SlideShare a Scribd company logo
1 of 36
PRESENTED BY: MR. AJIT M. KARANJKAR
GUIDED BY: PROF. D.H. KULKARNI
EXAM SEAT NUMBER: 5204
DEPARTMENT OF COMPUTER ENGINEERING.
COLLEGE NAME: STES SMT KASHIBAI NAVALE COLLEGE OF ENGG. VADGAON BK, PUNE
COLLEGE CODE:036
DICTIONARY BASED SECURED
PROVENANCE COMPRESSION FOR
WIRELESS SENSOR NETWORK
STE’S SMT.KASHIBAI NAVALE COLLEGE OF ENGINEERING VADGAON
BK, PUNE
CONTENTS
• INTRODUCTION
• MOTIVATION
• OUR CONTRIBUTION
• LITERATURE SURVEY
• OUR PROPOSED APPROCH
• ALGORITHM
• UML DIAGRAM
• PERFORMANCE RESULT ANALYSIS
• CONCLUSION AND FUTURE WORKS
• REFERENCES
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 2
INTRODUCTION
• Wireless sensor network sometime called wireless sensor and actuator network.
• WSN is built of node from a few to several hundreds or even thousands where each
node is connected to one sensors. Each sensor network node has typically several parts.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 3
INTRODUCTION
• Wireless sensor network is a resource restraint if we consider energy, computation,
memory and limited communication capabilities.
• Provenance helps gather, share and store the information which may lead to privacy
and security concern in wireless sensor network.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 4
MOTIVATION
• Provenance management for sensor networks introduce several challenges
such as low energy and bandwidth consumption, efficient storage and
secure transmission.
• There are numerous techniques and method proposed for confidentiality,
integrity, and trustworthy of secure provenance transmission in WSN
MOTIVATION
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 6
OUR CONTRIBUTION
OUR CONTRIBUTION
• We introduce a secure packet sequence number generation mechanism and use the
AM-FM sketch technique to secure the provenance.
• We design an efficient and distributed algorithm for encoding the provenance
information as well as a centralized approach for its decoding.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 8
LITERATURE
SURVEY
LITERATURE SURVEY
AUTHOR TITLE NAME YEAR SUMMARY
S. Sultana, G. Ghinita,
E.Bertino, and M. Shehab.
A lightweight secure scheme for
detecting provenance forgery and
packet drop attacks in wireless
sensor networks.
2013.
Data are produced at a large number of
sensor node sources and processed in
network.
B. Shebaro, S.
Sultana, S. R. Gopavaram,
and E. Bertino ,
Demonstrating a lightweight data
provenance for sensor networks.
2012 Develop a light weight scheme for securely
transmitting provenance for sensor
Network.
S. Sultana, G. Ghinita,
E. Bertino, and M. Shehab,
A lightweight secure
provenance scheme for wireless
sensor networks
2012.
Lightweight provenance encoding and
decoding scheme based on bloom filters.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 10
Cont…..
AUTHOR TITLE NAME YEAR SUMMARY
W. Zhou, Q. Fei, A. Narayan,
A. aeberlen, B. T. Loo,
B. and M. Sherr
Secure network provenance. 2011
Evaluated a SNooPy prototype with three
different example applications: the Quagga
BGP daemon, a declarative implementation
of Chord, and Hadoop MapReduce.
S. M. I. Alam and S. Fahmy
Energy-efficient provenance
transmission in large-scale wireless
sensor networks.
2011
We adapt the probabilities packet
marketing(PPM) approach trace back .
Further two encoding methods and
combine to deal with topological changes
in the network.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 11
PAPER PUBLICATION
• Ajit M. Karanjkar , Prof,D.H.Kulkarni “ A Dictionry Basesd secure provenance and
compression For Wireless Sensor Network Part-I” ,International Engineering Research
journal(IERJ) ISSN: 2395-1621 Vol : 2 Issue 1 Feb 2018.
• Mr.Ajit M. Karanjkar , Prof,D.H.Kulkarni ” A Dictionary Based Secure Compression And
Provenance For WSN”at, Sinhgad Institute Of Technology Lonavala, Department of
Computer engineering, Lonavala in CPGCON-2018.
• Mr. Ajit M. Karanjkar , Asst. Prof, D. H. Kulkarni “A Dictionary Based Secure Provenance
and Compression For Wireless Sensor Network(WSNs) Part-II”, International Journal of
Research in Engineering, Technology and Science(IJRETS), ISSN 2454-1915 Vol. VIII, Issue
V, May 2018
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 12
AN ILLUSTRATION
• This Dictionary Based Provenance will be applicable for military operations.
• For Home Security.
-
-
-
• For Industrial Machine monitoring.
• For Medical monitoring.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 13
OUR PROPOSED
APPROCH
OUR PROPOSED APPROCH
Step 1: Start
Step 2: Source
Step 3: Upload File.
Step 4: Select Node
The file is send from Base Station to the next node.
Step 5: Attacker Attack in the Node
When attacker attack in the node then file is not transfer , file is
decrypted and shortest path is Changed the automatically alternate node.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 15
CONT….
Step 6: Apply Encryption & Decryption Algorithm.
checking for path is secure or not and send file to aggregate node.
Step 7: Forward File to Destination.
Encoded file receive for aggregate node, then Aggregate node deliver the
file to destination.
Step 8: Stop.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 16
MATHEMATICAL MODEL(1/3)
Average provenance size:
• When the BS receives a packet , it computes the traversed and agr fields in the
