SlideShare a Scribd company logo
1 of 19
Cyber Threat
Intelligence
Presented By:-
Name: Amitosh Dash
Regd. No: 2002070148
Dept. of Electronics & Telecommunication
Engineering
Table of
Contents
• What is cyber threat intelligence
• Threat intelligence cycle
• Applications of Wireless Sensor networks
• Advantages of WSN
• Disadvantages of WSN
• Usage of Localization
• Localization schemes
• Future Scope
Dept. of Electronics & Telecommunication 02/18
Idea behind the WSN
concept
We integrate three major components together which
are as follows:
1. Check: What going on inside the world.
2. Track: Locate objects where they are.
eg. In workstation to know the position of physical assets.
3. Trace: The ability of sensors to lock the history of their sensor
measurement.
eg. Inside a truck containing fruits from Delhi to Tatanagar can lock
the temperature measurements which can be traced after that.
Dept. of Electronics & Telecommunication Engineering 03/1
Introduction to
WSN
• It consists of sensors which are small, with limited
processing and computing resources.
• These sensors work with each other to sense some
physical phenomenon and then the information
gathered is processed to get relevant results.
• It consists of protocols and algorithms with self
organizing capabilities.
Dept. of Electronics & Telecommunication Engineering 04/1
Architecture of
WSN
Dept. of Electronics & Telecommunication Engineering 05/1
Fig:1
More clear picture of WSN
Dept. of Electronics & Telecommunication Engineering 06/18
Fig:2
Sensor Network
Applications of Wireless Sensor networks
Habitat
Animal Monitoring
(Zebra, birds)
Tracking
Health
Patient monitoring
Military
Enemy Tracking
Monitoring
Habitat
Animal Tracking
Business
Inventory Monitoring
Public/Industrial
Structural Monitoring
Factory Monitoring
Inventory Monitoring
Machine Monitoring
Chemical Monitoring
Public/Industrial
Traffic Tracking
Car/Bus Tracking
Military
Security Detection
Business
Human tracking
Environment
Environmental Monitoring
(weather, temperature,
pressure)
Dept. of Electronics & Telecommunication Engineering 07/18
Advantages of WSN
1.It avoids a lot of wiring.
2.It can accommodate new devices at any time.
3.It’s flexible to go through physical partitions.
4.It can be accessed through a centralized
monitor.
Dept. of Electronics & Telecommunication Engineering 08/18
Disadvantages of WSN
1.It’s easy for hackers to hack it as we cant control
propagation of waves.
2. Comparatively low speed of communication.
3. Gets distracted by various elements like Blue
tooth.
Dept. of Electronics & Telecommunication Engineering 09/1
Localization in WSN
• Localization is a process to compute the locations of wireless.
• The main idea in most localization methods is that some deployed
nodes (landmarks) with known coordinates (e.g., GPS-equipped
nodes) transmit beacons with their coordinates in order to help
other nodes localize themselves.
• It consist of two types of nodes:
Beacon (Anchor) node:
It’s a node that’s aware of it’s location, either through GPS or
manual pre-programming during deployment.
Unknown nodes:
Nodes whose location is to be determined with the help of known
nodes.
Dept. of Electronics & Telecommunication Engineering 10/1
Dept. of Electronics & Telecommunication Engineering 11/1
Fig:3
Usage of
Localization
• Coverage
• Routing
• Location service
• Target tracking
• Rescue
Dept. of Electronics & Telecommunication Engineering 12/18
Localization
schemes
1. Range-based Localization: uses the measured
distance/angle to estimate the indoor location
using geometric principles.
Eg. AOA,TOA,TDOA,RSSI
2. Range-free Localization: uses the approximate
distance between the anchor and unknown nodes.
Eg. HOP count based measurements like dv hop
Dept. of Electronics & Telecommunication Engineering 13/1
Advantages and Disadvantages of Range based
WSN
Advantages
• Provide more accurate distance measurements.
Disadvantages
• Because of cost and limitation of the hardware many wireless
sensor networks applications do not prefer to use of range
based localization schemes.
• These techniques are not suitable for a large- scale sensor
network.
Dept. of Electronics & Telecommunication Engineering 14/1
Advantages and Disadvantages of Range free
localization
Advantages:
• There is no need of extra hardware so it is cost
effective.
• These techniques are suitable for a large- scale sensor
network.
Disadvantages:
• provide only approximate values of distance
measurements.
Dept. of Electronics & Telecommunication Engineering 15/1
Future
Scope
• More accurate: Sensors will become better at pinpointing their
own location.
• Smarter algorithms: Research will focus on creating clever
computer programs that can figure out where sensors are, even in
tricky situations.
• New tech like 5G and IoT: These technologies will make sensor
location even more accurate and efficient.
• Versatility: Location-aware sensors won't just help us track things,
but also enhance security and efficiency in various applications.
• Convenience and safety: These sensors will make our lives easier
and safer by knowing where they are and how to work better.
Dept. of Electronics & Telecommunication Engineering 16/1
Conclusio
n
In conclusion, localization in wireless sensor networks is a critical
and evolving field that holds immense potential for improving the
accuracy, efficiency, and functionality of sensor-based applications
across various domains. As technology advances, the future of
sensor localization promises to be more accurate, versatile, and
integrated with emerging technologies, ultimately enhancing our
lives and making our networks smarter and safer.
Dept. of Electronics & Telecommunication Engineering 17/18
Reference
s
• Wireless Sensor Networks: A Survey on the State of the Art and the 802.15.4 and
ZigBee Standards.
Author: Ian F. Akyildiz, Weilian Su.
Published in: Computer Communications, 2002
• Localization for Mobile Sensor Networks: Challenges, Algorithms, and Trade-
offs.
Author: Yunmei Lin and Xiaojun Shen
Published in: IEEE Transactions on Wireless Communications, 2006
• Cooperative Localization in Wireless Sensor Networks: A Comprehensive
Survey.
Author: A. Savvides, C. Han, and M. B. Srivastava
Published in: IEEE Communications Surveys & Tutorials, 2005
Dept. of Electronics & Telecommunication Engineering 18/18
Cyber Threat Intelligence for information .pptx

