SlideShare une entreprise Scribd logo
1  sur  17
WIRELESS SENSOR NETWORK
SECURITY
PROJECT SECOND REVIEW
Contents








Abstract
Base Paper
System Flow Diagram(SFD)
Data Flow Diagram(DFD)
Sample Coding
Sample Screen Shot
Conclusion
Abstract
Wireless Sensor Networks (WSNs) offer an excellent
opportunity to monitor environments, and have a lot of
interesting applications, some of which are quite sensitive
in nature and require full proof secured environment. The
security mechanisms used for wired networks cannot be
directly used in sensor networks as there is no usercontrolling of each individual node, wireless environment,
and more importantly, scarce energy resources. In this
paper, we address some of the special security threats and
attacks in WSNs.
Systen Flow Diagram(SFD)
Jamming in Wireless Sensor
Network

WSN

QOS (Quality of
Service)

Diversity of Data
Traffic

Modular
Geographical
Information

MAC (Medium
Access Control)

Acknowledge
Mechanism

Distributed Protocol

Latency
Data Flow Diagram(DFD)
Traffic Allocation Constraints
Vector S Multiple
Path

Jammer

S

D

Vector S Non Negative Multiple Path
Return

Optimal Traffic Portfolio Theory
US S Utility Rate

S

D
Optimal Distributed Traffic Allocation using NUM

NUM Maximum Network
Flow

S

Minimal Massage Passing
D

Computational Complexity
Least Check the ID and

S

D
Sample Coding
using
using
using
using
using
using
using
using

System;
System.Collections.Generic;
System.ComponentModel;
System.Data;
System.Drawing;
System.Text;
System.Windows.Forms;
Ensuring_Data_Storage_Security;

namespace Ensuring_Data_Storage_Security.Class
{
public partial class frmEnsuringDataStorage :
Form
{
DataLayer fun = new DataLayer();
Router router = new Router();
public static bool ZToken = false;
UserType zUser = UserType.None;
public frmEnsuringDataStorage()
{
InitializeComponent();
router.evtDublicateSystemAdded += new
Router.DublicateSystemAdded(router_evtDublicateSyst
emAdded);
router.evtNewSystemconnected += new
Router.NewSystemconnected(router_evtNewSystemconnec
ted);
}
void router_evtNewSystemconnected(GSystem
sys)

{
//
//fun.AddSys(GSystem.co);
//AddComputers();
this.Refresh();
toolTip1.Show(sys.IP + " Newly Added in
network", panel1, 3000);
this.Refresh();
Application.DoEvents();
}
sys)

void router_evtDublicateSystemAdded(GSystem
{

//throw new Exception("The method or
operation is not implemented.");
toolTip1.Show(sys.IP + " Dublicate
system found in network", panel1, 3000);
}
#region Helper Functions
public void AddComputers()
{
try
{
string path =
Application.StartupPath + "IP";
int i = 1;
DataLayer.Sys[] sy =
fun.GetAllSys();
foreach (Control ctrl in
this.Controls)

{
if (ctrl.GetType().Name ==

"ucSystem")

{
}

this.Controls.Remove(ctrl);

}

foreach (DataLayer.Sys s in sy)
{
if (!
System.IO.Directory.Exists(path + s.ID.ToString()))
System.IO.Directory.CreateDirectory(path +
s.ID.ToString());
ucSystem uc = new ucSystem();
uc.Name = s.ID.ToString();
//i.ToString();
uc.BackColor = Color.SkyBlue;
uc.BorderStyle =
BorderStyle.Fixed3D;
this.Controls.Add(uc);
uc.Visible = true;
uc.LoadDefault(s);
i++;
}
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}
}
#endregion
private void frmGlobalComputing_Load(object
sender, EventArgs e)
{
try
{
AddComputers();
}
catch (Exception ex) { }
}
private void
frmGlobalComputing_MouseClick(object sender,
MouseEventArgs e)
{
//try
//{
//
if (e.Button ==
MouseButtons.Right)
//
{
//
frmNodeDetails frm = new
frmNodeDetails();
//
frm.zNode = fun.GetSys(1);
//
frm.zNode.X = e.X;
//
frm.zNode.Y = e.Y;
//
if (frm.ShowDialog() ==
DialogResult.OK)
//
{
//
if
(router.Connect(GSystem.Convert(frm.zNode)))
//
{
//
fun.AddSys(frm.zNode);
//
AddComputers();
//
}
//
}
//
frm.Dispose();
//
}
//}
//catch (Exception ex)
//{
//
MessageBox.Show(ex.Message);
//}
}
private void button1_Click(object sender,
EventArgs e)
{
try
{
Random cpu = new Random();
Random ram = new Random();
Random seconds = new Random();
this.Controls)

