A wireless sensor network (WSN) uses spatially distributed sensors to wirelessly monitor environmental conditions like temperature, sound, and pollution levels. Sensors have computing and wireless communication capabilities. They transmit sensed data via radio frequencies to nearby sensors, which can forward the combined data to gateways and then to applications on the internet. WSNs use a layered architecture with application, network, and physical/data link layers. At the lowest layers, protocols like S-MAC are used for energy efficient data transmission and reducing collisions between transmissions. WSNs find applications in areas like smart cities, infrastructure monitoring, and industrial IoT.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
31 views30 pages
Lu 18 1693201867178
A wireless sensor network (WSN) uses spatially distributed sensors to wirelessly monitor environmental conditions like temperature, sound, and pollution levels. Sensors have computing and wireless communication capabilities. They transmit sensed data via radio frequencies to nearby sensors, which can forward the combined data to gateways and then to applications on the internet. WSNs use a layered architecture with application, network, and physical/data link layers. At the lowest layers, protocols like S-MAC are used for energy efficient data transmission and reducing collisions between transmissions. WSNs find applications in areas like smart cities, infrastructure monitoring, and industrial IoT.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30
Unit II – SENSORS, ACTUATORS AND
WIRELESS SENSOR NETWORK (WSN)
LU 18 – WIRELESS SENSOR NETWORKS
TECHNOLOGY Introduction • A set of sensors can be networked using a wireless system. • They cooperatively monitor the physical and environmental conditions, such as temperature, sound, vibration, pressure, motion, or hazardous gas-leaks and pollutants at different locations. • A WSN acquires data from multiple and remote locations. For example, in Internet of Waste Containers, the sensors wirelessly communicate the waste containers statuses in a waste management system in a smart city; sensors in Internet of Streetlights acquire data of ambient light conditions; and a WSN communicates the nearby traffic densities data for the control and monitoring of traffic signals. • Each node of the WSN has an RF transceiver. The transceiver functions as both, a transmitter and receiver. • WSN infrastructure, data-link layer MAC protocols, routing protocols, various integration approaches, challenges of security, QoS and configuration, and WSN specific IoT applications. WSN Concepts • WSN is defined as a network in which each sensor node connects wirelessly and has the capability of computation, for data compaction, aggregation and analysis. • Each one also has communication as well as networking capabilities. A WSN consists of spatially distributed autonomous devices. • WSN History • Distributed Sensor Networks (DSN) using network communication started. • Many spatially distributed sensing nodes collaborate and network autonomously on best effort basis. • Research and applications of Low Power Wireless Integrated Micro- Sensors (LWIM) use in DSNs. • WSNs have a large number of IoT applications. Examples are smart homes and smart city. • The WSN nodes can sense and communicate, using the Internet, wirelessly the data from remote locations, such as industrial plant machines, forests, lakes, gas or oil pipelines, which may sometimes not be easily accessible. Context-based Node Operations • The dictionary meaning of the word ‘context’ is ‘the circumstances that form the setting of an event, statement, or idea, and in terms of which it can be fully understood. • A WSN node can adapt, re-program or do another task using a sensor and associated circuit, computations, networking capabilities and context at that node. • When nodes can adapt their operations in response to changes in the environment, then it is called context-dependent sensing, networking and computing. • The application layer programs help the node to differentiate the tasks to be undertaken on a changed context. Context-based Node Operations • Context can be a physical, computing, user, structural or temporal context. Following may correspond to the context for re-programming of the actions of the WSN nodes: – Past and present surrounding situations – Actions such as the present network – Surrounding devices or systems – Changes in the state of the connecting network – Physical parameters such as present time of the day – Nearest connectivity currently available – Past sequence of actions of the device user – Past sequence of application or applications – Previously cached data records – Remaining memory and battery power at present WSN Architecture • The three layers are application layer, network layer (serial link with data-link MAC), physical cum data-link layer (MAC + Physical Layer). WSN Architecture • The application layer software components are sensor