More Related Content

Similar to Cyber Threat Intelligence for information .pptx

Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...
Amy Alexander
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.ppt
DEEPAK948083
 

Similar to Cyber Threat Intelligence for information .pptx (20)

Development and performance evaluation of localization algorithm for variety ...
Development and performance evaluation of localization algorithm for variety ...Development and performance evaluation of localization algorithm for variety ...
Development and performance evaluation of localization algorithm for variety ...
 
Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
S04404116120
S04404116120S04404116120
S04404116120
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
Sensor.ppt
Sensor.pptSensor.ppt
Sensor.ppt
 
Sensor
SensorSensor
Sensor
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.ppt
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 
Chapter
ChapterChapter
Chapter
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSA NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
 
iotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdfiotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdf
 
3 ijcse-01222-5
3 ijcse-01222-53 ijcse-01222-5
3 ijcse-01222-5
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
574 501-507
574 501-507574 501-507
574 501-507
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
 
IJSRED-V1I2P12
IJSRED-V1I2P12IJSRED-V1I2P12
IJSRED-V1I2P12
 

Recently uploaded

21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
BalamuruganV28
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
benjamincojr
 

Recently uploaded (20)

21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Intro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney UniIntro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney Uni
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 

Cyber Threat Intelligence for information .pptx

  • 1. Cyber Threat Intelligence Presented By:- Name: Amitosh Dash Regd. No: 2002070148 Dept. of Electronics & Telecommunication Engineering
  • 2. Table of Contents • What is cyber threat intelligence • Threat intelligence cycle • Applications of Wireless Sensor networks • Advantages of WSN • Disadvantages of WSN • Usage of Localization • Localization schemes • Future Scope Dept. of Electronics & Telecommunication 02/18
  • 3. Idea behind the WSN concept We integrate three major components together which are as follows: 1. Check: What going on inside the world. 2. Track: Locate objects where they are. eg. In workstation to know the position of physical assets. 3. Trace: The ability of sensors to lock the history of their sensor measurement. eg. Inside a truck containing fruits from Delhi to Tatanagar can lock the temperature measurements which can be traced after that. Dept. of Electronics & Telecommunication Engineering 03/1
  • 4. Introduction to WSN • It consists of sensors which are small, with limited processing and computing resources. • These sensors work with each other to sense some physical phenomenon and then the information gathered is processed to get relevant results. • It consists of protocols and algorithms with self organizing capabilities. Dept. of Electronics & Telecommunication Engineering 04/1
  • 5. Architecture of WSN Dept. of Electronics & Telecommunication Engineering 05/1 Fig:1
  • 6. More clear picture of WSN Dept. of Electronics & Telecommunication Engineering 06/18 Fig:2
  • 7. Sensor Network Applications of Wireless Sensor networks Habitat Animal Monitoring (Zebra, birds) Tracking Health Patient monitoring Military Enemy Tracking Monitoring Habitat Animal Tracking Business Inventory Monitoring Public/Industrial Structural Monitoring Factory Monitoring Inventory Monitoring Machine Monitoring Chemical Monitoring Public/Industrial Traffic Tracking Car/Bus Tracking Military Security Detection Business Human tracking Environment Environmental Monitoring (weather, temperature, pressure) Dept. of Electronics & Telecommunication Engineering 07/18
