Unit III Wireless Sensor Networks
Unit III Wireless Sensor Networks
Course Objectives:
1) Knowledge:
i. To understand wireless networks technologies and applications
ii. To study Ad-Hoc, sensor networks architecture, challenges and applications
iii. To understand basic security needs and issues in wireless networks
iv. To understand mobile device security architecture and security dynamics
2) Skills:
i. This course gives understanding of how to design and configure your own network
3) Attitude:
i. To deploy the network as well as provide various security aspects to the mobile device
Course Outcomes:
i. Compare different wired and wireless technologies
ii. Simulate and analyze wireless Ad-Hoc networks for different protocols
iii. Analyze the security threats in wireless sensor networks
iv. Configure or Program security needs in mobile devices
Disclaimer:
a. Information included in these slides came from multiple sources. We have tried our best to cite the
sources. Please refer references to learn about the sources, when applicable.
b. The slides should be used only for preparing notes, academic purposes (e.g. in teaching a class), and
should not be used for commercial purposes.
Applications
LoRa WANs
RFID technologies
Using in military
• Battlefield surveillance and monitoring, guidance systems of intelligent missiles,
detection of attack by weapons of mass destruction such as chemical, biological, or
nuclear
Using in nature
• Forest fire, flood detection, habitat exploration of animals
Using in health
• Monitor the patient’s heart rate or blood pressure, and sent regularly to alert the
concerned doctor, provide patients a greater freedom of movement
Using in home (smart home)
• Sensor node can built into appliances at home, such as ovens, refrigerators, and
vacuum cleaners, which enable them to interact with each other and be remote-
controlled
Using in warehouse
• Improve their inventory control system by installing sensors on the products to
track their movement
Comparison between
Wireless Senor Networks and Ad Hoc Wireless Networks
• The number of nodes in sensor network can be several orders of magnitude large than
the number of nodes in an ad hoc network.
• Sensor nodes are more easy to failure and energy drain, and their battery sources are
usually not replaceable or rechargeable.
• Sensor nodes may not have unique global identifiers(ID), so unique addressing is not
always feasible in sensor networks.
• Sensor networks are data-centric, the queries in sensor networks are addressed to
nodes which have data satisfying some conditions.
• Ad Hoc networks are address-centric, with queries addressed to particular nodes
specified by their unique address.
• Data fusion/aggregation: the sensor nodes aggregate the local information before
relaying.
• The goals are reduce bandwidth consumption, media access delay, and power
consumption for communication.
Issues and Challenges in
Designing a Sensor Network
Sensor nodes are randomly deployed and hence do not fit into any regular topology.
Once deployed, they usually do not require any human intervention.
Hence, the setup and maintenance of the network should be entirely autonomous.
Sensor networks are infrastructure-less.
Therefore, all routing and maintenance algorithms need to be distributed.
Energy problem
Hardware and software should be designed to conserve power
Sensor nodes should be able to synchronize with each other in a completely
distributed manner, so that TDMA schedules can be imposed.
Issues and Challenges in
Designing a Sensor Network
• The routing protocols should be able to dynamically include or avoid sensor nodes in
their paths.
• Provision must be made for secure communication over sensor networks, especially
for military applications which carry sensitive data.
Classification of Sensor Network Protocols
Sensor Network Architecture
Layered Architecture
• It has a single powerful base station, and the layers of sensor nodes around it
correspond to the nodes that have the same hop-count to the BS.
• Used with in-building wireless backbones, and in military sensor-based
infrastructure, such as MINA
• In the in-building scenario, the BS acts an access point to a wired network,
and small nodes form a wireless backbone to provide wireless connectivity.
• The users of the network have hand-held devices such as PDAs which
communicate via the small nodes to the BS.
• Advantage: as each node is involved only in short-distance, low-power
transmissions to nodes of the neighboring layers.
Unified Network Protocol Framework (UNPF)
DTROC avoids hidden terminal and exposed terminal problems by suitable channel allocation algorithms.