foreach (Control ctrl in
{

"ucSystem")

if (ctrl.GetType().Name ==
{

GSystem.WorkLoad();
(ucSystem)ctrl;
ram.Next(10, 90);
cpu.Next(10, 50);
seconds.Next(4, 20);

GSystem.WorkLoad l = new
ucSystem c =
l.MaxRamUsage =
l.MaxCPUusage =
l.TotalSeconds =

if (!
fun.IsDublicate(c.zSys.IP))
c.zSys.BeginWork(l);
}
}
}

Sample Screen shot
Sc-1

Sc-2
Sc-2

Sc-4

Sc-5
Sc-6

Sc-7
Sc-8

Sc-9
Conclusion
Emerging field in a traditional world of computer
security. A vast amount of research work is being
conducted in this area.Possible thesis ideas: Working on
key distribution schemes, modifying existing encryption
algorithms, working on the IDS side of things.

Submitted by
R.Mahalakshmi
S.Snegha
S.Radhika
A.Krishnapriya
P.Divya

Project Guidence

HOD

Contenu connexe

Similaire à wsns

Cloud data management
Cloud data managementCloud data management
Cloud data management
ambitlick
 
2006-03-14 WG on HTAP-Relevant IT Techniques, Tools and Philosophies: DataFed...
2006-03-14 WG on HTAP-Relevant IT Techniques, Tools and Philosophies: DataFed...2006-03-14 WG on HTAP-Relevant IT Techniques, Tools and Philosophies: DataFed...
2006-03-14 WG on HTAP-Relevant IT Techniques, Tools and Philosophies: DataFed...
Rudolf Husar
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Augusto Ciuffoletti
 

Similaire à wsns (20)

Geoint2017 training open interfaces - luis bermudez
Geoint2017 training   open interfaces - luis bermudezGeoint2017 training   open interfaces - luis bermudez
Geoint2017 training open interfaces - luis bermudez
 
Analytics with Spark
Analytics with SparkAnalytics with Spark
Analytics with Spark
 
Cloud data management
Cloud data managementCloud data management
Cloud data management
 
Field-programmable gate array design of image encryption and decryption usin...
Field-programmable gate array design of image encryption and  decryption usin...Field-programmable gate array design of image encryption and  decryption usin...
Field-programmable gate array design of image encryption and decryption usin...
 
Protocol Type Based Intrusion Detection Using RBF Neural Network
Protocol Type Based Intrusion Detection Using RBF Neural NetworkProtocol Type Based Intrusion Detection Using RBF Neural Network
Protocol Type Based Intrusion Detection Using RBF Neural Network
 
Dataservices: Processing (Big) Data the Microservice Way
Dataservices: Processing (Big) Data the Microservice WayDataservices: Processing (Big) Data the Microservice Way
Dataservices: Processing (Big) Data the Microservice Way
 
2006-03-14 WG on HTAP-Relevant IT Techniques, Tools and Philosophies: DataFed...
2006-03-14 WG on HTAP-Relevant IT Techniques, Tools and Philosophies: DataFed...2006-03-14 WG on HTAP-Relevant IT Techniques, Tools and Philosophies: DataFed...
2006-03-14 WG on HTAP-Relevant IT Techniques, Tools and Philosophies: DataFed...
 
