SlideShare a Scribd company logo
1 of 18
Wireless Sensor Network & Security
Presented by-
G. Sasikumar
Assistant Professor
WSN combines sensing, computation,
and communication into single tiny
device called sensor node.
Group of sensors linked by wireless
media to perform distributed sensing
task
Sensor is a device, which senses
information and passes it to the mote.
Figure : Wireless sensor network device
Figure : Progression of sensor technology
(motes) over time
Unstructured WSN Structured WSN
Dense collection of nodes Few distributed nodes
Ad-hoc deployment Pre-planned deployment
Difficult in network
maintenance
Lower network
maintenance
A Power unit (Battery)
Computational logic & Storage
Sensor Transducer Communication
ComponentsofSensorNode
1. HARDWARE
Figure : The architecture of a sensor node.
Operating System Microcode
Sensor Drivers
Communication Processors
Communication Drivers
Data Processing Mini-Apps
Sensor Node
* Processor: 4Mhz
* Memory: 128KB Flash & 4KB RAM
* Radio: 916Mhz and 40Kbits/second.
* Transmission Range: 100 Feet
T i ny O S
* Operating System(small)
* Open Source
* Energy Efficient
Available Wireless Technologies
Standard Data Rate Range Power
Consumption
ZigBee
(802.15.4)
20 kbps to
250 kbps
Up to 10 m Ultralow
Bluetooth
(802.15.1)
Up to 3 mbps 1m to 100 m low
Wi-Fi
(802.11)
54 mbps 45 m to 90 Medium
m
 WSNs are becoming a cost effective,
practical way to go about deploying
sensor networks.
 Protecting confidentiality, integrity
and availability of communications.
 Large range of applications from
civilian to military purposes.
Attacks
1) Sybil Attack
* Introduced by “Brain Zill” in 2002
* Subverted by Foreign identities in
peer-to peer Network
2) Traffic Analysis
* Intercepting & Examine messages to
deduce info. from patterns in
Communications.
* Able to detect Encrypted messages but
* Not able to Decrypt it.
SMACS
Self organizing medium access
control for sensor networks.
Encryption
Encoding info. in such a way that
hackers can’t read it, but authorized one
can.
Cryptography & Steganography
Techniques for Secure
Communication in presence of Third
parties.
 Home and Office Applications
 Environmental Applications
 Medical & Health Applications
 Military Applications
 Implementation cost is cheaper
than wired network
Ideal for non-reachable places
 It avoids hell lot of wiring
 It can accommodate new
devices at any time
 Less secure because hacker's laptop
can act as Access Point.
 Lower speed as compare to
wired networks.
 Affected by surrounding. E.g.: walls
(blocking), microwave oven , far distance
Wsn

More Related Content

What's hot

Thesis on Wireless Networks
Thesis on Wireless NetworksThesis on Wireless Networks
Thesis on Wireless NetworksPhdtopiccom
 
Wireless Security Thesis Topics
Wireless Security Thesis TopicsWireless Security Thesis Topics
Wireless Security Thesis TopicsPhdtopiccom
 
Wireless Projects for Master Thesis Students
Wireless Projects for Master Thesis StudentsWireless Projects for Master Thesis Students
Wireless Projects for Master Thesis StudentsPhdtopiccom
 
Networking Thesis Topics for Computer Science
Networking Thesis Topics for Computer ScienceNetworking Thesis Topics for Computer Science
Networking Thesis Topics for Computer SciencePhdtopiccom
 
ISI Journals Paper Publication Guidance
ISI Journals Paper Publication GuidanceISI Journals Paper Publication Guidance
ISI Journals Paper Publication GuidancePhdtopiccom
 
Network Simulator Master Thesis in Ethiopia
Network Simulator Master Thesis in EthiopiaNetwork Simulator Master Thesis in Ethiopia
Network Simulator Master Thesis in EthiopiaPhdtopiccom
 
Mobile Networking Projects
Mobile Networking ProjectsMobile Networking Projects
Mobile Networking ProjectsPhdtopiccom
 
Communication System Projects and Dynamic Fields
Communication System Projects and Dynamic FieldsCommunication System Projects and Dynamic Fields
Communication System Projects and Dynamic FieldsPhdtopiccom
 
