0% found this document useful (0 votes)
364 views

Synopsis

Wireless sensor networks consist of distributed nodes that collect environmental data. They have applications in areas like habitat monitoring, inventory control, and military surveillance. The nodes have limited battery power, so energy efficiency is a key challenge. Communication between nodes must also be secure to prevent attacks. Several simulators exist for testing wireless sensor network protocols related to routing, security, and trust. Routing protocols are influenced by factors like energy constraints, data delivery models, and network dynamics. They can be classified based on when routes are computed (proactive or reactive) or the network structure (flat, hierarchical, location-based). Research on sensor network security focuses on authentication, encryption, and building trust models.

Uploaded by

Divya Lunawat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
364 views

Synopsis

Wireless sensor networks consist of distributed nodes that collect environmental data. They have applications in areas like habitat monitoring, inventory control, and military surveillance. The nodes have limited battery power, so energy efficiency is a key challenge. Communication between nodes must also be secure to prevent attacks. Several simulators exist for testing wireless sensor network protocols related to routing, security, and trust. Routing protocols are influenced by factors like energy constraints, data delivery models, and network dynamics. They can be classified based on when routes are computed (proactive or reactive) or the network structure (flat, hierarchical, location-based). Research on sensor network security focuses on authentication, encryption, and building trust models.

Uploaded by

Divya Lunawat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

INTRODUCTION

A Wireless Sensor Network (WSN) consists of a mass of inexpensive, lightweight,


battery-operated multifunctional sensor nodes. The feasibility of these sensor
networks is accelerated by the advances in MEMS (Micro ElectroMechanical
Systems) technology, combines with low power, low cost Digital Signal Processors
(DSPs) and Radio Frequency (RF) circuits. Sensor networks are deployed in military
or citizen field for collecting information or monitoring environment. Sensors nodes
are severely energy constrained and expected to last until their energy drains out.
Since it is not practical to replace the batteries of thousands of sensor nodes, the key
challenge in sensor networks becomes to maximizing the lifetime of sensor nodes.
Therefore sensing, computing and communication protocols must be made as
energy efficient as possible. Another key issue in wireless sensor networks is to have
secure communication between sensor nodes and base station. A very few research
has been reported in the literature so far on sensor network security.
Wireless sensor networks can be deployed in both indoors and outdoors. Sensor
nodes can be deployed on a very large scale, possibly even mixed into concrete and
paint, woven in fabric, or scattered from airplanes. It can also be used in habitat
monitoring, energy management, inventory control, and military warfare. Thus many
sensor networks will likely to be deployed in open, physically insecure, or even
hostile environments where node compromise is a distinct possibility. Depending on
the deployment platform, there are a variety of applications for such sensor
networks.
To provide security, communication in sensor network should be encrypted and
authenticated. Researchers therefore began focusing on building a sensor trust
model to solve the problems beyond the capability of cryptographic security. It is
important to prevent unauthorized users from eavesdropping, obstructing and
tampering with sensor data, and launching denial-of-service (DOS) attacks against
entire network. A secure routing protocol should be such to handle any attack in a
way so that network continues to function properly.

APPLICATIONS OF WSNS
1. Area monitoring
2. Environmental monitoring Greenhouse monitoring Landslide detection
3. Industrial monitoring Machine health monitoring
4. Water/Wastewater monitoring Landfill ground well level monitoring and pump
counter Agriculture
5. Fleet monitoring
6. Health Monitoring
7. Security

Types of Simulator:

NS-2 is the most popular non-specific network simulator environment. NS-2 is


a discrete event simulator developed in C++ software. The NS-2 Supports the
wide range of protocols in all layers.
The second simulator for WSNs is OMNET++, it is also a discrete event
simulator developed in C++. It has very clear design. It provides easy
Graphical User Interface (GUI) library for tracing, animation and debugging
support.
The other type of simulator is J-sim. It is a component based simulation
environment entirely developed in JAVA software. It is also provides GUI for
tracing, animation, debugging and also the script interface.
The other simulator is NCTUns2.0, it is a discrete event simulator developed
in kernel of UNIX software.
JiST/SWANS, it is also a discrete event simulation framework that embeds the
simulation in JAVA byte-code. It is run entirely in JAVA programming.
GloMoSim, it is one type of simulation framework simulation environment built
in parsec. Parsec is a simulation language derived from C language.
TRMSim allows researchers to test and compare their trust and reputation
models against a wide range of WSNs. They can decide whether they want
static or dynamic networks, the percentage of fraudulent nodes, the
percentage of nodes acting as clients or servers, etc.It has been designed to
easily adapt and integrate a new model within the simulator. Only a few
classes have to be implemented in order to carry out this task.

Routing in WSN

Routing in WSNs is challenging due to distinguish from other wireless


networks like mobile ad hoc networks or cellular networks.

