REPORT Biswajit

download REPORT Biswajit

of 26

Transcript of REPORT Biswajit

  • 8/10/2019 REPORT Biswajit

    1/26

    WIRELESS SENSOR NETWORK

    By

    Biswajit NayakRegd. No-10IT61B06

    School of Information Technology

    Indian Institute Of Technology,Kharagpur.

    Sept-2011

  • 8/10/2019 REPORT Biswajit

    2/26

    CERTIFICATE

    This is to certify that the seminar entitled Wireless Sensor Networks submitted by

    Biswajit Nayak( Regd.No-10IT61B06 ) ,towards the partial fulfillment of the requirement for the

    degree of Master in Technology in Information and Communication Technology of Indian

    Institute of Technology ,Kharagpur is the record of work carried out by him under my

    supervision and guidance .In my opinion ,the submitted work has reached a level required for

    being accepted for examination. The result embodied in this seminar, to the best of my

    knowledge, havent been submitted to any other university or institution for award of any degree

    or diploma.

    Prof. Indranil Sen Gupta Prof. Partha Sarathi DayDepartment of Computer Science & Engg. Department of Computer Science & Engg.

    Indian Institute of Technology Kharagpur. Indian Institute of Technology Kharagpur.

  • 8/10/2019 REPORT Biswajit

    3/26

    ACKNOWLEDGEMENT

    It is matter of great pleasure for me to submit this seminar report on Wireless Sensor

    Network, as a part of curriculum for award of Master in Technology with specialization inInformation and Communication Technology (ICT)degree of Indian Institute of Technology,

    Kharagpur (IIT KGP).

    I am thankful to my seminar guide Prof. Indranil Sen Gupta, Professor in Computer Sc. &

    Engg and Prof. Partha Sarathi Day,Professor in Computer Sc. & Engg. Department for hisconstant encouragement and able guidance.

    I am also thankful to Prof. D Mukhopadhyay, Assistant Professor in Computer Science &

    Engineering, Prof. P. P. Das, Professor, Professor in Computer Sc. & Engg & Prof. K. S. RaoAssistant Professor, Information Technology, for their valuable support. My thanks are also due

    to Prof. S Misra, Assistant Professor in Information Technology and Prof. R Mall, Professor

    in Computer Science & Engineering, for their support and suggestions.

    I take this opportunity to express my deep sense of gratitude towards those, who have helped us

    in various ways, for preparing my seminar.

    At the last but not least, I am thankful to my parent, who had encouraged & inspired me with

    their blessings.

    Biswajit NayakMTech (ICT)

    Regd.No -10IT61B06

  • 8/10/2019 REPORT Biswajit

    4/26

    ABSTRACT

    Wireless sensor networks are attracting increased interest for a wide collection of applications,

    such as environmental monitoring, vehicle tracking, health monitoring etc. However, developing

    sensor network application is notoriously difficult, due to extreme resource limitations of nodes,

    the unreliability of radio communication, and the necessity of low power operation. Our goal is

    to simplify application design by providing a set of development primitives for sensor networks

    that abstract the details of low-level communication, data sharing ,and collective operations

    .Through advanced different networking protocols, these devices form a sea of connectivity that

    extends the reach of cyberspace out into the physical world. This report gives a brief description

    of its architecture, routing protocol,standardization,different metrics to measure efficiency and its

    important component like Microcontroller, Transceiver, External Memory; Power Source

    (batteries).The unique characteristics include limited power usage, ability to with stand harsh

    environmental conditions, ability to cope with node failures, dynamic network topology, etc. The

    various factors influencing, sensor networks are also covered. This report also gives brief

    description regarding security. The hardware design, software design and architecture forms an

    essential part of the report.

  • 8/10/2019 REPORT Biswajit

    5/26

    Wireless Sensor Network Content

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 1

    CONTENT

    Page. No

    1. Introduction 02

    2.

    History of Wireless Sensor Network (WSN) 03

    3. Characteristics 04

    4. Hardware Component 05

    5. Hardware Design 06

    6. Software Component 08

    7. Software Design 09

    8. Wireless Sensor Network Architecture 10

    8.1Client 10

    8.2Server 10

    8.3Sensor MOTES 11

    8.4Networking Topologies 11

    9. Routing Protocols in WSNs 12

    10.Security in Wireless Sensor Network 16

    10.1 Security Threats in WSN 16

    10.2 Countermeasure 17

    11.System Evaluation Metrics 17

    12.Standardization 18

    13.Wireless Sensor Network Applications 19

    14.Pros and Cons of Wireless Sensor Network 20

    15.Future Scope 20

    16.

    Conclusion 2117.Bibliography 22

  • 8/10/2019 REPORT Biswajit

    6/26

    Wireless Sensor Network Introduction

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 2

    1. Introduction

    A wireless sensor network (WSN) is a wireless network consisting of spatially dispersed anddedicated autonomous devices that use sensors to monitor physical or environmental conditions.

    A usual WSN system is formed by combining these autonomous devices, or nodes with routers

    and a gateway[9][10].

    The dispersed measurement nodes communicate wirelessly to a central gateway, which providesa connection to the wired world where you can collect, process, analyze, and present your

    measurement data. You can use routers to gain an additional communication link between end

    nodes and the gateway for extend distance and reliability in a wireless sensor network, [10][11].The wireless sensor is networked and scaleable, require very little power. It is also smart and

    software programmable, and also capable of fast data acquisition, reliable and accurate over the

    long term, but costs little to purchase and install, and requires nearly zero maintenance.

    (Figure 1.1: Block diagram of Wireless Sensor Network)

    Wireless Sensor Network is different from traditional network.

    Wireless Sensor Network is a Single-purpose design means serving one specificapplication where as traditional network general-purpose design means serving manyapplications.

    Energy is the main constraint in the design of all node and network components inwireless sensor network where as intraditional network typical primary design concerns are network performance and

    latencies, energy is not a primary concern.

    Sensor networks often operate in environments with harsh conditions where as intraditional network devices and networks operate in controlled and mild environments.

