Free Essay

Wireless Sensor Networks

In:

Submitted By kiprotich
Words 5106
Pages 21
SECURE ROUTING IN WIRELESS SENSOR NETWORKS
By [Name]

The Name of the Class (Course)
Professor (Tutor):
The Name of the School (University):
The City and State
The Date:

Abstract.
Wireless sensor networks (WSANs) are a group of sensors and actors that are linked by a wireless medium for the purpose of performing distributed sensing and action on a given task. This involves the sensors collecting information about the surrounding physical environment and sending the information to the actors which take the decisions and perform some needed action basing on the information received from the sensors about the surrounding environment. These sensor networks are sometimes referred to as wireless sensor and actuator networks. They monitor physical or environmental conditions such as sound, pressure, temperature among others and send the collected data to the required location. Effective sensing and acting requires a distributed local coordination methods and mechanism among the sensors and the actors in addition to this, sensor data should be valid in order for right and timely actions to be performed. This paper describes secure routing in wireless sensor networks and outlines its threats on security.

Keywords: Wireless sensor and actor networks; Actuators; Ad hoc networks; Sybil attack; Real-time communication; Sinkhole; Routing; MAC; adversary.

Introduction
With the recent rapid improvement on technology, many networking technologies have been created to make communication easy. One such technology is distributed wireless sensor network which has a capability of observing the physical world and process the data and in addition make decisions basing on the collected data and perform actions basing on this. Wireless sensor networks (WSNs) are rapidly growing and have emerged as one of the important area in mobile computing. Its applications of WSNs are numerous and growing fast with time. Its applications are increasing and are currently deployed in both home and offices and also outdoor such as mapping the territory of an enemy in battle ground as mentioned by (Akyildiz et al 2002). It is used in am military environment; the technology is used to detect the enemy soldiers and trucks. They are also used also in healthcare for detecting intruders mostly on healthcare of the elderly; they are connected to the wireless home security systems.
Routing security of the wireless networks is always considered in the above mentioned scenarios and the accuracy of relaying information is always the target after and during the deployment of the wireless systems. A lot of the routing protocols have been designed and deployed in the market each focusing on security as an objective of obtaining its optimum user requirements. However, none of the systems have been able to achieve the goal of security. Many security challenges still exist that expose this technology to threats. This is due to combined threats which are as a result of physical security and lack of adequate resources which motivate the intruders who may compromise the sensor nodes if the system is not secure enough.
The primary goals of wireless secure networks are data authentication, data confidentiality, data integrity, and data availability.
Data authentication will ensure that the message being transmitted is reliable; this is achieved by identifying the place that the transmitted message originates from. This ensures that alteration of the packets by an adversary is avoided. Adversary may inject the wrong or additional packets to the message and the only way of identifying this is by identifying the origin of the message. Authentication of data is achieved by sending and receiving nodes sharing the secret codes or keys. It is however very difficult in wireless network to attain authenticity of the information due to the nature of wireless network.
Confidentiality of data on the other hand involves the transmitted information being hidden or concealed so that an attacker is not aware of the message being transmitted from the network therefore shielding the attacker from compromising the information.
Another key important goal is data integrity. This ensures that the data is reliable and has not been tempered with or altered in any way. According to Shanmugapriya and Padmavathi (2009), even if the network has all the confidentiality measures, there is still a possibility that data integrity can be compromised by alteration. Alteration of information can render the data useless due to its unreliability.
Data availability is also another key important aspect of a wireless sensor network. It determines the availability of the network resources to communicate. Failure of a node or a base station will lead to the failure of the entire network and therefore operations in the network will be rendered unavailable.
Other goals of WSNs involve the freshness of the data; this is achieved by ensuring that the data in the network is as recent and updated as possible. Data freshness ensures that the old messages are not replayed in the network. Independence of the network also ensures that every sensor self-organizes itself and is as flexible as possible; this allows self-healing after the attack. The main aim in WSNs is secrecy and authentication, since most of these sensor networks and various applications that relies in these networks requires protection against various challenges as far as security is concerned such as malicious injections, eavesdropping and packet modification, encryption of the packets is the best approach to fight back against these emerging threats. This ensures that high level of security is achieved by the keys being set to decrypt the information on the other end. Methods such as link layer cryptography for instance ensures that there is one key which simplifies the key setup. Another issue which the wireless sensor networks try to address is privacy. The above mentioned goals are however facing various challenges from the attacks and injections carried out by adversaries on the network. Various protocols have been defined to try to reduce these challenges in the wireless sensor networks.
Research Methods
3.1 Introduction
Research Methods
This chapter discusses the methodological approaches that will be used in investigation of secure routing in wireless sensor networks. The chapter will describe the research design, comparative analysis, statistics of survey, techniques that will be used for data gathering, and data analysis techniques. The chapter will also tackle the basic issues security issues that will be covered in the study.

