SlideShare a Scribd company logo
 SANJAY . D . DHANDARE Prof. 
saniya ansari mam 
10,oct,2014 
DYPSOE PUNE
 INTRODUCTION. 
 What is protocol. 
 What is protocol mechanism. 
 What is network security. 
 Fundamentals of network security. 
 What it means? 
 Attacks on security network. 
 Mechanism for security. 
 Protocols for security. 
 Conclusion. 
 References.
What is a Sensor Network ? 
A heterogeneous system combining tiny sensors and actuators 
with general-purpose computing elements. Most consisting of 
hundreds or thousands of low-power, low-cost nodes deployed to 
monitor and affect the environment. 
What are they used for? 
 Ocean and wildlife monitoring. 
 Monitoring of manufactured machinery. 
 Building safety. 
 Earthquake monitoring. 
 Variety of military applications. 
 Medical monitoring and research.
PROTOCOL 
 “set of rules commonly employ for 
proper communication in between sender 
and receiver in every wireless sensor 
network.
 The mechanism in which different protocol 
performs their well defined task for healthy 
communication in the sensor network. 
 This is the key term used in every network to 
protect from different attacks.
Network security is nothing but the collection 
of all policies, mechanisms and services that 
afford a network which required protection 
from unauthorised access.
The network is said to be secure if it have, 
 Confidentiality. 
 Integrity. 
 Availability.
 DATA CONFIDENTIALITY – data leakage to 
neighboring networks must be prevent. 
 DATA INTEGRITY – transmission data cannot be 
modified. 
 AVAILABILITY–network able to work at any time. 
 DATA AUTHENTICATION – verification of 
sender/receiver.
Following are the different attacks on security: 
 Denial-of-service. 
 Routing attacks. 
 Data aggregation attacks. 
 Privacy attacks.
 Attempt to stop network from proper 
functioning. 
 Disturbed the service provided by the network. 
 It may occur at various layer of protocol : 
physical layer Dos. 
Data link layer Dos.
 What happen? 
 Data is forwarded along one or more routes. 
 EFFECT: 
 Traffic increases at node and as a result 
packets (data) can not reaches to destination.
 Blackhole attack. 
 Rushing attacks. 
 Sinkhole attacks. 
 Sybil attack. 
Wormhole attack
Reducing frequency of operation. 
Reducing packets size. 
Replacing real measurement by fake readings.
 May introduce by accessing the data store at 
node. 
 May occur at node which perform more 
activity. 
 The traffic analysis can be used to identify the 
important nodes.
 Cryptography : 
Cryptography is a method of storing and 
transmitting data in a particular form so that 
only those for whom it is intended can read and 
process. 
The term plaintext is often used which means 
ordinary text sometimes referred as cipher text 
called as encryption and back again called 
decryption
 SYMMETRIC CRYPTOGRAPHY: 
 A encryption system in which the sender and 
receiver of a messages share a single key that 
is used to encrypt and descrypt the data. 
 PUBLIC KEY CRYPTOGRAPHY; 
 It uses two keys a public key to encrypt the 
massage and a private key to descrypt them.
It is nothing but reliable and secure 
establishment of shared keys among 
neighbouring nodes in a network. 
In this approach every sensor shares different 
pairwise key with each other. Hence the sensor 
network can be represented as matrix with rows 
and column.
Dos attacks. 
Aggregation attacks. 
Routing attacks
 Encryption protocol. 
 Same message is encrypted differently at each time. 
 tinySec protocol. 
 It supports two mechanism : 
 Authentication encryption. 
 Authentication only. 
 Localized encryption and Authentication protocol.
It provide four keying mechanism as follows, 
 Individual key . 
 Group key. 
 Cluster key. 
 Pairwise key.
 from above discussion we conclude that the 
security is a important issue in a wireless 
sensor network and can be introduced by using 
a standard protocol and mechanism to prevent 
unauthorised access.
 Dargie w and poellabaur fundamentals of 
wireless sensor networks :theory and practise 
john wiley and sons 2010 . 
 Protocols and architectures for wireless sensor 
networks holger karl andreas willig 2007. 
 And E-journals .
PROTOCOL MECHNISM FOR SECURITY ppt

More Related Content

What's hot

Ethical hacking
Ethical hacking Ethical hacking
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Monika Deswal
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
Gayatri Kapse
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
Pushkar Pashupat
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Priyanshu Ratnakar
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Sagar Verma
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
Raghav Bisht
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
sanjana mun
 
Ipsec
IpsecIpsec
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
vishalgohel12195
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
Zoho Corporation
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printing
CHETAN THAKRE
 
Session Hijacking
Session HijackingSession Hijacking
Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
Marco Morana
 

What's hot (20)

Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Ipsec
IpsecIpsec
Ipsec
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printing
 
