliable links can
prolong network lifetime when
compared with other energy-
efficient clustering protocol for
WSN.
[12] Jingyi Wang ,Yuhao Jing,
Xiaotong Zhang , Hongying Bai
Clustering Protocol based on
Immune Optimization Algorithms
for Wireless Sensor Networks
Immune Optimization Algorithms to
reduce the total transmission distance of
the whole network by choosing the
appropriate nodes as cluster heads in
WSN.
CH selection base optimization
technique which reduces time.
VIII. Literature Survey
Ref. No. Authors and Title Method Used Key Findings Research Gaps
[13] Mukesh Mishra, Gourab sen
Gupta, Xiang Gui
A review of and a proposal for
cross-layer design for efficient
routing and secure data
aggregation over WSN
A review of and a proposal for cross-
layer design for efficient routing and
secure data aggregation over WSN
Secure data aggregation which
improves the data security.
Less security during data
transmission.
No attack detection
mechanism has used.
Only DOS based attack has
detected not others.
[14] Priyanka Nehra, A. Nagaraju
Fault Tolerance using Quadratic-
Minimum Spanning Tree (Q-
MST) with Secure Data
Aggregation in Wireless Sensor
Networks
Transmission of data along with the
integration of two-hop mechanism
which is Secure and Efficient protocol
for Data Aggregation in wireless sensor
Networks (SEDAN) is used.
MST algorithm provides
execution in minimum time
execution
[15] P.Padmaja
Dr. G. V. Marutheswar
DETECTION OF MILICIOUS
NODE IN WIRELESS SENSOR
NETWORK
Optimization Wireless Sensor Network
(WSN) is necessary to reduce
redundancy and energy consumption.
Eliminates the energy
consumption.
VIII. Literature Survey
Ref. No. Authors and Title Method Used Key Findings Research Gaps
[16] Madiha Razzaq, Devarani Devi
Ningombam, Seokjoo Shin
Energy Efficient K-means
Clustering-based Routing
Protocol for WSN Using Optimal
Packet Size
An energy efficient K-means clustering-
based routing protocol and considers an
optimal fixed packet size according to the
radio parameters and channel conditions of
the transceiver.
Clustering techniques has
used to eliminate high
packet overhead.
Time complexity issues.
Reduce throughput and
packet loss ratio.
Generate congestion when
large data.
[17] J. S. Saji Kumar,Elizabeth Sherly,
A New Hybrid Algorithm for
Tolerating Security Threats in
Wireless Sensor Networks
The proposed model of MRM, H-PAL-
PLR, and HOL-5-DAS has been proved to
be efficient in case of link or node failure,
packet loss and latency respectively.
High packet delivery ratio,
network
life time, throughput,
latency ratio and packet
loss ratio
Parameters
[18] Marwa Sharawi, Eid Emary
Impact of Grey Wolf
Optimization on WSN Cluster
Formation and Lifetime
Expansion
The introduced system outperforms the
LEACH in almost all topologies using the
different indicators.
Fast approach for cluster
generation in large network
VIII. Literature Survey
Ref. No. Authors and Title Method Used Key Findings Research Gaps
[19] Limin Shen, Jianfeng Ma,
Ximeng Liu, Fushan Wei and
Meixia Miao
A Secure and Efficient ID-Based
Aggregate Signature Scheme for
Wireless Sensor Networks
The security of our identity-based aggregate
signature scheme is rigorously presented
based on the computational Diffie-Hellman
assumption in random oracle model.
ID based signature
eliminate certificate
verification as long process.
Third party resource
required for ID signature
generation
Overhead generate during
data transmission.
Collusion attack has
generates from various
attacks.
[20] Ravi Teja, Dr. S. Indu
A Priority Based WSN Clustering
of Multiple Sinl( Scenario using
Artificial Bee Colony Algorithm
An energy efficient as well as a priority based
wireless sensor network clustering and routing
algorithm for a multiple sink scenario using
Artificial Bee Colony Optimization with a
multi objective fitness function which takes
into account the priority of each sink.
ABCA has used for
efficient clustering.
[21] Scott A. Thompson Jr. and
Bharath K. Samanthula
Optimized Secure Data
Aggregation in Wireless Sensor
Networks
A novel solution for the secure aggregation of
data in WSNs based on probabilistic
homomorphic encryption. By combining with
a unique encoding function, proposed solution
guarantees the privacy of sensor data, while
also greatly reducing communication costs.
Two way encoding has used
which provide highest
security.
VIII. Literature Survey
IX. Problem Definition (Derived from Research
Gaps & Findings)
• Large data transmission should generate network overhead
during data transmission and it produces data leakage issues.
• Trust calculation of individual node in next hop selection is
not considered in excising systems.
• No backup path provided in existing WSN when internal or
external attack is generated.
• Many nodes are destroyed when high power is consumed by
internal nodes, it create a cut in network thus data is loosed
which can’t be recovered by systems.
X. Tools and Data set Required
• Software:
• Ubuntu
• VM Ware
• NS2
• Hardware:
• PC with Minimum Configuration
XI. Expected Outcomes
• Energy consumption and energy modelling are important issues in designing and
implementing of Wireless Sensor Networks (WSNs), which help the designers to
optimize the energy consumption in WSN nodes. Good knowledge of the sources of
energy consumption in WSNs is the first step to reduce energy consumption [19].
