SlideShare a Scribd company logo
BY
CH.BINDU BHARGAVI(III-CSE)
I.V.S.SIRISHA(III-CSE)
INTERNATIONAL SCHOOL OF TECHNOLOGY AND
SCIENCES(FOR WOMEN)-6W
SECURE AND EFFICIENT DATA
TRANSMISSION FOR CLUSTER-BASED
WIRELESS SENSOR NETWORKS
WIRELESS TECHNOLOGIES
 What is Wireless Sensor Networks?
WSNs
CLUSTERING AND COMPONENTS
What is Clustering in WSNs?
The process of organizing objects into groups whose members are
similar in some way.
• Reduce routing table size. Conserve communication bandwidth. Avoids
redundant message exchanges.
• Cluster head can aggregate data. Clusters can schedule activities so sensors
can sleep.
 Why Clustering?
COMPONENTS IN CLUSTERING
 Clusters
 Cluster Heads
 Base Station
 Sensor nodes
OVERVIEW
• Abstract
• Introduction
• Current scenario and
disadvantages
• Two Proposed Protocols
• System Design
• Applications
• Advantages
• Future Scope
• Conclusion
• Secure data transmission is a critical issue for wireless sensor networks,
Clustering is an effective and practical way to enhance the system
performance of WSNs.
• In this paper, we study a secure data transmission for cluster-based WSNs
(CWSNs), where the clusters are formed dynamically and periodically.
• We propose two Secure and Efficient data Transmission (SET) protocols
for CWSNs, called SET-IBS and SET-IBOOS.
• In SET-IBS, security relies on the hardness of the Diffie-Hellman problem
in the pairing domain.
• SET-IBOOS its security relies on the hardness of the discrete logarithm
problem.
ABSTRACT
• The individual nodes are capable of sensing their environments,
processing the information data locally, and sending data to one or
more collection points in a WSN.
• Efficient data transmission is one of the most important issues for
WSNs.
• Many WSNs are deployed in harsh, neglected and often adversarial
physical environments for certain applications, such as military
domains and sensing tasks with trustless surroundings.
• Secure and efficient data transmission is thus especially necessary
and is demanded in many such practical WSNs.
INTRODUCTION
CURRENT SCENARIO
 What's the Existing System?
• Sec LEACH Protocol
• LEACH Protocol
 Drawbacks
• There is no fixed routing path with less energy
Consumption.
• The routing technique is Flooding.
TWO SECURE DATA TRANSMISSION
PROTOCOLS
• SET-IBS
secure and efficient data transmission by using the
identity-based digital signature.
• SET-IBOOS
secure and efficient data transmission by using the
identity-based online/offline digital signature.
 SET-IBS
• Security relies on the hardness of the Diffie-Hellman problem in the
pairing domain.
• D-H is a method of digital encryption that uses numbers raised to
specific powers to produce decryption keys on the basis of
components that are never directly transmitted.
 SET-IBOOS
• Security relies on the hardness of the discrete logarithm
problem.
• Reduces the computational overhead for protocol
security, which is crucial for WSNs.
SYSTEM DESIGN
Data Flow Diagram
Use Case Diagram
Attack type
• Passive Attack
• Active Attack
• Node comprising Attack
SECURITY ANALYSIS
Key Management for Security
• Neighborhood authentication
• Storage cost
• Network scalability
• Communication overhead
• Computational overhead
• Attack resilience
APPLICATIONS
 The routing path is based on the Dijktra Algorithm
where the communication links will take the less energy
between the nodes.
 The Nodes communications are very high using these
protocols
ADVANTAGES
 The main goal of this research is concerning clustering
protocols to minimize the energy consumption of each
node, and maximize the network lifetime of wireless
sensor networks.
 Lastly, the protocols SET-IBS and SET-IBOOS have
better performance than the existing secure protocols for
CWSN.
CONCLUSION
FUTURE SCOPE
• To exploit redundancy
• To employ more efficient technique for fault
tolerance.
• To maximize the life time of sensor nodes.
• To provide efficient energy harvesting techniques.
• To provide more secure way of data transmission
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless

More Related Content

What's hot

Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networks
Varsha Anandani
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
ghaidaa WN
 
Wsn
WsnWsn
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
RABIA ASHRAFI
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
IJET - International Journal of Engineering and Techniques
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
Tejas Wasule
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
Adit Pathak
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
Bala Lavanya
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksImran Khan
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Muhammad Farooq Hussain
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manetKunal Prajapati
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
argh61
 
