SlideShare a Scribd company logo
MATRUSRI ENGINEERING COLLEGE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
SUBJECT NAME: WIRELESS SENSOR NETWORKS(PE 831 EC)
FACULTY NAME: Mrs. P.SRAVANI
MATRUSRI
ENGINEERING COLLEGE
WIRELESS SENSOR NETWORKS(PE 831 EC)
COURSE OBJECTIVES:
 Determine network architecture, node discovery and localization,
deployment strategies, fault tolerant and network security.
 Build foundation for WSN by presenting challenges of wireless networking
at various protocol layers.
 Determine suitable protocols and radio hardware.
 Evaluate the performance of sensor network and identify bottlenecks.
 Evaluate concepts of security in sensor networks.
COURSE OUTCOMES:
 To understand network architecture, node discovery and localization,
deployment strategies, fault tolerant and network security.
 To understand foundation for WSN by presenting challenges of
wireless networking at various protocol layers
 Study suitable protocols and radio hardware.
 To understand the performance of sensor network and identify
bottlenecks.
 To understand concepts of security in sensor networks.
MATRUSRI
ENGINEERING COLLEGE
INTRODUCTION:
Wireless sensor networks (WSNs) have been considered as one of the most
important technologies that are enabled by recent advances in –
Micro-electronic-mechanical-systems(MEMS)
Wireless Communication technologies.
UNIT-I: OVERVIEW OF WIRELESS SENSOR NETWORKS
MATRUSRI
ENGINEERING COLLEGE
OUTCOMES:
To determine the network architecture, node discovery and localization,
deployment strategies, fault tolerant and network security.
To understand the gist of Wireless Sensor Networks.
MATRUSRI
ENGINEERING COLLEGE
Module 1: Challenges for Wireless Sensor Networks
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
Module 2: Characteristics requirements-required mechanisms
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
Module 3: Difference between mobile ad-hoc and sensor
networks
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
Module 4: Applications of sensor networks
MATRUSRI
ENGINEERING COLLEGE
Applications 1
MATRUSRI
ENGINEERING COLLEGE
Applications 2
MATRUSRI
ENGINEERING COLLEGE
Applications 3
MATRUSRI
ENGINEERING COLLEGE
Applications 4
Module 5: Enabling Technologies for
Wireless Sensor Networks
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
Conclusion
MATRUSRI
ENGINEERING COLLEGE
UNIT-II: ARCHITECTURES
INTRODUCTION
 A Wireless Sensor Network is one kind of wireless network includes a
large number of circulating, self-directed, minute, low powered devices
named sensor nodes called motes. These networks certainly cover a huge
number of spatially distributed, little, battery-operated, embedded devices
that are networked to caringly collect, process, and transfer data to the
operators, and it has controlled the capabilities of computing & processing.
Nodes are the tiny computers, which work jointly to form the networks.
 The sensor node is a multi-functional, energy efficient wireless device.
The applications of motes in industrial are widespread. A collection of
sensor nodes collects the data from the surroundings to achieve specific
application objectives. The communication between motes can be done
with each other using transceivers. In a wireless sensor network, the
number of motes can be in the order of hundreds/ even thousands. In
contrast with sensor n/ws, Ad Hoc networks will have fewer nodes without
any structure.
MATRUSRI
ENGINEERING COLLEGE
OUTCOMES:
 Build foundation for WSN by presenting challenges of
wireless networking at various protocol layers.
CONTENTS:
 Single node architecture-hardware components
 Energy consumption of sensor nodes
 Operating system and execution environment
 Network architecture- sensor network scenarios
 Optimization goals and figure of merit
 Gate- way concepts
MATRUSRI
ENGINEERING COLLEGE
Module 1: Single node architecture-hardware components
MATRUSRI
ENGINEERING COLLEGE
Module 2: Hardware Components
 Power supply
 Microcontrollers vs Microprocessors, FPGAs and ASIC
 Memory
 Communication devices
 Sensors & Actuators
- Passive omni directional sensors
- Passive narrow- beam sensors
- Active sensors
- Actuators
MATRUSRI
ENGINEERING COLLEGE
Transceiver (Front end)
MATRUSRI
ENGINEERING COLLEGE
Power supply of sensor nodes:
Storing energy: Batteries
-Traditional batteries
- Capacity
- capacity under load
- self discharge
- Efficient recharging
- Relaxation
- Unconventional energy Sources
- DC-DC
- Energy Scavenging
- Photovolatic,Temparature gradients,
Vibrations, Pressure variations, flow and air/liquid
MATRUSRI
ENGINEERING COLLEGE
MEMS device for converting vibrations to electrical energy
(Based on a variable Capacitor)
MATRUSRI
ENGINEERING COLLEGE
Module 3: Energy consumption of sensor nodes
As the previous section has shown, energy supply for a
sensor node is at a premium: batteries have small capacity, and
recharging by energy scavenging is complicated and volatile. Hence,
the energy consumption of a sensor node must be tightly controlled.
The main consumers of energy are the controller, the radio front ends,
to some degree the memory, and depending on the type the sensors.
One important contribution to reduce power consumption of
these components comes from chip-level and lower technologies:
Designing low-power chips is the best starting point for an energy-
efficient sensor node. But this is only one half of the picture, as any
advantages gained by such designs can easily be squandered when
the components are improperly operated.
MATRUSRI
ENGINEERING COLLEGE
Energy consumption of sensor nodes:
(Energy savings and overhead of sleeping nodes)
MATRUSRI
ENGINEERING COLLEGE
 Microcontroller energy consumption
 Memory (Intel Strong ARM SA-1100)
 Radio transceivers
 Power consumption of sensor and actuators
MATRUSRI
ENGINEERING COLLEGE
Module 4:Operating systems and Execution Environments
1. Embedded operating systems: The traditional tasks of an operating
system are controlling and protecting the access to resources (including
support for input/output) and managing their allocation to different users as
well as the support for concurrent execution of several processes and
communication between these processes.
2.Programming paradigms and
application programming
interfaces (concurrent
programming):
- Process-based concurrency
- Event- based programming
- Interfaces to the operating
systems
MATRUSRI
ENGINEERING COLLEGE
Event based programming model
MATRUSRI
ENGINEERING COLLEGE
Timer component using Interfaces
MATRUSRI
ENGINEERING COLLEGE
Module 5: NETWORK ARCHITECTURE-Sensor network scenarios
Types of Sources and sinks:
-Single hop versus Multi hop
Three types of sinks in a very simple single-hop sensor network
MATRUSRI
ENGINEERING COLLEGE
Multi-hop network
MATRUSRI
ENGINEERING COLLEGE
Multiple sources and/or multiple sinks
MATRUSRI
ENGINEERING COLLEGE
Three types of mobility
 Node mobility
 Sink mobility
 Event mobility
A mobile sinks moves through a mobile sensor network as a information
being retrieves on its behalf
MATRUSRI
ENGINEERING COLLEGE
Module 6: Optimization goals and figure of merit
1. Quality of service
- Event detection/reporting probability
- Event classification error
- Event detection delay
- Missing reports
- Approximation accuracy
- Tracking accuracy
2. Energy efficiency
- Energy/correctly received
- Energy/reported event
- Delay
- N/w Life time
3. Scalability
4. Robustness
For all these scenarios and application types, different forms of networking
solutions can be found. The challenging question is how to optimize a network, how to
compare these solutions, how to decide which approach better supports a given
application, and how to turn relatively imprecise optimizing goals into measurable
figures of merit? While a general answer appears impossible considering the large
variety of possible applications, a few aspects are fairly evident.
MATRUSRI
ENGINEERING COLLEGE
Area of sensor nodes detecting an event-an elephant-that moves through
the network along with the event source
MATRUSRI
ENGINEERING COLLEGE
Module 7: Gateway Concepts
 The need for gate ways
 WSN to Internet Communication
 Internet to WSN communication
 WSN tunneling
MATRUSRI
ENGINEERING COLLEGE
1. Need for Gate ways
For practical deployment, a sensor network only concerned with itself is
insufficient. The network rather has to be able to interact with other information devices,
for example, a user equipped with a PDA moving in the coverage area of the network or
with a remote user, trying to interact with the sensor network via the Internet (the
standard example is to read the temperature sensors in one’s home while traveling and
accessing the Internet via a wireless connection). Figure shows this networking scenario.
MATRUSRI
ENGINEERING COLLEGE
2. WSN to Internet Communication
MATRUSRI
ENGINEERING COLLEGE
3. Internet to WSN communication
MATRUSRI
ENGINEERING COLLEGE
4. WSN tunneling
MATRUSRI
ENGINEERING COLLEGE
CONCLUSION
 Realization of sensor networks needs to satisfy several constraints such as
scalability, cost, hardware, topology change, environment and power
consumption.
 Since these constraints are highly tight and specific for sensor networks,
new wireless ad hoc networking protocols are required.
 To meet the requirements, many researchers are engaged in developing
the technologies needed for different layers of the sensor networks
protocol stack.
MATRUSRI
ENGINEERING COLLEGE
UNIT-III: NETWORKING SENSORS
INTRODUCTION
The physical layer is mostly concerned with modulation and demodulation of
digital data; this task is carried out by so-called transceivers. In sensor
networks, the challenge is to find modulation schemes and transceiver
architectures that are simple, low cost, but still robust enough to provide the
desired service.
1. Wireless channels are therefore an unguided medium, meaning that signal
propagation is not restricted to well-defined locations, as is the case in wired
transmission with proper shielding. For a practical wireless, RF-based
system, the carrier frequency has to be carefully chosen.
2. In the process of modulation, (groups of) symbols from the channel
alphabet are mapped to one of a finite number of waveforms of the same
finite length; this length is called the symbol duration. The mapping from a
received waveform to symbols is called demodulation. Wave propagation