a) To enhance the network lifetime in WSN using cluster network and reduce data
transmission time as well as enhance the QoS. PHASE III
b) To design and develop an approach for cluster head (CH) selection using evolutionary
based Genetic Algorithm (GA). PHASE I DEC 2019 Completed and published
c) Design and develop a suitable data aggregation technique when data transmission
using MAC protocol. PHASE II JUN 2020
d) To design Broadcast Tree Construction (BTC) based sleep scheduling approach for
energy conservation protocol during data transmission. PHASE III
e) To develop secure HMAC technique for authentication with secure manner. PHASE
IV
f) To validate the proposed system performance evaluation with traditional existing
approaches. PHASE IV
XII. Discussion on Published Results
 NS2 terminal
XII. Discussion on Published Results
• Default cluster generation Cluster head generation
XII. Discussion on Published Results
• CH moves to central location Communication between sensor
node and CH
• This figure 4, will provide the drop rate overall simulation during the
communication with other protocols.
• This figure 5, will provide the throughput of system during the
communication with other protocols.
• This figure 6, will provide the how system will increased the actual
time percentage of simulation due to proposed energy conservation
protocol.
• There is a decrease in drop rate by 2%, the throughput has
increased by 3%. Also Network Lifetime has increased to 8 seconds
as compared to 2 seconds in other systems.
XII. Discussion on Published Results
Figure 4: Drop rate of proposed vs existing Figure 5: Throughput of proposed vs existing
Figure 6: Network lifetime of proposed vs existing
XII. Discussion on Published Results
Parameter Values
Simulator NS-allinone 2.35
Simulation time 25 sec
Channel Type Wireless Channel
Propagation Model Two Ray Ground
Standard MAC/802.11
Simulation Size 1000 *1500
Max packet Length 1000
Ad hoc routing AODV
Traffic CBR
Parameters WSN [21] Proposed (cluster base with
AODV)
Data Aggregation No Yes
Data Security Yes (selective) Yes
Energy Conservation No Yes
Packet Loss High Low
End to End delay High Low
Packet Overhead High Low
Table 1: Simulation Parameters used
Table 2: Difference between the Proposed and existing WSN
XII. Discussion on Published Results
 Most of existing system having high packet drop rate due to
heavy network overhead.
 Various security approaches not able to provides drastic security
during data transmission.
 Cut generation is another problem in existing systems. (it is the
concept in which any internal node automatically gets destroyed
during data transmission due to energy).
 Need to propose an lightweight data transmission with secure
approach in large scale WSN.
XIII. Timeline for Research work
 To design and develop an approach for cluster head (CH) selection using evolutionary
based Genetic Algorithm (GA). PHASE I DEC 2019 Completed and published
 Design and develop a suitable data aggregation technique when data transmission using
MAC protocol. PHASE II JUN 2020
 To enhance the network lifetime in WSN using cluster network and reduce data
transmission time as well as enhance the QoS. PHASE III A SEPT 2020
 To design Broadcast Tree Construction (BTC) based sleep scheduling approach for
energy conservation protocol during data transmission. PHASE III B DEC 2020
 To develop secure HMAC technique for authentication with secure manner. PHASE IV
A MAR 2021
 To validate the proposed system performance evaluation with traditional existing
approaches. PHASE IV B JUN 2021
XIV. Conclusion
• We have proposed a HMAC and data aggregation in WSN. Initially the
CHs are chosen based on the node connectivity, which acts as a Data
Aggregator. Then, the clustering process is executed using the genetic
algorithm. This technique highly minimizes energy consumption and
thereby enhancing the network lifetime [20].
• When the cluster member wants to transmit data to the aggregator, a data
encryption techniques are utilized. The data security module utilized offers
confidentiality to the data packets, thus ensuring the authenticity and
integrity of the sensed data.
• Simulation results, shows that the proposed technique minimizes the
energy consumption, ensures data security and reduces the transmission
overhead [21].
XV. Publication related to work
• A Paper submitted and presented in IC-ICN Multicon- W 2020
conference in February 2020 at TCET.
• Also submitted in Springer through IC-ICN Multicon- W 2020
• Status: accepted in Springer
• Title: “Secure Data Aggregation and data Transmission using HMAC
Protocol in Cluster base Wireless Sensor Network”
Courses Completed
• Completed course on “Wireless Communication Emerging Technologies”,
offered by Yonsei University through Coursera on 15 June 2018.
• Attended the PMMMNMTT Sponsered One Week FDP on “Cyber Security”
at Atharva College of Enginnering from 3 to 8 Sept. 2019.
• Attended the Webinar on “IoT for Music Theropy, Research Paper Writing,
Gateway to Cyber Security” at St. John College of Enginnering from 24 to 28
May 2020.
• Attended the Webinar on “Usage of Technology in COVID 19” at Terna
College of Enginnering from 28 May to 2 June 2020.
References
[1] F. Ahamad, R. Kumar, “Energy Efficient Region Based Clustering Algorithm for WSN using Fuzzy Logic”, IEEE
International Conference on Recent Trends In Electronics Information Communication Technology, May 20-21, India,