In the sections that follow I will be presenting the routing protocols and the security challenges experienced by wireless sensor networks and at the end give secure measures of addressing these issues.
Routing is the process of selecting best path in a network where messages are passed from one node to another until the message reaches the intended destination. A protocol on the other hand is the set of rules that communicating nodes must adhere to in a network. Routing in WSNs differ from that of wired networks in many ways, this is due to the lack of infrastructure and the unreliability of the wireless links which may cause communication to fail. The wireless network uses less energy and therefore routing protocols defined must meet this requirement. This has led to the development of the routing algorithm to meet these challenges in the wireless network environment. These protocols have been categorized into seven categories as I will describe below.

Routing Protocols
Location based protocols This protocol is location based where the sensor nodes are addressed by location information. The information about the location of the sensor nodes is requested by the protocol and the distance between two nodes which are specified calculated basing on this information. The consumption of the energy is then estimated basing on the result obtained from the calculation. Examples of location based protocols are: Geographic Adaptive Fidelity (GAF), Geographic and Energy-Aware Routing (GEAR), Coordination of Power Saving with Routing, Geographic Random Forwarding (GeRaF) among others. Geographic adaptive fidelity (GAF) is a routing protocol which considers energy usage in the transmission of packets across the network. This protocol turns off some sensors it deems as unnecessary and in the process ensures that routing is as constant and uninterrupted as possible between the communicating sensors. This protocol enrolls division of sensor field into squares and location information of each sensor will be used by that particular sensor. The location information can be provided by location systems such as GPS for instance and therefore the sensor is able to associate itself with a given grid that it is located at. Geographic Energy aware routing protocol on the other hand is also an energy conscious protocol which routes packets to targeted destination within the sensor field. Sensors have location hardware such as GPS systems which allows the sensors to know and identify their locations. The sensors are able to keep track of their energy as well the energy of their neighbors. This protocol uses recursive forwarding algorithm which is based on geographical location to transfer packets around the mapped region.
Coordination of power saving with routing is a protocol which reduces how the WSNs consume the energy by managing the individual nodes consumption of power. This is achieved by turning the idle radio off. Unlike the first two protocols, this protocol does not require the nodes to know their location
Geographical Random forwarding stated by Singh et al (7) uses routing based on the geographical location where the relaying sensor is hidden before the sending of packets. This method is called best effort forwarding scheme since the sender cannot be guaranteed that the message will reach its destination referred to as the sink. This protocol assumes that all the sensors are aware of their physical locations and the location of the destination sensor.
Data-Centric protocols
In these protocols, the intermediate sensor performs some activities on the data which originate from multiple source sensors as soon as the source sensors send the data to the sink the aggregated data is then sent to the sink. This process saves the energy due to less transmission from source to the destination. Some of the protocols in this category are: Sensor Protocols for Information via Negotiation (SPIN), Directed diffusion, Rumor routing and cougar among others Sensor Protocols for information via negotiation (SPIN) has been designed to overcome the problems that might be caused by flooding such as implosion and overlap, this protocols are adaptive to the resources in the network and are able to compute the required energy for sending and receiving data in the network, in addition to this intelligence this protocol can make decisions on how the resources are to be utilized in the network. This protocol is based on negotiation and adaptation mechanism, this is achieved by enabling the sensors to negotiate with each other before the data can be sent in order to avoid redundancy.
User and application programs are given queries generated by the source sensors are provided by this approach. This provides abstraction which protects the user from knowing how the queries are to be executed. Due to in- network processing, the total energy consumption is greatly reduced thus enhancing the network lifetime.
Rumor routing on the other hand is a scheme efficient if the number of queries is in between two intersection points of a routing curve with those of flooding query and event query (Singh et al 71). This protocol is based on agent concept where a long-lived packet in a network informs each sensor the events that it has learned during the process of traversing the network. This occurs for several hops after which the agent dies. When an agent encounters a sensor in its path, it synchronizes its events according to the encountered agent and updates the event list when it encountered agent to obtain the shortest possible path in the network.
Directed diffusion protocol fulfils the requirement of energy saving and efficiency as required by the wireless routing networks, other key advantages of this protocol are scalability and robustness. It has several key elements such as data naming gradients among others. In this protocol, the sinks identifies a low data rate for the incoming activities, the sinks can then reinforce one selected sensor and appoints it to send events that contains bigger data rate. This is done by resending the message which had been sent before and representing the resend message with a smaller interval.
Attacks on wireless sensor networks
Wireless networks are a great challenge since the channel is open therefore it can be accessible to anyone. This makes the network vulnerable to attacks at any time. Attacks on the wireless sensor networks can be categorized as either active or passive
Passive attacks are the kind of attacks in which the main aim of the attacker is to obtain information for the network without being detected. The attacker remains undiscovered and quietly while collecting large volumes of information from the network. The collected information can be used to perform other activities in the network by the attacker. This kind of attack is very hard to be detected since they are normally quiet in nature. Active attacks on the other hand are the opposite of the passive attacks. It involves the exploiting the weaknesses of the security in the wireless network in an attempt to launch attacks against the network by modifying the packets and messages through injection of malicious codes. This kind of attack is severe since it may bring the entire network to a standstill.
Attacks can also be classified as internal or external
External attacks are attacks launched from outside the network. These modes of attack are usually not so dangerous to the network. Internal attack on a network on the other hand is a kind of attack that is carried out in between the network. The attacker may obtain credentials from the people inside the network and use it to attack the sensors. This type of attack is severe and may lead to great loss.
Sinkhole Attack
This type of attack is a type of attack in which compromised node tries to attract network traffic by advertising its fake routing update. This attack can be used to launch other types of attacks and therefore makes it a dangerous attack. This attack can be used to launch attacks such as forwarding or spoofing attacks. This attack however is difficult to carry out since there is no way of creating effective malicious node in the network in addition of the difficulty of creating this malicious node, it is hard to select the node at a given time if it is managed to be created.
This attack is an insider attack in which an intruder compromises a node inside a network therefore allowing him to launch attack. This attack makes the node try to attract all the traffic from neighboring nodes basing on a certain formula defined in the protocol. This attack is made possible by the communication pattern used by wireless sensor networks that allows each node to communicate with a base station by each sending data thus making the wireless sensor network vulnerable to this type of attack.