effects and noise results in bit errors.
MATRUSRI
ENGINEERING COLLEGE
OUTCOMES
 To determine the suitable protocols and radio hardware.
CONTENTS:
 Physical layer and Transceiver Design considerations
 MAC protocols for wireless sensors networks
 Low Duty cycle and wakeup concepts
- STEM
- S-MAC
- The mediation device protocol
- wakeup radio protocols
 Address and Name management
 Assignment of MAC Addresses
 Routing Protocols
- Energy efficient Routing
- Geographic Routing
MATRUSRI
ENGINEERING COLLEGE
Module 1: Physical Layer and Transceiver Design
Considerations
The physical layer in wireless networked sensors has to be
designed with sensor networking requirements in mind. In particular
 The Communication device must be containable in a small size, since
the sensor nodes are small. So cheaper, slightly larger antennas may be
acceptable in those cases.
 The Communication devices must be cheap, since the sensors will be
used in large numbers in redundant fashion.
 The radio technology must work with higher layers in the protocol
stack to consume very low power levels.
MATRUSRI
ENGINEERING COLLEGE
Physical layer Evaluation of Technologies:
We consider 3 main classes of physical layer technologies for use in
wireless sensor networks, based on bandwidth considerations:
 Narrowband technologies.
 Spread spectrum technologies
 Ultra-Wideband (UWB) technologies.
MATRUSRI
ENGINEERING COLLEGE
Module 2: MAC protocols for wireless sensors networks
 Medium Access Control (MAC) protocols solve a
seemingly simple task: they coordinate the times where a
number of nodes access a shared communication medium.
 An “un over seeable” number of protocols have emerged
in more than thirty years of research in this area. They differ,
among others, in the types of media they use and in the
performance requirements for which they are optimized.
MATRUSRI
ENGINEERING COLLEGE
Fundamentals of (wireless) MAC protocols:
Requirements and design constraints for wireless MAC protocols:
Throughput, efficiency, stability, fairness, low access delay, low
transmission delay
 Hidden Terminal Problem
 Exposed terminal scenario
MATRUSRI
ENGINEERING COLLEGE
Important classes of MAC protocols
Fixed assignment protocols
-TDMA, FDMA, CDMA, and SDMA.
Demand assignment protocols
- HIPERLAN/2 protocol
- DQRUMA
- MASCARA protocol
- polling schemes
Random access protocols
- CSMA protocols
- Non-persistent CSMA
- Persistent CSMA
MATRUSRI
ENGINEERING COLLEGE
RTS/CTS handshake in IEEE 802.11
MATRUSRI
ENGINEERING COLLEGE
Two problems in RTS/CTS Handshake
MATRUSRI
ENGINEERING COLLEGE
MAC protocols for wireless sensor networks
 Balance of requirements
 Energy problems on the MAC layer
- Collisions
- Overhearing
- Protocol overhead
- Idle listening
 Structure
- Contention-based
- Schedule-based protocols
MATRUSRI
ENGINEERING COLLEGE
Module 3: Low duty cycle protocols and wakeup concepts
 Low duty cycle protocols try to avoid spending (much)
time in the idle state and to reduce the communication
activities of a sensor node to a minimum.
Periodic wake up scheme
MATRUSRI
ENGINEERING COLLEGE
Sparse topology and energy management (STEM)
The Sparse Topology and Energy Management
(STEM) protocol does not cover all aspects of a MAC
protocol but provides a solution for the idle listening
problem
STEM duty cycle for a single node
MATRUSRI
ENGINEERING COLLEGE
The S-MAC (Sensor-MAC) protocol provides mechanisms
to circumvent idle listening, collisions, and overhearing. As opposed
to STEM, it does not require two different channels.
S-MAC
MATRUSRI
ENGINEERING COLLEGE
 S-MAC adopts a periodic wakeup scheme, that is, each node
alternates between a fixed-length listen period and a fixed-
length sleep period according to its schedule, as opposed to
STEM, the listen period of S-MAC can be used to receive and
transmit packets.
 S-MAC attempts to coordinate the schedules of neighboring
nodes such that their listen periods
 Start at the same time. A node x’s listen period is subdivided
into three different phases:
• In the first phase (SYNCH phase),
• In the second phase (RTS phase),
• In the third phase (CTS phase),
S-MAC Principle
MATRUSRI
ENGINEERING COLLEGE
S-MAC Fragmentation and NAV settings
MATRUSRI
ENGINEERING COLLEGE
The Mediation device protocol
 The mediation device protocol is compatible with the peer-to-
peer communication mode of the IEEE 802.15.4 low-rate WPAN
standard. It allows each node in a WSN to go into sleep mode
periodically and to wake up only for short times to receive packets
from neighbor nodes. There is no global time reference, each node has
its own sleeping schedule, and does not take care of its neighbors sleep
schedules.
 Upon each periodic wakeup, a node transmits a short query
beacon, indicating its node address and its willingness to accept
packets from other nodes. The node stays awake for some short time
following the query beacon, to open up a window for incoming
packets. If no packet is received during this window, the node goes
back into sleep mode.
 Dynamic synchronization
 Mediation device (MD)
MATRUSRI
ENGINEERING COLLEGE
The Mediation device protocol
Mediation device protocol with unconstrained protocol
MATRUSRI
ENGINEERING COLLEGE
Wakeup radio concepts
The ideal situation would be if a node were always in
the receiving state when a packet is transmitted to it, in the
transmitting state when it transmits a packet, and in the sleep
state at all other times; the idle state should be avoided. The
wakeup radio concept strives to achieve this goal by a
simple, “powerless” receiver that can trigger a main receiver
if necessary.
MATRUSRI
ENGINEERING COLLEGE
The IEEE 802.15.4 MAC protocol
Wireless Personal Area Network (WPAN)
The standard distinguishes on the MAC layer two types of
nodes:
 A Full Function Device (FFD) can operate in three
different roles: it can be a PAN coordinator (PAN =
Personal Area Network), a simple coordinator or a device.
 A Reduced Function Device (RFD) can operate only as
a device.
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
ROUTING PROTOCOLS
 Energy Efficient Routing
 Geographic Routing
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
UNIT- IV: INFRASTRUCTURE ESTABLISHMENT
INTRODUCTION
 In a densely deployed wireless network, a single node has many neighboring
nodes with which direct communication would be possible when using
sufficiently large transmission power.
 This is, however, not necessarily beneficial: high transmission power
requires lots of energy, many neighbors are a burden for a MAC protocol, and
routing protocols suffer from volatility in the network when nodes move around
and frequently form or sever many links.
 To overcome these problems, topology control can be applied.
 The idea is to deliberately restrict the set of nodes that are considered
neighbors of a given node. This can be done by controlling transmission power,
by introducing hierarchies in the network and signaling out some nodes to take
over certain coordination tasks, or by simply turning off some nodes for a
certain time.
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
OUTCOMES
 To evaluate the performance of sensor network and identify
bottlenecks.
CONTENTS
 Topology control
 Clustering
 Time synchronization
 Localization and positioning
 Sensor Tasking and control
MATRUSRI
ENGINEERING COLLEGE
Module 1: Motivation - Dense networks
 In a very dense networks, too many nodes might be in range for an
efficient operation
• Too many collisions/too complex operation for a MAC
protocol, too many paths to choose from for a routing protocol.
 Idea: Make topology less complex
• Topology: Which node is able/allowed to communicate with
which other nodes
• Topology control needs to maintain invariants, e.g.,
connectivity
MATRUSRI
ENGINEERING COLLEGE
Options for Topology control
MATRUSRI
ENGINEERING COLLEGE
Flat networks
 Main option: Control transmission power
• Do not always use maximum power
• Selectively for some links or for a node as a whole
• Topology looks “thinner”
• Less interference.
 Alternative: Selectively discard some links
• Usually done by introducing hierarchies
MATRUSRI
ENGINEERING COLLEGE
Hierarchical networks – Backbone
Construct a backbone network
• Some nodes “control” their neighbors –
they form a (minimal) dominating set
• Each node should have a controlling
neighbor
• Controlling nodes have to be connected
(backbone)
• Only links within backbone and from
backbone to controlled neighbors are used.
MATRUSRI
ENGINEERING COLLEGE
Hierarchical network – clustering
 Construct clusters
 Partition nodes into groups (“clusters”)
 Each node in exactly one group
• Except for nodes “bridging” between two or more groups
 Groups can have cluster heads
 Typically: all nodes in a cluster are direct neighbors of their cluster head
 Cluster heads are also a dominating set, but should be separated from each
other – they form an independent set
 Formally: Given graph G=(V,E), construct C ½ V such that
MATRUSRI
ENGINEERING COLLEGE
Aspects of topology-control algorithms
Connectivity – If two nodes connected in G, they have to
be connected in G0 resulting from topology
control
Stretch factor – should be small
Hop stretch factor: how much longer are paths in G0
than in G?
Energy stretch factor: how much more energy does the
most energy-efficient path need?
Throughput – removing nodes/links can reduce
throughput, by how much?
Robustness to mobility
Algorithm overhead
MATRUSRI
ENGINEERING COLLEGE
Example: Price for maintaining connectivity
Maintaining connectivity can be very “costly” for a power control approach
Compare power required for connectivity compared to power required to reach a
very big maximum component
MATRUSRI
ENGINEERING COLLEGE
Controlling transmission range
 Assume all nodes have identical transmission range r=r(|V|),
network covers area A, V nodes, uniformly distr.
 Fact: Probability of connectivity goes to zero if:
 Fact: Probability of connectivity goes to 1 for
if and only if |V| ! 1 with |V|
 Fact (uniform node distribution, density ):
MATRUSRI
ENGINEERING COLLEGE
Controlling number of neighbors
 Knowledge about range also tells about number of neighbors
• Assuming node distribution (and density) is known, e.g.,
uniform
 Alternative: directly analyze number of neighbors
• Assumption: Nodes randomly, uniformly placed, only
transmission range is controlled, identical for all nodes, only
