Beruflich Dokumente
Kultur Dokumente
Introduction cont
WSN are used to collect data from the
environment.
They consists of large number of sensor nodes
and one or more Base Stations.
The nodes in the network are connected via
Wireless communication channels.
Each node has capability to sense data,
process the data and send it to rest of the
nodes or to Base Station.
These networks are limited by the node
battery lifetime.
Sensor nodes are small, low-cost, lowpower devices that have following
functionality:
Architecture of Wireless
Sensor Networks
Sensor Node
Gateway
Base Station
Sensor networks VS ad
hoc networks
The number of nodes in a sensor network can
be several orders of magnitude higher than the
nodes in an ad hoc network.
Sensor nodes are densely deployed.
Sensor nodes are limited in power,
computational capacities and memory.
Sensor nodes are prone to failures.
The topology of a sensor network changes
frequently.
Sensor nodes mainly use broadcast, most ad
hoc networks are based on p2p.
Sensor nodes may not have global ID.
Applications of
Sensor networks
Military Applications
Ocean and wildlife monitoring.
Monitoring of manufactured
machinery.
Building safety.
Earthquake monitoring.
Variety of military applications.
Medical monitoring and
research
Routing protocols
Wireless sensor network routing
protocols can be classified into
following categories.
1. Direct communication
2. Flat protocols (Multihop)
3. Hierarchical Routing Protocols
4. Location Based Routing
5. QoS Based Routing
Routing Protocols
Multihop
Routing
Direct Communication
Hierarchical Routing
Cluster Head
2) Secure Routing :The routing algorithm which calculates link costs by considering available energy, distance
and bandwidth will be best suitable for a cost and energy efficient operation.
3)
Security in Key Management:Among all key distribution schemes available right now, Key Pre-distribution is most
appropriate for WSN
4) Cryptography:
WSN also requires various authentication and encryption mechanisms but of different
level.
5) Intrusion Detection:To understand how cooperating adversaries might attack the system.
Networking Constraints
Wireless
Ad hoc
Unattended
Attacker types:
Attacks on WSN
Main types of attacks on WSN are:
Selective
forwarding
Sinkhole attacks
Sybil attacks
Wormhole attacks
An Example
Avg Temp
base
station
29
25
30
networ
k
31
An Example + an attack
Avg Temp
base
station
29
25
30
networ
k
27
31
100
A4
A1
A2
A3
Selective forwarding
Multi hop paradigm is prevalent in WSN
It is assumed that nodes faithfully forward
received messages
Compromised node might refuse to
forward packets, however neighbors
might start using another route
More dangerous: compromised node
forwards selected packets
Sybil attack:
Wormholes
Idea: tunnel packets
received on one part of
the network to another
Well placed wormhole
can completely disorder
routing
Wormholes may
convince distant nodes
that they are close to
sink. This may lead to
sinkhole if node on the
other end advertises
high-quality route to
sink
Wormholes (cont.)
Wormholes can exploit routing race conditions which
happens when node takes routing decisions based on
the first route advertisement
Attacker may influence network topology by
delivering routing information to the nodes before it
would really reach them by multi hop routing
Even encryption can not prevent this attack
Wormholes may convince two nodes that they are
neighbors when on fact they are far away from each
other
Wormholes may be used in conjunction with sybil
attack
Acknowledgment spoofing
Some routing protocols
use link layer
acknowledgments
Attacker may spoof acks
Goals: convince that
weak link is strong or that
dead node is alive.
Consequently weak link
may be selected for
routing; packets send
trough that link may be
lost or corrupted
Overview of
Countermeasures
Link layer encryption prevents majority of attacks:
bogus routing information, Sybil attacks,
acknowledgment spoofing, etc.