The figure below elaborates on this mode of attack on WSN

The above attack depicted in the diagram is available in Minroute protocol. This type of attack is mainly targeted on wireless sensor network due to its small storage capacity and the little amount of computed power it requires and can therefore work under limited power supply. It chooses the best route by using the quality of the link as its metric therefore allowing it to send packets to the base station this is according to Krontris et al (15).
Another type of sinkhole attack is based on TinyAODV protocol, this bases its attack on the routing metric and number of hops to the base station that are used in this protocol. Route from source to the destination gets created as one node sends packets while the next the next node reply with route reply packet and this fails, the packet gets forwarded to other nodes close to the destination until the source node receives the reply. The node with minimum number of hops to the destination is then selected by the source node. This can be compromised by launching an attack through sending of reply packet. This Reply Route Packet will give a small number of hopes that shows the closer proximity to the base station. This is the sinkhole node; the source then decides to forward the packets to this sinkhole node. Thus the same sinkhole node performs the same to the neighboring nodes by attracting highest possible traffic. This type of attack is depicted in the diagram below

To detect a sinkhole attack some approaches have been defined this are listed as anomaly based, rule based, statistical approaches and cryptographic key management.
In anomaly based detection method, it involves searching of anything that appears to be abnormal in the network. If anything appears to be abnormal it is then listed as possible threat and analysis carried out. Rule based and statistical approaches are subset of the anomaly based detection approaches according to Chaudhry et al (9).
Rule based approach on the other hand concentrates on the definition of rules that are based on the techniques which are used by the attacker to launch the attacks. The rules are set on the intruder detection system that runs on each node. Any node is considered as an attacker that violates the set rules. Statistical approaches associates recorded activities of a node to a particular node such as comparing the normal threshold with the recorded activity of the node. If the particular node whose data is being monitored seems to show a strange behavior as per the statistics, it will then be considered as an adversary. This may include an abnormal cpu usage and depletion of the resource. Cryptographic approach on the other hand checks the integrity and authenticity of all the packets travelling within various nodes in the network and ensures that they are protected from an adversary by use of encryption and decryption keys. To access the message travelling across the network, the decryption key is required; this will ensure that even a slight modification of the message is detected.
Hybrid approach is a combination of cryptographic and anomaly based approaches and involves the reduction of the false positive reports produced by the anomaly based approach. This method has an advantage over other methods of detection in that it is able to detect any suspicious node incase it fails to transmit the signature or include it in its database.

Wormhole attack
In this type of attack, the attacking node captures the packets form one location then transmits the captured packets to a node that is located at a distance which will distribute these packets locally. This attack can easily be launched with less knowledge of the network. This attack is dangerous when launched against ad hoc network routing protocols since the nodes which come into contact or hear the transmitted packet consider them to be from their neighboring node. This involves recording of the traffic from one region in the network and replaying them in a different location. The severity of this attack is due to the fact that is hard to be detected. This attack takes advantage of the transmission over large area which in turn attracts other nodes. The diagram below describes the wormhole attack on a wireless ad-hoc network

A warmhole attack is detected by use of packet leashes where a temporal packet leash places a bound on the lifetime of the packet therefore restricting the travel distance of the packet. The sending node includes the time of transmission and the information about the location of the packet in the message. The receiver then checks this information included in the packet and compares it with the distance that the packet has travelled from source to the destination and the time that the packet took to travel from source to the destination. Synchronized clocks are therefore required due to the very high speeds that radio signals travel taking into consideration that radio signals travel at a speed of light.
To prevent this mode of attack, nodes need to maintain accuracy of information of their neighbors. The neighbors here are the nodes within a single hop. Messages from non-neighboring nodes get ignored by the receiving node, securing the protocol used in maintaining the neighboring node is also vital since the protocol itself might be vulnerable to the wormhole. This can be done by designing a neighborhood discovery protocol which in itself is not vulnerable to these attacks. (Hu et al [2]).
Denial of service attacks (DoS)
This attack is caused by launching attacks on the nodes; this type of attack is meant to disrupt the way in which data is being relayed in the medium, destroy or make the delivery of the service unbearable. Several methods of DoS attacks can be used and may be jamming or tempering of the normal transfer of packets by flooding and causing desynchronizing the flow of packets around the network.
To avoid this method of attack in the network, strong authentication and identification of traffic methods should employed in the network.