symmetric links are considered
 Result: For connected network, required number of neighbors per
node is  (log |V|)
• It is not a constant, but depends on the number of nodes!
• For a larger network, nodes need to have more neighbors &
larger transmission range! – Rather inconvenient
• Constants can be bounded
MATRUSRI
ENGINEERING COLLEGE
Example 1: Relative Neighborhood Graph (RNG)
 Edge between nodes u and v if and only if there is no other node w that is
closer to either u or v
 Formally:
 RNG maintains connectivity of the original graph
 Easy to compute locally
 But: Worst-case spanning ratio is  (|V|)
 Average degree is 2.6
MATRUSRI
ENGINEERING COLLEGE
Example 2: Gabriel graph
Gabriel graph (GG) similar to RNG
Difference: Smallest circle with nodes u and v on its circumference must only
contain node u and v for u and v to be connected
Formally:
Properties: Maintains connectivity, Worst-case spanning ratio (|V|1/2), energy
stretch O(1) (depending on consumption model!), worst-case degree  (|V|)
MATRUSRI
ENGINEERING COLLEGE
Example 3: Delaunay triangulation
 Assign, to each node, all points in the
plane for which it is the closest node
! Voronoi diagram
• Constructed in O(|V| log |V|) time
 Connect any two nodes for which the
Voronoi regions touch
! Delaunay triangulation
 Problem: Might produce very long
links; not well suited for power control
MATRUSRI
ENGINEERING COLLEGE
Example: Cone-based topology control
 Assumption: Distance and angle information between nodes is available
 Two-phase algorithm
 Phase 1
 Every node starts with a small transmission power
 Increase it until a node has sufficiently many neighbors
 What is “sufficient”? – When there is at least one neighbor in each
cone of angle 
  = 5/6 is necessary and sufficient condition for connectivity!
 Phase 2
 Remove redundant edges: Drop a neighbor w of u if there is a node
v of w and u such that sending from u to w directly is less efficient
than sending from u via v to w
 Essentially, a local Gabriel graph construction
MATRUSRI
ENGINEERING COLLEGE
Centralized power control algorithm
 Goal: Find topology control algorithm minimizing the maximum
power used by any node
 Ensuring simple or bi-connectivity
 Assumptions: Locations of all nodes and path loss
between all node pairs are known; each node uses an
individually set power level to communicate with all its
neighbors
 Idea: Use a centralized, greedy algorithm
 Initially, all nodes have transmission power 0
 Connect those two components with the shortest distance
between them (raise transmission power accordingly)
 Second phase: Remove links (=reduce transmission power) not
needed for connectivity
 Exercise: Relation to Kruskal’s MST algorithm?
MATRUSRI
ENGINEERING COLLEGE
Centralized power control algorithm
1 1
2
3
4 4
A B
C D
E F
D
Topology
1 1
A B
C D
E F
1) Connect A-C and B-D
1 1
2
A B
C D
E F
2) Connect A-B
1 1
2
3
A B
C D
E F
3) Connect C-D
1 1
2
3
4 4
A B
C
E F
4) Connect C-E and D-F
1 1
3
4 4
A B
C D
E F
5) Remove edge A-B
MATRUSRI
ENGINEERING COLLEGE
Hierarchical networks – backbones
 Idea: Select some nodes from the network/graph to
form a backbone
 A connected, minimal, dominating set (MDS
or MCDS)
 Dominating nodes control their neighbors
 Protocols like routing are confronted with a
simple topology – from a simple node, route to
the backbone, routing in backbone is simple
(few nodes)
 Problem: MDS is an NP-hard problem
 Hard to approximate, and even approximations
need quite a few messages
MATRUSRI
ENGINEERING COLLEGE
Performance of tree growing with look ahead
 Dominating set obtained by growing a tree with the
look ahead heuristic is at most a factor 2(1+ H()) larger
than MDS
 H(¢) harmonic function, H(k) = i=1
k 1/i <= ln k + 1
  is maximum degree of the graph
 It is automatically connected
 Can be implemented in a distributed fashion as well
MATRUSRI
ENGINEERING COLLEGE
Start big, make lean
 Idea: start with some, possibly large, connected dominating set,
reduce it by removing unnecessary nodes
 Initial construction for dominating set
 All nodes are initially white
 Mark any node black that has two neighbors that are not
neighbors of each other (they might need to be dominated)
Black nodes form a connected dominating set (proof by
contradiction); shortest path between ANY two nodes only
contains black nodes
 Needed: Pruning heuristics
MATRUSRI
ENGINEERING COLLEGE
Pruning heuristics
 Heuristic 1: Unmark node v if
 Node v and its neighborhood are included in the neighborhood
of some node marked node u (then u will do the domination for v
as well)
 Node v has a smaller unique identifier than u (to break ties)
 Heuristic 2: Unmark node v if
 Node v’s neighborhood is included in the neighborhood of two
marked neighbors u and w
 Node v has the smallest
identifier of the tree nodes
 Nice and easy, but only linear approximation
factor
MATRUSRI
ENGINEERING COLLEGE
One more distributed backbone heuristic: Span
 Construct backbone, but take into account need to carry traffic –
preserve capacity
 Means: If two paths could operate without interference in the
original graph, they should be present in the reduced graph as
well
 Idea: If the stretch factor (induced by the backbone) becomes
too large, more nodes are needed in the backbone
 Rule: Each node observes traffic around itself
 If node detects two neighbors that need three hops to
communicate with each other,
 node joins the backbone, shortening the path
 Contention among potential
new backbone nodes handled
using random backoff
MATRUSRI
ENGINEERING COLLEGE
Module 2: Clustering
 Partition nodes into groups of nodes – clusters
 Many options for details
 Are there cluster heads? – One controller/representative node per cluster
 May cluster heads be neighbors? If no: cluster heads form an
independent set C:
Typically: cluster heads form a maximum independent set
 May clusters overlap? Do they have nodes in common?
MATRUSRI
ENGINEERING COLLEGE
Clustering
 Further options
 How do clusters communicate? Some nodes need to act as
gateways between clusters
If clusters may not overlap, two nodes need to jointly act as a
distributed gateway
 How many gateways exist between clusters? Are all active, or
some standby?
 What is the maximal diameter of a cluster? If more than 2, then
cluster heads are not necessarily a maximum independent set
 Is there a hierarchy of clusters?
MATRUSRI
ENGINEERING COLLEGE
Maximum independent set
 Computing a maximum independent set is NP-complete
 Can be approximate within ( +3)/5 for small , within
O( log log  / log ) else;  bounded degree
 Show: A maximum independent set is also a dominating set
 Maximum independent set not necessarily intuitively desired
solution
 Example: Radial graph, with only (v0,vi) 2 E
MATRUSRI
ENGINEERING COLLEGE
Determining gateways to connect clusters
 Suppose: Cluster heads have been found
 How to connect the clusters, how to select gateways?
 It suffices for each cluster head to connect to all other cluster heads
that are at most three hops
 Resulting backbone (!) is connected
 Formally: Steiner tree problem
 Given: Graph G=(V,E), a subset C ½ V
 Required: Find another subset T ½ V such that S [T] is
connected and S [T] is a cheapest such set
 Cost metric: number of nodes in T, link cost
 Here: special case since C are an independent set
MATRUSRI
ENGINEERING COLLEGE
Rotating cluster heads
 Serving as a cluster head can put additional burdens on a node
 For MAC coordination, routing, …
 Let this duty rotate among various members
 Periodically reelect – useful when energy reserves are used as
discriminating attribute
 LEACH – determine an optimal percentage P of nodes to become
cluster heads in a network
• Use 1/P rounds to form a period
• In each round, nP nodes are elected as cluster heads
• At beginning of round r, node that has not served as cluster head in
this period becomes cluster head with probability P/(1-p(r mod 1/P))
MATRUSRI
ENGINEERING COLLEGE
Multi-hop clusters
 Clusters with diameters larger than 2 can be useful, e.g., when
used for routing protocol support
 Formally: Extend “domination” definition to also dominate nodes
that are at most d hops away
 Goal: Find a smallest set D of dominating nodes with this
extended definition of dominance
 Only somewhat complicated heuristics exist
 Different tilt: Fix the size (not the diameter) of clusters
 Idea: Use growth budgets – amount of nodes that can still be
adopted into a cluster, pass this number along with broadcast
adoption messages, reduce budget as new nodes are found
MATRUSRI
ENGINEERING COLLEGE
Passive clustering
 Constructing a clustering structure brings overheads
 Not clear whether they can be amortized via improved efficiency
 Question: Eat cake and have it?
 Have a clustering structure without any overhead?
 Maybe not the best structure, and maybe not immediately, but
benefits at zero cost are no bad deal…
 Passive clustering
 Whenever a broadcast message travels the network, use it to
construct
clusters on the fly
 Node to start a broadcast: Initial node
 Nodes to forward this first packet: Cluster head
 Nodes forwarding packets from cluster heads: ordinary/gateway
nodes
 And so on… ! Clusters will emerge at low overhead
MATRUSRI
ENGINEERING COLLEGE
Adaptive node activity
 Remaining option: Turn some nodes off
deliberately
 Only possible if other nodes remain on that
can take over their duties
 Example duty: Packet forwarding
 Approach: Geographic Adaptive Fidelity (GAF)
 Observation: Any two nodes within a
square of length r < R/51/2 can
replace each other with respect to
forwarding
 R radio range
 Keep only one such node active, let
the other sleep
MATRUSRI
ENGINEERING COLLEGE
Module 3: SENSOR TASKING and CONTROL
 To efficiently and optimally utilize scarce resources in a sensor
network, such as limited on-board battery power supply and limited
communication bandwidth, nodes in a sensor network must be carefully
tasked and controlled to carry out the required set of tasks while
consuming only a modest amount of resources.
 For example :a camera sensor may be tasked to look for animals of a
particular size and color, or an acoustic sensor may be tasked to detect
the presence of a particular type of vehicle.
 To detect and track a moving vehicle, a pan-and-tilt camera may be
tasked to anticipate and follow the vehicle object. It should be noted that
