Introduction to Wireless Sensor Networks
Data Dissemination and Routing Protocols
Data Gathering
Locationing and Coverage
Testbeds/Applications
Security in Wireless Sensor Networks
Summary & Discussion
UNIT IV WIRELESS SENSOR NETWORKS (WSNS) AND MAC PROTOCOLS 9 Single node architecture: hardware and software components of a sensor node - WSN Network architecture: typical network architectures-data relaying and aggregation strategies -MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE 802.15.4.
This document discusses wireless sensor networks and MAC protocols. It provides information on single node architecture including hardware and software components of sensor nodes. It also discusses typical WSN network architectures and data aggregation strategies. Finally, it describes various MAC layer protocols including self-organizing, hybrid TDMA/FDMA, and CSMA based protocols like IEEE 802.15.4.
This document provides an overview of wireless sensor networks (WSNs). It discusses the background and components of sensor nodes, including sensors, processors, radio transceivers, and power sources. The document also covers sensor network architectures like clustered and layered networks. It describes data dissemination in WSNs using data diffusion models and explores concepts like interests, gradients, and reinforcement. Finally, it introduces the problem of gathering sensor data efficiently to prolong network lifetime and discusses optimizing the energy-delay metric.
Wireless sensor networks are composed of densely deployed sensor nodes that can cooperatively monitor phenomena. The document outlines applications of sensor networks like environmental monitoring and health monitoring. It discusses factors influencing sensor network design such as fault tolerance, scalability, hardware constraints, and power consumption. It also describes the communication architecture of sensor networks including the physical, data link, network, transport, and application layers and open research issues at each layer.
This document summarizes sensor networks, including their definition, components, applications, characteristics, architectures, challenges, and security approaches. Sensor networks consist of spatially distributed nodes that monitor environmental conditions and pass data to a central location. The nodes have sensors, microcontrollers, memory, and radios. Applications include area monitoring, healthcare, and environmental monitoring. Challenges include limited energy, computation, and transmission range. PEGASIS is an approach that forms nodes into chains to more efficiently pass data to the base station and minimize energy use. Security is provided using secret key encryption algorithms.
Wireless sensor networks are composed of nodes that communicate wirelessly and self-organize after deployment. Each node contains processing capability, memory, an RF transceiver and antenna, a power source, and sensors. Systems can include thousands or tens of thousands of nodes communicating to monitor environments. It is expected that within 10-15 years, wireless sensor networks will cover the world and connect to the Internet, making the Internet a physical network. Research in this area includes workshops and conferences each year focused on algorithms and protocols to maximize network lifetime while ensuring robustness, fault tolerance, and self-configuration.
Wireless Sensor Networks lecture presented in the Fall of 2005. Covering the following: data-dissemination schemes, media access control schemes, distributed algorithms for collaborative processing, and architecture for a wireless sensor network.
This document provides an overview of wireless sensor networks including their components, characteristics, applications, data dissemination schemes, media access control schemes, and architectures. Wireless sensor networks consist of sensor nodes that collect and transmit environmental data via radio frequencies to base stations. They are constrained by limited energy, computation, and communication abilities. Common applications include environment monitoring and medical care. The document discusses clustering, LEACH protocol, TDMA, and address-free architectures used in wireless sensor networks.
This document provides an overview of wireless sensor networks including their components, characteristics, applications, and key technical considerations. Wireless sensor networks consist of sensor nodes that collect and transmit environmental data via radio frequencies to base stations. They have constraints of limited energy, computation, and communication capabilities. Common applications include environmental monitoring and medical care. The document discusses data dissemination schemes, media access control protocols, distributed processing algorithms, and network architectures that aim to maximize sensor network lifetimes and reliability.
This document provides an overview of wireless sensor networks including their components, characteristics, applications, data dissemination schemes, media access control schemes, and architectures. Wireless sensor networks consist of sensor nodes that collect and transmit environmental data via radio frequencies to base stations. They are constrained by limited energy, computation, and communication abilities. Common applications include environment monitoring and medical care. The document discusses clustering, LEACH protocol, TDMA, and address-free architectures used in wireless sensor networks.
This document discusses wireless sensor networks and their architecture. It describes layered and clustered architectures for organizing sensor networks. Layered architectures arrange sensors in layers around a central base station, allowing for short-range transmissions. Clustered architectures organize sensors into clusters headed by cluster heads that can aggregate and transmit data to the base station. The document also introduces protocols like UNPF that implement layered architectures and LEACH that uses clustering to minimize energy use in sensor networks.
