SlideShare a Scribd company logo
DEPARTMENT OF ECE, MRITS
A Seminar on
A ROBUST AND TRUSTED SCHEME FOR IOT-BASED
MOBILE WIRELESS MESH NETWORKS
Presented By
BADDAM AJENDER REDDY
19S11A0403
DEPARTMENT OF ECE, MRITS
CONTENTS
 Introduction
 History Related to the Topic
 Working
 Applications
 Advantages
 Disadvantages
 Future Scope
 Conclusion
 References
DEPARTMENT OF ECE, MRITS
INTRODUCTION
 Wireless mesh networks consist of a huge number
of mesh clients, mesh routers, and gateway devices
to cover a large region for information gathering
and forwarding.
 RTS is a robust and trusted routing scheme
between mesh clients based on IoT devices to
prevent network threats and to achieve efficient
data transmission system.
 This scheme aims to accomplish data reliability,
confidentiality, authenticity.
DEPARTMENT OF ECE, MRITS
HISTORY RELATED TO THE TOPIC
In 2018, the authors proposed a weighted trusted routing
mechanism to identify and exclude the malicious nodes in the
routing paths for wireless mesh networks.
 Based on the studies, it has been noticed that the majority of
work has identified the significance of security for wireless
mesh networks.
 Thus, a robust and trusted scheme has been designed to
prevent security attacks for IoT-based mobile wireless mesh
networks, which results in improving the network stability and
data privacy.
DEPARTMENT OF ECE, MRITS
 The main aim of the proposed scheme is to design and develop the
major techniques for achieving efficient, secured and robust routing in
wireless mesh networks.
 The proposed scheme consists of two main functional techniques :
A. The network infrastructure of mobile mesh clients.
B. Secure and Trusted data routing between mesh devices.
WORKING
DEPARTMENT OF ECE, MRITS
FUNCTIONAL TECHNIQUES OF RTS
 In this technique, all mesh clients, routers, and
gateway devices are interconnected via a multi-
hop model as shown in Fig.1.
 All mesh clients including mesh routers flood
their position data to construct the initial routing
table. The routing table is updated each time
when any new mesh client joins or existing one
leaves the network infrastructure.
FIG 1. The architecture of wireless mesh networks.
A.THE NETWORK INFRASTRUCTURE OF MOBILE MESH CLIENTS:
DEPARTMENT OF ECE, MRITS
At the start, each mesh node advertises
a LOC message in the field that
comprises two sub-fields.
 They are node’s unique ID and its
current position.
 Each mesh client generate routing
tables upon receiving the data.
 And Mesh clients can transmit their
data packets directly.
DEPARTMENT OF ECE, MRITS
DEPARTMENT OF ECE, MRITS
B. SECUREAND TRUSTED DATAROUTING BETWEEN MESH DEVICES
DEPARTMENT OF ECE, MRITS
 The proposed technique presents a fully secure and trusted data
routing strategy.
 For secure data routing between the devices, an asymmetric-
based RSA cryptographic technique is proposed which uses public-
private keys.
The private key performs a vital role in data authentication and it
must be kept secure from malicious and authorized nodes in the
network.
In the proposed security technique, there are two topological
scenarios: fully connected network topology and partially
connected network topology.
DEPARTMENT OF ECE, MRITS
APPLICATIONS
1. LIGHTING: In lighting, wireless communication is needed for two reasons:
To control lamps, and
To collect data from the lamps, such as temperature or other
usage information.
Lighting systems needs robustness. The network should still operate even if
parts of the system goes out.
2. IN-DOOR ENVIRONMENTS: For large in-door environments need to
cover large areas. Examples are:
 Warehouses
 Retail Stores
DEPARTMENT OF ECE, MRITS
APPLICATIONS
3. ELECTRICITY:
 Electricity and utility systems cover large areas that are often not served by
cellular networks.
4. CITY-SCALE SYSTEMS:
There are several IoT systems in use at the scale of a city.
They are:
 Street Lightning
 Air Pollution monitoring
 Trash can usage monitoring
DEPARTMENT OF ECE, MRITS
ADVANTAGES
Self-configuring – In a mesh network, the nodes configure
themselves and It is cost effective.
Self-healing – Self-healing here is that the network is more
capable of recovering from a failure on its own.
Great coverage –In a mesh network, we can easily change the size
of the network, we can simply add and remove nodes from the
network .
DEPARTMENT OF ECE, MRITS
DISADVANTAGES
 For every Hop the system makes, a little bit of speed is lost.
 To cover a large amount of space, more modules are required.
 The power consumption is very high.
Difficult to set up Initially.
 The high risk of redundant connections.
DEPARTMENT OF ECE, MRITS
FUTURE SCOPE
In future, the proposed scheme will be further enhanced to tackle
other DOS threats, which crack network set-ups and functionalities.
Also, the proposed scheme may include some machine learning-
based optimization techniques to make the mesh clients intelligent.
DEPARTMENT OF ECE, MRITS
CONCLUSION
A robust and trusted scheme for IoT-based mobile wireless mesh
networks, which aim to improve the coverage and reliability of the
network infrastructure. The simulation results demonstrate that the
proposed scheme increases the data reliability and with minimal
computational overheads in varying network topologies.
DEPARTMENT OF ECE, MRITS
REFERENCES
[1] K. M. Modieginyane, B. B. Letswamotse, R. Malekian, and A. M.
Abu-Mahfouz, ``Software denied wireless sensor networks
application opportunities for efficient network management: A
survey,'‘ Comput. Electr. Eng., vol. 66, pp. 274287, Feb. 2018.
[2] L. Kumar, V. Sharma, and A. Singh, ``Feasibility and modelling for
convergence of optical-wireless network a review,'' AEU-Int. J.
Electron.Commun., vol. 80, pp. 144156, Oct. 2017.
[3] K. Haseeb, N. Islam, A. Almogren, and I. U. Din, ``Intrusion
prevention framework for secure routing in WSN-based mobile
Internet of Things,'‘ IEEE Access, vol. 7, pp. 185496185505, 2019.
DEPARTMENT OF ECE, MRITS
DEPARTMENT OF ECE, MRITS

