0% found this document useful (0 votes)
54 views60 pages

Wireless Networks: Dr. Humaira Ashraf

Wireless sensor networks consist of distributed sensor nodes that collect data about physical conditions and transmit that data to processing centers. They can be used to monitor environments and areas, track objects, or monitor interactions between objects and spaces. Applications include habitat monitoring, precision agriculture, structural health monitoring, and more. Sensor nodes face challenges due to limited power, computational resources, and need for distributed operation without centralized control.

Uploaded by

faqiha mahnoor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views60 pages

Wireless Networks: Dr. Humaira Ashraf

Wireless sensor networks consist of distributed sensor nodes that collect data about physical conditions and transmit that data to processing centers. They can be used to monitor environments and areas, track objects, or monitor interactions between objects and spaces. Applications include habitat monitoring, precision agriculture, structural health monitoring, and more. Sensor nodes face challenges due to limited power, computational resources, and need for distributed operation without centralized control.

Uploaded by

faqiha mahnoor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 60

Wireless Networks

Dr. Humaira Ashraf


IEEE 802.11
• IEEE Standard for Wireless LANs
• Covers both physical and data link layers

Wi-Fi Access points Wi-Fi Router

2
WLAN Architectures
• Basic Service Set (BSS)
• Extended Service Set (ESS)

3
Basic Service Set (BSS)

(Ad hoc mode) (Infrastructure mode)

4
Extended Service Set (ESS)

5
CSMA/CD not enough
• the station must send and receive the
collusion information at the same time means
need of bandwidth increase

• Collusion signals fade due to distance and


could not be listen by end stations

Data Communication and Computer


6
Networks 1303330
CSMA/CD Does Not Work
• Collision detection
problems
– Relevant contention Hidden Exposed
at the receiver, not
A
sender A
• Hidden terminal
B
• Exposed terminal B
C
– Hard to build a radio
that can transmit and
C
receive at same time D

7
Hidden Terminal Effect
• Hidden terminals: A, C cannot hear each other
– Obstacles, signal attenuation
– Collisions at B
– Collision if 2 or more nodes transmit at
same time

• CSMA makes sense:


– Get all the bandwidth if you’re the only one
transmitting
– Shouldn’t cause a collision if you sense another
transmission

• Collision detection doesn’t work

• CSMA/CA: CSMA with Collision Avoidance

8
IEEE 802.11 MAC Protocol:
CSMA/CA
802.11 CSMA: sender
• If sense channel idle for DIFS
(Distributed Inter Frame Space)
then transmit entire frame (no
collision detection)
• If sense channel busy
then binary backoff

802.11 CSMA: receiver


• If received OK
return ACK after SIFS --Short IFS
(ACK is needed due to hidden
terminal problem)

9
Collision Avoidance Mechanisms
• Problem:
– Two nodes, hidden from each other, transmit
complete frames to base station
– Wasted bandwidth for long duration!

• Solution:
– Small reservation packets: RTS+CTS
– Nodes track reservation interval with internal
“network allocation vector” (NAV)

10
Collision Avoidance: RTS-CTS Exchange
• Explicit channel reservation
– Sender: send short RTS: request to
send
– Receiver: reply with short CTS:
clear to send
– CTS reserves channel for sender,
notifying (possibly hidden) stations

• RTS and CTS short:


– collisions less likely, of shorter
duration
– end result similar to collision
detection

• Avoid hidden station collisions

• Not widely used/implemented


– Consider typical traffic patterns

11
IEEE 802.11 MAC Protocol
802.11 CSMA Protocol: others
• NAV: Network Allocation
Vector; maintained by each
node
• 802.11 RTS frame has
transmission time field
• Others (hearing CTS) defer
access for NAV time units
• Reserve bandwidth for
NAV time units

12
Wireless PANs: Bluetooth
Bluetooth Standard
• Wireless Personal Area Network technology
• Designed for connecting devices with different
functionalities:
– Telephone, mouse, keyboard, camera, etc.
• Standard  IEEE 802.15.1
• Uses 2.4 GHz band

14
Bluetooth Piconet

15
Bluetooth Scatternet

16
Bluetooth Architecture
• Piconet
– Each piconet has one master and up to 7 simultaneous
slaves
• Master : device that initiates a data exchange.
• Slave : device that responds to the master
• Scatternet
– Linking of multiple piconets through the master or slave
devices
– Bluetooth devices have point-to-multipoint capability to
engage in Scatternet communication.
Piconet
• All devices in a piconet hop together
– Master gives slaves its clock and device ID
• Non-piconet devices are in standby

P
S

S M SB

M=Master P=Parked
SB S=Slave SB=Standby
S
P
Scatternet
• Devices can be slave in one piconet and master of
another