  • 8. Advantages of WSN 1.It avoids a lot of wiring. 2.It can accommodate new devices at any time. 3.It’s flexible to go through physical partitions. 4.It can be accessed through a centralized monitor. Dept. of Electronics & Telecommunication Engineering 08/18
  • 9. Disadvantages of WSN 1.It’s easy for hackers to hack it as we cant control propagation of waves. 2. Comparatively low speed of communication. 3. Gets distracted by various elements like Blue tooth. Dept. of Electronics & Telecommunication Engineering 09/1
  • 10. Localization in WSN • Localization is a process to compute the locations of wireless. • The main idea in most localization methods is that some deployed nodes (landmarks) with known coordinates (e.g., GPS-equipped nodes) transmit beacons with their coordinates in order to help other nodes localize themselves. • It consist of two types of nodes: Beacon (Anchor) node: It’s a node that’s aware of it’s location, either through GPS or manual pre-programming during deployment. Unknown nodes: Nodes whose location is to be determined with the help of known nodes. Dept. of Electronics & Telecommunication Engineering 10/1
  • 11. Dept. of Electronics & Telecommunication Engineering 11/1 Fig:3
  • 12. Usage of Localization • Coverage • Routing • Location service • Target tracking • Rescue Dept. of Electronics & Telecommunication Engineering 12/18
  • 13. Localization schemes 1. Range-based Localization: uses the measured distance/angle to estimate the indoor location using geometric principles. Eg. AOA,TOA,TDOA,RSSI 2. Range-free Localization: uses the approximate distance between the anchor and unknown nodes. Eg. HOP count based measurements like dv hop Dept. of Electronics & Telecommunication Engineering 13/1
  • 14. Advantages and Disadvantages of Range based WSN Advantages • Provide more accurate distance measurements. Disadvantages • Because of cost and limitation of the hardware many wireless sensor networks applications do not prefer to use of range based localization schemes. • These techniques are not suitable for a large- scale sensor network. Dept. of Electronics & Telecommunication Engineering 14/1
  • 15. Advantages and Disadvantages of Range free localization Advantages: • There is no need of extra hardware so it is cost effective. • These techniques are suitable for a large- scale sensor network. Disadvantages: • provide only approximate values of distance measurements. Dept. of Electronics & Telecommunication Engineering 15/1
  • 16. Future Scope • More accurate: Sensors will become better at pinpointing their own location. • Smarter algorithms: Research will focus on creating clever computer programs that can figure out where sensors are, even in tricky situations. • New tech like 5G and IoT: These technologies will make sensor location even more accurate and efficient. • Versatility: Location-aware sensors won't just help us track things, but also enhance security and efficiency in various applications. • Convenience and safety: These sensors will make our lives easier and safer by knowing where they are and how to work better. Dept. of Electronics & Telecommunication Engineering 16/1
  • 17. Conclusio n In conclusion, localization in wireless sensor networks is a critical and evolving field that holds immense potential for improving the accuracy, efficiency, and functionality of sensor-based applications across various domains. As technology advances, the future of sensor localization promises to be more accurate, versatile, and integrated with emerging technologies, ultimately enhancing our lives and making our networks smarter and safer. Dept. of Electronics & Telecommunication Engineering 17/18
  • 18. Reference s • Wireless Sensor Networks: A Survey on the State of the Art and the 802.15.4 and ZigBee Standards. Author: Ian F. Akyildiz, Weilian Su. Published in: Computer Communications, 2002 • Localization for Mobile Sensor Networks: Challenges, Algorithms, and Trade- offs. Author: Yunmei Lin and Xiaojun Shen Published in: IEEE Transactions on Wireless Communications, 2006 • Cooperative Localization in Wireless Sensor Networks: A Comprehensive Survey. Author: A. Savvides, C. Han, and M. B. Srivastava Published in: IEEE Communications Surveys & Tutorials, 2005 Dept. of Electronics & Telecommunication Engineering 18/18