SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Data Sensing & Secured Data Forwarding in multi-hop Wireless Sensor Network  using MICAz based motes Presented by JayantPathak (2006ECS22) Kumar Vikramjeet (2006ECS50)                       Under the Supervision of Mrs. Sonika Gupta
Introduction to WSN    A wireless  sensor network  (WSN)  is  a wireless network consisting of  spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants at different locations. Characteristics of WSN  	 Very Limited Resources 	 Unreliable Communication 	 Unattended Operation
Wireless Sensor Networks Sensor nodes sense the data & send it upward in the network hierarchy Base Station logs the collective data.  Sensor nodes/motes may act as router & perform data aggregation
APPLICATIONS Of WIRELESS SENSOR NETWORKS
Benefits of Multi-hop network Access Point  based Network Multi-hop network AP-based topology with maximum coverage and throughput environment is challenging. Range & data transfer is affected by         - node location 	  -  type of house Multi-hop topology - design of future home wireless networks and requirements for future wifi-enabled consumer electronic devices Advantages            - wide coverage attained      by nodes location            - implementation of mesh
Security threats in Sensor Networks Adversaries can easily sniff on, intercept, inject and alter transmitted data. Adversaries can Interact with networks from a distance by inexpensive radio transceivers and powerful workstations. Resource consumption attacks - Adversaries can repeatedly send packets to drain nodes battery and waste network bandwidth, can steal nodes.
Example of Intruder Attacks Type 1 Type 2 Battery consumed Bandwidth loss Data packet Data packet A B Attacked(packet spoofed) IN False packet False packet False packet
 Solutions of threat A specific frequency channel is allocated to WSN at a time which is designated by RF_Channel Group_id should be altered manually  RF_Channel altered manually after regular interval Each pair of motes share different symmetric keys. All communication are encrypted symmetric keys between motes.
Diffie-Hellman Key Exchange Algorithm  ,[object Object]
Each side then generates a public key (letter B), which is a derivative of the private key.
The two systems then exchange their public keys. Each side of the communication now has their own private key and the other systems public key (letter C).
The Diffie-Hellman protocol generates “shared secrets” – identical cryptographic key shared by each side of the communication.,[object Object]
Sensor node Architecture ,[object Object]
 processes data and controls the functionality of other components in the sensor node.
 The functionality of both transmitter and receiver are combined into a single device know as transceivers
 Sensors sense or measure physical data of the area to be monitored.
The continual analog signal sensed by the sensors is digitized by an Analog-to-digital converter and sent to controllers for further processing.
Power consumption in the sensor node is for the Sensing, Communication and Data Processing.
kinds of memory are on-chip memory of a microcontroller and Flash memory
Micro-controller:ATMEGA 128
Transceiver: TI CC2420 802.15.4/ZigBee compliant radio 2.4-2.48 GHz (250 kbps data rate)
External Memory: 128K Flash
Program + Data Memory: 4K RAM
Programming : nesC
Platforms: TinyOS, SOS, MantisOS and Nano-RK Support
2.6-3.3 V power supplyIn Context of MICAz motes
Appropriate encryption for WSN Encryption security depends on Key size & No. of rounds  Key length is limited by the limited processing power of motes Keysize         Processing  energy         Battery life Skipjack is probable candidate  Block size = 64 bits Key length = 80 bits 		No. of Rounds = 32   More No. of Rounds  More time needed to crack the key

Weitere ähnliche Inhalte

Was ist angesagt?

Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...Walchand college of Engineering,Sangli
 
Data acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkData acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkRutvik Pensionwar
 
Design of Real-time Self Establish Wireless Sensor For Dynamic Network
Design of Real-time Self Establish Wireless Sensor For Dynamic NetworkDesign of Real-time Self Establish Wireless Sensor For Dynamic Network
Design of Real-time Self Establish Wireless Sensor For Dynamic NetworkIJTET Journal
 
Presentation on Wireless border security system
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security systemStudent
 
Wireless border security system
Wireless border security systemWireless border security system
Wireless border security systemBllu
 
Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)PRADEEP Cheekatla
 
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Sindhu Nathan
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoksRushin Shah
 
Border security
Border securityBorder security
Border securityFarah Naaz
 
VET4SBO Level 3 module 1 - unit 2 - 0.009 en
VET4SBO Level 3   module 1 - unit 2 - 0.009 enVET4SBO Level 3   module 1 - unit 2 - 0.009 en
VET4SBO Level 3 module 1 - unit 2 - 0.009 enKarel Van Isacker
 
Wireless Mesh Networking - A development path
Wireless Mesh Networking - A development pathWireless Mesh Networking - A development path
Wireless Mesh Networking - A development patheveryunitone
 
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackSustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackIJERA Editor
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSjuno susi
 
Wireless sensor networks dcs
Wireless sensor networks dcsWireless sensor networks dcs
Wireless sensor networks dcsAbhishek Raj
 

Was ist angesagt? (20)

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...Secure and Efficient Data Transmission  for Cluster-Based Wireless Sensor Net...
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Net...
 
Data acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkData acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor Network
 
Design of Real-time Self Establish Wireless Sensor For Dynamic Network
Design of Real-time Self Establish Wireless Sensor For Dynamic NetworkDesign of Real-time Self Establish Wireless Sensor For Dynamic Network
Design of Real-time Self Establish Wireless Sensor For Dynamic Network
 
Sem
SemSem
Sem
 
Presentation on Wireless border security system
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security system
 
Wireless border security system
Wireless border security systemWireless border security system
Wireless border security system
 
Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)Border security using wireless integrated network sensors(wins)
Border security using wireless integrated network sensors(wins)
 
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
Bordersecurityusingwirelessintegratednetworksensorswins 130402083822-phpapp02
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Border security
Border securityBorder security
Border security
 
VET4SBO Level 3 module 1 - unit 2 - 0.009 en
VET4SBO Level 3   module 1 - unit 2 - 0.009 enVET4SBO Level 3   module 1 - unit 2 - 0.009 en
VET4SBO Level 3 module 1 - unit 2 - 0.009 en
 
Wireless Mesh Networking - A development path
Wireless Mesh Networking - A development pathWireless Mesh Networking - A development path
Wireless Mesh Networking - A development path
 
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackSustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication Stack
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
Wireless sensor networks dcs
Wireless sensor networks dcsWireless sensor networks dcs
Wireless sensor networks dcs
 
574 501-507
574 501-507574 501-507
574 501-507
 

Andere mochten auch

Crosswind Kite energy
Crosswind Kite energyCrosswind Kite energy
Crosswind Kite energyAndrea Vitali
 
ENERGY KITES
ENERGY KITESENERGY KITES
ENERGY KITESAswathy K
 
Airborne wind energy system ppt
Airborne wind energy system pptAirborne wind energy system ppt
Airborne wind energy system pptAnkit Panghal
 
Kites wind power generation
Kites wind power generationKites wind power generation
Kites wind power generationsuresh kakavakam
 
Kite wind generator
Kite wind generatorKite wind generator
Kite wind generatorMD NAWAZ
 
Kite wind generator 1 (sai).pptx (sai raju)
Kite wind generator 1 (sai).pptx (sai raju)Kite wind generator 1 (sai).pptx (sai raju)
Kite wind generator 1 (sai).pptx (sai raju)MD NAWAZ
 

Andere mochten auch (9)

Crosswind Kite energy
Crosswind Kite energyCrosswind Kite energy
Crosswind Kite energy
 
ENERGY KITES
ENERGY KITESENERGY KITES
ENERGY KITES
 
Energy kite
Energy kiteEnergy kite
Energy kite
 
Airborne wind energy system ppt
Airborne wind energy system pptAirborne wind energy system ppt
Airborne wind energy system ppt
 
Kites wind power generation
Kites wind power generationKites wind power generation
Kites wind power generation
 