Session Hijacking
Session HijackingSession Hijacking
Session Hijacking
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Introduction To OWASP
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
 

Viewers also liked

scan test by sanjay d dhandare
scan test by sanjay d dhandarescan test by sanjay d dhandare
scan test by sanjay d dhandare
D Y PATIL COLLEGE OF ENGINEERING PUNE
 
Slst rule 2016_h_pg_3
Slst rule 2016_h_pg_3Slst rule 2016_h_pg_3
Slst rule 2016_h_pg_3
M H
 
Notification slst 0912_2016
Notification slst 0912_2016Notification slst 0912_2016
Notification slst 0912_2016
M H
 
WBBSE Affiliated Schools West bengal
WBBSE  Affiliated Schools  West bengalWBBSE  Affiliated Schools  West bengal
WBBSE Affiliated Schools West bengal
M H
 
Proposal bits discovery
Proposal bits discoveryProposal bits discovery
Proposal bits discovery
M. Ibrahim Al-Mahi
 
Acid catalyzed hydration
Acid catalyzed hydrationAcid catalyzed hydration
Acid catalyzed hydration
M H
 
Tele-medicine system
Tele-medicine system Tele-medicine system
Slst brochure 0912_2016
Slst brochure 0912_2016Slst brochure 0912_2016
Slst brochure 0912_2016
M H
 
Csir chemistry acid base equilibrium question paper
Csir chemistry acid base equilibrium question paperCsir chemistry acid base equilibrium question paper
Csir chemistry acid base equilibrium question paper
M H
 
বাংলা উপদেশ এসএমএস Advice sms
বাংলা উপদেশ এসএমএস Advice smsবাংলা উপদেশ এসএমএস Advice sms
বাংলা উপদেশ এসএমএস Advice sms
M H
 
Metallic bond bons chemistry 100 mcq
Metallic bond bons chemistry  100 mcqMetallic bond bons chemistry  100 mcq
Metallic bond bons chemistry 100 mcq
M H
 
Li fi technology
Li fi technologyLi fi technology
EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj...
 EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj... EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj...
EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj...
D Y PATIL COLLEGE OF ENGINEERING PUNE
 
প্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহ
প্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহপ্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহ
প্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহ
M H
 

Viewers also liked (14)

scan test by sanjay d dhandare
scan test by sanjay d dhandarescan test by sanjay d dhandare
scan test by sanjay d dhandare
 
Slst rule 2016_h_pg_3
Slst rule 2016_h_pg_3Slst rule 2016_h_pg_3
Slst rule 2016_h_pg_3
 
Notification slst 0912_2016
Notification slst 0912_2016Notification slst 0912_2016
Notification slst 0912_2016
 
WBBSE Affiliated Schools West bengal
WBBSE  Affiliated Schools  West bengalWBBSE  Affiliated Schools  West bengal
WBBSE Affiliated Schools West bengal
 
Proposal bits discovery
Proposal bits discoveryProposal bits discovery
Proposal bits discovery
 
Acid catalyzed hydration
Acid catalyzed hydrationAcid catalyzed hydration
Acid catalyzed hydration
 
Tele-medicine system
Tele-medicine system Tele-medicine system
Tele-medicine system
 
Slst brochure 0912_2016
Slst brochure 0912_2016Slst brochure 0912_2016
Slst brochure 0912_2016
 
Csir chemistry acid base equilibrium question paper
Csir chemistry acid base equilibrium question paperCsir chemistry acid base equilibrium question paper
Csir chemistry acid base equilibrium question paper
 
বাংলা উপদেশ এসএমএস Advice sms
বাংলা উপদেশ এসএমএস Advice smsবাংলা উপদেশ এসএমএস Advice sms
বাংলা উপদেশ এসএমএস Advice sms
 
Metallic bond bons chemistry 100 mcq
Metallic bond bons chemistry  100 mcqMetallic bond bons chemistry  100 mcq
Metallic bond bons chemistry 100 mcq
 
Li fi technology
Li fi technologyLi fi technology
Li fi technology
 
EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj...
 EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj... EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj...
EMBEDDED SYSTEM DESIGN ARM architecture support for operating system by sanj...
 