provenance.
• The average of Provenance Size for m packets, p1,p2,p3……,pm as follows.
• Where the PSi is the denotes provenance size for packet pi.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 17
MATHEMATICAL MODEL(2/3)
Verification Failure Rate:
• BS receives a packets p1,p2,p3……,pm, the verification failure rate (VFR) is defined
as the ratio of the number of packets for which verification fails over the total number
of packets received and m is the total number of received packets.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 18
MATHEMATICAL MODEL(3/3)
Total energy consumption:
• Power-TOSSIM Z to measure the amount of energy consumed by each sensor node.
If there are n1,n2, n3,…..,nm nodes in the network, the total energy consumption
(TEC) is computed as follows:
• Where ECni represents the energy consumed by a node ni and m is the total number of
nodes network.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 19
ALGORITHM
ALGORITHM
Algorithm 1: Provenance Encoding.
Input: (ni,seqi)
Output: prindex=(v,pathIndex)
if ni is a data source node then
prIndex:v = vi
pp = ni
agr = φ ;
prIndex.pathIndex= <ni , φ>
end if
if ni is a forwarder node then
prIndex:v = vi
pp = pp (∪) ni
agr = φ ;
prIndex.pathIndex= <nk , ni >
end if
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 21
Cont…
if ni is an aggregator node then
prIndex:v =vi
pp =ni
agr ={ seqi1, seqi2. . . . ; seqiM}
prIndex:pathIndex =<nb1, ni; . . . ; nbM , ni:>
end if
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 22
ALGORITHM
Algorithm 2: Provenance Decoding.
Input: pr Index = (v,pathIndex)
Output: T(Vp,Ep)
if the AM-FM verification fails then
drop the received packet
else
if v:agr = φ then
T(Vp,Ep) = Query pathIndex to PPD.
else
¥= number of ’;’ in pathIndex +1
for i = 1 to ¥ do
path i = Query branch i of pathIndex to PPD.
end for
T(Vp,Ep)= (path 1;. . . ; path¥)
end if
end if College Name:-SKNCOE Pune, Exam No:5204 , College code=036 23
SYSTEM REQUIREMENT
• HARDWARE REQUIREMENTS:
System : Pentium Dual Core.
Hard Disk : 120 GB.
Monitor : 15’’ LED
Input Devices : Keyboard, Mouse
Ram : 1 GB
• SOFTWARE REQUIREMENTS:
Operating system : Windows 7.
Coding Language : JAVA/J2EE
Tool : Netbeans 7.2.1
Database : MYSQL
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 24
UML DIAGRAM
CLASS DIAGRAM
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 26
USE CASE DIAGRAM
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 27
ACTIVITY DIAGRAM
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 28
PERFORMANCE
RESULT & ANALYSIS
PERFORMANCE RESULT & ANALYSIS
0
1
2
3
4
5
6
7
8
9
10
500 1000 1500 2000 2500 3000
AverageProvenanceSize(Bytes)
Number Of Packets Sent By 15 Data Source Node
DP BFP
Figure 1: Average Provenance Size
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 30
FUTURE WORK
&
CONCLUSION
FUTURE WORK
• Although the provenance for a packet only records the packet’s forwarding and
aggregation information, the average provenance size expands with the increases of
the packet transmission hops and the amount of nodes in a WSN.
• Provenance scheme combines the block provenance methods and the lossless
provenance compression methods.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 32
CONCLUSION
• In WSN Using packet path dictionaries, we enclose path indexes alternative of the
path itself in the provenance.
• Hence, the size of the compressed provenance in our lossless approach is smaller than
that of the existing lossy provenance schemes.
• By using the AM-FM sketch scheme and a secure packet sequence number generation
technique, we ensure the security objectives of our scheme.
• Simulation and experimental results show that our scheme can save more energy and
bandwidth than other existing provenance schemes.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 33
REFERENCES
[1]S. Sultana, G. Ghinita, E. Bertino, and M. Shehab, “A lightweight secure scheme for
detecting provenance forgery and packet drop attacks in wireless sensor networks,”
IEEE Trans. Dependable Secure Comput., vol. PP, no. 99, p. 1, 2013.
[2]B.Shebaro,S.Sultana,S.R.Gopavaram,and E. Bertino,“Demonstrating a lightweight
data provenance for sensor networks,” in Proc.ACM Conf. Comput. Commun. Security,
2012,pp. 1022–1024.
[3]S. Sultana, G. Ghinita, E. Bertino, and M. Shehab, “A lightweight secure provenance
scheme for wireless sensor networks,” in Proc. IEEE 18th Int. Conf. Parallel Distrib.
Syst., 2012, pp. 101–108.
[4]W. Zhou, Q. Fei, A. Narayan, A. Haeberlen, B. T. Loo, and M. Sherr, “Secure
network provenance,” in Proc. 23rd ACM Symp. Oper. Syst. Principles, 2011, pp. 295–
310.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 34
REFERENCES
[5]S. M. I. Alam and S. Fahmy, “Energy-efficient provenance transmission in large-scale
wireless sensor networks,” in Proc. IEEE Int. Symp. World Wireless, Mobile Multimedia
Netw., 2011, pp. 1–6.
[6]S. Sultana, E. Bertino, and M. Shehab, “A provenance based mechanism to identify
malicious packet dropping adversaries in sensor networks,” in Proc. 31st Int. Conf.
Distrib. Comput. Syst. Workshops, 2011, pp. 332–338.
[7]H.-S. Lim, Y.-S. Moon, and E. Bertino, “Provenance-based trust worthiness
assessment in sensor networks,” in Proc. 7th Int. Workshop Data Manage. Sensor Netw.,
2010, pp. 2–7.
College Name:-SKNCOE Pune, Exam No:5204 , College code=036 35
LITERATURE
SURVEY