S04404116120
S04404116120S04404116120
S04404116120
IJERA Editor
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_securityTosha Shah
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
Nitin Verma
 

What's hot (20)

Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networks
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
Wsn
WsnWsn
Wsn
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Security issues
Security issuesSecurity issues
Security issues
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
 
Wireless sensor network security
Wireless sensor network securityWireless sensor network security
Wireless sensor network security
 
S04404116120
S04404116120S04404116120
S04404116120
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 

Viewers also liked

Script of a story
Script of a storyScript of a story
Script of a story
jasleen1234
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
pabitra jena
 
Incremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networksIncremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networks
Sachin MS
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
Nagamalleswararao Tadikonda
 
EMPLOYEE PERFORMANCE APPRAISAL (1)
EMPLOYEE PERFORMANCE APPRAISAL (1)EMPLOYEE PERFORMANCE APPRAISAL (1)
EMPLOYEE PERFORMANCE APPRAISAL (1)Divya Sugumar
 
Artificial intelligence and Neural Network
Artificial intelligence and Neural NetworkArtificial intelligence and Neural Network
Artificial intelligence and Neural Network
Abdullah Saghir Ahmad
 
Cluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieeeCluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieeeTAIWAN
 
Energy efficient routing protocol
Energy efficient routing protocolEnergy efficient routing protocol
Energy efficient routing protocol
NIIS Institute of Business Management, Bhubaneswar
 
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
divya_prabha
 
Leach
Leach Leach
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
ReenaShekar
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technologyKapil Dev
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
divya_prabha
 
artiicial intelligence in power system
artiicial intelligence in power systemartiicial intelligence in power system
artiicial intelligence in power system
pratikguptateddy
 
Artificial Intelligence in Power Systems
Artificial Intelligence in Power SystemsArtificial Intelligence in Power Systems
Artificial Intelligence in Power Systems
Sowmya T
 
Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...
Ameer Sameer
 

Viewers also liked (20)

Script of a story
Script of a storyScript of a story
Script of a story
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
 
Incremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networksIncremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networks
 
phddisspresentation
phddisspresentationphddisspresentation
phddisspresentation
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
 
EMPLOYEE PERFORMANCE APPRAISAL (1)
EMPLOYEE PERFORMANCE APPRAISAL (1)EMPLOYEE PERFORMANCE APPRAISAL (1)
EMPLOYEE PERFORMANCE APPRAISAL (1)
 
Artificial intelligence and Neural Network
Artificial intelligence and Neural NetworkArtificial intelligence and Neural Network
Artificial intelligence and Neural Network
 
Cluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieeeCluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieee
 
eeca
eecaeeca
eeca
 
Energy efficient routing protocol
Energy efficient routing protocolEnergy efficient routing protocol
Energy efficient routing protocol
 
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
 
Leach
Leach Leach
Leach
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
artiicial intelligence in power system
artiicial intelligence in power systemartiicial intelligence in power system
artiicial intelligence in power system
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Artificial Intelligence in Power Systems
Artificial Intelligence in Power SystemsArtificial Intelligence in Power Systems
Artificial Intelligence in Power Systems
 
Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...
 

Similar to Secure and efficient data transmission for cluster based wireless

IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
IEEEFINALSEMSTUDENTSPROJECTS
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
chennaijp
 
secure and efficient data transmission for cluster-based wireless sensor netw...
secure and efficient data transmission for cluster-based wireless sensor netw...secure and efficient data transmission for cluster-based wireless sensor netw...
secure and efficient data transmission for cluster-based wireless sensor netw...
swathi78
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEEMEMTECHSTUDENTPROJECTS
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
Shakas Technologies
 
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
AJIT M KARANJKAR
 
Safest Way of Message or File Transfer using Key Distribution
Safest Way of Message or File Transfer using Key DistributionSafest Way of Message or File Transfer using Key Distribution
Safest Way of Message or File Transfer using Key Distribution
Deepika Shivagnanam
 
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
inventionjournals
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
Sem
SemSem
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
Jürgen Ambrosi
 
Veltech university.pptx
Veltech university.pptxVeltech university.pptx
Veltech university.pptx
sundar602496
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
IJERA Editor
 
Towards a Security-aware Network Virtualization
Towards a Security-aware Network VirtualizationTowards a Security-aware Network Virtualization
Towards a Security-aware Network VirtualizationAchim Friedland
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updated
skumartarget
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
skumartarget
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
EditorJST
 
Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
Gopal Mulgund
 

Similar to Secure and efficient data transmission for cluster based wireless (20)

IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
 
secure and efficient data transmission for cluster-based wireless sensor netw...
secure and efficient data transmission for cluster-based wireless sensor netw...secure and efficient data transmission for cluster-based wireless sensor netw...
secure and efficient data transmission for cluster-based wireless sensor netw...
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS Secure and efficient data tran...
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
 
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
 
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
 
Safest Way of Message or File Transfer using Key Distribution
Safest Way of Message or File Transfer using Key DistributionSafest Way of Message or File Transfer using Key Distribution
Safest Way of Message or File Transfer using Key Distribution
 
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
 
Sem
SemSem
Sem
 
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
 
Veltech university.pptx
Veltech university.pptxVeltech university.pptx
Veltech university.pptx
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
Towards a Security-aware Network Virtualization
Towards a Security-aware Network VirtualizationTowards a Security-aware Network Virtualization
Towards a Security-aware Network Virtualization
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updated
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Secure and efficient data transmission for cluster based wireless

  • 1. BY CH.BINDU BHARGAVI(III-CSE) I.V.S.SIRISHA(III-CSE) INTERNATIONAL SCHOOL OF TECHNOLOGY AND SCIENCES(FOR WOMEN)-6W SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETWORKS WIRELESS TECHNOLOGIES
  • 2.  What is Wireless Sensor Networks? WSNs
  • 3. CLUSTERING AND COMPONENTS What is Clustering in WSNs? The process of organizing objects into groups whose members are similar in some way. • Reduce routing table size. Conserve communication bandwidth. Avoids redundant message exchanges. • Cluster head can aggregate data. Clusters can schedule activities so sensors can sleep.  Why Clustering?
  • 4. COMPONENTS IN CLUSTERING  Clusters  Cluster Heads  Base Station  Sensor nodes
  • 5. OVERVIEW • Abstract • Introduction • Current scenario and disadvantages • Two Proposed Protocols • System Design • Applications • Advantages • Future Scope • Conclusion
  • 6. • Secure data transmission is a critical issue for wireless sensor networks, Clustering is an effective and practical way to enhance the system performance of WSNs. • In this paper, we study a secure data transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically. • We propose two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS. • In SET-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing domain. • SET-IBOOS its security relies on the hardness of the discrete logarithm problem. ABSTRACT
  • 7. • The individual nodes are capable of sensing their environments, processing the information data locally, and sending data to one or more collection points in a WSN. • Efficient data transmission is one of the most important issues for WSNs. • Many WSNs are deployed in harsh, neglected and often adversarial physical environments for certain applications, such as military domains and sensing tasks with trustless surroundings. • Secure and efficient data transmission is thus especially necessary and is demanded in many such practical WSNs. INTRODUCTION
  • 8. CURRENT SCENARIO  What's the Existing System? • Sec LEACH Protocol • LEACH Protocol  Drawbacks • There is no fixed routing path with less energy Consumption. • The routing technique is Flooding.
  • 9. TWO SECURE DATA TRANSMISSION PROTOCOLS • SET-IBS secure and efficient data transmission by using the identity-based digital signature. • SET-IBOOS secure and efficient data transmission by using the identity-based online/offline digital signature.
  • 10.  SET-IBS • Security relies on the hardness of the Diffie-Hellman problem in the pairing domain. • D-H is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted.
  • 11.  SET-IBOOS • Security relies on the hardness of the discrete logarithm problem. • Reduces the computational overhead for protocol security, which is crucial for WSNs.
  • 14. Attack type • Passive Attack • Active Attack • Node comprising Attack SECURITY ANALYSIS Key Management for Security • Neighborhood authentication • Storage cost • Network scalability • Communication overhead • Computational overhead • Attack resilience
  • 16.  The routing path is based on the Dijktra Algorithm where the communication links will take the less energy between the nodes.  The Nodes communications are very high using these protocols ADVANTAGES
  • 17.  The main goal of this research is concerning clustering protocols to minimize the energy consumption of each node, and maximize the network lifetime of wireless sensor networks.  Lastly, the protocols SET-IBS and SET-IBOOS have better performance than the existing secure protocols for CWSN. CONCLUSION
  • 18. FUTURE SCOPE • To exploit redundancy • To employ more efficient technique for fault tolerance. • To maximize the life time of sensor nodes. • To provide efficient energy harvesting techniques. • To provide more secure way of data transmission