প্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহ
প্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহপ্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহ
প্রেম বিষয়ক বিখ্যাত কিছু উক্তি সমূহ
 

Similar to PROTOCOL MECHNISM FOR SECURITY ppt

Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
ijtsrd
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
IJERD Editor
 
Paper1
Paper1Paper1
Paper1
SpacSec
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
IOSR Journals
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
eSAT Publishing House
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
eSAT Journals
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
Editor IJARCET
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
IAESIJEECS
 
A05510105
A05510105A05510105
A05510105
IOSR-JEN
 
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERYASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
AM Publications
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
Zac Darcy
 
Ii3415521555
Ii3415521555Ii3415521555
Ii3415521555
IJERA Editor
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
Nitesh Dubey
 
A Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor NetworkA Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor Network
IJCSIS Research Publications
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
Meet Soni
 
50120140507012
5012014050701250120140507012
50120140507012
IAEME Publication
 
50120140507012
5012014050701250120140507012
50120140507012
IAEME Publication
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
ijtsrd
 

Similar to PROTOCOL MECHNISM FOR SECURITY ppt (20)

Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
Paper1
Paper1Paper1
Paper1
 
G011123539
G011123539G011123539
G011123539
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
Network security
Network security Network security
Network security
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
A05510105
A05510105A05510105
A05510105
 
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERYASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
ASYMTOTIC ANALYSIS IN SECURED MESSAGE DELIVERY
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
Ii3415521555
Ii3415521555Ii3415521555
Ii3415521555
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
A Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor NetworkA Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor Network
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
50120140507012
5012014050701250120140507012
50120140507012
 
50120140507012
5012014050701250120140507012
50120140507012
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 

PROTOCOL MECHNISM FOR SECURITY ppt

  • 1.  SANJAY . D . DHANDARE Prof. saniya ansari mam 10,oct,2014 DYPSOE PUNE
  • 2.  INTRODUCTION.  What is protocol.  What is protocol mechanism.  What is network security.  Fundamentals of network security.  What it means?  Attacks on security network.  Mechanism for security.  Protocols for security.  Conclusion.  References.
  • 3. What is a Sensor Network ? A heterogeneous system combining tiny sensors and actuators with general-purpose computing elements. Most consisting of hundreds or thousands of low-power, low-cost nodes deployed to monitor and affect the environment. What are they used for?  Ocean and wildlife monitoring.  Monitoring of manufactured machinery.  Building safety.  Earthquake monitoring.  Variety of military applications.  Medical monitoring and research.
  • 4. PROTOCOL  “set of rules commonly employ for proper communication in between sender and receiver in every wireless sensor network.
  • 5.  The mechanism in which different protocol performs their well defined task for healthy communication in the sensor network.  This is the key term used in every network to protect from different attacks.
  • 6. Network security is nothing but the collection of all policies, mechanisms and services that afford a network which required protection from unauthorised access.
  • 7. The network is said to be secure if it have,  Confidentiality.  Integrity.  Availability.
  • 8.  DATA CONFIDENTIALITY – data leakage to neighboring networks must be prevent.  DATA INTEGRITY – transmission data cannot be modified.  AVAILABILITY–network able to work at any time.  DATA AUTHENTICATION – verification of sender/receiver.
  • 9. Following are the different attacks on security:  Denial-of-service.  Routing attacks.  Data aggregation attacks.  Privacy attacks.
  • 10.  Attempt to stop network from proper functioning.  Disturbed the service provided by the network.  It may occur at various layer of protocol : physical layer Dos. Data link layer Dos.
  • 11.  What happen?  Data is forwarded along one or more routes.  EFFECT:  Traffic increases at node and as a result packets (data) can not reaches to destination.
  • 12.  Blackhole attack.  Rushing attacks.  Sinkhole attacks.  Sybil attack. Wormhole attack
  • 13. Reducing frequency of operation. Reducing packets size. Replacing real measurement by fake readings.
  • 14.  May introduce by accessing the data store at node.  May occur at node which perform more activity.  The traffic analysis can be used to identify the important nodes.
  • 15.  Cryptography : Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process. The term plaintext is often used which means ordinary text sometimes referred as cipher text called as encryption and back again called decryption
  • 16.  SYMMETRIC CRYPTOGRAPHY:  A encryption system in which the sender and receiver of a messages share a single key that is used to encrypt and descrypt the data.  PUBLIC KEY CRYPTOGRAPHY;  It uses two keys a public key to encrypt the massage and a private key to descrypt them.
  • 17.
  • 18. It is nothing but reliable and secure establishment of shared keys among neighbouring nodes in a network. In this approach every sensor shares different pairwise key with each other. Hence the sensor network can be represented as matrix with rows and column.
  • 19.
  • 20. Dos attacks. Aggregation attacks. Routing attacks
  • 21.  Encryption protocol.  Same message is encrypted differently at each time.  tinySec protocol.  It supports two mechanism :  Authentication encryption.  Authentication only.  Localized encryption and Authentication protocol.
  • 22. It provide four keying mechanism as follows,  Individual key .  Group key.  Cluster key.  Pairwise key.
  • 23.  from above discussion we conclude that the security is a important issue in a wireless sensor network and can be introduced by using a standard protocol and mechanism to prevent unauthorised access.
  • 24.  Dargie w and poellabaur fundamentals of wireless sensor networks :theory and practise john wiley and sons 2010 .  Protocols and architectures for wireless sensor networks holger karl andreas willig 2007.  And E-journals .