060314 Ispra Htap Presentations Husar 060314 Ispra
060314 Ispra Htap Presentations Husar 060314 Ispra060314 Ispra Htap Presentations Husar 060314 Ispra
060314 Ispra Htap Presentations Husar 060314 Ispra
 
Weather Information System Airport and Decision Support (WISADS)
Weather Information System Airport and Decision Support (WISADS)Weather Information System Airport and Decision Support (WISADS)
Weather Information System Airport and Decision Support (WISADS)
 
Data Streaming (in a Nutshell) ... and Spark's window operations
Data Streaming (in a Nutshell) ... and Spark's window operationsData Streaming (in a Nutshell) ... and Spark's window operations
Data Streaming (in a Nutshell) ... and Spark's window operations
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural NetworksSecuring Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
 
Coimputer network
Coimputer networkCoimputer network
Coimputer network
 
PPT of SCADA DMS by CESU PED PURI
PPT of SCADA DMS by CESU PED PURIPPT of SCADA DMS by CESU PED PURI
PPT of SCADA DMS by CESU PED PURI
 
Advanced troubleshooting linux performance
Advanced troubleshooting linux performanceAdvanced troubleshooting linux performance
Advanced troubleshooting linux performance
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring Architecture
 
Microservices observability
Microservices observabilityMicroservices observability
Microservices observability
 
Microservices in GO - Massimiliano Dessì - Codemotion Rome 2017
Microservices in GO - Massimiliano Dessì - Codemotion Rome 2017Microservices in GO - Massimiliano Dessì - Codemotion Rome 2017
Microservices in GO - Massimiliano Dessì - Codemotion Rome 2017
 
Tools and Techniques for Understanding Threading Behavior in Android
Tools and Techniques for Understanding Threading Behavior in AndroidTools and Techniques for Understanding Threading Behavior in Android
Tools and Techniques for Understanding Threading Behavior in Android
 
Data Link Layer _latest development_project.pptx
Data Link Layer _latest development_project.pptxData Link Layer _latest development_project.pptx
Data Link Layer _latest development_project.pptx
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
 

Dernier

Vector Methods.pptxjjjjjjjjjjjjjjjjjjjjjj
Vector Methods.pptxjjjjjjjjjjjjjjjjjjjjjjVector Methods.pptxjjjjjjjjjjjjjjjjjjjjjj
Vector Methods.pptxjjjjjjjjjjjjjjjjjjjjjj
joshuaclack73
 
week 3 questions and answers.phhhhhhhhhhptx
week 3 questions and answers.phhhhhhhhhhptxweek 3 questions and answers.phhhhhhhhhhptx
week 3 questions and answers.phhhhhhhhhhptx
joshuaclack73
 
batwheels_01batwheels_01batwheels_01batwheels_01
batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01
batwheels_01batwheels_01batwheels_01batwheels_01
Patricia Pham
 
8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...
8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...
8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...
Marwah Studios
 
在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样
在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样
在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样
ahafux
 

Dernier (16)

The Ultimate Guide to Choosing the Best HD IPTV Service in 2024.pdf
The Ultimate Guide to Choosing the Best HD IPTV Service in 2024.pdfThe Ultimate Guide to Choosing the Best HD IPTV Service in 2024.pdf
The Ultimate Guide to Choosing the Best HD IPTV Service in 2024.pdf
 
Vector Methods.pptxjjjjjjjjjjjjjjjjjjjjjj
Vector Methods.pptxjjjjjjjjjjjjjjjjjjjjjjVector Methods.pptxjjjjjjjjjjjjjjjjjjjjjj
Vector Methods.pptxjjjjjjjjjjjjjjjjjjjjjj
 
