SlideShare a Scribd company logo
1 of 25
 SANJAY . D . DHANDARE Prof. 
saniya ansari mam 
10,oct,2014 
DYPSOE PUNE
 INTRODUCTION. 
 What is protocol. 
 What is protocol mechanism. 
 What is network security. 
 Fundamentals of network security. 
 What it means? 
 Attacks on security network. 
 Mechanism for security. 
 Protocols for security. 
 Conclusion. 
 References.
What is a Sensor Network ? 
A heterogeneous system combining tiny sensors and actuators 
with general-purpose computing elements. Most consisting of 
hundreds or thousands of low-power, low-cost nodes deployed to 
monitor and affect the environment. 
What are they used for? 
 Ocean and wildlife monitoring. 
 Monitoring of manufactured machinery. 
 Building safety. 
 Earthquake monitoring. 
 Variety of military applications. 
 Medical monitoring and research.
PROTOCOL 
 “set of rules commonly employ for 
proper communication in between sender 
and receiver in every wireless sensor 
network.
 The mechanism in which different protocol 
performs their well defined task for healthy 
communication in the sensor network. 
 This is the key term used in every network to 
protect from different attacks.
Network security is nothing but the collection 
of all policies, mechanisms and services that 
afford a network which required protection 
from unauthorised access.
The network is said to be secure if it have, 
 Confidentiality. 
 Integrity. 
 Availability.
 DATA CONFIDENTIALITY – data leakage to 
neighboring networks must be prevent. 
 DATA INTEGRITY – transmission data cannot be 
modified. 
 AVAILABILITY–network able to work at any time. 
 DATA AUTHENTICATION – verification of 
sender/receiver.
Following are the different attacks on security: 
 Denial-of-service. 
 Routing attacks. 
 Data aggregation attacks. 
 Privacy attacks.
 Attempt to stop network from proper 
functioning. 
 Disturbed the service provided by the network. 
 It may occur at various layer of protocol : 
physical layer Dos. 
Data link layer Dos.
 What happen? 
 Data is forwarded along one or more routes. 
 EFFECT: 
 Traffic increases at node and as a result 
packets (data) can not reaches to destination.
 Blackhole attack. 
 Rushing attacks. 
 Sinkhole attacks. 
 Sybil attack. 
Wormhole attack
Reducing frequency of operation. 
Reducing packets size. 
Replacing real measurement by fake readings.
 May introduce by accessing the data store at 
node. 
 May occur at node which perform more 
activity. 
 The traffic analysis can be used to identify the 
important nodes.
 Cryptography : 
Cryptography is a method of storing and 
transmitting data in a particular form so that 
only those for whom it is intended can read and 
process. 
The term plaintext is often used which means 
ordinary text sometimes referred as cipher text 
called as encryption and back again called 
decryption
 SYMMETRIC CRYPTOGRAPHY: 
 A encryption system in which the sender and 
receiver of a messages share a single key that 
is used to encrypt and descrypt the data. 
 PUBLIC KEY CRYPTOGRAPHY; 
 It uses two keys a public key to encrypt the 
massage and a private key to descrypt them.
It is nothing but reliable and secure 
establishment of shared keys among 
neighbouring nodes in a network. 
In this approach every sensor shares different 
pairwise key with each other. Hence the sensor 
network can be represented as matrix with rows 
and column.
Dos attacks. 
Aggregation attacks. 
Routing attacks
 Encryption protocol. 
 Same message is encrypted differently at each time. 
 tinySec protocol. 
 It supports two mechanism : 
 Authentication encryption. 
 Authentication only. 
 Localized encryption and Authentication protocol.
It provide four keying mechanism as follows, 
 Individual key . 
 Group key. 
 Cluster key. 
 Pairwise key.
 from above discussion we conclude that the 
security is a important issue in a wireless 
sensor network and can be introduced by using 
a standard protocol and mechanism to prevent 
unauthorised access.
 Dargie w and poellabaur fundamentals of 
wireless sensor networks :theory and practise 
john wiley and sons 2010 . 
 Protocols and architectures for wireless sensor 
networks holger karl andreas willig 2007. 
 And E-journals .
Network Security Protocols Explained