  • 8/10/2019 REPORT Biswajit

    7/26

    Wireless Sensor Network History

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 3

    In wireless sensor network physical access to sensor nodes is often difficult or even

    impossible where as in traditional network maintenance and repair are common and

    networks are typically easy to access

    In wireless sensor network most decisions are made localized without the support of a

    central manager where as Obtaining global network knowledge is typically feasible and

    centralized management is possible

    2. History

    In the year of 1978, the Defense Advanced Research Projects Agency (DARPA) organized the

    Distributed Sensor Nets Workshop (DAR 1978),focusing on sensor network research challenges

    such as networking technologies, signal processing techniques, and distributed algorithms.That isthe reason that the military has been a driving force behind the development of wireless sensor

    networks[8].

    In the early 1980s DARPA also operated the Distributed Sensor Networks (DSN) program

    which was then followed by the Sensor Information Technology (SensIT) program, whichprovided the present sensor networks with new capabilities such as ad hoc networking, dynamic

    querying and tasking, reprogramming and multitasking[2][8].

    The University of California at Los Angeles along with the Rockwell Science Center proposed

    the concept of Wireless Integrated Network Sensors or WINS . One outcome of the WINSproject was the Low Power Wireless Integrated Microsensor (LWIM), produced in 1996 (Bult et

    al. 1996). This smart sensing system was based on a CMOS chip, integrating multiple sensors,

    interface circuits, digital signal processing circuits, wireless radio, and microcontroller onto a

    single chip.

    In the year 1999 the University of California at Berkeley focused on the design of extremely

    small sensor nodes called motes in the Smart Dust Project(Khan et al. 1999).The main aim of

    this project was to demonstrate that a complete sensor system can be integrated into tiny devices,possibly the size of a grain of sand or even a dust particle.

    In the year 2000 the Berkeley Wireless Research Center (BWRC) focuses on the development of

    low-power sensor devices in the PicoRadio project (Rabaey et al. 2000) , whose power

    consumption is so small that they can power themselves from energy sources of the operating

    environment, such as solar or vibrational energy.

    The MIT AMPS (micro-Adaptive Multidomain Power-aware Sensors) project focuses on low-

    power hardware and software components for sensor nodes, which includes the use of

    microcontrollers capable of dynamic voltage scaling and techniques to restructure data

    processing algorithms to reduce power requirements at the software level (Calhoun et al. 2005).

    Due to these previous efforts are mostly determined by academic institutions, over the last

    decade a number of profitable efforts have also appeared (many based on some of the academicefforts described above), including companies such as Crossbow (www.xbow.com) ,Sensoria

    (www.sensoria.com) , Worldsens (http://worldsens.citi.insa-lyon.fr) , Dust Networks

    (http://www.dustnetworks.com) , and Ember Corporation (http://www.ember.com) .

  • 8/10/2019 REPORT Biswajit

    8/26

    Wireless Sensor Network Characteristics

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 4

    Due to the profitable effort of these companies,they provide the opportunity to purchase sensor

    devices ready for deployment in various different type of applications along with a variety of

    management tools for programming,maintenance, and sensor data visualization[8].

    3. CharacteristicsThe general structure of Wireless sensor network consists of a basestation or gateway whichcan communicate with a number of wireless sensors via a radio link. Data is captured at the

    wireless sensor node, then compressed, and transmitted to the gateway directly or, if required,

    uses other wireless sensor nodes to forward data to the gateway. The transmitted data is thenpassed to the system through the gateway connection.

    Sensor nodes are likely as small computers, extremely basic in terms of their interfaces and their

    components. They usually consist of a processing unit with limited computational power and

    limited memory, sensors, a communication device, and a power source usually in the form of abattery.

    The base stations act as a gateway between sensor nodes and the end user and they normallyforward data from the WSN on to a server. Other special components are routers, designed to

    compute, calculate and distribute the routing tables[10].

    On the basis of functionality of sensor nodes and other element, the major characteristics ofWSN are as following :-

    Power consumption constrains for nodes using batteries or energy harvesting

    Ability to cope with node failures

    Mobility of nodes Dynamic network topology

    Communication failures

    Heterogeneity of nodes Scalability to large scale of deployment

    Ability to withstand harsh environmental conditions

    Ease of use Unattended operation.

    4. Hardware Component

    A Wireless Sensor Network(WSN) consists of spatially distributed sensor nodes and each sensor

    node can perform some processing and sensing tasks independently. In addition, sensor nodescommunicate with each other in order to forward their sensed information to a central processingunit or conduct some local coordination such as data fusion[1][2][5]. The sensor node consists of

    several hardware components that include an embedded processor, a radio transceiver, internal

    and external memories, and one or more sensors, a geopositioning system, a power source[2][1].

  • 8/10/2019 REPORT Biswajit

    9/26

    Wireless Sensor Network Hardware Component

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 5

    ( Fig 4.1 Architecture of Sensor Node)

    4.1 Embedded ProcessorThe functionality of an embedded processor in a sensor node is to schedule tasks, process data

    and control the functionality of other hardware components. There are several types of embeddedprocessors available that can be used in a sensor node include Microcontroller, Digital SignalProcessor (DSP), Field Programmable Gate Array (FPGA) and Application Specific Integrated

    Circuit (ASIC). been the most used embedded processor for sensor nodes is the Microcontroller

    because of its flexibility to connect to other devices and its cheap price[2]. For example, the mostrecent CC2531 development board provided by Chipcon (acquired by Texas Instruments) uses

    8051 microcontroller, and the Mica2 Mote platform provided by Crossbow uses ATMega128L

    microcontroller.

    4.2 TransceiverThe responsibility of a transceiver is for the wireless communication of a sensor node. There are

    different types of wireless transmission media, which includes Radio Frequency (RF), Laser and

    Infrared. The most used transmission media to fits to most of WSN applications is the RF basedcommunication. The different operational states of a transceiver are Transmit, Receive, Idle and

    Sleep[2]. Mica2 Mote uses two kinds of RF radios one is RFM TR1000 and other one is

    Chipcon CC1000. The Mica2 Motes outdoor transmission range of is about 150 meters.

