SlideShare une entreprise Scribd logo
1  sur  27
Data Sensing & Secured Data Forwarding in multi-hop Wireless Sensor Network  using MICAz based motes Presented by JayantPathak (2006ECS22) Kumar Vikramjeet (2006ECS50)                       Under the Supervision of Mrs. Sonika Gupta
Introduction to WSN    A wireless  sensor network  (WSN)  is  a wireless network consisting of  spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants at different locations. Characteristics of WSN  	 Very Limited Resources 	 Unreliable Communication 	 Unattended Operation
Wireless Sensor Networks Sensor nodes sense the data & send it upward in the network hierarchy Base Station logs the collective data.  Sensor nodes/motes may act as router & perform data aggregation
APPLICATIONS Of WIRELESS SENSOR NETWORKS
Benefits of Multi-hop network Access Point  based Network Multi-hop network AP-based topology with maximum coverage and throughput environment is challenging. Range & data transfer is affected by         - node location 	  -  type of house Multi-hop topology - design of future home wireless networks and requirements for future wifi-enabled consumer electronic devices Advantages            - wide coverage attained      by nodes location            - implementation of mesh
Security threats in Sensor Networks Adversaries can easily sniff on, intercept, inject and alter transmitted data. Adversaries can Interact with networks from a distance by inexpensive radio transceivers and powerful workstations. Resource consumption attacks - Adversaries can repeatedly send packets to drain nodes battery and waste network bandwidth, can steal nodes.
Example of Intruder Attacks Type 1 Type 2 Battery consumed Bandwidth loss Data packet Data packet A B Attacked(packet spoofed) IN False packet False packet False packet
 Solutions of threat A specific frequency channel is allocated to WSN at a time which is designated by RF_Channel Group_id should be altered manually  RF_Channel altered manually after regular interval Each pair of motes share different symmetric keys. All communication are encrypted symmetric keys between motes.
Diffie-Hellman Key Exchange Algorithm  ,[object Object]
Each side then generates a public key (letter B), which is a derivative of the private key.
The two systems then exchange their public keys. Each side of the communication now has their own private key and the other systems public key (letter C).
The Diffie-Hellman protocol generates “shared secrets” – identical cryptographic key shared by each side of the communication.,[object Object]
Sensor node Architecture ,[object Object]
 processes data and controls the functionality of other components in the sensor node.
 The functionality of both transmitter and receiver are combined into a single device know as transceivers
 Sensors sense or measure physical data of the area to be monitored.
The continual analog signal sensed by the sensors is digitized by an Analog-to-digital converter and sent to controllers for further processing.
Power consumption in the sensor node is for the Sensing, Communication and Data Processing.
kinds of memory are on-chip memory of a microcontroller and Flash memory
Micro-controller:ATMEGA 128
Transceiver: TI CC2420 802.15.4/ZigBee compliant radio 2.4-2.48 GHz (250 kbps data rate)
External Memory: 128K Flash
Program + Data Memory: 4K RAM
Programming : nesC
Platforms: TinyOS, SOS, MantisOS and Nano-RK Support
2.6-3.3 V power supplyIn Context of MICAz motes
Appropriate encryption for WSN Encryption security depends on Key size & No. of rounds  Key length is limited by the limited processing power of motes Keysize         Processing  energy         Battery life Skipjack is probable candidate  Block size = 64 bits Key length = 80 bits 		No. of Rounds = 32   More No. of Rounds  More time needed to crack the key

Contenu connexe

Tendances

Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...Walchand college of Engineering,Sangli
 
Data acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkData acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkRutvik Pensionwar
 
Design of Real-time Self Establish Wireless Sensor For Dynamic Network
Design of Real-time Self Establish Wireless Sensor For Dynamic NetworkDesign of Real-time Self Establish Wireless Sensor For Dynamic Network
Design of Real-time Self Establish Wireless Sensor For Dynamic NetworkIJTET Journal
 
Presentation on Wireless border security system
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security systemStudent
 
Wireless border security system
Wireless border security systemWireless border security system
Wireless border security systemBllu
 
Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)PRADEEP Cheekatla
 
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Sindhu Nathan
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
Border security
Border securityBorder security
Border securityFarah Naaz
 
VET4SBO Level 3 module 1 - unit 2 - 0.009 en
VET4SBO Level 3   module 1 - unit 2 - 0.009 enVET4SBO Level 3   module 1 - unit 2 - 0.009 en
VET4SBO Level 3 module 1 - unit 2 - 0.009 enKarel Van Isacker
 
Wireless Mesh Networking - A development path
Wireless Mesh Networking - A development pathWireless Mesh Networking - A development path
Wireless Mesh Networking - A development patheveryunitone
 
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackSustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackIJERA Editor
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSjuno susi
 
Wireless sensor networks dcs
Wireless sensor networks dcsWireless sensor networks dcs
Wireless sensor networks dcsAbhishek Raj
 

Tendances (20)

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
 
Data acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkData acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor Network
 