in this paper authors made the study of basic clustering algorithm Leach. A comparison is made between Leach and Leach.wireless sensor network advantages, and wireless sensor network dataset
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Surveytheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Energy efficient platform designed for sdma applications in mobile wireless ...marwaeng
This document describes an energy-efficient mobile wireless sensor network platform called DataTruck that is designed to support space-division multiple access (SDMA) applications. The DataTruck node uses an ARM920T microprocessor and IEEE 802.15.4 radio to collect and relay data from static sensor nodes. It integrates a smart antenna system to concurrently receive data from multiple static nodes using the same radio frequency channel. Experiments showed that DataTruck can efficiently collect data and reduce average data transmission delay through the use of SDMA technology.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
This document summarizes and compares several routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses some of the key challenges in routing for these networks, such as large numbers of sensor nodes, energy constraints, and random node deployment. The document then categorizes routing protocols as flat-based, hierarchical-based, or location-based and focuses on reviewing various dynamic and static hierarchical/clustering-based routing protocols. Several popular protocols are described in detail, including LEACH, EECS, PEGASIS, and EEPSC. The pros and cons of each approach are discussed.
A wireless sensor network consists of spatially distributed sensor nodes that monitor physical conditions and communicate wirelessly. Nodes sense data, process it, and transmit it to other nodes or a central gateway. The gateway provides a connection to the wired world to collect, process, analyze and present measurement data. Routers can extend the communication range between nodes and the gateway. Sensor nodes are small, require little power, are programmable and cost-effective to purchase and maintain.
In this thesis work, firstly an attempt have been made to evaluate the performance of DSR and OLSR routing protocol in mobile and static environments using Random Waypoint model, and also investigate how well these selected protocols performs on WSNs. energy efficient routing in wireless sensor networks thesis
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
This paper reviews medium access control
(MAC) in wireless sensor network (WSN),and different
management methods to save energy.MAC protocol
controls how sensors access a shared radio channel to
communicate with neighbours.
Wireless Personal Area Networks (WPAN): Lowrate amd High RateDon Norwood
This document provides an overview of wireless personal area networks (WPANs) and discusses two specific WPAN standards, 802.15.3 (WPAN-LR) and 802.15.13a (WPAN-HR). It describes the components and design considerations of wireless sensor networks, including their applications, network models, protocol stacks involving different layers, and power, mobility and task management planes. Diagrams are included illustrating a WPAN standard summary, wireless sensor network model, sensor node components, and the sensor network protocol stack.
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Networkijsrd.com
Privacy preservation is an important issue in today's context of extreme penetration of internet and mobile technology. It is more important in the case of wireless sensor network where collected data often requires in network processing and collaborative computing. Security is always booming in wireless sensor network. Privacy preserving data aggregation emerged as an important concern in designing data aggregation algorithm. Encryption schemes that support operation over cipher text are of utmost for wireless sensor networks & especially in LEACH protocol. The salient limit of LEACH is energy. Due to this limitation, it seems important to design Confidentiality scheme for WSN so that sensing data can be transmitted to the receiver securely and efficiently and the energy consumed must be minimum hence we proposed AggreLEACH in which confidentiality scheme i.e. holomorphic encryption is added to LEACH protocol. In holomorphic encryption data can be aggregated without decryption and hence less energy consumption. The objective is to provide secure data transmission between sensor node and aggregator. Simulation result are obtain in terms of two metrics- total energy Consumed of node, life-time of node. It is observed that the performance of AggreLEACH compare to LEACH. We have performed theoretical analysis as well as simulation to check the performance in terms of accuracy, complexity and security.
This document provides an overview of wireless sensor networks, including their basic components, applications, and technical considerations. It discusses the key elements of sensor networks such as sensors, interconnecting networks, data clustering points, and computing resources. It also covers sensor types, network architectures, communication protocols, applications such as environmental monitoring and smart spaces, and challenges around power efficiency and scalability.
This document summarizes a survey of intelligent approaches for efficient energy consumption in wireless sensor networks. Artificial intelligence techniques have been applied to optimize routing protocols and aggregate sensor data more efficiently to conserve limited battery power. Some key approaches discussed are directed diffusion for data dissemination, low-energy adaptive clustering hierarchy (LEACH) for randomized clustering, and energy aware distributed aggregation trees for in-network data aggregation. The goal is to extend the lifetime of battery-powered sensor networks through intelligent energy management strategies.
As heavy rainfall can lead to several catastrophes; the prediction of rainfall is vital. The forecast encourages individuals to take appropriate steps and should be reasonable in the forecast. Agriculture is the most important factor in ensuring a person's survival. The most crucial aspect of agriculture is rainfall. Predicting rain has been a big issue in recent years. Rainfall forecasting raises people's awareness and allows them to plan ahead of time to preserve their crops from the elements. To predict rainfall, many methods have been developed. Instant comparisons between past weather forecasts and observations can be processed using machine learning. Weather models can better account for prediction flaws, such as overestimated rainfall, with the help of machine learning, and create more accurate predictions. Thanjavur Station rainfall data for the period of 17 years from 2000 to 2016 is used to study the accuracy of rainfall forecasting. To get the most accurate prediction model, three prediction models ARIMA (Auto-Regression Integrated with Moving Average Model), ETS (Error Trend Seasonality Model) and Holt-Winters (HW) were compared using R package. The findings show that the model of HW and ETS performs well compared to models of ARIMA. Performance criteria such as Akaike Information Criteria (AIC) and Root Mean Square Error (RMSE) have been used to identify the best forecasting model for Thanjavur station.