    4.3 MemoryMemories in the sensor nodes includes both program memory (from which instructions are

    executed by the processor), and data memory (for storing raw and processed sensor

    measurements and other local information). The quantities of memory and storage on board aWSN device are often limited. It include in-chip flash memory and RAM of a microcontroller

    and external flash memory. For example, the ATMega128L microcontroller running on Mica2Mote has 128-Kbyte flash program memory and 4-Kbyte static RAM. Further, a 4-Mbit Atemel

    AT45DB041B serial flash chip can provide external memories for Mica and Mica2Motes(Hill,2003)[1][2].

    4.4 SensorsDue to limited bandwidth and power , Wireless Sensor Network devices primarily support only

    low-data-rate sensing. There are various applications call for multi-modal sensing, as a result

    each device may have several sensors on board. The specific sensors are used according to therequirement of the application[1].For example, they may include temperature sensors, light

  • 8/10/2019 REPORT Biswajit

    10/26

    Wireless Sensor Network Hardware Design

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 6

    sensors, humidity sensors, pressure sensors, accelerometers, magnetometers, chemical sensors,

    acoustic sensors, or even low-resolution imagers.

    4.5 Geopositioning systemIt is important for all sensor measurements to be location stamped In numerous WSN

    applications. To obtain positioning you need to pre-configure sensor locations at deployment, but

    this may only be possible in limited deployments. Mainly for outdoor operations, when thenetwork is deployed in an ad hoc manner, such information is most easily obtained via satellite-

    based GPS[1]. The Global Positioning System (GPS) is a space-based global navigation satellitesystem (GNSS) which provides location and time information in all weather, anywhere on or

    near the Earth, where there is an clear line of sight to four or more GPS satellites[10].

    4.6 Power SourceIn deployment of the WSN device is likely to be battery powered. power is consumed by

    sensing, communication and data processing by a sensor node. . Batteries are the main source of

    power supply for sensor nodes. For example, Mica2 Mote runs on 2 AA batteries. While some ofthe nodes may be wired to a continuous power source in some applications, and energy

    harvesting techniques may provide a degree of energy renewal in some cases, the finite battery

    energy is probable to be the most critical resource bottleneck in most applications[1][2][12].

    5. HARDWARE DESIGN

    It is a critical process to select components for the sensor motes in the development of Wireless

    Sensor Network.Low power and immense functionality are two highest priorities in evaluating

    the strength of both the microcontroller and the sensor devices[12]. WISENET is introduced tothe new state-of-the-art Chipcon CC1010 microcontroller with integrated RF transceiver.

    It had several features ,such as :-

    Optimized 8051-core Active (14.8 mA), Idle (2.9mA) and sleep (0.2mA) power modes

    32 kB flash memory

    kB+128 bytes SRAM Three channel 10-bit ADC

    Four timers / Two PWM's

    Fully integrated UHF RF transceiver (433 MHz / 868 MHz nominal) Programmable output power (-20 to 10 dBm) Low current consumption (11.9 mA for RX, 17.0 mA for TX at

    0dBm) RSSI output that can be sampled by the on-chip ADC

    Optimized 8051-core: The8051 was designed from the perspective of what a microcontroller isand what it has to do. It included in the basic design was 4K of Read Only Program Memory,

    128 Bytes of Internal RAM, a USART and 32 I/O Pins[12]. The only major problem with the

    8051 architecture is the twelve clock cycles per instruction cycle. This has made the 8051 appearnon-competitive to other microcontrollers which can have as few as one clock cycle per

    instruction cycles. But most of the early embedded microcontrollers use processor architecturesthat were taken from eight bit microprocessors.

  • 8/10/2019 REPORT Biswajit

    11/26

    WirelessSensorNetwork HardwareDesign

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 7

    Active (14.8 mA), Idle (2.9mA) and sleep (0.2mA) power modes : For the proper working of

    the microcontroller,it requires l4.8 mA to work in active mode,requires 2.9mA in the idle stateand requires 0.2mA in the sleep state[12].

    32 kB flash memory : In case of flash memory, a section of memory cells can be erased or

    written in a single operation or flash. Flash memory is a variation of EEPROM_(Electrically

    Erasable Programmable Read-only Memory).Flash can function at higher effective speeds whenthe systems using it read and write to different locations at the same time in a single operation

    where as normal EEPROM only allows one location at a time to be erased or written. All types

    of flash memory and EEPROM wear out after a certain number of erase operations. Flashmemory is made in two forms: NOR flash and NAND flash. This makes it suitable for storage of

    program code that needs to be infrequently updated, as in digital cameras and PDAs. However its

    I/O interface allows only sequential access to data. This makes it suitable for mass-storagedevices such as PC cards and various memory cards, and somewhat less useful for computer

    memory.Flash memory is used in digital cellular phones, digital cameras, LAN switches, PC

    Cards for notebook computers, digital set-up boxes, embedded controllers, and other devices

    [12] [10].

    2 kB+128 bytes SRAM : SRAM (static RAM) is random access memory that retains data bits inits memory as long as power is being supplied. It provides faster access to data and is more

    expensive than DRAM. SRAM is used as cache memory of computers and also as part of therandom access memory digital-to-analog converter on a video card. SRAM consumes more

    energy to retain data over time, but does not require as much energy for the initial storage

    operation. To achieve the smallest, lowest cost device, SRAM should be used only whennecessary[3][10][12].

    Three channel 10-bit ADC : Four wire SPI interface is used in 10bit Analog to Digital

    converter (ADC). The 8515 processor has SPI hardware support built in and this makes it fastwith minimum software overhead. 10 bits is a high resolution. To evade digital noise on the

    analog signals, a separate +5V supply (78L05) is added to the ADC and the photodiodes used asinputs. The ground for all of the above was tied into one point where the power came into the

    regulator. Minimal usage of bypass capacitors on the ADC inputs we can obtain stable readings

    Four timers / Two PWM's : There are two different versions of PWM.The original very

    lightweight window manager, and the newer Ion-based PWM2. PWM was the first windowmanager to implement "tabbed frames" or the back then unique feature allowing multiple client

    windows to be attached to the same frame. This feature helps keeping windows, especially the

    numerous xterms, organized. A look at the screenshots below might clarify the idea. Being alightweight window manager with emphasis on usability, PWM discards some features common

    in window managers these days: only window shading in lieu of iconification is supported, there

    are no close and other window buttons. PWM does have workspaces, menus and Window Makerdockapp support.