to achieve scalability and autonomy, sensor tasking and control have to
be carried out in a distributed fashion, largely using only local
information available to each sensor.
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
TASK DRIVEN SENSING
However, this classical algorithm/complexity view needs to be
modified in the sensor network context because
 The values of the relevant manifest variables are not known, but
have to be sensed.
 The cost of sensing different variables or relations of the same type
can be vastly different—depending on the relative locations of targets
and sensors, the sensing modalities available, the environmental
conditions, and the communication costs.
 Frequently the value of a variable, or a relationship between
variables, may be impossible to determine using the resources
available in the sensor network; however, alternate variable values or
relations may serve our purposes equally well.
MATRUSRI
ENGINEERING COLLEGE
TASK DRIVEN SENSING
To design an overall strategy, several key questions need to be
addressed:
 What are the important objects in the environment to be sensed?
 What parameters of these objects are most relevant?
 What relations among these objects are critical to whatever high
level information we need to know?
 Which is the best sensor to acquire a particular parameter?
 How many sensing and communication operations will be needed
to accomplish the task?
 How coordinated do the world models of the different sensors
need to be?
 At what level do we communicate information, in the spectrum
from signal to symbol?
MATRUSRI
ENGINEERING COLLEGE
Roles of Sensor Nodes and Utilities
 Sensors in a network may take on different roles.
 Consider the following example: of monitoring toxicity levels in
an area around a chemical plant that generates hazardous waste
during processing.
 A number of wireless sensors are initially deployed in the ,
 Due to the nature of the environment and the cost of deployment,
further human intervention or node replacement is not feasible.
 The sensors form a mesh network, and data collected by a subset
of nodes is transmitted, through the multi-hop network.
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
INFORMATION BASED SENSOR TASKING
Sensor selection
Information driven sensor query (IDSN)
Cluster-leader based Protocol
Leader election protocol
Sensor tasking in tasking relations
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
MATRUSRI
ENGINEERING COLLEGE
JOINT ROUTING and INFORMATION AGGREGEATION
MATRUSRI
ENGINEERING COLLEGE
JOINT ROUTING and INFORMATION AGGREGATION
Moving center of Aggregation
Locally optimization
Simulation Experiments
Multi step information-Directed Routing
Sensor Group management
Distributed group management
MATRUSRI
ENGINEERING COLLEGE
UNIT V : SURVEY OF SECURITY PROTOCOLS
INTRODUCTION
Advancements in wireless communications, low-power electronics,
battery technology, and power harvesting capabilities have enabled the
development of low-cost WSNs. WSNs are characterized by limited power,
unreliable communication, need for self-configuration and scalability, harsh
environmental conditions, small size, cooperative network behavior, data
centricity (as opposed to address centricity), very small packet size,
unattended operation, and random deployment. Given those characteristics,
the most common WSN applications are environmental monitoring, health
monitoring, terror threat detection, terrestrial and underwater habitat
monitoring, military surveillance, seismic oil and gas explorations, inventory
tracking, process monitoring, acoustic detections, object localization and
tracking, homeland security protection, disaster prevention and disaster
recovery, and pipelines corrosion detection. Figure 1. shows an example of
WSN architecture. Each node consists of a sensing unit, a processing unit, a
communication unit, a battery, and a power harvester
MATRUSRI
ENGINEERING COLLEGE
CONTENTS
 Security Architectures
 Survey of Security protocols for Wireless Sensor
Networks
 Comparisons
OUTCOMES
 Evaluate concepts of security in sensor networks
MATRUSRI
ENGINEERING COLLEGE
A typical sensor network and components of a sensor node
MATRUSRI
ENGINEERING COLLEGE
Problems Applying Traditional Network Security Techniques
 Sensor devices are limited in their energy, computation, and
communication capabilities
 Sensor nodes are often deployed in open areas, thus allowing physical
attack
 Sensor networks closely interact with their physical environments and
with people , posing new security problems
MATRUSRI
ENGINEERING COLLEGE
Key Establishment and Trust
 Sensor devices have limited computational power,
making public-key cryptographic primitives too
expensive in terms of system overhead
 Simplest solution is a network-wide shared key
 Problem: if even a single node were compromised,
the secret key would be revealed, and decryption of
all network traffic would be possible
 Slightly better solution:
 Use a single shared key to establish a set of link
keys, one per pair of communicating nodes, then
erase the network-wide key
 Problem: does not allow addition of new nodes
after initial deployment
MATRUSRI
ENGINEERING COLLEGE
Random-key pre-distribution protocols
 Large pool of symmetric keys is chosen
 Random subset of the pool is distributed to each sensor node
 To communicate, two nodes search their pools for a common key
 If they find one, they use it to establish a session key
 Not every pair of nodes shares a common key, but if the key-
establishment probability is sufficiently high, nodes can securely
communicate with sufficiently many nodes to obtain a connected
network
 No need to include a central trusted base station
 Disadvantage: Attackers who compromised sufficiently many
nodes could also reconstruct the complete key pool and break the
scheme
MATRUSRI
ENGINEERING COLLEGE
Secrecy and Authentication
 We need cryptography as protection against eavesdropping,
injection, and modification of packets
 Trade-offs when incorporating cryptography into sensor
networks:
 End-to-end cryptography achieves a high level of security
but requires that keys be set up among all end points and be
incompatible with passive participation and local broadcast
 Link-layer cryptography with a network-wide shared key
simplifies key setup and supports passive participation and
local broadcast, but intermediate nodes might eavesdrop or
alter messages
MATRUSRI
ENGINEERING COLLEGE
Hardware vs. Software Cryptography
 Hardware solutions are generally more efficient, but also more
costly ($)
 University of California, Berkeley, implementation of Tiny Sec
incurs only an additional 5%–10% performance overhead using
software-only methods
 Most of the overhead is due to increases in packet size
 Cryptographic calculations have little effect on latency or
throughput, since they can overlap with data transfer
 Hardware reduces only the computational costs, not packet size
 Thus, software-only techniques are sufficient (or reasonable to be
more careful)
MATRUSRI
ENGINEERING COLLEGE
Privacy
 Issues
 Employers might spy on their employees
 Shop owners might spy on customers
 Neighbours might spy on each other
 Law enforcement agencies might spy on public places
 Technological improvements will only worsen the problem
 Devices will get smaller and easier to conceal
 Devices will get cheaper, thus surveillance will be more
affordable
MATRUSRI
ENGINEERING COLLEGE
 Sensor networks raise new threats that are qualitatively different
from what private citizens worldwide faced before
 Sensor networks allow data collection, coordinated analysis,
and automated event correlation
 Networked systems of sensors can enable routine tracking of
people and vehicles over long periods of time
 EZ Pass + On Star == Big Brother?
 Suggested ways of approaching solution include a mix of:
 Societal norms
 New laws
 Technological responses
Privacy(Contd)
MATRUSRI
ENGINEERING COLLEGE
Network Security Services
 So far, we’ve explored low-level security primitives
for securing sensor networks.
 Now, we consider high-level security mechanisms.
 Secure group management
 Intrusion detection
 Secure data aggregation
MATRUSRI
ENGINEERING COLLEGE
Secure Group Management
 Protocols for group management are required to
 Securely admit new group members
 Support secure group communication
 Outcome of group computation must be authenticated to ensure
it comes from a valid group
 Any solution must also be efficient in terms of time and energy
MATRUSRI
ENGINEERING COLLEGE
Intrusion detection
 In wired networks, traffic and computation are typically
monitored and analyzed for anomalies at various concentration
points
 Expensive in terms of the network’s memory and energy
consumption
 Hurts bandwidth constraints
 Wireless sensor networks require a solution that is fully
distributed and inexpensive in terms of communication, energy, and
memory requirements
 In order to look for anomalies, applications and typical threat
models must be understood
 It is particularly important for researchers and practitioners to
understand how cooperating adversaries might attack the system
 The use of secure groups may be a promising approach for
decentralized intrusion detection
MATRUSRI
ENGINEERING COLLEGE
Secure Data Aggregation
 One benefit of a wireless sensor network is the fine-grain
sensing that large and dense sets of nodes can provide
 The sensed values must be aggregated to avoid overwhelming
amounts of traffic back to the base station
 Depending on the architecture of the network, aggregation may
take place in many places
 All aggregation locations must be secured
 If the application tolerates approximate answers, powerful
techniques are available
 Randomly sampling a small fraction of nodes and checking
that they have behaved properly supports detection of many
different types of attacks
MATRUSRI
ENGINEERING COLLEGE
Conclusions
 Constraints and open environments of wireless sensor networks
make security for these systems challenging.
 Several properties of sensor networks may provide solutions.
 Architect security into these systems from the outset (they
are still in their early design stages)
 Exploit redundancy, scale, and the physical characteristics of
the environment in the solutions
 Build sensor networks so that they can detect and work
around some fraction of their nodes which are compromised