Sybil attacks
This is an attack in which the reputation system is subverted by the foreign entities mostly in peer-to- peer networks.
The scale of decentralized distributed system being in an increase, it has become the norm for the presence of malicious behavior. Most network designs against malicious behaviors depend on certain amount of nodes in the system being in their good transmission mode. Malicious user can take multiple identities and in the process pretend to be multiple distinct nodes which always referred to as Sybil nodes or Sybil identities in a system. The malicious user can then be able to overwhelm the genuinely honest users and break the defense against the abnormal behaviors in the system. This is the removal of primary defensive mechanism that the system had employed to guard against malicious system intrusion.
To detect this type of attacks, many methods have been devised. These methods include directional antenna, propagation model, testing of the resource, detecting and localizing nodes, cryptography and timestamp series. Timestamp series approach defends a network against Sybil attack basing on the unit support. Packets are send by a node contains timestamps which are issued to the packets. Sybil attack is detected by checking on the timestamps on the sent message and if there are many similar timestamps, then there is a possible scenario of a Sybil attack on the network. This technique is however difficult to use and is not a very suitable method of detecting this kind of attack on a network. Another method which has been designed for detection of the Sybil attack is the public key cryptography. This method identifies the possibility of a Sybil attack by using a public key cryptography and authentication method. In this method, signatures and digital signatures are combined and regions defined where the nodes in one region are able to communicate to one another using secure channels and in the process monitor the issued certificates in every broadcast message. This makes sure that only those messages with valid certificates are considered as relevant while those with the invalid certificates are ignored during the process. These certificates are changed after a while to avoid insecurity and maintain privacy in the network. The detection and localization node on the other hand is a technique which is based on finding the physical location of nodes and compares it with the position of the packet.
In resource testing technique method, it is assumed that every entity has limited facilities as far as computational resources are concerned. Sybil attack is detected by checking the radio resources since each node should have only one radio resource and therefore cannot send or receive more than one channel at a time. This method is however not accurate since an attacking node can have more resources that the genuine node. Propagation model technique on the other hand by comparing and matching the signal power with the position that the signal is. The signal power can then be used to calculate the position of the node and if they do not match then it is considered as a possible Sybil attack.
This technique however, may not be an accurate one for detecting an attack since the malicious node might propagate the signal in the same speed as the other nodes in the network making detection impossible.
Bi-directional antenna method is a technique which checks the direction of the arriving packets and identifies if the message is originating from a forged neighbor or it is from the real neighbor.

Selective forwarding attack
In this type of attack, the node selectively drops the packets that are sensitive. This type of attack are effective when attacking nodes and the only ones included on the path of the message flow thus they are able to corrupt the existent routing protocols especially when combined with other attack methods for example sinkhole and wormhole attacks. Multipath forwarding can be used to counter this attack although the multipath forwarding strategy suffers from weaknesses in itself; these weaknesses include increase in the number paths and poor security resilience.
Other attacks on WSNs
Message Corruption
In this Kind of attack, the attacker compromises the message by modifying the content of the message leading to inaccuracy, this leads to loss of integrity.

False Node attack
In this method of attack, the adversary adds an additional node and uses this node to inject malicious content into the network. This node might prevent the passing through of the intended data and rather use the malicious one to pass the wrong data. This attack is one of the most dangerous kind of attack since the injected data might spread all over the network therefore the entire network might be destroyed. The attacker might as well take over the network after this code has taken over the network.

Node malfunction and node outage
Node malfunction occurs when the node in a network fails to function correctly therefore leading to transmission of the wrong data over the network. This will make the level of integrity of the entire network exposed. Node outage on the other hand refers to the vent where a node completely stops its operation. A sensor network should provide an alternative route as a solution to this kind of an issue in case it arises.

Node Replication attack.
This occurs when an attacker adds a node to a sensor network. This is achieved by copying the NodeID of an existing node in the network. This replicated node can then be used by an adversary to cause havoc in the entire network. The attacker for example can use this replicated node to disrupt the performance of the network by corrupting or misrouting the data or messages in the network. This kind of attack can bring the entire network totally to a halt or give false sensor reports.

Passive information Gathering Attack
In this method of attack, an adversary collects the information from the network. This is normally carried out if the information transferred over the network is not encrypted. An adversary with a powerful receiver and a sophisticated antenna easily receives the data traversing the network. This information can contain the location of the nodes which may allow the attacker to launch an attack and bring them down. Critical information about the network such as Network ID and timestamps can also be obtained from this mode of attack.