2016.
[2] I. S. Akila, R. Venkateshan, “A Fuzzy Based Energy-aware Clustering Architecture for Cooperative Communication
in WSN”, The Computer Journal Advance Access published September 12, 2016.
[3] ALGHAMDI, Wael Y.; WU, Hui; KANHERE, Salil S. Reliable and secure end-to-end data aggregation using secret
sharing in wsns. In: 2017 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2017. p. 1-6.
[4] OZDEMIR, Suat; ÇAM, Hasan. Integration of false data detection with data aggregation and confidential
transmission in wireless sensor networks. IEEE/ACM Transactions on networking, 2009, 18.3: 736-749..
[5] G. Basavraj, Dr. C. Jaidhar, “H-LEACH Protocol with Modified Cluster Head Selection for WSN”, International
Conference on Smart Technology for Smart Nation, 2017
[6] T M Behera, S K Mohapatra, Proshikshya Mukherjee, H K Sahoo, “Work-In-Progress: DEEC-VD: A Hybrid Energy
Utilization Cluster-based Routing Protocol for WSN for application in IoT”, International Conference on Information
Technology, 2017.
[7] Dr. P. Sujatha, “SURVEY ON WSN USING CLUSTERING”, Second International Conference on Recent Trends and
Challenges in Computational Models, 2017
[8] A. Gupta, “A Novel K-Means L-Layer Algorithm for uneven Clustering in WSN”, IEEE International Conference on
Computer, Communication, and Signal Processing, 2017.
[9] K. Hamsha, “Analysis of Security Mechanism Using Threshold Cryptography for Hierarchical Wireless Sensor
Networks”, International Conference on Communication and Signal Processing, April 6-8, India, 2017.
[10] ISTWAL, Yasha; VERMA, Shashi Kant. Dual cluster head routing protocol in WSN. In: 2017 8th International
Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, 2017. p. 1-6.
References
[11] W. Jin,” Adaptive clustering approach over unreliable links for WSN”, IEEE 13th International Conference on
Electronic Measurement & Instruments, 2017.
[12] J. Wang, “Clustering Protocol based on Immune Optimization Algorithms for Wireless Sensor Networks”, 2nd IEEE
International Conference on Computer and Communications, 2016.
[13] MISHRA, Mukesh; GUPTA, Gourab Sen; GUI, Xiang. A review of and a proposal for cross-layer design for
efficient routing and secure data aggregation over WSN. In: 2017 3rd International Conference on Computational
Intelligence and Networks (CINE). IEEE, 2017. p. 120-125.
[14] NEHRA, Priyanka; NAGARAJU, A. Fault Tolerance using Quadratic-Minimum Spanning Tree (Q-MST) with
Secure Data Aggregation in Wireless Sensor Networks. In: 2017 14th IEEE India Council International Conference
(INDICON). IEEE, 2017. p. 1-6.
[15] P. Padmaja, “DETECTION OF MILICIOUS NODE IN WIRELESS SENSOR NETWORK”, IEEE 7th International
Advance Computing Conference, 2017.
[16] RAZZAQ, Madiha; NINGOMBAM, Devarani Devi; SHIN, Seokjoo. Energy efficient K-means clustering-based
routing protocol for WSN using optimal packet size. In: 2018 International Conference on Information Networking
(ICOIN). IEEE, 2018. p. 632-635.
[17] E. Sherly, “A New Hybrid Algorithm for Tolerating Security Threats in Wireless Sensor Networks”, International
CET Conference on Control, Communication, and Computing, Trivandrum, 2018.
[18] SHARAWI, Marwa; EMARY, Eid. Impact of grey wolf optimization on WSN cluster formation and lifetime
expansion. In: 2017 Ninth International Conference on Advanced Computational Intelligence (ICACI). IEEE, 2017. p.
157-162.
[19] SHEN, Limin, et al. A secure and efficient id-based aggregate signature scheme for wireless sensor networks. IEEE
Internet of Things Journal, 2016, 4.2: 546-554.
References
[20] TEJA, Ravi; INDU, S. A priority based WSN clustering of multiple sink scenario using artificial bee colony
algorithm. In: 2016 International Conference on Computation System and Information Technology for Sustainable
Solutions (CSITSS). IEEE, 2016. p. 130-134.
[21] THOMPSON, Scott A.; SAMANTHULA, Bharath K. Optimized secure data aggregation in wireless sensor
networks. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2017. p. 394-3942.
[22] USHA, M., et al. Node density based clustering to maximize the network lifetime of WSN using multiple mobile
elements. In: 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA). IEEE,
2017. p. 10-15.
[23] VIKRAM, G. Raja; KRISHNA, A. V. N.; CHATRAPATI, K. Shahu. Variable initial energy and unequal clustering
(VEUC) based multicasting in WSN. In: 2017 International Conference on Wireless Communications, Signal Processing
and Networking (WiSPNET). IEEE, 2017. p. 82-86.
[24] VLADUTA, Valentin-Alexandru; GHIMES, Ana-Maria; PATRICIU, Victor Valeriu. A Proposed Solution for
Analyzing the Behavior of a WSN using a Secured Neural Network Approach. In: 2018 International Symposium on
Electronics and Telecommunications (ISETC). IEEE, 2018. p. 1-4.
[25] WANG, Taochun, et al. An efficient and secure itinerary-based data aggregation algorithm for WSNs. In: 2017 IEEE
Trustcom/BigDataSE/ICESS. IEEE, 2017. p. 433-440.
[26] YAN, An; WANG, Bin. An adaptive WSN clustering scheme based on neighborhood energy level. In: 2017 IEEE
3rd Information Technology and Mechatronics Engineering Conference (ITOEC). IEEE, 2017. p. 1170-1173.
[27] YUVARAJ, P.; MANIMOZHI, M. Impact of base station location in clustering schemes of WSN. In: 2017
International conference on Microelectronic Devices, Circuits and Systems (ICMDCS). IEEE, 2017. p. 1-5.
THANK YOU!!!