Design of Real-time Self Establish Wireless Sensor For Dynamic Network
Design of Real-time Self Establish Wireless Sensor For Dynamic NetworkDesign of Real-time Self Establish Wireless Sensor For Dynamic Network
Design of Real-time Self Establish Wireless Sensor For Dynamic Network
 
Sem
SemSem
Sem
 
Presentation on Wireless border security system
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security system
 
Wireless border security system
Wireless border security systemWireless border security system
Wireless border security system
 
Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)
 
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Border security
Border securityBorder security
Border security
 
VET4SBO Level 3 module 1 - unit 2 - 0.009 en
VET4SBO Level 3   module 1 - unit 2 - 0.009 enVET4SBO Level 3   module 1 - unit 2 - 0.009 en
VET4SBO Level 3 module 1 - unit 2 - 0.009 en
 
Wireless Mesh Networking - A development path
Wireless Mesh Networking - A development pathWireless Mesh Networking - A development path
Wireless Mesh Networking - A development path
 
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackSustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication Stack
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
Wireless sensor networks dcs
Wireless sensor networks dcsWireless sensor networks dcs
Wireless sensor networks dcs
 
574 501-507
574 501-507574 501-507
574 501-507
 

En vedette

Crosswind Kite energy
Crosswind Kite energyCrosswind Kite energy
Crosswind Kite energyAndrea Vitali
 
ENERGY KITES
ENERGY KITESENERGY KITES
ENERGY KITESAswathy K
 
Airborne wind energy system ppt
Airborne wind energy system pptAirborne wind energy system ppt
Airborne wind energy system pptAnkit Panghal
 
Kites wind power generation
Kites wind power generationKites wind power generation
Kites wind power generationsuresh kakavakam
 
Kite wind generator
Kite wind generatorKite wind generator
Kite wind generatorMD NAWAZ
 
Kite wind generator 1 (sai).pptx (sai raju)
Kite wind generator 1 (sai).pptx (sai raju)Kite wind generator 1 (sai).pptx (sai raju)
Kite wind generator 1 (sai).pptx (sai raju)MD NAWAZ
 

En vedette (9)

Crosswind Kite energy
Crosswind Kite energyCrosswind Kite energy
Crosswind Kite energy
 
ENERGY KITES
ENERGY KITESENERGY KITES
ENERGY KITES
 
Energy kite
Energy kiteEnergy kite
Energy kite
 
Airborne wind energy system ppt
Airborne wind energy system pptAirborne wind energy system ppt
Airborne wind energy system ppt
 
Kites wind power generation
Kites wind power generationKites wind power generation
Kites wind power generation
 
Kites
KitesKites
Kites
 
Kites 3
Kites 3Kites 3
Kites 3
 
Kite wind generator
Kite wind generatorKite wind generator
Kite wind generator
 
Kite wind generator 1 (sai).pptx (sai raju)
Kite wind generator 1 (sai).pptx (sai raju)Kite wind generator 1 (sai).pptx (sai raju)
Kite wind generator 1 (sai).pptx (sai raju)
 

Similaire à Secured Data Forwarding in WSN

gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).pptleonalmessibd21
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a surveywsnapple
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksDilum Bandara
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
22276455 wireless-geophones
22276455 wireless-geophones22276455 wireless-geophones
22276455 wireless-geophonesshankarshankar48
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semshikhathegreat
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Experimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNExperimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNidescitation
 
CISSP Week 6
CISSP Week 6CISSP Week 6
CISSP Week 6jemtallon
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Sharon Roberts
 

Similaire à Secured Data Forwarding in WSN (20)

Sensor net
Sensor netSensor net
Sensor net
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
Resilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential ModeResilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential Mode
 
Energy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networks
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
wireless sensor network a survey
wireless sensor network a surveywireless sensor network a survey
wireless sensor network a survey
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Cdma Security
Cdma SecurityCdma Security
Cdma Security
 
22276455 wireless-geophones
22276455 wireless-geophones22276455 wireless-geophones
22276455 wireless-geophones
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Experimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNExperimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSN
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
CISSP Week 6
CISSP Week 6CISSP Week 6
CISSP Week 6
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
 

Dernier

Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 

Dernier (20)

Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 

Secured Data Forwarding in WSN

  • 1. Data Sensing & Secured Data Forwarding in multi-hop Wireless Sensor Network using MICAz based motes Presented by JayantPathak (2006ECS22) Kumar Vikramjeet (2006ECS50)   Under the Supervision of Mrs. Sonika Gupta
  • 2. Introduction to WSN A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants at different locations. Characteristics of WSN Very Limited Resources Unreliable Communication Unattended Operation
  • 3. Wireless Sensor Networks Sensor nodes sense the data & send it upward in the network hierarchy Base Station logs the collective data. Sensor nodes/motes may act as router & perform data aggregation
  • 4. APPLICATIONS Of WIRELESS SENSOR NETWORKS
  • 5. Benefits of Multi-hop network Access Point based Network Multi-hop network AP-based topology with maximum coverage and throughput environment is challenging. Range & data transfer is affected by - node location - type of house Multi-hop topology - design of future home wireless networks and requirements for future wifi-enabled consumer electronic devices Advantages - wide coverage attained by nodes location - implementation of mesh
  • 6. Security threats in Sensor Networks Adversaries can easily sniff on, intercept, inject and alter transmitted data. Adversaries can Interact with networks from a distance by inexpensive radio transceivers and powerful workstations. Resource consumption attacks - Adversaries can repeatedly send packets to drain nodes battery and waste network bandwidth, can steal nodes.
  • 7. Example of Intruder Attacks Type 1 Type 2 Battery consumed Bandwidth loss Data packet Data packet A B Attacked(packet spoofed) IN False packet False packet False packet
  • 8. Solutions of threat A specific frequency channel is allocated to WSN at a time which is designated by RF_Channel Group_id should be altered manually RF_Channel altered manually after regular interval Each pair of motes share different symmetric keys. All communication are encrypted symmetric keys between motes.
  • 9.
  • 10. Each side then generates a public key (letter B), which is a derivative of the private key.
  • 11. The two systems then exchange their public keys. Each side of the communication now has their own private key and the other systems public key (letter C).
  • 12.
  • 13.
  • 14. processes data and controls the functionality of other components in the sensor node.
  • 15. The functionality of both transmitter and receiver are combined into a single device know as transceivers
  • 16. Sensors sense or measure physical data of the area to be monitored.
  • 17. The continual analog signal sensed by the sensors is digitized by an Analog-to-digital converter and sent to controllers for further processing.
  • 18. Power consumption in the sensor node is for the Sensing, Communication and Data Processing.
  • 19. kinds of memory are on-chip memory of a microcontroller and Flash memory
  • 21. Transceiver: TI CC2420 802.15.4/ZigBee compliant radio 2.4-2.48 GHz (250 kbps data rate)
  • 23. Program + Data Memory: 4K RAM
  • 25. Platforms: TinyOS, SOS, MantisOS and Nano-RK Support
  • 26. 2.6-3.3 V power supplyIn Context of MICAz motes
  • 27. Appropriate encryption for WSN Encryption security depends on Key size & No. of rounds Key length is limited by the limited processing power of motes Keysize Processing energy Battery life Skipjack is probable candidate Block size = 64 bits Key length = 80 bits No. of Rounds = 32 More No. of Rounds More time needed to crack the key
  • 28. TinySec: a link layer encryption mechanism four main aims – Access Control, Integrity, Confidentiality, Easy of use. Implements Skipjack in CBC mode. Link layer Encryption A B
  • 29. SKIPJACK Encryption SKIPJACK is a 64-bit codebook utilizing an 80-bit cryptovariable (Key) SKIPJACK encrypt/decrypt 4-word (64-bit) data blocks by alternating between the two stepping rules (A and B) The algorithm requires 32 steps (rounds)
  • 30. Data sensing and Data forwarding Temperature Temperature Temperature
  • 31.
  • 33. 2: MTS 400/420 Sensor Board
  • 34. 3: MIB 520 gateway
  • 35.
  • 36. Components A component is a black box specified by interface(s) Interfaces define a set of logically related I/O functions calledcommands and events Components use and provide interfaces Components are statically wired together based on their interfaces StdControl.nc interface StdControl { command result_t init(); command result_t start(); command result_t stop(); } Clock.nc interface Clock { command result_tsetRate( char interval, char scale); event result_t fire(); }
  • 37. Commands and Events commands deposit request parameters into the frame are non-blocking need to return status postpone time consuming work by posting a task can call lower level commands events can call commands, signal events, post tasks can Not be signaled by commands preempt tasks, not vice-versa interrupt trigger the lowest level events deposit the information into the frame { ... status =callCmdName(args) ... } commandCmdName(args) { ... return status; } event EvtName(args) { ... return status; } { ... status =signalEvtName(args) ... }
  • 38. Events and Tasks Tasks: Time flexible Longer background processing jobs … Hardware event handlers Time critical Shorter duration (hand off to task if need be) Interrupts task and other hardware handler. Last-in first-out semantics (no priority among events) executed in response to a hardware interrupt
  • 39. Data Memory Model • STATIC memory allocation! – No heap (malloc) – No function pointers • Global variables – Available on a per-frame basis • Local variables – Saved on the stack – Declared within a method
  • 41. Header (5) Payload (29) CRC (2) Sync TOS Active Messages typedefstructTOS_Msg{ // the following are transmitted uint16_t addr; uint8_t type; uint8_t group; uint8_t length; int8_t data[TOSH_DATA_LENGTH]; uint16_t crc; // the following are not transmitted uint16_t strength; uint8_t ack; uint16_t time; uint8_t sendSecurityMode; uint8_t receiveSecurityMode; } TOS_Msg; Message is “active” because it contains the destination address, group ID, and type. ‘group’: group IDs create a virtual network The address is a 16-bit value specified by “make” “length” specifies the size of the message . “crc” is the check sum
  • 42. Working StdControl.init() StdControl.start() Timer.start(REPEAT, 100) Timer.fired() Post Task Filldata() Timer.Stop()
  • 43. MIB520 USB INTERFACE BOARD The MIB520 provides USB connectivity to the IRIS and MICA family of Motes for communication and in-system programming. It supplies power to the devices through USB bus.