SlideShare a Scribd company logo
Secure and Efficient Data Transmission
for Cluster-Based Wireless Sensor
Networks
Under the guidance of: Presented by:
Prof Mr. RAMESH JADHAV Rajashekhar
Assist professor CSE Dept 3AE13SCN12
AIET Kalaburagi
CONTENTS
 INTRODUCTION
 LITERATURE REVIEW
 PROBLEM STATEMENT AND OBJECTIVE
 SYSTEM ANALYSIS
 SYSTEM SPECIFICATION
 FEASIBILITY STUDY
 SYSTEM DESIGN
 CONCLUSION
 REFERENCES
INTRODUCTION
 Clustering is an effective and practical way
to enhance the system performance of WSNs.
• clusters are formed dynamically and periodically.
TWO SECURE DATA TRANSMISSION
PROTOCOLS
 SET-IBS.
secure and efficient data transmission by using
the identity-based digital signature.
 SET-IBOOS.
secure and efficient data transmission by using
he identity-based online/offline digital
signature.
CONTINUED……
 SET-IBS.
security relies on the hardness of the Diffie-
Hellman problem in the pairing domain.
D-H is a method of digital encryption that uses
numbers raised to specific powers to produce
decryption keys on the basis of components that
are never directly transmitted.
CONTINUED……
 SET-IBOOS.
security relies on the hardness of the discrete
logarithm problem.
Reduces the computational overhead for
protocol security, which is crucial for
WSNs.
LITERATURE SURVEY
 A.A. Abbasi and M. Younis, “A Survey on
Clustering Algorithms for Wireless Sensor
Networks,”Computer Comm., vol. 30, nos.
14/ 15, pp. 2826-2841, 2007.
Clustering is introduced to WSNs because it has
proven to be an effective approach to provide better
data aggregation and scalability for large WSNs.
CONTINUED……
 S. Yi et al., “PEACH: Power-Efficient and
Adaptive Clustering Hierarchy Protocol for
Wireless Sensor Networks,” Computer
Comm., vol. 30, nos. 14/15, pp. 2842-2852,
2007.
The main goal of this research is concerning
clustering protocols to minimize the energy
consumption of each node, and maximize the
network lifetime of wireless sensor networks.
CONTINUED……
 S. Sharma and S.K. Jena, “A Survey on Secure
Hierarchical Routing Protocols in Wireless
Sensor Networks,” Proc. Int’l Conf.Comm.,
Computing & Security (ICCCS), pp. 146-151, 2011.
Hierarchical or cluster-base routing protocol for
WSNs is the most energy-efficient among other
routing protocols.
CONTINUED……
 R. Yasmin, E. Ritter, and G. Wang, “Anuthentication
Framework for Wireless Sensor Networks Using Identity-
Based Signatures,” Proc. IEEE Int’l Conf. Computer and
Information Technology (CIT), pp. 882-889, 2010.
Authentication is a crucial security requirement to avoid
attacks against secure communication, and to mitigate DoS attacks
exploiting the limited resources of sensor nodes.
CONTINUED……
 W.Heinzelman,A.Chandrakasan,andH.Balakrishnan,
“An Application-Specific Protocol Architecture for
Wireless Micro sensor Networks,” IEEE Trans.
Wireless Comm., vol. 1, no. 4, pp. 660 670, Oct. 2002.
Networking together hundreds or thousands of cheap micro
sensor nodes allows users to accurately monitor a remote
environment by intelligently combining the data from the
individual nodes.
Statement of Problem
To provide Secure and Efficient Data Transmission
for Cluster-Based Wireless Sensor Networks
Objective
 The objective of the secure data transmission for
CWSNs is to guarantee a secure and efficient data
transmission between leaf nodes and CHs, as well
as transmission between CHs and the BS.
SYSTEM ANALYSIS
 EXISTING SYSTEM ALGORITHM
 Sec LEACH Protocol
 LEACH Protocol.
• DISADVANTAGES
• THERE IS NO FIXED ROUTING PATH WITH LESS
ENERGY CONSUMPTION.
• THE ROUTING TECHNIQUE IS FLOODING.
• WITH RESPECT TO BOTH COMPUTATION AND
COMMUNICATION COSTS
CONTINUED..
 PROPOSED SYSTEM
 PROPOSED ALGORITHMS
 SET-IBS
 SET-IBOOS
 ADVANTAGES OF PROPOSED SYSTEM
 OVERCOME OF COMPUTATION AND COMMUNICATION
OVERHEAD
 FINDING SHORTEST PATH ALGORITHM
SYSTEM SPECIFICATION
 FUNCTIONAL REQUIREMENTS.
 SERVICE PROVIDER
 GROUP OF CLUSTER
 FINIDING SHORTEST PATH
 WHILE FORDING CHECKS ATTACKERS
CONTINUED..
 NON-FUNCTIONAL REQUIREMENTS
 SECURITY
 INTEGRITY
 ENERGY EFFICIENCY
 RELIABLE
FEASIBILITY STUDY
 ECONOMICAL STUDY
 TECHNICAL STUDY
 OPERATIONAL STUDY
SYSTEM DESIGN
 DATA FLOW DIAGRAM
 SEQUENCE DIAGRAM
 USE CASE DIAGRAM
 Attacker Type: - 1).Passive Attack 2).Active Attack 3).
Node Compromising Attack
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
REFERENCES
 [1] Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of
Security Issues in Wireless Sensor Networks,” IEEE Comm.
Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter
2006.
 [2] A.A. Abbasi and M. Younis, “A Survey on Clustering
Algorithms for Wireless Sensor Networks,” Computer
Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007.
 [3] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan,
“An Application-Specific Protocol Architecture for Wireless
Microsensor Networks,” IEEE Trans. Wireless Comm., vol. 1,
no. 4, pp. 660-670, Oct. 2002.
CONTINUED…
 [4] A. Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, “An
Analytical Model for Information Retrieval in Wireless Sensor
Networks Using Enhanced APTEEN Protocol,” IEEE Trans.
Parallel & Distributed Systems, vol. 13, no. 12, pp. 1290-1302,
Dec. 2002.
 [5] S. Yi et al., “PEACH: Power-Efficient and Adaptive
Clustering Hierarchy Protocol for Wireless Sensor Networks,”
Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007.
THANK YOU