    Fully integrated UHF RF transceiver (433 MHz / 868 MHz nominal) : The wireless

    transceiver contains at least two physical links, each with its own transmitter-receiver circuit inaddition to digital and analog signal processing circuits to communicate with other wireless units

    using Orthogonal Frequency-Division Multiplexing (OFDM) protocol. The design approaches

    deal with the issues of noise interference between analog and digital subsystems, noise

    interference between two links on the same chip, and high-frequency self-test, measurement offuntional parameters (SNR, jitter, etc.), and interface between on-chip test facilities and external

    low-cost testers.

  • 8/10/2019 REPORT Biswajit

    12/26

    Wireless Sensor Network Software Component

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 8

    6. Software Components

    The software component plays major role in the development of wireless sensor network. The

    development of wireless sensor network composed of three custom software components ,suchas :-

    The Web program

    WiseDB Tiny OS

    6.1 The Web ProgramWeb program was written in PHP and make use of the Chart-Director charting software. The

    web application queried MySQL database for the data, then we use a Chart-Director to generate

    a graph of that data.

    6.2 WiseDBWiseDB is the custom software component that interfaced with the gateway via a serial link to

    and with the SQL database via a TCP/IP link. WiseDB was written in C++ and utilized two

    open-source APIs (application programming interface).WiseDB collects the data captured bysensor nodes of sensor mots network and passed through gateway and accessed by using SQL

    server applications. This is the way that ,the WiseDB interacted with the rest of the system in thewireless sensor network[12].

    6.3 TinyOSThe one of the most important custom software component is the TinyOS .TinyOS is anoperating system specifically designed to address the needs of wireless sensor networks. It is

    based on an event driven execution engine that simultaneously provides efficiency and fine-

    grained concurrency. As you know, TinyOS is a real-time operating system designed for use insensor network applications where low-power, limited resources and hard real-time constraints

    are critical parameters[10][12].

    7. Software Design

    You should have four commercial off the shelf applications installed on the server , that worked

    together to create the Data Analysis portion of the Server component.

    Web-Server(Apache)

    PHP MySQL Database

    Chart-Director

    Apache is a standard web-server, which makes a web document available on the Internet. The

    Apache http server is a powerful, flexible, implements the latest protocols is highly configurable

    and extensible with third-party modules can be customized by writing 'modules' using theApache module API provides full source code and comes with an unrestrictive license runs on

    Windows NT/9x, Netware 5.x and above, OS/2, and most versions of Unix, as well as several

    other operating systems is actively being developed encourages user feedback through new

    ideas, bug reports and patches implements many frequently requested features, including:

    DBM databases for authentication Customized responses to errors and problems

  • 8/10/2019 REPORT Biswajit

    13/26

    Wireless Sensor Network Software Design

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 9

    Multiple Directorylndex directives

    Unlimited flexible URL rewriting and aliasing

    Content negotiation Virtual Hosts

    Configurable Reliable Piped Logs

    PHP is a web programming language, which is used to design web pages and allows dynamic web pages.

    It is also designed to be used along with a database and included many built-in functions for interfacing

    with MySQL database.

    MySQLis primarily an relational database management system and therefore ships with no GUItools to administer MySQL databases or manage data contained within.MySQLis a database thatcan contain any type of data and is accessed through a TCP/IP (Internet) call. MySQL is a popular

    choice of database for use in web applications.

    ChartDirectoris a powerful charting component for creating professional and clickable chartsfor web and windows applications. Itis a program that generates a graph from raw data. It is availablein many languages such as PHP, ASP, C++, and others[10][12]. It includes several features, Such as:-

    Fast and Efficient

    Multi-threaded architecture specially designed for the demandingrequirements of server side usage.

    Flexible

    Object oriented API allows you to control and customize chart details,

    enabling you to design the charts you want.

    Comprehensive Chart Styles

    Pie, bar, line, spline, step line, trend line, curve-fitting, inter-line coloring,

    area, scatter, bubble, box-whisker, HLOC, candlestick, simple gantt, radar,polar. XY axis swapping (rotated charts) and 3D effects.

    Layer ArchitectureSynchronized chart layers allow chart styles to overlay for arbitrary combo

    chart and special effects. For example, box-whisker layers can be used to adderror symbols to any XY chart styles, and scatter layers can be used to

    highlight data points with custom symbols.CDML

    The innovative Chart Director Mark Up Language (CDML) technology

    allows rich formatting of text with embedding icons and images. CDML is

    supported in all ChartDirector text positions, including chart titles, legendkeys, axis labels, data labels, etc.

    Advance color system

    In additional to ARGB colors (true color with alpha transparency), all objectsin ChartDirector can be painted using "magic colors" - colors that depend on

    position. Generates image maps to support tool tips and other mouseinteractions. Ideal for "drill-down" capabilities. Tool tips are customizable and

    can include custom text or data. Image maps are "open-ended" and can

    include user-defined regions, such as for company logos, icons and buttons.

  • 8/10/2019 REPORT Biswajit

    14/26

    Wireless Sensor Network WSN Architecture

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 10

    8. Wireless Sensor Network Architecture

    The entire system can be described as consist as two subsystems depending upon the operation

    performed by the entire system(Figure 8.1),such as :-

    Data Analysis

    Data Acquisition

    Data Analysis subsystem is software-only . It relied on existing Internet and web (HTTP)infrastructure to ensure communications between the Client and Server components. The main

    use of this subsystem was to selectively present the gathered environmental data to the end userin a graphical manner.

    Data Acquisition subsystem is used to collect and store environmental data for later processing

    by the Data Analysis subsystem. This subsystem is consists of PC , embedded system software

    and also embedded system hardware. In the other word you can say ,it is composed of both theServer and Sensor Mote Network components.

    (Figure. 8.1 Wireless Sensor Network Architecture)

    8.1 ClientThe Client component is external to the development of wireless sensor network.That means,any computer with a web browser and Internet access could be a Client. It served only as a user

    interface to the Data Analysis subsystem (Figure 6.1).

