Free Essay

Wireless Sensor Networks

In: Computers and Technology

Submitted By kiprotich
Words 5106
Pages 21
SECURE ROUTING IN WIRELESS SENSOR NETWORKS
By [Name]

The Name of the Class (Course)
Professor (Tutor):
The Name of the School (University):
The City and State
The Date:

Abstract.
Wireless sensor networks (WSANs) are a group of sensors and actors that are linked by a wireless medium for the purpose of performing distributed sensing and action on a given task. This involves the sensors collecting information about the surrounding physical environment and sending the information to the actors which take the decisions and perform some needed action basing on the information received from the sensors about the surrounding environment. These sensor networks are sometimes referred to as wireless sensor and actuator networks. They monitor physical or environmental conditions such as sound, pressure, temperature among others and send the collected data to the required location. Effective sensing and acting requires a distributed local coordination methods and mechanism among the sensors and the actors in addition to this, sensor data should be valid in order for right and timely actions to be performed. This paper describes secure routing in wireless sensor networks and outlines its threats on security.

Keywords: Wireless sensor and actor networks; Actuators; Ad hoc networks; Sybil attack; Real-time communication; Sinkhole; Routing; MAC; adversary.

Introduction
With the recent rapid improvement on technology, many networking technologies have been created to make communication easy. One such technology is distributed wireless sensor network which has a capability of observing the physical world and process the data and in addition make decisions basing on the collected data and perform actions basing on this. Wireless sensor networks (WSNs) are rapidly growing and have emerged as one of the important area in mobile computing. Its applications of WSNs are numerous and growing fast with time. Its applications are increasing and are currently deployed in both home and offices and also outdoor such as mapping the territory of an enemy in battle ground as mentioned by (Akyildiz et al 2002). It is used in am military environment; the technology is used to detect the enemy soldiers and trucks. They are also used also in healthcare for detecting intruders mostly on healthcare of the elderly; they are connected to the wireless home security systems.
Routing security of the wireless networks is always considered in the above mentioned scenarios and the accuracy of relaying information is always the target after and during the deployment of the wireless systems. A lot of the routing protocols have been designed and deployed in the market each focusing on security as an objective of obtaining its optimum user requirements. However, none of the systems have been able to achieve the goal of security. Many security challenges still exist that expose this technology to threats. This is due to combined threats which are as a result of physical security and lack of adequate resources which motivate the intruders who may compromise the sensor nodes if the system is not secure enough.
The primary goals of wireless secure networks are data authentication, data confidentiality, data integrity, and data availability.
Data authentication will ensure that the message being transmitted is reliable; this is achieved by identifying the place that the transmitted message originates from. This ensures that alteration of the packets by an adversary is avoided. Adversary may inject the wrong or additional packets to the message and the only way of identifying this is by identifying the origin of the message. Authentication of data is achieved by sending and receiving nodes sharing the secret codes or keys. It is however very difficult in wireless network to attain authenticity of the information due to the nature of wireless network.
Confidentiality of data on the other hand involves the transmitted information being hidden or concealed so that an attacker is not aware of the message being transmitted from the network therefore shielding the attacker from compromising the information.
Another key important goal is data integrity. This ensures that the data is reliable and has not been tempered with or altered in any way. According to Shanmugapriya and Padmavathi (2009), even if the network has all the confidentiality measures, there is still a possibility that data integrity can be compromised by alteration. Alteration of information can render the data useless due to its unreliability.
Data availability is also another key important aspect of a wireless sensor network. It determines the availability of the network resources to communicate. Failure of a node or a base station will lead to the failure of the entire network and therefore operations in the network will be rendered unavailable.
Other goals of WSNs involve the freshness of the data; this is achieved by ensuring that the data in the network is as recent and updated as possible. Data freshness ensures that the old messages are not replayed in the network. Independence of the network also ensures that every sensor self-organizes itself and is as flexible as possible; this allows self-healing after the attack. The main aim in WSNs is secrecy and authentication, since most of these sensor networks and various applications that relies in these networks requires protection against various challenges as far as security is concerned such as malicious injections, eavesdropping and packet modification, encryption of the packets is the best approach to fight back against these emerging threats. This ensures that high level of security is achieved by the keys being set to decrypt the information on the other end. Methods such as link layer cryptography for instance ensures that there is one key which simplifies the key setup. Another issue which the wireless sensor networks try to address is privacy. The above mentioned goals are however facing various challenges from the attacks and injections carried out by adversaries on the network. Various protocols have been defined to try to reduce these challenges in the wireless sensor networks.
Research Methods
3.1 Introduction
Research Methods
This chapter discusses the methodological approaches that will be used in investigation of secure routing in wireless sensor networks. The chapter will describe the research design, comparative analysis, statistics of survey, techniques that will be used for data gathering, and data analysis techniques. The chapter will also tackle the basic issues security issues that will be covered in the study.

In the sections that follow I will be presenting the routing protocols and the security challenges experienced by wireless sensor networks and at the end give secure measures of addressing these issues.
Routing is the process of selecting best path in a network where messages are passed from one node to another until the message reaches the intended destination. A protocol on the other hand is the set of rules that communicating nodes must adhere to in a network. Routing in WSNs differ from that of wired networks in many ways, this is due to the lack of infrastructure and the unreliability of the wireless links which may cause communication to fail. The wireless network uses less energy and therefore routing protocols defined must meet this requirement. This has led to the development of the routing algorithm to meet these challenges in the wireless network environment. These protocols have been categorized into seven categories as I will describe below.