More Related Content

PPTX
Secure and efficient data transmission for cluster based wireless
PPT
WIRELESS SENSOR NETWORK
PPTX
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
PPT
Wireless sensor Network using Zero Knowledge Protocol ppt
PPTX
Wsn1 ppt
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
PPTX
Wireless sensor network
PPTX
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
Secure and efficient data transmission for cluster based wireless
WIRELESS SENSOR NETWORK
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Wireless sensor Network using Zero Knowledge Protocol ppt
Wsn1 ppt
Secure and efficient data transmission for cluster based wireless sensor netw...
Wireless sensor network
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...

What's hot (20)

PPTX
Ppt (secure and efficient data transmission 2)
PPTX
Hetrogenous wireless sensor network
PDF
Wireless sensor networks 2016-2017 titles
PPT
Extend life of wireless sensor network
PPTX
wireless sensor network
PDF
Wireless sensor networks software architecture
PPT
WSN IN IOT
PPTX
Wireless Sensor Network with Mobile Integration
PDF
An Efficient Approach for Outlier Detection in Wireless Sensor Network
PPT
Wireless sensor network survey
PPTX
Intrusion detection systems in wireless sensor networks
PPT
Sensor networks a survey
PDF
Scalability in wireless sensor networks
DOC
Abstract sensor networks
PPTX
Basics of Wireless sensor networks
PPTX
Wireless sensor network
PPTX
Wireless sensor network security issues
PPTX
Security in wireless sensor network
PPTX
Wireless sensor networks
Ppt (secure and efficient data transmission 2)
Hetrogenous wireless sensor network
Wireless sensor networks 2016-2017 titles
Extend life of wireless sensor network
wireless sensor network
Wireless sensor networks software architecture
WSN IN IOT
Wireless Sensor Network with Mobile Integration
An Efficient Approach for Outlier Detection in Wireless Sensor Network
Wireless sensor network survey
Intrusion detection systems in wireless sensor networks
Sensor networks a survey
Scalability in wireless sensor networks
Abstract sensor networks
Basics of Wireless sensor networks
Wireless sensor network
Wireless sensor network security issues
Security in wireless sensor network
Wireless sensor networks
Ad