    8.2 ServerThe Server plays a significant role between the Data Acquisition and Data Analysissubsystems.In case of Data Analysis ,in this side, an web (HTTP) server hosting a web

  • 8/10/2019 REPORT Biswajit

    15/26

    Wireless Sensor Network WSN Architecture

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 11

    application. When a page request came in, the web server executes the web application, which

    retrieved data from the database, processes it, and returns a web page that is transmitted to theClient through the web server.In case of Data Acquisition system, there is a daemon (WiseDB)

    running to provide the fascility to establish the communication with the Sensor Mote Network.

    This daemon collects raw data packets from the Sensor Mote Network. Then these packets are

    then processed and then convert the raw data into meaningful environmental data.Then thisprocessed data is then inserted into the database. Thus the database is the link between the Data

    Analysis and Data Acquisition subsystems.

    8.3 Sensor MotesThe main focus of wireless sensor network is the development of the Sensor Mote Network

    component . Wireless Sensor Networks are collections of motes. Motes are the individual

    computers that work together to form networks. It is the component responsible for collectingand transmitting raw environmental data to the Server. The requirements for motes are extensive.

    They must be small, energy efficient, multifunctional, and wireless.

    The component consists of two parts. Such as:-

    The sensor mote

    The gateway mote

    The sensor mote is developed to collect and transmit raw environmental data. When not doingthis, it went into a low-power idle mode to conserve energy. It also have some other feature

    involved adhoc networking and may be for multi-hop routing;

    The second part of the Sensor Mote Network is the gateway mote .The gateway mote is

    responsible for serving as the liaison between the Server and the Sensor Mote Network andtransport all the data packets to WiseDB. It is possible to implement both sensor and gateway

    motes on the same hardware PCB and with the same software .

    8.4 Networking Topologies

    You need to coordinate the WSN gateway, end nodes, and router nodes . For which you can useseveral network topologies. You can use Router nodes in two different ways ,one way Routernodes are similar to end nodes as they can acquire measurement data, in other way you also can

    use them to pass along measurement data from other nodes.

    Star Topology :The most basic topology is the star topology, in which each node is directly

    connected with the gateway(Figure 8.2). This topology is simple but restricts the overall distancethat your network can achieve[9][11].

    (Figure 8.2 Star Topology)

    Cluster or Tree Topology : You can implement a cluster, or tree, topology to increase the

    distance a network can cover. This is a more complex structure and in this each node still

    maintains a single communication path to the gateway but can use other nodes to route its dataalong that path(Figure 8.3). This topology suffers from a problem that if a router node goes

  • 8/10/2019 REPORT Biswajit

    16/26

    WirelessSensorNetwork RoutingProtocol

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 12

    down, all the nodes that depend on that router node also lose their communication paths to the

    gateway.

    (Figure 8.3 Cluster / Tree Topology)

    Mesh Network Topology :The mesh network topology eliminates the issue evolved during theCluster / Tree Topology by using redundant communication paths to increase system reliability.In a mesh network, nodes maintain multiple communication paths back to the gateway, hence if

    one router node goes down, the network automatically reroutes the data through a different path

    (Figure 8.4). The mesh topology is very reliable but from an increase in network latency as datamust make multiple hops before arriving at the gateway[2][9][11].

    (Figure 8.4 Mesh Topology)

    9. Routing Protocols in WSNsOn the basis of network structure routing in WSNs can be divided into three different categories,

    those are, flat-based Routing, hierarchical based routing, and location-based routing depending

    on the network structure (Figure 9.1).

    In flat-based routing, all nodes are typically assigned equal roles or functionality. In hierarchical-based routing, however, nodes will play different roles in the network.In location-based routing,

    sensor nodes' positions are exploited to route data in the network[1][6][7].

  • 8/10/2019 REPORT Biswajit

    17/26

    WirelessSensorNetwork RoutingProtocol

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 13

    (Figure 9.1 Types of Routing Protocol)

    Flat Network Routing Protocol :This category of routing protocols are the multihop flat

    routing protocols. Here, each node typically plays the same role and sensor nodes collaborate

    together to perform the sensing task. Due to the large number of such type of nodes, it is notfeasible to assign a global identifer to each node[7].

    There are various types of flat networking routing protocols ,those are- Sensor Protocols for

    Information via Negotiation (SPIN), Directed Diffusion, Rumor Routing, Gradient-Based

    Routing (GBR) , Minimum Cost Forwarding Algorithm (MCFA) , COUGAR , ACtiveQUery forwarding In sensoR nEtworks (ACQUIRE), Energy Aware Routing( EAR)[1][6][7].

    (Figure 9.2 Different Flat Network Routing Protocols)

    Hierarchical Networking Routing Protocol: Hierarchical initially proposed in wireline

    networks, are well-known techniques with special advantages related to scalability and efficient

    communication. As such, the concept of hierarchical routing is also utilized to perform energy-efficient routing in WSNs. In a hierarchical architecture, higher energy nodes used to process and

    send the information while low energy nodes can be used to perform the sensing in the closenessof the target. This indicates that creation of clusters and assigning special tasks to cluster heads

    can significantly contribute to overall system scalability, lifetime, and energy efficiency. In case

    of hierarchical routing, it is an efficient way to lower energy consumption within a cluster and by

    performing data aggregation and fusion in order to decrease the number of transmitted messagesto the Base Station.

  • 8/10/2019 REPORT Biswajit

    18/26

    WirelessSensorNetwork RoutingProtocol

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 14

    It is mainly two-layer routing. One layer is used to select cluster heads and the other layer is used

    for routing. However, the majority techniques in this kind are not about routing, rather on "whoand when to send or process/aggregate" the information, channel allocation etc., which can be

    orthogonal to the multihop routing function.