S S
P
P
SB
S M
M
S
SB
P SB
S
Bluetooth Security
• There are three modes of security for Bluetooth
access between two devices.
– non-secure
– service level enforced security
– link level enforced security
• Device security level
– Trusted
– untrusted
• Service security level
– Authorization and Authentication
– Authentication only
– Open to all devices
Bluetooth Security
• The following are the three basic security services
specified in the Bluetooth standard:
– Authentication
• verifying the identity of communicating devices. User
authentication is not provided natively by Bluetooth.
– Confidentiality
• preventing information compromise caused by
eavesdropping by ensuring that only authorized devices can
access and view data.
– Authorization
• allowing the control of resources by ensuring that a device is
authorized to use a service before permitting it to do so.
Introduction to
Wireless Sensor Networks

Introduction to Wireless Sensor Networks 22


Agenda
• Introduction
• Differences with ad hoc networks
• Applications
• Characteristics
• Challenges
• Future
• Motes
• Hardware Setup Overview

Introduction to Wireless Sensor Networks 23


Introduction
• Wireless Sensor Networks are networks that consists
of sensors which are distributed in an ad hoc
manner.
• These sensors work with each other to sense some
physical phenomenon and then the information
gathered is processed to get relevant results.
• Wireless sensor networks consists of protocols and
algorithms with self-organizing capabilities.

Introduction to Wireless Sensor Networks 24


Overview
• A Wireless Sensor Network (WSN) consists of
base stations and a number of wireless
sensors (nodes).
Example of WSN

Introduction to Wireless Sensor Networks 27


Ref:http://esd.sci.univr.it/images/wsn-example.png
Comparison with ad hoc
networks
– Wireless sensor networks mainly use broadcast
communication while ad hoc networks use point-to-
point communication.
– Unlike ad hoc networks wireless sensor networks are
limited by sensors limited power, energy and
computational capability.
– Sensor nodes may not have global ID because of the
large amount of overhead and large number of
sensors.

Introduction to Wireless Sensor Networks 28


Applications of Wireless Sensor networks

The applications can be divided in three


categories:
1. Monitoring of objects.
2. Monitoring of an area.
3. Monitoring of both area and objects.

* Classification due to Culler, Estrin,


Srivastava
Introduction to Wireless Sensor Networks 29
Monitoring Area

• Environmental and Habitat Monitoring


• Precision Agriculture
• Indoor Climate Control
• Military Surveillance
• Treaty Verification
• Intelligent Alarms

Introduction to Wireless Sensor Networks 30


Example: Precision
Agriculture
• Precision agriculture aims
at making cultural
operations more efficient,
while reducing
environmental impact.
• The information collected
from sensors is used to
evaluate optimum sowing
density, estimate fertilizers
and other inputs needs, and
to more accurately predict
crop yields.
Introduction to Wireless Sensor Networks 31
Monitoring Objects

• Structural Monitoring
• Eco-physiology
• Condition-based Maintenance
• Medical Diagnostics
• Urban terrain mapping

Introduction to Wireless Sensor Networks 32


Example: Condition-based
Maintenance

• Intel fabrication plants


– Sensors collect vibration data, monitor wear and
tear; report data in real-time
– Reduces need for a team of engineers; cutting
costs by several orders of magnitude

Introduction to Wireless Sensor Networks 33


Monitoring Interactions between Objects
and Space

• Wildlife Habitats
• Disaster Management
• Emergency Response
• Ubiquitous Computing
• Asset Tracking
• Health Care
• Manufacturing Process Flows

Introduction to Wireless Sensor Networks 34


Example: Habitat Monitoring

• The ZebraNet Project


Collar-mounted sensors monitor zebra movement
in Kenya

Source: Margaret Martonosi, Princeton University

Introduction to Wireless Sensor Networks 35


Characteristics of Wireless Sensor
Networks
• Wireless Sensor Networks mainly consists of sensors.
Sensors are -
– low power
– limited memory
– energy constrained due to their small size.
• Wireless networks can also be deployed in extreme
environmental conditions and may be prone to enemy
attacks.
• Although deployed in an ad hoc manner they need to be
self organized and self healing and can face constant
reconfiguration.

Introduction to Wireless Sensor Networks 36


Design Challenges

• Heterogeneity
– The devices deployed maybe of various types and need
to collaborate with each other.
• Distributed Processing
– The algorithms need to be centralized as the processing
is carried out on different nodes.
• Low Bandwidth Communication
– The data should be transferred efficiently between
sensors

Introduction to Wireless Sensor Networks 37


Continued..

• Large Scale Coordination


– The sensors need to coordinate with each other to
produce required results.
• Utilization of Sensors
– The sensors should be utilized in a ways that produce the
maximum performance and use less energy.
• Real Time Computation
– The computation should be done quickly as new data is
always being generated.

