You are on page 1of 22

Privacy- and Integrity-Preserving Range Queries In Sensor Networks

BY B.C.SANGEETHA R.No-160609737031

SCETW

B.E-IV/IV-2nd Sem

TABLE CONTENTS
1.Abstract 2.Introduction
Existing system Proposed system Modules

3.System Requirements
Software Requirements Hardware Requirements

SCETW

B.E-IV/IV-2nd Sem

TABLE CONTENTS
4.Design Process
Process flow for Privacy- and Integrity-Preserving Range Queries In Sensor Networks UML diagrams for Privacy- and IntegrityPreserving Range Queries In Sensor Networks

5.Screen shots 6.Conclusion 7.Bibilography


SCETW B.E-IV/IV-2nd Sem 3

Abstract
In wireless sensor security is the main concern to identify the range queries we are trying to implement privacy and integrity of the range queries. To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values.
SCETW B.E-IV/IV-2nd Sem 4

Introduction
Here, storage nodes gather data from nearby sensors(nodes) Serve as an intermediate node between Sensors and sink and answer queries from the sink of the network.

SCETW

B.E-IV/IV-2nd Sem

Storage nodes has the 3 main advantages to sensor networks : Save power Memory-limited More efficient Definitions: Sensor node: It may contain data and files Storage Area: Where the files are stored. Sink: Its a functionality. Checks the IP and batch code.
SCETW B.E-IV/IV-2nd Sem 6

Existing system
There will be minimal manual intervention and monitoring. There is no manual monitoring.

SCETW

B.E-IV/IV-2nd Sem

Proposed system
To preserve the privacy and integrity of range queries in sensor networks it uses the bucket partitioning for database privacy.

SCETW

B.E-IV/IV-2nd Sem

Modules
SafeQ Integrity Privacy Range Queries Sink Storage Node

SCETW

B.E-IV/IV-2nd Sem

System Requirements
Software requirements:Operating System :Windows XP Front End :JAVA(Swings) Database :Microsoft Access Database Connectivity :JDBC. Hardware requirements:Processor - Pentium IV 2.5 GHZ RAM - 512 MB Hard Disk - 80 GB
SCETW B.E-IV/IV-II SEM 10 SCETW B.E-IV/IV-2nd Sem 10

Process Flow
1) The files are sent from Sensor Node1 to Storage Node. 2) The files are sent from sent from Sensor Node2 to Storage Node 3) The files are sent sent from Sensor Node3 to Storage Node 4) File received at Sink 5) Sink views the File name, Batch ID.
SCETW B.E-IV/IV-2nd Sem 11

ER-Diagram for Privacy- and IntegrityPreserving Range Queries In Sensor Networks

SCETW

B.E-IV/IV-2nd Sem

12

Class diagram for Privacy- and IntegrityPreserving Range Queries In Sensor Networks

13

SCETW

B.E-IV/IV-2nd Sem

13

Sequence diagram for Privacy- and IntegrityPreserving Range Queries In Sensor Networks
Sensor node Storage node Sink 2 : Send file() 1 : View avaialable file()

3 : View file details()

4 : View misbehavior details()

5 : Send request() 6 : Receive file() Data base

SCETW

B.E-IV/IV-2nd Sem

14

Use case diagram for Privacy and integrity preserving range queries in Sensor networks
Send file View file name

View File details Sensor View filename

View filedetails

Storage node

View misbehavior details

Send query request Sink

Response to Request

Receive file

SCETW

B.E-IV/IV-2nd Sem

15

Screen Shot for storage node

SCETW

B.E-IV/IV-2nd Sem

16

Screen shot for Sensor node 1

SCETW

B.E-IV/IV-2nd Sem

17

Screen shot for Sensor node 2

SCETW

B.E-IV/IV-2nd Sem

18

Screen shot for Sensor node 3

SCETW

B.E-IV/IV-2nd Sem

19

Conclusion
1)SafeQ:efficient protocol for handling range queries in two-tiered sensor networks in a privacy- and integrity- preserving. 2)Bucket partioning: To preserve privacy and range queries in sensor networks. 2)Optimization technique : Using Bloom filters to significantly reduce the communication cost between sensors and storage nodes.
SCETW B.E-IV/IV-2nd Sem 20

References
[1] F. Chen and A. X. Liu, SafeQ: Secure and efficient query processing in sensor networks, in Proc. IEEE INFOCOM, 2010, pp. 19. [2] S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu, Data-centric storage in sensornets with GHT, a geographic hash table, Mobile Netw. Appl., vol. 8, no. 4, pp. 427442, 2003. [3] P. Desnoyers, D. Ganesan, H. Li, and P. Shenoy, Presto:A predictive storage architecture for sensor networks, in Proc. HotOS, 2005, p. 23. [4] D. Zeinalipour-Yazti, S. Lin, V. Kalogeraki, D. Gunopulos, and W. A. Najjar, Microhash: An efficient index structure for flash-based sensor devices, in Proc. FAST, 2005, pp. 3144.

SCETW

B.E IV/IV 2nd Sem

21

QUESTIONS????

SCETW

B.E-IV/IV-II SEM

22

You might also like