Академический Документы
Профессиональный Документы
Культура Документы
INSTITUTE OF TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE
PostGraduate Program in Computer Science
Ambo, Ethiopia
17 April 2017
Introduction
Wireless Sensor networks (WSN), sometimes called wireless sensor and actuator
networks (WSAN),
and to cooperatively pass their data through the network to a main location.
Recently, wireless Sensor Networks (WSNs) have been paid more and more
attention and are widely used in a lots of military and commercial
applications.
Introduction(Continued)
Nowadays, Wireless sensor networks have become a promising future to
many applications, such as
smart houses,
smart farms,
smart parking,
smart hospitals,
habitat monitoring,
building and structure monitoring,
distributed robotics,
industrial and manufacturing, and national security.
Objectives of the Paper
General Objective
To deploy the proposed framework on the sensor network to evaluate its performance.
Specific objective
Analyze the attack type of WSN by data mining and uniformly implement protection
scheme through a control platform
Once the sensors are deployed in an unsecured environment, there are many critical security issues.
The researcher also stated that the existing method does not satisfy the security requirements such as
Non-repudiation
Confidentiality
Integrity
Authentication
Authorization
Availability
Proposed Methodology
6
4
8
2
11
3
Working process
2) Real-time
monitoring
Experiments
Experiments
Experiments
Comparison with some the state-of-the-art
Security Key Attack Security Proposed
Requirements management detection routing
Drawbacks
The proposed methodology requires additional hardware and software requirements
such as
Web server to deploy the system
It requires RAM, CPU to process the data
Database server to store the data
Due to this the speed may be slow down to process the data.
Conclusion