SlideShare a Scribd company logo
Security Method in Data
Acquisition Wireless Sensor
Network
Submitted By:- Seminar-II, IT381L
Dharmendra singh(061)
IT’a’
Review-2
Content
 Introduction
 Literature survey
 Problem statements
 Objects
 Technique & tools
 Experimental Result
 Conclusion
 References
Introduction
 Wireless sensor networks have recently emerged as a rapidly growing communication
infrastructure.
 Wireless sensors used to monitor physical or environmental conditions. Sensor networks
also face a number of problems. Some, such as energy efficiency, target monitoring, query
processing, deployment, data compression, tracking, secure issues, limited bandwidth.
 Self-Powered Wireless Sensor Networks for Remote Patient Monitoring in Hospitals, in
this system the authors explored that energy scavenging through piezoelectric vibration
generators might be a practical solution for powering router nodes in such applications and
transferring data in between the sensors to routers are not secure.
Literature survey
 This research paper was under authority of the final year B.Sc. in IT students of SLIIT and
the research was carried about Wireless Sensor Communication.
 The authors would like to acknowledge the support received from the lecture in-charge
Dhishan Dhammearatchi for his valuable comments and feedback. And also would like to
thank anonymous references.
 Wireless sensor networks consist of nodes that absorb great power resources and are
immensely not protected for transmit data packets.
Generic security requirements
 Confidentiality --An adversary can choose any node to eavesdrop as long as it is within the
radio range due to the signals are transmitted over the opened Channel. It is a threat for the
data confidentiality as the attacker may gain the Cryptographic information and take the
information away.
 Authentication --To determine the legitimate node and whether the received data has come
from the authorized sending node or not. Authentication is one of the key issues for a
security.
 Integrity-- Information moving through the network could be altered or tampered by others.
Infect integrity is the description to trust the received information from the network
Algorithms
 1.Sensor Node to router pair
 2. Router pair to base node
 3. Base node to computer
To avoid above security issues there are several solutions given. Key management systems, secure
routing protocols, Intrusion detection system are some of them. Research group is proposed a
security method to prevent above security requirements and give more user friendly network
architecture for user
Problem Statements
 In Data Acquisition sensor networks encounter wide range of critical problems in security
tasks.
 Wireless data acquisition sensor networks are best for detecting environmental or chemical
threats over leap large scale zone, but security and power consumption issues could
completely negative impact on the system.
 Because of the low power consumptions, limited bandwidth, minor processing power.
Even though there are several problems, security is the big concern in these problems.
 Operating system for wireless sensor network systems is also less complex than general
systems
Objects
 Routers accept the authorized data packets according to its awake period. It sends data
packets to base station through the Intrusion Prevention System (IPS).
 Intrusion prevention system checks the packet’s source network address. If it is authorized
network ID it allows sending data to base station. If not, it prevents those packets and
alerting to the router to stop the transmitting the data packet.
 These router pair’s works according to the special dual routing algorithm. This algorithm
controls the operation of two routers. Each router has 50% Duty cycle.
 Every Sensor Communicate with closest router pairs and sends data to base node. If Ra
accepts data in very first next it goes to sleep mode and Rb accept the data traffic.
Technique And tools
Firewall
Server
Router
Instruction detection System
Server Nodes
Experimental results
 Sensor networks have a large number of nodes, which may exceed hundreds or even
thousands. Security architectures developed for small scale ad hoc networks are infeasible
for resource-limited large scale sensor network.
 So research group will be able to connect all the sensor data in to cluster. It will help to
detect the power consumptions.
 Sensor networks exhibit comparatively stable communication patterns as opposed to ad hoc
networks. In ad hoc networks, nodes are assumed to communicate among themselves and
traffic patterns are reasonably random.
 On the contrary, in sensor networks most of the traffic is created as many-to-one nearly-
periodic transmission, as nodes have to report sensor readings to a central, more capable
node.
Conclusion
 Proposed System have given a broad survey of data protection application in wireless
sensor networks.
 All of them focus on control and monitor the transaction based on predetermined security
rules, establish the barrier between secure and unauthorized networks, optimizing energy
consumption.
 We have represented the main structure, the advantages and disadvantages of each data
protection methods. We have also mentioned special functions of data acquisition such as
security and power consumption.
 This existing system has mainly focused on the self-power routing and efficient routing
mechanism for remote patient monitor.
 However, many of the approaches regarding secure and power consumption are challenges
to this existing system and solutions are pending for future research work.
References
 L. Zhou, Z. Haas, “Securing Ad Hoc Networks”, IEEE Network Magazine, vol. 13, no.6,
November/December 1999.
 P. Papadimitratos, Z. Haas, “Secure Routing for Mobile Ad hoc Networks”, Proceedings of the SCS
Communication Networks and Distributed Systems Modeling and Simula-tion Conference (CNDS
2002).
 Y. Hu, D. Johnson, A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless
Ad Hoc Networks," Fourth IEEE Workshop on Mobile Computing Systems and Applications
(WMCSA '02).
 Y. Hu, A. Perrig, D. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc
Networks," Proceedings of the Eighth Annual International Conference on Mobile Computing and
Networking (MobiCom 2002).
 D. Ganesan, R. Govindan, S. Shenker and D. Estrin, "Highly Resilient, Energy Efficient Multipath