    There are various types of hierarchical routing protocols available,those are -Low Energy

    Adaptive Clustering Hierarchy (LEACH), Threshold-sensitive Energy Efficient sensor Networkprotocol(TEEN), and Adaptive Periodic Threshold-sensitive Energy Efficient sensor Network

    protocol( APTEEN), Power-Efficient Gathering in Sensor Information Systems (PEGASIS) ,

    Small Minimum Energy Communication Network (MECN) , Self Organizing Protocol (SOP),

    Hierarchical Power-aware Routing (HPAR):, Virtual Grid Architecture routing (VGA), Sensoraggregate, Two-Tier Data Dissemination (TTDD)[1][6][7].

    (Figure 9.3 Different Hierarchical Routing Protocols)

    Location Based Routing Protocol: In location based routing protocol, sensor nodes are

    addressed by means of their locations. The distance between adjacent nodes can be estimated onthe basis of incoming signal strengths. If a node dont have any activity to perform then location

    based schemes demands that nodes should go to sleep so that energy can be saved.More energysavings can be possible if the number of sleeping nodes is more in the network.

    There are various types of location based routing protocols available, those are- Geographic

    Adaptive Fidelity (GAF), Geographic and Energy Aware Routing(GEAR), SPAN, Most Forward

    within Radius (MFR), The Geographic Distance Routing (GEDIR)[1][6][7].

    (Figure 9.4 Different Location Based Routing Protocols)

  • 8/10/2019 REPORT Biswajit

    19/26

    WirelessSensorNetwork RoutingProtocol

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 15

    On the basis of operation, routing protocols can also be classified into different categories, those

    are- multipath-based, query-based, negotiation-based, QoS-based, or coherent-based routingtechniques(Figure 9.5)[6][7].

    (Figure 9.5 Different Types Protocols on the basis of Operation)

    During the research it is observed that there are some protocols that fit under more than onecategory. The table in the Figure 9.6 shows comparison between different routing techniques

    according to many metrics and also how different routing protocols fit under different category.

    (Figure 9.6 Comparison of Routing Protocol in WSNs)

  • 8/10/2019 REPORT Biswajit

    20/26

    Wireless Sensor Network Security

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 16

    10. Security

    Security and privacy issues become more important because wireless sensor networks are usually

    used for very critical applications.

    10. 1 Security Threats in WSNs

    WSN is used in the several critical applications. A WSN consists of several number of tiny andresource-constrained sensor nodes. These sensor nodes are spatially distributed and deployed tocollect security-sensitive information in uncontrollable environment. Sensor nodes rely on

    wireless communication to deliver the sensed data to a remote base station. In a basic WSN

    scenario, resource constraint, wireless communication, security-sensitive data, uncontrollable

    environment, and distributed deployment are all vulnerabilities and these vulnerabilities makeWSNs suffer from number of security threats.There are several number of threats in different

    layer of network[2][17].

    10.1.1 Physical Layer Threats

    In physical layer, there may be several threats to the wireless sensor network, due to the non-

    tamper-resistant WSN nodes and the broadcasting nature of wireless transmission. Security

    threats to WSN are always more than traditional nework.Types of attacks in the physical layerinclude physical layer jamming and the subversion of a node.

    10.1.2 Link Layer Threats

    The responsibility of data link layer is multiplexing of data streams, data frame detection,mediumaccess, and error control. Types of attacks can be possible in the data linl layer include

    Data link layer jamming; Eavesdropping; Resource exhaustion and traffic analysis of wireless

    sensor network.

    10.1.3 Network Layer Threats

    In the network layer ,threats mostly aim at disturbing data-centric and energy efficient multihop

    routing.

    Types of attacks and threat can be possible in the network layer include Spoofed, altered, or

    replayed routing information; Sybil attack; Selective forwarding; Sinkhole attack; and floodingattack.

    10.1.4 Application Layer Threats

    Aapplications in the application layar of wireless sensor network (WSN) heavily rely on

    localization, time synchronization,and in-network data processing to collaboratively process data.Types of attacks and threat can be possible in the network layer include False data

    filtering;Clock un-synchronization; False data injection.

    10.2 Countermeasures

    The threats in wireless network either violate network secrecy and authentication or violatenetwork availability or violate some other network functionalities.Countermeasures to the threats

    in WSNs should fulfill the certain security requirements such as :-

    Availability: which ensures that the desired network services are available whenever

    required.

    Authentication : which ensures that the communication from one node to another

    node is genuine.

    Confidentiality : which provides the privacy of the wireless communication channels.

  • 8/10/2019 REPORT Biswajit

    21/26

    Wireless Sensor Network Evaluation Metric

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 17

    Integrity : which ensures that the message or the entity under consideration is not

    altered.

    Non-reputation : which prevents malicious nodes to hide or deny their activities.

    Freshness : which implies that the data is recent and ensures that no adversary can

    replay old messages.

    Survivability : which ensures the acceptable level of network services even in thepresence of node failures and malicious attacks.

    Self-security : countermeasures may introduce additional hardware and software

    infrastructures into the network, which must themselves be secure enough to

    withstand attacks.

    Countermeasures should also fulfill appropriate performance requirements according to the

    application[2][17].

    11. System Evaluation Metrics

    The evaluation metrics that will be used to evaluate a wireless sensor network include as

    Network Coverage and Cost &Ease of deployment, Security, Lifetime, and Response Time[3][19].

    11.1 Network CoverageDeployement of a network over a larger physical area can significantly increase a systems value

    to the end user. It is necessary to remember that the coverage of the network is not equal to therange of the wireless communication links being used. To extend the coverage of the network

    well beyond the range of the radio technology alone, a technology is used called Multi-hop

    communication techniques. It is possible for a user to deploy a small trial network at first andthen can frequently add sense points to gather more and different information. A user must be

    sure that the network technology being used is capable of scaling to meet its need. If you will

    increase the number of nodes in the system .that will put impact either the lifetime or effectivesample rate. Use of more sensing points will cause more data to be transmitted which will

    consume more power of the network.

    11.2 Cost &Ease of deploymentEase of deployment is the most important evalution metrics of wireless sensor network. For the

    successful deployments of the system, the wireless sensor network must configure itself. It must

    be possible for nodes to be placed throughout the environment by an untrained person and havethe system simply work.Ideally, the system would automatically configure itself for any possible

    physical node placement. The initial deployment and configuration is only the first step in the

    network lifecycle. In the long term, the total cost of ownership for a system may have more to dowith the maintenance cost than the initial deployment cost.It is necessary to go for hardware and

    software testing prior to the deployment and also the sensor system must be constructed so that it

    is capable of performing continual self-maintenance.