More Related Content

What's hot

Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
YunusKhan38
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
Mahbubur Rahman
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
ArunChokkalingam
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniquesKaushal Kabra
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
Kathirvel Ayyaswamy
 
OFDM
OFDMOFDM
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
Vidhi603146
 
Wireless sensors networks protocols
Wireless sensors networks protocolsWireless sensors networks protocols
Wireless sensors networks protocolsRushin Shah
 
frequency re use nb
frequency re use nbfrequency re use nb
frequency re use nb
AJAL A J
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
Dr. Sanjay M. Gulhane
 
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION  SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
Soumen Santra
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
yogesh singh
 
GSM channels
GSM channelsGSM channels
GSM channels
Mohd Nazir Shakeel
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
Darwin Nesakumar
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Ganesh Khadsan
 
Two cavity klystron
Two cavity klystronTwo cavity klystron
Two cavity klystron
abhikalmegh
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
 

What's hot (20)

WCDMA
WCDMAWCDMA
WCDMA
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Chapter 7 multiple access techniques
Chapter 7 multiple access techniquesChapter 7 multiple access techniques
Chapter 7 multiple access techniques
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
OFDM
OFDMOFDM
OFDM
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 
Wireless sensors networks protocols
Wireless sensors networks protocolsWireless sensors networks protocols
Wireless sensors networks protocols
 
frequency re use nb
frequency re use nbfrequency re use nb
frequency re use nb
 
Digital Communication: Channel Coding
Digital Communication: Channel CodingDigital Communication: Channel Coding
Digital Communication: Channel Coding
 
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION  SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Two cavity klystron
Two cavity klystronTwo cavity klystron
Two cavity klystron
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 

Similar to Wireless Sensor Networks

Wireless sensor Networks.ppt
Wireless sensor Networks.pptWireless sensor Networks.ppt
Wireless sensor Networks.ppt
MATRUSRI ENGINEERING COLLEGE
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
ijsrd.com
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
ijtsrd
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
IJERA Editor
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
abdullah roomi
 
A Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor NetworkA Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor Network
ijtsrd
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET Journal
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
IDES Editor
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
Jawhar Ali
 
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ijscai
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
IJNSA Journal
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
rahulkumargiri
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
IJEEE
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
Pramod Kuruvatti
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
Ganesh Khadsan
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Editor IJARCET
 

Similar to Wireless Sensor Networks (20)

Wireless sensor Networks.ppt
Wireless sensor Networks.pptWireless sensor Networks.ppt
Wireless sensor Networks.ppt
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
A Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor NetworkA Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor Network
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
 

Recently uploaded

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 

Recently uploaded (20)