Introduction to Wireless Sensor Networks 38


Operational Challenges of Wireless Sensor
Networks

• Energy Efficiency
• Limited storage and computation
• Low bandwidth and high error rates
• Errors are common
– Wireless communication
– Noisy measurements
– Node failure are expected
• Scalability to a large number of sensor nodes
• Survivability in harsh environments
• Experiments are time- and space-intensive

Introduction to Wireless Sensor Networks 39


Future of WSN
Smart Home / Smart Office

• Sensors controlling
appliances and electrical
devices in the house.
• Better lighting and
heating in office
buildings.
• The Pentagon building
has used sensors
extensively.

Introduction to Wireless Sensor Networks 40


Biomedical / Medical
• Health Monitors
– Glucose
– Heart rate
– Cancer detection
• Chronic Diseases
– Artificial retina
– Cochlear implants
• Hospital Sensors
– Monitor vital signs
– Record anomalies

Introduction to Wireless Sensor Networks 41


Military

Remote deployment of
sensors for tactical monitoring
of enemy troop movements.

Introduction to Wireless Sensor Networks 42


Industrial & Commercial

• Numerous industrial and commercial applications:


– Agricultural Crop Conditions
– Inventory Tracking
– In-Process Parts Tracking
– Automated Problem Reporting
– RFID – Theft Deterrent and Customer Tracing
– Plant Equipment Maintenance Monitoring

Introduction to Wireless Sensor Networks 43


Traffic Management & Monitoring

 Future cars could use


wireless sensors to:
 Handle Accidents
 Handle Thefts

Sensors embedded
in the roads to:
–Monitor traffic flows
–Provide real-time
route updatesIntroduction to Wireless Sensor Networks
44
What are motes?

Motes mainly consist of three parts:-


• Mote basically consists of a low cost and power
computer.
• The computer monitors one or more sensors.
Sensors may be for temperature, light, sound,
position, acceleration, vibration, stress, weight,
pressure, humidity, etc.
• The computer connects to the outside world with a
radio link.

Introduction to Wireless Sensor Networks 45


Layout of a mote
Routing
LEACH
Low-Energy Adaptive Clustering Hierarchy
LEACH
• LEACH (Low-Energy Adaptive Clustering
Hierarchy), a clustering-based protocol that
minimizes energy dissipation in sensor networks.
• LEACH outperforms classical clustering algorithms
by using adaptive clusters and rotating cluster-
heads, allowing the energy requirements of the
system to be distributed among all the sensors.
• LEACH is able to perform local computation in
each cluster to reduce the amount of data that
must be transmitted to the base station.
• LEACH uses a CDMA/TDMA MAC to reduce inter-
cluster and intra-cluster collisions.
LEACH (cont.)
• Sensors elect themselves to be local cluster-heads at
any given time with a certain probability.
• Each sensor node joins a cluster-head that requires
the minimum communication energy.
• Once all the nodes are organized into clusters, each
cluster-head creates a transmission schedule for the
nodes in its cluster.
• In order to balance the energy consumption, the
cluster-head nodes are not fixed; rather, this position
is self-elected at different time intervals.
LEACH
100 m
叢叢叢

叢叢叢叢

~100m

Sensor (Non Cluster Head)


Sensor (Cluster Head)
Initial Data
Aggregated Data

Base Station
LEACH: Adaptive Clustering
• Periodic independent self-election
– Probabilistic
• CSMA MAC used to advertise
• Nodes select advertisement with strongest signal strength
• Dynamic TDMA cycles

All nodes marked with a given symbol belong to the same cluster, and
the cluster head nodes are marked with a ●.
Security Threats

• Denial of Service.
• Spoofed, altered, or replayed routing info.
• Selective forwarding.
• Sinkhole attacks.
• Sybil attacks.
• Wormhole attacks.
• Hello flood attacks.
• Acknowledgement spoofing.
• Black Hole

53
wormhole attack
• Wormhole attacks are basically of two types,
internal and external.
• In internal wormhole attack, the attacker is a
part of system and a virtual wormhole tunnel
is created by a series of malicious nodes which
are hacked by the attacker.
• This type of attack is launched using two
methods, packet encapsulation and packet
relay.
Wormhole Attack

55
Wormhole Attack (cont.)

• In encapsulation method, the packet is


encapsulated when arrives at the first
malicious node and is sent through legitimate
network path but hops of the wormhole
tunnel are not counted and upon arriving the
last node of wormhole tunnel, the packet is
de-encapsulated increasing hop count to only
one.

56
packet relay method
• In packet relay method, the attacker transmits
packet between two far away nodes disguising
them as each other’s neighbors.
External wormhole attack
• In external wormhole attack, the attacker is
not part of the system, instead a high speed
out of band channel is established between
two distant nodes creating the illusion of
neighborhood at both ends of wormhole
tunnel.
External wormhole attack

You might also like