1 / 18

THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORK WITH MOBILE SINKS

THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORK WITH MOBILE SINKS. Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir. CONTENTS. Introduction WSN Mobile sink Challenges Three-tier security network Advantages Conclusion. INTRODUCTION.

loren
Download Presentation

THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORK WITH MOBILE SINKS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORK WITH MOBILE SINKS Presented By : AnkitaJaiswal Guided By : Dr. Agrawal sir

  2. CONTENTS • Introduction • WSN • Mobile sink • Challenges • Three-tier security network • Advantages • Conclusion

  3. INTRODUCTION • In wireless sensor network collecting data from sensor node is complex process because attacker can compromise the network easily • q-composite key pre-distribution techniques used in existing techniques. • If attacker captures fraction of nodes than he will compromise .

  4. Contd……. • Here we are going to strength the authentication mechanism by three tier security scheme. • Blundo scheme provides clear security guarantee in wireless sensor networks and having polynomial pools. • Here attacker compromising network is complex because he have to get at least one polynomial from mobile pool.

  5. WSN • A wireless sensor network (WSN) of spatially distributed  autonomous sensor to monitor physical or environmental conditions, such as temperature, sound, pressure, etc.

  6. MOBILE SINK • Mobile sink are vital in many WSN application for efficient data accumulation for distinguishing and revoking compromised sensors.

  7. Existing system and challenges • The problem of authentication and pairwise key establishment in sensor networks with is still not solved in the face of mobile sink replication attacks. • The problem with the basic: • probabilistic key pre-distribution scheme • -q-composite key pre-distribution schemes. • -random pairwise keys scheme

  8. THE THREE-TIER SECURITY SCHEME • In the proposed scheme, we use two separate polynomial pools: • The mobile polynomial pool • The static polynomial pool. • Stationary access nodes, which will enable these mobile sinks to access the sensor network for data gathering.

  9. Fig. The three-tier security scheme in WSN with mobile sinks.

  10. Contd…….. • The three-tier security scheme provides better network resilience and also provides pairwise key establishment. • To avoid Mobile sink replication attack they used the three tier security scheme.

  11. MODULES • Sensor Module • Access Point Module • Mobile Sink Module

  12. Flow chart Start Mobile polynomial pool yes Mobile Sink km key1 km If secure path establis-hed Stationary access node km Static polynomialpool key2 no km Sensor node Do transaction Access Denied End

  13. Advantages • The three-tier security scheme more robust against a stationary access node replication attack • The authentication mechanism between the stationary access nodes and sensor nodes usingone-way hashing algorithm. • Using two separate key pools and having few sensor nodes that carry keys from the mobile key pool.

  14. conclusion • we proposed a general three-tier security framework for authentication and pairwise key establishment between mobile sinks and sensor nodes. • We have further improved the security performance of the proposed scheme against stationary access node replication attack by strengthening the authentication mechanism between stationary access nodes and sensor nodes. • The proposed key distribution scheme reduces the • computational cost in the nodes.

  15. FUTURE SCOPE • Wireless sensor network promise exciting new applications in the near future. • WSN become more and more crucial to everyday life availability faults become less tolerable. • High availability of the nodes critical and must hold even under malicious conditions.

  16. REFRENCES • ‘The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks’ • AmarRasheed, Student Member, IEEE, and Rabi N. Mahapatra, Senior Member, IEEE- May-2012 • ‘Technique to Secure Wireless Sensor Network’ Pramod D Mane 1, Prof. D.H.Kulkarni2 Vol. 4 (6) , 2013, 751-754

  17. AmarRasheed, Student Member, IEEE, and Rabi N.Mahapatra, Senior Member, IEEE ”The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks,” IEEE Transactions on Parallel And Distributed Systems, vol. 23, no. 5, May 2012. • AmrRasheed, Rabi Mahapatra. N. (2012) ‘The Three-Tier Security Scheme in Wireless Sensor Network with Mobile Sinks’ IEEE Transactions on Parallel and Distributed system, IEEE Computer Society, VOL. 23, NO. 5, pp 958-965.

  18. THANK YOU

More Related