Sie sind auf Seite 1von 12

Under the guidance of:- Submitted by:-

Mr. Ranjit Kumar Kart (16097)


Prakhar (16097)
Group no. – 19ITA25
What is WSN?
 Wireless sensor networks (WSN) consist of small nodes
with the ability to sense and write data to the base station.
 A wireless sensor system consists of sensors distributed
sporadically in an environment, which collectively record
physical or environmental conditions, such as weight,
temperature, sound, motion, vibration and toxins.
 The sensor Nodes (node) in WSN, are the combination of
MEMS (micro-electro-mechanical systems) technologies,
wireless communications, and digital electronics. These are
cheap and low consumption devices, which are small in
size and able to communicate in small distances
Attacks in WSN
Defense mechanisms currently
used for various attacks
Problem Statement
 Wireless medium is not much secure because of its
broadcasting nature. An attacker can easily intercept,
change and alter any transmission. In Wireless
medium an attacker easily track the node and replace
that node by malicious one.
 Energy is the biggest constraint on wireless sensor
node. Most of the sensor node uses battery and
lifetime of battery is limited (from days to years).
Proposed work
 The objective is to improve the existing methods and
mechanisms of protecting and preventing the
structured and unstructured WSNs from various types
of attacks and implementing new ideas to in order to
make the network more secured and unbreachable.
 We also tend to check the efficiency of various existing
methods and mechanisms for prevention and
protection of the WSNs from various types of attacks.
Purpose and Scope
 The main purpose of analysis of various types of
attacks is to provide three basic requirements in any
network – CIA (confidentiality, integrity and
availability) as well as sustainability, authentication,
authorization etc.
 The project is research based and tends to improve
and provide ways for future studies and on-field
implementation based on the research.
Methodology(Work Plan)
Requirement Gathering and
Design
Analysis
(In this phase we have to collect the
(In this phase we have to collect the
data and we have to analyse it for its
data and we have to analyse it for its
implementation in our project)
implementation in our project)

Validation Implementation

(In this phase we will be validating the (During this phase we would be
result of our project) implanting the concept with the help of
code)
Feasibility study
 The entire project is to be carried out on a computer
system with the help of simulation tools such as NS2,
NS3, etc using softwares such as Ubuntu and Vmware.
 The programming languages used are C++ and
Python.
 There is no extra hardware cost as the entire project is
to be carried out on a system.

Das könnte Ihnen auch gefallen