Routing Protocols
Location based protocols This protocol is location based where the sensor nodes are addressed by location information. The information about the location of the sensor nodes is requested by the protocol and the distance between two nodes which are specified calculated basing on this information. The consumption of the energy is then estimated basing on the result obtained from the calculation. Examples of location based protocols are: Geographic Adaptive Fidelity (GAF), Geographic and Energy-Aware Routing (GEAR), Coordination of Power Saving with Routing, Geographic Random Forwarding (GeRaF) among others. Geographic adaptive fidelity (GAF) is a routing protocol which considers energy usage in the transmission of packets across the network. This protocol turns off some sensors it deems as unnecessary and in the process ensures that routing is as constant and uninterrupted as possible between the communicating sensors. This protocol enrolls division of sensor field into squares and location information of each sensor will be used by that particular sensor. The location information can be provided by location systems such as GPS for instance and therefore the sensor is able to associate itself with a given grid that it is located at. Geographic Energy aware routing protocol on the other hand is also an energy conscious protocol which routes packets to targeted destination within the sensor field. Sensors have location hardware such as GPS systems which allows the sensors to know and identify their locations. The sensors are able to keep track of their energy as well the energy of their neighbors. This protocol uses recursive forwarding algorithm which is based on geographical location to transfer packets around the mapped region.
Coordination of power saving with routing is a protocol which reduces how the WSNs consume the energy by managing the individual nodes consumption of power. This is achieved by turning the idle radio off. Unlike the first two protocols, this protocol does not require the nodes to know their location
Geographical Random forwarding stated by Singh et al (7) uses routing based on the geographical location where the relaying sensor is hidden before the sending of packets. This method is called best effort forwarding scheme since the sender cannot be guaranteed that the message will reach its destination referred to as the sink. This protocol assumes that all the sensors are aware of their physical locations and the location of the destination sensor.
Data-Centric protocols
In these protocols, the intermediate sensor performs some activities on the data which originate from multiple source sensors as soon as the source sensors send the data to the sink the aggregated data is then sent to the sink. This process saves the energy due to less transmission from source to the destination. Some of the protocols in this category are: Sensor Protocols for Information via Negotiation (SPIN), Directed diffusion, Rumor routing and cougar among others Sensor Protocols for information via negotiation (SPIN) has been designed to overcome the problems that might be caused by flooding such as implosion and overlap, this protocols are adaptive to the resources in the network and are able to compute the required energy for sending and receiving data in the network, in addition to this intelligence this protocol can make decisions on how the resources are to be utilized in the network. This protocol is based on negotiation and adaptation mechanism, this is achieved by enabling the sensors to negotiate with each other before the data can be sent in order to avoid redundancy.
User and application programs are given queries generated by the source sensors are provided by this approach. This provides abstraction which protects the user from knowing how the queries are to be executed. Due to in- network processing, the total energy consumption is greatly reduced thus enhancing the network lifetime.
Rumor routing on the other hand is a scheme efficient if the number of queries is in between two intersection points of a routing curve with those of flooding query and event query (Singh et al 71). This protocol is based on agent concept where a long-lived packet in a network informs each sensor the events that it has learned during the process of traversing the network. This occurs for several hops after which the agent dies. When an agent encounters a sensor in its path, it synchronizes its events according to the encountered agent and updates the event list when it encountered agent to obtain the shortest possible path in the network.
Directed diffusion protocol fulfils the requirement of energy saving and efficiency as required by the wireless routing networks, other key advantages of this protocol are scalability and robustness. It has several key elements such as data naming gradients among others. In this protocol, the sinks identifies a low data rate for the incoming activities, the sinks can then reinforce one selected sensor and appoints it to send events that contains bigger data rate. This is done by resending the message which had been sent before and representing the resend message with a smaller interval.
Attacks on wireless sensor networks
Wireless networks are a great challenge since the channel is open therefore it can be accessible to anyone. This makes the network vulnerable to attacks at any time. Attacks on the wireless sensor networks can be categorized as either active or passive
Passive attacks are the kind of attacks in which the main aim of the attacker is to obtain information for the network without being detected. The attacker remains undiscovered and quietly while collecting large volumes of information from the network. The collected information can be used to perform other activities in the network by the attacker. This kind of attack is very hard to be detected since they are normally quiet in nature. Active attacks on the other hand are the opposite of the passive attacks. It involves the exploiting the weaknesses of the security in the wireless network in an attempt to launch attacks against the network by modifying the packets and messages through injection of malicious codes. This kind of attack is severe since it may bring the entire network to a standstill.
Attacks can also be classified as internal or external
External attacks are attacks launched from outside the network. These modes of attack are usually not so dangerous to the network. Internal attack on a network on the other hand is a kind of attack that is carried out in between the network. The attacker may obtain credentials from the people inside the network and use it to attack the sensors. This type of attack is severe and may lead to great loss.
Sinkhole Attack
This type of attack is a type of attack in which compromised node tries to attract network traffic by advertising its fake routing update. This attack can be used to launch other types of attacks and therefore makes it a dangerous attack. This attack can be used to launch attacks such as forwarding or spoofing attacks. This attack however is difficult to carry out since there is no way of creating effective malicious node in the network in addition of the difficulty of creating this malicious node, it is hard to select the node at a given time if it is managed to be created.
This attack is an insider attack in which an intruder compromises a node inside a network therefore allowing him to launch attack. This attack makes the node try to attract all the traffic from neighboring nodes basing on a certain formula defined in the protocol. This attack is made possible by the communication pattern used by wireless sensor networks that allows each node to communicate with a base station by each sending data thus making the wireless sensor network vulnerable to this type of attack.

