AWSN Notes
AWSN Notes
AWSN Notes
Components of WSN:
1. Sensors:
Sensors in WSN are used to capture the environmental variables and which is
used for data acquisition. Sensor signals are converted into electrical signals.
2. Radio Nodes:
It is used to receive the data produced by the Sensors and sends it to the WLAN
access point. It consists of a microcontroller, transceiver, external memory, and
power source.
3. WLAN Access Point:
It receives the data which is sent by the Radio nodes wirelessly, generally
through the internet.
4. Evaluation Software:
The data received by the WLAN Access Point is processed by a software called
as Evaluation Software for presenting the report to the users for further
processing of the data which can be used for processing, analysis, storage, and
mining of the data.
WIRELESS SENSOR NETWORKS ARCHITECTURE
Sensor Network Architecture is used in Wireless Sensor Network (WSN). It can be used in
various places like schools, hospitals, buildings, roads, etc for various applications like
disaster management, security management, crisis management, etc.
There are 2 types of architecture used in WSN: Layered Network Architecture, and
Clustered Architecture. These are explained as following below.
1. Layered Network Architecture:
Layered Network Architecture makes use of a few hundred sensor nodes and a single
powerful base station. Network nodes are organized into concentric Layers.
It consists of 5 layers and three cross layers.
The 5 layers are:
1. Application Layer
Application layer is implemented by the network applications. These
applications produce the data, which has to be transferred over the network.
2. Transport Layer
The transport layer provides services to the application layer and takes
services from the network layer. The data in the transport layer is referred to
as Segments. It is responsible for the End-to-End Delivery of the complete
message.
3. Network Layer
The network layer works for the transmission of data from one host to the
other located in different networks. It also takes care of packet routing i.e.,
selection of the shortest path to transmit the packet, from the number of
routes available.
4. Data Link Layer
The data link layer is responsible for the node-to-node delivery of the
message. The main function of this layer is to make sure data transfer is
error-free from one node to another, over the physical layer.
5. Physical Layer
It is responsible for the actual physical connection between the devices. The
physical layer contains information in the form of bits.
The cross layers consist of the following:
Power Management Plane
Mobility Management Plane
Task Management Plane
The advantage of using Layered Network Architecture is that each node participates
only in short-distance, low power transmissions to nodes of the neighbouring nodes
because of which power consumption is less as compared to other Sensor Network
Architecture. It is scalable and has a higher fault tolerance.
Synchronization –
Some instruments must be found so as to give synchronization among the nodes.
Synchronization is significant for directing the bandwidth reservation.
PAMAS PROTOCOL
The PAMAS protocol is a combination of the original MACA protocol. Thus, we assume that
the RTS-CTS message exchange takes place over a signalling channel that is separate from
the channel used for packet transmissions. This separate signalling channel enables nodes to
determine when and for how long they can power themselves off.
A node may be in any one of six states - Idle, AwaitCTS, BEB (Binary Exponential Backoff),
Await Packet, Receive Packet, and Transmit Packet. When a node is not transmitting or
receiving a packet, or does not have any packets to transmit, or does have packets to transmit
but cannot transmit (because a neighbor is receiving a transmission) it is in the Idle state.
When it gets a packet to transmit, it transmits a RTS and enters the AwaitCTS state. If the
awaited CTS does not arrive, the node goes into binary exponential backoff (the BEB state in
the figure). If a CTS does arrive, it begins transmitting the packet and enters the Transmit
Packet state. The intended receiver, upon transmitting the CTS, enters the Await Packet state.
If the packet does not begin arriving within one roundtrip time (plus processing time), it
returns to the Idle state. If the packet does begin arriving, it transmits a busy tone over the
signalling channel and enters the Receive Packet state.
LEACH is a hierarchical protocol in which most nodes transmit to cluster heads, and the
cluster heads aggregate and compress the data and forward it to the base station(sink). Each
node uses a stochastic algorithm at each round to determine whether it will become a cluster
head in this round. LEACH assumes that each node has a radio powerful enough to directly
reach the base station or the nearest cluster head, but that using this radio at full power all the
time would waste energy.
Nodes that have been cluster heads cannot become cluster heads again for P rounds, where P
is the desired percentage of cluster heads. Thereafter, each node has a 1/P probability of
becoming a cluster head in each round. At the end of each round, each node that is not a
cluster head selects the closest cluster head and joins that cluster. The cluster head then
creates a schedule for each node in its cluster to transmit its data.
UDP
TCP
The transport layer protocol should have mechanisms for congestion control and
flow control in the network.
It should be able to provide both reliable and unreliable connections as per the
requirements of the application layer.
The protocol should be able to adapt to the dynamics of the network such as the
rapid change in topology and changes in the nature of wireless links from uni-
directional to bidirectional or vice versa.
The protocol should be aware of resource constraints such as battery power and
buffer sizes and make efficient use of them.
The transport layer protocol should make use of information from the lower
layers in the protocol stack for improving the network throughput.
Sensor networks do not fit into any regular topology, because while deploying the
sensor nodes they are scattered
Very limited resources
Limited memory,
Limited computation
Limited power
It comes under fewer infrastructures and also maintenance is very difficult.
Unreliable communication
Unreliable data transfer
Conflicts and latency
Sensor node relies only on battery and it cannot be recharged or replaced. Hardware
design for sensor node should also be considered.
Achieving synchronization between nodes is also another issue.
Node failure, topology changes and adding of nodes and deletion of nodes is another
challenging issue.
Energy scavenging
Directed diffusion
WSN APPLICATIONS
Agriculture
Humidity/temperature monitoring
Civil engineering
Structural response
Disaster management
Environmental sciences
Habitat monitoring
Conservation biology
Smart environment
Health Applications
A sensor node, also known as a mote (chiefly in North America), is a node in a sensor
network that is capable of performing some processing, gathering sensory information and
communicating with other connected nodes in the network. A mote is a node but a node is not
always a mote.
The main components of a sensor node are a microcontroller, transceiver, external memory,
power source and one or more sensors.
Controller
The controller performs tasks, processes data and controls the functionality of other
components in the sensor node. While the most common controller is a microcontroller, other
alternatives that can be used as a controller are: a general-purpose desktop microprocessor,
digital signal processors, FPGAs and ASICs. A microcontroller is often used in many
embedded systems such as sensor nodes because of its low cost, flexibility to connect to other
devices, ease of programming, and low power consumption.
Transceiver
The functionality of both transmitter and receiver are combined into a single device known as
a transceiver. Transceivers often lack unique identifiers. The operational states are transmit,
receive, idle, and sleep. Current generation transceivers have built-in state machines that
perform some operations automatically. Most transceivers operating in idle mode have a
power consumption almost equal to the power consumed in receive mode. Thus, it is better to
completely shut down the transceiver rather than leave it in the idle mode when it is not
transmitting or receiving. A significant amount of power is consumed when switching from
sleep mode to transmit mode in order to transmit a packet.
External memory
From an energy perspective, the most relevant kinds of memory are the on-chip memory of a
microcontroller and Flash memory—off-chip RAM is rarely, if ever, used. Flash memories
are used due to their cost and storage capacity. Memory requirements are very much
application dependent. Two categories of memory based on the purpose of storage are: user
memory used for storing application related or personal data, and program memory used for
programming the device. Program memory also contains identification data of the device if
present.
Power source
A wireless sensor node is a popular solution when it is difficult or impossible to run a mains
supply to the sensor node. However, since the wireless sensor node is often placed in a hard-
to-reach location, changing the battery regularly can be costly and inconvenient. An
important aspect in the development of a wireless sensor node is ensuring that there is always
adequate energy available to power the system.
Sensors
Sensors are used by wireless sensor nodes to capture data from their environment. They are
hardware devices that produce a measurable response to a change in a physical condition like
temperature or pressure. Sensors measure physical data of the parameter to be monitored and
have specific characteristics such as accuracy, sensitivity etc. The continual analog signal
produced by the sensors is digitized by an analog-to-digital converter and sent to controllers
for further processing.
Sensors are classified into three categories: omnidirectional sensors; narrow-beam sensors;
and active sensors. Passive sensors sense the data without actually manipulating the
environment by active probing. Active sensors actively probe the environment, for example,
a sonar or radar sensor, and they require continuous energy from a power source. Narrow-
beam sensors have a well-defined notion of direction of measurement, similar to a camera.
Omnidirectional sensors have no notion of direction involved in their measurements.
The advantage of using Layered Network Architecture is that each node participates only in
short-distance, low power transmissions to nodes of the neighbouring nodes because of
which power consumption is less as compared to other Sensor Network Architecture. It is
scalable and has a higher fault tolerance.
2. Clustered Network Architecture:
In Clustered Network Architecture, Sensor Nodes autonomously clubs into groups called
clusters. It is based on the Leach Protocol which makes use of clusters. Leach Protocol
stands for Low Energy Adaptive Clustering Hierarchy.
Properties of Leach Protocol:
It is a 2-tier hierarchy clustering architecture.
It is a distributed algorithm for organizing the sensor nodes into groups called clusters.
The cluster head nodes in each of the autonomously formed clusters create the Time-
division multiple access (TDMA) schedules.
It makes use of the concept called Data Fusion which makes it energy efficient.
Here:
Clustered Network Architecture is a very useful sensor network because of the property of
Data Fusion. Inside each cluster, each node communicates with the cluster head to gather
the information. All the clusters which are formed share their gathered information to the
base station. The cluster formation and selection of cluster head inside each cluster is an
independent and autonomous distributed process.
.
UNIT 5
NETWORKSECURITY REQUIREMENTS
A security protocol for ad hoc wireless networks should satisfy the following requirements
1. Confidentiality:
a. The data sent by the sender must be comprehensible only to the intended receiver.
b. Though an intruder might get hold of the data being sent, he / she must not be able to
derive any useful information out of the data.
c. One of the popular techniques used for ensuring confidentiality is data encryption.
2. Integrity:
a. The data sent by the source node should reach the destination node without being altered.
b. It should not be possible for any malicious node in the network to tamper with the data
during transmission
3. Availability:
a. The network should remain operational all the time.
b. It must be robust enough to tolerate link failures and also be capable of surviving various
attacks mounted on it.
c. It should be able to provide guaranteed services whether an authorized user requires them
4. Non-Repudiation:
a. It is a mechanism to guarantee that the sender of a message cannot later deny having sent
the message and that the recipient cannot deny having received the message.
b. Digital signatures are used for this purpose.
What is Jamming?
Jamming attacks are introduced by emitting radio frequency signals, such attacks are not
easily preventable by regular security measures. In nutshell, jamming works by denying
service to authorized users. In jamming, legal Packets are jammed by the large frequencies of
illegal traffic. The issue of jamming mostly relates to older wireless LANs as they are not
fully upgraded to adapt various new ways of interference.
TYPES OF JAMMERS
A. Constant Jammer
This jammer continuously emits interference signals and it transmits random
bits. It’s a typical strategy of jamming. Being always-On in the transfer it
won’t wait for the channel to become idle. However, it has certain
disadvantages, one is that continuous presence makes it easy to detect & other
is, it consumes significant amount of resources
B. Deceptive Jammer
In this, jammer constantly injects series packets to the channel without any
gap between subsequent transmissions [2]. It also broadcasts fabricated
messages and replies old ones.
C. Random Jammer
In this, jammer switches between the period of jamming and sleep. After
jamming for some time, it stops jamming and enters into sleep mode. The
jammer after sleeping for some amount of time wakes up and resumes
jamming. Both Timers are either random or fixed. This strategy is efficient
compared to previous ones.
D. Reactive Jammer
In this, jammer will remain quiet when the channel is idle. When it senses
activity on the channel, it starts transmitting signal. For the purpose of sensing
the jammer whether it’s ON and should not consume energy.
C. All-Or-Nothing Transformation
The packets are pre-processed by an AONT before transmission but remain
unencrypted. The jammer cannot perform packet classification until all pseudo-
messages corresponding to the original packet have been received and the inverse
transformation has been applied.
REQ: If any neighbour is interested in the data, it sends a REQ packet to the originator of
ADV packet for the DATA.
DATA: Data is sent to its neighbour without considering the type of data or what kind of
data is required. By repeating the same the interested sensor nodes in the entire sensor
network gets a copy of the data.
Some proposed versions of SPIN routing protocols are described as follows:
SPIN-1: SPIN-1 overcomes the problem of blind forward and data inaccessible. Its working is similar
as that of SPIN but it has some better features than SPIN as mentioned below: The initial energy of
each node is equal. Nodes A and B can communicate with each other, if link is symmetrical;
Communication between two nodes is far away from the interference of other nodes, and power is
without any constraints and nodes remain stable.
Assuming all nodes want to achieve the data, and are located on the path to reach sink nodes.
Wireless signals in all directions consume the same energy. SPIN-1 compares the energy of the
node when it REQ for data to threshold energy if energy is enough to perform whole process it sends
1 otherwise it will not respond to the ADV packet. But in SPIN, node sends 0 with REQ on ADV.
M-SPIN: Modified SPIN is energy efficient routing protocol where [8] node finds all information of
its neighbours and find out the distance to the sink. Data is transfer to those nodes which are in the
direction of sink rather than all neighbour nodes. Distance between nodes to the sink is calculated on
the basis of hop distance. It performs in following 3-steps:
Distance Discovery
Negotiation
Data Transmission