Routing Protocol
• The layered architecture enables multi-hop data forwarding from the sensor nodes to
the BS.
• Existing ad hoc routing protocols can be simplified for the layered architecture,
• Since only nodes of the next layer need to be maintained in the routing table.
Clustered Architecture
The steady phase is of longer duration in order to minimize the overhead of cluster formation.
During the steady phase, data transmission takes place based on the TDMA schedule, and the
cluster-heads perform data aggregation/fusion through local computation.
The BS receives only aggregated data from cluster heads, leading to energy conservation.
After a certain period of time in the steady phase, cluster-heads are selected again through the
set-up phase.
Data Dissemination
It is the process by which queries or data are routed in the sensor network.
The data collected by sensor nodes has to be communicated to the node who interested in the data or
collector of data.
The node that generates data is call Source Node and the information to be reported is called an
event.
A node which interested in an event is called Sink Node.
Data dissemination consist of a two-step process :
Interest propagation: An interest is a descriptor for a particular kind of data or event that a node is
interested in, such as temperature, intrusion, or presence of bio-agents.
• For every event that a sink is interested in, it broadcasts its interest to its neighbors and periodically refreshes
its interest.
• The interest is propagated across the network, and every node maintains an interest cache of all events to be
reported.
• This is similar to a multicast tree formation, rooted at the sink.
• When an event is detected, it is reported to the interested nodes after referring to the interest cache.
• Intermediate nodes maintain a data cache and can aggregate the data or modify the rate of reporting data.
Data Dissemination
Data propagation:
• When an event is detected, it is reported to the interested nodes (sink node).
• The paths used for data propagation are modified by preferring the shortest paths and
deselecting the weaker or longer paths.
• The basic idea of diffusion is made efficient and intelligent by different algorithms for
interest and data routing.
1. Flooding
Every sensor node (re-) broadcasts sensor data to all of its neighbors
In flooding, each node which receives a packet broadcasts it if the maximum hop-count of
the packet is not reached and the node itself is not the destination of the packet.
This technique does not require complex topology maintenance or route discovery
algorithms.
Simple and reliable technique
Incurs large traffic overhead (maximum-hop counts and sequence numbers can be
used to limit broadcasts and eliminate duplicates)
However, flooding faces three more challenges:
• Traffic Implosion: This is the situation when duplicate messages are sent to the same node.
This occurs when a node receives copies of the same message from many of its neighbors.
• Overlap: The same event may be sensed by more than one node due to
• overlapping regions of coverage. This results in their neighbors receiving duplicate reports
of the same event.
• Resource blindness: The flooding protocol does not consider the available energy at the
nodes and results in many redundant transmissions. Hence, it reduces the network lifetime.
2. Gossiping
Useful in scenarios where the sensor nodes themselves generate requests/queries for data sensed
by other nodes.
Each sensor node names its data with one or more attributes.
Each sensor node express their interest depending on these attributes.
Each path is associated with a interest gradient, while positive gradient make the data flow
along the path, negative gradient inhibit the distribution data along a particular path.
• Example : two path formed with gradient 0.4 and 0.8, the source may twice as much data
along the higher one
• Suppose the sink wants more frequent update from the sensor which have detected an event
=> send a higher data-rate requirement for increasing the gradient of that path.
• Query
– Type = vehicle /* detect vehicle location
interval = 1 s /* report every 1 second
rect = [0,0,600,800] /* query addressed to sensors within the rectangle
timestamp = 02:30:00 /* when the interest was originated
expiresAt = 03:00:00 /* till when the sink retain interest in this data
• Report
– Type = vehicle /* type of intrusion seen
instance = car /* particular instance of the type
location = [200,250] /* location of node
confidence = 0.80 /* confidence of match
timestamp = 02:45:20 /* time of detection
6. Sensor Protocols for Information via Negotiation (SPIN)
Optimized for networks using point-to-point transmission media (two nodes communicate exclusively
with each other without interference)
SPIN-PP uses negotiation to overcome the implosion and overlap problems of the traditional flooding
and gossiping protocols
SPIN-EC
It is cost expensive when the sensor nodes are very far from the BS.
