Wireless Networks
Dr. Humaira Ashraf
IEEE 802.11
• IEEE Standard for Wireless LANs
• Covers both physical and data link layers
Wi-Fi Access points Wi-Fi Router
2
WLAN Architectures
• Basic Service Set (BSS)
• Extended Service Set (ESS)
3
Basic Service Set (BSS)
(Ad hoc mode) (Infrastructure mode)
4
Extended Service Set (ESS)
5
CSMA/CD not enough
• the station must send and receive the
collusion information at the same time means
need of bandwidth increase
• Collusion signals fade due to distance and
could not be listen by end stations
Data Communication and Computer
6
Networks 1303330
CSMA/CD Does Not Work
• Collision detection
problems
– Relevant contention Hidden Exposed
at the receiver, not
A
sender A
• Hidden terminal
B
• Exposed terminal B
C
– Hard to build a radio
that can transmit and
C
receive at same time D
7
Hidden Terminal Effect
• Hidden terminals: A, C cannot hear each other
– Obstacles, signal attenuation
– Collisions at B
– Collision if 2 or more nodes transmit at
same time
• CSMA makes sense:
– Get all the bandwidth if you’re the only one
transmitting
– Shouldn’t cause a collision if you sense another
transmission
• Collision detection doesn’t work
• CSMA/CA: CSMA with Collision Avoidance
8
IEEE 802.11 MAC Protocol:
CSMA/CA
802.11 CSMA: sender
• If sense channel idle for DIFS
(Distributed Inter Frame Space)
then transmit entire frame (no
collision detection)
• If sense channel busy
then binary backoff
802.11 CSMA: receiver
• If received OK
return ACK after SIFS --Short IFS
(ACK is needed due to hidden
terminal problem)
9
Collision Avoidance Mechanisms
• Problem:
– Two nodes, hidden from each other, transmit
complete frames to base station
– Wasted bandwidth for long duration!
• Solution:
– Small reservation packets: RTS+CTS
– Nodes track reservation interval with internal
“network allocation vector” (NAV)
10
Collision Avoidance: RTS-CTS Exchange
• Explicit channel reservation
– Sender: send short RTS: request to
send
– Receiver: reply with short CTS:
clear to send
– CTS reserves channel for sender,
notifying (possibly hidden) stations
• RTS and CTS short:
– collisions less likely, of shorter
duration
– end result similar to collision
detection
• Avoid hidden station collisions
• Not widely used/implemented
– Consider typical traffic patterns
11
IEEE 802.11 MAC Protocol
802.11 CSMA Protocol: others
• NAV: Network Allocation
Vector; maintained by each
node
• 802.11 RTS frame has
transmission time field
• Others (hearing CTS) defer
access for NAV time units
• Reserve bandwidth for
NAV time units
12
Wireless PANs: Bluetooth
Bluetooth Standard
• Wireless Personal Area Network technology
• Designed for connecting devices with different
functionalities:
– Telephone, mouse, keyboard, camera, etc.
• Standard IEEE 802.15.1
• Uses 2.4 GHz band
14
Bluetooth Piconet
15
Bluetooth Scatternet
16
Bluetooth Architecture
• Piconet
– Each piconet has one master and up to 7 simultaneous
slaves
• Master : device that initiates a data exchange.
• Slave : device that responds to the master
• Scatternet
– Linking of multiple piconets through the master or slave
devices
– Bluetooth devices have point-to-multipoint capability to
engage in Scatternet communication.
Piconet
• All devices in a piconet hop together
– Master gives slaves its clock and device ID
• Non-piconet devices are in standby
P
S
S M SB
M=Master P=Parked
SB S=Slave SB=Standby
S
P
Scatternet
• Devices can be slave in one piconet and master of
another
S S
P
P
SB
S M
M
S
SB
P SB
S
Bluetooth Security
• There are three modes of security for Bluetooth
access between two devices.
– non-secure
– service level enforced security
– link level enforced security
• Device security level
– Trusted
– untrusted
• Service security level
– Authorization and Authentication
– Authentication only
– Open to all devices
Bluetooth Security
• The following are the three basic security services
specified in the Bluetooth standard:
– Authentication
• verifying the identity of communicating devices. User
authentication is not provided natively by Bluetooth.
– Confidentiality
• preventing information compromise caused by
eavesdropping by ensuring that only authorized devices can
access and view data.
– Authorization
• allowing the control of resources by ensuring that a device is
authorized to use a service before permitting it to do so.
