CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
-
Upload
brianna-baker -
Category
Documents
-
view
219 -
download
2
Transcript of CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
![Page 1: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/1.jpg)
CSE 5392 By Dr. Donggang Liu 1
CSE 5392 Sensor Network Security
Introduction to Sensor Networks
![Page 2: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/2.jpg)
CSE 5392 By Dr. Donggang Liu 2
An Application of Sensor Networks
sensor
Communication and processing
module
1. Network protocol (e.g., routing)2. Data management (e.g., aggregation)3. Localization and time synchronization4. Energy management, robustness, etc.
![Page 3: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/3.jpg)
CSE 5392 By Dr. Donggang Liu 3
Sensor Node: Mica2
• Hardware– Processor: Atmega128L 4Mhz, 8-bit– Memory: 4K RAM, 512kB Flash– Communication: 19.2kbps Radio– Power supply: 2 AA Batteries
• Software – TinyOS / NesC Applications– Network management– Power management– Sensor drivers– Security package (TinySec)
![Page 4: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/4.jpg)
CSE 5392 By Dr. Donggang Liu 4
Sensing Capabilities
• Many types of sensors that are able to monitor:– Temperature– Humidity– Light– Pressure– Noise levels– The presence or absence of certain kinds of objects– Movement (speed, direction) of an object
![Page 5: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/5.jpg)
CSE 5392 By Dr. Donggang Liu 5
Military Applications
• Battlefield surveillance
• Monitoring friendly forces, equipment and ammunition
• Reconnaissance of opposing forces and terrain
• Target tracking
• Battle damage assessment
• Nuclear, biological and chemical attack detection and reconnaissance
![Page 6: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/6.jpg)
CSE 5392 By Dr. Donggang Liu 6
Civilian Applications
• Forest fire detection
• Biocomplexity mapping of the environment
• Flood detection
• Precision Agriculture: the pesticides level in the drinking water, soil erosion, and air pollution.
• Smart environment, smart kindergarten, and more
![Page 7: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/7.jpg)
CSE 5392 By Dr. Donggang Liu 7
Features of Sensor Networks
• Fault tolerance
• Scalability
• Production costs
• Hardware constraints
• Sensor network topology
• Transmission media
• Power consumption
![Page 8: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/8.jpg)
CSE 5392 By Dr. Donggang Liu 8
Fault Tolerance
• Failures due to:– lack of power– physical damage in harsh environment– Interference by other objects (e.g. radios) and other
sensors.
• Fault tolerance: the ability to maintain sensor network functionalities in the presence of failures
• The environment is important to the fault tolerance of algorithms and protocols
![Page 9: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/9.jpg)
CSE 5392 By Dr. Donggang Liu 9
Scalability
• Number of sensors: hundreds, thousands, to millions, depending on the applications.
• The density of the network usually depends on the applications
• Typically, people consider a large number of sensor nodes densely deployed in a target field.
![Page 10: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/10.jpg)
CSE 5392 By Dr. Donggang Liu 10
Costs
• Per node cost is important for large sensor networks. It has to be kept low.
• Bluetooth radio system: $5 now, but still too expensive for sensors. PicoNode: targeted to be < 50c.
• More challenging, with large amount of functionalities
• Reality: $150 for one Micaz mote
![Page 11: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/11.jpg)
CSE 5392 By Dr. Donggang Liu 11
Resource Constraints (Mica2)
• Processor: 8-bit 4MHz CPU (no division)
• Limited memory: 4K RAM
• Low bandwidth: 19.2K bps
• Small packet size: 29-byte long payload
• Limited energy supply: Battery powered
• Many traditional techniques are not practical
![Page 12: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/12.jpg)
CSE 5392 By Dr. Donggang Liu 12
Network Topology
• Sensor networks are usually formed in an ad hoc manner• Topology maintenance is a challenging task due to
– Number of nodes, failures, dynamics etc• Pre-deployment and deployment phase
– Reduce the installation cost,– Eliminate the need for any pre-organization and pre-planning– Increase the flexibility of arrangement– Provide better self-organization and fault tolerance.
• Post-deployment phase– Topology may changes are due to node movement, lack of energy,
node malfunctioning, etc• Re-deployment of additional nodes phase
– Adding new sensors
![Page 13: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/13.jpg)
CSE 5392 By Dr. Donggang Liu 13
Transmission media
• Wireless communication– Radio – Infrared – Optical media
• Multi-hop communication– Short distance wireless links
• Unreliable– Low bandwidth, low power
![Page 14: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/14.jpg)
CSE 5392 By Dr. Donggang Liu 14
Power consumption
• The lifetime of a node strongly depends on the battery lifetime
• Sensing, communication, and data processing.– Sensing power: depends on applications– Communication: expensive
• Involves both data transmission and reception
• The active power + the start-up power consumption
– Data processing: not expensive• In-network processing is crucial to minimize power
consumption in a multi-hop sensor network.
![Page 15: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/15.jpg)
CSE 5392 By Dr. Donggang Liu 15
Communication Architecture
![Page 16: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/16.jpg)
CSE 5392 By Dr. Donggang Liu 16
Protocol Stack
![Page 17: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/17.jpg)
CSE 5392 By Dr. Donggang Liu 17
Physical Layer
• Wireless radio signals– Frequency selection– Frequency generation– Signal detection – Modulation.
• Examples:– CC1000 chipset in Mica2
![Page 18: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/18.jpg)
CSE 5392 By Dr. Donggang Liu 18
Data Link Layer
• Media access control– Provide fair and efficient access to the channel– It provide point-to-point link– Example: CC1000RadioIntM.nc
• Error Control– Simple error correction scheme– CRC check– Example: RadioCRCPacket.nc
• Energy aware
![Page 19: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/19.jpg)
CSE 5392 By Dr. Donggang Liu 19
Network Layer
• Routing (infrastructureless network)– Ad hoc routing techniques (e.g., DSR) do not fit
• Power efficiency
• Data centric routing
• Data aggregation
• Example:– Flooding: each node receiving a packet repeats it by
broadcasting (simple flooding versus TTL-based)– Geographic forwarding: forward packets to the nodes close
to the destination node
• Energy aware
![Page 20: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/20.jpg)
CSE 5392 By Dr. Donggang Liu 20
Transport Layer
• An open research issue
• This layer is especially needed when the system is planned to be accessed through Internet or other external networks.
![Page 21: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/21.jpg)
CSE 5392 By Dr. Donggang Liu 21
Application Layer
• An open research issue
• Depends on applications:– Makes the hardware and software of the lower
layers transparent to the applications
![Page 22: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/22.jpg)
CSE 5392 By Dr. Donggang Liu 22
A Simple Protocol Stack
CC1000RadioIntM.nc CC1000ControlM.nc
A simple send/receive application
send receive control
![Page 23: CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.](https://reader035.fdocuments.in/reader035/viewer/2022062407/56649cb85503460f9497f013/html5/thumbnails/23.jpg)
CSE 5392 By Dr. Donggang Liu 23
Active Research Area
• Routing
• Topology management
• Data management
• MAC protocols
• Target tracking, service discovery
• Monitoring and maintenance
• Security and privacy