32
Submitted to I.Anitha Rani Submitted by Y.Keerthi Reddy(10JM1517), V.Triveni(10JM1A0530), K.T.V.N.Lakshmi(10JM1A 0527). PRIVACY- AND INTEGRITY- PRESERVING RANGE QUERIES IN SENSOR NETWORKS

Privacy and integrity-preserving range queries

Embed Size (px)

DESCRIPTION

In two tiered wireless sensor network Storage is node is being attacked by hacker so we provide solution by using SafeQ protocol

Citation preview

Page 1: Privacy and integrity-preserving range queries

Submitted toI.Anitha Rani

Submitted byY.Keerthi Reddy(10JM1517),

V.Triveni(10JM1A0530),K.T.V.N.Lakshmi(10JM1A0527).

PRIVACY- AND INTEGRITY-PRESERVING RANGE QUERIES

IN SENSOR NETWORKS

Page 2: Privacy and integrity-preserving range queries

ABSTRACT• two-tiered sensor networks• benefits of power and storage saving

for sensors as well as the efficiency of query processing

• Attackers attracted on storage nodes• SafeQ also allows a sink to detect

compromised storage nodes• To preserve integrity and privacy,

SafeQ• propose two schemes—one using

Merkle hash trees and another using a new data structure called neighborhood chains

• To reduce communication cost we use bloom filters

Page 3: Privacy and integrity-preserving range queries

EXISTING SYSTEM

Existing Wireless sensor networks once sensor nodes have been deployed, there will be minimal manual intervention and monitoring. But, when nodes are deployed in a hostile environment and there is no manual monitoring. 

DRAWBACKS

• First, the attacker may obtain sensitive data that has been, or will be, stored in the storage node.

• Second, the compromised storage node may return forged data for a query.

• Third, this storage node may not include all data items that satisfy the query.

Page 4: Privacy and integrity-preserving range queries

PROPOSED SYSTEM

To preserve the privacy and integrity of range queries in sensor networks

uses the bucket-partitioning for database privacy. The basic idea is to divide the domain of data values into

multiple buckets. SafeQ also allows a sink to detect compromised storage nodes

when they misbehave. The sink is the point of contact for users of the sensor

network.

Page 5: Privacy and integrity-preserving range queries

REQUIREMENTS

Software Requirements:•  O S : Windows XP or

more

• Technology :JAVA, Swing

• Database : MS- Access

Hardware Requirements:•  Processor : Pentium IV

• Hard Disk : 40 GB.

• RAM :256 Mb.

Page 6: Privacy and integrity-preserving range queries

MODULES

• SafeQ• Integrity• Privacy• Range Queries• Sink• Storage Node

Page 7: Privacy and integrity-preserving range queries

SAFEQ

• SafeQ is a protocol that prevents attackers from gaining information from both sensor collected data and sink issued queries.

• SafeQ also allows a sink to detect compromised storage nodes when they misbehave.

• To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their values.

Page 8: Privacy and integrity-preserving range queries

INTEGRITY

The sink needs to detect whether a query result from a storage node includes forged data items or does not include all the data that satisfy the query.

There are two key challenges in solving the privacyand integrity-preserving range query problem.

First, a storage node needs to correctly process encoded queries over encoded data without knowing their actual values.

Second, a sink needs to verify that the result of a query contains all the data items that satisfy the query and does not contain any forged data.

Page 9: Privacy and integrity-preserving range queries

PRIVACY

To preserve privacy, SafeQ uses a novel technique to encode both data and queries such that a storage node can correctly process encoded queries over encoded data without knowing their actual values.

A compromised storage node cannot gain information from sensor collected data and sink issued queries

A storage node can perform query processing

Page 10: Privacy and integrity-preserving range queries

RANGE QURIES

The queries from the sink are range queries. A range query “is a common database operation finding all the data items collected at time-slot in the range”.

Note that the queries in most sensor network applications can be easily modelled as range queries.

Page 11: Privacy and integrity-preserving range queries

SINK

The sink is the point of contact for users of the sensor network.

Each time the sink receives a question from a user, it first translates the question into multiple queries and then disseminates the queries to the corresponding storage nodes

The sink unifies the query results from multiple storage nodes into the final answer and sends it back to the user. 

Sink can detect compromised storage nodes when they misbehave.

Page 12: Privacy and integrity-preserving range queries

STORAGE NODE

Storage nodes are powerful wireless devices that are equipped with much more storage capacity and computing power than sensors.

The storage node collects all data from the sensor nodes. The storage node can’t view the actual value of sensor node

data. If the storage node trying to view the sensor node data, sink

detect misbehave of storage node.

Page 13: Privacy and integrity-preserving range queries

SYSTEM DESIGN

UML DIAGRAMS

Page 14: Privacy and integrity-preserving range queries

DATAFLOW DIAGRAM

Page 15: Privacy and integrity-preserving range queries

DATAFLOW DIAGRAM

SINK

View Available File

View Misbehavior Details

End Process

View File Details

Sink

Send File Request

Receive File

Page 16: Privacy and integrity-preserving range queries

USECASE DIAGRAM

Send File

Storage node

Sink

View File Name

View File Datails

View File Details

Send Query Request

Response To Request

Sensor

View File Name

Receive File

View Misbehavior Details

Page 17: Privacy and integrity-preserving range queries

CLASS DIAGRAM

Sensor Node

Send File

Sensor node process()

Sink

View File NameView File DetailsView Misbehavaior DetailsReceive File

Sink Process()

Storage Node

Receive FileView File NameView File Details

Storage node process()

s

Page 18: Privacy and integrity-preserving range queries

SEQUENCE DIAGRAM

Click icon to add pictureSENSOR NODE

SINK

DATA BASE

STORAGE NODE

SEND FILE

View File Details

ViewMisbehavior Details

View Available File

Send Query Request

Receive File

Page 19: Privacy and integrity-preserving range queries

ACTIVITY DIAGRAM

Click icon to add picture

Send Files

View Files

Receive Files

Sink

Start

End Process

View File Details

Sensor Node

Storage Node

Receive Files

View File Names

View File Details

Response to Sink Request

View Misbehavior Details

Send Query Request

Page 20: Privacy and integrity-preserving range queries

SCREEN SHOTS

Page 21: Privacy and integrity-preserving range queries

Sensor node sends file

Page 22: Privacy and integrity-preserving range queries

Negative acknowledgement

Page 23: Privacy and integrity-preserving range queries

False Positive

Page 24: Privacy and integrity-preserving range queries

File stores in Storage Node

Page 25: Privacy and integrity-preserving range queries

Sink

Page 26: Privacy and integrity-preserving range queries

View File Details

Page 27: Privacy and integrity-preserving range queries

Receive File

Page 28: Privacy and integrity-preserving range queries

Authentication to View

Page 29: Privacy and integrity-preserving range queries

Authentication Valid

Page 30: Privacy and integrity-preserving range queries

Authentication Invalid

Page 31: Privacy and integrity-preserving range queries

CONCLUSION

We make three key contributions in this paper.SafeQ significantly strengthens the security of two-tiered

sensor networks.We used Merkle Hash trees and neighbourhood chain to

preserve integritywe propose an optimization technique using Bloom filters to

significantly reduce the communication cost between sensors and storage nodes.

we propose a solution to adapt SafeQ for event-driven sensor networks.

Page 32: Privacy and integrity-preserving range queries

Any Queries????????