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 

Wireless Sensor Networks

  • 1. MATRUSRI ENGINEERING COLLEGE DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING SUBJECT NAME: WIRELESS SENSOR NETWORKS(PE 831 EC) FACULTY NAME: Mrs. P.SRAVANI MATRUSRI ENGINEERING COLLEGE
  • 2. WIRELESS SENSOR NETWORKS(PE 831 EC) COURSE OBJECTIVES:  Determine network architecture, node discovery and localization, deployment strategies, fault tolerant and network security.  Build foundation for WSN by presenting challenges of wireless networking at various protocol layers.  Determine suitable protocols and radio hardware.  Evaluate the performance of sensor network and identify bottlenecks.  Evaluate concepts of security in sensor networks. COURSE OUTCOMES:  To understand network architecture, node discovery and localization, deployment strategies, fault tolerant and network security.  To understand foundation for WSN by presenting challenges of wireless networking at various protocol layers  Study suitable protocols and radio hardware.  To understand the performance of sensor network and identify bottlenecks.  To understand concepts of security in sensor networks. MATRUSRI ENGINEERING COLLEGE
  • 3. INTRODUCTION: Wireless sensor networks (WSNs) have been considered as one of the most important technologies that are enabled by recent advances in – Micro-electronic-mechanical-systems(MEMS) Wireless Communication technologies. UNIT-I: OVERVIEW OF WIRELESS SENSOR NETWORKS MATRUSRI ENGINEERING COLLEGE
  • 4. OUTCOMES: To determine the network architecture, node discovery and localization, deployment strategies, fault tolerant and network security. To understand the gist of Wireless Sensor Networks. MATRUSRI ENGINEERING COLLEGE
  • 5. Module 1: Challenges for Wireless Sensor Networks MATRUSRI ENGINEERING COLLEGE
  • 10. Module 2: Characteristics requirements-required mechanisms MATRUSRI ENGINEERING COLLEGE
  • 15. Module 3: Difference between mobile ad-hoc and sensor networks MATRUSRI ENGINEERING COLLEGE
  • 17. Module 4: Applications of sensor networks MATRUSRI ENGINEERING COLLEGE Applications 1
  • 21. Module 5: Enabling Technologies for Wireless Sensor Networks MATRUSRI ENGINEERING COLLEGE
  • 23. MATRUSRI ENGINEERING COLLEGE UNIT-II: ARCHITECTURES INTRODUCTION  A Wireless Sensor Network is one kind of wireless network includes a large number of circulating, self-directed, minute, low powered devices named sensor nodes called motes. These networks certainly cover a huge number of spatially distributed, little, battery-operated, embedded devices that are networked to caringly collect, process, and transfer data to the operators, and it has controlled the capabilities of computing & processing. Nodes are the tiny computers, which work jointly to form the networks.  The sensor node is a multi-functional, energy efficient wireless device. The applications of motes in industrial are widespread. A collection of sensor nodes collects the data from the surroundings to achieve specific application objectives. The communication between motes can be done with each other using transceivers. In a wireless sensor network, the number of motes can be in the order of hundreds/ even thousands. In contrast with sensor n/ws, Ad Hoc networks will have fewer nodes without any structure.
  • 24. MATRUSRI ENGINEERING COLLEGE OUTCOMES:  Build foundation for WSN by presenting challenges of wireless networking at various protocol layers. CONTENTS:  Single node architecture-hardware components  Energy consumption of sensor nodes  Operating system and execution environment  Network architecture- sensor network scenarios  Optimization goals and figure of merit  Gate- way concepts
  • 25. MATRUSRI ENGINEERING COLLEGE Module 1: Single node architecture-hardware components
  • 26. MATRUSRI ENGINEERING COLLEGE Module 2: Hardware Components  Power supply  Microcontrollers vs Microprocessors, FPGAs and ASIC  Memory  Communication devices  Sensors & Actuators - Passive omni directional sensors - Passive narrow- beam sensors - Active sensors - Actuators
  • 28. MATRUSRI ENGINEERING COLLEGE Power supply of sensor nodes: Storing energy: Batteries -Traditional batteries - Capacity - capacity under load - self discharge - Efficient recharging - Relaxation - Unconventional energy Sources - DC-DC - Energy Scavenging - Photovolatic,Temparature gradients, Vibrations, Pressure variations, flow and air/liquid
  • 29. MATRUSRI ENGINEERING COLLEGE MEMS device for converting vibrations to electrical energy (Based on a variable Capacitor)
  • 30. MATRUSRI ENGINEERING COLLEGE Module 3: Energy consumption of sensor nodes As the previous section has shown, energy supply for a sensor node is at a premium: batteries have small capacity, and recharging by energy scavenging is complicated and volatile. Hence, the energy consumption of a sensor node must be tightly controlled. The main consumers of energy are the controller, the radio front ends, to some degree the memory, and depending on the type the sensors. One important contribution to reduce power consumption of these components comes from chip-level and lower technologies: Designing low-power chips is the best starting point for an energy- efficient sensor node. But this is only one half of the picture, as any advantages gained by such designs can easily be squandered when the components are improperly operated.
  • 31. MATRUSRI ENGINEERING COLLEGE Energy consumption of sensor nodes: (Energy savings and overhead of sleeping nodes)
  • 32. MATRUSRI ENGINEERING COLLEGE  Microcontroller energy consumption  Memory (Intel Strong ARM SA-1100)  Radio transceivers  Power consumption of sensor and actuators
  • 33. MATRUSRI ENGINEERING COLLEGE Module 4:Operating systems and Execution Environments 1. Embedded operating systems: The traditional tasks of an operating system are controlling and protecting the access to resources (including support for input/output) and managing their allocation to different users as well as the support for concurrent execution of several processes and communication between these processes. 2.Programming paradigms and application programming interfaces (concurrent programming): - Process-based concurrency - Event- based programming - Interfaces to the operating systems
  • 36. MATRUSRI ENGINEERING COLLEGE Module 5: NETWORK ARCHITECTURE-Sensor network scenarios Types of Sources and sinks: -Single hop versus Multi hop Three types of sinks in a very simple single-hop sensor network
  • 39. MATRUSRI ENGINEERING COLLEGE Three types of mobility  Node mobility  Sink mobility  Event mobility A mobile sinks moves through a mobile sensor network as a information being retrieves on its behalf
  • 40. MATRUSRI ENGINEERING COLLEGE Module 6: Optimization goals and figure of merit 1. Quality of service - Event detection/reporting probability - Event classification error - Event detection delay - Missing reports - Approximation accuracy - Tracking accuracy 2. Energy efficiency - Energy/correctly received - Energy/reported event - Delay - N/w Life time 3. Scalability 4. Robustness For all these scenarios and application types, different forms of networking solutions can be found. The challenging question is how to optimize a network, how to compare these solutions, how to decide which approach better supports a given application, and how to turn relatively imprecise optimizing goals into measurable figures of merit? While a general answer appears impossible considering the large variety of possible applications, a few aspects are fairly evident.
  • 41. MATRUSRI ENGINEERING COLLEGE Area of sensor nodes detecting an event-an elephant-that moves through the network along with the event source
  • 42. MATRUSRI ENGINEERING COLLEGE Module 7: Gateway Concepts  The need for gate ways  WSN to Internet Communication  Internet to WSN communication  WSN tunneling
  • 43. MATRUSRI ENGINEERING COLLEGE 1. Need for Gate ways For practical deployment, a sensor network only concerned with itself is insufficient. The network rather has to be able to interact with other information devices, for example, a user equipped with a PDA moving in the coverage area of the network or with a remote user, trying to interact with the sensor network via the Internet (the standard example is to read the temperature sensors in one’s home while traveling and accessing the Internet via a wireless connection). Figure shows this networking scenario.
  • 44. MATRUSRI ENGINEERING COLLEGE 2. WSN to Internet Communication
  • 47. MATRUSRI ENGINEERING COLLEGE CONCLUSION  Realization of sensor networks needs to satisfy several constraints such as scalability, cost, hardware, topology change, environment and power consumption.  Since these constraints are highly tight and specific for sensor networks, new wireless ad hoc networking protocols are required.  To meet the requirements, many researchers are engaged in developing the technologies needed for different layers of the sensor networks protocol stack.
  • 48. MATRUSRI ENGINEERING COLLEGE UNIT-III: NETWORKING SENSORS INTRODUCTION The physical layer is mostly concerned with modulation and demodulation of digital data; this task is carried out by so-called transceivers. In sensor networks, the challenge is to find modulation schemes and transceiver architectures that are simple, low cost, but still robust enough to provide the desired service. 1. Wireless channels are therefore an unguided medium, meaning that signal propagation is not restricted to well-defined locations, as is the case in wired transmission with proper shielding. For a practical wireless, RF-based system, the carrier frequency has to be carefully chosen. 2. In the process of modulation, (groups of) symbols from the channel alphabet are mapped to one of a finite number of waveforms of the same finite length; this length is called the symbol duration. The mapping from a received waveform to symbols is called demodulation. Wave propagation effects and noise results in bit errors.
  • 49. MATRUSRI ENGINEERING COLLEGE OUTCOMES  To determine the suitable protocols and radio hardware. CONTENTS:  Physical layer and Transceiver Design considerations  MAC protocols for wireless sensors networks  Low Duty cycle and wakeup concepts - STEM - S-MAC - The mediation device protocol - wakeup radio protocols  Address and Name management  Assignment of MAC Addresses  Routing Protocols - Energy efficient Routing - Geographic Routing
  • 50. MATRUSRI ENGINEERING COLLEGE Module 1: Physical Layer and Transceiver Design Considerations The physical layer in wireless networked sensors has to be designed with sensor networking requirements in mind. In particular  The Communication device must be containable in a small size, since the sensor nodes are small. So cheaper, slightly larger antennas may be acceptable in those cases.  The Communication devices must be cheap, since the sensors will be used in large numbers in redundant fashion.  The radio technology must work with higher layers in the protocol stack to consume very low power levels.
  • 51. MATRUSRI ENGINEERING COLLEGE Physical layer Evaluation of Technologies: We consider 3 main classes of physical layer technologies for use in wireless sensor networks, based on bandwidth considerations:  Narrowband technologies.  Spread spectrum technologies  Ultra-Wideband (UWB) technologies.
  • 52. MATRUSRI ENGINEERING COLLEGE Module 2: MAC protocols for wireless sensors networks  Medium Access Control (MAC) protocols solve a seemingly simple task: they coordinate the times where a number of nodes access a shared communication medium.  An “un over seeable” number of protocols have emerged in more than thirty years of research in this area. They differ, among others, in the types of media they use and in the performance requirements for which they are optimized.
  • 53. MATRUSRI ENGINEERING COLLEGE Fundamentals of (wireless) MAC protocols: Requirements and design constraints for wireless MAC protocols: Throughput, efficiency, stability, fairness, low access delay, low transmission delay  Hidden Terminal Problem  Exposed terminal scenario
  • 54. MATRUSRI ENGINEERING COLLEGE Important classes of MAC protocols Fixed assignment protocols -TDMA, FDMA, CDMA, and SDMA. Demand assignment protocols - HIPERLAN/2 protocol - DQRUMA - MASCARA protocol - polling schemes Random access protocols - CSMA protocols - Non-persistent CSMA - Persistent CSMA
  • 57. MATRUSRI ENGINEERING COLLEGE MAC protocols for wireless sensor networks  Balance of requirements  Energy problems on the MAC layer - Collisions - Overhearing - Protocol overhead - Idle listening  Structure - Contention-based - Schedule-based protocols
  • 58. MATRUSRI ENGINEERING COLLEGE Module 3: Low duty cycle protocols and wakeup concepts  Low duty cycle protocols try to avoid spending (much) time in the idle state and to reduce the communication activities of a sensor node to a minimum. Periodic wake up scheme
  • 59. MATRUSRI ENGINEERING COLLEGE Sparse topology and energy management (STEM) The Sparse Topology and Energy Management (STEM) protocol does not cover all aspects of a MAC protocol but provides a solution for the idle listening problem STEM duty cycle for a single node
  • 60. MATRUSRI ENGINEERING COLLEGE The S-MAC (Sensor-MAC) protocol provides mechanisms to circumvent idle listening, collisions, and overhearing. As opposed to STEM, it does not require two different channels. S-MAC