Kites
KitesKites
Kites
 
Kites 3
Kites 3Kites 3
Kites 3
 
Kite wind generator
Kite wind generatorKite wind generator
Kite wind generator
 
Kite wind generator 1 (sai).pptx (sai raju)
Kite wind generator 1 (sai).pptx (sai raju)Kite wind generator 1 (sai).pptx (sai raju)
Kite wind generator 1 (sai).pptx (sai raju)
 

Ähnlich wie Majorppt

gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).pptleonalmessibd21
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a surveywsnapple
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksDilum Bandara
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
22276455 wireless-geophones
22276455 wireless-geophones22276455 wireless-geophones
22276455 wireless-geophonesshankarshankar48
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semshikhathegreat
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Experimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNExperimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNidescitation
 
CISSP Week 6
CISSP Week 6CISSP Week 6
CISSP Week 6jemtallon
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Sharon Roberts
 

Ähnlich wie Majorppt (20)

Sensor net
Sensor netSensor net
Sensor net
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
Resilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential ModeResilience in the ZigBee Residential Mode
Resilience in the ZigBee Residential Mode
 
Energy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networks
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
wireless sensor network a survey
wireless sensor network a surveywireless sensor network a survey
wireless sensor network a survey
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Cdma Security
Cdma SecurityCdma Security
Cdma Security
 
22276455 wireless-geophones
22276455 wireless-geophones22276455 wireless-geophones
22276455 wireless-geophones
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Experimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSNExperimental Analysis of an Energy-Efficient WSN
Experimental Analysis of an Energy-Efficient WSN
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
CISSP Week 6
CISSP Week 6CISSP Week 6
CISSP Week 6
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
 