The figure below elaborates on this mode of attack on WSN

The above attack depicted in the diagram is available in Minroute protocol. This type of attack is mainly targeted on wireless sensor network due to its small storage capacity and the little amount of computed power it requires and can therefore work under limited power supply. It chooses the best route by using the quality of the link as its metric therefore allowing it to send packets to the base station this is according to Krontris et al (15).
Another type of sinkhole attack is based on TinyAODV protocol, this bases its attack on the routing metric and number of hops to the base station that are used in this protocol. Route from source to the destination gets created as one node sends packets while the next the next node reply with route reply packet and this fails, the packet gets forwarded to other nodes close to the destination until the source node receives the reply. The node with minimum number of hops to the destination is then selected by the source node. This can be compromised by launching an attack through sending of reply packet. This Reply Route Packet will give a small number of hopes that shows the closer proximity to the base station. This is the sinkhole node; the source then decides to forward the packets to this sinkhole node. Thus the same sinkhole node performs the same to the neighboring nodes by attracting highest possible traffic. This type of attack is depicted in the diagram below

To detect a sinkhole attack some approaches have been defined this are listed as anomaly based, rule based, statistical approaches and cryptographic key management.
In anomaly based detection method, it involves searching of anything that appears to be abnormal in the network. If anything appears to be abnormal it is then listed as possible threat and analysis carried out. Rule based and statistical approaches are subset of the anomaly based detection approaches according to Chaudhry et al (9).
Rule based approach on the other hand concentrates on the definition of rules that are based on the techniques which are used by the attacker to launch the attacks. The rules are set on the intruder detection system that runs on each node. Any node is considered as an attacker that violates the set rules. Statistical approaches associates recorded activities of a node to a particular node such as comparing the normal threshold with the recorded activity of the node. If the particular node whose data is being monitored seems to show a strange behavior as per the statistics, it will then be considered as an adversary. This may include an abnormal cpu usage and depletion of the resource. Cryptographic approach on the other hand checks the integrity and authenticity of all the packets travelling within various nodes in the network and ensures that they are protected from an adversary by use of encryption and decryption keys. To access the message travelling across the network, the decryption key is required; this will ensure that even a slight modification of the message is detected.
Hybrid approach is a combination of cryptographic and anomaly based approaches and involves the reduction of the false positive reports produced by the anomaly based approach. This method has an advantage over other methods of detection in that it is able to detect any suspicious node incase it fails to transmit the signature or include it in its database.

Wormhole attack
In this type of attack, the attacking node captures the packets form one location then transmits the captured packets to a node that is located at a distance which will distribute these packets locally. This attack can easily be launched with less knowledge of the network. This attack is dangerous when launched against ad hoc network routing protocols since the nodes which come into contact or hear the transmitted packet consider them to be from their neighboring node. This involves recording of the traffic from one region in the network and replaying them in a different location. The severity of this attack is due to the fact that is hard to be detected. This attack takes advantage of the transmission over large area which in turn attracts other nodes. The diagram below describes the wormhole attack on a wireless ad-hoc network

A warmhole attack is detected by use of packet leashes where a temporal packet leash places a bound on the lifetime of the packet therefore restricting the travel distance of the packet. The sending node includes the time of transmission and the information about the location of the packet in the message. The receiver then checks this information included in the packet and compares it with the distance that the packet has travelled from source to the destination and the time that the packet took to travel from source to the destination. Synchronized clocks are therefore required due to the very high speeds that radio signals travel taking into consideration that radio signals travel at a speed of light.
To prevent this mode of attack, nodes need to maintain accuracy of information of their neighbors. The neighbors here are the nodes within a single hop. Messages from non-neighboring nodes get ignored by the receiving node, securing the protocol used in maintaining the neighboring node is also vital since the protocol itself might be vulnerable to the wormhole. This can be done by designing a neighborhood discovery protocol which in itself is not vulnerable to these attacks. (Hu et al [2]).
Denial of service attacks (DoS)
This attack is caused by launching attacks on the nodes; this type of attack is meant to disrupt the way in which data is being relayed in the medium, destroy or make the delivery of the service unbearable. Several methods of DoS attacks can be used and may be jamming or tempering of the normal transfer of packets by flooding and causing desynchronizing the flow of packets around the network.
To avoid this method of attack in the network, strong authentication and identification of traffic methods should employed in the network.

