0% found this document useful (0 votes)
102 views13 pages

Unit V: Data Aggregation and Security

This chapter explores data aggregation and security in wireless sensor networks. It discusses clustering techniques to organize large networks into sub-networks to allow for localized data collection and aggregation in order to minimize traffic. This includes clustering members sending data to their cluster heads and cluster heads aggregating and analyzing data from their members. The chapter also examines security issues and measures in wireless sensor networks.

Uploaded by

Jack D'souza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
102 views13 pages

Unit V: Data Aggregation and Security

This chapter explores data aggregation and security in wireless sensor networks. It discusses clustering techniques to organize large networks into sub-networks to allow for localized data collection and aggregation in order to minimize traffic. This includes clustering members sending data to their cluster heads and cluster heads aggregating and analyzing data from their members. The chapter also examines security issues and measures in wireless sensor networks.

Uploaded by

Jack D'souza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Unit V : Data Aggregation and Security

Clustering Techniques, In-Network processing and


data aggregation, Compressive sampling, security
issues in Wireless Sensor Networks, Attacks,
Defensive measures, security requirements and
threat model.

1
• This chapter explores how to manage very large wireless
sensor networks.
• In these networks, typical data collection techniques are
not viable, as they flood the network with too much data
and exhaust its energy reserves too quickly.
• There are several possibilities to minimize the traffic in
very large WSNs.
• You can aggregate the data on its way to reduce the
number of packets; organize the network into sub-
networks and let the sub-networks decide what to do
with the data and, last but not least, reduce the data
produced at the individual nodes in the first place.

2
CLUSTERING TECHNIQUES
• Clustering was one of the first techniques applied to very
large networks.
• The main idea is to organize the network into smaller
sub-networks, so that data can be collected and analyzed
in a location-restricted way.
• So only some important or aggregated data comes to
the final network-wide sink.

3
4
Roles of individual nodes:
• Cluster members are simple nodes, which sense some
phenomena. They send their data to their cluster heads. A
cluster member belongs to a single cluster head.
• Cluster heads are local sinks, which gather all of the
information of their cluster members. Several options are
possible here and depend on the application: send
everything through a more powerful link to a final data
storage place; aggregate or compress the data then send it
through the sensor network to a global sink; or analyze the
data and either report some event or not.
• The sink, sometimes called the global sink, is a single node
in the network, which gathers all information from all
nodes in the network. It is not necessary that it exists at all.
5
The main objective of clustering is to save
energy and to avoid data congestion
in the network.

6
Random Clustering
• Where I am & what time I have ?
• Most of devices do not know where they are, ranging
from washing machines and coffee makers to cars and
laptops.
• Only when a GPS receiver is installed, does a device
have location information to use.

7
LOCALIZATION CHALLENGES AND PROPERTIES
• Where I am & what time I have ?
• Most of devices do not know where they are, ranging
from washing machines and coffee makers to cars and
laptops.
• Only when a GPS receiver is installed, does a device
have location information to use.

8
LOCALIZATION CHALLENGES AND PROPERTIES
• Where I am & what time I have ?
• Most of devices do not know where they are, ranging
from washing machines and coffee makers to cars and
laptops.
• Only when a GPS receiver is installed, does a device
have location information to use.

9
LOCALIZATION CHALLENGES AND PROPERTIES
• Where I am & what time I have ?
• Most of devices do not know where they are, ranging
from washing machines and coffee makers to cars and
laptops.
• Only when a GPS receiver is installed, does a device
have location information to use.

10
LOCALIZATION CHALLENGES AND PROPERTIES
• Where I am & what time I have ?
• Most of devices do not know where they are, ranging
from washing machines and coffee makers to cars and
laptops.
• Only when a GPS receiver is installed, does a device
have location information to use.

11
LOCALIZATION CHALLENGES AND PROPERTIES
• Where I am & what time I have ?
• Most of devices do not know where they are, ranging
from washing machines and coffee makers to cars and
laptops.
• Only when a GPS receiver is installed, does a device
have location information to use.

12
13

You might also like