  • 61. MATRUSRI ENGINEERING COLLEGE  S-MAC adopts a periodic wakeup scheme, that is, each node alternates between a fixed-length listen period and a fixed- length sleep period according to its schedule, as opposed to STEM, the listen period of S-MAC can be used to receive and transmit packets.  S-MAC attempts to coordinate the schedules of neighboring nodes such that their listen periods  Start at the same time. A node x’s listen period is subdivided into three different phases: • In the first phase (SYNCH phase), • In the second phase (RTS phase), • In the third phase (CTS phase), S-MAC Principle
  • 63. MATRUSRI ENGINEERING COLLEGE The Mediation device protocol  The mediation device protocol is compatible with the peer-to- peer communication mode of the IEEE 802.15.4 low-rate WPAN standard. It allows each node in a WSN to go into sleep mode periodically and to wake up only for short times to receive packets from neighbor nodes. There is no global time reference, each node has its own sleeping schedule, and does not take care of its neighbors sleep schedules.  Upon each periodic wakeup, a node transmits a short query beacon, indicating its node address and its willingness to accept packets from other nodes. The node stays awake for some short time following the query beacon, to open up a window for incoming packets. If no packet is received during this window, the node goes back into sleep mode.  Dynamic synchronization  Mediation device (MD)
  • 64. MATRUSRI ENGINEERING COLLEGE The Mediation device protocol Mediation device protocol with unconstrained protocol
  • 65. MATRUSRI ENGINEERING COLLEGE Wakeup radio concepts The ideal situation would be if a node were always in the receiving state when a packet is transmitted to it, in the transmitting state when it transmits a packet, and in the sleep state at all other times; the idle state should be avoided. The wakeup radio concept strives to achieve this goal by a simple, “powerless” receiver that can trigger a main receiver if necessary.
  • 66. MATRUSRI ENGINEERING COLLEGE The IEEE 802.15.4 MAC protocol Wireless Personal Area Network (WPAN) The standard distinguishes on the MAC layer two types of nodes:  A Full Function Device (FFD) can operate in three different roles: it can be a PAN coordinator (PAN = Personal Area Network), a simple coordinator or a device.  A Reduced Function Device (RFD) can operate only as a device.
  • 68. MATRUSRI ENGINEERING COLLEGE ROUTING PROTOCOLS  Energy Efficient Routing  Geographic Routing
  • 69. MATRUSRI ENGINEERING COLLEGE MATRUSRI ENGINEERING COLLEGE UNIT- IV: INFRASTRUCTURE ESTABLISHMENT INTRODUCTION  In a densely deployed wireless network, a single node has many neighboring nodes with which direct communication would be possible when using sufficiently large transmission power.  This is, however, not necessarily beneficial: high transmission power requires lots of energy, many neighbors are a burden for a MAC protocol, and routing protocols suffer from volatility in the network when nodes move around and frequently form or sever many links.  To overcome these problems, topology control can be applied.  The idea is to deliberately restrict the set of nodes that are considered neighbors of a given node. This can be done by controlling transmission power, by introducing hierarchies in the network and signaling out some nodes to take over certain coordination tasks, or by simply turning off some nodes for a certain time.
  • 70. MATRUSRI ENGINEERING COLLEGE MATRUSRI ENGINEERING COLLEGE OUTCOMES  To evaluate the performance of sensor network and identify bottlenecks. CONTENTS  Topology control  Clustering  Time synchronization  Localization and positioning  Sensor Tasking and control
  • 71. MATRUSRI ENGINEERING COLLEGE Module 1: Motivation - Dense networks  In a very dense networks, too many nodes might be in range for an efficient operation • Too many collisions/too complex operation for a MAC protocol, too many paths to choose from for a routing protocol.  Idea: Make topology less complex • Topology: Which node is able/allowed to communicate with which other nodes • Topology control needs to maintain invariants, e.g., connectivity
  • 73. MATRUSRI ENGINEERING COLLEGE Flat networks  Main option: Control transmission power • Do not always use maximum power • Selectively for some links or for a node as a whole • Topology looks “thinner” • Less interference.  Alternative: Selectively discard some links • Usually done by introducing hierarchies
  • 74. MATRUSRI ENGINEERING COLLEGE Hierarchical networks – Backbone Construct a backbone network • Some nodes “control” their neighbors – they form a (minimal) dominating set • Each node should have a controlling neighbor • Controlling nodes have to be connected (backbone) • Only links within backbone and from backbone to controlled neighbors are used.
  • 75. MATRUSRI ENGINEERING COLLEGE Hierarchical network – clustering  Construct clusters  Partition nodes into groups (“clusters”)  Each node in exactly one group • Except for nodes “bridging” between two or more groups  Groups can have cluster heads  Typically: all nodes in a cluster are direct neighbors of their cluster head  Cluster heads are also a dominating set, but should be separated from each other – they form an independent set  Formally: Given graph G=(V,E), construct C ½ V such that
  • 76. MATRUSRI ENGINEERING COLLEGE Aspects of topology-control algorithms Connectivity – If two nodes connected in G, they have to be connected in G0 resulting from topology control Stretch factor – should be small Hop stretch factor: how much longer are paths in G0 than in G? Energy stretch factor: how much more energy does the most energy-efficient path need? Throughput – removing nodes/links can reduce throughput, by how much? Robustness to mobility Algorithm overhead
  • 77. MATRUSRI ENGINEERING COLLEGE Example: Price for maintaining connectivity Maintaining connectivity can be very “costly” for a power control approach Compare power required for connectivity compared to power required to reach a very big maximum component
  • 78. MATRUSRI ENGINEERING COLLEGE Controlling transmission range  Assume all nodes have identical transmission range r=r(|V|), network covers area A, V nodes, uniformly distr.  Fact: Probability of connectivity goes to zero if:  Fact: Probability of connectivity goes to 1 for if and only if |V| ! 1 with |V|  Fact (uniform node distribution, density ):
  • 79. MATRUSRI ENGINEERING COLLEGE Controlling number of neighbors  Knowledge about range also tells about number of neighbors • Assuming node distribution (and density) is known, e.g., uniform  Alternative: directly analyze number of neighbors • Assumption: Nodes randomly, uniformly placed, only transmission range is controlled, identical for all nodes, only symmetric links are considered  Result: For connected network, required number of neighbors per node is  (log |V|) • It is not a constant, but depends on the number of nodes! • For a larger network, nodes need to have more neighbors & larger transmission range! – Rather inconvenient • Constants can be bounded
  • 80. MATRUSRI ENGINEERING COLLEGE Example 1: Relative Neighborhood Graph (RNG)  Edge between nodes u and v if and only if there is no other node w that is closer to either u or v  Formally:  RNG maintains connectivity of the original graph  Easy to compute locally  But: Worst-case spanning ratio is  (|V|)  Average degree is 2.6
  • 81. MATRUSRI ENGINEERING COLLEGE Example 2: Gabriel graph Gabriel graph (GG) similar to RNG Difference: Smallest circle with nodes u and v on its circumference must only contain node u and v for u and v to be connected Formally: Properties: Maintains connectivity, Worst-case spanning ratio (|V|1/2), energy stretch O(1) (depending on consumption model!), worst-case degree  (|V|)
  • 82. MATRUSRI ENGINEERING COLLEGE Example 3: Delaunay triangulation  Assign, to each node, all points in the plane for which it is the closest node ! Voronoi diagram • Constructed in O(|V| log |V|) time  Connect any two nodes for which the Voronoi regions touch ! Delaunay triangulation  Problem: Might produce very long links; not well suited for power control
  • 83. MATRUSRI ENGINEERING COLLEGE Example: Cone-based topology control  Assumption: Distance and angle information between nodes is available  Two-phase algorithm  Phase 1  Every node starts with a small transmission power  Increase it until a node has sufficiently many neighbors  What is “sufficient”? – When there is at least one neighbor in each cone of angle    = 5/6 is necessary and sufficient condition for connectivity!  Phase 2  Remove redundant edges: Drop a neighbor w of u if there is a node v of w and u such that sending from u to w directly is less efficient than sending from u via v to w  Essentially, a local Gabriel graph construction
  • 84. MATRUSRI ENGINEERING COLLEGE Centralized power control algorithm  Goal: Find topology control algorithm minimizing the maximum power used by any node  Ensuring simple or bi-connectivity  Assumptions: Locations of all nodes and path loss between all node pairs are known; each node uses an individually set power level to communicate with all its neighbors  Idea: Use a centralized, greedy algorithm  Initially, all nodes have transmission power 0  Connect those two components with the shortest distance between them (raise transmission power accordingly)  Second phase: Remove links (=reduce transmission power) not needed for connectivity  Exercise: Relation to Kruskal’s MST algorithm?
  • 85. MATRUSRI ENGINEERING COLLEGE Centralized power control algorithm 1 1 2 3 4 4 A B C D E F D Topology 1 1 A B C D E F 1) Connect A-C and B-D 1 1 2 A B C D E F 2) Connect A-B 1 1 2 3 A B C D E F 3) Connect C-D 1 1 2 3 4 4 A B C E F 4) Connect C-E and D-F 1 1 3 4 4 A B C D E F 5) Remove edge A-B
  • 86. MATRUSRI ENGINEERING COLLEGE Hierarchical networks – backbones  Idea: Select some nodes from the network/graph to form a backbone  A connected, minimal, dominating set (MDS or MCDS)  Dominating nodes control their neighbors  Protocols like routing are confronted with a simple topology – from a simple node, route to the backbone, routing in backbone is simple (few nodes)  Problem: MDS is an NP-hard problem  Hard to approximate, and even approximations need quite a few messages
  • 87. MATRUSRI ENGINEERING COLLEGE Performance of tree growing with look ahead  Dominating set obtained by growing a tree with the look ahead heuristic is at most a factor 2(1+ H()) larger than MDS  H(¢) harmonic function, H(k) = i=1 k 1/i <= ln k + 1   is maximum degree of the graph  It is automatically connected  Can be implemented in a distributed fashion as well
  • 88. MATRUSRI ENGINEERING COLLEGE Start big, make lean  Idea: start with some, possibly large, connected dominating set, reduce it by removing unnecessary nodes  Initial construction for dominating set  All nodes are initially white  Mark any node black that has two neighbors that are not neighbors of each other (they might need to be dominated) Black nodes form a connected dominating set (proof by contradiction); shortest path between ANY two nodes only contains black nodes  Needed: Pruning heuristics
  • 89. MATRUSRI ENGINEERING COLLEGE Pruning heuristics  Heuristic 1: Unmark node v if  Node v and its neighborhood are included in the neighborhood of some node marked node u (then u will do the domination for v as well)  Node v has a smaller unique identifier than u (to break ties)  Heuristic 2: Unmark node v if  Node v’s neighborhood is included in the neighborhood of two marked neighbors u and w  Node v has the smallest identifier of the tree nodes  Nice and easy, but only linear approximation factor
  • 90. MATRUSRI ENGINEERING COLLEGE One more distributed backbone heuristic: Span  Construct backbone, but take into account need to carry traffic – preserve capacity  Means: If two paths could operate without interference in the original graph, they should be present in the reduced graph as well  Idea: If the stretch factor (induced by the backbone) becomes too large, more nodes are needed in the backbone  Rule: Each node observes traffic around itself  If node detects two neighbors that need three hops to communicate with each other,  node joins the backbone, shortening the path  Contention among potential new backbone nodes handled using random backoff
  • 91. MATRUSRI ENGINEERING COLLEGE Module 2: Clustering  Partition nodes into groups of nodes – clusters  Many options for details  Are there cluster heads? – One controller/representative node per cluster  May cluster heads be neighbors? If no: cluster heads form an independent set C: Typically: cluster heads form a maximum independent set  May clusters overlap? Do they have nodes in common?
  • 92. MATRUSRI ENGINEERING COLLEGE Clustering  Further options  How do clusters communicate? Some nodes need to act as gateways between clusters If clusters may not overlap, two nodes need to jointly act as a distributed gateway  How many gateways exist between clusters? Are all active, or some standby?  What is the maximal diameter of a cluster? If more than 2, then cluster heads are not necessarily a maximum independent set  Is there a hierarchy of clusters?
  • 93. MATRUSRI ENGINEERING COLLEGE Maximum independent set  Computing a maximum independent set is NP-complete  Can be approximate within ( +3)/5 for small , within O( log log  / log ) else;  bounded degree  Show: A maximum independent set is also a dominating set  Maximum independent set not necessarily intuitively desired solution  Example: Radial graph, with only (v0,vi) 2 E
  • 94. MATRUSRI ENGINEERING COLLEGE Determining gateways to connect clusters  Suppose: Cluster heads have been found  How to connect the clusters, how to select gateways?  It suffices for each cluster head to connect to all other cluster heads that are at most three hops  Resulting backbone (!) is connected  Formally: Steiner tree problem  Given: Graph G=(V,E), a subset C ½ V  Required: Find another subset T ½ V such that S [T] is connected and S [T] is a cheapest such set  Cost metric: number of nodes in T, link cost  Here: special case since C are an independent set