More Related Content

What's hot

Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresAditya Ratnaparkhi
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemRoshan Ranabhat
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall BharathiKrishna6
 
Types of firewall
Types of firewallTypes of firewall
Types of firewallPina Parmar
 

What's hot (20)

Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Darkweb
DarkwebDarkweb
Darkweb
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Viewers also liked

Slst rule 2016_h_pg_3
Slst rule 2016_h_pg_3Slst rule 2016_h_pg_3
Slst rule 2016_h_pg_3M H
 
Notification slst 0912_2016
Notification slst 0912_2016Notification slst 0912_2016
Notification slst 0912_2016M H
 
WBBSE Affiliated Schools West bengal
WBBSE  Affiliated Schools  West bengalWBBSE  Affiliated Schools  West bengal
WBBSE Affiliated Schools West bengalM H
 
Acid catalyzed hydration
Acid catalyzed hydrationAcid catalyzed hydration
Acid catalyzed hydrationM H
 
Slst brochure 0912_2016
Slst brochure 0912_2016Slst brochure 0912_2016
Slst brochure 0912_2016M H
 
Csir chemistry acid base equilibrium question paper
Csir chemistry acid base equilibrium question paperCsir chemistry acid base equilibrium question paper
Csir chemistry acid base equilibrium question paperM H
 
বাংলা উপদেশ এসএমএস Advice sms
বাংলা উপদেশ এসএমএস Advice smsবাংলা উপদেশ এসএমএস Advice sms
বাংলা উপদেশ এসএমএস Advice smsM H
 
Metallic bond bons chemistry 100 mcq
Metallic bond bons chemistry  100 mcqMetallic bond bons chemistry  100 mcq
Metallic bond bons chemistry 100 mcqM H
 
EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj...
 EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj... EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj...
EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj...D Y PATIL COLLEGE OF ENGINEERING PUNE
 
প্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহ
প্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহপ্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহ
প্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহM H
 

Viewers also liked (14)

scan test by sanjay d dhandare
scan test by sanjay d dhandarescan test by sanjay d dhandare
scan test by sanjay d dhandare
 
Slst rule 2016_h_pg_3
Slst rule 2016_h_pg_3Slst rule 2016_h_pg_3
Slst rule 2016_h_pg_3
 
Notification slst 0912_2016
Notification slst 0912_2016Notification slst 0912_2016
Notification slst 0912_2016
 
WBBSE Affiliated Schools West bengal
WBBSE  Affiliated Schools  West bengalWBBSE  Affiliated Schools  West bengal
WBBSE Affiliated Schools West bengal
 
Proposal bits discovery
Proposal bits discoveryProposal bits discovery
Proposal bits discovery
 
Acid catalyzed hydration
Acid catalyzed hydrationAcid catalyzed hydration
Acid catalyzed hydration
 
Tele-medicine system
Tele-medicine system Tele-medicine system
Tele-medicine system
 
Slst brochure 0912_2016
Slst brochure 0912_2016Slst brochure 0912_2016
Slst brochure 0912_2016
 
Csir chemistry acid base equilibrium question paper
Csir chemistry acid base equilibrium question paperCsir chemistry acid base equilibrium question paper
Csir chemistry acid base equilibrium question paper
 
বাংলা উপদেশ এসএমএস Advice sms
বাংলা উপদেশ এসএমএস Advice smsবাংলা উপদেশ এসএমএস Advice sms
বাংলা উপদেশ এসএমএস Advice sms
 
Metallic bond bons chemistry 100 mcq
Metallic bond bons chemistry  100 mcqMetallic bond bons chemistry  100 mcq
Metallic bond bons chemistry 100 mcq
 
Li fi technology
Li fi technologyLi fi technology
Li fi technology
 
EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj...
 EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj... EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj...
EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj...
 