Hence, this scheme performs poorly with respect to the energy × delay
metric.
2. Power-Efficient Gathering for Sensor Information Systems (PEGASIS)
A node which is designated as the leader finally transmits one message to the BS.
Leadership is transferred in sequential order, and a token is passed so that the nodes know
in which direction to pass messages in order to reach the leader.
The delay involved in messages reaching the BS is O(N), where N is the total number
of nodes in the network.
39
3. Binary Scheme
This is a chain-based scheme like PEGASIS, which classifies nodes into different levels.
This scheme is possible when nodes communicate using CDMA, so that transmissions of each
level can take place simultaneously.
The delay is O(logN)
4. Chain-Based Three-Level Scheme
For non-CDMA sensor nodes
The chain is divided into a number of groups to space out simultaneous transmissions in order to
minimize interference.
Within a group, nodes transmit data to the group leader, and the leader fusion the data, and
become the member to the next level.
During aggregation of sensed data, the location information of sensors must be considered.
Each nodes couple its location information with the data in the messages it sends.
GPS is not always feasible because it cannot reach nodes in dense foliage or indoor, and it
consumes high power
Fixed beacon nodes are placed in the field of observation, such as within building.
The randomly distributed sensors receive beacon signals from the beacon nodes and measure
the signal strength, angle of arrival, time difference between the arrival of different beacon
signals.
The nodes estimate distances by looking up the database instead of performing computations.
44
2. Sensor Network Localization
46
Synchronization in Sensor networks
Clocks and the Synchronization Problem
Time synchronization is highly
critical in sensor networks for Common time scale among sensor nodes is important for a
purposes such as: variety of reasons,
• Data Diffusion identify causal relationships between events in the physical
• Coordinated Actuation world support the elimination of redundant data facilitate
• Object Tracking sensor network operation and protocols.
Typical clocks consist of quartz-stabilized oscillator and a
To Synchronize all the nodes in the counter that is decremented with every oscillation of the quartz
sensor network using a method that: crystal When counter reaches 0, it is reset to original value and
interrupt is generated Each interrupt (clock tick) increments
• Eliminates error efficiently software clock (another counter)Software clock can be read by
• Energy conservative applications using API Software clock provides local time with
• Provides tight synchronization C(t) being the clock reading at real time t Time resolution is
the distance between two increments (ticks) of software clock
47
Clock Parameters
Clock offset: difference between the local times of C(t) must be piecewise continuous
two nodes Synchronization is required to adjust (strictly monotone function of
clock readings such that they match Clock rate: time)clock adjustments should occur
frequency at which a clock progresses Clock skew: gradually, e.g., using a linear
difference in frequencies of two clocks Clock rate compensation function that changes the
dC/dt depends on temperature, humidity, supply slope of the local time simply jumping
voltage, age of quartz, etc., resulting in drift rate forward/backward in time can have
(dC/dt-1) unintended consequences time-
triggered events may be repeated or
skipped
clocks are synchronized with external source of time (reference clock)reference clock is
accurate real-time standard (e.g., UTC)Internal synchronization clocks are synchronized
with each other (no support of reference clock) goal is to obtain consistent view of time
across all nodes in network network-wide time may differ from external real-time
standards External synchronization also provides internal synchronization Accuracy:
maximum offset of a clock with respect to reference clock Precision: maximum offset
between any two clocks If two nodes synchronized externally with accuracy of Δ, also
synchronized internally with precision 2Δ
47
Why Time Synchronization in WSNs?