Spoofing attacks
In this mode of attack, an adversary performs a direct attack against specified routing protocols therefore targeting the information that is being routed in the network between different nodes, this may allow the adversary to create routing loops which degrades the network by increasing latency or even partition it completely.

Eavesdropping and monitoring.
This occurs by an adversary secretly listening or snooping on the data in a network. This may allow the attacker to acquire the information being transferred over the network about the sensors or the message itself. This infringes on the privacy of the network therefore rendering the network insecure.

Conclusion
Security is a major concern in the design and implementation of Wireless sensor networks. This is due to the application of this type of network since a high level of security is required. In the above article the solution of the security issues are given despite the fact that research should be conducted in a continuous manner in order to come up with the best methods of eliminating challenges which arise with the implementation of these networks. The wireless sensor networks are still in the early stages of development and research is ongoing to bring forth the protocols that will curb the security threats in the network while maintaining the efficiency of all the network resources.

References
Al-Karaki, J.N. and Kamal, A.E., 2004. Routing techniques in wireless sensor networks: a survey. Wireless communications, IEEE, 11(6), pp.6-28.
Bala, R. and Singh, Y., 2015. Secure Routing in Wireless Sensor Network.International Journal for Innovative Research in Science and Technology,2(1), pp.301-307.
Chaudhry J. A, Tariq U. Amin M. A. Rittenhouse R. G.
Chris K, Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures (p.6).
Deng, H., Li, W. and Agrawal, D.P., 2002. Routing security in wireless ad hoc networks. Communications Magazine, IEEE, 40(10), pp.70-75.
Deng, J., Han, R. and Mishra, S., 2006. INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer Communications, 29(2), pp.216-230.
El-Bendary, N.M.M. and Amer, F., 2008. Secure Routing for Wireless Sensor Networks.
I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam, E. Cayirci (2001). Wireless sensor networks: a
Survey (p. 395).
Singh K, Singh. M. P. D K Singh (2010). Routing Protocols in Wireless Sensor Networks – A
Survey (p. 66-72)
Perrig, A., Stankovic, J. and Wagner, D., 2004. Security in wireless sensor networks. Communications of the ACM, 47(6), pp.53-57.
Siahaan, I. and Fernandes, L., 2008. Secure Routing in Wireless Sensor Networks. University of
Trento. http://dit. unitn. it/~ fernand/downloads/IWSNSlides. pdf. pp.7
Sulaiman, M.M. and Baig, M.J., Secure Routing in Wireless Sensor Network.

Contents Abstract. 2 Introduction 2 Routing Protocols 6 Location based protocols 6 Data-Centric protocols 7 Attacks on wireless sensor networks 8 Sinkhole Attack 9 Wormhole attack 12 Denial of service attacks (DoS) 14 Sybil attacks 14 Other attacks on WSNs 16 Message Corruption 16 False Node attack 17 Node malfunction and node outage 17 Node Replication attack. 17 Passive information Gathering Attack 18 Spoofing attacks 18 Eavesdropping and monitoring. 18 Conclusion 18 References 20

Similar Documents

Free Essay

Wireless Sensor Network

...Wireless Sensor Networks and Their Usage Ali Raza,Shahid Rasheed & Shazib Javeed University Of Central Punjab Abstract Innovations in industrial, home and automation in transportation represent smart environments. Wireless Sensor Networks (WSNs) provide a new paradigm for sensing and disseminating information from various environments, with the potential to serve many and diverse applications Networks (WSN), where thousands of sensors are deployed at different locations operating in different modes .WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication capability and sufficient intelligence for signal processing and networking of the data. Wireless Sensor Networks (WSN) are used in variety of fields which includes military, healthcare, environmental, biological, home and other commercial applications. With the huge advancement in the field of embedded computer and sensor technology, Wireless Sensor Networks (WSN), which is composed of several thousands of sensor nodes which are capable of sensing, actuating, and relaying the collected information, have made remarkable impact everywhere? Key Words Wireless Sensor Network (WSNs) Structural Health Monitoring (SHM) Micro Electro-Mechanical Systems (MEMS) Introduction Sensor network is capable of sensing, processing and communicating which helps the base station or command node to observe and react according to the condition in a particular environment (physical...

Words: 2659 - Pages: 11

Free Essay

Routing in Wireless Sensor Networks

...Routing in Wireless Sensor Networks: application on Fire Detection Abstract: this paper is about fire detection in building using a modified APTEEN routing protocol. Here we design a system called iFireControl which is a smart detection system for buildings, which is more water efficient than many current systems, while keeping its robustness. introduction A Wireless Sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enabling control of sensors activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; nowadays such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, Agriculture, Area Monitoring, Smart Home Monitoring, Seismic Monitoring etc. Wireless Sensor Networks provide a bridge between the real physical and virtual worlds; allow the ability to observe the previously unobservable at a fine resolution over large spatio-temporal scales. The WSN is built of “nodes” from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a...

Words: 4845 - Pages: 20

Free Essay

Prolonging the Lifetime of Wireless Sensor Network.