  • 95. MATRUSRI ENGINEERING COLLEGE Rotating cluster heads  Serving as a cluster head can put additional burdens on a node  For MAC coordination, routing, …  Let this duty rotate among various members  Periodically reelect – useful when energy reserves are used as discriminating attribute  LEACH – determine an optimal percentage P of nodes to become cluster heads in a network • Use 1/P rounds to form a period • In each round, nP nodes are elected as cluster heads • At beginning of round r, node that has not served as cluster head in this period becomes cluster head with probability P/(1-p(r mod 1/P))
  • 96. MATRUSRI ENGINEERING COLLEGE Multi-hop clusters  Clusters with diameters larger than 2 can be useful, e.g., when used for routing protocol support  Formally: Extend “domination” definition to also dominate nodes that are at most d hops away  Goal: Find a smallest set D of dominating nodes with this extended definition of dominance  Only somewhat complicated heuristics exist  Different tilt: Fix the size (not the diameter) of clusters  Idea: Use growth budgets – amount of nodes that can still be adopted into a cluster, pass this number along with broadcast adoption messages, reduce budget as new nodes are found
  • 97. MATRUSRI ENGINEERING COLLEGE Passive clustering  Constructing a clustering structure brings overheads  Not clear whether they can be amortized via improved efficiency  Question: Eat cake and have it?  Have a clustering structure without any overhead?  Maybe not the best structure, and maybe not immediately, but benefits at zero cost are no bad deal…  Passive clustering  Whenever a broadcast message travels the network, use it to construct clusters on the fly  Node to start a broadcast: Initial node  Nodes to forward this first packet: Cluster head  Nodes forwarding packets from cluster heads: ordinary/gateway nodes  And so on… ! Clusters will emerge at low overhead
  • 98. MATRUSRI ENGINEERING COLLEGE Adaptive node activity  Remaining option: Turn some nodes off deliberately  Only possible if other nodes remain on that can take over their duties  Example duty: Packet forwarding  Approach: Geographic Adaptive Fidelity (GAF)  Observation: Any two nodes within a square of length r < R/51/2 can replace each other with respect to forwarding  R radio range  Keep only one such node active, let the other sleep
  • 99. MATRUSRI ENGINEERING COLLEGE Module 3: SENSOR TASKING and CONTROL  To efficiently and optimally utilize scarce resources in a sensor network, such as limited on-board battery power supply and limited communication bandwidth, nodes in a sensor network must be carefully tasked and controlled to carry out the required set of tasks while consuming only a modest amount of resources.  For example :a camera sensor may be tasked to look for animals of a particular size and color, or an acoustic sensor may be tasked to detect the presence of a particular type of vehicle.  To detect and track a moving vehicle, a pan-and-tilt camera may be tasked to anticipate and follow the vehicle object. It should be noted that to achieve scalability and autonomy, sensor tasking and control have to be carried out in a distributed fashion, largely using only local information available to each sensor.
  • 101. MATRUSRI ENGINEERING COLLEGE TASK DRIVEN SENSING However, this classical algorithm/complexity view needs to be modified in the sensor network context because  The values of the relevant manifest variables are not known, but have to be sensed.  The cost of sensing different variables or relations of the same type can be vastly different—depending on the relative locations of targets and sensors, the sensing modalities available, the environmental conditions, and the communication costs.  Frequently the value of a variable, or a relationship between variables, may be impossible to determine using the resources available in the sensor network; however, alternate variable values or relations may serve our purposes equally well.
  • 102. MATRUSRI ENGINEERING COLLEGE TASK DRIVEN SENSING To design an overall strategy, several key questions need to be addressed:  What are the important objects in the environment to be sensed?  What parameters of these objects are most relevant?  What relations among these objects are critical to whatever high level information we need to know?  Which is the best sensor to acquire a particular parameter?  How many sensing and communication operations will be needed to accomplish the task?  How coordinated do the world models of the different sensors need to be?  At what level do we communicate information, in the spectrum from signal to symbol?
  • 103. MATRUSRI ENGINEERING COLLEGE Roles of Sensor Nodes and Utilities  Sensors in a network may take on different roles.  Consider the following example: of monitoring toxicity levels in an area around a chemical plant that generates hazardous waste during processing.  A number of wireless sensors are initially deployed in the ,  Due to the nature of the environment and the cost of deployment, further human intervention or node replacement is not feasible.  The sensors form a mesh network, and data collected by a subset of nodes is transmitted, through the multi-hop network.
  • 105. MATRUSRI ENGINEERING COLLEGE INFORMATION BASED SENSOR TASKING Sensor selection Information driven sensor query (IDSN) Cluster-leader based Protocol Leader election protocol Sensor tasking in tasking relations
  • 109. MATRUSRI ENGINEERING COLLEGE JOINT ROUTING and INFORMATION AGGREGEATION
  • 110. MATRUSRI ENGINEERING COLLEGE JOINT ROUTING and INFORMATION AGGREGATION Moving center of Aggregation Locally optimization Simulation Experiments Multi step information-Directed Routing Sensor Group management Distributed group management
  • 111. MATRUSRI ENGINEERING COLLEGE UNIT V : SURVEY OF SECURITY PROTOCOLS INTRODUCTION Advancements in wireless communications, low-power electronics, battery technology, and power harvesting capabilities have enabled the development of low-cost WSNs. WSNs are characterized by limited power, unreliable communication, need for self-configuration and scalability, harsh environmental conditions, small size, cooperative network behavior, data centricity (as opposed to address centricity), very small packet size, unattended operation, and random deployment. Given those characteristics, the most common WSN applications are environmental monitoring, health monitoring, terror threat detection, terrestrial and underwater habitat monitoring, military surveillance, seismic oil and gas explorations, inventory tracking, process monitoring, acoustic detections, object localization and tracking, homeland security protection, disaster prevention and disaster recovery, and pipelines corrosion detection. Figure 1. shows an example of WSN architecture. Each node consists of a sensing unit, a processing unit, a communication unit, a battery, and a power harvester
  • 112. MATRUSRI ENGINEERING COLLEGE CONTENTS  Security Architectures  Survey of Security protocols for Wireless Sensor Networks  Comparisons OUTCOMES  Evaluate concepts of security in sensor networks
  • 113. MATRUSRI ENGINEERING COLLEGE A typical sensor network and components of a sensor node
  • 114. MATRUSRI ENGINEERING COLLEGE Problems Applying Traditional Network Security Techniques  Sensor devices are limited in their energy, computation, and communication capabilities  Sensor nodes are often deployed in open areas, thus allowing physical attack  Sensor networks closely interact with their physical environments and with people , posing new security problems
  • 115. MATRUSRI ENGINEERING COLLEGE Key Establishment and Trust  Sensor devices have limited computational power, making public-key cryptographic primitives too expensive in terms of system overhead  Simplest solution is a network-wide shared key  Problem: if even a single node were compromised, the secret key would be revealed, and decryption of all network traffic would be possible  Slightly better solution:  Use a single shared key to establish a set of link keys, one per pair of communicating nodes, then erase the network-wide key  Problem: does not allow addition of new nodes after initial deployment
  • 116. MATRUSRI ENGINEERING COLLEGE Random-key pre-distribution protocols  Large pool of symmetric keys is chosen  Random subset of the pool is distributed to each sensor node  To communicate, two nodes search their pools for a common key  If they find one, they use it to establish a session key  Not every pair of nodes shares a common key, but if the key- establishment probability is sufficiently high, nodes can securely communicate with sufficiently many nodes to obtain a connected network  No need to include a central trusted base station  Disadvantage: Attackers who compromised sufficiently many nodes could also reconstruct the complete key pool and break the scheme
  • 117. MATRUSRI ENGINEERING COLLEGE Secrecy and Authentication  We need cryptography as protection against eavesdropping, injection, and modification of packets  Trade-offs when incorporating cryptography into sensor networks:  End-to-end cryptography achieves a high level of security but requires that keys be set up among all end points and be incompatible with passive participation and local broadcast  Link-layer cryptography with a network-wide shared key simplifies key setup and supports passive participation and local broadcast, but intermediate nodes might eavesdrop or alter messages
  • 118. MATRUSRI ENGINEERING COLLEGE Hardware vs. Software Cryptography  Hardware solutions are generally more efficient, but also more costly ($)  University of California, Berkeley, implementation of Tiny Sec incurs only an additional 5%–10% performance overhead using software-only methods  Most of the overhead is due to increases in packet size  Cryptographic calculations have little effect on latency or throughput, since they can overlap with data transfer  Hardware reduces only the computational costs, not packet size  Thus, software-only techniques are sufficient (or reasonable to be more careful)
  • 119. MATRUSRI ENGINEERING COLLEGE Privacy  Issues  Employers might spy on their employees  Shop owners might spy on customers  Neighbours might spy on each other  Law enforcement agencies might spy on public places  Technological improvements will only worsen the problem  Devices will get smaller and easier to conceal  Devices will get cheaper, thus surveillance will be more affordable
  • 120. MATRUSRI ENGINEERING COLLEGE  Sensor networks raise new threats that are qualitatively different from what private citizens worldwide faced before  Sensor networks allow data collection, coordinated analysis, and automated event correlation  Networked systems of sensors can enable routine tracking of people and vehicles over long periods of time  EZ Pass + On Star == Big Brother?  Suggested ways of approaching solution include a mix of:  Societal norms  New laws  Technological responses Privacy(Contd)
  • 121. MATRUSRI ENGINEERING COLLEGE Network Security Services  So far, we’ve explored low-level security primitives for securing sensor networks.  Now, we consider high-level security mechanisms.  Secure group management  Intrusion detection  Secure data aggregation
  • 122. MATRUSRI ENGINEERING COLLEGE Secure Group Management  Protocols for group management are required to  Securely admit new group members  Support secure group communication  Outcome of group computation must be authenticated to ensure it comes from a valid group  Any solution must also be efficient in terms of time and energy
  • 123. MATRUSRI ENGINEERING COLLEGE Intrusion detection  In wired networks, traffic and computation are typically monitored and analyzed for anomalies at various concentration points  Expensive in terms of the network’s memory and energy consumption  Hurts bandwidth constraints  Wireless sensor networks require a solution that is fully distributed and inexpensive in terms of communication, energy, and memory requirements  In order to look for anomalies, applications and typical threat models must be understood  It is particularly important for researchers and practitioners to understand how cooperating adversaries might attack the system  The use of secure groups may be a promising approach for decentralized intrusion detection
  • 124. MATRUSRI ENGINEERING COLLEGE Secure Data Aggregation  One benefit of a wireless sensor network is the fine-grain sensing that large and dense sets of nodes can provide  The sensed values must be aggregated to avoid overwhelming amounts of traffic back to the base station  Depending on the architecture of the network, aggregation may take place in many places  All aggregation locations must be secured  If the application tolerates approximate answers, powerful techniques are available  Randomly sampling a small fraction of nodes and checking that they have behaved properly supports detection of many different types of attacks
  • 125. MATRUSRI ENGINEERING COLLEGE Conclusions  Constraints and open environments of wireless sensor networks make security for these systems challenging.  Several properties of sensor networks may provide solutions.  Architect security into these systems from the outset (they are still in their early design stages)  Exploit redundancy, scale, and the physical characteristics of the environment in the solutions  Build sensor networks so that they can detect and work around some fraction of their nodes which are compromised