    11.3 SecurityOne of the most required and important metric is the security. A WSN consists of several

    number of tiny and resource-constrained sensor nodes. These sensor nodes are spatiallydistributed and deployed to collect security-sensitive information in uncontrollable environment.

    Wireless sensor networks must have the capability of keeping the information private from

    eavesdropping.As we consider security oriented applications, data security becomes even more

  • 8/10/2019 REPORT Biswajit

    22/26

    Wireless Sensor Network WSN Standardization

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 18

    significant. The system not only must maintain privacy, it must also have the capability to be

    able to authenticate data communication.

    11.4 LifetimeLifetime is the most critical part wireless sensor network. Energy supply is the main limiting

    factor for the lifetime of a sensor network. Each node must be designed to manage its local

    supply of energy in order to maximize total network lifetime. In the majority of applicationscenarios, a majority of the nodes will have to be self powered. This means they will either have

    to contain enough stored energy to last for years, or they will have to be able to search energyfrom the environment through several other devices, like solar cells or piezoelectric generators to

    increase the lifetime of sensor node. Radio power consumption supply is the important factor for

    determining lifetime of a energy supply. In a wireless sensor node the radio consumes a vast

    majority of the system energy. So the power consumption need to be reduced to increase thelifetime of sensor node and that is possible through decreasing the transmission output power or

    through decreasing the radio duty cycle.

    11.5 Response TimeResponse time is also critical performance metric when environmental monitoring is used to

    control factory machines and equipment. The industrial process control systems would only bepractical if response time guarantees could be met. Despite low power operation, nodes must becapable of having immediate, high-priority messages communicated across the network as

    quickly as possible. Response time can be improved by including nodes that are powered all the

    time. These nodes can listen for the alarm messages and forward them down a routing path in thenetwork when necessary but it may reduce the ease of deployment for the system[3][19].

    12. Standardization

    In the vicinity of WSNs, several standards are presently being developed. The main

    standardization bodies are the Institute of Electrical and Electronics Engineers (IEEE),the

    Internet Engineering Task Force (IETF), the International Society for Automation (ISA) and theHART Communication Foundation, etc.The above mentioned regularity bodies provide openstandards for low-power wireless sensor devices[2][18].

    12.1 IEEE 802.15.4IEEE 802.15.4 is a standard which specifies the physical layer and MAC layer for low-rate

    wireless personal area networks. The standard of IEEE 802.15.4 isfoundation for the ZigBee and

    Wireless HART specification, each of which further endeavor to offer a complete networking

    solution by developing the upper layers which are not enclosed by the standard[2][18].The features of IEEE 802.15.4 are the following (IEEE 802.15 WPAN Task Group 4, n.d.):

    Its Data rates are of 250 kbps, 40 kbps, and 20 kbps.

    There are two addressing modes; 16-bit short and 64-bit IEEE addressing.

    It provides support for critical latency devices, such as joysticks. CSMA-CA channel access.

    It facilitates coordinator to establish network automatically It is a fully handshaked protocol for transfer reliability.

    It ensures low power consumption.

    There are 16 channels in the 2.4GHz ISM band, 10 channels in the 915MHz ISMband and one channel in the 868MHz band.

  • 8/10/2019 REPORT Biswajit

    23/26

    Wireless Sensor Network Application

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 19

    12.2 ZigbeeZigBee is a standard for a set of high level communication protocols based on the IEEE 802.15.4standard for low power and low data rate radio communications. Zigbee is initiated and

    monitored by the Zigbee Alliance - a big conglomerate of industry players[2][18]. The few

    typical application areas of Zigbee are the following:

    It assists in Smart energy monitoring. It is also used in Health care monitoring.

    It is functional in Remote control. It is applied in Building automation and home automation.

    12.3 WirelessHARTWireless HART is an open-standard wireless mesh network communication protocol designed tomeet the needs for process automation applications. The protocol utilizes IEEE 802.15.4 attuned

    DSSS radios and it is operating in the 2.4GHz ISM radio band. On the data link layer, the

    protocol uses TDMA technology to mediate and manage communications between devices.The WirelessHART facilitates highly secure communications by using AES-128 block ciphers

    with individual Join and Session Keys and Data-Link level Network Key.WirelessHART

    supports the standard HART Application Layer and is compatible with existing HART tools,applications and system integration technology.The additional features of wirelessHARTinclude reliability and scalability. We can add new devices for further enhancement of the

    network and for its communication reliability[2][18].

    13. Applications

    Military application was the original motivation behind the research into WSNs .At the later

    period of time costs for sensor nodes and communication networks have been reduced and thusthe application area has also increased.

    13.1Military surveillance and target tracking

    Wireless sensor networks originated mainly in military-related research in the year 1978.Unattended sensor networks can be rapidly deployed for surveillance and used to provide

    battlefield intelligence regarding the location, numbers, movement, and identity of troops and

    vehicles, and for detection of chemical, biological, and nuclear weapons. Faster development ofwireless sensor networks has been provided though several programs funded by the US Defense

    Advanced Research Projects Agency (DARPA), through a program known as Sensor

    Information Technology (SensIT) which provides the present sensor networks with new capabilitiessuch as ad hoc networking, dynamic querying and tasking, reprogramming and multitasking[1][2].

    13.2 Environmental MonitoringEnvironmental monitoring can be used for animal tracking, forest surveillance,flood detection,

    and weather forecasting. It is a natural candidate for applying WSNs because the variables that is

    considered to be temperature, are usually distributed over a large region[2].13.3 Health MonitoringWireless sensor network is a major application in health sector.WSNs can be embedded into a

    hospital building to track and monitor patients and all medical resources. There are various

    kinds of sensors which can measure blood pressure, body temperature and electrocardiograph(ECG). A special kind of sensor network called a body sensor network (BSN) formed When the

    sensors are worn or implanted for healthcare purposes. BSN is a rich interdisciplinary area which

    reforms the healthcare system by allowing inexpensive, continuous and ambulatory health

  • 8/10/2019 REPORT Biswajit

    24/26

    Wireless Sensor Network Pros and Cons/Future work

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 20

    monitoring with real-time updates of medical records via the Internet. Now a days a specialized

    BSN sensor node and BSN Development Kit are available for use in health monitoring system[2][10].