management, sensor query and data dissemination, task assignment, data advertisement and application-specific protocols. • Sensor, CPU and program sensor node constitute the application and network layers. • Network layer links serially to the data-link layer, and may include the coordination or routing software. • A serial link interconnects the layers to a wireless radio circuit and antenna. • The radio circuit is at physical cum data-link layer. Communication subsystem uses MAC and physical protocols. Architecture for Connecting Nodes • Two architectures for connecting WSN nodes, fixed connecting infrastructure of WSN nodes, coordinators, relays, gateways and routers, and mobile adhoc network of WSNs, access points, routers, gateways and multi-point relays. Architecture for Connecting Nodes – cntd., • An access point is a fixed point transceiver to provide the accessibility to nodes present nearby or nodes reaching in the wireless range. • A multipoint relay connects to other networks such as the Internet or mobile service provider network. • A router’s role is to select a path for packet transmission among the presently available paths in the network. • A coordinator provides the link between the two networks. • Fixed infrastructure example is a smart home network consisting of WSNs at security surveillance points, refrigerator, air conditioner, microwave, TV and computers with Wi-Fi access point. • Another example is WSN nodes, access points, routers, gateways and multi-point relays. At an industrial plant, multiple machine locations, stores, offices, sales and receipts and other plant locations. Wireless Multi-Hop Infrastructure Network Architecture
• MINA is a layered architecture. The WSN nodes have data sensing as
well as capabilities of forwarding towards the access point (base station). • The nodes can be mobile and have coverage and mobility range for communication to remote access points. • Access points possess data gathering and processing capabilities and have connectivity with a larger network, such as the Internet. • Each node connects to a short-distant neighbour. When the node moves to longer distances then it communicates through 2 or 3 hops to the access point (base station). • Each node has low-power transceivers to the nearest neighboring layer WSNs. Layered Architecture for network of nodes Layered Architecture for network of nodes • Assume that the base station is surrounded by three layers of WSNs. • Layer 1 WSNs directly connect. Layer 2 WSNs first connect to layer 1 WSNs functioning as coordinators and then directly connect. • Layer 3 WSNs first connect to layer 2 WSNs functioning as coordinators, then connect to layer 1 WSNs and then connect to the access point. • The figure shows that layer 1 WSN1 and WSN6 connect directly to the access point. • It means hop count = 1. The figure also shows WSN 2 and WSN 3 at layer 2. They connect by one hop to WSN1 and next hop through WSN1. Hop count = 2 for layer 2. It means that WSN 2 connects to WSN1 which has connectivity with the access point (base station). Layered Architecture for network of nodes • The figure also shows WSN 4 and WSN 5 at layer 3. They connect by three hops, one to layer 2 WSN and then layer 1 WSN and then to the access point. • Hop count = 3 for layer 3. It means that WSN 5 connects to WSN2, then to WSN1 and then the access point (base station). • WSN 4 connects to WSN3, then to WSN1 and then the access point (base station). • Access points connect the clusters using wireless LAN (802.11b) protocol. • The access points enable connectivity to the Internet. Multiple Clusters Architecture • Each cluster has a gateway node. A set of clusters with a gateway each has one cluster with a cluster-head gateway. • Multi-cluster architecture has a number of clusters, which associate a cluster-head gateway. • Cluster-head enables a tree-like topology of the clusters in a multi- cluster architecture. • The cluster formation and election of cluster-heads is autonomous in distributed WSNs and WSN clusters. • The figure shows two clusters and also shows a cluster-head gateway. • Head gateway connects to the Internet or cellular of other networks and provides connectivity to WSNs in the multiple clusters. Multi-cluster architecture for network of nodes Multiple Clusters Architecture • A number of clusters associated with the cluster-head gateway depends on the coverage required in the network. • When a cluster-head exists then a gateway interconnects two clusters. Each node connects to a short-distant neighbor. • The node connects to a gateway node through one, two or more hops when it connects to the WSN of another cluster. • When a node moves to longer distances then it communicates to the neighboring cluster through the gateway. • Cluster 1 is an ad-hoc network of mobile WSNs (WSN 1 to WSN5). The WSNs in a cluster may have mesh architecture or layered architecture. Each WSN connects to another WSN in its wireless range. Cluster 2 is an ad-hoc network of mobile