Kürzlich hochgeladen

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 

Kürzlich hochgeladen (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 

Majorppt

  • 1. Data Sensing & Secured Data Forwarding in multi-hop Wireless Sensor Network using MICAz based motes Presented by JayantPathak (2006ECS22) Kumar Vikramjeet (2006ECS50)   Under the Supervision of Mrs. Sonika Gupta
  • 2. Introduction to WSN A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants at different locations. Characteristics of WSN Very Limited Resources Unreliable Communication Unattended Operation
  • 3. Wireless Sensor Networks Sensor nodes sense the data & send it upward in the network hierarchy Base Station logs the collective data. Sensor nodes/motes may act as router & perform data aggregation
  • 4. APPLICATIONS Of WIRELESS SENSOR NETWORKS
  • 5. Benefits of Multi-hop network Access Point based Network Multi-hop network AP-based topology with maximum coverage and throughput environment is challenging. Range & data transfer is affected by - node location - type of house Multi-hop topology - design of future home wireless networks and requirements for future wifi-enabled consumer electronic devices Advantages - wide coverage attained by nodes location - implementation of mesh
  • 6. Security threats in Sensor Networks Adversaries can easily sniff on, intercept, inject and alter transmitted data. Adversaries can Interact with networks from a distance by inexpensive radio transceivers and powerful workstations. Resource consumption attacks - Adversaries can repeatedly send packets to drain nodes battery and waste network bandwidth, can steal nodes.
  • 7. Example of Intruder Attacks Type 1 Type 2 Battery consumed Bandwidth loss Data packet Data packet A B Attacked(packet spoofed) IN False packet False packet False packet
  • 8. Solutions of threat A specific frequency channel is allocated to WSN at a time which is designated by RF_Channel Group_id should be altered manually RF_Channel altered manually after regular interval Each pair of motes share different symmetric keys. All communication are encrypted symmetric keys between motes.
  • 9.
  • 10. Each side then generates a public key (letter B), which is a derivative of the private key.
  • 11. The two systems then exchange their public keys. Each side of the communication now has their own private key and the other systems public key (letter C).
  • 12.
  • 13.
  • 14. processes data and controls the functionality of other components in the sensor node.
  • 15. The functionality of both transmitter and receiver are combined into a single device know as transceivers
  • 16. Sensors sense or measure physical data of the area to be monitored.
  • 17. The continual analog signal sensed by the sensors is digitized by an Analog-to-digital converter and sent to controllers for further processing.
  • 18. Power consumption in the sensor node is for the Sensing, Communication and Data Processing.
  • 19. kinds of memory are on-chip memory of a microcontroller and Flash memory
  • 21. Transceiver: TI CC2420 802.15.4/ZigBee compliant radio 2.4-2.48 GHz (250 kbps data rate)
  • 23. Program + Data Memory: 4K RAM
  • 25. Platforms: TinyOS, SOS, MantisOS and Nano-RK Support
  • 26. 2.6-3.3 V power supplyIn Context of MICAz motes
  • 27. Appropriate encryption for WSN Encryption security depends on Key size & No. of rounds Key length is limited by the limited processing power of motes Keysize Processing energy Battery life Skipjack is probable candidate Block size = 64 bits Key length = 80 bits No. of Rounds = 32 More No. of Rounds More time needed to crack the key
  • 28. TinySec: a link layer encryption mechanism four main aims – Access Control, Integrity, Confidentiality, Easy of use. Implements Skipjack in CBC mode. Link layer Encryption A B
  • 29. SKIPJACK Encryption SKIPJACK is a 64-bit codebook utilizing an 80-bit cryptovariable (Key) SKIPJACK encrypt/decrypt 4-word (64-bit) data blocks by alternating between the two stepping rules (A and B) The algorithm requires 32 steps (rounds)
  • 30. Data sensing and Data forwarding Temperature Temperature Temperature
  • 31.
  • 33. 2: MTS 400/420 Sensor Board
  • 34. 3: MIB 520 gateway
  • 35.
  • 36. Components A component is a black box specified by interface(s) Interfaces define a set of logically related I/O functions calledcommands and events Components use and provide interfaces Components are statically wired together based on their interfaces StdControl.nc interface StdControl { command result_t init(); command result_t start(); command result_t stop(); } Clock.nc interface Clock { command result_tsetRate( char interval, char scale); event result_t fire(); }
  • 37. Commands and Events commands deposit request parameters into the frame are non-blocking need to return status postpone time consuming work by posting a task can call lower level commands events can call commands, signal events, post tasks can Not be signaled by commands preempt tasks, not vice-versa interrupt trigger the lowest level events deposit the information into the frame { ... status =callCmdName(args) ... } commandCmdName(args) { ... return status; } event EvtName(args) { ... return status; } { ... status =signalEvtName(args) ... }
  • 38. Events and Tasks Tasks: Time flexible Longer background processing jobs … Hardware event handlers Time critical Shorter duration (hand off to task if need be) Interrupts task and other hardware handler. Last-in first-out semantics (no priority among events) executed in response to a hardware interrupt
  • 39. Data Memory Model • STATIC memory allocation! – No heap (malloc) – No function pointers • Global variables – Available on a per-frame basis • Local variables – Saved on the stack – Declared within a method
  • 41. Header (5) Payload (29) CRC (2) Sync TOS Active Messages typedefstructTOS_Msg{ // the following are transmitted uint16_t addr; uint8_t type; uint8_t group; uint8_t length; int8_t data[TOSH_DATA_LENGTH]; uint16_t crc; // the following are not transmitted uint16_t strength; uint8_t ack; uint16_t time; uint8_t sendSecurityMode; uint8_t receiveSecurityMode; } TOS_Msg; Message is “active” because it contains the destination address, group ID, and type. ‘group’: group IDs create a virtual network The address is a 16-bit value specified by “make” “length” specifies the size of the message . “crc” is the check sum
  • 42. Working StdControl.init() StdControl.start() Timer.start(REPEAT, 100) Timer.fired() Post Task Filldata() Timer.Stop()
  • 43. MIB520 USB INTERFACE BOARD The MIB520 provides USB connectivity to the IRIS and MICA family of Motes for communication and in-system programming. It supplies power to the devices through USB bus.