Sybil attacks
This is an attack in which the reputation system is subverted by the foreign entities mostly in peer-to- peer networks.
The scale of decentralized distributed system being in an increase, it has become the norm for the presence of malicious behavior. Most network designs against malicious behaviors depend on certain amount of nodes in the system being in their good transmission mode. Malicious user can take multiple identities and in the process pretend to be multiple distinct nodes which always referred to as Sybil nodes or Sybil identities in a system. The malicious user can then be able to overwhelm the genuinely honest users and break the defense against the abnormal behaviors in the system. This is the removal of primary defensive mechanism that the system had employed to guard against malicious system intrusion.
To detect this type of attacks, many methods have been devised. These methods include directional antenna, propagation model, testing of the resource, detecting and localizing nodes, cryptography and timestamp series. Timestamp series approach defends a network against Sybil attack basing on the unit support. Packets are send by a node contains timestamps which are issued to the packets. Sybil attack is detected by checking on the timestamps on the sent message and if there are many similar timestamps, then there is a possible scenario of a Sybil attack on the network. This technique is however difficult to use and is not a very suitable method of detecting this kind of attack on a network. Another method which has been designed for detection of the Sybil attack is the public key cryptography. This method identifies the possibility of a Sybil attack by using a public key cryptography and authentication method. In this method, signatures and digital signatures are combined and regions defined where the nodes in one region are able to communicate to one another using secure channels and in the process monitor the issued certificates in every broadcast message. This makes sure that only those messages with valid certificates are considered as relevant while those with the invalid certificates are ignored during the process. These certificates are changed after a while to avoid insecurity and maintain privacy in the network. The detection and localization node on the other hand is a technique which is based on finding the physical location of nodes and compares it with the position of the packet.
In resource testing technique method, it is assumed that every entity has limited facilities as far as computational resources are concerned. Sybil attack is detected by checking the radio resources since each node should have only one radio resource and therefore cannot send or receive more than one channel at a time. This method is however not accurate since an attacking node can have more resources that the genuine node. Propagation model technique on the other hand by comparing and matching the signal power with the position that the signal is. The signal power can then be used to calculate the position of the node and if they do not match then it is considered as a possible Sybil attack.
This technique however, may not be an accurate one for detecting an attack since the malicious node might propagate the signal in the same speed as the other nodes in the network making detection impossible.
Bi-directional antenna method is a technique which checks the direction of the arriving packets and identifies if the message is originating from a forged neighbor or it is from the real neighbor.

Selective forwarding attack
In this type of attack, the node selectively drops the packets that are sensitive. This type of attack are effective when attacking nodes and the only ones included on the path of the message flow thus they are able to corrupt the existent routing protocols especially when combined with other attack methods for example sinkhole and wormhole attacks. Multipath forwarding can be used to counter this attack although the multipath forwarding strategy suffers from weaknesses in itself; these weaknesses include increase in the number paths and poor security resilience.
Other attacks on WSNs
Message Corruption
In this Kind of attack, the attacker compromises the message by modifying the content of the message leading to inaccuracy, this leads to loss of integrity.

False Node attack
In this method of attack, the adversary adds an additional node and uses this node to inject malicious content into the network. This node might prevent the passing through of the intended data and rather use the malicious one to pass the wrong data. This attack is one of the most dangerous kind of attack since the injected data might spread all over the network therefore the entire network might be destroyed. The attacker might as well take over the network after this code has taken over the network.

Node malfunction and node outage
Node malfunction occurs when the node in a network fails to function correctly therefore leading to transmission of the wrong data over the network. This will make the level of integrity of the entire network exposed. Node outage on the other hand refers to the vent where a node completely stops its operation. A sensor network should provide an alternative route as a solution to this kind of an issue in case it arises.

Node Replication attack.
This occurs when an attacker adds a node to a sensor network. This is achieved by copying the NodeID of an existing node in the network. This replicated node can then be used by an adversary to cause havoc in the entire network. The attacker for example can use this replicated node to disrupt the performance of the network by corrupting or misrouting the data or messages in the network. This kind of attack can bring the entire network totally to a halt or give false sensor reports.

Passive information Gathering Attack
In this method of attack, an adversary collects the information from the network. This is normally carried out if the information transferred over the network is not encrypted. An adversary with a powerful receiver and a sophisticated antenna easily receives the data traversing the network. This information can contain the location of the nodes which may allow the attacker to launch an attack and bring them down. Critical information about the network such as Network ID and timestamps can also be obtained from this mode of attack.

Spoofing attacks
In this mode of attack, an adversary performs a direct attack against specified routing protocols therefore targeting the information that is being routed in the network between different nodes, this may allow the adversary to create routing loops which degrades the network by increasing latency or even partition it completely.

Eavesdropping and monitoring.
This occurs by an adversary secretly listening or snooping on the data in a network. This may allow the attacker to acquire the information being transferred over the network about the sensors or the message itself. This infringes on the privacy of the network therefore rendering the network insecure.

Conclusion
Security is a major concern in the design and implementation of Wireless sensor networks. This is due to the application of this type of network since a high level of security is required. In the above article the solution of the security issues are given despite the fact that research should be conducted in a continuous manner in order to come up with the best methods of eliminating challenges which arise with the implementation of these networks. The wireless sensor networks are still in the early stages of development and research is ongoing to bring forth the protocols that will curb the security threats in the network while maintaining the efficiency of all the network resources.