WSNs (WSN 6 to WSN10). • Clustered architecture enables data compaction or fusion and aggregation. A gateway communicates compacted or aggregated data to another cluster. A cluster-head further aggregates, compacts or fuses the data before communication to the web server or cloud using the Internet. WSN Protocols • Network protocols have design goals as: • (i) limit computational needs, • (ii) limit use of battery power and thus bandwidth limits, operation in self-configured ad-hoc setup mode • (iii) limit memory requirement of the protocol. Data-link Layer Media Access Control (MAC) Protocol: • S-MAC (Sensor-MAC) protocol can be deployed at the data-link layer. • S-MAC nodes go to sleep for prolong periods. They need to synchronize at periodic intervals. • S-MAC protocol enables use of the energy-efficient, collision-free transmission, and intermittently synchronizes the operations. • Collision-free transmission results from scheduling of a channel. Each node can be allocated the channel. • Channels are reused such that collision-free transmission takes place and retransmission is not resorted to. WSN Protocols Routing Protocols: • The network layer uses multi-hop route determination, energy-efficient routing, route caching and directed diffusion of data. • Routing protocols are either proactive or reactive. Proactive protocols keep route cache and determine the route in advance. • Reactive protocols determine the route on demand. • Routing protocols are table-driven when a routing table guides the paths available. • Routing protocols are demand-driven when a source demands the route and it guides the paths available. • Fixed Wireless Sensor Networks may use Cluster-head Gateway Switch Routing (CGSR) which guides the paths using heuristic routing schemes. WSN Infrastructure Establishment • Sensors with associated CMOS low power ASIC circuits, their radio ranges and energy-efficient coding. • Infrastructure selection, (i) fixed connecting infrastructure of nodes, coordinators, relays, gateways and routers, or (ii) mobile ad-hoc network of mobile WSNs with limited or unspecified mobility region. • Network topology and architecture according to the applications and services, wireless multi-hop infrastructure network architecture or multi-cluster architecture. • Network nodes self-discovering, self-configuring and self-healing protocols, localization, mobility range, security, data-link and routing protocols, link quality indicator (LQI) (packet reception ratio), coverage range, and QoS required according to applications and services. • Clusters, cluster gateways, cluster-heads and clusters hierarchy. • Routing, data aggregation, compaction, fusion and direct diffusion. • Synchronization of times at intermittent intervals as time is used as reference in internode distance estimation, accounting for the delays, localization, ranging and location services. WSN Various Integration Approaches WSN needs integrated approaches for: • Nodes design and provisioning of resources • Nodes localization • Nodes mobility • Sensor connecting architecture • Sensor networking architectures • Data dissemination protocols • Security protocols • Data-link layer and routing protocols • Integration with sensors data, other than wireless sensors data, for IoT applications and services Quality of Service • Quality of Service (QoS) is an average weighted QoS metric over the lifetime of a network. • Metrics: (i) Average delay: Measure of the time taken in generation of sensor data and its delivery up to the destination (ii) Lifetime: Time up to which the WSN functions effectively or given energy resources of the modes will last (iii) Throughput: Bytes per second delivered up to the destination. Low throughput means high delays. It also relates to the bandwidth of the network (iv) Link Quality Indicator (LQI) which means packets delivered/packet transmitted from the nodes. Quality of Service Challenges: • routing through nodes of high throughputs, lower delay and paths which use low energy resources • Link • maintaining the product of priority and delay, which means higher priority packets take lower delay paths and lower priority packets take higher delay paths. • A metric is the coverage of a sensor network. The coverage depends on the density and locations of the nodes in the region, communication range and sensitivity of the nodes. • Another metric is percentage of times the network cover occurrence of an event in case of surveillance systems, hazard chemicals or fire- detection systems. Configuration • Challenges of configuring in view of resource constraints with the nodes statically or dynamically or self-automatic are the following: • (i) locations and mobility range of the WSN nodes, • (ii) clusters, • (iii) gateways, • (iv) cluster-heads, • (v) sampling rate of the sensed parameters • (vi) their aggregation, compaction and fusion. • Challenges are to be met with limited battery power, storage, computation capability, bandwidth and scalability limit on