A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.

Slides:



Advertisements
Similar presentations
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Advertisements

By Md Emran Mazumder Ottawa University Student no:
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
Introduction to Wireless Sensor Networks
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Multi-agents based wireless sensor telemedicine network for E-Health monitoring of HIV Aids Patients. By: Muturi Moses Kuria, SCI, University of Nairobi,
Security Issues In Sensor Networks By Priya Palanivelu.
Wireless Sensor Network. A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Applied Cryptography for Network Security
Wireless Sensor Network Security Anuj Nagar CS 590.
1 29 September 2010 NATO IST-092 Symposium New Capabilities in Security and QoS Using the Updated MANET Routing Protocol OLSRv2 Christopher Dearlove
Introduction To Wireless Sensor Networks Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting of spatially distributed.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
IntroOH-1 CSE 5810 Wireless Body Sensor Networks (WBSN) in Healthcare Aljoharah A. Algwaiz Computer Science & Engineering Department The University of.
A Cooperative MAC Protocol for Wireless LAN Pei Liu, Zhifeng Tao, Shivendra S. Panwar Motivation: In the legacy system, source station transmits.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
A Mobile Sensor Network Using Autonomously Controlled Animals Yihan Li, Shivendra S. Panwar and Srinivas Burugupalli New York State Center for Advanced.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Microcontroller-Based Wireless Sensor Networks
Wireless Ad-Hoc Networks
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
Dynamic Routing in Mobile Ad Hoc Network 報告者:呂佐鴻 指導教授:李鴻璋.
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Ad Hoc Network.
Self-Healing Group-Wise Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks Minghui Shi, Xuemin Shen, Yixin Jiang,
Human Alive Detection and Locating the Detection Area Using GPS and XBee Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Wireless sensor and actor networks: research challenges
Key Management and Distribution Anand Seetharam CST 312.
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
In the name of God.
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
Wireless Sensor Network (WSN)
Introduction to Wireless Sensor Networks
Adhoc and Wireless Sensor Networks
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Wireless & Mobile Networking CS 752/852 - Spring 2011
Protocols.
Edinburgh Napier University
Protocols.
Presentation transcript:

A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad

Biosensors Introduction A Mobile Ad hoc biosensor Network  Routing in the mobile Ad hoc biosensor network Security in biosensor networks  System model  Constraints of biosensor network  Security requirements of biosensor networks Conclusion

Introduction A biosensor is an analytical device which converts a biological response into an electrical signal. Its self-contained integrated device which is capable of providing specific quantitative or semi-quantitative analytical information using a biological recognition element which is in direct spatial contact with a transducer element..

Biosensor consists of three parts:  A sensitive biological element  A transducer  A detector element. Biosensors offer the opportunity to sense the biological world providing valuable information for medical diagnostics, analytical chemistry, environmental monitoring and fundamental research.

Mobile Ad hoc Biosensor Network Recent research shows that it is possible to set up an animal mobile sensor network for search and rescue operations. Applications of such an animal sensor network have great importance to society, including natural disaster recovery, homeland security and military operations. A human operator must be within the radio transmission range of a rat to manually guide the rat.

Mobile Ad hoc Biosensor Network Each animal will carry a backpack, containing :  a microprocessor a wireless transceiver  a video camera  other positioning sensors (e.g. compass and GPS)  a battery.

To reduce the battery load on each animal and the complexity of guiding many animals simultaneously  Seekers are trained to find a particular kind of target  Followers are trained to closely follow a seeker everywhere.  Relays form a chain of repeaters to ensure the connectivity between the seeker/follower and the command center. Mobile Ad hoc Biosensor Network

A backpack without camera to be carried by a follower or a relay.

Mobile Ad hoc Biosensor Network A mobile sensor network with controlled animals consists of several inter-related research components they are:  Animal training and behavior modelling, which develops automated training and rewarding techniques for guided rats to perform different functions.  Sensor data processing and transmission. The video and other sensor data will be processed locally.  Cooperative control of animal sensors. Cooperative control techniques, which can autonomously guide and reward a large set of animals with different tasks, need to be investigated.  Wireless communications. The wireless network communication of this system will address several unique challenges imposed by the need for the network of seeker and relay animals.

Mobile Ad hoc Biosensor Network In an animal sensor network, that is biosensor network there are typically two kinds of messages: sensor data (e.g., video or pictures captured by the seeker) and control messages. Routing:  Flooding techniques are used for control messages.  For data messages, using location-aware routing can reduce the redundancy, so that a packet will be forwarded only by a subset of nodes in the network.

Mobile Ad hoc Biosensor Network A simple routing algorithm is proposed for data messages. In this sensor network, it is not practical to depend on GPS to get the location knowledge of animals, since the animal sensors may work underground or in an environment where GPS does not work well. In this system the hop number to the distance from a node to the final destination, typically the control center. This routing algorithm is called as hop-aware flooding.

Biosensors can also be implanted inside the human body to monitor parts of the body. These biosensors form a network and collectively monitor the health condition of their carrier or host. Biosensors may be used for monitoring the physiological parameters like blood pressure, glucose levels and collecting the data for further analysis. Biosensors placed in the subcutaneous layer of skin, nasal area, tongue,etc. This information is of personal nature and is required to be secured. Constraints of the biosensor networks.  Low power  Limited memory  Low computational capability  Low communication rate.

System model

Security requirements of biosensor networks:  Data Confidentiality: Keep the data that is communicated between biosensors from being accessed by unauthorized entities.  Data Authenticity: Authenticity is the property of the data by which the recipient of the data can verify and trust that claimed sender is in reality the actual sender.  Data Integrity: It is possible that data can be modified by a hostile entity, while it is being transmitted. Key distribution is central to any security mechanism.

All the security requirements described above can be fulfilled if a key is successfully and securely distributed.  Data on encryption is unavailable to unauthorized entities thereby making it confidential.  Since the key is distributed securely, it is possessed only by the legitimate parties and hence only they can encrypt and send data which would decrypt properly with the shared key.  Data integrity can be obtained by sending the message digest (MAC) of the data computed using the secret key along with data.

Conclusion A biosensor is a sensor which incorporates a biological element A mobile ad hoc sensor network using autonomously controlled animals is presented. A new routing scheme, hop-aware flooding, is devised for this special mobile ad hoc network. In a biosensor network all the security requirements described above can be fulfilled if a key is successfully and securely distributed.

Thank u Questions?