More Related Content

What's hot

Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attackseSAT Publishing House
 
A review of analog audio scrambling methods for residual intelligibility
A review of analog audio scrambling methods for residual intelligibilityA review of analog audio scrambling methods for residual intelligibility
A review of analog audio scrambling methods for residual intelligibilityAlexander Decker
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...Mumbai Academisc
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
Review of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO SystemReview of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO Systemijtsrd
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...IAEME Publication
 
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...IRJET Journal
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace BackIRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace BackIRJET Journal
 
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityIAEME Publication
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Mumbai Academisc
 

What's hot (19)

Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
A review of analog audio scrambling methods for residual intelligibility
A review of analog audio scrambling methods for residual intelligibilityA review of analog audio scrambling methods for residual intelligibility
A review of analog audio scrambling methods for residual intelligibility
 
Hn2513581359
Hn2513581359Hn2513581359
Hn2513581359
 
Ijetcas14 426
Ijetcas14 426Ijetcas14 426
Ijetcas14 426
 
Secure communication over optical networks
Secure communication over optical networksSecure communication over optical networks
Secure communication over optical networks
 
Secure communication over fiber optic networks
Secure communication over fiber optic networksSecure communication over fiber optic networks
Secure communication over fiber optic networks
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
 
Dn36682688
Dn36682688Dn36682688
Dn36682688
 
Ijnsa050211
Ijnsa050211Ijnsa050211
Ijnsa050211
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Review of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO SystemReview of Deep Neural Network Detectors in SM MIMO System
Review of Deep Neural Network Detectors in SM MIMO System
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
 