47
Synchronization Messages
47
Sender-Receiver Synchronization
Receiver-Receiver Synchronization
47
Timing-sync Protocol for Sensor Networks
47
Synchronization phase pairwise
synchronization along the edges of Synchronization phase (contd.) phase initiate by root
hierarchical structure each node on node issuing time_sync packet after waiting for
level i synchronizes with nodes on random interval (to reduce contention), nodes in
level i-1 approach similar to LTS: level 1 initiate two-way message exchange with root
node j issues synchronization pulse at node nodes on level 2 will overhear synchronization
t1 (containing level and time stamp) pulse and initiate two-way message exchange with
node k receives message at t2 and level 1 nodes after random delay process continues
responds with an ACK at t3 throughout network Synchronization error of TPSN
(containing t1, t2, t3, and level) node j depth of hierarchical structure end-to-end latencies
receives ACK at t4 node j calculates
drift and propagation delay
47
Flooding Time Synchronization Protocol
Goals of FTSP include: network- t1: wireless radio informs CPU that it is ready for next
wide synchronization with errors message d1: interrupt handling time (few microseconds) t2:
in microsecond range scalability CPU generates time stamp d2: encoding time (transform
up to hundreds of nodes message into electromagnetic waves; deterministic, low
robustness to topology changes. hundreds of microseconds) d3: propagation delay (from t3
FTSP uses single broadcast on node i to t4 on node j; typically very small and
message to establish deterministic) d4: decoding time (deterministic, low
synchronization points hundreds of microseconds) d5: byte alignment time (delay
Decomposes end-to-end delay into caused by different byte alignments (bit offsets), i.e.,
different components receiving radio has to determine the offset from a known
synchronization byte and then shift incoming message
accordingly); can reach several hundreds of microseconds
t7: interrupt, CPU obtains time stamp
47
Time-stamping in FTSP sender sends single broadcast containing
time stamp (estimated global time) receiver extracts time stamp
from message and time-stamps arrival (leads to global-local time
pair, providing a synchronization point) synchronization message
begins with preamble followed by SYNC bytes, data field, and
CRC preamble bytes are used to synchronize receiver radio to
carrier frequency SYNC bytes are used to calculate bit offset
47
Time-stamping in FTSP (contd.)multiple time stamps are used at both sender and
receiver to reduce jitter of interrupt handling and encoding / decoding times time
stamps are recorded at each byte boundary after the SYNC bytes as they are
transmitted or received time stamps are normalized by subtracting appropriate
integer multiple of nominal byte transmission time (e.g., approx. 417μs on
Mica2) jitter in interrupt handling can be reduced by taking the minimum of
normalized time stamps jitter in encoding/decoding can be reduced by averaging
these corrected normalized time stamps final (error-corrected) time stamp is
added into data part of message at receiver side, time stamp must further be
corrected by the byte alignment time (can be determined from transmission speed
and bit offset)
47
Multi-hop synchronization root node is elected based on unique node
IDs root node maintains global time and all other nodes synchronize to
root synchronization is triggered by broadcast message by the root
node.
Whenever node does not receive synchronization message for certain
amount of time, it declares itself to be the new root whenever root
receives a message from node with lower node ID, it gives up root
status all receiver nodes within range establish synchronization points
other nodes establish synchronization points from broadcasts of
synchronized nodes that are closer to the root .
a new node joining the network with lowest node ID will first collect
synchronization messages to adjust its own clock before claiming root
status.
47
Multi-hop scenarios possible by establishing
multiple reference beacons, each with its own
broadcast domain. Domains can overlap and
nodes within overlapping regions serve as
bridges to allow synchronization across
domains, RBS uses large amount of message
exchanges,
However, RBS is a good candidate for post-
facto synchronization nodes synchronize after
event of interest has occurred to reconcile
their clocks
The sender periodically sends a message with its current clock as a timestamp to the
receiver
Receiver then synchronizes with the sender by changing its clock to the timestamp of the
message it has received from the sender (if the latency is small compared to the desired
accuracy)
Sender calculates the phase error by measuring the total round trip-time by sending and
receiving the respective response from the receiver (if the latency is large compared to the
desired accuracy)
Types of errors that TTS should detect and eliminate
S R
S R
47
Advantages of RBS
• Nodes stay in sleep mode until an event of interest occurs – post-facto synchronization
RBS vs TTS
47
Limitations of RBS
Applications
47
IoT Definition
Humans
Smart Devices
Computers
Animals
Automobiles
Buildings
Any natural or man-made
Objects…
Any Service /
Any Business
IoT
Any Network
Anywhere /
Any Location
Why do we need IoT?