...INTRODUCTION Wireless Sensor Networks (WSNs) are distributed embedded systems composed of a large number of low- cost, low-power, multifunctional sensor nodes. The sensor nodes are small in size and communicate wirelessly in short distances. These tiny sensor nodes can perform sensing, data processing and communicating. They are densely deployed in the desired environment. A sensor network consists of multiple detection stations called sensor nodes, each of which is small, lightweight and portable. Every sensor node is equipped with a transducer, microcomputer, transceiver and power source. The transducer generates electrical signals based on sensed physical effects and phenomena. The microcomputer processes and stores the sensor output. The transceiver, which can be hard-wired or wireless, receives commands from a central computer and transmits data to that computer. The power for each sensor node is derived from the electric utility or from a battery. Sensors use a signal of some sort, from the environment and convert it to readable form for purpose of information transfer. Each sensor node has multiple modalities for sensing the environment such as acoustic, seismic, light, temperature, etc. However, each sensor can sense only one modality at a time. The sensor nodes in the target tracking WSN use collaboration with the neighboring nodes. This requires data exchange between sensor nodes over an ad hoc wireless network with no central coordination medium. There...

Words: 1981 - Pages: 8

Premium Essay

Wireless Sensor Network Case Study

...MAXIMIZATION IN WIRELESS SENSOR NETWORK USING NODE ENERGY BASED SCHEDULING METHOD Jency. J1,Anita Christy angelin2, 1PG Scholar/Department of CSE, Karunya University,Coimbatore-India. 2Assistant Professor/Department of CSE, Karunya University, Coimbatore-India. ---------------------------------------------------------------------------------------------------------------- Abstract—Wireless sensor networks consist of large number of battery powered wireless sensor nodes. A major key issue in WSNs is to reduce the energy consumption while maintaining the normal functions of WSNs. Many different methods are used to reduce the energy consumption in the wireless sensor networks. If the node is not able to send a packet to the...

Words: 2807 - Pages: 12

Free Essay

Simulation and Research on Data Fusion Algorithm of the Wireless Sensor Network Based on Ns2

...2009 World Congress on Computer Science and Information Engineering Simulation and Research on Data Fusion Algorithm of the Wireless Sensor Network Based on NS2 Junguo Zhang, Wenbin Li, Xueliang Zhao, Xiaodong Bai, Chen Chen Beijing Forestry University, 35 Qinghua East Road, Haidian District,Beijing, 100083 P.R.China information which processed by the embedded system to the user terminals by means of random selforganization wireless communication network through multi-hop relay. Thus it authentically achieves the purpose of ‘monitor anywhere and anytime’. The basic function of sensor network is gathering and sending back the information of the monitoring areas which the relevant sensor nodes are set in. But the sensor network node resources are very limited, which mainly embodies in battery capacity, processing ability, storage capacity, communication bandwidth and so on. Because of the limited monitoring range and reliability of each sensor, we have to make the monitoring areas of the sensor nodes overlapped when they are placed in order to enhance the robustness and accuracy of the information gathered by the entire network. In this case, certain redundancy in the gathered data will be inevitable. On the way of sending monitoring data by multi-hop relay to the sink nodes (or base stations) which are responsible to gather the data. It is necessary to reduce the redundant information by fusion processing. Data fusion is generally defined as a process...

Words: 3532 - Pages: 15

Free Essay

Hybrid Security Approach for Nodes Authentication in Wireless Sensor Network Using Cellular Automata

.... . . . . . . . . . . . 2 3 3 4 4 4 5 6 7 7 8 8 9 . . . . . . . . . . . . . . . . . . . 10 2 Introduction 3 Wireless Sensor Network 3.1 The Basics of WSN . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1.1 3.1.2 3.1.3 3.2 3.3 3.4 Components of Sensor Nodes . . . . . . . . . . . . . . . . Key Features . . . . . . . . . . . . . . . . . . . . . . . . . Types of Sensor nodes . . . . . . . . . . . . . . . . . . . . Constraints in WSNs . . . . . . . . . . . . . . . . . . . . . . . . . Applications of WSN . . . . . . . . . . . . . . . . . . . . . . . . . Security Threats in WSN . . . . . . . . . . . . . . . . . . . . . . 4 Cellular Automata 4.1 Reversible Cellular Automata 5 Deployment issues in WSN with specific focus on authentication 5.1 5.2 Authentication of Cluster Head and Base Station . . . . . . . . . Authentication of Nodes . . . . . . . . . . . . . . . . . . . . . . . 12 13 13 14 15 15 15 16 6 Schemes as well as Supporting claims 6.1 6.2 6.3 Cloning attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . Replay Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Man-in-the-middle . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Conclusion List of Figures 1 2 3 4 5 Wireless sensor Network . . . . . . . . . . . . . . . . . . . . . . . Components of Sensor Nodes . . . . . . . . . . . . . . . . . . . . WSN with three types of sensor nodes . . . . . . . . . . . . . . . Elementary CA . . . . . . . . . . . . . . . . . . . . . . . . . . . . Reversible...