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace BackIRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
IRJET-A Survey On Opportunistic Piggyback Marking For IP Trace Back
 
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data security
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
 

Similar to DICTIONARY BASED SECURED PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORK

Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkMuhammad Kaife Uddin
 
H030102052055
H030102052055H030102052055
H030102052055theijes
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
 
Oindree basu resume
Oindree basu resumeOindree basu resume
Oindree basu resumeOindree Basu
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...IJTET Journal
 
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE Jasleen Kaur (Chandigarh University)
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
 

Similar to DICTIONARY BASED SECURED PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORK (20)

Pratibha
PratibhaPratibha
Pratibha
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
Sudheer.pdf
Sudheer.pdfSudheer.pdf
Sudheer.pdf
 
Modeling arbiter-PUF in NodeMCU ESP8266 using artificial neural network
Modeling arbiter-PUF in NodeMCU ESP8266 using artificial neural networkModeling arbiter-PUF in NodeMCU ESP8266 using artificial neural network
Modeling arbiter-PUF in NodeMCU ESP8266 using artificial neural network
 
Cg4301470474
Cg4301470474Cg4301470474
Cg4301470474
 
H030102052055
H030102052055H030102052055
H030102052055
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 
Oindree basu resume
Oindree basu resumeOindree basu resume
Oindree basu resume
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
K016136062
K016136062K016136062
K016136062
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
 
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

DICTIONARY BASED SECURED PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORK

  • 1. PRESENTED BY: MR. AJIT M. KARANJKAR GUIDED BY: PROF. D.H. KULKARNI EXAM SEAT NUMBER: 5204 DEPARTMENT OF COMPUTER ENGINEERING. COLLEGE NAME: STES SMT KASHIBAI NAVALE COLLEGE OF ENGG. VADGAON BK, PUNE COLLEGE CODE:036 DICTIONARY BASED SECURED PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORK STE’S SMT.KASHIBAI NAVALE COLLEGE OF ENGINEERING VADGAON BK, PUNE
  • 2. CONTENTS • INTRODUCTION • MOTIVATION • OUR CONTRIBUTION • LITERATURE SURVEY • OUR PROPOSED APPROCH • ALGORITHM • UML DIAGRAM • PERFORMANCE RESULT ANALYSIS • CONCLUSION AND FUTURE WORKS • REFERENCES College Name:-SKNCOE Pune, Exam No:5204 , College code=036 2
  • 3. INTRODUCTION • Wireless sensor network sometime called wireless sensor and actuator network. • WSN is built of node from a few to several hundreds or even thousands where each node is connected to one sensors. Each sensor network node has typically several parts. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 3
  • 4. INTRODUCTION • Wireless sensor network is a resource restraint if we consider energy, computation, memory and limited communication capabilities. • Provenance helps gather, share and store the information which may lead to privacy and security concern in wireless sensor network. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 4
  • 6. • Provenance management for sensor networks introduce several challenges such as low energy and bandwidth consumption, efficient storage and secure transmission. • There are numerous techniques and method proposed for confidentiality, integrity, and trustworthy of secure provenance transmission in WSN MOTIVATION College Name:-SKNCOE Pune, Exam No:5204 , College code=036 6
  • 8. OUR CONTRIBUTION • We introduce a secure packet sequence number generation mechanism and use the AM-FM sketch technique to secure the provenance. • We design an efficient and distributed algorithm for encoding the provenance information as well as a centralized approach for its decoding. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 8
  • 10. LITERATURE SURVEY AUTHOR TITLE NAME YEAR SUMMARY S. Sultana, G. Ghinita, E.Bertino, and M. Shehab. A lightweight secure scheme for detecting provenance forgery and packet drop attacks in wireless sensor networks. 2013. Data are produced at a large number of sensor node sources and processed in network. B. Shebaro, S. Sultana, S. R. Gopavaram, and E. Bertino , Demonstrating a lightweight data provenance for sensor networks. 2012 Develop a light weight scheme for securely transmitting provenance for sensor Network. S. Sultana, G. Ghinita, E. Bertino, and M. Shehab, A lightweight secure provenance scheme for wireless sensor networks 2012. Lightweight provenance encoding and decoding scheme based on bloom filters. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 10
  • 11. Cont….. AUTHOR TITLE NAME YEAR SUMMARY W. Zhou, Q. Fei, A. Narayan, A. aeberlen, B. T. Loo, B. and M. Sherr Secure network provenance. 2011 Evaluated a SNooPy prototype with three different example applications: the Quagga BGP daemon, a declarative implementation of Chord, and Hadoop MapReduce. S. M. I. Alam and S. Fahmy Energy-efficient provenance transmission in large-scale wireless sensor networks. 2011 We adapt the probabilities packet marketing(PPM) approach trace back . Further two encoding methods and combine to deal with topological changes in the network. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 11
  • 12. PAPER PUBLICATION • Ajit M. Karanjkar , Prof,D.H.Kulkarni “ A Dictionry Basesd secure provenance and compression For Wireless Sensor Network Part-I” ,International Engineering Research journal(IERJ) ISSN: 2395-1621 Vol : 2 Issue 1 Feb 2018. • Mr.Ajit M. Karanjkar , Prof,D.H.Kulkarni ” A Dictionary Based Secure Compression And Provenance For WSN”at, Sinhgad Institute Of Technology Lonavala, Department of Computer engineering, Lonavala in CPGCON-2018. • Mr. Ajit M. Karanjkar , Asst. Prof, D. H. Kulkarni “A Dictionary Based Secure Provenance and Compression For Wireless Sensor Network(WSNs) Part-II”, International Journal of Research in Engineering, Technology and Science(IJRETS), ISSN 2454-1915 Vol. VIII, Issue V, May 2018 College Name:-SKNCOE Pune, Exam No:5204 , College code=036 12
  • 13. AN ILLUSTRATION • This Dictionary Based Provenance will be applicable for military operations. • For Home Security. - - - • For Industrial Machine monitoring. • For Medical monitoring. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 13
  • 15. OUR PROPOSED APPROCH Step 1: Start Step 2: Source Step 3: Upload File. Step 4: Select Node The file is send from Base Station to the next node. Step 5: Attacker Attack in the Node When attacker attack in the node then file is not transfer , file is decrypted and shortest path is Changed the automatically alternate node. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 15
  • 16. CONT…. Step 6: Apply Encryption & Decryption Algorithm. checking for path is secure or not and send file to aggregate node. Step 7: Forward File to Destination. Encoded file receive for aggregate node, then Aggregate node deliver the file to destination. Step 8: Stop. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 16