Viewers also liked (18)

PPT
Leach & Pegasis
PPTX
Cluster based wireless sensor network routings ieee
PPTX
PPTX
Energy efficient cluster head selection in LEACH protocol
PDF
PPTX
Secure Data Transmission
PDF
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
PPTX
Slideshare ppt
PPTX
Routing Protocols in WSN
PDF
clustering protocol in WSN:LEACH
PPTX
wireless sensor network my seminar ppt
PDF
Research Issues on WSN
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
PPTX
Script of a story
PPTX
How International Aid is Coordinated - the Cluster Approach
PPT
WIRELESS SENSOR NETWORKS
PDF
REMOWZ - Realtime Water Quality Monitoring using ZigBee based WSN (Part I)
PPTX
Incremental clustering based object tracking in wireless sensor networks
Leach & Pegasis
Cluster based wireless sensor network routings ieee
Energy efficient cluster head selection in LEACH protocol
Secure Data Transmission
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Slideshare ppt
Routing Protocols in WSN
clustering protocol in WSN:LEACH
wireless sensor network my seminar ppt
Research Issues on WSN
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
Script of a story
How International Aid is Coordinated - the Cluster Approach
WIRELESS SENSOR NETWORKS
REMOWZ - Realtime Water Quality Monitoring using ZigBee based WSN (Part I)
Incremental clustering based object tracking in wireless sensor networks
Ad

Similar to Secure and efficient data transmission for cluster based wireless sensor network (20)

PPTX
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
PDF
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
PDF
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
DOCX
secure and efficient data transmission for cluster-based wireless sensor netw...
PPTX
Aps 10june2020
PDF
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
PDF
Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...
PDF
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
PPTX
Camp finall
PDF
A modified clustered based routing protocol to secure wireless sensor network...
PDF
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
PDF
IRJET- Cluster based Routing Protocol for Wireless Sensor Network
PDF
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
PDF
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
PDF
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
PDF
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
PDF
F04623943
PDF
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Netw...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
secure and efficient data transmission for cluster-based wireless sensor netw...
Aps 10june2020
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
Camp finall
A modified clustered based routing protocol to secure wireless sensor network...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Cluster based Routing Protocol for Wireless Sensor Network
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
International Journal of Computational Engineering Research(IJCER)
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
F04623943
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network

Recently uploaded (20)

PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Construction Project Organization Group 2.pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
UNIT 4 Total Quality Management .pptx
PDF
composite construction of structures.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
web development for engineering and engineering
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPT
Project quality management in manufacturing
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Welding lecture in detail for understanding
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Construction Project Organization Group 2.pptx
Lesson 3_Tessellation.pptx finite Mathematics
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
UNIT 4 Total Quality Management .pptx
composite construction of structures.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
OOP with Java - Java Introduction (Basics)
Foundation to blockchain - A guide to Blockchain Tech
web development for engineering and engineering
bas. eng. economics group 4 presentation 1.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Project quality management in manufacturing
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mechanical Engineering MATERIALS Selection
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
CH1 Production IntroductoryConcepts.pptx
Welding lecture in detail for understanding

