0
<ul><li>Wireless Sensor Networks </li></ul>
By.  P. Victer Paul   Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends lik...
A  sensor  is a electronic device that measures a physical quantity and converts it into a signal which can be read by an ...
 
<ul><li>A  wireless sensor network  (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor ph...
<ul><li>Flexible. </li></ul><ul><li>Implementation cost is cheaper than wired network. </li></ul><ul><li>Ideal for the non...
<ul><li>Lower speed compared to wired network. (of course!) </li></ul><ul><li>Less secure because hacker's laptop can act ...
<ul><li>Limited Energy,  </li></ul><ul><li>Limited Memory,  </li></ul><ul><li>Limited Computing Power,  </li></ul><ul><li>...
<ul><li>Node Deployment </li></ul><ul><li>Node Capabilities </li></ul><ul><li>Network Topology </li></ul><ul><li>Scalabili...
<ul><li>Node Deployment:  affects the performance of the routing protocol.  </li></ul><ul><li>Node Capabilities:  relaying...
<ul><li>Scalability : Sensor network routing protocols should be scalable enough to respond to events in the environment. ...
<ul><li>Data Aggregation:  duplicate suppression, minima, maxima, and average.  </li></ul><ul><li>QoS (quality of services...
 
<ul><li>Microcontroller performs tasks, processes data and controls the functionality of other components in the sensor no...
<ul><li>Sensor nodes make use of ISM band which gives free radio, spectrum allocation and global availability. </li></ul><...
<ul><li>Flash memories are used due to its cost and storage capacity. </li></ul><ul><li>  Two categories of memory based o...
<ul><li>For the Sensing, Communication and Data Processing.  </li></ul><ul><li>Dynamic Power Management (DPM) and Dynamic ...
<ul><li>Spoofed, altered, or replayed routing information. </li></ul><ul><li>Selective forwarding </li></ul><ul><li>Sinkho...
<ul><li>Spoofed, altered, or replayed routing information:  </li></ul><ul><li>Affects: routing loops, attract or repel net...
<ul><li>The Sybil attack:  In a Sybil attack, a single node presents multiple identities to other nodes in the network.  <...
<ul><li>Homeland security </li></ul><ul><li>Multisensory Data Fusion </li></ul><ul><li>Nondestructive Evaluation and Remot...
<ul><li>  Standards and specifications </li></ul><ul><li>  </li></ul><ul><li>Hardware </li></ul><ul><li>Software </li></ul...
<ul><li>ISA100 ( industrial control applications). </li></ul><ul><li>Wireless HART  (designed for Industrial applications ...
<ul><li>The main challenge is to produce  low cost  and  tiny  sensor nodes. With respect to these objectives, current sen...
<ul><li>TOSSIM,  </li></ul><ul><li>  </li></ul><ul><li>J-Sim  </li></ul><ul><li>Atarraya .  </li></ul><ul><li>An extensive...
<ul><li>Tanq </li></ul>
Upcoming SlideShare
Loading in...5
×

Wireless Sensor Networks

3,400

Published on

A detailed presentation about Wireless Sensor Networks

Published in: Technology, Business
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,400
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
514
Comments
0
Likes
5
Embeds 0
No embeds

No notes for slide

Transcript of "Wireless Sensor Networks"

