2. • Introduction
• Existing System
• Proposed System
• Architectural Diagram
• Features
• Application
• Future Scope
• Conclusion
• References
3. • A sensor node wirelessly sends messages to a
base station via multi-hop path
Fig: Wireless sensor network
4. • Security of WSNs
• Trust Aware Shell :
A robust trust aware routing framework for dynamic
WSNs
provides trustworthy and energy-efficient route
effective against harmful attacks
5. • Hackers aggravate network conditions
• A traditional techniques does not address the
severe problems:
tampering nodes
create traffic collision
drop or misdirect messages in routes
jam the communication channel by creating radio
interference
6. • Protect WSNs from the harmful attacks exploiting
the replay of routing information
• Centres on trustworthiness and energy efficiency
• Allow existing routing protocols to incorporate our
implementation
• No tight time synchronization & known geographic
information
10. Neighborhood
Table
Neighbor
Energy Cost
Fig. Working of Energy Watcher
11. ENb = EN–>b + Eb
ENb: Average Energy Cost.
EN–>b:Average Energy Cost of successfully
delivering a data packet from N to its neighbour
b.
Eb: Energy Cost for b.
12. •Trust manager is to get neighbor trust level from a
neighborhood table
Fig: Example To Illustrate Working Of Trust Manager
17. Mobile Target Detection in the Presence of an
Anti-Detection Mechanism
Authenticated Routing
Node-to-Node Key Agreement
Secure Military Application
Healthcare Application
19. • G. Zhan, W. Shi, and J. Deng, “Tarf: A trust-aware routing framework
for wireless sensor networks,” in Proceeding of the 7th European
Conference on Wireless Sensor Networks (EWSN’12), 2012.
• F. Zhao and L. Guibas, Wireless Sensor Networks: An Information
Processing Approach. Morgan Kaufmann Publishers, 2004.
• C. Karlof and D. Wagner, “Secure routing in wireless sensor networks:
attacks and countermeasures,” in Proceedings of the1st IEEE
International Workshop on Sensor Network Protocols and
Applications, 2003.
• M. Jain and H. Kandwal, “A survey on complex wormhole attack in
wireless ad hoc networks,” in Proceedings of International Con-
ference on Advances in Computing, Control, and Telecommunication
Technologies (ACT ’09), 28-29 2009