Words: 4368 - Pages: 18

Free Essay

Merger Integration at Boa

...Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks Dr. G. Padmavathi, Mrs. D. Shanmugapriya, Prof and Head, Dept. of Computer Science, Avinashilingam University for Women, Coimbatore, India, ganapathi.padmavathi@gmail.com Lecturer, Dept. of Information Technology, Avinashilingam University for Women, Coimbatore, India, ds_priyaa@rediffmail.com Abstract—Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced. Keywords-Wireless Sensor Network; Security Security Attacks; Defensive mechanisms; Challenges ...

Words: 5174 - Pages: 21

Free Essay

Survey on Leach Protocols

...in Wireless Sensor Network 1st Bhavya R Patel, 2nd Jignesh patel 1st PG Student, 2nd Asst.Prof. 1st Computer Engineering, 2nd Computer Engineering S.R.Patel Engineering College, Unjha, Mehsana,India 1bhavyapatel9@gmail.com, 2 jigneshpatel.er@gmail.com __________________________________________________________________________________________________________ Abstract-Sensor webs consisting of nodes with limited battery power and wireless communications are deployed to collect useful information from the field. Gathering sensed information in an energy efficient manner is critical to operate the sensor network for a long period of time. A data collection problem is defined where, in a round of communication, each sensor node has a packet to be sent to the distant base station. If each node transmits its sensed data directly to the base station then it will deplete its power quickly. Since wireless communications consume significant amounts of battery power, sensor nodes should spend as little energy as possible receiving and transmitting data. It is necessary for communication protocols to maximize nodes' lifetimes, reduce bandwidth consumption by using local collaboration among the nodes, and tolerate node failures. Most of the work in energy efficient data gathering application is motivated by LEACH by allowing rotation of cluster head for load distribution. In this paper, we have presented several existing methods for energy efficient cluster head selection in wireless sensor...

Words: 2569 - Pages: 11

Free Essay

Accoustic Communication

...Acoustic Sensor Networks Ian F. Akyildiz, Dario Pompili, Tommaso Melodia Broadband & Wireless Networking Laboratory School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332 Tel: (404) 894-5141 Fax: (404) 894-7883 e-mail:{ian, dario, tommaso}@ece.gatech.edu Abstract— Ocean bottom sensor nodes can be used for oceanographic data collection, pollution monitoring, offshore exploration and tactical surveillance applications. Moreover, Unmanned or Autonomous Underwater Vehicles (UUVs, AUVs), equipped with sensors, will find application in exploration of natural undersea resources and gathering of scientific data in collaborative monitoring missions. Underwater acoustic networking is the enabling technology for these applications. Underwater Networks consist of a variable number of sensors and vehicles that are deployed to perform collaborative monitoring tasks over a given area. In this paper, several fundamental key aspects of underwater acoustic communications are investigated. Different architectures for two-dimensional and three-dimensional underwater sensor networks are discussed, and the underwater channel is characterized. The main challenges for the development of efficient networking solutions posed by the underwater environment are detailed at all layers of the protocol stack. Furthermore, open research issues are discussed and possible solution approaches are outlined. I. I NTRODUCTION Ocean bottom sensor nodes are...

Words: 4664 - Pages: 19

Free Essay

Internet of Things

...the era of computing will be outside the realm of the traditional desktop. In the Internet of Things (IoT) paradigm, many of the objects that surround us will be on the network in one form or another. Radio Frequency IDentification (RFID) and sensor network technologies will rise to meet this new challenge, in which information and communication systems are invisibly embedded in the environment around us. This results in the generation of enormous amounts of data which have to be stored, processed and presented in a seamless, efficient, and easily interpretable form. This model will consist of services that are commodities and delivered in a manner similar to traditional commodities. Cloud computing can provide the virtual infrastructure for such utility computing which integrates monitoring devices, storage devices, analytics tools, visualization platforms and client delivery. The cost based model that Cloud computing offers will enable end-to-end service provisioning for businesses and users to access applications on demand from anywhere. Smart connectivity with existing networks and context-aware computation using network resources is an indispensable part of IoT. With the growing presence of WiFi and 4G-LTE wireless Internet access, the evolution towards ubiquitous information and communication networks is already evident. However, for the Internet of Things vision to successfully emerge, the computing paradigm will need to go beyond traditional mobile computing scenarios...

Words: 858 - Pages: 4

Premium Essay

Nt1310 Unit 1 Exercise 1

...Introduction: With the advances of micro electro mechanical system technology, wireless communications and digital electronics, Wireless Sensor Networks have been used in everywhere such as battlefield surveillance, environment supervision and traffic control has become a reality. Wireless Sensor Networks consist of large number of sensor nodes which collect and route data to the external sink with a certain transmission regulation. Due to the limitations of bandwidth memory and computing capability of such nodes the applied routing topology should ensure the minimization of energy consumption and hence maximization the lifetime of the network. When the energy is limited, our main aim is to find a route which can minimize the energy consumption...

