Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Web-based Console for Controlling a Wireless Sensor network Team A: Thang Nguyen – Duc Duong Course CSCI 5234: Web Security Instructor: Dr. T. Andrew.

Similar presentations


Presentation on theme: "A Web-based Console for Controlling a Wireless Sensor network Team A: Thang Nguyen – Duc Duong Course CSCI 5234: Web Security Instructor: Dr. T. Andrew."— Presentation transcript:

1 A Web-based Console for Controlling a Wireless Sensor network Team A: Thang Nguyen – Duc Duong Course CSCI 5234: Web Security Instructor: Dr. T. Andrew Yang

2 Table of Contents Introduction to Wireless Sensor Network Architecture of WeConWSN Application Application Overview  Login  Registration  Search  Configure: Update and Delete Potential vulnerability of the application Questions and Answers

3 Introduction to Wireless Sensor Network A wireless sensor network (WSN) is a computer network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. Each node in a sensor network is typically equipped with a radio transceiver or other wireless communications device, a small microcontroller, and an energy source, usually a battery. The properties of a sensor node usually consist of Node_ID, Name, Type, Status, Location, Range, and Route.

4 Architecture of the WeConWSN Application The overall architecture of the WeConWSN Application is three tiers, which are:  Client: Client is a web browser to access web application to configure the network.  Web Application: Web Application resides on web server. It processes the request of clients and updates the result of the request on database server if needed.  Database Server: Store information about the network.

5 Overview of WeConWSN Application

6 Login process

7 Registration process

8 Search process

9 Configure process

10 UML Diagram

11 Potential vulnerability of the application To login, the web browser forward username and password in clear text to the Web server. The passwords are exposed to eavesdropping and corresponding sniffing attacks. The username and password transferred between Web server and Database server are also exposed to eavesdropping and corresponding sniffing attacks. Besides, there is some other vulnerability such as Trojan, URL attack, DDoS, and attacks from many kind of viruses.

12 Questions and Answers Thank you !


Download ppt "A Web-based Console for Controlling a Wireless Sensor network Team A: Thang Nguyen – Duc Duong Course CSCI 5234: Web Security Instructor: Dr. T. Andrew."

Similar presentations


Ads by Google