Вы находитесь на странице: 1из 19

AMBO UNIVERSITY

INSTITUTE OF TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE
PostGraduate Program in Computer Science
Ambo, Ethiopia

A Review Presentation on A security framework for wireless


sensor networks Published By TIAN Bin YANG Yi-xian, LI
Dong, LI Qi, XIN Yang
BY DEJENE TECHANE
DTECHANE6@GMAIL.COM

17 April 2017
Introduction
Wireless Sensor networks (WSN), sometimes called wireless sensor and actuator
networks (WSAN),

are spatially distributed autonomous sensors to monitor physical or


environmental conditions, such as

Temperature, sound, pressure, etc.

and to cooperatively pass their data through the network to a main location.

Recently, wireless Sensor Networks (WSNs) have been paid more and more
attention and are widely used in a lots of military and commercial
applications.
Introduction(Continued)
Nowadays, Wireless sensor networks have become a promising future to
many applications, such as
smart houses,
smart farms,
smart parking,
smart hospitals,
habitat monitoring,
building and structure monitoring,
distributed robotics,
industrial and manufacturing, and national security.
Objectives of the Paper
General Objective

To deploy the proposed framework on the sensor network to evaluate its performance.

Specific objective

Identify and define existing problems of Wireless Sensor Networks

Analyze the attack type of WSN by data mining and uniformly implement protection
scheme through a control platform

Propose new security framework platform for WSN

Combines existing method with the proposed methodology to satisfy security


requirements
Problem Definition
WSN is a collection of thousands of self-organized sensor nodes capable of wireless

communication deploy in different environments for different purposes.

Once the sensors are deployed in an unsecured environment, there are many critical security issues.

The researcher also stated that the existing method does not satisfy the security requirements such as

Non-repudiation

Confidentiality

Integrity

Authentication

Authorization

Availability
Proposed Methodology

Due to problems of existing method the researcher has been proposed


new methodology called

a flexible security management framework

combines the existing method to overcome the drawbacks and


difficulties of the existing method.
System Architecture
The architecture of system is
divided into two parts, one is the
wireless sensor network ,and the
other is the security management
platform.
Wireless sensor networks are
considered to consist of a mount of
sensor nodes.
These nodes are working together
to monitor some area and collect
sensitive data.
System Architecture (continued)

The tasks of security management platform are:


1) Processing normal data form wireless sensor networks.
2) Managing the secret keys distribution and renew.
3) Detecting malicious nodes and attack .
4) Mining potential attack and malicious nodes.
System Architecture(continued)
In proposed methodology, the researcher focused on designing the security
framework platforms which is divided into eight modules
7.User interface management
module

6
4

8
2

11

3
Working process

The procedure can be summarized as follows:


1) Initialization
Working process(continued)

2) Real-time
monitoring
Experiments
Experiments
Experiments
Comparison with some the state-of-the-art
Security Key Attack Security Proposed
Requirements management detection routing

Confidentiality Yes No No Yes

Availability No Yes Yes Yes

Integrity Yes No Yes

Non- No Yes No Yes


repudiation
Authorization No No No Yes

Authentication Yes No No Yes


Critiques
Therefore, from these results that the researcher satisfied the following
security requirements
Non-repudiation
Message confidentiality
Authentication
Message Integrity
Authorization
Availability
Critiques
Strength of the Paper
The problems were properly justified, and the researcher briefly explained the reason
why proposed method are implemented for Wireless Sensor Networks.

The researcher has been properly satisfied the security requirements.

Drawbacks
The proposed methodology requires additional hardware and software requirements
such as
Web server to deploy the system
It requires RAM, CPU to process the data
Database server to store the data
Due to this the speed may be slow down to process the data.
Conclusion

Clearly, future or further research are designed to further


investigate on Security for Wireless Sensor Networks.
Any Question?

Вам также может понравиться