Sie sind auf Seite 1von 22

TABLE CONTENTS

Privacy- and Integrity-Preserving


Range Queries
In Sensor Networks

1. Abstract
2.Introduction
• Existing system
2
TABLE CONTENTS
• Proposed system
• Modules
3. System Requirements
• Software Requirements
• Hardware Requirements

3
TABLE CONTENTS

4. Design Process
• Process flow for Privacy- and Integrity-Preserving
Range Queries In Sensor Networks
• UML diagrams for Privacy- and Integrity-
Preserving Range Queries In Sensor Networks
5. Screen shots
6.Conclusion
7.Bibilography
4
Abstract
• In wireless sensor security is the main concern to
identify the range queries we are trying to
implement privacy and integrity of the range
queries.
• To preserve privacy, SafeQ uses a novel
technique to encode both data and queries such
that a storage node can correctly process
encoded queries over encoded data without
knowing their values.
4
Introduction
Here, storage nodes gather data from nearby
sensors(nodes) “Serve as an intermediate node
between Sensors and sink” and answer queries
from the sink of the network.

5
Storage nodes has the 3 main advantages to
sensor networks :
• Save power
• Memory-limited
• More efficient
Definitions:
• Sensor node: It may contain data and files
• Storage Area: Where the files are stored.
• Sink: It’s a functionality. Checks the IP and
batch code.
6
Existing system
• There will be minimal manual intervention
and monitoring.
• There is no manual monitoring.

7
Proposed system
To preserve the privacy and integrity of range
queries in sensor networks it uses the bucket
partitioning for database privacy.

8
Modules
• SafeQ
• Integrity
• Privacy
• Range Queries
• Sink
• Storage Node

9
System Requirements
Software requirements:-
Operating System :Windows XP
Front End :JAVA(Swings)
Database :Microsoft Access
Database Connectivity :JDBC.

Hardware requirements:-
Processor - Pentium –IV 2.5 GHZ
RAM - 512 MB
Hard Disk - 80 GB
SCETW B.E-IV/IV-II SEM 10

10
Process Flow
1) The files are sent from Sensor Node1 to
Storage Node.
2) The files are sent from sent from Sensor
Node2 to Storage Node
3) The files are sent sent from Sensor Node3 to
Storage Node
4) File received at Sink
5) Sink views the File name, Batch ID.
11
ER-Diagram for Privacy- and Integrity-
Preserving Range Queries In Sensor Networks

12
Class diagram for Privacy- and Integrity-
Preserving Range Queries In Sensor
Networks

13

13
Sequence diagram for Privacy- and Integrity-
Preserving Range Queries In Sensor Networks
Sensor node Storage node Sink

2 : Send file() 1 : View avaialable file()

3 : View file details()

4 : View misbehavior details()

5 : Send request()

6 : Receive file()

Data base

14
Use case diagram for Privacy and integrity
preserving range queries in Sensor networks
Send file

View file name

View File details


Sensor

View filename

View filedetails

Storage node
View misbehavior details

Send query request


Sink

Response to Request

Receive file

B.E-IV/IV-2nd Sem 15
Screen Shot for storage node

16
Screen shot for Sensor node 1

17
Screen shot for Sensor node 2

18
Screen shot for Sensor node 3

19
Conclusion
1) SafeQ:efficient protocol for handling range
queries in two-tiered sensor networks in a
privacy- and integrity- preserving.
2)Bucket partioning: To preserve privacy and
range queries in sensor networks.
2)Optimization technique : Using Bloom filters
to significantly reduce the communication
cost between sensors and storage nodes.
20
References
• [1] F. Chen and A. X. Liu, “SafeQ: Secure and efficient query processing
• in sensor networks,” in Proc. IEEE INFOCOM, 2010, pp. 1–9.

• [2] S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L.


Yin, and F. Yu, “Data-centric storage in sensornets with GHT, a
geographic hash table,” Mobile Netw. Appl., vol. 8, no. 4, pp. 427–
442, 2003.

• [3] P. Desnoyers, D. Ganesan, H. Li, and P. Shenoy, “Presto:A predictive


• storage architecture for sensor networks,” in Proc. HotOS, 2005, p. 23.

• [4] D. Zeinalipour-Yazti, S. Lin, V. Kalogeraki, D. Gunopulos, and W.


A. Najjar, “Microhash: An efficient index structure for flash-based
sensor devices,” in Proc. FAST, 2005, pp. 31–44.

21
22

Das könnte Ihnen auch gefallen