Introduction to Microprocesso programming and interfacing.pptx
Ppt (secure and efficient data transmission 2)
1. Secure and Efficient Data Transmission
for Cluster-Based Wireless Sensor
Networks
Under the guidance of: Presented by:
Prof Mr. RAMESH JADHAV Rajashekhar
Assist professor CSE Dept 3AE13SCN12
AIET Kalaburagi
3. INTRODUCTION
Clustering is an effective and practical way
to enhance the system performance of WSNs.
• clusters are formed dynamically and periodically.
4. TWO SECURE DATA TRANSMISSION
PROTOCOLS
SET-IBS.
secure and efficient data transmission by using
the identity-based digital signature.
SET-IBOOS.
secure and efficient data transmission by using
the identity-based online/offline digital
signature.
5. CONTINUED……
SET-IBS.
security relies on the hardness of the Diffie-
Hellman problem in the pairing domain.
D-H is a method of digital encryption that uses
numbers raised to specific powers to produce
decryption keys on the basis of components that
are never directly transmitted.
6. CONTINUED……
SET-IBOOS.
security relies on the hardness of the discrete
logarithm problem.
Reduces the computational overhead for
protocol security, which is crucial for
WSNs.
7. LITERATURE SURVEY
A.A. Abbasi and M. Younis, “A Survey on
Clustering Algorithms for Wireless Sensor
Networks,”Computer Comm., vol. 30, nos. 14/ 15,
pp. 2826-2841, 2007.
Clustering is introduced to WSNs because it has proven
to be an effective approach to provide better data
aggregation and scalability for large WSNs.
8. L.B. Oliveira et al., “SecLEACH-On the Security
of Clustered Sensor Networks,” Signal
Processing, vol. 87, pp. 2882-2895, 2007.
Investigate the problem of adding security to hierarchical
(cluster-based) sensor networks where clusters are
formed dynamically and periodically, such as LEACH.
9. CONTINUED……
S. Yi et al., “PEACH: Power-Efficient and
Adaptive Clustering Hierarchy Protocol for
Wireless Sensor Networks,” Computer Comm.,
vol. 30, nos. 14/15, pp. 2842-2852, 2007.
The main goal of this research is concerning
clustering protocols to minimize the energy consumption
of each node, and maximize the network lifetime of
wireless sensor networks.
10. CONTINUED……
S. Sharma and S.K. Jena, “A Survey on Secure
Hierarchical Routing Protocols in Wireless Sensor
Networks,” Proc. Int’l Conf.Comm., Computing &
Security (ICCCS), pp. 146-151, 2011.
Hierarchical or cluster-base routing protocol for WSNs
is the most energy-efficient among other routing
protocols.
Proactive Routing
Reactive Routing
11. CONTINUED……
R. Yasmin, E. Ritter, and G. Wang, “Authentication
Framework for Wireless Sensor Networks Using Identity-
Based Signatures,” Proc. IEEE Int’l Conf. Computer and
Information Technology (CIT), pp. 882-889, 2010.
Authentication is a crucial security requirement to avoid
attacks against secure communication, and to mitigate DoS attacks
exploiting the limited resources of sensor nodes.
12. CONTINUED……
W.Heinzelman,A.Chandrakasan,andH.Balakrishnan,
“An Application-Specific Protocol Architecture for
Wireless Micro sensor Networks,” IEEE Trans.
Wireless Comm., vol. 1, no. 4, pp. 660 670, Oct. 2002.
Networking together hundreds or thousands of cheap micro
sensor nodes allows users to accurately monitor a remote
environment by intelligently combining the data from the
individual nodes.
13. Objective
To authenticate the encrypted sensed data, by
applying digital signatures to message packets which
are efficient in communication.
Maintaining minimum quality of service so that
quality is maintained when the data is transmitted.
14. Statement of Problem
To provide Secure and Efficient Data Transmission
for Cluster-Based Wireless Sensor Networks
15. REFERENCES
[1] Y. Wang, G. Attebury, and B. Ramamurthy, “A
Survey of Security Issues in Wireless Sensor
Networks,” IEEE Comm. Surveys & Tutorials, vol. 8,
no. 2, pp. 2-23, Second Quarter 2006.
[2] A.A. Abbasi and M. Younis, “A Survey on
Clustering Algorithms for Wireless Sensor
Networks,” Computer Comm., vol. 30, nos. 14/ 15,
pp. 2826-2841, 2007.
16. CONTINUED…
[3] W. Heinzelman, A. Chandrakasan, and H.
Balakrishnan, “An Application-Specific Protocol
Architecture for Wireless Microsensor Networks,” IEEE
Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct.
2002.
[4] A. Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, “An
Analytical Model for Information Retrieval in Wireless
Sensor Networks Using Enhanced APTEEN Protocol,”
IEEE Trans. Parallel & Distributed Systems, vol. 13, no.
12, pp. 1290-1302, Dec. 2002.
[5] S. Yi et al., “PEACH: Power-Efficient and Adaptive
Clustering Hierarchy Protocol for Wireless Sensor
Networks,” Computer Comm., vol. 30, nos. 14/15, pp.
2842-2852, 2007.