This document provides an overview of wireless sensor networks including their components, characteristics, applications, and key technical considerations. Wireless sensor networks consist of sensor nodes that collect and transmit environmental data via radio frequencies to base stations. They have constraints of limited energy, computation, and communication capabilities. Common applications include environmental monitoring and medical care. The document discusses data dissemination schemes, media access control protocols, distributed processing algorithms, and network architectures that aim to maximize sensor network lifetimes and reliability.
This document provides an overview of wireless sensor networks including their components, characteristics, applications, data dissemination schemes, media access control schemes, and architectures. Wireless sensor networks consist of sensor nodes that collect and transmit environmental data via radio frequencies to base stations. They are constrained by limited energy, computation, and communication abilities. Common applications include environment monitoring and medical care. The document discusses clustering, LEACH protocol, TDMA, and address-free architectures used in wireless sensor networks.
This document discusses wireless sensor networks and their architecture. It describes layered and clustered architectures for organizing sensor networks. Layered architectures arrange sensors in layers around a central base station, allowing for short-range transmissions. Clustered architectures organize sensors into clusters headed by cluster heads that can aggregate and transmit data to the base station. The document also introduces protocols like UNPF that implement layered architectures and LEACH that uses clustering to minimize energy use in sensor networks.
in this paper authors made the study of basic clustering algorithm Leach. A comparison is made between Leach and Leach.wireless sensor network advantages, and wireless sensor network dataset
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Surveytheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Energy efficient platform designed for sdma applications in mobile wireless ...marwaeng
This document describes an energy-efficient mobile wireless sensor network platform called DataTruck that is designed to support space-division multiple access (SDMA) applications. The DataTruck node uses an ARM920T microprocessor and IEEE 802.15.4 radio to collect and relay data from static sensor nodes. It integrates a smart antenna system to concurrently receive data from multiple static nodes using the same radio frequency channel. Experiments showed that DataTruck can efficiently collect data and reduce average data transmission delay through the use of SDMA technology.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
This document summarizes and compares several routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses some of the key challenges in routing for these networks, such as large numbers of sensor nodes, energy constraints, and random node deployment. The document then categorizes routing protocols as flat-based, hierarchical-based, or location-based and focuses on reviewing various dynamic and static hierarchical/clustering-based routing protocols. Several popular protocols are described in detail, including LEACH, EECS, PEGASIS, and EEPSC. The pros and cons of each approach are discussed.
A wireless sensor network consists of spatially distributed sensor nodes that monitor physical conditions and communicate wirelessly. Nodes sense data, process it, and transmit it to other nodes or a central gateway. The gateway provides a connection to the wired world to collect, process, analyze and present measurement data. Routers can extend the communication range between nodes and the gateway. Sensor nodes are small, require little power, are programmable and cost-effective to purchase and maintain.
In this thesis work, firstly an attempt have been made to evaluate the performance of DSR and OLSR routing protocol in mobile and static environments using Random Waypoint model, and also investigate how well these selected protocols performs on WSNs. energy efficient routing in wireless sensor networks thesis
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
This paper reviews medium access control
(MAC) in wireless sensor network (WSN),and different
management methods to save energy.MAC protocol
controls how sensors access a shared radio channel to
communicate with neighbours.
Wireless Personal Area Networks (WPAN): Lowrate amd High RateDon Norwood
This document provides an overview of wireless personal area networks (WPANs) and discusses two specific WPAN standards, 802.15.3 (WPAN-LR) and 802.15.13a (WPAN-HR). It describes the components and design considerations of wireless sensor networks, including their applications, network models, protocol stacks involving different layers, and power, mobility and task management planes. Diagrams are included illustrating a WPAN standard summary, wireless sensor network model, sensor node components, and the sensor network protocol stack.
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Networkijsrd.com
Privacy preservation is an important issue in today's context of extreme penetration of internet and mobile technology. It is more important in the case of wireless sensor network where collected data often requires in network processing and collaborative computing. Security is always booming in wireless sensor network. Privacy preserving data aggregation emerged as an important concern in designing data aggregation algorithm. Encryption schemes that support operation over cipher text are of utmost for wireless sensor networks & especially in LEACH protocol. The salient limit of LEACH is energy. Due to this limitation, it seems important to design Confidentiality scheme for WSN so that sensing data can be transmitted to the receiver securely and efficiently and the energy consumed must be minimum hence we proposed AggreLEACH in which confidentiality scheme i.e. holomorphic encryption is added to LEACH protocol. In holomorphic encryption data can be aggregated without decryption and hence less energy consumption. The objective is to provide secure data transmission between sensor node and aggregator. Simulation result are obtain in terms of two metrics- total energy Consumed of node, life-time of node. It is observed that the performance of AggreLEACH compare to LEACH. We have performed theoretical analysis as well as simulation to check the performance in terms of accuracy, complexity and security.
