SlideShare a Scribd company logo
Wireless Sensor Network & Security
TEJAS WASULE
(IT 2nd
Year)
SURAJ JAIWAL
(IT 2nd
Year )
Presented by-
What is Wireless Sensor
Networks?
WSN combines sensing, computation,
and communication into single tiny
device called sensor node.
Group of sensors linked by wireless
media to perform distributed sensing
task
What is Sensor Node?
Sensor is a device, which senses
information and passes it to the mote.
Figure : Wireless sensor network device
Progression of Sensor
Technology
Figure : Progression of sensor technology
(motes) over time
Architecture of a Sensor
Node
 A Power unit (Battery)
 Computational logic & Storage
 Sensor Transducer
 Communication
 Components of Sensor Node
1. HARDWARE
Architecture of a Sensor
Node
Figure : The architecture of a sensor node.
Contd..
2. SOFTWARE
Operating System Microcode
Sensor Drivers
Communication Processors
Communication Drivers
Data Processing Mini-Apps
Specific Sensor Node
Sensor Node:
Processor: 4Mhz
Memory: 128KB Flash & 4KB RAM
Radio: 916Mhz and 40Kbits/second.
Transmission Range: 100 Feet
TinyOS:
Operating System(small)
Open Source
Energy Efficient
Available Wireless Technologies
Available Wireless Technologies
Standard Data Rate Range Power
Consumption
ZigBee
(802.15.4)
20 kbps to
250 kbps
Up to 10 m Ultralow
Bluetooth
(802.15.1)
Up to 3 mbps 1m to 100 m low
Wi-Fi
(802.11)
54 mbps 45 m to 90
m
Medium
Contd…
Need of Security
 WSNs are becoming a cost effective,
practical way to go about deploying
sensor networks.
 Protecting confidentiality, integrity
and availability of communications.
 Large range of applications from
civilian to military purposes.
Need of Security
• Obstacles:
 Very-Limited Resources
 Unreliable Communication
 Unattended Operations
• Attacks:
 Sybil Attack
 Traffic Analysis Attacks
Need of Security
• Attacks:
1) Sybil Attack:
Introduced by “Brain Zill” in 2002
Subverted by Foreign identities in
peer-to peer Network
2) Traffic Analysis
Intercepting & Examine messages to
deduce info. from patterns in
Communications.
Able to detect Encrypted messages but
Not able to Decrypt it.
Security for Sensor Network
 SMACS :
Self organizing medium access
control for sensor networks.
 Encryption:
Encoding info. in such a way that
hackers can’t read it, but authorized
one can.
 Cryptography & Steganography:
Techniques for Secure
Communication in presence of Third
parties.
Application of WSN
 Home and Office Applications
 Environmental Applications
 Medical & Health Applications
 Military Applications
Advantages
 Implementation cost is cheaper
than wired network
Ideal for non-reachable places
 It avoids hell lot of wiring
It can accommodate new devices
at any time
Disadvantages
 Less secure because hacker's laptop
can act as Access Point.
 Lower speed as compare to wired
networks.
 Affected by surrounding. E.g.: walls
(blocking), microwave oven , far distance
Conclusion
 The low cost, flexibility, fault tolerance,
high sensing fidelity and rapid deployment
makes way for new applications on remote
sensing.
 Realization needs to satisfy the constraints
such as scalability, topology changes,
power consumption, environment etc.
 New wireless ad hoc networking
techniques are required to overcome this
constraints.
References
 Wireless Sensor Network (KAZEM
SOHRABY, DANIEL MINOLI,
TAIEB ZNATI)
 System Architecture for Wireless
Sensor Networks (Jason Lester Hill)
 http://today.cs.berkeley.edu/800dem
o/.s
 http://www.powerstream.com
 http://www.wikipedia.com
THANK
YOU..!
.....?