More Related Content

Similar to Seminar PPT-4.pptx

Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
IJERA Editor
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
chris zlatis
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
IJET - International Journal of Engineering and Techniques
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
chokrio
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
IRJET Journal
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET Journal
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
IAEME Publication
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
IAEME Publication
 
Modeling and Simulation of the Communication Networks in.docx
Modeling and Simulation of the Communication Networks in.docxModeling and Simulation of the Communication Networks in.docx
Modeling and Simulation of the Communication Networks in.docx
annandleola
 
The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetThe Abstracted Network for Industrial Internet
The Abstracted Network for Industrial Internet
MeshDynamics
 
L010527175
L010527175L010527175
L010527175
IOSR Journals
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networks
eSAT Journals
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
IJERA Editor
 
Review of Wireless Sensor Networks
Review of Wireless Sensor NetworksReview of Wireless Sensor Networks
Review of Wireless Sensor Networks
Dr. Amarjeet Singh
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
caijjournal
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI
 
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Desong Bian
 
Ijmsr 2016-09
Ijmsr 2016-09Ijmsr 2016-09
Ijmsr 2016-09
ijmsr
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
irjes
 

Similar to Seminar PPT-4.pptx (20)

Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
 
Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study Comparison between Conventional Network and ANN with Case Study
Comparison between Conventional Network and ANN with Case Study
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Modeling and Simulation of the Communication Networks in.docx
Modeling and Simulation of the Communication Networks in.docxModeling and Simulation of the Communication Networks in.docx
Modeling and Simulation of the Communication Networks in.docx
 
The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetThe Abstracted Network for Industrial Internet
The Abstracted Network for Industrial Internet
 
L010527175
L010527175L010527175
L010527175
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networks
 
40120140503011
4012014050301140120140503011
40120140503011
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
Review of Wireless Sensor Networks
Review of Wireless Sensor NetworksReview of Wireless Sensor Networks
Review of Wireless Sensor Networks
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
 
Ijmsr 2016-09
Ijmsr 2016-09Ijmsr 2016-09
Ijmsr 2016-09
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Seminar PPT-4.pptx