This document provides an overview of wireless sensor networks, including their basic components, applications, and technical considerations. It discusses the key elements of sensor networks such as sensors, interconnecting networks, data clustering points, and computing resources. It also covers sensor types, network architectures, communication protocols, applications such as environmental monitoring and smart spaces, and challenges around power efficiency and scalability.
This document summarizes a survey of intelligent approaches for efficient energy consumption in wireless sensor networks. Artificial intelligence techniques have been applied to optimize routing protocols and aggregate sensor data more efficiently to conserve limited battery power. Some key approaches discussed are directed diffusion for data dissemination, low-energy adaptive clustering hierarchy (LEACH) for randomized clustering, and energy aware distributed aggregation trees for in-network data aggregation. The goal is to extend the lifetime of battery-powered sensor networks through intelligent energy management strategies.
As heavy rainfall can lead to several catastrophes; the prediction of rainfall is vital. The forecast encourages individuals to take appropriate steps and should be reasonable in the forecast. Agriculture is the most important factor in ensuring a person's survival. The most crucial aspect of agriculture is rainfall. Predicting rain has been a big issue in recent years. Rainfall forecasting raises people's awareness and allows them to plan ahead of time to preserve their crops from the elements. To predict rainfall, many methods have been developed. Instant comparisons between past weather forecasts and observations can be processed using machine learning. Weather models can better account for prediction flaws, such as overestimated rainfall, with the help of machine learning, and create more accurate predictions. Thanjavur Station rainfall data for the period of 17 years from 2000 to 2016 is used to study the accuracy of rainfall forecasting. To get the most accurate prediction model, three prediction models ARIMA (Auto-Regression Integrated with Moving Average Model), ETS (Error Trend Seasonality Model) and Holt-Winters (HW) were compared using R package. The findings show that the model of HW and ETS performs well compared to models of ARIMA. Performance criteria such as Akaike Information Criteria (AIC) and Root Mean Square Error (RMSE) have been used to identify the best forecasting model for Thanjavur station.
DeFAIMint | 🤖Mint to DeFAI. Vibe Trading as NFTKyohei Ito
DeFAI Mint: Vive Trading as NFT.
Welcome to the future of crypto investing — radically simplified.
"DeFAI Mint" is a new frontier in the intersection of DeFi and AI.
At its core lies a simple idea: what if _minting one NFT_ could replace everything else? No tokens to pick.
No dashboards to manage. No wallets to configure.
Just one action — mint — and your belief becomes an AI-powered investing agent.
---
In a market where over 140,000 tokens launch daily, and only experts can keep up with the volatility.
DeFAI Mint offers a new paradigm: "Vibe Trading".
You don’t need technical knowledge.
You don’t need strategy.
You just need conviction.
Each DeFAI NFT carries a belief — political, philosophical, or protocol-based.
When you mint, your NFT becomes a fully autonomous AI agent:
- It owns its own wallet
- It signs and sends transactions
- It trades across chains, aligned with your chosen thesis
This is "belief-driven automation". Built to be safe. Built to be effortless.
- Your trade budget is fixed at mint
- Every NFT wallet is isolated — no exposure beyond your mint
- Login with Twitter — no crypto wallet needed
- No \$SOL required — minting is seamless
- Fully autonomous, fully on-chain execution
---
Under the hood, DeFAI Mint runs on "Solana’s native execution layer", not just as an app — but as a system-level innovation:
- "Metaplex Execute" empowers NFTs to act as wallets
- "Solana Agent Kit v2" turns them into full-spectrum actors
- Data and strategies are stored on distributed storage (Walrus)
Other chains can try to replicate this.
Only Solana makes it _natural_.
That’s why DeFAI Mint isn’t portable — it’s Solana-native by design.
---
Our Vision?
To flatten the playing field.
To transform DeFi × AI from privilege to public good.
To onboard 10,000× more users and unlock 10,000× more activity — starting with a single mint.
"DeFAI Mint" is where philosophy meets finance.
Where belief becomes strategy.
Where conviction becomes capital.
Mint once. Let it invest. Live your life.
Jeff Menashe - A Dedicated Senior Software EngineerJeff Menashe
Jeff Menashe is a Senior Software Engineer at Innovatech Solutions in Austin, Texas. With a Bachelor’s degree in Computer Science from the University of Texas, Jeff specializes in full-stack development and scalable web applications.