  1. 1. <ul><li>Wireless Sensor Networks </li></ul>
  2. 2. By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like u.. To get to know about more free computerscience ebooks and technology advancements in computer science. Please visit.... http://free-computerscience-ebooks.blogspot.com/ http://recent-computer-technology.blogspot.com/ http://computertechnologiesebooks.blogspot.com/ Please to keep provide many eBooks and technology news for FREE. Encourage us by Clicking on the advertisement in these Blog.
  3. 3. A  sensor  is a electronic device that measures a physical quantity and converts it into a signal which can be read by an observer or by an instrument.
  4. 5. <ul><li>A  wireless sensor network  (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, </li></ul><ul><li>such as  temperature, sound, vibration, pressure, motion or pollutants. </li></ul>
  5. 6. <ul><li>Flexible. </li></ul><ul><li>Implementation cost is cheaper than wired network. </li></ul><ul><li>Ideal for the non-reachable places such as across river, or mountain or boarder areas. </li></ul><ul><li>Ideal for temporary network setups.  </li></ul>
  6. 7. <ul><li>Lower speed compared to wired network. (of course!) </li></ul><ul><li>Less secure because hacker's laptop can act as Access Point. </li></ul><ul><li>More complex to configure than wired network. </li></ul><ul><li>Affected by surrounding. E.g: walls (blocking), microwave oven (interference), far distance (attenuation) </li></ul>
  7. 8. <ul><li>Limited Energy, </li></ul><ul><li>Limited Memory, </li></ul><ul><li>Limited Computing Power, </li></ul><ul><li>Limited Communication Bandwidth, </li></ul><ul><li>Limited Communication Range </li></ul>
  8. 9. <ul><li>Node Deployment </li></ul><ul><li>Node Capabilities </li></ul><ul><li>Network Topology </li></ul><ul><li>Scalability </li></ul><ul><li>Energy Consumption </li></ul><ul><li>Data Delivery Model </li></ul><ul><li>Data Aggregation </li></ul><ul><li>QoS </li></ul>
  9. 10. <ul><li>Node Deployment: affects the performance of the routing protocol. </li></ul><ul><li>Node Capabilities: relaying, sensing and aggregation </li></ul><ul><li>Network Topology : affects latency, robustness, and capacity. </li></ul>
  10. 11. <ul><li>Scalability : Sensor network routing protocols should be scalable enough to respond to events in the environment. </li></ul><ul><li>Energy Consumption: computations and transmitting </li></ul><ul><li>Data Delivery Model: continuous, event-driven, query-driven, periodic, or a hybrid. </li></ul>
  11. 12. <ul><li>Data Aggregation: duplicate suppression, minima, maxima, and average. </li></ul><ul><li>QoS (quality of services): should support the life time, the data reliable, and location-awareness. </li></ul>
  12. 14. <ul><li>Microcontroller performs tasks, processes data and controls the functionality of other components in the sensor node. </li></ul><ul><li>A microcontroller is often the best choice for  embedded systems because of its flexibility to connect to other devices, ease of programming, and low power consumption. </li></ul>
  13. 15. <ul><li>Sensor nodes make use of ISM band which gives free radio, spectrum allocation and global availability. </li></ul><ul><li>The function both of transmitter and receiver are combined into a single device know as transceivers are used in sensor nodes </li></ul>
  14. 16. <ul><li>Flash memories are used due to its cost and storage capacity. </li></ul><ul><li>  Two categories of memory based on the purpose of storage </li></ul><ul><ul><li>a) User memory used for storing application related or personal data. </li></ul></ul><ul><ul><li>b) Program memory used for programming the device. </li></ul></ul>
  15. 17. <ul><li>For the Sensing, Communication and Data Processing. </li></ul><ul><li>Dynamic Power Management (DPM) and Dynamic Voltage Scaling (DVS) </li></ul>
  16. 18. <ul><li>Spoofed, altered, or replayed routing information. </li></ul><ul><li>Selective forwarding </li></ul><ul><li>Sinkhole attack </li></ul><ul><li>The Sybil attack </li></ul><ul><li>Wormhole attack </li></ul><ul><li>HELLO flood attack </li></ul>
  17. 19. <ul><li>Spoofed, altered, or replayed routing information: </li></ul><ul><li>Affects: routing loops, attract or repel network traffic, extend or shorten source routes, generate false error messages, partition the network, increase end-to-end latency, etc. </li></ul><ul><li>Selective forwarding: In a selective forwarding attack, malicious nodes may refuse to forward certain messages and simply drop them, ensuring that they are not propagated any further. </li></ul><ul><li>Sinkhole attacks: Sinkhole attacks can enable many other attacks(e.g. selective forwarding). </li></ul>
  18. 20. <ul><li>The Sybil attack: In a Sybil attack, a single node presents multiple identities to other nodes in the network. </li></ul><ul><li>Wormhole attack: Wormhole attacks commonly involve two distant malicious nodes colluding to understate their distance from each other by relaying packets along an out-of-bound channel available only to the attacker. </li></ul><ul><li>HELLO flood attack: Laptop-class attacker broadcasting routing or other information with large enough transmission power could convince every node in the network that the adversary is its neighbor. </li></ul>
  19. 21. <ul><li>Homeland security </li></ul><ul><li>Multisensory Data Fusion </li></ul><ul><li>Nondestructive Evaluation and Remote Sensing </li></ul><ul><li>Integrated System Health Management (ISHM) </li></ul><ul><li>Commercial Development </li></ul><ul><li>Agriculture </li></ul><ul><li>Mines </li></ul><ul><li>Industrial </li></ul>
  20. 22. <ul><li>  Standards and specifications </li></ul><ul><li>  </li></ul><ul><li>Hardware </li></ul><ul><li>Software </li></ul><ul><li>Simulators </li></ul>
  21. 23. <ul><li>ISA100 ( industrial control applications). </li></ul><ul><li>Wireless HART  (designed for Industrial applications like Process Monitoring and Control). </li></ul><ul><li>IETF RPL( Routing Protocol for Low power and Lossy Networks). </li></ul><ul><li>IETF 6LoWPAN </li></ul><ul><li>IEC 62591( industrial communication networks) </li></ul><ul><li>ZigBee  networking specification for transmission of packets over IEEE 802.15.4 is intended for uses such as embedded sensing, medical data collection, consumer devices like television remote controls, and home automation. </li></ul><ul><li>EnOcean is the originator of patented energy-harvesting wireless sensor technology. </li></ul>
  22. 24. <ul><li>The main challenge is to produce  low cost  and  tiny  sensor nodes. With respect to these objectives, current sensor nodes are mainly prototypes. Miniaturization and low cost are understood to follow from recent and future progress in the fields of  MEMS  and  NEMS . </li></ul>
  23. 25. <ul><li>TOSSIM, </li></ul><ul><li>  </li></ul><ul><li>J-Sim  </li></ul><ul><li>Atarraya . </li></ul><ul><li>An extensive list of simulation tools for Wireless Sensor Networks can be found at the CRUISE WSN Simulation Tool Knowledgebase. </li></ul>
  24. 26. <ul><li>Tanq </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×