Secure and efficient data transmission for cluster based wireless sensor network

  • 1. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks Under the guidance of: Presented by: Prof Mr. RAMESH JADHAV Rajashekhar Assist professor CSE Dept 3AE13SCN12 AIET Kalaburagi
  • 2. CONTENTS  INTRODUCTION  LITERATURE REVIEW  PROBLEM STATEMENT AND OBJECTIVE  SYSTEM ANALYSIS  SYSTEM SPECIFICATION  FEASIBILITY STUDY  SYSTEM DESIGN  CONCLUSION  REFERENCES
  • 3. INTRODUCTION  Clustering is an effective and practical way to enhance the system performance of WSNs. • clusters are formed dynamically and periodically.
  • 4. TWO SECURE DATA TRANSMISSION PROTOCOLS  SET-IBS. secure and efficient data transmission by using the identity-based digital signature.  SET-IBOOS. secure and efficient data transmission by using he identity-based online/offline digital signature.
  • 5. CONTINUED……  SET-IBS. security relies on the hardness of the Diffie- Hellman problem in the pairing domain. D-H is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted.
  • 6. CONTINUED……  SET-IBOOS. security relies on the hardness of the discrete logarithm problem. Reduces the computational overhead for protocol security, which is crucial for WSNs.
  • 7. LITERATURE SURVEY  A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,”Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007. Clustering is introduced to WSNs because it has proven to be an effective approach to provide better data aggregation and scalability for large WSNs.
  • 8. CONTINUED……  S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007. The main goal of this research is concerning clustering protocols to minimize the energy consumption of each node, and maximize the network lifetime of wireless sensor networks.
  • 9. CONTINUED……  S. Sharma and S.K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” Proc. Int’l Conf.Comm., Computing & Security (ICCCS), pp. 146-151, 2011. Hierarchical or cluster-base routing protocol for WSNs is the most energy-efficient among other routing protocols.
  • 10. CONTINUED……  R. Yasmin, E. Ritter, and G. Wang, “Anuthentication Framework for Wireless Sensor Networks Using Identity- Based Signatures,” Proc. IEEE Int’l Conf. Computer and Information Technology (CIT), pp. 882-889, 2010. Authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploiting the limited resources of sensor nodes.
  • 11. CONTINUED……  W.Heinzelman,A.Chandrakasan,andH.Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Micro sensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660 670, Oct. 2002. Networking together hundreds or thousands of cheap micro sensor nodes allows users to accurately monitor a remote environment by intelligently combining the data from the individual nodes.
  • 12. Statement of Problem To provide Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
  • 13. Objective  The objective of the secure data transmission for CWSNs is to guarantee a secure and efficient data transmission between leaf nodes and CHs, as well as transmission between CHs and the BS.
  • 14. SYSTEM ANALYSIS  EXISTING SYSTEM ALGORITHM  Sec LEACH Protocol  LEACH Protocol. • DISADVANTAGES • THERE IS NO FIXED ROUTING PATH WITH LESS ENERGY CONSUMPTION. • THE ROUTING TECHNIQUE IS FLOODING. • WITH RESPECT TO BOTH COMPUTATION AND COMMUNICATION COSTS
  • 15. CONTINUED..  PROPOSED SYSTEM  PROPOSED ALGORITHMS  SET-IBS  SET-IBOOS  ADVANTAGES OF PROPOSED SYSTEM  OVERCOME OF COMPUTATION AND COMMUNICATION OVERHEAD  FINDING SHORTEST PATH ALGORITHM
  • 16. SYSTEM SPECIFICATION  FUNCTIONAL REQUIREMENTS.  SERVICE PROVIDER  GROUP OF CLUSTER  FINIDING SHORTEST PATH  WHILE FORDING CHECKS ATTACKERS
  • 17. CONTINUED..  NON-FUNCTIONAL REQUIREMENTS  SECURITY  INTEGRITY  ENERGY EFFICIENCY  RELIABLE
  • 18. FEASIBILITY STUDY  ECONOMICAL STUDY  TECHNICAL STUDY  OPERATIONAL STUDY
  • 19. SYSTEM DESIGN  DATA FLOW DIAGRAM  SEQUENCE DIAGRAM  USE CASE DIAGRAM
  • 20.  Attacker Type: - 1).Passive Attack 2).Active Attack 3). Node Compromising Attack
  • 23. REFERENCES  [1] Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.  [2] A.A. Abbasi and M. Younis, “A Survey on Clustering Algorithms for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007.  [3] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.
  • 24. CONTINUED…  [4] A. Manjeshwar, Q.-A. Zeng, and D.P. Agrawal, “An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol,” IEEE Trans. Parallel & Distributed Systems, vol. 13, no. 12, pp. 1290-1302, Dec. 2002.  [5] S. Yi et al., “PEACH: Power-Efficient and Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks,” Computer Comm., vol. 30, nos. 14/15, pp. 2842-2852, 2007.