SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Wireless Sensor Networks

                          G.Namratha (09331A0537)
                          B.Spandana (09331A0511)
Esteemed Guidance under       B.Asha (09331A0519)
G.Suvarna Kumar Sir        G.Bhavani (09331A0538)
ABSTRACT
     Wireless Sensor Networks (WSNs) consist of small
sensing nodes with capabilities-computation and
wireless     communications.      There      are   several
characteristics of wireless sensor nodes that limit their
functionality. Due to the use of batteries Wireless
sensors often have limited energy. The total network
capacity is limited by the use of unsophisticated wireless
links that limit the range, reliability, and throughput of
communication between nodes . Providing access to the
system by proper authentication makes the system more
secure.
INTRODUCTION


   Wireless Sensor Networks

   Energy Minimization

   Advantages

   Applications
Existing System

   Base station .

   Energy optimization is not achieved.

   More prone to attacks.

   Usage of same key.

   Data transmissions are not reliable.
Proposed System
   Uses Hierarchal clustering.

   Energy Minimization.

   Secure Routing.

   Makes use of efficient Key distribution techniques.

   Data Transmissions between privileged users.

   Cost can be decreased.
Cluster Based Hierarchal Network

    Hierarchal Architecture
    Levels in the design
    Base Station
    Cluster Head
    Sensor Nodes
    Need for Clustering
Overview of System Design
Modules of the Project

1.Node Authentication

2. Cluster Head Authentication

3. Data transmissions

4.Functional Requirements

5.Non-Functional Requirements

6.Software and Hardware Requirements
Node Authentication
   Algorithm
   Determine its Cluster Head
   Request Message
   Received Message
   Implementation
Cluster Head Authentication
   Algorithm
   Time stamp
   Key Generation
   Encryption
   Block Cipher
   Cluster Head Selection
Data Transmissions

   Node to Node

   Node to its Cluster head

   Cluster Head to Cluster Head

   Cluster Head to Base Station

   Secure transmissions
Functional Requirements

   Accurately measuring the environment’s temperature,
    light and humidity.

   Ability to cope with node failures.

   Sending the data to the base station.

   Access to authenticated users.

   Removal of malicious data entry.
Non-Functional Requirements

   Reliability

   Availability

   Security

   Maintainability

   Portability

   Performance
Software Requirements
•   Language : PHP
•   Front end : Html,CSS
•   Back end : PHP-MYSQL
•   Operating System : Any Platform

Hardware Requirements
•   Processor :   Pentium-4
•   Speed     :    3GHz
•   Ram       :   1 GB
•   Hard Disk :   80 GB
CONCLUSION

Weitere ähnliche Inhalte

Was ist angesagt?

[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
IJET - International Journal of Engineering and Techniques
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
Maha Saad
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
Vishnu Kudumula
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
Imran Khan
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
Rushin Shah
 

Was ist angesagt? (20)

Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networks
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Wsn
WsnWsn
Wsn
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
secure and efficient data transmission for cluster-based wireless sensor netw...
secure and efficient data transmission for cluster-based wireless sensor netw...secure and efficient data transmission for cluster-based wireless sensor netw...
secure and efficient data transmission for cluster-based wireless sensor netw...
 
Security issues
Security issuesSecurity issues
Security issues
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
S04404116120
S04404116120S04404116120
S04404116120
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
6. security in wireless sensor netwoks
6. security in wireless sensor netwoks6. security in wireless sensor netwoks
6. security in wireless sensor netwoks
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 

Ähnlich wie Wsn1 ppt

Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
Tosha Shah
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
ijsrd.com
 

Ähnlich wie Wsn1 ppt (20)

firewall simenar ppt.pptx
firewall simenar ppt.pptxfirewall simenar ppt.pptx
firewall simenar ppt.pptx
 
Wireless_Sensor_security
Wireless_Sensor_securityWireless_Sensor_security
Wireless_Sensor_security
 
Safest Way of Message or File Transfer using Key Distribution
Safest Way of Message or File Transfer using Key DistributionSafest Way of Message or File Transfer using Key Distribution
Safest Way of Message or File Transfer using Key Distribution
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
 
Bi33349355
Bi33349355Bi33349355
Bi33349355
 
Bi33349355
Bi33349355Bi33349355
Bi33349355
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
 
Sem
SemSem
Sem
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
 
Presentation1
Presentation1Presentation1
Presentation1
 
Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 

Wsn1 ppt

  • 1. Wireless Sensor Networks G.Namratha (09331A0537) B.Spandana (09331A0511) Esteemed Guidance under B.Asha (09331A0519) G.Suvarna Kumar Sir G.Bhavani (09331A0538)
  • 2. ABSTRACT Wireless Sensor Networks (WSNs) consist of small sensing nodes with capabilities-computation and wireless communications. There are several characteristics of wireless sensor nodes that limit their functionality. Due to the use of batteries Wireless sensors often have limited energy. The total network capacity is limited by the use of unsophisticated wireless links that limit the range, reliability, and throughput of communication between nodes . Providing access to the system by proper authentication makes the system more secure.
  • 3. INTRODUCTION  Wireless Sensor Networks  Energy Minimization  Advantages  Applications
  • 4. Existing System  Base station .  Energy optimization is not achieved.  More prone to attacks.  Usage of same key.  Data transmissions are not reliable.
  • 5. Proposed System  Uses Hierarchal clustering.  Energy Minimization.  Secure Routing.  Makes use of efficient Key distribution techniques.  Data Transmissions between privileged users.  Cost can be decreased.
  • 6. Cluster Based Hierarchal Network  Hierarchal Architecture  Levels in the design  Base Station  Cluster Head  Sensor Nodes  Need for Clustering
  • 8. Modules of the Project 1.Node Authentication 2. Cluster Head Authentication 3. Data transmissions 4.Functional Requirements 5.Non-Functional Requirements 6.Software and Hardware Requirements
  • 9. Node Authentication  Algorithm  Determine its Cluster Head  Request Message  Received Message  Implementation
  • 10. Cluster Head Authentication  Algorithm  Time stamp  Key Generation  Encryption  Block Cipher  Cluster Head Selection
  • 11. Data Transmissions  Node to Node  Node to its Cluster head  Cluster Head to Cluster Head  Cluster Head to Base Station  Secure transmissions
  • 12. Functional Requirements  Accurately measuring the environment’s temperature, light and humidity.  Ability to cope with node failures.  Sending the data to the base station.  Access to authenticated users.  Removal of malicious data entry.
  • 13. Non-Functional Requirements  Reliability  Availability  Security  Maintainability  Portability  Performance
  • 14. Software Requirements • Language : PHP • Front end : Html,CSS • Back end : PHP-MYSQL • Operating System : Any Platform Hardware Requirements • Processor : Pentium-4 • Speed : 3GHz • Ram : 1 GB • Hard Disk : 80 GB