Words: 924 - Pages: 4

Free Essay

Review

...REVIEW #1 This article is about the advancement of the Wireless Sensor Networks (WNSs). Their usage in various fields making them the most fast evolving technology. The wireless sensor network consist of a large number of sensor nodes, Sink and the Actuator. These sensor networks use broadcast communication paradigm but most of the networks depends on point-to-point communication. The sensor networks does not have a global identification because of large in number. The communication architecture of sensor networks has three phases 1. Sensor node 2.Sink 3.User. The sensor node collects data sends it to the sink, where the sink compute the data and finally sends it to the user. The design topology of sensor networks depends on the user requirement. The basic system consists of the power unit, processing unit, sensing unit and the transceiver. Depending on the requirement some other components can be added to the network which are like location finding system, mobilizer, power generator, etc. The design factors depend on 1.Fault Tolerance 2.Scalability 3.Production cost 4.Hardware Constraints 5.Sensor network Topology 6.Environment 7.Transmission Media 8.Poweer consumption. Depending on the network size and the requirements the cost of the network changes. The Transmission of data follows a different protocol stack which consist of different layers. Each of the layer is very dedicated in their duty of transferring data. The physical layer and the Data link layer are the...

Words: 647 - Pages: 3

Free Essay

Ic- Internet of Things

...IC the Future! Frost & Sullivan’s Virtual Thought Leadership Panel on Internet of Everything Measurement & Instrumentation March 20, 2014 © 2012 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan. Moderator’s Profile • 12 years of expertise in semiconductor and wireless industry. Special expertise in business and product strategy, positioning, consulting and market analysis. Heads a team of global analysts that conduct both syndicated and custom research on various segments of the semiconductor industry. Some of the application that are on focus in the semiconductor group including automotive, healthcare, consumer electronics, aerospace, defense, industrial, wired and wireless communication 2 • Aravind Seshagiri, Program Manager, Measurement & Instrumentation Frost & Sullivan Follow me on: (Connect with social media) @asesh1974 • • Key Take Away’s from the previous edition Ian Ferguson, Vice President Segment Marketing Security is non-negotiable. ARM is concerned about fragmentation of standards and compromise on privacy. Performance, power efficiency and the flexibility to reconfigure on the go are they key needs for next gen processors. Bob Doud, Director of Marketing Privacy a pressing issue rather than actual information overload...

Words: 2300 - Pages: 10

Free Essay

Student

...WIRELESS SENSOR NETWORK COVERAGE: DEMONSTARTING POWER SAVINGS AND LIMITATIONS WITH MINIMIZED COVERAGE BY SIDNEY I. RUBEY A thesis submitted to the Graduate faculty of the University of Colorado at Colorado Springs in partial fulfillment of the requirements for the degree of Master of Science Department of Computer Science 2011 This thesis for Master of Science degree by Sidney I. Rubey has been approved for the Department of Computer Science by ------------------------------------------------------------------------ Dr. C. Edward Chow, Chair ------------------------------------------------------------------------ Dr. Terrance E. Boult ------------------------------------------------------------------------ Dr. Xiaobo Zhou ----------------------------------------- Date Abstract This paper explores the competing issues of coverage efficiency and power available in wireless sensor networks. Specifically, a shortest distance routing protocol is implemented, and total network system lifetimes are determined using a variety of small percentages of the available system nodes. Using a network simulator developed in Java, wireless sensor nodes are simulated, and power consumption algorithms are included in each node that take into consideration all aspects of power consumption in the operation of the node. Simulating different coverage schemes on the same network system, same initial power sources, and routing protocol, an increase of overall system lifetime of 900% is demonstrated...

Words: 15836 - Pages: 64

Free Essay

Robotics

...Use of Unobtrusive Human-Machine Interface for Rehabilitation of Stroke victims through Robot Assisted Mirror therapy Gautam Narangi, Arjun Narang2, Soumya Singhi luhani Lempiainen Electrical and Electronics Engineering, Bharati Managing Director Vidyapeeth's College of Engineering, New Delhi, India Deltatron Oy Ltd. Department of Electronics and Instrumentation, Birla Helsinki, Finland Institute of Technology and Science, Pilani, India jle@deltatron.fi gautam2410@gmail.com, arjun.narang09@gmail.com, soumya.singh1001@gmail.com Abstract- Stroke is one of the leading causes of long-term disability worldwide. Present techniques employed One technique employed to effectively rehabilitate stroke for victims, especially those suffering from partial paralysis or rehabilitation of victims suffering from partial paralysis or loss loss of function, is using mirror therapy. Mirror therapy is a of function, such as mirror therapy, require substantial amount of resources, which may not be readily available. In traditional mirror therapy, patients place a mirror beside the functional limb, blocking their view of the affected limb, creating the illusion that both the limbs are working properly, which strategy that has been used successfully to treat phantom pain after amputation and recovery from hemiplegia after a stroke. In traditional mirror therapy, patients place a mirror beside the functional...

Words: 3208 - Pages: 13