More Related Content

What's hot

Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
1crore projects
 
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
ijsc
 
Data aggregation in wireless sensor network based on dynamic fuzzy clustering
Data aggregation in wireless sensor network based on dynamic fuzzy clusteringData aggregation in wireless sensor network based on dynamic fuzzy clustering
Data aggregation in wireless sensor network based on dynamic fuzzy clustering
csandit
 

What's hot (15)

Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksHierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
 
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
 
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
 
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
FUZZY-CLUSTERING BASED DATA GATHERING IN WIRELESS SENSOR NETWORK
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
 
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKSGREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
 
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on ClusteringEnergy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
 
Data aggregation in wireless sensor network based on dynamic fuzzy clustering
Data aggregation in wireless sensor network based on dynamic fuzzy clusteringData aggregation in wireless sensor network based on dynamic fuzzy clustering
Data aggregation in wireless sensor network based on dynamic fuzzy clustering
 
Congestion Control Clustering a Review Paper
Congestion Control Clustering a Review PaperCongestion Control Clustering a Review Paper
Congestion Control Clustering a Review Paper
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
 
34 9141 it ns2-tentative route selection approach for edit septian
34 9141 it  ns2-tentative route selection approach for edit septian34 9141 it  ns2-tentative route selection approach for edit septian
34 9141 it ns2-tentative route selection approach for edit septian
 
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor NetworksA Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
 

Similar to Aps 10june2020

J031101064069
J031101064069J031101064069
J031101064069
theijes
 
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
ijtsrd
 
A Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor NetworksA Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor Networks
ijtsrd
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
ijsrd.com
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
IAEME Publication
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
IAEME Publication
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
IJCI JOURNAL
 

Similar to Aps 10june2020 (20)

Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
Presentation on sensor network
Presentation on sensor networkPresentation on sensor network
Presentation on sensor network
 
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
An Energy Aware Routing to Optimize Route Selection in Cluster Based Wireless...
 
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
 
A Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor NetworksA Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor Networks
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
 
Energy Efficient Techniques for Data aggregation and collection in WSN
Energy Efficient Techniques for Data aggregation and collection in WSNEnergy Efficient Techniques for Data aggregation and collection in WSN
Energy Efficient Techniques for Data aggregation and collection in WSN
 