প্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহ
প্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহপ্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহ
প্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহ
 

Similar to Network Security Protocols Explained

Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...ijtsrd
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIOSR Journals
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with securityeSAT Publishing House
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocolseSAT Journals
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Editor IJARCET
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERYASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERYAM Publications
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction SecurityMeet Soni
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Networkijtsrd
 

Similar to Network Security Protocols Explained (20)

Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
Paper1
Paper1Paper1
Paper1
 
G011123539
G011123539G011123539
G011123539
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
Network security
Network security Network security
Network security
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
A05510105
A05510105A05510105
A05510105
 
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERYASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
Ii3415521555
Ii3415521555Ii3415521555
Ii3415521555
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
A Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor NetworkA Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor Network
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
50120140507012
5012014050701250120140507012
50120140507012
 
50120140507012
5012014050701250120140507012
50120140507012
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Network Security Protocols Explained

  • 1.  SANJAY . D . DHANDARE Prof. saniya ansari mam 10,oct,2014 DYPSOE PUNE
  • 2.  INTRODUCTION.  What is protocol.  What is protocol mechanism.  What is network security.  Fundamentals of network security.  What it means?  Attacks on security network.  Mechanism for security.  Protocols for security.  Conclusion.  References.
  • 3. What is a Sensor Network ? A heterogeneous system combining tiny sensors and actuators with general-purpose computing elements. Most consisting of hundreds or thousands of low-power, low-cost nodes deployed to monitor and affect the environment. What are they used for?  Ocean and wildlife monitoring.  Monitoring of manufactured machinery.  Building safety.  Earthquake monitoring.  Variety of military applications.  Medical monitoring and research.
  • 4. PROTOCOL  “set of rules commonly employ for proper communication in between sender and receiver in every wireless sensor network.
  • 5.  The mechanism in which different protocol performs their well defined task for healthy communication in the sensor network.  This is the key term used in every network to protect from different attacks.
  • 6. Network security is nothing but the collection of all policies, mechanisms and services that afford a network which required protection from unauthorised access.
  • 7. The network is said to be secure if it have,  Confidentiality.  Integrity.  Availability.
  • 8.  DATA CONFIDENTIALITY – data leakage to neighboring networks must be prevent.  DATA INTEGRITY – transmission data cannot be modified.  AVAILABILITY–network able to work at any time.  DATA AUTHENTICATION – verification of sender/receiver.
  • 9. Following are the different attacks on security:  Denial-of-service.  Routing attacks.  Data aggregation attacks.  Privacy attacks.
  • 10.  Attempt to stop network from proper functioning.  Disturbed the service provided by the network.  It may occur at various layer of protocol : physical layer Dos. Data link layer Dos.
  • 11.  What happen?  Data is forwarded along one or more routes.  EFFECT:  Traffic increases at node and as a result packets (data) can not reaches to destination.
  • 12.  Blackhole attack.  Rushing attacks.  Sinkhole attacks.  Sybil attack. Wormhole attack
  • 13. Reducing frequency of operation. Reducing packets size. Replacing real measurement by fake readings.
  • 14.  May introduce by accessing the data store at node.  May occur at node which perform more activity.  The traffic analysis can be used to identify the important nodes.
  • 15.  Cryptography : Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process. The term plaintext is often used which means ordinary text sometimes referred as cipher text called as encryption and back again called decryption
  • 16.  SYMMETRIC CRYPTOGRAPHY:  A encryption system in which the sender and receiver of a messages share a single key that is used to encrypt and descrypt the data.  PUBLIC KEY CRYPTOGRAPHY;  It uses two keys a public key to encrypt the massage and a private key to descrypt them.
  • 17.
  • 18. It is nothing but reliable and secure establishment of shared keys among neighbouring nodes in a network. In this approach every sensor shares different pairwise key with each other. Hence the sensor network can be represented as matrix with rows and column.
  • 19.
  • 20. Dos attacks. Aggregation attacks. Routing attacks
  • 21.  Encryption protocol.  Same message is encrypted differently at each time.  tinySec protocol.  It supports two mechanism :  Authentication encryption.  Authentication only.  Localized encryption and Authentication protocol.
  • 22. It provide four keying mechanism as follows,  Individual key .  Group key.  Cluster key.  Pairwise key.
  • 23.  from above discussion we conclude that the security is a important issue in a wireless sensor network and can be introduced by using a standard protocol and mechanism to prevent unauthorised access.
  • 24.  Dargie w and poellabaur fundamentals of wireless sensor networks :theory and practise john wiley and sons 2010 .  Protocols and architectures for wireless sensor networks holger karl andreas willig 2007.  And E-journals .