Vibration Control.pptxjjjjjjjjjjjjjjjjjjjjj
Vibration Control.pptxjjjjjjjjjjjjjjjjjjjjjVibration Control.pptxjjjjjjjjjjjjjjjjjjjjj
Vibration Control.pptxjjjjjjjjjjjjjjjjjjjjj
 
week 3 questions and answers.phhhhhhhhhhptx
week 3 questions and answers.phhhhhhhhhhptxweek 3 questions and answers.phhhhhhhhhhptx
week 3 questions and answers.phhhhhhhhhhptx
 
The Gaming Quiz - 17th April 2024, Quiz Club NITW
The Gaming Quiz - 17th April 2024,  Quiz Club NITWThe Gaming Quiz - 17th April 2024,  Quiz Club NITW
The Gaming Quiz - 17th April 2024, Quiz Club NITW
 
WHO KILLED ALASKA? #15: "5½ STORIES Part Two" Transcript .pdf
WHO KILLED ALASKA? #15: "5½ STORIES Part Two" Transcript .pdfWHO KILLED ALASKA? #15: "5½ STORIES Part Two" Transcript .pdf
WHO KILLED ALASKA? #15: "5½ STORIES Part Two" Transcript .pdf
 
kiff2
kiff2kiff2
kiff2
 
Get the Best Online Lotus ID from the Top Betting ID Provider.
Get the Best Online Lotus ID from the Top Betting ID Provider.Get the Best Online Lotus ID from the Top Betting ID Provider.
Get the Best Online Lotus ID from the Top Betting ID Provider.
 
the red riding girl story fkjgoifdjgijogifdoin
the red riding girl story fkjgoifdjgijogifdointhe red riding girl story fkjgoifdjgijogifdoin
the red riding girl story fkjgoifdjgijogifdoin
 
small presentation about Star Wars/.pptx
small presentation about Star Wars/.pptxsmall presentation about Star Wars/.pptx
small presentation about Star Wars/.pptx
 
Online Winbuzz ID Provider in India | Get Your Sports ID
Online Winbuzz ID Provider in India | Get Your Sports IDOnline Winbuzz ID Provider in India | Get Your Sports ID
Online Winbuzz ID Provider in India | Get Your Sports ID
 
batwheels_01batwheels_01batwheels_01batwheels_01
batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01
batwheels_01batwheels_01batwheels_01batwheels_01
 
8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...
8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...
8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...
 
在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样
在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样
在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样
 
Khaki-Files-Inside-Stories-of-Police-Missions-Kumar-Neeraj-Z-Library.pdf
Khaki-Files-Inside-Stories-of-Police-Missions-Kumar-Neeraj-Z-Library.pdfKhaki-Files-Inside-Stories-of-Police-Missions-Kumar-Neeraj-Z-Library.pdf
Khaki-Files-Inside-Stories-of-Police-Missions-Kumar-Neeraj-Z-Library.pdf
 
C&C Artists' Websites .
C&C Artists' Websites                       .C&C Artists' Websites                       .
C&C Artists' Websites .
 