More Related Content

What's hot

Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
Raja Shekhar
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
IAEME Publication
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
skumartarget
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
IAEME Publication
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
IJERA Editor
 
S04404116120
S04404116120S04404116120
S04404116120
IJERA Editor
 
Energy efficient intrusion detection system
Energy efficient intrusion detection systemEnergy efficient intrusion detection system
Energy efficient intrusion detection systemiaemedu
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
irjes
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET Journal
 
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
AJIT M KARANJKAR
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
Chinmoy Jena
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
Adeel Javaid
 
A Survey on Routing Protocols in Wireless Sensor Networks
A Survey on Routing Protocols in Wireless Sensor NetworksA Survey on Routing Protocols in Wireless Sensor Networks
A Survey on Routing Protocols in Wireless Sensor Networks
Association of Scientists, Developers and Faculties
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
ijtsrd
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improving
IJMIT JOURNAL
 
Adaptive distributed outlier detection for ws ns
Adaptive distributed outlier detection for ws nsAdaptive distributed outlier detection for ws ns
Adaptive distributed outlier detection for ws ns
LogicMindtech Nologies
 
Transmission efficient ppt
Transmission efficient pptTransmission efficient ppt
Transmission efficient ppt
Devdutta Chakrabarti
 
Efficient Cluster Head Selection in Wireless Sensor Networks.
Efficient Cluster Head Selection in Wireless  Sensor Networks.Efficient Cluster Head Selection in Wireless  Sensor Networks.
Efficient Cluster Head Selection in Wireless Sensor Networks.
Sanjay Shelar
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A Review
IOSR Journals
 

What's hot (19)

Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
 
S04404116120
S04404116120S04404116120
S04404116120
 
Energy efficient intrusion detection system
Energy efficient intrusion detection systemEnergy efficient intrusion detection system
Energy efficient intrusion detection system
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...Secure and Efficient Data Transmission forCluster-based Wireless Sensor Netw...
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
A Survey on Routing Protocols in Wireless Sensor Networks
A Survey on Routing Protocols in Wireless Sensor NetworksA Survey on Routing Protocols in Wireless Sensor Networks
A Survey on Routing Protocols in Wireless Sensor Networks
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improving
 
Adaptive distributed outlier detection for ws ns
Adaptive distributed outlier detection for ws nsAdaptive distributed outlier detection for ws ns
Adaptive distributed outlier detection for ws ns
 
Transmission efficient ppt
Transmission efficient pptTransmission efficient ppt
Transmission efficient ppt
 
Efficient Cluster Head Selection in Wireless Sensor Networks.
Efficient Cluster Head Selection in Wireless  Sensor Networks.Efficient Cluster Head Selection in Wireless  Sensor Networks.
Efficient Cluster Head Selection in Wireless Sensor Networks.
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A Review
 

Similar to Security Method in Data Acquisition Wireless Sensor Network

[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
IJET - International Journal of Engineering and Techniques
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
aviiandevil
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
aviiandevil7
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
theijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
AM Publications
 
Energy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networks
Thesis Scientist Private Limited
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
Pramod Kuruvatti
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
pijans
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
IJMER
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
IJEEE
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
IJEEE
 
574 501-507
574 501-507574 501-507
574 501-507
idescitation
 
Bi33349355
Bi33349355Bi33349355
Bi33349355
IJERA Editor
 
Bi33349355
Bi33349355Bi33349355
Bi33349355
IJERA Editor
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
ijtsrd
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
Easy n Inspire L
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
Scott Faria
 

Similar to Security Method in Data Acquisition Wireless Sensor Network (20)

[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
Energy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networks
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
574 501-507
574 501-507574 501-507
574 501-507
 
Bi33349355
Bi33349355Bi33349355
Bi33349355
 
Bi33349355
Bi33349355Bi33349355
Bi33349355
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 

Recently uploaded

NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 

Recently uploaded (20)

NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 

Security Method in Data Acquisition Wireless Sensor Network

  • 1. Security Method in Data Acquisition Wireless Sensor Network Submitted By:- Seminar-II, IT381L Dharmendra singh(061) IT’a’ Review-2
  • 2. Content  Introduction  Literature survey  Problem statements  Objects  Technique & tools  Experimental Result  Conclusion  References
  • 3. Introduction  Wireless sensor networks have recently emerged as a rapidly growing communication infrastructure.  Wireless sensors used to monitor physical or environmental conditions. Sensor networks also face a number of problems. Some, such as energy efficiency, target monitoring, query processing, deployment, data compression, tracking, secure issues, limited bandwidth.  Self-Powered Wireless Sensor Networks for Remote Patient Monitoring in Hospitals, in this system the authors explored that energy scavenging through piezoelectric vibration generators might be a practical solution for powering router nodes in such applications and transferring data in between the sensors to routers are not secure.
  • 4. Literature survey  This research paper was under authority of the final year B.Sc. in IT students of SLIIT and the research was carried about Wireless Sensor Communication.  The authors would like to acknowledge the support received from the lecture in-charge Dhishan Dhammearatchi for his valuable comments and feedback. And also would like to thank anonymous references.  Wireless sensor networks consist of nodes that absorb great power resources and are immensely not protected for transmit data packets.
  • 5. Generic security requirements  Confidentiality --An adversary can choose any node to eavesdrop as long as it is within the radio range due to the signals are transmitted over the opened Channel. It is a threat for the data confidentiality as the attacker may gain the Cryptographic information and take the information away.  Authentication --To determine the legitimate node and whether the received data has come from the authorized sending node or not. Authentication is one of the key issues for a security.  Integrity-- Information moving through the network could be altered or tampered by others. Infect integrity is the description to trust the received information from the network
  • 7.  1.Sensor Node to router pair  2. Router pair to base node  3. Base node to computer To avoid above security issues there are several solutions given. Key management systems, secure routing protocols, Intrusion detection system are some of them. Research group is proposed a security method to prevent above security requirements and give more user friendly network architecture for user
  • 8. Problem Statements  In Data Acquisition sensor networks encounter wide range of critical problems in security tasks.  Wireless data acquisition sensor networks are best for detecting environmental or chemical threats over leap large scale zone, but security and power consumption issues could completely negative impact on the system.  Because of the low power consumptions, limited bandwidth, minor processing power. Even though there are several problems, security is the big concern in these problems.  Operating system for wireless sensor network systems is also less complex than general systems
  • 9. Objects  Routers accept the authorized data packets according to its awake period. It sends data packets to base station through the Intrusion Prevention System (IPS).  Intrusion prevention system checks the packet’s source network address. If it is authorized network ID it allows sending data to base station. If not, it prevents those packets and alerting to the router to stop the transmitting the data packet.  These router pair’s works according to the special dual routing algorithm. This algorithm controls the operation of two routers. Each router has 50% Duty cycle.  Every Sensor Communicate with closest router pairs and sends data to base node. If Ra accepts data in very first next it goes to sleep mode and Rb accept the data traffic.
  • 11. Experimental results  Sensor networks have a large number of nodes, which may exceed hundreds or even thousands. Security architectures developed for small scale ad hoc networks are infeasible for resource-limited large scale sensor network.  So research group will be able to connect all the sensor data in to cluster. It will help to detect the power consumptions.  Sensor networks exhibit comparatively stable communication patterns as opposed to ad hoc networks. In ad hoc networks, nodes are assumed to communicate among themselves and traffic patterns are reasonably random.  On the contrary, in sensor networks most of the traffic is created as many-to-one nearly- periodic transmission, as nodes have to report sensor readings to a central, more capable node.
  • 12. Conclusion  Proposed System have given a broad survey of data protection application in wireless sensor networks.  All of them focus on control and monitor the transaction based on predetermined security rules, establish the barrier between secure and unauthorized networks, optimizing energy consumption.  We have represented the main structure, the advantages and disadvantages of each data protection methods. We have also mentioned special functions of data acquisition such as security and power consumption.  This existing system has mainly focused on the self-power routing and efficient routing mechanism for remote patient monitor.  However, many of the approaches regarding secure and power consumption are challenges to this existing system and solutions are pending for future research work.
  • 13. References  L. Zhou, Z. Haas, “Securing Ad Hoc Networks”, IEEE Network Magazine, vol. 13, no.6, November/December 1999.  P. Papadimitratos, Z. Haas, “Secure Routing for Mobile Ad hoc Networks”, Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simula-tion Conference (CNDS 2002).  Y. Hu, D. Johnson, A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02).  Y. Hu, A. Perrig, D. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002).  D. Ganesan, R. Govindan, S. Shenker and D. Estrin, "Highly Resilient, Energy Efficient Multipath