Jamuna river is a morphologically very dynamic river. It carries a vast sediment load from the erosive foothills of Himalaya mountain. The length of the Jamuna River is 220 km. For this research work Jamalpur district is selected to assess morphological changes using hydrodynamic, Artificial intelligence and google satellite images. First, the hydrodynamic model was calibrated and validated at Kazipur station for the years 2018 and 2019 respectively. Then, left overbank maximum discharge, water level, velocity, the slope was extracted from HEC-RAS 1D at 300 m interval interpolated cross-section. Then, this cross-section was exported as a shapefile. In google earth, the erosion rate was measured corresponding to this interpolated cross-section. The results of the hydrodynamic model were given as input variable and erosion rate as an output variable in Machine learning and deep learning technique. Calibration and validation of the regression model was done for the years 2018 and 2019 respectively. This research work can be helpful to locate the area which are vulnerable to bank erosion.
In the 1993 AASHTO flexible pavement design equation, the structural number (SN) cannot be calculated explicitly based on other input parameters. Therefore, in order to calculate the SN, it is necessary to approximate the relationship using the iterative approach or using the design chart. The use of design chart reduces the accuracy of calculations and, on the other hand, the iterative approach is not suitable for manual calculations. In this research, an explicit equation has been developed to calculate the SN in the 1993 AASHTO flexible pavement structural design guide based on response surface methodology (RSM). RSM is a collection of statistical and mathematical methods for building empirical models. Developed equation based on RMS makes it possible to calculate the SN of different flexible pavement layers accurately. The coefficient of determination of the equation proposed in this study for training and testing sets is 0.999 and error of this method for calculating the SN in most cases is less than 5%. In this study, sensitivity analysis was performed to determine the degree of importance of each independent parameter and parametric analysis was performed to determine the effect of each independent parameter on the SN. Sensitivity analysis shows that the log(W8.2) has the highest degree of importance and the ZR parameter has the lowest one.
This project report explores the critical domain of cybersecurity, focusing on the practices and principles of ethical hacking as a proactive defense mechanism. With the rapid growth of digital technologies, organizations face a wide range of threats including data breaches, malware attacks, phishing scams, and ransomware. Ethical hacking, also known as penetration testing, involves simulating cyberattacks in a controlled and legal environment to identify system vulnerabilities before malicious hackers can exploit them.
2. 2
General Overview
Introduction to Wireless Sensor Networks
Data Dissemination and Routing Protocols
Data Gathering
Locationing and Coverage
Testbeds/Applications
Security in Wireless Sensor Networks
Summary & Discussion
3. 3
Motivation
GOAL: Deeply Networked Systems or Pervasive
Networking
98% of all processors are not in traditional desktop
computer systems, but in house-hold appliances,
vehicles, and machines on factory floors
Add reliable wireless communications and sensing
functions to the billions of physically embedded
computing devices to support ubiquitous networked
computing
Distributed Wireless Sensor Networks is a collection
of embedded sensor devices with networking
capabilities
8. 8
Sensors (contd.)
The overall architecture of a sensor node
consists of:
The sensor node processing
subsystem running on sensor node
main CPU
The sensor subsystem and
The communication subsystem
The processor and radio board includes:
TI MSP430 microcontroller with
10kB RAM
16-bit RISC with 48K Program Flash
IEEE 802.15.4 compliant radio at 250
kbps
1MB external data flash
Runs TinyOS 1.1.10 or higher
Two AA batteries or USB
1.8 mA (active); 5.1uA (sleep)
Crossbow Mote
TPR2400CA-TelosB
9. 9
Overall Architecture of a sensor node
Appl i cat i on Layer
Net work Layer
M
AC Layer
Physi cal Layer
Com
m
uni cat i on
SubSyst em
W
i rel ess Channel
Sl ow Seri al Li nk
Sensor
Sensor Node CPU
Radi o Board
Forward Packet Pat h
11. 11
Networked vs. individual sensors
Extended range of sensing:
Cover a wider area of operation
Redundancy:
Multiple nodes close to each other increase fault tolerance
Improved accuracy:
Sensor nodes collaborate and combine their data to
increase the accuracy of sensed data
Extended functionality:
Sensor nodes can not only perform sensing functionality,
but also provide forwarding service.
12. 12
Applications of sensor networks
Physical security for military operations
Indoor/Outdoor Environmental monitoring
Seismic and structural monitoring
Industrial automation
Bio-medical applications
Health and Wellness Monitoring
Inventory Location Awareness
Future consumer applications, including smart
homes.
15. 15
Characteristics and challenges
Deeply distributed architecture: localized coordination to reach
entire system goals, no infrastructure with no central control
support
Autonomous operation: self-organization, self-configuration,
adaptation, exception-free
TCP/IP is open, widely implemented, supports multiple
physical network, relatively efficient and light weight, but
requires manual intervention to configure and to use.
Energy conservation: physical, MAC, link, route, application
Scalability: scale with node density, number and kinds of
networks
Data centric network: address free route, named data,
reinforcement-based adaptation, in-network data aggregation
16. 16
Challenges, contd.