References
Al-Karaki, J.N. and Kamal, A.E., 2004. Routing techniques in wireless sensor networks: a survey. Wireless communications, IEEE, 11(6), pp.6-28.
Bala, R. and Singh, Y., 2015. Secure Routing in Wireless Sensor Network.International Journal for Innovative Research in Science and Technology,2(1), pp.301-307.
Chaudhry J. A, Tariq U. Amin M. A. Rittenhouse R. G.
Chris K, Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures (p.6).
Deng, H., Li, W. and Agrawal, D.P., 2002. Routing security in wireless ad hoc networks. Communications Magazine, IEEE, 40(10), pp.70-75.
Deng, J., Han, R. and Mishra, S., 2006. INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer Communications, 29(2), pp.216-230.
El-Bendary, N.M.M. and Amer, F., 2008. Secure Routing for Wireless Sensor Networks.
I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam, E. Cayirci (2001). Wireless sensor networks: a
Survey (p. 395).
Singh K, Singh. M. P. D K Singh (2010). Routing Protocols in Wireless Sensor Networks – A
Survey (p. 66-72)
Perrig, A., Stankovic, J. and Wagner, D., 2004. Security in wireless sensor networks. Communications of the ACM, 47(6), pp.53-57.
Siahaan, I. and Fernandes, L., 2008. Secure Routing in Wireless Sensor Networks. University of
Trento. http://dit. unitn. it/~ fernand/downloads/IWSNSlides. pdf. pp.7
Sulaiman, M.M. and Baig, M.J., Secure Routing in Wireless Sensor Network.

Contents Abstract. 2 Introduction 2 Routing Protocols 6 Location based protocols 6 Data-Centric protocols 7 Attacks on wireless sensor networks 8 Sinkhole Attack 9 Wormhole attack 12 Denial of service attacks (DoS) 14 Sybil attacks 14 Other attacks on WSNs 16 Message Corruption 16 False Node attack 17 Node malfunction and node outage 17 Node Replication attack. 17 Passive information Gathering Attack 18 Spoofing attacks 18 Eavesdropping and monitoring. 18 Conclusion 18 References 20…...

Similar Documents

Free Essay

Sensor Network

...gather contextual information, stakeholders attend a facilitated meeting, called a Context Meeting. Here a questionnaire is completed to capture the characteristics of the users, their tasks and operating environment (see main headings in Table 1 below). User group • System skills and experience. • Task knowledge. • Training. • Qualifications. • Language skills. • Age & gender. • Physical and cognitive capabilities. • Attitudes and motivations. Physical environment • Auditory environment. • Thermal environment. • Visual environment. • Vibration. • Space and furniture. • User posture. • Health hazards. • Protective clothing & equipment. • • • • • • • • • • • • • • • • Technical environment Tasks • Hardware. Task list. • Software. Goal. • Network. Output. • Reference materials. Steps. • Other equipment. Frequency. Importance. Duration. Dependencies. Organisational environment Work practices. Assistance. Interruptions. Management & communications structure. Computer use policy. Organisational aims. Industrial relations. Job characteristics. Table 1. Context of use factors Context of use analysis was one of the outcomes of the ESPRIT HUFIT project and developed further in the ESPRIT MUSiC project (Bevan and Macleod, 1994). Context of use analysis within usability activities are also reviewed in Maguire (2001c). 4 M. Maguire and N. Bevan Task analysis involves the study of what a user is required to do in terms of actions and/or cognitive processes to achieve a......

Words: 6266 - Pages: 26

Free Essay

Routing in Wireless Sensor Networks

...Routing in Wireless Sensor Networks: application on Fire Detection Abstract: this paper is about fire detection in building using a modified APTEEN routing protocol. Here we design a system called iFireControl which is a smart detection system for buildings, which is more water efficient than many current systems, while keeping its robustness. introduction A Wireless Sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enabling control of sensors activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; nowadays such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, Agriculture, Area Monitoring, Smart Home Monitoring, Seismic Monitoring etc. Wireless Sensor Networks provide a bridge between the real physical and virtual worlds; allow the ability to observe the previously unobservable at a fine resolution over large spatio-temporal scales. The WSN is built of “nodes” from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a...

Words: 4845 - Pages: 20

Premium Essay

Wireless Networks

...Technical Writing Project Cover Sheet Capstone Proposal Project Name: Wireless Home Network Student Name: Degree Program: Information Technology Mentor Name: Signature Block Table of Contents Capstone Proposal Summary 1 Review of Other Work 2 Rationale and Systems Analysis 3 Project Goals and Objectives 5 Project Timeline and Milestones 6 Project Deliverables 8 References 10 Appendix 1: Competency Matrix 11 1 Capstone Proposal Summary This project is going to entail upgrading and installing new components to an existing wireless home network. This is a two story home with attic and basement. Inside this home, there are 8 rooms. A living area, an office area, kitchen, laundry room, 1 ½ bathrooms and 3 bedrooms. Following an interview and on site evaluation to assess what the current needs are, along with the direction of technology in the future. The new network needed to be focused on wireless connectivity of their various devices, which included smart phones, tablets and laptops. There also needed to be easy access for guests who wanted to connect to the wireless network for their own tablets, smart phones and laptops. Currently, the home has DSL internet service, with a basic wireless G router. The DSL service was adequate for the current network setup, but with more and more online content, they were having a problem with lag between devices. The current......