the nodes. WSN Nodes Secure Communication • Sensor networks need secure communication for data privacy and integrity. • Authentication ensures data from the sensing node only, maintains data integrity and disables the communication of messages from unauthenticated sources. • Privacy ensures data secrecy and eavesdropping. • SPINS (Security Protocols in Network of Sensors) use the symmetric cryptographic protocol because of the following reasons—an asymmetric cryptographic method which has high overhead in term of memory and computations for digital signatures, key-generation and verification. • SPINS is a suite of security protocols for the sensor networks which are: (i) Secure Network Encryption Protocol (SNEP) • (ii) micro-Tesla (m-Tesla). SPINS use block cipher encryption functions. WSN Nodes Secure Communication • SNEP enables secure point-to-point communication. It ensures data privacy and integrity. It secures communication after authentication process. It does not require message replay, thus message remains fresh. • Access point distributes session key to A and B using SNEP. Two nodes, A and B, share six keys. • The encryption keys, KAB and KBA, Cipher-block-chaining Message Authentication Code (MAC) keys, KAB and KBA, and counter keys, CA, CB are the shared keys. MAC ensures message integrity and privacy. • m-TESLA is light-weight version of TESLA. It enables authenticated broadcasting. The authentication is micro-timed and efficient. It results in stream-loss tolerant secure authentication. • An access point authenticates using m-TESLA. First a packet is listened and considered as a parent. It is authenticated later. This makes secure authentication stream-loss tolerant. • Distributed sensor networks use a key management scheme, which can be (i) based on probabilistic key sharing or (ii) random key pre-distribution key sharing. WSN Nodes Secure Communication Localized Encryption and Authentication Protocol (LEAP) • Different packets when using LEAP use different keying mechanisms. Security needs decide the mechanism. A node uses four keys: individual key, group key, cluster key and share a pair of key with the neighbor. • A challenge for highly-distributed architecture with localized coordination is the implementation of goals of a system for applications and services. • Implementation needs are autonomous operation, self-organisation, self- configuration, adaptation, energy conservation at physical, MAC, link, route, application layer, design of scalable node density, number and types of networks. • Network is data-centric network and route nodes have no addressability. WSN Nodes Secure Communication Localized Encryption and Authentication Protocol (LEAP) • Three challenges, viz. security, QoS and configuring of nodes are as follows: Security Challenges are: • Hello flood attack: An attacker node sends hello messages repeatedly, and thus drains the energy of the attacked node. • Sybil attack is an attack where a single node, presents itself as different entities at different times. • Selective forwarding attack is an attack when the attacker node does not forward the attacked node messages on receiving. • Sinkhole attack is when an attacked node behaves as an access point and receives the messages without forwarding them. • Wormhole attack is an attack where the attacker node gives false information of distances of the destinations, thus forcing the attacked node to take longer paths. The longer path has high latency and thus high delivery delays of packets. WSN IoT Applications • Mobile, tablets, IP-TV, VOIP telephony, video conferencing, video-on- demand, video-Surveillance, Wi-Fi and Internet • WSN nodes and wireless actuator nodes, which can be built using ZigBeeIP are nodes for home security access control and security alerts, lighting control, home health care, fire detection, leak detection, energy efficiency, solar panel monitoring and control, temperature monitoring and HVAC control and automated meter reading. • Figure shows source-end cluster of ZigBee WSN and actuator nodes, coordinators and routers connected through gateway and set of RPL routers for data packets from IPv6 addresses and communicating with IoT and M2M IoT applications and services layer for data packets from IPv6 addresses. • ZigBee devices form WPAN (Wireless Personal Area Network) devices in home network. WSN nodes, coordinating nodes and routing nodes can also use ZigBee protocol for physical layer wireless connectivity. ZigBee is IEEE 802.15.4 standard protocol for physical/data-link layer (Phy/MAC). WSN IoT Applications • ZigBee IP is an enhancement for IPv6 connectivity. ZigBee IP is enhancement with RFD. RFD (Reduced Function Device) means one that functions for the ‘sleepy’ battery-operated device. • Sleepy means one that wakes up infrequently, sends data and then goes back to sleep. 6lowpan refers to IPv6 over low power wireless personal area network which permits communication of IPv6 packets in a sensor network. WSN IoT Applications