  • 1. DEPARTMENT OF ECE, MRITS A Seminar on A ROBUST AND TRUSTED SCHEME FOR IOT-BASED MOBILE WIRELESS MESH NETWORKS Presented By BADDAM AJENDER REDDY 19S11A0403
  • 2. DEPARTMENT OF ECE, MRITS CONTENTS  Introduction  History Related to the Topic  Working  Applications  Advantages  Disadvantages  Future Scope  Conclusion  References
  • 3. DEPARTMENT OF ECE, MRITS INTRODUCTION  Wireless mesh networks consist of a huge number of mesh clients, mesh routers, and gateway devices to cover a large region for information gathering and forwarding.  RTS is a robust and trusted routing scheme between mesh clients based on IoT devices to prevent network threats and to achieve efficient data transmission system.  This scheme aims to accomplish data reliability, confidentiality, authenticity.
  • 4. DEPARTMENT OF ECE, MRITS HISTORY RELATED TO THE TOPIC In 2018, the authors proposed a weighted trusted routing mechanism to identify and exclude the malicious nodes in the routing paths for wireless mesh networks.  Based on the studies, it has been noticed that the majority of work has identified the significance of security for wireless mesh networks.  Thus, a robust and trusted scheme has been designed to prevent security attacks for IoT-based mobile wireless mesh networks, which results in improving the network stability and data privacy.
  • 5. DEPARTMENT OF ECE, MRITS  The main aim of the proposed scheme is to design and develop the major techniques for achieving efficient, secured and robust routing in wireless mesh networks.  The proposed scheme consists of two main functional techniques : A. The network infrastructure of mobile mesh clients. B. Secure and Trusted data routing between mesh devices. WORKING
  • 6. DEPARTMENT OF ECE, MRITS FUNCTIONAL TECHNIQUES OF RTS  In this technique, all mesh clients, routers, and gateway devices are interconnected via a multi- hop model as shown in Fig.1.  All mesh clients including mesh routers flood their position data to construct the initial routing table. The routing table is updated each time when any new mesh client joins or existing one leaves the network infrastructure. FIG 1. The architecture of wireless mesh networks. A.THE NETWORK INFRASTRUCTURE OF MOBILE MESH CLIENTS:
  • 7. DEPARTMENT OF ECE, MRITS At the start, each mesh node advertises a LOC message in the field that comprises two sub-fields.  They are node’s unique ID and its current position.  Each mesh client generate routing tables upon receiving the data.  And Mesh clients can transmit their data packets directly.
  • 9. DEPARTMENT OF ECE, MRITS B. SECUREAND TRUSTED DATAROUTING BETWEEN MESH DEVICES
  • 10. DEPARTMENT OF ECE, MRITS  The proposed technique presents a fully secure and trusted data routing strategy.  For secure data routing between the devices, an asymmetric- based RSA cryptographic technique is proposed which uses public- private keys. The private key performs a vital role in data authentication and it must be kept secure from malicious and authorized nodes in the network. In the proposed security technique, there are two topological scenarios: fully connected network topology and partially connected network topology.
  • 11. DEPARTMENT OF ECE, MRITS APPLICATIONS 1. LIGHTING: In lighting, wireless communication is needed for two reasons: To control lamps, and To collect data from the lamps, such as temperature or other usage information. Lighting systems needs robustness. The network should still operate even if parts of the system goes out. 2. IN-DOOR ENVIRONMENTS: For large in-door environments need to cover large areas. Examples are:  Warehouses  Retail Stores
  • 12. DEPARTMENT OF ECE, MRITS APPLICATIONS 3. ELECTRICITY:  Electricity and utility systems cover large areas that are often not served by cellular networks. 4. CITY-SCALE SYSTEMS: There are several IoT systems in use at the scale of a city. They are:  Street Lightning  Air Pollution monitoring  Trash can usage monitoring
  • 13. DEPARTMENT OF ECE, MRITS ADVANTAGES Self-configuring – In a mesh network, the nodes configure themselves and It is cost effective. Self-healing – Self-healing here is that the network is more capable of recovering from a failure on its own. Great coverage –In a mesh network, we can easily change the size of the network, we can simply add and remove nodes from the network .
  • 14. DEPARTMENT OF ECE, MRITS DISADVANTAGES  For every Hop the system makes, a little bit of speed is lost.  To cover a large amount of space, more modules are required.  The power consumption is very high. Difficult to set up Initially.  The high risk of redundant connections.
  • 15. DEPARTMENT OF ECE, MRITS FUTURE SCOPE In future, the proposed scheme will be further enhanced to tackle other DOS threats, which crack network set-ups and functionalities. Also, the proposed scheme may include some machine learning- based optimization techniques to make the mesh clients intelligent.
  • 16. DEPARTMENT OF ECE, MRITS CONCLUSION A robust and trusted scheme for IoT-based mobile wireless mesh networks, which aim to improve the coverage and reliability of the network infrastructure. The simulation results demonstrate that the proposed scheme increases the data reliability and with minimal computational overheads in varying network topologies.
  • 17. DEPARTMENT OF ECE, MRITS REFERENCES [1] K. M. Modieginyane, B. B. Letswamotse, R. Malekian, and A. M. Abu-Mahfouz, ``Software denied wireless sensor networks application opportunities for efficient network management: A survey,'‘ Comput. Electr. Eng., vol. 66, pp. 274287, Feb. 2018. [2] L. Kumar, V. Sharma, and A. Singh, ``Feasibility and modelling for convergence of optical-wireless network a review,'' AEU-Int. J. Electron.Commun., vol. 80, pp. 144156, Oct. 2017. [3] K. Haseeb, N. Islam, A. Almogren, and I. U. Din, ``Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things,'‘ IEEE Access, vol. 7, pp. 185496185505, 2019.