First, it is not possible to build a global addressing scheme for a


large number of sensor nodes. Thus, traditional IP-based protocols
may not be applied to WSNs. In WSNs, sometimes getting the data
is more important than knowing the IDs of which nodes sent the
data.
Second, in contrast to typical communication networks, almost all
applications of sensor networks require the flow of sensed data
from multiple sources to a particular BS.
Third, sensor nodes are tightly constrained in terms of energy,
processing, and storage capacities. Thus, they require carefully
resource management.
Fourth, in most application scenarios, nodes in WSNs are generally
stationary after deployment except for, may be, a few mobile nodes.
Fifth, sensor networks are application specific, i.e., design
requirements of a sensor network change with application.

Sixth, position awareness of sensor nodes is important since data


collection is normally based on the location.
Finally, data collected by many sensors in WSNs is typically based
on common phenomena, hence there is a high probability that this
data has some redundancy.

The design of routing protocols in WSNs is influenced by many challenging


factors. These factors must be overcome before efficient communication can
be achieved in WSNs.

Node deployment

Energy considerations

Data delivery model

Node/link heterogeneity

Fault tolerance

Scalability

Network dynamics

Transmission media

Connectivity

Coverage

Data aggregation/convergecast

Quality of service

TRMSimulator
TRMSim-WSN (Trust and Reputation Models Simulator for Wireless Sensor
Networks) is a Java-based simulator aimed to test Trust and Reputation models for
WSNs.
It provides several Trust and Reputation models and new ones can be easily added.
It allows researchers to test and compare their trust and reputation models against a
wide range of WSNs. They can decide whether they want static or dynamic
networks, the percentage of fraudulent nodes, the percentage of nodes acting as
clients or servers, etc .It has been designed to easily adapt and integrate a new
model within the simulator. Only a few classes have to be implemented in order to
carry out this task.

Types of Routing Protocol


Due to the huge variety of protocols and their features, there is no unique or
standard classification scheme followed for all routing protocols. However, two ways
of categorising routing protocols have been listed below.
(1) Based on time of route computation: Routing protocols can be classified based
on time the routes are computed. This scheme is common in Mobile Ad-Hoc
networks.
Proactive (Table-Based)
In a proactive protocol, every node maintains one or more tables representing the
topology of the network. The tables are updated at regular intervals to make sure
upto-date information is present in the system at all times. Whenever a packet needs
to be sent, this information is used by the node. Optimised Link State Routing
Protocol (OLSR) is a popular Ad-Hoc proactive protocol. Protocol (OLSR) is a
popular Ad-Hoc proactive protocol.
Reactive (On-Demand)
Reactive protocols do not demand the route-discovery process to be started until a
route to the destination is required by a packet. This helps in reducing the overall
network overhead at the cost of routing delay, as routes are not stored in memory all
the time. Ad-Hoc on-demand Distance Vector Routing protocol (AODV) is a new
protocol that uses reactive routing techniques for ad-hoc networks.

(2) Based on Network Structure:


The routing protocols in WSNs need to address various demands of the network
they are being used in. This is needed to meet the energy requirements of the
system. Based on the network structure, routing protocols can be divided into 3
major categories.
Flat
In a flat network, all nodes essentially play the same role. This means that the nodes
have similar features in terms of hardware capabilities and duties (sensing and
routing) in the network. Heinzelman et al. came up with a number of adaptive
protocols under this category called SPIN (Sensor Protocols for Information via
Negotiation).
Hierarchical (Cluster-Based)
This set of protocols has emerged to address the data aggregation and scalability
requirements of WSNs. In a hierarchical setup, higher-energy nodes can be used to
perform special tasks like data aggregation, processing and sending data to the base
station, whereas low-energy nodes can be used simply to sense data near the target
and send it only to the cluster head. Such protocols help in reducing energywastage, redundant data transmission and improve overall system scalability.
LEACH Protocol suggested in leads to overall network lifetime gains using
clustering.

Location-Based
In these protocols, nodes are addressed and used for routing based on their location
in the network. This location can be estimated using received signal strengths or a
low power GPS receiver. This helps in formation of routes and improves efficiency,
as only those nodes need to be considered that are on the route to the base station
from the point of detection. GPSR (Greedy Perimeter Stateless Routing for Wireless
Networks) suggests a geographic location based routing scheme.

LITERATURE REVIEW
[1] N. Aboudagga, M.T. Refaei, M. Eltoweissy, L. DaSilva and J. Quisquater,
Authentication Protocols for Ad Hoc Networks : Taxonomy and Research Issues, In
Proceedings of the 1st ACM international workshop on Quality of service & security in
wireless and mobile networks, Quebec, Canada, 2005, pp. 96-104.
[2] W. Du, R. Wang and P. Ning, An Efficient Scheme for Authentication Public Keys in
Sensor Networks, In Proceeding of 6th ACM International Symposium on Mobile Ad Hoc
Networking and Computing (MobiHoc), IL, USA, 2005, pp. 58-67.
[3] H. Cam, S. Ozdemir, D. Muthuavinashiappan and P. Nair, Energy Efficient Security
Protocol for Wireless Sensor Networks, Vehicular Technology Conference, 2003, vol. 5, pp.
2981-2984.
[4] C. Karlof and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and
Countermeasures, In Proceedings of the 1st IEEE International Workshop on Sensor
Network Protocols and Applications, Anchorage, AK, 2003.

You might also like