8 ijcse-01235
8 ijcse-012358 ijcse-01235
8 ijcse-01235
 
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065
 
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
 
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLAN
 
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Aps 10june2020

  • 1. PERFORMANCE EVALUATION OF SECURE DATA TRANSMISSION IN WIRELESS SENSOR NETWORK USING IEEE 802.11X STANDARDS Presented by: Sunny Sall Department of Information Technology Under Guidance Dr. Rajesh Bansode (H.O.D) Department of Information Technology Registration No. & Date: 18/18-12-2019
  • 2. Presentation Outline I. Introduction II. Motivation III. Proposed Methodology IV. Research Objectives V. Scope VI. Problem Statement VII. General outline of Hypothesis VIII. Literature Survey IX. Problem Definition( from Research Gaps and Findings) X. Tools and Dataset Required XI. Expected Outcomes XII. Discussion on Published Results XIII. Timeline for Research work XIV. Conclusion XV. Publications related to work References
  • 3. I. Introduction • The evolution of Wireless Communication techniques from 1G to 4G, showing the data rate against mobility/ coverage. • It shows unlicensed/ licensed, Circuit/ packet switched, spectral efficiency, Wi-Fi, Blue tooth, Wi- Max. • The inference from Figure 1, indicates that the Mobility in terms of outdoor, indoor can be observed through 4G and beyond heterogeneous Networks (5G). Figure 1: Evolution of Wireless Technology A Survey of 5G Network: Architecture and Emerging Technologies by Akhil Gupta in IEEE Access vol. 3, August 2015
  • 4. II. Motivation • In Figure 2, it is observed that in the year 2020 the graph has reached up to 21 billion Mobile to Mobile Connections. • And by 2022 this is expected to reach approximately 26 billion and that is the motivation. Figure 2: Number of Machine to Machine Connection in Mobile A Survey of 5G Network: Architecture and Emerging Technologies by Akhil Gupta in IEEE Access vol. 3, August 2015
  • 5. III. Proposed Methodology • Figure 3, presents an example of Cluster Based Data Aggregation [6]. • In Cluster Based Data Aggregation, sensor nodes are subdivided into clusters. • Cluster heads can communicate with the sink directly via long range radio transmission. • Thus, cluster heads usually form a tree structure to transmit aggregated data by multi hopping through other cluster heads which results in significant energy savings. Figure 3: Cluster Based Data Aggregation
  • 6. IV. Research Objectives • The work is to be carried out with following objectives as mentioned below. a) To enhance the network lifetime in Wireless Sensor Network (WSN). PHASE III b) To design and develop an approach for Cluster Head (CH). PHASE I DEC 2019 Completed Implementation and published. c) Design and develop a suitable data aggregation technique when data transmission. PHASE II JUN 2020 Implementation in process. d) To design Broadcast Tree Construction (BTC) for energy conservation protocol during data transmission. PHASE III e) To develop secure HMAC technique for authentication. PHASE IV f) To validate the proposed system performance evaluation. PHASE IV
  • 7. V. Scope • Data aggregation is done using priority of packet type like normal, high, low etc. • The data transmission packet size is 512 kbps using CBR, TCP and FTP traffic. • The system analysis is done using packet throughput 620 bps, communication cost 750 bps, transmission energy 60 Joules, receiving energy 42 Joules based on given parameters. • The proposed protocols effectiveness has measure with various energy consumption and conservation protocols, like AODV, DSDV, DSR etc. • Each node we set random energy between (100-3000 Joules) and each node having 500 m circular radius.
  • 8. • Based on Protocols, designer can decide their best optimized Secure WLAN infrastructure. • Here, one can analyse the effectiveness of such solution, based on measurement of network life time and energy consumption implementation. • Evaluating the performance of Data Transmission in WSN for various 802.11x standards, would be a foreseeable extension to this work. • There are several areas of potential future work in this area that could be explored. V. Scope
  • 9. VI. Problem Statement • The research gaps addressed from literature survey table resulting into design and develop a system for energy conservation protocol in Wireless Sensor Network (WSN). This is to eliminate the network data overhead using data aggregation mechanism. The authentication system generally deals with Hash Mandatory Access Control (HMAC) protocol to prevent the various network attacks.
  • 10. VII. General Outline of Hypothesis • Design and Development of a system for energy conservation protocol in Wireless Sensor Network (WSN), with eliminating the network data overhead using data aggregation technique. • To provide defence mechanism from various network attacks in untrusted network environment. • How to select Cluster Head? • How to Enhance Security? • How to minimise Energy Consumption? • How to improve Network Life Time? • How to perform Data Aggregation? • How to minimise Data loss and Data leakage? • How to minimise Network Overheads?
  • 11. VIII. Literature Survey Ref. No. Authors and Title Method Used Key Findings Research Gaps [1] Firoj Ahamad and Rakesh Kumar Energy Efficient Region Based Clustering Algorithm for WSN using Fuzzy Logic Provides an approach to prolong the WSN lifetime using fuzzy logic based selection of cluster head that provides completely non probabilistic approach. Use multi hop for data transmission which eliminates packets loss issues Every round CH selection consumes higher energy that generate lifetime loss issues Low data transmission rates. High computation when data size is large [2] I.S. AKILA AND R. VENKATESAN A Fuzzy Based Energy-aware Clustering Architecture for Cooperative Communication in WSN Cluster Head (CH) is chosen based on the parameters residual energy, using Partial Swarm Optimization (PSO) trust, signal-to-interference- plus-noise ratio and load. Proposed technique Enhances the network lifetime and energy efficiency. [3] Wael Y. Alghamdi, Hui Wu, Salil S. Kanhere Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs Data aggregation eliminates the network overhead
