SlideShare a Scribd company logo
1 of 21
Wireless Sensor Network & Security
TEJAS WASULE
(IT 2nd
Year)
SURAJ JAIWAL
(IT 2nd
Year )
Presented by-
What is Wireless Sensor
Networks?
WSN combines sensing, computation,
and communication into single tiny
device called sensor node.
Group of sensors linked by wireless
media to perform distributed sensing
task
What is Sensor Node?
Sensor is a device, which senses
information and passes it to the mote.
Figure : Wireless sensor network device
Progression of Sensor
Technology
Figure : Progression of sensor technology
(motes) over time
Architecture of a Sensor
Node
 A Power unit (Battery)
 Computational logic & Storage
 Sensor Transducer
 Communication
 Components of Sensor Node
1. HARDWARE
Architecture of a Sensor
Node
Figure : The architecture of a sensor node.
Contd..
2. SOFTWARE
Operating System Microcode
Sensor Drivers
Communication Processors
Communication Drivers
Data Processing Mini-Apps
Specific Sensor Node
Sensor Node:
Processor: 4Mhz
Memory: 128KB Flash & 4KB RAM
Radio: 916Mhz and 40Kbits/second.
Transmission Range: 100 Feet
TinyOS:
Operating System(small)
Open Source
Energy Efficient
Available Wireless Technologies
Available Wireless Technologies
Standard Data Rate Range Power
Consumption
ZigBee
(802.15.4)
20 kbps to
250 kbps
Up to 10 m Ultralow
Bluetooth
(802.15.1)
Up to 3 mbps 1m to 100 m low
Wi-Fi
(802.11)
54 mbps 45 m to 90
m
Medium
Contd…
Need of Security
 WSNs are becoming a cost effective,
practical way to go about deploying
sensor networks.
 Protecting confidentiality, integrity
and availability of communications.
 Large range of applications from
civilian to military purposes.
Need of Security
• Obstacles:
 Very-Limited Resources
 Unreliable Communication
 Unattended Operations
• Attacks:
 Sybil Attack
 Traffic Analysis Attacks
Need of Security
• Attacks:
1) Sybil Attack:
Introduced by “Brain Zill” in 2002
Subverted by Foreign identities in
peer-to peer Network
2) Traffic Analysis
Intercepting & Examine messages to
deduce info. from patterns in
Communications.
Able to detect Encrypted messages but
Not able to Decrypt it.
Security for Sensor Network
 SMACS :
Self organizing medium access
control for sensor networks.
 Encryption:
Encoding info. in such a way that
hackers can’t read it, but authorized
one can.
 Cryptography & Steganography:
Techniques for Secure
Communication in presence of Third
parties.
Application of WSN
 Home and Office Applications
 Environmental Applications
 Medical & Health Applications
 Military Applications
Advantages
 Implementation cost is cheaper
than wired network
Ideal for non-reachable places
 It avoids hell lot of wiring
It can accommodate new devices
at any time
Disadvantages
 Less secure because hacker's laptop
can act as Access Point.
 Lower speed as compare to wired
networks.
 Affected by surrounding. E.g.: walls
(blocking), microwave oven , far distance
Conclusion
 The low cost, flexibility, fault tolerance,
high sensing fidelity and rapid deployment
makes way for new applications on remote
sensing.
 Realization needs to satisfy the constraints
such as scalability, topology changes,
power consumption, environment etc.
 New wireless ad hoc networking
techniques are required to overcome this
constraints.
References
 Wireless Sensor Network (KAZEM
SOHRABY, DANIEL MINOLI,
TAIEB ZNATI)
 System Architecture for Wireless
Sensor Networks (Jason Lester Hill)
 http://today.cs.berkeley.edu/800dem
o/.s
 http://www.powerstream.com
 http://www.wikipedia.com
THANK
YOU..!
.....?

More Related Content

What's hot

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2gamalsallam1989
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksjuno susi
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless networkTeced Ce
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applicationsDeepshika Reddy
 
IOT Based Environmental Pollution Monitoring System
IOT Based Environmental Pollution Monitoring SystemIOT Based Environmental Pollution Monitoring System
IOT Based Environmental Pollution Monitoring SystemIRJET Journal
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project ReportRaghav Bisht
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
IRJET- Smart Dustbin
IRJET-  	  Smart DustbinIRJET-  	  Smart Dustbin
IRJET- Smart DustbinIRJET Journal
 

What's hot (20)

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
IOT Based Environmental Pollution Monitoring System
IOT Based Environmental Pollution Monitoring SystemIOT Based Environmental Pollution Monitoring System
IOT Based Environmental Pollution Monitoring System
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
6lowpan
6lowpan6lowpan
6lowpan
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Self defending networks
Self defending networksSelf defending networks
Self defending networks
 
