25-06-2012, 05:57 PM
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
Secure Data Collection in Wireless Sensor Networks Using.pptx (Size: 1.18 MB / Downloads: 38)
Wire less Sensor Network
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to cooperatively pass their data through the network to a main location.
The WSN is built of "nodes" – from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors.
The development of wireless sensor networks was motivated by military applications
Secure Data Collection
The purpose of a data collection system is to allow mobile agents to travel among hosts of a network, to collect individual data segments from these hosts and to return the set of data segments to the originator of the agent.
Attacks in wsn:
Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs) which causes Blackhole in the network
CN attack refers to the situation when an adversary physically compromises a subset of nodes to eavesdrop information
DOS attack, the adversary interferes with the normal operation of the WSN by actively disrupting, changing, or even destroying the functionality of a subset of nodes in the system.
Existing System
Existing randomized multi-path routing algorithms in WSNs have not been designed with security considerations in mind, largely due to their low energy efficiency.
In this only a static path is used to transfer the data from client to server and vice-versa.
This causes intruders to easily find path and attack causing CN orDOS .
Disadvantages of Existing System
Existing randomized multi-path routing algorithms in WSNs have not been designed with security
considerations in mind, largely due to their low energy
efficiency.
Multi-path routing mechanism, Gossiping algorithm
has a percolation behavior, in that for a given
retransmission probability, either very few nodes
receive the packet, or almost all nodes receive it.
The Wanderer algorithm has poor energy performance, because it results in long paths
RANDOMIZED MULTIPATH DELIVER
We consider a three-phase approach for secure
information delivery in a WSN as illustrated
Secret sharing of information,
Randomized propagation of each information
share, and
Normal routing (e.g., min-hop routing) toward
the sink.
Secure Data Collection in Wireless Sensor Networks Using.pptx (Size: 1.18 MB / Downloads: 38)
Wire less Sensor Network
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to cooperatively pass their data through the network to a main location.
The WSN is built of "nodes" – from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors.
The development of wireless sensor networks was motivated by military applications
Secure Data Collection
The purpose of a data collection system is to allow mobile agents to travel among hosts of a network, to collect individual data segments from these hosts and to return the set of data segments to the originator of the agent.
Attacks in wsn:
Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs) which causes Blackhole in the network
CN attack refers to the situation when an adversary physically compromises a subset of nodes to eavesdrop information
DOS attack, the adversary interferes with the normal operation of the WSN by actively disrupting, changing, or even destroying the functionality of a subset of nodes in the system.
Existing System
Existing randomized multi-path routing algorithms in WSNs have not been designed with security considerations in mind, largely due to their low energy efficiency.
In this only a static path is used to transfer the data from client to server and vice-versa.
This causes intruders to easily find path and attack causing CN orDOS .
Disadvantages of Existing System
Existing randomized multi-path routing algorithms in WSNs have not been designed with security
considerations in mind, largely due to their low energy
efficiency.
Multi-path routing mechanism, Gossiping algorithm
has a percolation behavior, in that for a given
retransmission probability, either very few nodes
receive the packet, or almost all nodes receive it.
The Wanderer algorithm has poor energy performance, because it results in long paths
RANDOMIZED MULTIPATH DELIVER
We consider a three-phase approach for secure
information delivery in a WSN as illustrated
Secret sharing of information,
Randomized propagation of each information
share, and
Normal routing (e.g., min-hop routing) toward
the sink.