Wireless Sensor Networks. By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like u..

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
TDMA Scheduling in Wireless Sensor Networks
Authors : Chris Karlof, David Wagner Presenter : Shan Bai Secure Routing in Wireless Sensor Networks : Attacks and Countermeasures.
Presented by : Poorya Ghafoorpoor Yazdi Eastern Mediterranean University Mechanical Engineering Department Master Thesis Presentation Eastern Mediterranean.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Introduction to Wireless Sensor Networks
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Secure Routing in Wireless Sensor Network Soumyajit Manna Kent State University 5/11/2015Kent State University1.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
1 On Handling QoS Traffic in Wireless Sensor Networks 吳勇慶.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Wireless Sensor Network. A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
Wireless Sensor Network Security Anuj Nagar CS 590.
Secure Routing in Wireless Sensor Networks. This Paper  One of the first to examine security on sensor networks prior work focused on wired and adhoc.
Wireless Sensor Networks Smart Environments: Technologies, Protocols, and Applications ed. D.J. Cook and S.K. Das, John Wiley, New York, B.Devi
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures ProtocolRelevant Attacks TinyOS beaconingBogus routing information, selective forwarding,
Fault Tolerance in ZigBee Wireless Sensor Networks
Introduction To Wireless Sensor Networks Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting of spatially distributed.
Sensor Networks Lecture 7. Sensor Networks Special case of the general ad hoc networking problem Much more resource constrained than a network of PDAs.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
David Rogers, Stu Andrzejewski, Kelly Desmond, Brad Garrod.
Software Solutions for Product Developers Copyright 2005 Software Technologies Group, Inc. All Rights Reserved. An Overview of ZigBee The Power of the.
MICA: A Wireless Platform for Deeply Embedded Networks
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Wireless Sensor Monitoring Group Members: Daniel Eke (COMPE) Brian Reilly (ECE) Steven Shih (ECE) Sponsored by:
An Introduction Table Of Context Sensor Network PreviewRouting in Sensor NetworksMobility in Sensor Networks Structure and characteristics of nodes and.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Introduction to Wireless Sensor Networks
Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos Tassos Dimitriou Neeli R. Prasad.
By : Anand Yadav. What is Zigbee?  The CC2520 is Texas Instrument’s second generation ZigBee/IEEE RF transceiver for the 2.4 GHz unlicensed.
Thapar University, India, Oct. 4, 2013 Smartening the Environment using Wireless Sensor Networks in a Developing Country Presented By Al-Sakib Khan Pathan,
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures – C. Karlof and D. Wagner Dr. Xiuzhen Cheng Department of Computer Science The.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof David Wagner University of California at Berkeley 1st IEEE International.
Wireless Sensor Network (WSN). WSN - Basic Concept WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively.
Ad Hoc Network.
A. Hangan, L. Vacariu, O. Cret, H. Hedesiu Technical University of Cluj-Napoca A Prototype for the Remote Monitoring of Water Parameters.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
A Web-based Console for Controlling a Wireless Sensor network Team A: Thang Nguyen – Duc Duong Course CSCI 5234: Web Security Instructor: Dr. T. Andrew.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Wireless Sensor Networks
Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends Prepared by: Ameer Sameer Hamood University of Babylon - Iraq Information.
Pritee Parwekar. Requirements and Standards Some requirements for WSN deployment include: –Fault tolerance –Lifetime –Scalability –Real-time data.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
Software Architecture of Sensors. Hardware - Sensor Nodes Sensing: sensor --a transducer that converts a physical, chemical, or biological parameter into.
- Pritam Kumat - TE(2) 1.  Introduction  Architecture  Routing Techniques  Node Components  Hardware Specification  Application 2.
In the name of God.
Overview of Wireless Networks:
Introduction to Wireless Sensor Networks
Wireless Sensor Network (WSN)
Introduction to Wireless Sensor Networks
Bluetooth Based Smart Sensor Network
Adhoc and Wireless Sensor Networks
Protocols.
An Overview of Security Issues in Sensor Network
Protocols.
Presentation transcript:

Wireless Sensor Networks

By. P. Victer Paul Dear, We planned to share our eBooks and project/seminar contents for free to all needed friends like u.. To get to know about more free computerscience ebooks and technology advancements in computer science. Please visit Please to keep provide many eBooks and technology news for FREE. Encourage us by Clicking on the advertisement in these Blog.

A sensor is a electronic device that measures a physical quantity and converts it into a signal which can be read by an observer or by an instrument.

 A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions,  such as temperature, sound, vibration, pressure, motion or pollutants.

 Flexible.  Implementation cost is cheaper than wired network.  Ideal for the non-reachable places such as across river, or mountain or boarder areas.  Ideal for temporary network setups.

 Lower speed compared to wired network. (of course!)  Less secure because hacker's laptop can act as Access Point.  More complex to configure than wired network.  Affected by surrounding. E.g: walls (blocking), microwave oven (interference), far distance (attenuation)

 Limited Energy,  Limited Memory,  Limited Computing Power,  Limited Communication Bandwidth,  Limited Communication Range

 Node Deployment  Node Capabilities  Network Topology  Scalability  Energy Consumption  Data Delivery Model  Data Aggregation  QoS

 Node Deployment: affects the performance of the routing protocol.  Node Capabilities: relaying, sensing and aggregation  Network Topology: affects latency, robustness, and capacity.

 Scalability: Sensor network routing protocols should be scalable enough to respond to events in the environment.  Energy Consumption: computations and transmitting  Data Delivery Model: continuous, event-driven, query- driven, periodic, or a hybrid.

 Data Aggregation: duplicate suppression, minima, maxima, and average.  QoS (quality of services): should support the life time, the data reliable, and location-awareness.

 Microcontroller performs tasks, processes data and controls the functionality of other components in the sensor node.  A microcontroller is often the best choice for embedded systems because of its flexibility to connect to other devices, ease of programming, and low power consumption.

 Sensor nodes make use of ISM band which gives free radio, spectrum allocation and global availability.  The function both of transmitter and receiver are combined into a single device know as transceivers are used in sensor nodes

 Flash memories are used due to its cost and storage capacity.  Two categories of memory based on the purpose of storage ◦ a) User memory used for storing application related or personal data. ◦ b) Program memory used for programming the device.

 For the Sensing, Communication and Data Processing.  Dynamic Power Management (DPM) and Dynamic Voltage Scaling (DVS)

 Spoofed, altered, or replayed routing information.  Selective forwarding  Sinkhole attack  The Sybil attack  Wormhole attack  HELLO flood attack

 Spoofed, altered, or replayed routing information: Affects: routing loops, attract or repel network traffic, extend or shorten source routes, generate false error messages, partition the network, increase end-to-end latency, etc.  Selective forwarding: In a selective forwarding attack, malicious nodes may refuse to forward certain messages and simply drop them, ensuring that they are not propagated any further.  Sinkhole attacks: Sinkhole attacks can enable many other attacks(e.g. selective forwarding).

 The Sybil attack: In a Sybil attack, a single node presents multiple identities to other nodes in the network.  Wormhole attack: Wormhole attacks commonly involve two distant malicious nodes colluding to understate their distance from each other by relaying packets along an out-of-bound channel available only to the attacker.  HELLO flood attack: Laptop-class attacker broadcasting routing or other information with large enough transmission power could convince every node in the network that the adversary is its neighbor.

 Homeland security  Multisensory Data Fusion  Nondestructive Evaluation and Remote Sensing  Integrated System Health Management (ISHM)  Commercial Development  Agriculture  Mines  Industrial

 Standards and specifications  Hardware  Software  Simulators

 ISA100 (industrial control applications).  Wireless HART (designed for Industrial applications like Process Monitoring and Control).  IETF RPL(Routing Protocol for Low power and Lossy Networks).  IETF 6LoWPAN  IEC 62591(industrial communication networks)  ZigBee networking specification for transmission of packets over IEEE is intended for uses such as embedded sensing, medical data collection, consumer devices like television remote controls, and home automation.  EnOceanis the originator of patented energy-harvesting wireless sensor technology.

The main challenge is to produce low cost and tiny sensor nodes. With respect to these objectives, current sensor nodes are mainly prototypes. Miniaturization and low cost are understood to follow from recent and future progress in the fields of MEMS and NEMS.MEMSNEMS

 TOSSIM,  J-Sim  Atarraya.  An extensive list of simulation tools for Wireless Sensor Networks can be found at the CRUISE WSN Simulation Tool Knowledgebase.

Tanq