  • 12. Ref. No. Authors and Title Method Used Key Findings Research Gaps [4] OZDEMIR et. Al. Energy Efficient & Secured Data Routing Through Aggregation Node in WSN Detect the attack on all nodes including cluster member, cluster head and aggregator node as well as checks data truthfulness on cluster head when data is received from all cluster members. SHA1 algorithm is used for integrity checking improves the energy utilization, memory management and security of data along with attack detection on CH. It can’t recover the compromised node and use it again in the Network instead of leaving it. Time complexity higher than traditional LEACH System does not reflect how better for time complexity that traditional approaches. [5] Basavaraj G. N, Dr. Jaidhar C.D H-LEACH Protocol with Modified Cluster Head selection for WSN A new threshold condition T (n) for electing Cluster Heads (CHs) among the Sensor Nodes (SNs). Provides balancing or efficient energy management [6] T M Behera, S K Mohapatra, Proshikshya Mukherjee, H K Sahoo Work-In-Progress: DEEC- VD: A Hybrid Energy Utilization Cluster-based Routing Protocol for WSN for application in IoT DEEC-VD not only uses cluster and active cluster head forming with the help of vector quantization but also it uses Dijkstra Algorithm to find the shortest path between the active cluster heads (CHs) to provide high energy utilization. Improves the average energy Utilization of the network has increased to almost 60%. VIII. Literature Survey
  • 13. Ref. No. Authors and Title Method Used Key Findings Research Gaps [7] Dhiviya.S, Sariga A Dr. P. Sujata SURVEY ON WSN USING CLUSTERING The survey on a distinct clustering algorithm for WSN which is classified based on distinct clustering attributes Describes the strategy of clustering to eliminate data leakage Not implemented in real time environment Data reduction issues has generated Generate high time complexity for encryption and decryption. [8] Abhay Gupta, Narendra Shekokar A Novel K-Means L-Layer Algorithm for uneven Clustering in WSN A modification of the K Means algorithm which provides even clustering as well as the study of energy consumption of the nodes with regards to the data packet optimization. This system provides energy consumption of the nodes with regards to the data packet optimization. [9] K. Hamsha and Nagaraja G.S Analysis of Security Mechanism Using Threshold Cryptography for Hierarchical Wireless Sensor Networks The Sink node shares the secret group key to the entire sensor node in the network. Threshold cryptography protects the shared key by malicious or intruder node in the network. Threshold cryptography has used for data encryption VIII. Literature Survey
  • 14. Ref. No. Authors and Title Method Used Key Findings Research Gaps [10] Yasha Istwal, Shashi Kant Verma DUAL CLUSTER HEAD ROUTING PROTOCOL IN WSN DCHRP (Dual Cluster Head Routing Protocol) having dual cluster head with three level of heterogeneity to improve the life span of a Wireless Sensor Network (WSN). Proposed routing approach provides dual CH for routing. Dual CH creation takes high computation This protocol takes link reliability into account when forming clusters. Evolutionary optimization algorithm has used which increased the delay. [11] Wang Jin, Wang Bin Adaptive clustering approach over unreliable links for WSN Design an energy-efficient cluster forming protocol for WSN based on relative difference between energy level of an ordinary node and its cluster head node in the previous round. System unreliable links can prolong network lifetime when compared with other energy- efficient clustering protocol for WSN. [12] Jingyi Wang ,Yuhao Jing, Xiaotong Zhang , Hongying Bai Clustering Protocol based on Immune Optimization Algorithms for Wireless Sensor Networks Immune Optimization Algorithms to reduce the total transmission distance of the whole network by choosing the appropriate nodes as cluster heads in WSN. CH selection base optimization technique which reduces time. VIII. Literature Survey
  • 15. Ref. No. Authors and Title Method Used Key Findings Research Gaps [13] Mukesh Mishra, Gourab sen Gupta, Xiang Gui A review of and a proposal for cross-layer design for efficient routing and secure data aggregation over WSN A review of and a proposal for cross- layer design for efficient routing and secure data aggregation over WSN Secure data aggregation which improves the data security. Less security during data transmission. No attack detection mechanism has used. Only DOS based attack has detected not others. [14] Priyanka Nehra, A. Nagaraju Fault Tolerance using Quadratic- Minimum Spanning Tree (Q- MST) with Secure Data Aggregation in Wireless Sensor Networks Transmission of data along with the integration of two-hop mechanism which is Secure and Efficient protocol for Data Aggregation in wireless sensor Networks (SEDAN) is used. MST algorithm provides execution in minimum time execution [15] P.Padmaja Dr. G. V. Marutheswar DETECTION OF MILICIOUS NODE IN WIRELESS SENSOR NETWORK Optimization Wireless Sensor Network (WSN) is necessary to reduce redundancy and energy consumption. Eliminates the energy consumption. VIII. Literature Survey
  • 16. Ref. No. Authors and Title Method Used Key Findings Research Gaps [16] Madiha Razzaq, Devarani Devi Ningombam, Seokjoo Shin Energy Efficient K-means Clustering-based Routing Protocol for WSN Using Optimal Packet Size An energy efficient K-means clustering- based routing protocol and considers an optimal fixed packet size according to the radio parameters and channel conditions of the transceiver. Clustering techniques has used to eliminate high packet overhead. Time complexity issues. Reduce throughput and packet loss ratio. Generate congestion when large data. [17] J. S. Saji Kumar,Elizabeth Sherly, A New Hybrid Algorithm for Tolerating Security Threats in Wireless Sensor Networks The proposed model of MRM, H-PAL- PLR, and HOL-5-DAS has been proved to be efficient in case of link or node failure, packet loss and latency respectively. High packet delivery ratio, network life time, throughput, latency ratio and packet loss ratio Parameters [18] Marwa Sharawi, Eid Emary Impact of Grey Wolf Optimization on WSN Cluster Formation and Lifetime Expansion The introduced system outperforms the LEACH in almost all topologies using the different indicators. Fast approach for cluster generation in large network VIII. Literature Survey
