The three tier security scheme in wireless sensor network with mobile sinks
Download
1 / 18

THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORK WITH MOBILE SINKS - PowerPoint PPT Presentation


  • 367 Views
  • Uploaded on

THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORK WITH MOBILE SINKS. Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir. CONTENTS. Introduction WSN Mobile sink Challenges Three-tier security network Advantages Conclusion. INTRODUCTION.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORK WITH MOBILE SINKS' - loren


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
The three tier security scheme in wireless sensor network with mobile sinks

THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORK WITH MOBILE SINKS

Presented By :

AnkitaJaiswal

Guided By :

Dr. Agrawal sir


CONTENTS NETWORK WITH MOBILE SINKS

  • Introduction

  • WSN

  • Mobile sink

  • Challenges

  • Three-tier security network

  • Advantages

  • Conclusion


INTRODUCTION NETWORK WITH MOBILE SINKS

  • In wireless sensor network collecting data from sensor node is complex process because attacker can compromise the network easily

  • q-composite key pre-distribution techniques used in existing techniques.

  • If attacker captures fraction of nodes than he will compromise .


Contd NETWORK WITH MOBILE SINKS…….

  • Here we are going to strength the authentication mechanism by three tier security scheme.

  • Blundo scheme provides clear security guarantee in wireless sensor networks and having polynomial pools.

  • Here attacker compromising network is complex because he have to get at least one polynomial from mobile pool.


WSN NETWORK WITH MOBILE SINKS

  • A wireless sensor network (WSN) of spatially distributed  autonomous sensor to monitor physical or environmental conditions, such as temperature, sound, pressure, etc.


MOBILE SINK NETWORK WITH MOBILE SINKS

  • Mobile sink are vital in many WSN application for efficient data accumulation for distinguishing and revoking compromised sensors.


Existing system and challenges NETWORK WITH MOBILE SINKS

  • The problem of authentication and pairwise key establishment in sensor networks with is still not solved in the face of mobile sink replication attacks.

  • The problem with the basic:

    • probabilistic key pre-distribution scheme

  • -q-composite key pre-distribution schemes.

  • -random pairwise keys scheme


THE THREE-TIER SECURITY SCHEME NETWORK WITH MOBILE SINKS

  • In the proposed scheme, we use two separate polynomial pools:

  • The mobile polynomial pool

  • The static polynomial pool.

  • Stationary access nodes, which will enable these mobile sinks to access the sensor network for data gathering.



Contd sinks……..

  • The three-tier security scheme provides better network resilience and also provides pairwise key establishment.

  • To avoid Mobile sink replication attack they used the three tier security scheme.


MODULES sinks

  • Sensor Module

  • Access Point Module

  • Mobile Sink Module


Flow chart sinks

Start

Mobile polynomial pool

yes

Mobile Sink

km

key1

km

If secure path establis-hed

Stationary access node

km

Static polynomialpool

key2

no

km

Sensor node

Do transaction

Access Denied

End


  • Advantages sinks

  • The three-tier security scheme more robust against a stationary access node replication attack

  • The authentication mechanism between the stationary access nodes and sensor nodes usingone-way hashing algorithm.

  • Using two separate key pools and having few sensor nodes that carry keys from the mobile key pool.


conclusion sinks

  • we proposed a general three-tier security framework for authentication and pairwise key establishment between mobile sinks and sensor nodes.

  • We have further improved the security performance of the proposed scheme against stationary access node replication attack by strengthening the authentication mechanism between stationary access nodes and sensor nodes.

  • The proposed key distribution scheme reduces the

  • computational cost in the nodes.


FUTURE SCOPE sinks

  • Wireless sensor network promise exciting new applications in the near future.

  • WSN become more and more crucial to everyday life availability faults become less tolerable.

  • High availability of the nodes critical and must hold even under malicious conditions.


REFRENCES sinks

  • ‘The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks’

  • AmarRasheed, Student Member, IEEE, and Rabi N. Mahapatra, Senior Member, IEEE- May-2012

  • ‘Technique to Secure Wireless Sensor Network’

Pramod D Mane 1, Prof. D.H.Kulkarni2

Vol. 4 (6) , 2013, 751-754


  • Amar sinksRasheed, Student Member, IEEE, and Rabi N.Mahapatra, Senior Member, IEEE ”The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks,” IEEE Transactions on Parallel And Distributed Systems, vol. 23, no. 5, May 2012.

  • AmrRasheed, Rabi Mahapatra. N. (2012) ‘The Three-Tier Security Scheme in Wireless Sensor Network with Mobile Sinks’ IEEE Transactions on Parallel and Distributed system, IEEE Computer Society, VOL. 23, NO. 5, pp 958-965.


THANK YOU sinks


ad