WIRELESS SENSOR NETWORK
-
Upload
tejas-wasule -
Category
Technology
-
view
1.598 -
download
2
description
Transcript of WIRELESS SENSOR NETWORK
Wireless Sensor Network & Security
TEJAS WASULE(IT 2nd Year)
SURAJ JAIWAL(IT 2nd Year )
Presented by-
What is Wireless Sensor Networks?
WSN combines sensing, computation, and communication into single tiny device called sensor node.
Group of sensors linked by wireless media to perform distributed sensing task
What is Sensor Node?Sensor is a device, which senses
information and passes it to the mote.
Figure : Wireless sensor network device
Progression of Sensor Technology
Figure : Progression of sensor technology (motes) over time
Architecture of a Sensor Node
A Power unit (Battery) Computational logic & Storage Sensor Transducer Communication
Components of Sensor Node 1. HARDWARE
Architecture of a Sensor Node
Figure : The architecture of a sensor node.
Contd..
2. SOFTWARE
Operating System MicrocodeSensor DriversCommunication ProcessorsCommunication DriversData Processing Mini-Apps
Specific Sensor NodeSensor Node:
Processor: 4MhzMemory: 128KB Flash & 4KB RAMRadio: 916Mhz and 40Kbits/second.Transmission Range: 100 Feet
TinyOS: Operating System(small) Open Source Energy Efficient
Available Wireless Technologies
Available Wireless Technologies
Standard Data Rate Range Power Consumption
ZigBee
(802.15.4)20 kbps to
250 kbps
Up to 10 m Ultralow
Bluetooth
(802.15.1)
Up to 3 mbps 1m to 100 m low
Wi-Fi
(802.11)
54 mbps 45 m to 90 m
Medium
Contd…
Need of Security
WSNs are becoming a cost effective, practical way to go about deploying sensor networks.
Protecting confidentiality, integrity and availability of communications.
Large range of applications from civilian to military purposes.
Need of Security
• Obstacles: Very-Limited Resources Unreliable Communication Unattended Operations
• Attacks: Sybil Attack Traffic Analysis Attacks
Need of Security• Attacks
:1) Sybil Attack:
Introduced by “Brain Zill” in 2002Subverted by Foreign identities in peer-to peer Network
2) Traffic Analysis
Intercepting & Examine messages to deduce info. from patterns in Communications.
Able to detect Encrypted messages but Not able to Decrypt it.
Security for Sensor Network SMACS :
Self organizing medium access control for sensor networks.
Encryption:Encoding info. in such a way
that hackers can’t read it, but authorized one can.
Cryptography & Steganography:
Techniques for Secure Communication in presence of Third parties.
Application of WSN
Home and Office Applications
Environmental Applications
Medical & Health Applications
Military Applications
Advantages
Implementation cost is cheaper
than wired network
Ideal for non-reachable places
It avoids hell lot of wiring
It can accommodate new devices
at any time
Disadvantages
Less secure because hacker's laptop can act as Access Point.
Lower speed as compare to wired networks.
Affected by surrounding. E.g.: walls (blocking), microwave oven , far distance
Conclusion
The low cost, flexibility, fault tolerance, high sensing fidelity and rapid deployment makes way for new applications on remote sensing.
Realization needs to satisfy the constraints such as scalability, topology changes, power consumption, environment etc.
New wireless ad hoc networking techniques are required to overcome this constraints.
References
Wireless Sensor Network (KAZEM SOHRABY, DANIEL MINOLI, TAIEB ZNATI)
System Architecture for Wireless Sensor Networks (Jason Lester Hill)
http://today.cs.berkeley.edu/800demo/.s
http://www.powerstream.com http://www.wikipedia.com
THANK
YOU..!
.....?