  • 17. Ref. No. Authors and Title Method Used Key Findings Research Gaps [19] Limin Shen, Jianfeng Ma, Ximeng Liu, Fushan Wei and Meixia Miao A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks The security of our identity-based aggregate signature scheme is rigorously presented based on the computational Diffie-Hellman assumption in random oracle model. ID based signature eliminate certificate verification as long process. Third party resource required for ID signature generation Overhead generate during data transmission. Collusion attack has generates from various attacks. [20] Ravi Teja, Dr. S. Indu A Priority Based WSN Clustering of Multiple Sinl( Scenario using Artificial Bee Colony Algorithm An energy efficient as well as a priority based wireless sensor network clustering and routing algorithm for a multiple sink scenario using Artificial Bee Colony Optimization with a multi objective fitness function which takes into account the priority of each sink. ABCA has used for efficient clustering. [21] Scott A. Thompson Jr. and Bharath K. Samanthula Optimized Secure Data Aggregation in Wireless Sensor Networks A novel solution for the secure aggregation of data in WSNs based on probabilistic homomorphic encryption. By combining with a unique encoding function, proposed solution guarantees the privacy of sensor data, while also greatly reducing communication costs. Two way encoding has used which provide highest security. VIII. Literature Survey
  • 18. IX. Problem Definition (Derived from Research Gaps & Findings) • Large data transmission should generate network overhead during data transmission and it produces data leakage issues. • Trust calculation of individual node in next hop selection is not considered in excising systems. • No backup path provided in existing WSN when internal or external attack is generated. • Many nodes are destroyed when high power is consumed by internal nodes, it create a cut in network thus data is loosed which can’t be recovered by systems.
  • 19. X. Tools and Data set Required • Software: • Ubuntu • VM Ware • NS2 • Hardware: • PC with Minimum Configuration
  • 20. XI. Expected Outcomes • Energy consumption and energy modelling are important issues in designing and implementing of Wireless Sensor Networks (WSNs), which help the designers to optimize the energy consumption in WSN nodes. Good knowledge of the sources of energy consumption in WSNs is the first step to reduce energy consumption [19]. a) To enhance the network lifetime in WSN using cluster network and reduce data transmission time as well as enhance the QoS. PHASE III b) To design and develop an approach for cluster head (CH) selection using evolutionary based Genetic Algorithm (GA). PHASE I DEC 2019 Completed and published c) Design and develop a suitable data aggregation technique when data transmission using MAC protocol. PHASE II JUN 2020 d) To design Broadcast Tree Construction (BTC) based sleep scheduling approach for energy conservation protocol during data transmission. PHASE III e) To develop secure HMAC technique for authentication with secure manner. PHASE IV f) To validate the proposed system performance evaluation with traditional existing approaches. PHASE IV
  • 21. XII. Discussion on Published Results  NS2 terminal
  • 22. XII. Discussion on Published Results • Default cluster generation Cluster head generation
  • 23. XII. Discussion on Published Results • CH moves to central location Communication between sensor node and CH
  • 24. • This figure 4, will provide the drop rate overall simulation during the communication with other protocols. • This figure 5, will provide the throughput of system during the communication with other protocols. • This figure 6, will provide the how system will increased the actual time percentage of simulation due to proposed energy conservation protocol. • There is a decrease in drop rate by 2%, the throughput has increased by 3%. Also Network Lifetime has increased to 8 seconds as compared to 2 seconds in other systems. XII. Discussion on Published Results Figure 4: Drop rate of proposed vs existing Figure 5: Throughput of proposed vs existing Figure 6: Network lifetime of proposed vs existing
  • 25. XII. Discussion on Published Results Parameter Values Simulator NS-allinone 2.35 Simulation time 25 sec Channel Type Wireless Channel Propagation Model Two Ray Ground Standard MAC/802.11 Simulation Size 1000 *1500 Max packet Length 1000 Ad hoc routing AODV Traffic CBR Parameters WSN [21] Proposed (cluster base with AODV) Data Aggregation No Yes Data Security Yes (selective) Yes Energy Conservation No Yes Packet Loss High Low End to End delay High Low Packet Overhead High Low Table 1: Simulation Parameters used Table 2: Difference between the Proposed and existing WSN
  • 26. XII. Discussion on Published Results  Most of existing system having high packet drop rate due to heavy network overhead.  Various security approaches not able to provides drastic security during data transmission.  Cut generation is another problem in existing systems. (it is the concept in which any internal node automatically gets destroyed during data transmission due to energy).  Need to propose an lightweight data transmission with secure approach in large scale WSN.
  • 27. XIII. Timeline for Research work  To design and develop an approach for cluster head (CH) selection using evolutionary based Genetic Algorithm (GA). PHASE I DEC 2019 Completed and published  Design and develop a suitable data aggregation technique when data transmission using MAC protocol. PHASE II JUN 2020  To enhance the network lifetime in WSN using cluster network and reduce data transmission time as well as enhance the QoS. PHASE III A SEPT 2020  To design Broadcast Tree Construction (BTC) based sleep scheduling approach for energy conservation protocol during data transmission. PHASE III B DEC 2020  To develop secure HMAC technique for authentication with secure manner. PHASE IV A MAR 2021  To validate the proposed system performance evaluation with traditional existing approaches. PHASE IV B JUN 2021
  • 28. XIV. Conclusion • We have proposed a HMAC and data aggregation in WSN. Initially the CHs are chosen based on the node connectivity, which acts as a Data Aggregator. Then, the clustering process is executed using the genetic algorithm. This technique highly minimizes energy consumption and thereby enhancing the network lifetime [20]. • When the cluster member wants to transmit data to the aggregator, a data encryption techniques are utilized. The data security module utilized offers confidentiality to the data packets, thus ensuring the authenticity and integrity of the sensed data. • Simulation results, shows that the proposed technique minimizes the energy consumption, ensures data security and reduces the transmission overhead [21].
