You are on page 1of 7

UNIVERSITY INSTITUTE OF COMPUTING

An Overview
Bachelor of Computer Applications
Seminar Presentation

of Computing
<21CAN-156>
<SECURITY OF WIRELESS SESOR NETWORKS>

&
Career
Student Name: SALONI RANA
UID: 21BCA1925 Supervisor Name: Miss. Surbhi Tyagi
Section/Group: 6/B

Seminar Presentation
Planning DISCOVER . LEARN . EMPOWER
1
ABSTRACT

• Wireless sensor networks(WSNs) have been a dominant topic from the recent years.
• Wireless sensor networks applications are massive.
• They have been used in various applications.
• They are threatened by numerous attacks.
• Therefore, security is of main significance and certain methods are there to
encounter these attacks.

2
INTRODUCTION
• A wireless sensor networks(WSNs) is a group of low cost, low multifunctional
and small size wireless nodes.
• WSNs is formed by combining autonomous devices or nodes with routers and
gateway that communicate wirelessly to a central gateway.
• These provides a connection to the weird world for collecting, processing and
doing other tasks.
• The sensors are commonly used to monitor physical and environmental
conditions.
• Development of WSN was originally motivated by military application such as
battlefield surveillance.
• Used in many industrial and civilian application areas.
• The applicability of wireless sensor networks in improving and assisting disaster
management operations.
• It is a fast growing technology however much written about WSN is still theory
it lacks practical guide.
• Sensor networks can be applied to a large number of areas, and its applications
are continuously growing.
• Sensor networks are extremely vulnerable against any type of internal or
external attacks, due to resource constraints and many more.
MOTIVATION
• As the field of wireless sensor networks (WSN) is based on numerous
security in wireless sensor networks is a field of research that is growing
rapidly and achieving tangible results applicable to real-life scenarios.
• More improvements in fields such as public-key cryptography and intrusion
detection systems.
• It is necessary to develop secure routing algorithms such as connectivity,
coverage, and fault tolerance.
• Also, secure data aggregation algorithms should be more optimal, and the
privacy of the information flow.
• Other open areas of research include tolerating the lack of physical security
and optimizing the security infrastructures.
RESEARCH CONTEXT
• When explaining a concept or idea to someone in person, it can be quite tricky
to keep it to the point. We easily trail off, elaborating on minor details and trying
to illustrate connections between different aspects of the concept. We try to draw
a broader picture in which we can then easily place our idea, hoping to make it
more clear and easy to follow. On the Web, you don’t want to go on and on to
make your point. You want to be precise and make sure that people get your idea
within seconds.
• Visual context can underpin your messages quite effectively if used wisely.
Visuals can easily evoke memories and trigger emotions. If you focus them on
your message and for example on what you want your visitors to do, visuals will
help you by guiding and focusing your visitors’ thoughts.
THANK YOU

You might also like