Challenges
Limited battery power
Limited storage and computation
Lower bandwidth and high error rates
Scalability to 1000s of nodes
Network Protocol Design Goals
Operate in self-configured mode (no infrastructure
network support)
Limit memory footprint of protocols
Limit computation needs of protocols -> simple, yet
efficient protocols
Conserve battery power in all ways possible
17. 17
WSN vs. MANET
Wireless sensor networks may be considered a subset
of Mobile Ad-hoc NETworks (MANET).
WSN nodes have less power, computation and
communication compared to MANET nodes.
MANETs have high degree of mobility, while sensor
networks are mostly stationary.
Freq. node failures in WSN -> topology changes
Routing protocols tend to be complex in MANET, but
need to be simple in sensor networks.
Low-power operation is even more critical in WSN.
MANET is address centric, WSN is data centric.
18. 18
Why not port Ad Hoc Protocols?
Ad Hoc networks require significant amount of
routing data storage and computation
Sensor nodes are limited in memory and CPU
Topology changes due to node mobility are infrequent
as in most applications sensor nodes are stationary
Topology changes when nodes die in the network due to
energy dissipation
Scalability with several hundred to a few thousand
nodes not well established
GOAL: Simple, scalable, energy-efficient protocols
19. 19
Focus: Radio Transceiver Usage
The wireless radio transceiver is typically in three modes:
Transmit – Maximum power consumption
Receive
Idle
Turned off – Least power consumption
Sensor node exists in three modes: Active, standby, and battery
dead
Turnaround time: Time to change from one mode to another
(esp. important is time from sleep to wakeup and vice-versa)
Protocol design attempts to place node in these different modes
depending upon several factors
Sample power consumption from 2 sensor nodes shown next
20. 20
Rockwell Node (SA-1100 proc)
MCU Mode Sensor Mode Radio Mode Power(mW)
Active On Tx(36.3mW) 1080.5
Tx(13.8mW) 942.6
Tx(0.30mW) 773.9
Active On Rx 751.6
Active On Idle 727.5
Active On Sleep 416.3
Active On Removed 383.3
Active Removed Removed 360.0
Sleep On Removed 64.0
21. 21
UCLA Medusa node (ATMEL CPU)
MCU Mode Sensor Radio(mW) Data rate Power(mW)
Active On Tx(0.74,OOK) 2.4Kbps 24.58
Tx(0.74,OOK) 19.2Kbps 25.37
Tx(0.10,OOK) 2.4Kbps 19.24
Tx(0.74,OOK) 19.2Kbps 20.05
Tx(0.74,ASK) 19.2Kbps 27.46
Tx(0.10,ASK) 2.4Kbps 21.26
Active On Rx - 22.20
Active On Idle - 22.06
Active On Off - 9.72
Idle On Off - 5.92
Sleep Off Off - 0.02
22. 22
Energy conservation
Physical layer
• Low power circuit(CMOS, ASIC) design
• Optimum hardware/software function division
• Energy effective waveform/code design
• Adaptive RF power control
MAC sub-layer • Energy effective MAC protocol
• Collision free, reduce retransmission and transceiver on-times
• Intermittent, synchronized operation
• Rendezvous protocols
Link layer
Network layer
Application layer
• FEC versus ARQ schemes; Link packet length adapt.
• Multi-hop route determination
• Energy aware route algorithm
• Route cache, directed diffusion
• Video applications: compression and frame-dropping
• In-network data aggregation and fusion
See Jones, Sivalingam, Agrawal, and Chen survey article in ACM WINET, July 2001;
See Lindsey, Sivalingam, and Raghavendra book chapter in Wiley Handbook of Mobile Computing,
Ivan Stojmenovic, Editor, 2002.
24. 24
Network Architectures
Layer 1
Layer 2
Layer 3
Layered
Architecture
Base
Statio
n
Clustered
Architecture
Base
Statio
n
Larger Nodes denote Cluster Heads
25. 25
Clustered network architecture
Ti er 1
Ti er 0
Ti er 2
Ti er 1
Ti er 0
Sensor nodes autonomously form a group called clusters.
The clustering process is applied recursively to form a hierarchy of clusters.
26. 26
Cluster architecture (contd.)
( ( ) )
( ( ) )
( ( ) )
( ( ) )
( ( ) ) ( ( ) )
( ( ) )
( ( ) )
( ( ) )
( ( ) )
Base St ati on
Cl ust er- head
Cl ust er-head
Cl uster-head
Sensor
Cl uster
Cl ust er
Cl ust er
Example - LEACH protocol
It uses two-tier hierarchy
clustering architecture.
It uses distributed
algorithm to organize the
sensor nodes into clusters.
The cluster-head nodes
create TDMA schedules.
Nodes transmit data during
their assigned slots.
The energy efficiency of
the LEACH is mainly due
to data fusion.