Introduction to
Wireless Sensor Networks
Introduction to Wireless Sensor Networks 22
Agenda
• Introduction
• Differences with ad hoc networks
• Applications
• Characteristics
• Challenges
• Future
• Motes
• Hardware Setup Overview
Introduction to Wireless Sensor Networks 23
Introduction
• Wireless Sensor Networks are networks that consists
of sensors which are distributed in an ad hoc
manner.
• These sensors work with each other to sense some
physical phenomenon and then the information
gathered is processed to get relevant results.
• Wireless sensor networks consists of protocols and
algorithms with self-organizing capabilities.
Introduction to Wireless Sensor Networks 24
Overview
• A Wireless Sensor Network (WSN) consists of
base stations and a number of wireless
sensors (nodes).
Example of WSN
Introduction to Wireless Sensor Networks 27
Ref:http://esd.sci.univr.it/images/wsn-example.png
Comparison with ad hoc
networks
– Wireless sensor networks mainly use broadcast
communication while ad hoc networks use point-to-
point communication.
– Unlike ad hoc networks wireless sensor networks are
limited by sensors limited power, energy and
computational capability.
– Sensor nodes may not have global ID because of the
large amount of overhead and large number of
sensors.
Introduction to Wireless Sensor Networks 28
Applications of Wireless Sensor networks
The applications can be divided in three
categories:
1. Monitoring of objects.
2. Monitoring of an area.
3. Monitoring of both area and objects.
* Classification due to Culler, Estrin,
Srivastava
Introduction to Wireless Sensor Networks 29
Monitoring Area
• Environmental and Habitat Monitoring
• Precision Agriculture
• Indoor Climate Control
• Military Surveillance
• Treaty Verification
• Intelligent Alarms
Introduction to Wireless Sensor Networks 30
Example: Precision
Agriculture
• Precision agriculture aims
at making cultural
operations more efficient,
while reducing
environmental impact.
• The information collected
from sensors is used to
evaluate optimum sowing
density, estimate fertilizers
and other inputs needs, and
to more accurately predict
crop yields.
Introduction to Wireless Sensor Networks 31
Monitoring Objects
• Structural Monitoring
• Eco-physiology
• Condition-based Maintenance
• Medical Diagnostics
• Urban terrain mapping
Introduction to Wireless Sensor Networks 32
Example: Condition-based
Maintenance
• Intel fabrication plants
– Sensors collect vibration data, monitor wear and
tear; report data in real-time
– Reduces need for a team of engineers; cutting
costs by several orders of magnitude
Introduction to Wireless Sensor Networks 33
Monitoring Interactions between Objects
and Space
• Wildlife Habitats
• Disaster Management
• Emergency Response
• Ubiquitous Computing
• Asset Tracking
• Health Care
• Manufacturing Process Flows
Introduction to Wireless Sensor Networks 34
Example: Habitat Monitoring
• The ZebraNet Project
Collar-mounted sensors monitor zebra movement
in Kenya
Source: Margaret Martonosi, Princeton University
Introduction to Wireless Sensor Networks 35
Characteristics of Wireless Sensor
Networks
• Wireless Sensor Networks mainly consists of sensors.
Sensors are -
– low power
– limited memory
– energy constrained due to their small size.
• Wireless networks can also be deployed in extreme
environmental conditions and may be prone to enemy
attacks.
• Although deployed in an ad hoc manner they need to be
self organized and self healing and can face constant
reconfiguration.
Introduction to Wireless Sensor Networks 36
Design Challenges
• Heterogeneity
– The devices deployed maybe of various types and need
to collaborate with each other.
• Distributed Processing
– The algorithms need to be centralized as the processing
is carried out on different nodes.
• Low Bandwidth Communication
– The data should be transferred efficiently between
sensors
Introduction to Wireless Sensor Networks 37
Continued..
• Large Scale Coordination
– The sensors need to coordinate with each other to
produce required results.
• Utilization of Sensors
– The sensors should be utilized in a ways that produce the
maximum performance and use less energy.
• Real Time Computation
– The computation should be done quickly as new data is
always being generated.
Introduction to Wireless Sensor Networks 38
Operational Challenges of Wireless Sensor
Networks
• Energy Efficiency
• Limited storage and computation
• Low bandwidth and high error rates
• Errors are common
– Wireless communication
– Noisy measurements
– Node failure are expected
• Scalability to a large number of sensor nodes
• Survivability in harsh environments
• Experiments are time- and space-intensive
Introduction to Wireless Sensor Networks 39
Future of WSN
Smart Home / Smart Office
• Sensors controlling
appliances and electrical
devices in the house.