Words: 2803 - Pages: 12

Free Essay

Simulations in Wireless Sensor and Ad Hoc Networks: Matching and Advancing Models, Metrics, and Solutions

...TOPICS IN AD HOC AND SENSOR NETWORKS Simulations in Wireless Sensor and Ad Hoc Networks: Matching and Advancing Models, Metrics, and Solutions Ivan Stojmenovic, University of Birmingham and University of Ottawa ABSTRACT The objective of this article is to give advice for carrying out a proper and effective simulation activity for protocol design. It challenges some of the existing criticisms of simulation practices that emphasized validation aspects. This article advocates the use of simple models, matching assumptions and metrics in the problem statement and simulation to provide a basic “proof of concept,” and comparison with truly competing solutions, which is possible only after a thorough and critical literature review. Then the complexity of the models can be increased (one parameter at a time), revising the algorithms themselves by adapting them to new assumptions, metrics, and the corresponding simulation environment. Selected independent variables should explain performance under a wide range of scenarios. unclear which protocol will perform well under a wide range of scenarios. It is our view that each article should be judged on its overall contribution, including the assumptions used, theory developed, new algorithms introduced, protocol details, simulation results, and relevance to an ultimate goal of staying on a path toward creating applications. We begin with a literature review of existing criticism for simulation practices, and then discuss what......

Words: 4845 - Pages: 20

Free Essay

Prolonging the Lifetime of Wireless Sensor Network.

...INTRODUCTION Wireless Sensor Networks (WSNs) are distributed embedded systems composed of a large number of low- cost, low-power, multifunctional sensor nodes. The sensor nodes are small in size and communicate wirelessly in short distances. These tiny sensor nodes can perform sensing, data processing and communicating. They are densely deployed in the desired environment. A sensor network consists of multiple detection stations called sensor nodes, each of which is small, lightweight and portable. Every sensor node is equipped with a transducer, microcomputer, transceiver and power source. The transducer generates electrical signals based on sensed physical effects and phenomena. The microcomputer processes and stores the sensor output. The transceiver, which can be hard-wired or wireless, receives commands from a central computer and transmits data to that computer. The power for each sensor node is derived from the electric utility or from a battery. Sensors use a signal of some sort, from the environment and convert it to readable form for purpose of information transfer. Each sensor node has multiple modalities for sensing the environment such as acoustic, seismic, light, temperature, etc. However, each sensor can sense only one modality at a time. The sensor nodes in the target tracking WSN use collaboration with the neighboring nodes. This requires data exchange between sensor nodes over an ad hoc wireless network with no central coordination medium. There...

Words: 1981 - Pages: 8

Free Essay

Wireless Sensor Network

...Wireless Sensor Networks and Their Usage Ali Raza,Shahid Rasheed & Shazib Javeed University Of Central Punjab Abstract Innovations in industrial, home and automation in transportation represent smart environments. Wireless Sensor Networks (WSNs) provide a new paradigm for sensing and disseminating information from various environments, with the potential to serve many and diverse applications Networks (WSN), where thousands of sensors are deployed at different locations operating in different modes .WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication capability and sufficient intelligence for signal processing and networking of the data. Wireless Sensor Networks (WSN) are used in variety of fields which includes military, healthcare, environmental, biological, home and other commercial applications. With the huge advancement in the field of embedded computer and sensor technology, Wireless Sensor Networks (WSN), which is composed of several thousands of sensor nodes which are capable of sensing, actuating, and relaying the collected information, have made remarkable impact everywhere? Key Words Wireless Sensor Network (WSNs) Structural Health Monitoring (SHM) Micro Electro-Mechanical Systems (MEMS) Introduction Sensor network is capable of sensing, processing and communicating which helps the base station or command node to observe and react according to the condition in a particular environment......

Words: 2659 - Pages: 11

Premium Essay

Wireless Networks & Network Security

...Wireless Networks & Network Security ISSC 340 Professor Vijay Venkatesh James Lange 08/13/2013 Wireless Networks are somewhat new technology in comparison to the know-how that makes them possible. The knowledge regarding wireless technology goes back about 200 years. One of the first individuals deserving recognition for today’s wireless networks is a scientist, inventor and politician named Benjamin Franklin. In 1747 he had built a model that showed how electricity could move through the air unaided by any type of wiring. In the early 1750’s Mr. Franklin started experimenting with electricity and the rest is history. Franklin was under the belief that lightening was an electrical current. So with the famous kite and key experiment he proved to himself and others that he was right. His fascination with electricity led him to later experiments with an electrical tube given to him by a friend. A second individual that played a part in today’s wireless technology is Hans Christian Oersted. In 1819 he had found that a compass needle had movement if it was presented with electrical current. This relationship between the needle and the electricity is an essential part of electromagnetism. It is said that this discovery by Oersted happened completely by chance. While preparing for one of his lectures he was setting up some of his equipment. The compass and battery were in close proximity to each other and the needle moved from magnetic north whenever the switch to......

