SlideShare a Scribd company logo
Secure and Distributed Data Discovery and Dissemination in
Wireless Sensor Networks
ABSTRACT:
A data discovery and dissemination protocol for wireless sensor networks (WSNs)
is responsible for updating configuration parameters of, and distributing
management commands to, the sensor nodes. All existing data discovery and
dissemination protocols suffer from two drawbacks. First, they are based on the
centralized approach; only the base station can distribute data items. Such an
approach is not suitable for emergent multi-owner-multi-user WSNs. Second, those
protocols were not designed with security in mind and hence adversaries can easily
launch attacks to harm the network. This paper proposes the first secure and
distributed data discovery and dissemination protocol named DiDrip. It allows the
network owners to authorize multiple network users with different privileges to
simultaneously and directly disseminate data items to the sensor nodes. Moreover,
as demonstrated by our theoretical analysis, it addresses a number of possible
security vulnerabilities that we have identified. Extensive security analysis show
DiDrip is provably secure. We also implement DiDrip in an experimental network
of resource-limited sensor nodes to show its high efficiency in practice.
EXISTING SYSTEM:
• More importantly, all existing data discovery and dissemination protocols
employ the centralized approach, data items can only be disseminated by the
base station.
• Unfortunately, this approach suffers from the single point of failure as
dissemination is impossible when the base station is not functioning or when
the connection between the base station and a node is broken.
• In addition, the centralized approach is inefficient, non-scalable, and
vulnerable to security attacks that can be launched anywhere along the
communication path.
DISADVANTAGES OF EXISTING SYSTEM:
• Centralized approach
• Existing method is in-efficient
• Vulnerable to security attacks
PROPOSED SYSTEM:
• In this project, we propose secure and data discovery and dissemination
protocol (DiDrip). DiDrip consists of four phases, system initialization, user
joining, and packet preprocessing and packet verification.
• For our basic protocol, in system initialization phase, the network owner
creates its public and private keys, and then loads the public parameters on
each node before the network deployment.
• In the user joining phase, a user gets the dissemination privilege through
registering to the network owner.
• In packet preprocessing phase, if a user enters the network and wants to
disseminate some data items, he/she will need to construct the data
dissemination packets and then send them to the nodes.
• In the packet verification phase, a node verifies each received packet. If the
result is positive, it updates the data according to the received packet.
ADVANTAGES OF PROPOSED SYSTEM:
• User can send the data directly to the sensor nodes without using the base
station
• Provide more security for data
• Increase packet delivery ratio
SYSTEM ARCHITECTURE:
BLOCK DIAGRAM:
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7/LINUX.
 Implementation : NS2
 NS2 Version : NS2.2.28
 Front End : OTCL (Object Oriented Tool Command
Language)
 Tool : Cygwin (To simulate in Windows OS)

More Related Content

PPTX
Investigation, Design and Implementation of a Secure
PPTX
Random key material distribution in wireless sensor networks
PPTX
Security issues and attacks in wireless sensor networks
PPT
security in wireless sensor network
PPTX
Wireless Sensor Network Security
PDF
Wired and Wireless Network Forensics
PPT
security in wireless sensor networks
PPT
Security issues
Investigation, Design and Implementation of a Secure
Random key material distribution in wireless sensor networks
Security issues and attacks in wireless sensor networks
security in wireless sensor network
Wireless Sensor Network Security
Wired and Wireless Network Forensics
security in wireless sensor networks
Security issues

What's hot (18)

PPTX
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
PPTX
Security in Wireless Sensor Network
PDF
Secure data aggregation technique for wireless sensor networks in the presenc...
PPT
NFV Security PPT
PDF
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
PDF
A review of privacy preserving techniques in wireless sensor network
PDF
Indexing Building Evaluation Criteria
PDF
A review of privacy preserving techniques in wireless sensor network
PPTX
Wireless_Sensor_security
PDF
Secure data dissemination protocol in wireless sensor networks using xor netw...
PDF
Analyze and Detect Packet Loss for Data Transmission in WSN
PDF
Bi33349355
PPT
Presentation.pptx
PPTX
Wsn1 ppt
PDF
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
PPTX
01 - Introduction to Distributed Systems
PDF
Malware detection in cloud computing infrastructures
PPTX
Seminar
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Security in Wireless Sensor Network
Secure data aggregation technique for wireless sensor networks in the presenc...
NFV Security PPT
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A review of privacy preserving techniques in wireless sensor network
Indexing Building Evaluation Criteria
A review of privacy preserving techniques in wireless sensor network
Wireless_Sensor_security
Secure data dissemination protocol in wireless sensor networks using xor netw...
Analyze and Detect Packet Loss for Data Transmission in WSN
Bi33349355
Presentation.pptx
Wsn1 ppt
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
01 - Introduction to Distributed Systems
Malware detection in cloud computing infrastructures
Seminar
Ad

Viewers also liked (12)

PDF
Multi media chapter 1_2_3
PPTX
Efficient Instant-Fuzzy Search With Proximity Ranking
PPTX
Multimedia Answer Generation for Community Question Answering
PDF
Relevant multimedia question answering
PPTX
Multimedia presentation
PPT
Multimedia ppt
PPT
Introduction To Multimedia
PPT
Multimedia
PPT
Introduction to multimedia
PPT
Introduction to multimedia
PPT
Chapter 1 : INTRODUCTION TO MULTIMEDIA
PPTX
Multimedia
Multi media chapter 1_2_3
Efficient Instant-Fuzzy Search With Proximity Ranking
Multimedia Answer Generation for Community Question Answering
Relevant multimedia question answering
Multimedia presentation
Multimedia ppt
Introduction To Multimedia
Multimedia
Introduction to multimedia
Introduction to multimedia
Chapter 1 : INTRODUCTION TO MULTIMEDIA
Multimedia
Ad

