0% found this document useful (0 votes)
66 views1 page

AWSN

This document contains exam questions for a course on ad hoc and wireless sensor networks. It covers topics like data confidentiality, authentication, Sybil attacks, HELLO flood attacks, TESLA security considerations, passive sensors, scheduling in wireless sensor network operating systems, communication protocols in WSN OS, and wireless sensor network simulators. Some of the questions ask students to write notes on SPIN and TESLA protocols, security attacks in WSN, and Berkeley motes. Others ask students to discuss TinyOS for WSN.

Uploaded by

Hari Hara Sudhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views1 page

AWSN

This document contains exam questions for a course on ad hoc and wireless sensor networks. It covers topics like data confidentiality, authentication, Sybil attacks, HELLO flood attacks, TESLA security considerations, passive sensors, scheduling in wireless sensor network operating systems, communication protocols in WSN OS, and wireless sensor network simulators. Some of the questions ask students to write notes on SPIN and TESLA protocols, security attacks in WSN, and Berkeley motes. Others ask students to discuss TinyOS for WSN.

Uploaded by

Hari Hara Sudhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

10. What is mote?

ACET
B.E / B.Tech. DEGREE EXAMINATIONS, NOV/DEC 2022 Part B – (2 x 15 = 30 Marks)
Seventh Semester
11. (a)Write a note on
Electronics and communication Engineering
(i) SPIN protocol
EC8702 - AD HOC AND WIRELESS SENSOR NETWORKS
(ii) TESLA protocol (15)
(Regulation – 2017) (OR)
Internal Assessment Examination –III (b)Discuss the various security attacks in WSN? (15)
Time : 1.30 hours Maximum : 50 Marks
Syllabus: 12 (a) Write a note on Berkeley motes? (15)
UNIT IV SENSOR NETWORK SECURITY
(OR)
Network Security Requirements, Issues and Challenges in Security Provisioning, Network (b) Discuss TinyOs for WSN? (15)
Security Attacks, Layer wise attacks in wireless sensor networks, possible solutions for
jamming, tampering, black hole attack, flooding attack. Key Distribution and Management,
Secure Routing – SPINS, reliability requirements in sensor networks.
UNIT V SENSOR NETWORK PLATFORMS AND TOOLS 
Sensor Node Hardware – Berkeley Motes, Programming Challenges, Node-level software
platforms – TinyOS, nesC, CONTIKIOS, Node-level Simulators – NS2 and its extension to
sensor networks, COOJA, TOSSIM, Programming beyond individual nodes – State centric
programming.

Answer ALL questions


Part A – (10 x 2 = 20 Marks)
1. Define data confidentially?
2. What is authentication?
3. What is Sybil attack? FACULTY INCHARGE HOD PRINCIPAL
4. Explain HELLO flood attack?
5. What are the various TESLA security considerations?
6. What are the passive sensors?
7. How scheduling is handled in WSN OS ?
8. How communication protocol is supported in WSN OS?
9. List down some of the main WSN simulators? EXA 13a(00)

You might also like