Words: 3213 - Pages: 13

Free Essay

Energy Efficiency in Sensor Networks

...Topology-Transparent Duty Cycling for Wireless Sensor Networks Computer Science& Engineering Arizona State University syrotiuk@asu.edu Abstract Our goal is to save energy in wireless sensor networks (WSNs) by periodic duty-cycling of sensor nodes. We schedule sensor nodes between active (transmit or receive) and sleep modes while bounding packet latency in the presence of collisions. In order to support a dynamic WSN topology, we focus on topology-transparent approaches to scheduling; these are independent of detailed topology information. Much work has been done on topology-transparent scheduling in which all nodes are active. In this work, we examine the connection between topology-transparent dutycycling and such non-sleeping schedules. This suggests a way to construct topology-transparent duty-cycling schedules. We analyse the performance of topology-transparent schedules with a focus on throughput in the worst case. A construction of topology-transparent duty-cycling schedules based on a topology-transparent non-sleeping schedule is proposed. The constructed schedule achieves the maximum average throughput in the worst case if the given nonsleeping schedule satisfies certain properties. 1 Introduction Wireless sensor networking has been a growing research area for the last years. It has a wide range of potential applications, such as environment monitoring, smart spaces, medical systems and robotic exploration. In sensor networks, sensor nodes are normally......

Words: 6730 - Pages: 27

Free Essay

Hybrid Security Approach for Nodes Authentication in Wireless Sensor Network Using Cellular Automata

.... . . . . . . . . . . . 2 3 3 4 4 4 5 6 7 7 8 8 9 . . . . . . . . . . . . . . . . . . . 10 2 Introduction 3 Wireless Sensor Network 3.1 The Basics of WSN . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1.1 3.1.2 3.1.3 3.2 3.3 3.4 Components of Sensor Nodes . . . . . . . . . . . . . . . . Key Features . . . . . . . . . . . . . . . . . . . . . . . . . Types of Sensor nodes . . . . . . . . . . . . . . . . . . . . Constraints in WSNs . . . . . . . . . . . . . . . . . . . . . . . . . Applications of WSN . . . . . . . . . . . . . . . . . . . . . . . . . Security Threats in WSN . . . . . . . . . . . . . . . . . . . . . . 4 Cellular Automata 4.1 Reversible Cellular Automata 5 Deployment issues in WSN with specific focus on authentication 5.1 5.2 Authentication of Cluster Head and Base Station . . . . . . . . . Authentication of Nodes . . . . . . . . . . . . . . . . . . . . . . . 12 13 13 14 15 15 15 16 6 Schemes as well as Supporting claims 6.1 6.2 6.3 Cloning attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . Replay Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Man-in-the-middle . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Conclusion List of Figures 1 2 3 4 5 Wireless sensor Network . . . . . . . . . . . . . . . . . . . . . . . Components of Sensor Nodes . . . . . . . . . . . . . . . . . . . . WSN with three types of sensor nodes . . . . . . . . . . . . . . . Elementary CA . . . . . . . . . . . . . . . . . . . . . . . . . . . .......

Words: 4368 - Pages: 18

Free Essay

Simulation and Research on Data Fusion Algorithm of the Wireless Sensor Network Based on Ns2

...2009 World Congress on Computer Science and Information Engineering Simulation and Research on Data Fusion Algorithm of the Wireless Sensor Network Based on NS2 Junguo Zhang, Wenbin Li, Xueliang Zhao, Xiaodong Bai, Chen Chen Beijing Forestry University, 35 Qinghua East Road, Haidian District,Beijing, 100083 P.R.China information which processed by the embedded system to the user terminals by means of random selforganization wireless communication network through multi-hop relay. Thus it authentically achieves the purpose of ‘monitor anywhere and anytime’. The basic function of sensor network is gathering and sending back the information of the monitoring areas which the relevant sensor nodes are set in. But the sensor network node resources are very limited, which mainly embodies in battery capacity, processing ability, storage capacity, communication bandwidth and so on. Because of the limited monitoring range and reliability of each sensor, we have to make the monitoring areas of the sensor nodes overlapped when they are placed in order to enhance the robustness and accuracy of the information gathered by the entire network. In this case, certain redundancy in the gathered data will be inevitable. On the way of sending monitoring data by multi-hop relay to the sink nodes (or base stations) which are responsible to gather the data. It is necessary to reduce the redundant information by fusion processing. Data fusion is generally defined as......

Words: 3532 - Pages: 15

Free Essay

Advances of Wireless Powering for Body Sensors and Implants

...Advances of Wireless Powering for Body Sensors and Implants Vieira, Caio Gagliano Sarkar, Mahasweta. Phd. Department of Electrical and Computer Engineering, San Diego State University Abstract This paper will talk about the advances that wireless powering can provides for medicine, especially for implants, prosthesis and sensor postsurgical. Looking for a reason that show why this is important and what has been created, what was already implemented, solutions from different institutions and what provisions exist for the next few years. Keywords • SAR (Specific Absorption Rate): unit of measurement that says the frequency range that can be absorbed by the human body. • RFID (Radio-frequency identification): is used to convert electromagnetic energy to electrical energy. Commonly used in tolls, parking lots and among others that uses a passive equipment to identify easily the customer. Another use for it has been to track animals, when a chip smaller that a grain of rice is implanted under the tissue of the animal and it can be read anytime to get an information needed. • iBMI (invasive brain machine interface) : it’s a type of device that goes in the patient’s brain to get data from it and send to a prosthesis to get movement that is needed. One real problem is how much battery the equipment is going to use to work. With this I found a good explanation about the problem at Wikipedia’s definition about Neuroprothetics: • Class-E power......