Thesis Topic on Networking
Thesis Topic on NetworkingThesis Topic on Networking
Thesis Topic on NetworkingPhdtopiccom
 
Master-Thesis-Wireless-Network-Projects
Master-Thesis-Wireless-Network-ProjectsMaster-Thesis-Wireless-Network-Projects
Master-Thesis-Wireless-Network-ProjectsPhdtopiccom
 
Networking Topics for Projects
Networking Topics for ProjectsNetworking Topics for Projects
Networking Topics for ProjectsPhdtopiccom
 
Wireless intelligent network
Wireless intelligent networkWireless intelligent network
Wireless intelligent networksuryakant singh
 
Design of a wsn platform for long term environmental monitoring for iot appli...
Design of a wsn platform for long term environmental monitoring for iot appli...Design of a wsn platform for long term environmental monitoring for iot appli...
Design of a wsn platform for long term environmental monitoring for iot appli...Ecwayt
 
Design of a wsn platform for long term environmental monitoring for iot appli...
Design of a wsn platform for long term environmental monitoring for iot appli...Design of a wsn platform for long term environmental monitoring for iot appli...
Design of a wsn platform for long term environmental monitoring for iot appli...Ecwaytech
 
Project Topics on Network Security
Project Topics on Network SecurityProject Topics on Network Security
Project Topics on Network SecurityPhdtopiccom
 
Wireless Network Thesis in NS2
Wireless Network Thesis in NS2Wireless Network Thesis in NS2
Wireless Network Thesis in NS2Phdtopiccom
 
introduction to wireless sensor network
introduction to wireless sensor networkintroduction to wireless sensor network
introduction to wireless sensor networkhcls
 
Buy Phd Paper Writing Service
Buy Phd Paper Writing ServiceBuy Phd Paper Writing Service
Buy Phd Paper Writing ServicePhdtopiccom
 
Research Topics in Networking for PhD
Research Topics in Networking for PhDResearch Topics in Networking for PhD
Research Topics in Networking for PhDPhdtopiccom
 

What's hot (20)

Thesis on Wireless Networks
Thesis on Wireless NetworksThesis on Wireless Networks
Thesis on Wireless Networks
 
Wireless Security Thesis Topics
Wireless Security Thesis TopicsWireless Security Thesis Topics
Wireless Security Thesis Topics
 
Wireless Projects for Master Thesis Students
Wireless Projects for Master Thesis StudentsWireless Projects for Master Thesis Students
Wireless Projects for Master Thesis Students
 
Networking Thesis Topics for Computer Science
Networking Thesis Topics for Computer ScienceNetworking Thesis Topics for Computer Science
Networking Thesis Topics for Computer Science
 
ISI Journals Paper Publication Guidance
ISI Journals Paper Publication GuidanceISI Journals Paper Publication Guidance
ISI Journals Paper Publication Guidance
 
Network Simulator Master Thesis in Ethiopia
Network Simulator Master Thesis in EthiopiaNetwork Simulator Master Thesis in Ethiopia
Network Simulator Master Thesis in Ethiopia
 
Mobile Networking Projects
Mobile Networking ProjectsMobile Networking Projects
Mobile Networking Projects
 
Communication System Projects and Dynamic Fields
Communication System Projects and Dynamic FieldsCommunication System Projects and Dynamic Fields
Communication System Projects and Dynamic Fields
 
Thesis Topic on Networking
Thesis Topic on NetworkingThesis Topic on Networking
Thesis Topic on Networking
 
Master-Thesis-Wireless-Network-Projects
Master-Thesis-Wireless-Network-ProjectsMaster-Thesis-Wireless-Network-Projects
Master-Thesis-Wireless-Network-Projects
 
Networking Topics for Projects
Networking Topics for ProjectsNetworking Topics for Projects
Networking Topics for Projects
 
Wireless intelligent network
Wireless intelligent networkWireless intelligent network
Wireless intelligent network
 
Design of a wsn platform for long term environmental monitoring for iot appli...
Design of a wsn platform for long term environmental monitoring for iot appli...Design of a wsn platform for long term environmental monitoring for iot appli...
Design of a wsn platform for long term environmental monitoring for iot appli...
 
