SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
SECURE AND DISTRIBUTED DATA DISCOVERY AND
DISSEMINATION IN WIRELESS SENSOR NETWORKS
ABSTRACT:
A data discovery and dissemination protocol for wireless sensor networks (WSNs) is responsible
for updating configuration parameters of, and distributing management commands to, the sensor
nodes. All existing data discovery and dissemination protocols suffer from two drawbacks. First,
they are based on the centralized approach; only the base station can distribute data items. Such
an approach is not suitable for emergent multi-owner-multi-user WSNs. Second, those protocols
were not designed with security in mind and hence adversaries can easily launch attacks to harm
the network. This paper proposes the first secure and distributed data discovery and
dissemination protocol named Did rip. It allows the network owners to authorize multiple
network users with different privileges to simultaneously and directly disseminate data items to
the sensor nodes. Moreover, as demonstrated by our theoretical analysis, it addresses a number
of possible security vulnerabilities that we have identified. Extensive security analysis show did
rip is provably secure. We also implement Did rip in an experimental network of resource-
limited sensor nodes to show its high efficiency in practice.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
EXISTING SYSTEM:
• More importantly, all existing data discovery and dissemination protocols employ the
centralized approach, data items can only be disseminated by the base station.
• Unfortunately, this approach suffers from the single point of failure as dissemination is
impossible when the base station is not functioning or when the connection between the
base station and a node is broken.
• In addition, the centralized approach is inefficient, non-scalable, and vulnerable to
security attacks that can be launched anywhere along the communication path.
DISADVANTAGES OF EXISTING SYSTEM:
• Centralized approach
• Existing method is in-efficient
• Vulnerable to security attacks
PROPOSED SYSTEM:
• In this project, we propose secure and data discovery and dissemination protocol
(DiDrip). DiDrip consists of four phases, system initialization, user joining, and packet
preprocessing and packet verification.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
• For our basic protocol, in system initialization phase, the network owner creates its public
and private keys, and then loads the public parameters on each node before the network
deployment.
• In the user joining phase, a user gets the dissemination privilege through registering to
the network owner.
• In packet preprocessing phase, if a user enters the network and wants to disseminate
some data items, he/she will need to construct the data dissemination packets and then
send them to the nodes.
• In the packet verification phase, a node verifies each received packet. If the result is
positive, it updates the data according to the received packet.
ADVANTAGES OF PROPOSED SYSTEM:
• User can send the data directly to the sensor nodes without using the base station
• Provide more security for data
• Increase packet delivery ratio
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
SYSTEM ARCHITECTURE:
BLOCK DIAGRAM:
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7/LINUX.
 Implementation : NS2
 NS2 Version : NS2.2.28
 Front End : OTCL (Object Oriented Tool Command Language)
 Tool : Cygwin (To simulate in Windows OS)
REFERENCE:
Daojing He, Member, IEEE, Sammy Chan, Member, IEEE, Mohsen Guizani, Fellow, IEEE,
Haomiao Yang, Member, IEEE, and Boyang Zhou, “Secure and Distributed Data Discovery and
Dissemination in Wireless Sensor Networks”, IEEE TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS, VOL. 26, NO. 4, APRIL 2015.

More Related Content

DOC
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
DOCX
Secure Distibuted data discovery & dissemination IN WSN
PDF
Secure and distributed data discovery and dissemination in wireless sensor ne...
PDF
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
PDF
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
PDF
Secure and distributed data discovery and dissemination in wireless sensor ne...
PDF
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
PDF
Secure data dissemination protocol in wireless sensor networks using xor netw...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
Secure Distibuted data discovery & dissemination IN WSN
Secure and distributed data discovery and dissemination in wireless sensor ne...
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
Secure and distributed data discovery and dissemination in wireless sensor ne...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Secure data dissemination protocol in wireless sensor networks using xor netw...