More Related Content

PPTX
Wireless sensor networks (Yogesh Chandra Fulara)
PPTX
Wireless sensor network
PPT
Wireless Sensor Network
PPTX
Wireless Sensor Networks
PPTX
Wireless sensor networks
PPT
Attacks in MANET
PPTX
Wireless Sensor Networks
PPTX
Wireless sensor networks
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor network
Wireless Sensor Network
Wireless Sensor Networks
Wireless sensor networks
Attacks in MANET
Wireless Sensor Networks
Wireless sensor networks

What's hot (20)

PPTX
Energy conservation in wireless sensor networks
PPTX
wireless sensor network my seminar ppt
PPTX
Internet of things (IOT) | Future Trends
PPTX
Iot architecture
PPTX
wireless sensor network
PPTX
Wsn unit-1-ppt
PPTX
Security issues in manet
PPT
WSN IN IOT
PPT
Wireless Sensor Networks
PDF
Sensor Networks Introduction and Architecture
PPTX
Wireless Networking
PDF
seminar report on wireless Sensor network
PPTX
Internet of Things: Research Directions
PPTX
Wireless Sensor Networks ppt
PPT
CS6003 AD HOC AND SENSOR NETWORKS
PDF
Wireless sensor network wireless network
PPTX
Module 2.pptx
PPTX
Wireless sensor network applications
PPT
Intrusion detection system ppt
PPTX
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
Energy conservation in wireless sensor networks
wireless sensor network my seminar ppt
Internet of things (IOT) | Future Trends
Iot architecture
wireless sensor network
Wsn unit-1-ppt
Security issues in manet
WSN IN IOT
Wireless Sensor Networks
Sensor Networks Introduction and Architecture
Wireless Networking
seminar report on wireless Sensor network
Internet of Things: Research Directions
Wireless Sensor Networks ppt
CS6003 AD HOC AND SENSOR NETWORKS
Wireless sensor network wireless network
Module 2.pptx
Wireless sensor network applications
Intrusion detection system ppt
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
Ad

Similar to WIRELESS SENSOR NETWORK (20)

PPTX
PPT
Security in sensor network1
PPTX
Wireless Sensor Networks and Big Bad Internet: Integration challenges and con...
PPT
gcettb presentation on sensor network
PPT
Security in WSN
PPTX
Wireless_Sensor_security
PDF
Analysis of security threats in wireless sensor network
PDF
Overview on security and privacy issues in wireless sensor networks-2014
PDF
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
PPTX
internet of thing wireless sensor network
PDF
International Journal of Engineering and Science Invention (IJESI)
PPTX
Wireless sensor networks
PDF
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
PDF
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
PPTX
slideshow123456789tyufxfmnvczsdadsgvnbnvgchj
PPTX
Wireless senor network introduction and application by Roop Singh Meena
PDF
Analysis of wireless sensor networks security, attacks and challenges
PDF
Analysis of wireless sensor networks
PDF
IT484 Cyber Forensics_Information Technology
PDF
IT488 Wireless Sensor Networks_Information Technology
Security in sensor network1
Wireless Sensor Networks and Big Bad Internet: Integration challenges and con...
gcettb presentation on sensor network
Security in WSN
Wireless_Sensor_security
Analysis of security threats in wireless sensor network
Overview on security and privacy issues in wireless sensor networks-2014
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
internet of thing wireless sensor network
International Journal of Engineering and Science Invention (IJESI)
Wireless sensor networks
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
slideshow123456789tyufxfmnvczsdadsgvnbnvgchj
Wireless senor network introduction and application by Roop Singh Meena
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks
IT484 Cyber Forensics_Information Technology
IT488 Wireless Sensor Networks_Information Technology
Ad

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
KodekX | Application Modernization Development
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Understanding_Digital_Forensics_Presentation.pptx
Review of recent advances in non-invasive hemoglobin estimation
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25 Week I
GamePlan Trading System Review: Professional Trader's Honest Take
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
KodekX | Application Modernization Development
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Dropbox Q2 2025 Financial Results & Investor Presentation
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Chapter 3 Spatial Domain Image Processing.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Big Data Technologies - Introduction.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