• Better lighting and
heating in office
buildings.
• The Pentagon building
has used sensors
extensively.
Introduction to Wireless Sensor Networks 40
Biomedical / Medical
• Health Monitors
– Glucose
– Heart rate
– Cancer detection
• Chronic Diseases
– Artificial retina
– Cochlear implants
• Hospital Sensors
– Monitor vital signs
– Record anomalies
Introduction to Wireless Sensor Networks 41
Military
Remote deployment of
sensors for tactical monitoring
of enemy troop movements.
Introduction to Wireless Sensor Networks 42
Industrial & Commercial
• Numerous industrial and commercial applications:
– Agricultural Crop Conditions
– Inventory Tracking
– In-Process Parts Tracking
– Automated Problem Reporting
– RFID – Theft Deterrent and Customer Tracing
– Plant Equipment Maintenance Monitoring
Introduction to Wireless Sensor Networks 43
Traffic Management & Monitoring
Future cars could use
wireless sensors to:
Handle Accidents
Handle Thefts
Sensors embedded
in the roads to:
–Monitor traffic flows
–Provide real-time
route updatesIntroduction to Wireless Sensor Networks
44
What are motes?
Motes mainly consist of three parts:-
• Mote basically consists of a low cost and power
computer.
• The computer monitors one or more sensors.
Sensors may be for temperature, light, sound,
position, acceleration, vibration, stress, weight,
pressure, humidity, etc.
• The computer connects to the outside world with a
radio link.
Introduction to Wireless Sensor Networks 45
Layout of a mote
Routing
LEACH
Low-Energy Adaptive Clustering Hierarchy
LEACH
• LEACH (Low-Energy Adaptive Clustering
Hierarchy), a clustering-based protocol that
minimizes energy dissipation in sensor networks.
• LEACH outperforms classical clustering algorithms
by using adaptive clusters and rotating cluster-
heads, allowing the energy requirements of the
system to be distributed among all the sensors.
• LEACH is able to perform local computation in
each cluster to reduce the amount of data that
must be transmitted to the base station.
• LEACH uses a CDMA/TDMA MAC to reduce inter-
cluster and intra-cluster collisions.
LEACH (cont.)
• Sensors elect themselves to be local cluster-heads at
any given time with a certain probability.
• Each sensor node joins a cluster-head that requires
the minimum communication energy.
• Once all the nodes are organized into clusters, each
cluster-head creates a transmission schedule for the
nodes in its cluster.
• In order to balance the energy consumption, the
cluster-head nodes are not fixed; rather, this position
is self-elected at different time intervals.
LEACH
100 m
叢叢叢
叢叢叢叢
~100m
Sensor (Non Cluster Head)
Sensor (Cluster Head)
Initial Data
Aggregated Data
Base Station
LEACH: Adaptive Clustering
• Periodic independent self-election
– Probabilistic
• CSMA MAC used to advertise
• Nodes select advertisement with strongest signal strength
• Dynamic TDMA cycles
All nodes marked with a given symbol belong to the same cluster, and
the cluster head nodes are marked with a ●.
Security Threats
• Denial of Service.
• Spoofed, altered, or replayed routing info.
• Selective forwarding.
• Sinkhole attacks.
• Sybil attacks.
• Wormhole attacks.
• Hello flood attacks.
• Acknowledgement spoofing.
• Black Hole
53
wormhole attack
• Wormhole attacks are basically of two types,
internal and external.
• In internal wormhole attack, the attacker is a
part of system and a virtual wormhole tunnel
is created by a series of malicious nodes which
are hacked by the attacker.
• This type of attack is launched using two
methods, packet encapsulation and packet
relay.
Wormhole Attack
55
Wormhole Attack (cont.)
• In encapsulation method, the packet is
encapsulated when arrives at the first
malicious node and is sent through legitimate
network path but hops of the wormhole
tunnel are not counted and upon arriving the
last node of wormhole tunnel, the packet is
de-encapsulated increasing hop count to only
one.
56
packet relay method
• In packet relay method, the attacker transmits
packet between two far away nodes disguising
them as each other’s neighbors.
External wormhole attack
• In external wormhole attack, the attacker is
not part of the system, instead a high speed
out of band channel is established between
two distant nodes creating the illusion of
neighborhood at both ends of wormhole
tunnel.
External wormhole attack