Similar to Secure and distributed data discovery and dissemination in wireless sensor networks (20)

PDF
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
PDF
Dictionary based-secure-provenance Comparissoion for wireless sensor nertwork
PPTX
Modelling pairwise key predistribution in the presence of unreliable links
DOCX
Secure mining of association rules in horizontally distributed databases
PDF
latest IEEE 2015 wireless security
DOCX
Cost aware secure routing (caser) protocol design for wireless sensor networks
PDF
Iaetsd secure data dissemination based on
DOCX
Privacy preserving and truthful detection of packet dropping attacks in wirel...
DOCX
Section of node density with cluster in spin for data centric wireless sensor...
PPTX
WSN Routing Protocols
DOCX
Incentive based data sharing in delay tolerant mobile networks
PDF
A05510105
PPT
Wireless sensor Network using Zero Knowledge Protocol ppt
PDF
Wireless personal communication
PDF
Wireless Personal Communications
PDF
Efficient Data Aggregation in Wireless Sensor Networks
PPTX
Aps 10june2020
DOCX
A framework for secure computations with two
PDF
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
PDF
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Dictionary based-secure-provenance Comparissoion for wireless sensor nertwork
Modelling pairwise key predistribution in the presence of unreliable links
Secure mining of association rules in horizontally distributed databases
latest IEEE 2015 wireless security
Cost aware secure routing (caser) protocol design for wireless sensor networks
Iaetsd secure data dissemination based on
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Section of node density with cluster in spin for data centric wireless sensor...
WSN Routing Protocols
Incentive based data sharing in delay tolerant mobile networks
A05510105
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless personal communication
Wireless Personal Communications
Efficient Data Aggregation in Wireless Sensor Networks
Aps 10june2020
A framework for secure computations with two
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ad

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
KodekX | Application Modernization Development
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
A Presentation on Artificial Intelligence
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Understanding_Digital_Forensics_Presentation.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Chapter 3 Spatial Domain Image Processing.pdf
KodekX | Application Modernization Development
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Weekly Chronicles - August'25 Week I
Spectral efficient network and resource selection model in 5G networks
A Presentation on Artificial Intelligence
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
MYSQL Presentation for SQL database connectivity
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Secure and distributed data discovery and dissemination in wireless sensor networks

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com SECURE AND DISTRIBUTED DATA DISCOVERY AND DISSEMINATION IN WIRELESS SENSOR NETWORKS ABSTRACT: A data discovery and dissemination protocol for wireless sensor networks (WSNs) is responsible for updating configuration parameters of, and distributing management commands to, the sensor nodes. All existing data discovery and dissemination protocols suffer from two drawbacks. First, they are based on the centralized approach; only the base station can distribute data items. Such an approach is not suitable for emergent multi-owner-multi-user WSNs. Second, those protocols were not designed with security in mind and hence adversaries can easily launch attacks to harm the network. This paper proposes the first secure and distributed data discovery and dissemination protocol named Did rip. It allows the network owners to authorize multiple network users with different privileges to simultaneously and directly disseminate data items to the sensor nodes. Moreover, as demonstrated by our theoretical analysis, it addresses a number of possible security vulnerabilities that we have identified. Extensive security analysis show did rip is provably secure. We also implement Did rip in an experimental network of resource- limited sensor nodes to show its high efficiency in practice.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com EXISTING SYSTEM: • More importantly, all existing data discovery and dissemination protocols employ the centralized approach, data items can only be disseminated by the base station. • Unfortunately, this approach suffers from the single point of failure as dissemination is impossible when the base station is not functioning or when the connection between the base station and a node is broken. • In addition, the centralized approach is inefficient, non-scalable, and vulnerable to security attacks that can be launched anywhere along the communication path. DISADVANTAGES OF EXISTING SYSTEM: • Centralized approach • Existing method is in-efficient • Vulnerable to security attacks PROPOSED SYSTEM: • In this project, we propose secure and data discovery and dissemination protocol (DiDrip). DiDrip consists of four phases, system initialization, user joining, and packet preprocessing and packet verification.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com • For our basic protocol, in system initialization phase, the network owner creates its public and private keys, and then loads the public parameters on each node before the network deployment. • In the user joining phase, a user gets the dissemination privilege through registering to the network owner. • In packet preprocessing phase, if a user enters the network and wants to disseminate some data items, he/she will need to construct the data dissemination packets and then send them to the nodes. • In the packet verification phase, a node verifies each received packet. If the result is positive, it updates the data according to the received packet. ADVANTAGES OF PROPOSED SYSTEM: • User can send the data directly to the sensor nodes without using the base station • Provide more security for data • Increase packet delivery ratio
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com SYSTEM ARCHITECTURE: BLOCK DIAGRAM:
  • 5. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7/LINUX.  Implementation : NS2  NS2 Version : NS2.2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS) REFERENCE: Daojing He, Member, IEEE, Sammy Chan, Member, IEEE, Mohsen Guizani, Fellow, IEEE, Haomiao Yang, Member, IEEE, and Boyang Zhou, “Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 26, NO. 4, APRIL 2015.