WIRELESS SENSOR NETWORK

  • 1. Wireless Sensor Network & Security TEJAS WASULE (IT 2nd Year) SURAJ JAIWAL (IT 2nd Year ) Presented by-
  • 2. What is Wireless Sensor Networks? WSN combines sensing, computation, and communication into single tiny device called sensor node. Group of sensors linked by wireless media to perform distributed sensing task
  • 3. What is Sensor Node? Sensor is a device, which senses information and passes it to the mote. Figure : Wireless sensor network device
  • 4. Progression of Sensor Technology Figure : Progression of sensor technology (motes) over time
  • 5. Architecture of a Sensor Node  A Power unit (Battery)  Computational logic & Storage  Sensor Transducer  Communication  Components of Sensor Node 1. HARDWARE
  • 6. Architecture of a Sensor Node Figure : The architecture of a sensor node. Contd..
  • 7. 2. SOFTWARE Operating System Microcode Sensor Drivers Communication Processors Communication Drivers Data Processing Mini-Apps
  • 8. Specific Sensor Node Sensor Node: Processor: 4Mhz Memory: 128KB Flash & 4KB RAM Radio: 916Mhz and 40Kbits/second. Transmission Range: 100 Feet TinyOS: Operating System(small) Open Source Energy Efficient
  • 10. Available Wireless Technologies Standard Data Rate Range Power Consumption ZigBee (802.15.4) 20 kbps to 250 kbps Up to 10 m Ultralow Bluetooth (802.15.1) Up to 3 mbps 1m to 100 m low Wi-Fi (802.11) 54 mbps 45 m to 90 m Medium Contd…
  • 11. Need of Security  WSNs are becoming a cost effective, practical way to go about deploying sensor networks.  Protecting confidentiality, integrity and availability of communications.  Large range of applications from civilian to military purposes.
  • 12. Need of Security • Obstacles:  Very-Limited Resources  Unreliable Communication  Unattended Operations • Attacks:  Sybil Attack  Traffic Analysis Attacks
  • 13. Need of Security • Attacks: 1) Sybil Attack: Introduced by “Brain Zill” in 2002 Subverted by Foreign identities in peer-to peer Network 2) Traffic Analysis Intercepting & Examine messages to deduce info. from patterns in Communications. Able to detect Encrypted messages but Not able to Decrypt it.
  • 14. Security for Sensor Network  SMACS : Self organizing medium access control for sensor networks.  Encryption: Encoding info. in such a way that hackers can’t read it, but authorized one can.  Cryptography & Steganography: Techniques for Secure Communication in presence of Third parties.
  • 15. Application of WSN  Home and Office Applications  Environmental Applications  Medical & Health Applications  Military Applications
  • 16. Advantages  Implementation cost is cheaper than wired network Ideal for non-reachable places  It avoids hell lot of wiring It can accommodate new devices at any time
  • 17. Disadvantages  Less secure because hacker's laptop can act as Access Point.  Lower speed as compare to wired networks.  Affected by surrounding. E.g.: walls (blocking), microwave oven , far distance
  • 18. Conclusion  The low cost, flexibility, fault tolerance, high sensing fidelity and rapid deployment makes way for new applications on remote sensing.  Realization needs to satisfy the constraints such as scalability, topology changes, power consumption, environment etc.  New wireless ad hoc networking techniques are required to overcome this constraints.
  • 19. References  Wireless Sensor Network (KAZEM SOHRABY, DANIEL MINOLI, TAIEB ZNATI)  System Architecture for Wireless Sensor Networks (Jason Lester Hill)  http://today.cs.berkeley.edu/800dem o/.s  http://www.powerstream.com  http://www.wikipedia.com