IRJET- Smart Dustbin
IRJET-  	  Smart DustbinIRJET-  	  Smart Dustbin
IRJET- Smart Dustbin
 

Similar to WSN Security in 40 Characters

gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks securityelango30
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksScott Faria
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksImran Khan
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Easy n Inspire L
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksIOSR Journals
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyClayton Hatathlie
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
 
Presentation seminar shubham
Presentation seminar shubhamPresentation seminar shubham
Presentation seminar shubhamShubhamPal80
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkijwmn
 

Similar to WSN Security in 40 Characters (20)

Wsn
WsnWsn
Wsn
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 
Security and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor NetworksSecurity and privacy in Wireless Sensor Networks
Security and privacy in Wireless Sensor Networks
 
Paper1
Paper1Paper1
Paper1
 
574 501-507
574 501-507574 501-507
574 501-507
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor Networks
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
Presentation seminar shubham
Presentation seminar shubhamPresentation seminar shubham
Presentation seminar shubham
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Ii2414621475
Ii2414621475Ii2414621475
Ii2414621475
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

WSN Security in 40 Characters

  • 1. Wireless Sensor Network & Security TEJAS WASULE (IT 2nd Year) SURAJ JAIWAL (IT 2nd Year ) Presented by-
  • 2. What is Wireless Sensor Networks? WSN combines sensing, computation, and communication into single tiny device called sensor node. Group of sensors linked by wireless media to perform distributed sensing task
  • 3. What is Sensor Node? Sensor is a device, which senses information and passes it to the mote. Figure : Wireless sensor network device
  • 4. Progression of Sensor Technology Figure : Progression of sensor technology (motes) over time
  • 5. Architecture of a Sensor Node  A Power unit (Battery)  Computational logic & Storage  Sensor Transducer  Communication  Components of Sensor Node 1. HARDWARE
  • 6. Architecture of a Sensor Node Figure : The architecture of a sensor node. Contd..
  • 7. 2. SOFTWARE Operating System Microcode Sensor Drivers Communication Processors Communication Drivers Data Processing Mini-Apps
  • 8. Specific Sensor Node Sensor Node: Processor: 4Mhz Memory: 128KB Flash & 4KB RAM Radio: 916Mhz and 40Kbits/second. Transmission Range: 100 Feet TinyOS: Operating System(small) Open Source Energy Efficient
  • 10. Available Wireless Technologies Standard Data Rate Range Power Consumption ZigBee (802.15.4) 20 kbps to 250 kbps Up to 10 m Ultralow Bluetooth (802.15.1) Up to 3 mbps 1m to 100 m low Wi-Fi (802.11) 54 mbps 45 m to 90 m Medium Contd…
  • 11. Need of Security  WSNs are becoming a cost effective, practical way to go about deploying sensor networks.  Protecting confidentiality, integrity and availability of communications.  Large range of applications from civilian to military purposes.
  • 12. Need of Security • Obstacles:  Very-Limited Resources  Unreliable Communication  Unattended Operations • Attacks:  Sybil Attack  Traffic Analysis Attacks
  • 13. Need of Security • Attacks: 1) Sybil Attack: Introduced by “Brain Zill” in 2002 Subverted by Foreign identities in peer-to peer Network 2) Traffic Analysis Intercepting & Examine messages to deduce info. from patterns in Communications. Able to detect Encrypted messages but Not able to Decrypt it.
  • 14. Security for Sensor Network  SMACS : Self organizing medium access control for sensor networks.  Encryption: Encoding info. in such a way that hackers can’t read it, but authorized one can.  Cryptography & Steganography: Techniques for Secure Communication in presence of Third parties.
  • 15. Application of WSN  Home and Office Applications  Environmental Applications  Medical & Health Applications  Military Applications
  • 16. Advantages  Implementation cost is cheaper than wired network Ideal for non-reachable places  It avoids hell lot of wiring It can accommodate new devices at any time
  • 17. Disadvantages  Less secure because hacker's laptop can act as Access Point.  Lower speed as compare to wired networks.  Affected by surrounding. E.g.: walls (blocking), microwave oven , far distance
  • 18. Conclusion  The low cost, flexibility, fault tolerance, high sensing fidelity and rapid deployment makes way for new applications on remote sensing.  Realization needs to satisfy the constraints such as scalability, topology changes, power consumption, environment etc.  New wireless ad hoc networking techniques are required to overcome this constraints.
  • 19. References  Wireless Sensor Network (KAZEM SOHRABY, DANIEL MINOLI, TAIEB ZNATI)  System Architecture for Wireless Sensor Networks (Jason Lester Hill)  http://today.cs.berkeley.edu/800dem o/.s  http://www.powerstream.com  http://www.wikipedia.com