Вы находитесь на странице: 1из 21

Wireless Sensor Network &

Security
Presented byTEJAS WASULE
(IT 2nd Year)

SURAJ JAIWAL
(IT 2nd Year )

What is Wireless Sensor


Networks?
WSN combines sensing, computation,

and communication into single tiny


device called sensor node.
Group of sensors linked by wireless

media to perform distributed sensing


task

What is Sensor Node?


Sensor is a device, which senses

information and passes it to the mote.

Figure : Wireless sensor network device

Progression of Sensor
Technology

Figure : Progression of sensor technology


(motes) over time

Architecture of a
Sensor Node
Components of Sensor Node
1. HARDWARE

A Power unit (Battery)


Computational logic & Storage
Sensor Transducer
Communication

Contd..

Architecture of a Sensor
Node

Figure : The architecture of a sensor node.

2. SOFTWARE

Operating System Microcode


Sensor Drivers
Communication Processors
Communication Drivers
Data Processing Mini-Apps

Specific Sensor
Node
Sensor Node:
Processor: 4Mhz
Memory: 128KB Flash & 4KB RAM
Radio: 916Mhz and 40Kbits/second.
Transmission Range: 100 Feet

TinyOS:
Operating System(small)
Open Source
Energy Efficient

Available Wireless
Technologies

Contd

Available Wireless
Technologies
Standard

Data Rate

Range

Power
Consumption

ZigBee
(802.15.4)

20 kbps to
250 kbps

Up to 10 m

Ultralow

Bluetooth
(802.15.1)

Up to 3 mbps 1m to 100 m low

Wi-Fi
(802.11)

54 mbps

45 m to 90
m

Medium

Need of Security
WSNs are becoming a cost effective,
practical way to go about deploying
sensor networks.
Protecting confidentiality, integrity
and availability of communications.
Large range of applications from
civilian to military purposes.

Need of Security
Obstacle
s:
Very-Limited Resources

Unreliable Communication
Unattended Operations
Attack
s:

Sybil Attack
Traffic Analysis Attacks

Need of Security
Attacks
: Attack:
1) Sybil
Introduced by Brain Zill in 2002
Subverted by Foreign identities in
peer-to peer Network
2) Traffic Analysis

Intercepting & Examine messages to


deduce info. from patterns in
Communications.
Able to detect Encrypted messages but
Not able to Decrypt it.

Security for Sensor


SMACS :
Network

Self organizing medium access


control for sensor networks.

Encryption:

Encoding info. in such a way that


hackers cant read it, but authorized
one can.
Cryptography &
Steganography:

Techniques for Secure


Communication in presence of Third
parties.

Application of WSN
Home and Office Applications
Environmental Applications
Medical & Health Applications
Military Applications

Advantages
Implementation cost is cheaper
than wired network
Ideal for non-reachable places
It avoids hell lot of wiring
It can accommodate new devices
at any time

Disadvantages
Less secure because hacker's laptop
can act as Access Point.
Lower speed as compare to wired
networks.
Affected by surrounding. E.g.: walls
(blocking), microwave oven , far distance

Conclusion
The low cost, flexibility, fault tolerance,
high sensing fidelity and rapid deployment
makes way for new applications on remote
sensing.
Realization needs to satisfy the constraints
such as scalability, topology changes,
power consumption, environment etc.
New wireless ad hoc networking
techniques are required to overcome this
constraints.

References
Wireless Sensor Network (KAZEM
SOHRABY, DANIEL MINOLI,
TAIEB ZNATI)
System Architecture for Wireless
Sensor Networks (Jason Lester Hill)
http://today.cs.berkeley.edu/800dem
o/.s
http://www.powerstream.com
http://www.wikipedia.com

K
N
A
H
!
T
.
.
U
O
Y

?
.
.. .

Вам также может понравиться