Benefits of IoT
Connectivity
Intelligence and Identity
Scalability
Dynamic and Self Adapting
Architecture
Safety
IoT technologies
IOT Networking
• Range
• Data rate
• Traffic pattern
• Power
• Mobility
• Number of devices
• Price
• Security
• Coverage
• Spectrum
Block diagram of an IoTDevice
Functional
attributes
Sensing
Actuation
Analysis &
Processing
Communication
RaspberryPi
pcDuino
Other Beagle
Arduino IoT Bone
Black
Devices
Cubie
Board
pcDuino
Beagle Bone Black
CubieBoard
Arduino
IoT Networking
WLAN Cellular
802.11xx 2G, 3G, 4G
Power consumption
PAN LPWAN
Bandwidth
Range
LPWAN
Long range
Easy and
Low data
cheap
rate
deployment
LPWAN
Massive
number of
devices
Low Power Wide Area Networks: Fundamentals
Centralized Control
+
Minimal Signaling
Simple Devices
Energy Efficient
PHYALOHA-Based Medium Access
Reachability
Low Data Rate
Low Receiver Sensitivity
Reliability
Simple FEC Optional Retransmissions
Any Complexity at Basestation
Data Link Layer
Physical Layer
LoRaWAN
Applications
Data
Management
Hardware / Readers
Chips / Tags
Thank You!!!
Learning Resources
Text books
1. C. Siva Ram Murthy, B.S. Manoj, “Adhoc Wireless Networks Architectures and Protocols”, PHI, ISBN - 9788131706885,
2007.
2. Nekoley Elenkov, “Android Security internals”, No Starch Press, ISBN-10: 1-59327-581-1 ISBN-13: 978-1-59327-581
Reference Books
1. KiaMakki, Peter Reiher, “Mobile and Wireless Network Security and Privacy “, Springer, ISBN 978-0-387-71057-0,
2007.
2. Hakima Chaouchi, Maryline Laurent-Maknavicius , “Wiress and Mobile Networks Security”, Wiley publication, ISBN
978-1-84821-117-9
3. Noureddine Boudriga, “Security of Mobile Communications”, ISBN 9780849379413, 2010.
4. Kitsos, Paris; Zhang, Yan, “RFID Security Techniques, Protocols and System-On-Chip Design”, ISBN 978-0-387-76481-
8, 2008.
5. Johny Cache, Joshua Wright and Vincent Liu,” Hacking Wireless Exposed: Wireless Security Secrets & Solutions “,
second edition, McGraw Hill, ISBN: 978-0-07-166662-6, 2010
6. Tim Speed, Darla Nykamp,Mari Heiser,Joseph Anderson,Jaya Nampalli, "Mobile Security: How to Secure, Privatize,
and Recover Your Devices", Copyright © 2013 Packt Publishing, ISBN 978-1-84969-360-8
10/25/2023 117
Learning Resources
Web Resources:
i. http://whatis.techtarget.com/definition/mobile-security
ii. http://techgenix.com/security/mobile-wireless-security/
Weblinks
i. https://en.wikipedia.org/wiki/Mobile_security
MOOCs:
i. https://www.ntnu.edu/studies/courses/TTM4137#tab=omEmnet
ii. http://nptel.ac.in/courses/106105160/37
iii. https://www.eccouncil.org/
iv. https://www.csoonline.com/article/2122635/mobile-security/wireless-security--the-basics.html
10/25/2023 118
10/25/2023 119