27. 27
Layered Network Architecture
A few hundred sensor nodes
(half/full duplex)
A single powerful base-station
Network nodes are organized into
concentric Layers
Layer: Set of nodes that have the
same hop-count to the base-
station
Additional Mobile Nodes
traversing the network
Wireless Multi-Hop
Infrastructure Network
Architecture (MINA)
A 10 node sensor network depicting cluster of node 3;
there are 2 mobile nodes
28. 28
MINA, contd.
Set of wireless sensor nodes create an infrastructure –
provide sensing and data forwarding functionality
Mobile soldiers with hand-held units access the sensors
for data and also to communicate with a remote BS
BS is data gathering, processing entity and
communication link to larger network
Shorter-range, low-power transmissions preferred for
covert operations and to conserve power
30. 30
Data Dissemination
In ad hoc networks, traffic is peer-to-peer
Multi-hop routing is used to communicate data
In WSN, other traffic models are possible:
Data Collection Model
Data Diffusion Model
Data Collection Model: Source sends data to a collection
entity (e.g. gateway): periodically or on-demand
Data Diffusion Model:
Source: A sensor node that generates data, based on its
sensing mechanisms’ observations
Event: Something that needs to be reported, e.g. in
target detection; some abnormal activity
Sink: A node, randomly located in the field, that is
interested in events and seeks such information
32. 33
Diffusion: Basics
Data-centric vs. address centric architecture
Individual network address is not critical; Data is important
and is accessed as needed
User can pose a specific task, that could be executed by sensor
nodes
Concept of Named Data: (Attribute, Value) Pair
Sink node requests data by sending “interests” for data
Interests are propagated through the network, setting up
gradients in the network, designed to “draw” data
Data matching the interest is then transmitted towards the sink,
over multiple paths (obtained by the gradients
The sink can then reinforce some of these paths to optimize
33. 34
Diffusion Basics, contd.
Design Issues:
How does a sink express its interest in one or more
events?
How do sensor nodes keep track of existing interests
from multiple sinks?
When an event occurs, how does data get propagated
from source(s) to sink(s)?
Can in-network data processing (e.g. data fusion), data
aggregation and data caching help improve
performance?
34. 35
Diffusion Basics, contd
Example Task
{Type = Animal; Interval = 20ms; Time = 10s;
Region = [-100, 100, 200, 400] }
The above task instructs a sensor node in the
specified region to track for animals; If animal is
tracked/detected, then send observations every 20
ms for 10s
The above task is sent via interest messages and
all sensor nodes register this task.
When a node detects an event, it then constructs a
Data Event message
35. 36
Diffusion: Basics, contd
Data Event Example:
{Type = Animal; Instance = Tiger;
Location = [101, 201]; Intensity = 0.4;
Confidence = 0.8; Timestamp = 2:51:00}
Interests and Gradients:
For each active task that a sink is interested in:
Sink broadcasts interest to its neighbors
Initially, to explore, it could set large interval (e.g 1s)
Sink refreshes each interest, using timestamps
Each sensor node maintains an interest cache
Interest aggregation is possible
36. 37
Diffusion: Interests
When a node receives an interest, it:
Checks cache to see if an entry is present.
If no entry, creates an entry with a single gradient to
neighbor who sent this interest
Gradient specifies the direction and data rate.
Resend interest to a subset of its neighbors
This is essentially flooding-based approach
Other probabilistic, location-based and other intelligent
forwarding approaches possible
Similar to multicast tree formation, at sink instead
of at source
38. 39
Diffusion: Data Propagation
When a sensor node detects a target, it:
Searches interest cache for matching entry
If found, computes highest requested event rate among
its gradients
Instructs sensor sub-system to generate data at this rate
Sends data to neighbors on its gradient list
Intermediate nodes maintain a data cache
Caches recently received events
Forwards event data to neighbors on its gradient list, at
original rate or reduced rate (intelligently)
39. 40
Diffusion: Reinforcement
When sink gets an event notification, it:
Picks a suitable set of neighbor(s) (best link, low delay,
etc.) and sends a refresh interest message, with higher
notification rate (e.g. every 10 ms instead of every 1s)
• This will prune some of its neighbors (since interests in a
node’s cache will expire)
Each selected neighbor forwards this new interest to a
subset of its neighbors; selecting a smaller set of paths
Negative reinforcement also necessary to de-select
weaker paths if a better path found.
41. 42
Problem Definition
Objective: Transmit sensed data from each sensor node to a base station
One round = BS collecting data from all nodes
Goal is to maximize the number of rounds of communication before nodes die
and network is inoperable
Minimize energy AND reduce delay
Conflicting requirements
Sensor Nodes
Base station
42. 43
Energy*Delay metric
Why energy * delay metric?
Find optimal balance to gather data quickly but in an
energy efficient manner
Energy = Energy consumed per round
Delay = Delay per round (I.e. for all nodes to send
packet to BS)
Why is this metric important?
