Академический Документы
Профессиональный Документы
Культура Документы
Guided By Submitted By
Centralized method
Security weaknesses
User accountability
Scalability
BLOCK DIAGRAM
MODULES
1. Network Module
2. User joining
3. Packet Preprocessing
4. Packet Verification
MODULE DESCRIPTION
1. Network module
User sends their user id, private key and public key to the
network owner
User enters the WSN and need to disseminate n data items the
construction of the packets can be designed in two ways
Hash Chain
The value of the hash packet is used to verify the next packet.
After that user runs their own private key to perform sign
operation using that its will create an advertisement packet.
All the data items are treated as the leaves of the tree.
verifying po{certj,h(p),SIGskj}
verifying po{certj,root,SIGskj(root)}
Software Requirements
Implementation - NS2
operation.
proposed.
Cont..
Perrig A.,Canetti R.,Song D., and Tygar J.,( 2001) “Efficient and secure source
authentication for multicast,” in Proc. Netw. Distrib. Syst. Security Symp., ,
pp. 35–46.
Hui J.W. and D. Culler,( 2004) “The dynamic behavior of a data dissemination
protocol for network programming at scale,” in Proc. 2nd Int. Conf. Embedded
Netw. Sensor Syst., pp. 81–94.
Lin K., and Levis P.,(2008) “Data discovery and dissemination with DIP,” in
Proc. ACM/IEEE Int. Conf. Inf. Process. Sensor Netw, pp. 433–444.
THANK YOU