    13.4 Traffic ControlTraffic control is another area where wireless sensor network plays a major role. Wireless sensor

    networks have been used for vehicle traffic monitoring and control for some time. There areeither overhead or buried sensors used to detect vehicles and to control the traffic lights.WSNs

    will completely change the landscape of traffic monitoring and control by installing cheap sensornodes in the car, at the parking lots, along the roadside. Streetline, Inc. is a company which uses

    sensor network technology to help drivers find unoccupied parking places and avoid traffic

    jams[1][2][10].

    13.5 Industrial SensingSensor nodes can be deeply embedded into machines and there is no infrastructure ,WSNs make

    it economically feasible to monitor the health of machines and to ensure safe operation. Agingpipelines and tanks have become a major problem in the oil and gas industry. Monitoring

    corrosion using manual processes is extremely costly, time consuming,and unreliable.A network

    of wireless corrosion sensors can be economically deployed to reliably identify issues beforethey become catastrophic failures.

    13.6 Infrastructure SecurityWSNs can be used for infrastructure security and counterterrorism applications. Security is the

    major aspect of wireless sensor network. Critical buildings and facilities such as power plants,

    airports, and military bases have to be protected from attacks. Networks of video, acoustic, andother sensors can be deployed around these facilities[1][10]

    14. Pros and Cons of Wireless Sensor Networking

    There are several advantages of wireless sensor networking as they can store a limited source of

    energy, they have no hassle of cables and have mobility. The major advantage is that it can workefficiently under the harsh conditions, and it has deployment up to large scale etc. Same time italso has some disadvantages which really take the moral of this technology down as they have

    very insufficient speed of communication, it is to disturb the propagation of waves and hack your

    networking and the major disadvantage of wireless sensor networking is it is too costly to use.

    15. Future Work

    As the wireless sensor network is under research, there are a number of improvements we can

    think of.

    We can think of expanding the sensor mote network by adding more motes. This would

    allow the development and testing of advanced network-layer functions, such as multi-hop routing.

    We can think of alternative energy sources to extend mote battery life. Which may

    includes solar cells and rechargeable batteries, these systems could provide a long term,maintenance free, wireless monitoring solution.

  • 8/10/2019 REPORT Biswajit

    25/26

    Wireless Sensor Network Conclusion

    [Biswajit Nayak, MTech (ICT), IITKgp][Regd.No10IT61B06] Page 21

    16. Conclusions

    Wireless sensor networks must be designed to meet a number of challenging requirements

    including extended lifetime in the face of energy constraints, robustness, scalability, andautonomous operation.

    Wireless sensor networks are getting smaller and faster, increasing their potential applications incommercial, industrial, and residential environments.

    However, the limit of applications depends only upon the sensors used and the interpretation of

    the data obtained. As the technology improves and new low-power digital sensors become morereadily available, motes will increase functionality without increasing power consumption and

    will expand the wireless sensing market.

    17. Bibliography

    1. Networking Wireless Sensorsby Bhaskar Krishnamachari ,2005.

    2.

    Wireless Sensor Networks - An Introductionby QinghuaWang and Ilangko Balasingham.3. System Architecture for Wireless Sensor Networks by Jason Lester Hill, University of

    California, Berkeley ,2003.

    4. A Survey of Wireless Sensor Networks Technology by I. Khemapech, I. Duncan and A.Miller ,School of Computer Science , University of St Andrews ,North Haugh, St Andrews.

    5. Data Fusion Improves the Coverage of Wireless Sensor Networks by Guoliang Xing1; Rui

    Tan2; Benyuan Liu3; Jianping Wang2;Xiaohua Jia2; Chih-Wei Yi4, 1Department ofComputer Science & Engineering, Michigan State University,USA.

    6. Routing Protocols in Wireless Sensor Networks A Survey Shio Kumar Singh 1, M P Singh

    2, and D K Singh 3.7. Routing Techniques in Wireless Sensor Networks: A Survey,Jamal N. Al-Karaki Ahmed E.

    Kamal Dept. of Electrical and Computer Engineering Iowa State University, Ames, Iowa50011.

    8. Fundamentals of Wireless Sensor Networks: Theory and Practice, Waltenegus Dargie and

    Christian Poellabauer 2010 John Wiley & Sons, Ltd.

    9. ftp.ni.com/pub/devzone/pdf/tut_7142.pdf10.Wikipedia

    11.Zone.ni.com/devzone/cda/tut/p/id/8707

    12.WISENET, SNGCE kolenchery, Dept. ofCSE.

    13.Chipcon ,SmartRF CC1010 Datasheet (rev. 1.3) 2004-12-1714.A Survey of Wireless Sensor Networks Technology I. Khemapech, I. Duncan and A. Miller

    School of Computer Science University of St Andrews North Haugh, St Andrews.

    15.

    A survey on routing protocols for wireless sensor networks Kemal Akkaya *, MohamedYounis ,Department of Computer Science and Electrical Engineering, University of

    Maryland, Baltimore County, Baltimore.

    16.A Hierarchical Routing Protocol for Survivability in Wireless Sensor Network(WSN),Mohammad S. Al-Fares1, student Member , IEEE, Zhili Sun2, Member, IEEE, Haitham

    Cruick shank3, Member, IEEE,IMECS 2009, March 18 - 20, 2009, Hong Kong.

    17.Wireless Sensor Network Security Analysis by Hemanta Kumar Kalita1 and Avijit Kar2,Department of Computer Engineering, Jadavpur University, Kolkata, India.

  • 8/10/2019 REPORT Biswajit

    26/26

    WirelessSensorNetwork Bibliography

    18.Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications byRaymond S. Wagner, Ph.D, NASA Johnson Space Center.

    19.Wireless Sensor Network by priyal shah, Dept.CSE.Ahmadbad, Oct 2010.