Design of a wsn platform for long term environmental monitoring for iot appli...
Design of a wsn platform for long term environmental monitoring for iot appli...Design of a wsn platform for long term environmental monitoring for iot appli...
Design of a wsn platform for long term environmental monitoring for iot appli...
 
Project Topics on Network Security
Project Topics on Network SecurityProject Topics on Network Security
Project Topics on Network Security
 
Wireless Network Thesis in NS2
Wireless Network Thesis in NS2Wireless Network Thesis in NS2
Wireless Network Thesis in NS2
 
introduction to wireless sensor network
introduction to wireless sensor networkintroduction to wireless sensor network
introduction to wireless sensor network
 
Buy Phd Paper Writing Service
Buy Phd Paper Writing ServiceBuy Phd Paper Writing Service
Buy Phd Paper Writing Service
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Research Topics in Networking for PhD
Research Topics in Networking for PhDResearch Topics in Networking for PhD
Research Topics in Networking for PhD
 

Similar to Wsn

WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksScott Faria
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks securityelango30
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architectureijsrd.com
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Easy n Inspire L
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyClayton Hatathlie
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Networkgaurav kumar
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksImran Khan
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 

Similar to Wsn (20)

WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
 
Paper1
Paper1Paper1
Paper1
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Security in Wireless Sensor Network
Security in Wireless Sensor NetworkSecurity in Wireless Sensor Network
Security in Wireless Sensor Network
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
S04404116120
S04404116120S04404116120
S04404116120
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 

Recently uploaded (20)

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 

Wsn

  • 1. Wireless Sensor Network & Security Presented by- G. Sasikumar Assistant Professor
  • 2. WSN combines sensing, computation, and communication into single tiny device called sensor node. Group of sensors linked by wireless media to perform distributed sensing task
  • 3. Sensor is a device, which senses information and passes it to the mote. Figure : Wireless sensor network device
  • 4. Figure : Progression of sensor technology (motes) over time
  • 5.
  • 6. Unstructured WSN Structured WSN Dense collection of nodes Few distributed nodes Ad-hoc deployment Pre-planned deployment Difficult in network maintenance Lower network maintenance
  • 7. A Power unit (Battery) Computational logic & Storage Sensor Transducer Communication ComponentsofSensorNode 1. HARDWARE
  • 8. Figure : The architecture of a sensor node.
  • 9. Operating System Microcode Sensor Drivers Communication Processors Communication Drivers Data Processing Mini-Apps
  • 10. Sensor Node * Processor: 4Mhz * Memory: 128KB Flash & 4KB RAM * Radio: 916Mhz and 40Kbits/second. * Transmission Range: 100 Feet T i ny O S * Operating System(small) * Open Source * Energy Efficient
  • 11. Available Wireless Technologies Standard Data Rate Range Power Consumption ZigBee (802.15.4) 20 kbps to 250 kbps Up to 10 m Ultralow Bluetooth (802.15.1) Up to 3 mbps 1m to 100 m low Wi-Fi (802.11) 54 mbps 45 m to 90 Medium m
  • 12.  WSNs are becoming a cost effective, practical way to go about deploying sensor networks.  Protecting confidentiality, integrity and availability of communications.  Large range of applications from civilian to military purposes.
  • 13. Attacks 1) Sybil Attack * Introduced by “Brain Zill” in 2002 * Subverted by Foreign identities in peer-to peer Network 2) Traffic Analysis * Intercepting & Examine messages to deduce info. from patterns in Communications. * Able to detect Encrypted messages but * Not able to Decrypt it.
  • 14. SMACS Self organizing medium access control for sensor networks. Encryption Encoding info. in such a way that hackers can’t read it, but authorized one can. Cryptography & Steganography Techniques for Secure Communication in presence of Third parties.
  • 15.  Home and Office Applications  Environmental Applications  Medical & Health Applications  Military Applications
  • 16.  Implementation cost is cheaper than wired network Ideal for non-reachable places  It avoids hell lot of wiring  It can accommodate new devices at any time
  • 17.  Less secure because hacker's laptop can act as Access Point.  Lower speed as compare to wired networks.  Affected by surrounding. E.g.: walls (blocking), microwave oven , far distance