Words: 2274 - Pages: 10

Free Essay

Wireless Networks

...RUNNING HEAD: Wireless network trends Wireless Network Trends Prepared by: Rossell Powell Professor Yana Todorova ISSC321 I002 Win 12 American Public University 02-25-2012  Networking abilities in households is an important feature as an increasing number of students attend school online and still others work from home. With this increase, an increase in the number of computers in the household increases and all are dependent upon one Internet source. There are advantages and disadvantages to household network set-ups ( Dubendorf, V. A. (2003) The advantages in the ability to form a home network are numerous. The three main advantages to home networking are: sharing a single Internet connection among multiple computers, sharing files among computers, and using a printer or other device connected to another computer. Another advantage is that less wiring is needed when additional computers have wireless capabilities (Freeze, J. T. 2000). “The addition of wireless capabilities to these gateway devices gives the user the convenience of taking a computer anywhere in the house, and not have to worry about running wires through walls and crawl spaces and attics to connect computers in various parts of the house” .While the student is doing homework, the parent can continue to do work online and access their e-mails.  Security issues are the biggest disadvantage to home networking. From , there are at least four types of security issues that exist. The first is...

Words: 1005 - Pages: 5

Premium Essay

Wireless Networks

...Wireless Networks Wireless media is an essential part of everyday life now. Without it businesses would not be able to perform as efficient. Ever since wireless media came about, telecommunications turned the use of the Internet, electronics, and fiber optics. With the advancement of wireless media telecommunications businesses have the ability to send and receive messages to one another instantly eliminating the need of sending letters through the post office. One major challenge to developing a system of communications based on wireless media is the security. More than ever companies and individuals use this wireless technology to their advantage, for important documents or information they want kept to themselves, such as e-mail, mobile money transactions, and data transmissions. As these wireless technologies grow, and keep vital information, hackers begin to implement new ways to attack these new technologies. It is difficult to apply security into smaller devices with low power processors, minimal memory capacities and that use unreliable, low-bandwidth wireless networks. Smart phones that incorporate wireless technologies have changed the business world in numerous ways. With smart phones people can check and respond to important emails or calls when away from the office or workplace. Most businesses today require their corporate workers, managers, and supervisors to carry smart phones or mobile devices at all times. Businesses are now more than ever relying on......

Words: 293 - Pages: 2

Free Essay

Wireless Network

...WIRELESS LOCAL AREA NETWORK: SECURITY ISSUES AND COUNTERMEASURES IN ORGANISATION Nor Rasyidah Binti Haminudin2011634444M. Sc. (Information Technology)Faculty Of Computer And Mathematical SciencesUniversity Technology MARA, Malaysianorrasyidah.haminudin@gmail.com | | | ABSTRACT Every organisation today is looking to implement Wireless Local Area Network (WLAN) infrastructure to improve its communication capabilities by providing access anywhere for employees, and more importantly, convenient access for customers and other users. WLAN provides users many benefits such as portability, flexibility, reduced hardware need and lower installation cost. Without a doubt, the benefits of WLAN enhance an organisation’s overall productivity. However, WLAN is not without its own security problems. WLAN infrastructures that are not secured would actually affect the security posture of the LAN environment as well. Having an unsecured WLAN can result in a loss of service, or can be used as a staging area to launch attacks against other networks. The significant challenges faced today in securing wireless LANs are maintaining privacy, data confidentiality, and preventing unauthorized access using proper access control mechanisms. This paper will mainly focus on the wireless access points (APs) as devices that act as a central transmitter and receiver or WLAN radio signals. It will begin by introducing the concept of WLAN. The introductory section gives brief information on the WLAN...

Words: 3541 - Pages: 15

Premium Essay

Wireless Mesh Network

...WIRE LESS MESS NETWORK WITH HRPU ABSTRACT A Wireless mesh network is a mesh network created through the connection of wireless access points installed at each network user’s locale. Each user is also a provider, forwarding data at next node. The networking infrastructure is decentralized and simplified because each node need only transmit as far as the next node. Wireless mesh networking could allow people living in the remote areas and small businesses operating in rural neighborhoods to connect their networks together for affordable Internet connections. Here we discuss a hybrid routing algorithm for wireless mesh networks. In HRPU, the mesh portal periodically broadcasts a mesh update message, which allows all nodes to have a route towards the mesh portal stored semi permanently in their routing table. Whenever a node has data to be sent to backbone network, it sends the data without any route establishment delay using the route to the mesh portal. In HRPU the mesh portals and mesh points are intelligent which further improves the performance. INTRODUCTION The Beginning: Wireless Mesh Networking (WMN) was developed as a quick way to set-up wireless networks during military operations. Since then it has grown considerably in popularity based on its advantages in both metropolitan and rural applications. WMNs are being applied as Hot Zones, which cover a broad area, such as a downtown city district. By 2010, municipal Wi-Fi networks will cover over......

Words: 4177 - Pages: 17