  • 29. XV. Publication related to work • A Paper submitted and presented in IC-ICN Multicon- W 2020 conference in February 2020 at TCET. • Also submitted in Springer through IC-ICN Multicon- W 2020 • Status: accepted in Springer • Title: “Secure Data Aggregation and data Transmission using HMAC Protocol in Cluster base Wireless Sensor Network”
  • 30. Courses Completed • Completed course on “Wireless Communication Emerging Technologies”, offered by Yonsei University through Coursera on 15 June 2018. • Attended the PMMMNMTT Sponsered One Week FDP on “Cyber Security” at Atharva College of Enginnering from 3 to 8 Sept. 2019. • Attended the Webinar on “IoT for Music Theropy, Research Paper Writing, Gateway to Cyber Security” at St. John College of Enginnering from 24 to 28 May 2020. • Attended the Webinar on “Usage of Technology in COVID 19” at Terna College of Enginnering from 28 May to 2 June 2020.
  • 31. References [1] F. Ahamad, R. Kumar, “Energy Efficient Region Based Clustering Algorithm for WSN using Fuzzy Logic”, IEEE International Conference on Recent Trends In Electronics Information Communication Technology, May 20-21, India, 2016. [2] I. S. Akila, R. Venkateshan, “A Fuzzy Based Energy-aware Clustering Architecture for Cooperative Communication in WSN”, The Computer Journal Advance Access published September 12, 2016. [3] ALGHAMDI, Wael Y.; WU, Hui; KANHERE, Salil S. Reliable and secure end-to-end data aggregation using secret sharing in wsns. In: 2017 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2017. p. 1-6. [4] OZDEMIR, Suat; ÇAM, Hasan. Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Transactions on networking, 2009, 18.3: 736-749.. [5] G. Basavraj, Dr. C. Jaidhar, “H-LEACH Protocol with Modified Cluster Head Selection for WSN”, International Conference on Smart Technology for Smart Nation, 2017 [6] T M Behera, S K Mohapatra, Proshikshya Mukherjee, H K Sahoo, “Work-In-Progress: DEEC-VD: A Hybrid Energy Utilization Cluster-based Routing Protocol for WSN for application in IoT”, International Conference on Information Technology, 2017. [7] Dr. P. Sujatha, “SURVEY ON WSN USING CLUSTERING”, Second International Conference on Recent Trends and Challenges in Computational Models, 2017 [8] A. Gupta, “A Novel K-Means L-Layer Algorithm for uneven Clustering in WSN”, IEEE International Conference on Computer, Communication, and Signal Processing, 2017. [9] K. Hamsha, “Analysis of Security Mechanism Using Threshold Cryptography for Hierarchical Wireless Sensor Networks”, International Conference on Communication and Signal Processing, April 6-8, India, 2017. [10] ISTWAL, Yasha; VERMA, Shashi Kant. Dual cluster head routing protocol in WSN. In: 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, 2017. p. 1-6.
  • 32. References [11] W. Jin,” Adaptive clustering approach over unreliable links for WSN”, IEEE 13th International Conference on Electronic Measurement & Instruments, 2017. [12] J. Wang, “Clustering Protocol based on Immune Optimization Algorithms for Wireless Sensor Networks”, 2nd IEEE International Conference on Computer and Communications, 2016. [13] MISHRA, Mukesh; GUPTA, Gourab Sen; GUI, Xiang. A review of and a proposal for cross-layer design for efficient routing and secure data aggregation over WSN. In: 2017 3rd International Conference on Computational Intelligence and Networks (CINE). IEEE, 2017. p. 120-125. [14] NEHRA, Priyanka; NAGARAJU, A. Fault Tolerance using Quadratic-Minimum Spanning Tree (Q-MST) with Secure Data Aggregation in Wireless Sensor Networks. In: 2017 14th IEEE India Council International Conference (INDICON). IEEE, 2017. p. 1-6. [15] P. Padmaja, “DETECTION OF MILICIOUS NODE IN WIRELESS SENSOR NETWORK”, IEEE 7th International Advance Computing Conference, 2017. [16] RAZZAQ, Madiha; NINGOMBAM, Devarani Devi; SHIN, Seokjoo. Energy efficient K-means clustering-based routing protocol for WSN using optimal packet size. In: 2018 International Conference on Information Networking (ICOIN). IEEE, 2018. p. 632-635. [17] E. Sherly, “A New Hybrid Algorithm for Tolerating Security Threats in Wireless Sensor Networks”, International CET Conference on Control, Communication, and Computing, Trivandrum, 2018. [18] SHARAWI, Marwa; EMARY, Eid. Impact of grey wolf optimization on WSN cluster formation and lifetime expansion. In: 2017 Ninth International Conference on Advanced Computational Intelligence (ICACI). IEEE, 2017. p. 157-162. [19] SHEN, Limin, et al. A secure and efficient id-based aggregate signature scheme for wireless sensor networks. IEEE Internet of Things Journal, 2016, 4.2: 546-554.
  • 33. References [20] TEJA, Ravi; INDU, S. A priority based WSN clustering of multiple sink scenario using artificial bee colony algorithm. In: 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS). IEEE, 2016. p. 130-134. [21] THOMPSON, Scott A.; SAMANTHULA, Bharath K. Optimized secure data aggregation in wireless sensor networks. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2017. p. 394-3942. [22] USHA, M., et al. Node density based clustering to maximize the network lifetime of WSN using multiple mobile elements. In: 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2017. p. 10-15. [23] VIKRAM, G. Raja; KRISHNA, A. V. N.; CHATRAPATI, K. Shahu. Variable initial energy and unequal clustering (VEUC) based multicasting in WSN. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2017. p. 82-86. [24] VLADUTA, Valentin-Alexandru; GHIMES, Ana-Maria; PATRICIU, Victor Valeriu. A Proposed Solution for Analyzing the Behavior of a WSN using a Secured Neural Network Approach. In: 2018 International Symposium on Electronics and Telecommunications (ISETC). IEEE, 2018. p. 1-4. [25] WANG, Taochun, et al. An efficient and secure itinerary-based data aggregation algorithm for WSNs. In: 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017. p. 433-440. [26] YAN, An; WANG, Bin. An adaptive WSN clustering scheme based on neighborhood energy level. In: 2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC). IEEE, 2017. p. 1170-1173. [27] YUVARAJ, P.; MANIMOZHI, M. Impact of base station location in clustering schemes of WSN. In: 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS). IEEE, 2017. p. 1-5.