wsns

  • 2. Contents        Abstract Base Paper System Flow Diagram(SFD) Data Flow Diagram(DFD) Sample Coding Sample Screen Shot Conclusion
  • 3. Abstract Wireless Sensor Networks (WSNs) offer an excellent opportunity to monitor environments, and have a lot of interesting applications, some of which are quite sensitive in nature and require full proof secured environment. The security mechanisms used for wired networks cannot be directly used in sensor networks as there is no usercontrolling of each individual node, wireless environment, and more importantly, scarce energy resources. In this paper, we address some of the special security threats and attacks in WSNs.
  • 4. Systen Flow Diagram(SFD) Jamming in Wireless Sensor Network WSN QOS (Quality of Service) Diversity of Data Traffic Modular Geographical Information MAC (Medium Access Control) Acknowledge Mechanism Distributed Protocol Latency
  • 5. Data Flow Diagram(DFD) Traffic Allocation Constraints Vector S Multiple Path Jammer S D Vector S Non Negative Multiple Path Return Optimal Traffic Portfolio Theory US S Utility Rate S D
  • 6. Optimal Distributed Traffic Allocation using NUM NUM Maximum Network Flow S Minimal Massage Passing D Computational Complexity Least Check the ID and S D
  • 7. Sample Coding using using using using using using using using System; System.Collections.Generic; System.ComponentModel; System.Data; System.Drawing; System.Text; System.Windows.Forms; Ensuring_Data_Storage_Security; namespace Ensuring_Data_Storage_Security.Class { public partial class frmEnsuringDataStorage : Form { DataLayer fun = new DataLayer(); Router router = new Router(); public static bool ZToken = false; UserType zUser = UserType.None; public frmEnsuringDataStorage() { InitializeComponent(); router.evtDublicateSystemAdded += new Router.DublicateSystemAdded(router_evtDublicateSyst emAdded); router.evtNewSystemconnected += new Router.NewSystemconnected(router_evtNewSystemconnec ted); } void router_evtNewSystemconnected(GSystem sys) { // //fun.AddSys(GSystem.co); //AddComputers(); this.Refresh();
  • 8. toolTip1.Show(sys.IP + " Newly Added in network", panel1, 3000); this.Refresh(); Application.DoEvents(); } sys) void router_evtDublicateSystemAdded(GSystem { //throw new Exception("The method or operation is not implemented."); toolTip1.Show(sys.IP + " Dublicate system found in network", panel1, 3000); } #region Helper Functions public void AddComputers() { try { string path = Application.StartupPath + "IP"; int i = 1; DataLayer.Sys[] sy = fun.GetAllSys(); foreach (Control ctrl in this.Controls) { if (ctrl.GetType().Name == "ucSystem") { } this.Controls.Remove(ctrl); } foreach (DataLayer.Sys s in sy) {
  • 9. if (! System.IO.Directory.Exists(path + s.ID.ToString())) System.IO.Directory.CreateDirectory(path + s.ID.ToString()); ucSystem uc = new ucSystem(); uc.Name = s.ID.ToString(); //i.ToString(); uc.BackColor = Color.SkyBlue; uc.BorderStyle = BorderStyle.Fixed3D; this.Controls.Add(uc); uc.Visible = true; uc.LoadDefault(s); i++; } } catch (Exception ex) { MessageBox.Show(ex.Message); } } #endregion private void frmGlobalComputing_Load(object sender, EventArgs e) { try { AddComputers(); } catch (Exception ex) { } } private void frmGlobalComputing_MouseClick(object sender, MouseEventArgs e) {
  • 10. //try //{ // if (e.Button == MouseButtons.Right) // { // frmNodeDetails frm = new frmNodeDetails(); // frm.zNode = fun.GetSys(1); // frm.zNode.X = e.X; // frm.zNode.Y = e.Y; // if (frm.ShowDialog() == DialogResult.OK) // { // if (router.Connect(GSystem.Convert(frm.zNode))) // { // fun.AddSys(frm.zNode); // AddComputers(); // } // } // frm.Dispose(); // } //} //catch (Exception ex) //{ // MessageBox.Show(ex.Message); //} } private void button1_Click(object sender, EventArgs e) { try { Random cpu = new Random(); Random ram = new Random(); Random seconds = new Random();
  • 11. this.Controls) foreach (Control ctrl in { "ucSystem") if (ctrl.GetType().Name == { GSystem.WorkLoad(); (ucSystem)ctrl; ram.Next(10, 90); cpu.Next(10, 50); seconds.Next(4, 20); GSystem.WorkLoad l = new ucSystem c = l.MaxRamUsage = l.MaxCPUusage = l.TotalSeconds = if (! fun.IsDublicate(c.zSys.IP)) c.zSys.BeginWork(l); } } } Sample Screen shot
  • 17. Emerging field in a traditional world of computer security. A vast amount of research work is being conducted in this area.Possible thesis ideas: Working on key distribution schemes, modifying existing encryption algorithms, working on the IDS side of things. Submitted by R.Mahalakshmi S.Snegha S.Radhika A.Krishnapriya P.Divya Project Guidence HOD