This makes the development of an appropriate key
management architecture a task of a great
importance
Wormhole attack, HELLO flood attacks and some
others are still possible: attacker can tunnel
legitimate packets to the other part of the network or
broadcast large number of HELLO packets
Multi path routing, bidirectional link verification can
also be used to prevent particular types of attacks
like selective forwarding, HELLO flood
Key management
The protocol must establish a key between
all sensor nodes that must exchange data
securely
Node addition / deletion should be supported
It should work in undefined deployment
environment
Unauthorized nodes should not be allowed to
establish communication with network nodes
Key management
The protocol must establish a key between
all sensor nodes that must exchange data
securely
Node addition / deletion should be supported
It should work in undefined deployment
environment
Unauthorized nodes should not be allowed to
establish communication with network nodes
Key management:
constraints
Sensor node constraints:
Battery power
Computational energy consumption
Communication energy consumption
Transmission range
Memory
Temper protection
Sleep pattern
Network constraints:
Communication
architecture of sensor
networks
architecture of sensor
networks
Combine power and
routing awareness
Integrates date with
networking protocols
Communicates power
efficiently through the
wireless medium
Promotes cooperative
efforts among sensor
nodes.
Communication
architecture of sensor
networks
Physical layer:
Communication
architecture of sensor
networks
Propagation Effects
Minimum output power
(dn 2=<n<4)
Ground reflect Multihop in dense
sensor net work
Power Efficiency Modulation Scheme
M-ary Modulation scheme
Ultra wideband(impulse radio)
architecture of sensor
networks
Open research issues
Modulation schemes
Strategies to overcome signal
propagation effects
Hardware design: transceiver
Communication
architecture of sensor
networks
architecture of sensor
networks
Medium access control
Creation of the network infrastructure
Fairly and efficiently share
communication resources between
sensor nodes
Existing MAC protocols (Cellular System,
Bluetooth and mobile ad hoc network)
architecture of sensor
networks
MAC for Sensor Networks
Self-organizing medium access control for sensor
networks and Eaves-drop-and-register Algorithm
CSMA-Based Medium Access
Hybrid TDMA/FDMA-Based
architecture of sensor
networks
Power Saving Modes of Operation
Sensor nodes communicate using short
data packets
The shorter the packets, the more
dominance of startup energy
Operation in a power saving mode is energy
efficient only if the time spent in that mode
is greater than a certain threshold.
Communication
architecture of sensor
networks
Error Control
Communication
architecture of sensor
networks
Open research issues
MAC for mobile sensor networks
Determination of lower bounds on
the energy required for sensor
network self-organization
Error control coding schemes.
Power saving modes of operation
Communication
architecture of sensor
networks
Network layer:
Power efficiency is always an important
consideration.
Sensor networks are mostly data centric.
Data aggregation is useful only when it does
not hinder the collaborative effort of the
sensor nodes.
An ideal sensor network has attribute-based
addressing and location awareness.
Communication
architecture of sensor
networks
Energy Efficient
Routes
Communication
architecture of sensor
networks
Sinks broadcast the interest
Sensor nodes broadcast the advertisements
Attribute-based naming
The areas where the temperature is over 70oF
The temperature read by a certain node
Communication
architecture of sensor
networks
Data aggregation
architecture of sensor
networks
Open research issues
New protocols need to be developed to
address higher topology changes and higher
scalability.
New internetworking schemes should be
developed to allow easy communication
between the sensor networks and external
networks.
Communication
architecture of sensor
networks
Transport layer:
architecture of sensor
networks
Open research issues
Because acknowledgments are too
costly, new schemes that split the
end-to-end communication probably
at the sinks may be needed.
Communication
architecture of sensor
networks
Application layer:
Management protocol makes the hardware
and software of the lower layers
transparent to the sensor network
management applications.
Sensor management protocol (SMP)
Task assignment and data advertisement
protocol (TADAP)
Sensor query and data dissemination
protocol (SQDDP)
Communication
architecture of sensor
networks
Sensor management protocol (SMP)
Introducing the rules related to data aggregation, attribute-based
naming, and clustering to the sensor nodes
Exchanging data related to the location
finding algorithms
Time synchronization of the sensor nodes
Moving sensor nodes
Turning sensor nodes on and off
Querying the sensor network configuration and the status of
nodes, and reconfiguring the sensor network
Authentication, key distribution, and security in data
communications
Routing protocols
Wireless sensor network routing
protocols can be classified into
following categories.
1. Direct communication
2. Flat protocols (Multihop)
3. Hierarchical Routing Protocols
4. Location Based Routing
5. QoS Based Routing
Routing Protocols
Multihop
Routing
Direct Communication
Hierarchical Routing
Cluster Head