Similar to Secure Distibuted data discovery & dissemination IN WSN (20)

PDF
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
PDF
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
PDF
Secure and distributed data discovery and dissemination in wireless sensor ne...
PDF
Secure and distributed data discovery and dissemination in wireless sensor ne...
DOCX
Secure and distributed data discovery and dissemination in wireless sensor ne...
PDF
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
PDF
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
PDF
Iaetsd secure data dissemination based on
PPTX
Modelling pairwise key predistribution in the presence of unreliable links
PDF
A05510105
PDF
An enhancing security for mobile sinks by providing location privacy in wsn
PDF
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
PDF
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
PPTX
Wsn routing protocol
PDF
Efficient Data Aggregation in Wireless Sensor Networks
PPTX
Security in wireless sensor network
PDF
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
PDF
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
DOCX
PPT
Wireless sensor Network using Zero Knowledge Protocol ppt
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Iaetsd secure data dissemination based on
Modelling pairwise key predistribution in the presence of unreliable links
A05510105
An enhancing security for mobile sinks by providing location privacy in wsn
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Wsn routing protocol
Efficient Data Aggregation in Wireless Sensor Networks
Security in wireless sensor network
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Wireless sensor Network using Zero Knowledge Protocol ppt

More from SWAMI06 (9)

PDF
ns2-project-list
DOCX
Heart disease prediction system
DOC
Detection of Spyware by Mining Executable Files
PPTX
Annotating Search Results from Web Databases
DOCX
Keyword Query Routing
DOCX
A Hybrid Cloud Approach for Secure Authorized Deduplication
PDF
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
PPTX
A Segmentation based Sequential Pattern Matching for Efficient Video Copy De...
PPTX
Frequent itemset mining_on_hadoop
ns2-project-list
Heart disease prediction system
Detection of Spyware by Mining Executable Files
Annotating Search Results from Web Databases
Keyword Query Routing
A Hybrid Cloud Approach for Secure Authorized Deduplication
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
A Segmentation based Sequential Pattern Matching for Efficient Video Copy De...
Frequent itemset mining_on_hadoop

Recently uploaded (20)

PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Well-logging-methods_new................
PPT
Project quality management in manufacturing
PDF
Digital Logic Computer Design lecture notes
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PDF
composite construction of structures.pdf
PPTX
web development for engineering and engineering
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Arduino robotics embedded978-1-4302-3184-4.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
bas. eng. economics group 4 presentation 1.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Well-logging-methods_new................
Project quality management in manufacturing
Digital Logic Computer Design lecture notes
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Internet of Things (IOT) - A guide to understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Foundation to blockchain - A guide to Blockchain Tech
Structs to JSON How Go Powers REST APIs.pdf
UNIT 4 Total Quality Management .pptx
composite construction of structures.pdf
web development for engineering and engineering
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx

Secure Distibuted data discovery & dissemination IN WSN

  • 1. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks ABSTRACT: A data discovery and dissemination protocol for wireless sensor networks (WSNs) is responsible for updating configuration parameters of, and distributing management commands to, the sensor nodes. All existing data discovery and dissemination protocols suffer from two drawbacks. First, they are based on the centralized approach; only the base station can distribute data items. Such an approach is not suitable for emergent multi-owner-multi-user WSNs. Second, those protocols were not designed with security in mind and hence adversaries can easily launch attacks to harm the network. This paper proposes the first secure and distributed data discovery and dissemination protocol named DiDrip. It allows the network owners to authorize multiple network users with different privileges to simultaneously and directly disseminate data items to the sensor nodes. Moreover, as demonstrated by our theoretical analysis, it addresses a number of possible security vulnerabilities that we have identified. Extensive security analysis show DiDrip is provably secure. We also implement DiDrip in an experimental network of resource-limited sensor nodes to show its high efficiency in practice. EXISTING SYSTEM: • More importantly, all existing data discovery and dissemination protocols employ the centralized approach, data items can only be disseminated by the base station.
  • 2. • Unfortunately, this approach suffers from the single point of failure as dissemination is impossible when the base station is not functioning or when the connection between the base station and a node is broken. • In addition, the centralized approach is inefficient, non-scalable, and vulnerable to security attacks that can be launched anywhere along the communication path. DISADVANTAGES OF EXISTING SYSTEM: • Centralized approach • Existing method is in-efficient • Vulnerable to security attacks PROPOSED SYSTEM: • In this project, we propose secure and data discovery and dissemination protocol (DiDrip). DiDrip consists of four phases, system initialization, user joining, and packet preprocessing and packet verification. • For our basic protocol, in system initialization phase, the network owner creates its public and private keys, and then loads the public parameters on each node before the network deployment. • In the user joining phase, a user gets the dissemination privilege through registering to the network owner.
  • 3. • In packet preprocessing phase, if a user enters the network and wants to disseminate some data items, he/she will need to construct the data dissemination packets and then send them to the nodes. • In the packet verification phase, a node verifies each received packet. If the result is positive, it updates the data according to the received packet. ADVANTAGES OF PROPOSED SYSTEM: • User can send the data directly to the sensor nodes without using the base station • Provide more security for data • Increase packet delivery ratio SYSTEM ARCHITECTURE:
  • 4. BLOCK DIAGRAM: SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7/LINUX.  Implementation : NS2  NS2 Version : NS2.2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS)