Sensor New

Embed Size (px)

Citation preview

  • 8/3/2019 Sensor New

    1/21

  • 8/3/2019 Sensor New

    2/21

    Wireless Sensor Networks

    Sensor: a small, lightweight device which measures the

    environment of physical parameters such as temperature,

    pressure, relative humidity,

    Sensor Networks: are highly distributed networks of wireless

    sensor nodes, deployed in large numbers to monitor the

    environment or system.

    Sensor Node : consists of sensing, computing, communication,

    actuation, and power components.

  • 8/3/2019 Sensor New

    3/21

    Sensor networks VS ad hoc networks

    y The number of nodes in a sensor network can be several orders ofmagnitude higher than the nodes in an ad hoc network.

    y Sensor nodes are densely deployed.

    y Sensor nodes are limited in power, computational capacities and memory.

    y Sensor nodes are prone to failures.

    y The topology of a sensor network changes frequently.

    y Sensor nodes mainly use broadcast, most ad hoc networks are based on p2p.

    y Sensor nodes may not have global ID.

  • 8/3/2019 Sensor New

    4/21

    Factors Influencing Sensor Network Designy Fault tolerance

    y Scalability

    y Operating environment

    y Sensor network topology

    y Transmission media

    y Power consumption

  • 8/3/2019 Sensor New

    5/21

    Application Of Wireless Sensor Networks

    y Environmental Data Collection

    y Security Monitoring

    y Node Tracking Scenarios

    y The military applications

    yThe Medical Application

    y Home and Other Commercial Application

  • 8/3/2019 Sensor New

    6/21

    TYPES OFATTACKS ON WSN

    y In many applications, the data obtained by the sensing nodes needs to be

    kept confidential and it has to be authentic

    y In the absence of security a false or malicious node could intercept private

    information, or could send false messages to nodes in the network.

    y

    The major attacks are:Denial of Service (DOS),

    Worm hole attack,

    Sinkhole attack,

    Sybil attack,

    SelectiveF

    orwarding attack,Passive information gathering,

    Node capturing,

    False or malicious node,

    Hello flood attack

  • 8/3/2019 Sensor New

    7/21

    Denial of Service (DoS)

    y The simplest DoS attack tries to exhaust the resources available to

    the victim node, by sending extra unnecessary packets and thus

    prevents legitimate network users from accessing services or

    resources to which they are entitled

    y

    DoS attack is meant not only for the adversary's attempt to subvert,disrupt, or destroy a network, but also for any event that diminishes a

    network's capability to provide a service

    The Sybil attack

    y In this attack, a single node i.e. a malicious node will appear to be a set of

    nodes and will send incorrect information to a node in the network.y Authentication and encryption techniques can prevent an outsider to launch

    a Sybil attack on the sensor network. However, an insider cannot be

    prevented from participating in the network, but he should only be able to

    do so using the identities of the nodes he has compromised.

  • 8/3/2019 Sensor New

    8/21

    Selective Forwarding attack

    y It is a situation when certain nodes do not forward many of the messages

    they receive.

    y The sensor networks depend on repeated forwarding by broadcast for

    messages to propagate throughout the network.

    Sinkhole attacks

    y In a sinkhole attack, the adversary's aim is to lure nearly all the traffic from

    a particular area through a compromised node, creating a sinkhole with the

    adversary at the center

    y Sinkhole attacks typically work by making a compromised node lookespecially attractive to surrounding nodes with respect to the routing

    algorithm.

  • 8/3/2019 Sensor New

    9/21

    Passive Information Gathering

    y An intruder with an appropriately powerful receiver and well designed

    antenna can easily pick off the data stream.

    y Interception of the messages containing the physical locations of sensor

    nodes allows an attacker to locate the nodes and destroy them

    y

    Besides the locations of sensor nodes, an adversary can observe theapplication specific content of messages including message IDs, timestamps

    and other fields.

    False or Malicious Node

    y Most of the attacks against security in wireless sensor networks are caused

    by the insertion of false information by the compromised nodes within thenetwork

  • 8/3/2019 Sensor New

    10/21

  • 8/3/2019 Sensor New

    11/21

    Sensor NetworkArchitecture

    LayeredArchitecture

    yThe sensor nodes, which are notnear enough to the base station,

    communicate over nodes of

    neighboring layers.

    y

    Example UNPF: Unified networkprotocol framework

  • 8/3/2019 Sensor New

    12/21

    Clustered Architecture

    y Sensor nodes are organized in

    clusters

    y Each cluster has a cluster-head,y Cluster formation must be an

    autonomous process.

    y Example: Low-Energy Adaptive

    Clustering Hierarchy (LEACH)

  • 8/3/2019 Sensor New

    13/21

    Data Handling Data dissemination is the process by which

    queries for data are routed in the sensornetwork

    Consists of a two-step process of interestpropagation and data propagation

    First, the node that is interested in someevents, like temperature or air humidity,broadcasts its interests to its neighborsperiodically. Interests are then propagatedthrough the whole sensor network

    In the second step, nodes that have requesteddata, send back data after receiving the

    request. Intermediate nodes in the sensornetwork also keep a cache of receivedinterests and data.

  • 8/3/2019 Sensor New

    14/21

    Flooding

    each node which receives a packet broadcasts it if the maximum hop-count of the packet is not reached and the node is not the destination

    of the packet.

    y Advantages: easy to implement and maintenance

    y Disadvantages: Implosion (duplicate messages are sent to the same

    node), Overlap (overlapping regions of sensor coverage), Resource

    blindness (many redundant transmissions, reduced network lifetime)

    Gossiping

    y modified version of flooding, nodes do not broadcast a packet, but send it to

    a randomly selected neighbor.y Advantages: easy to implement and maintenance, lower overhead than

    flooding

    y Disadvantages: need a long time for a message to propagate throughout the

    network, does not guarantee that all nodes will receive the message!

  • 8/3/2019 Sensor New

    15/21

    Sensor Protocols For Information via Negotiation( SPIN)

    SPIN uses three types of messages: ADV, REQ, and DATA

    The sensor node that has collected some data sends an ADV message

    containing meta-data describing the actual data.

    If some of node's neighbors is interested in the data, the neighbor sends a

    REQmessage back.

    After receiving the REQ message, the sensor node sends the actual DATA.

    The neighbor also sends ADV message forward to its neighbors, thus data isdisseminated through the network

  • 8/3/2019 Sensor New

    16/21

    Cost FieldApproach

    Considers the problem of setting up paths to a sink

    y Two-phase process:

    The first phase set up the cost field at all sensor nodes (based on metrics

    such as delay,)

    The second phase uses the cost for data dissemination

    The cost at each node is the minimum cost from the node to the sink, which

    occurs on the optimal path.

  • 8/3/2019 Sensor New

    17/21

    Geographic Hash Table(GHT)

    y Inspired by Internet-scale

    distributed hash table (DHT)

    y stores a pair (key, value)

    y The data is stored distributed acrossall sensors not routed to a central

    storage.

    y More effective in large sensor

    networks where a large number of

    events are detected but not all are

    queried.

  • 8/3/2019 Sensor New

    18/21

    Data gathering model

    y Data gathering algorithms try to maximize

    the number of rounds of communication

    before the nodes die and the network

    becomes inoperable.

    y Conflicting requirements:

    Minimum delay and minimum energy

    consumption

  • 8/3/2019 Sensor New

    19/21

    DirectTransmission

    y Every node sends the collected data

    directly to the base station.

    y high energy consumption, and delays

  • 8/3/2019 Sensor New

    20/21

    PowerEfficient Gathering for Sensor Information System

    y PEGASIS aims to minimize the transmission

    distances over the whole sensor network,

    minimize the broadcast overhead, minimize

    the amount of messages that are sent to the

    base stationy In PEGASIS a chain of sensor nodes is

    constructed using a greedy algorithm starting

    from the node farthest from the base station.

    y During the data transmission, nodes

    aggregate the data and only one message isforwarded to the next node.

    y The node that is selected as a leader then

    transmits all the data to the base station in a

    single message.

  • 8/3/2019 Sensor New

    21/21

    Binary Scheme

    Also chain based algorithm like PEGASIS which classifies nodes intodifferent levels.

    Levels: all nodes which receive a message rise to the next level. The

    number of nodes is halved from a level to the next.

    y An example of the binary scheme is shown in Figure below. Nodes s1,

    s3, s5 and s7 receive messages on the first level and thus theyy rise to the next level. On the second level nodes s3 and s7 receive

    messages and finally node s7 forwards all data to the base station.