  • 17. MATHEMATICAL MODEL(1/3) Average provenance size: • When the BS receives a packet , it computes the traversed and agr fields in the provenance. • The average of Provenance Size for m packets, p1,p2,p3……,pm as follows. • Where the PSi is the denotes provenance size for packet pi. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 17
  • 18. MATHEMATICAL MODEL(2/3) Verification Failure Rate: • BS receives a packets p1,p2,p3……,pm, the verification failure rate (VFR) is defined as the ratio of the number of packets for which verification fails over the total number of packets received and m is the total number of received packets. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 18
  • 19. MATHEMATICAL MODEL(3/3) Total energy consumption: • Power-TOSSIM Z to measure the amount of energy consumed by each sensor node. If there are n1,n2, n3,…..,nm nodes in the network, the total energy consumption (TEC) is computed as follows: • Where ECni represents the energy consumed by a node ni and m is the total number of nodes network. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 19
  • 21. ALGORITHM Algorithm 1: Provenance Encoding. Input: (ni,seqi) Output: prindex=(v,pathIndex) if ni is a data source node then prIndex:v = vi pp = ni agr = φ ; prIndex.pathIndex= <ni , φ> end if if ni is a forwarder node then prIndex:v = vi pp = pp (∪) ni agr = φ ; prIndex.pathIndex= <nk , ni > end if College Name:-SKNCOE Pune, Exam No:5204 , College code=036 21
  • 22. Cont… if ni is an aggregator node then prIndex:v =vi pp =ni agr ={ seqi1, seqi2. . . . ; seqiM} prIndex:pathIndex =<nb1, ni; . . . ; nbM , ni:> end if College Name:-SKNCOE Pune, Exam No:5204 , College code=036 22
  • 23. ALGORITHM Algorithm 2: Provenance Decoding. Input: pr Index = (v,pathIndex) Output: T(Vp,Ep) if the AM-FM verification fails then drop the received packet else if v:agr = φ then T(Vp,Ep) = Query pathIndex to PPD. else ¥= number of ’;’ in pathIndex +1 for i = 1 to ¥ do path i = Query branch i of pathIndex to PPD. end for T(Vp,Ep)= (path 1;. . . ; path¥) end if end if College Name:-SKNCOE Pune, Exam No:5204 , College code=036 23
  • 24. SYSTEM REQUIREMENT • HARDWARE REQUIREMENTS: System : Pentium Dual Core. Hard Disk : 120 GB. Monitor : 15’’ LED Input Devices : Keyboard, Mouse Ram : 1 GB • SOFTWARE REQUIREMENTS: Operating system : Windows 7. Coding Language : JAVA/J2EE Tool : Netbeans 7.2.1 Database : MYSQL College Name:-SKNCOE Pune, Exam No:5204 , College code=036 24
  • 26. CLASS DIAGRAM College Name:-SKNCOE Pune, Exam No:5204 , College code=036 26
  • 27. USE CASE DIAGRAM College Name:-SKNCOE Pune, Exam No:5204 , College code=036 27
  • 28. ACTIVITY DIAGRAM College Name:-SKNCOE Pune, Exam No:5204 , College code=036 28
  • 30. PERFORMANCE RESULT & ANALYSIS 0 1 2 3 4 5 6 7 8 9 10 500 1000 1500 2000 2500 3000 AverageProvenanceSize(Bytes) Number Of Packets Sent By 15 Data Source Node DP BFP Figure 1: Average Provenance Size College Name:-SKNCOE Pune, Exam No:5204 , College code=036 30
  • 32. FUTURE WORK • Although the provenance for a packet only records the packet’s forwarding and aggregation information, the average provenance size expands with the increases of the packet transmission hops and the amount of nodes in a WSN. • Provenance scheme combines the block provenance methods and the lossless provenance compression methods. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 32
  • 33. CONCLUSION • In WSN Using packet path dictionaries, we enclose path indexes alternative of the path itself in the provenance. • Hence, the size of the compressed provenance in our lossless approach is smaller than that of the existing lossy provenance schemes. • By using the AM-FM sketch scheme and a secure packet sequence number generation technique, we ensure the security objectives of our scheme. • Simulation and experimental results show that our scheme can save more energy and bandwidth than other existing provenance schemes. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 33
  • 34. REFERENCES [1]S. Sultana, G. Ghinita, E. Bertino, and M. Shehab, “A lightweight secure scheme for detecting provenance forgery and packet drop attacks in wireless sensor networks,” IEEE Trans. Dependable Secure Comput., vol. PP, no. 99, p. 1, 2013. [2]B.Shebaro,S.Sultana,S.R.Gopavaram,and E. Bertino,“Demonstrating a lightweight data provenance for sensor networks,” in Proc.ACM Conf. Comput. Commun. Security, 2012,pp. 1022–1024. [3]S. Sultana, G. Ghinita, E. Bertino, and M. Shehab, “A lightweight secure provenance scheme for wireless sensor networks,” in Proc. IEEE 18th Int. Conf. Parallel Distrib. Syst., 2012, pp. 101–108. [4]W. Zhou, Q. Fei, A. Narayan, A. Haeberlen, B. T. Loo, and M. Sherr, “Secure network provenance,” in Proc. 23rd ACM Symp. Oper. Syst. Principles, 2011, pp. 295– 310. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 34
  • 35. REFERENCES [5]S. M. I. Alam and S. Fahmy, “Energy-efficient provenance transmission in large-scale wireless sensor networks,” in Proc. IEEE Int. Symp. World Wireless, Mobile Multimedia Netw., 2011, pp. 1–6. [6]S. Sultana, E. Bertino, and M. Shehab, “A provenance based mechanism to identify malicious packet dropping adversaries in sensor networks,” in Proc. 31st Int. Conf. Distrib. Comput. Syst. Workshops, 2011, pp. 332–338. [7]H.-S. Lim, Y.-S. Moon, and E. Bertino, “Provenance-based trust worthiness assessment in sensor networks,” in Proc. 7th Int. Workshop Data Manage. Sensor Netw., 2010, pp. 2–7. College Name:-SKNCOE Pune, Exam No:5204 , College code=036 35