Time critical applications
43. 44
Direct Transmission
Direct Transmission
All nodes transmit to the base station (BS)
Very expensive since BS may be located very far away and
nodes need more energy to transmit over longer distances
• Farther the distance, greater the propagation losses, and hence higher the
transmission power
All nodes must take turns transmitting to the BS so delay is high
(N units for a N-node network)
Better scheme is to have fewer nodes transmit this far distance
to lower energy costs and more simultaneous transmissions to
lower delay
44. 45
LEACH
Low Energy Adaptive Clustering Hierarchy
Two-level hierarchy
Base
Station
Larger Nodes denote Cluster Heads
45. 46
Scheme #1: PEGASIS
Goals of PEGASIS (Power-Efficient GAthering
for Sensor Information Systems)
Minimize distance nodes must transmit
Minimize number of leaders that transmit to BS
Minimize broadcasting overhead
Minimize number or messages leader needs to receive
Distribute work more equally among all nodes
46. 47
PEGASIS
Greedy Chain Algorithm
Start with node furthest away from BS
Add to chain closest neighbor to this node that has not
been visited
Repeat until all nodes have been added to chain
Constructed before 1st round of communication and
then reconstructed when nodes di
Data fusion at each node (except end nodes)
Only one message is passed at every node
Delay calculation: N units for an N-node network
Sequential transmission is assumed
48. 50
Scheme #2: Binary Scheme
Chain-based as described in PEGASIS
At each level node only transmits to another node
All nodes receiving at any level rise to the next
level
Delay: O(log2 N)
Step 4: c3 BS
Step 3: c3 c7
Step 2: c1 c3 c5 c7
Step 1: c0c1 c2c3 c4c5 c6c7
49. 51
Scheme # 3:Chain-based 3 level
For non-CDMA sensor nodes, binary scheme is not
logical
Construct chain as described in PEGASIS
Divide chain into 10 groups (for the 100-node)
To space out simultaneous transmissions to minimize
interference
In each group, nodes will transmit one at a time
Finally, one node out of each group at each level will
contain all the data and will rise to the next level until
finally the leader will transmit to the BS
Total delay = 15 units (9+4+1+1) for 100-nodes
50. 52
Chain-based 3 level scheme
Third Level
Two nodes rise to top and non-leader transmits to leader
Leader transmits to BS
c18 BS
c18c68
c8 c18c28c38c48 c58 c68 c78 c88c98
c1c2…c7c8c9 c10c11…c18c19 …c90 c91…c98 c99
52. 54
Location Information
It is essential, in some applications, for
each node to know its location
Sensed data coupled with loc. data and sent
We need a cheap, low-power, low-weight,
low form-factor, and reasonably accurate
mechanism
Global Positioning Sys (GPS) is not always
feasible
GPS cannot work indoors, in dense foliage, etc.
GPS power consumption is very high
Size of GPS receiver and antenna will increase
node form factor
53. 55
Indoor Localization
Use a fixed infrastructure
Beacon nodes are strategically placed
Nodes receive beacon signals and measure:
Signal Strength
Signal Pattern
Time of arrival; Time difference of arrival
Angle of arrival
Nodes use measurements from multiple beacons
and use different multi-lateration techniques to
estimate locations
Accuracy of estimate depends on correlation
between measured entity and distance
54. 56
Indoor Localization
Examples of Indoor Loc. Systems
RADAR (MSR), Cricket (MIT), BAT (AT&T), etc.
Some approaches require a priori signal
measurement and characterization and
database creation
Node obtains distance estimate by using
database
Not always practical to have database loaded in
the individual node; only some nodes (e.g.
gateway) might carry it.
55. 57
Sensor Net. Localization
No fixed infrastructure available
Prior measurements are not always possible
Basic idea:
Have a few sensor nodes who have known location
information
These nodes sent periodic beacon signals
Other nodes use beacon measurements and
triangulation, multi-lateration, etc. to estimate
distance
Following mechanisms presented in Savvides
et. al. in ACM MobiCom 2001
56. 58
Sensor Net. Localization, contd.
Receiver Signal Strength Indicator (RSSI) was
used to determine correlation to distance
Suitable for RF signals only
Very sensitive to obstacles, multi-path fading,
environment factors (rain, etc.)
Was not found to have good experimental
correlation
RF signal had good range, few 10metres
RF and Ultrasound signals
The beacon node transmits an RF and an
ultrasound signal to receiver
The time difference of arrival between 2
signals is used to measure distance
Range of up to 3 m, with 2cm accuracy
57. 59
Localization algorithms
Based on the time diff. of arrival
Atomic Multi-lateration:
If a node receives 3 becaons, it can determine its
location (similar to GPS)
Iterative ML:
Some nodes not in direct range of beacons
Once an unknown node estimates its location, will
send out a beacon
Multi-hop approach; Errors propagated
Collaborative ML:
When 2+ nodes cannot receive 3 beacons (but can
receive say 2), they collaborate