Wireless Sensor Network

1657 Words4 Pages

I. INTRODUCTION
Wireless Sensor Network consists of highly distributed
Autonomous sensors nodes to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a receiver (destination) [1] [7].
A sensor node consist of a radio transceiver with internal antenna or connected to external antenna, a microcontroller and electronic circuits for interfacing with the sensors and energy source such as battery[1][7].

A. Topologies:
Topologies used in Wireless Sensor Network are Mesh, Star, Ring, Tree, and Bus, Fully connected.
Mesh Network.

B. Characteristics:
• Power consumption constrains for nodes using batteries or energy harvesting
• Ability to cope with node failures
• Mobility of nodes
• Communication failures
• Heterogeneity of nodes
• Scalability to large scale of deployment

C. Application:
• Military Applications.
• Environmental Applications.
• Health Applications.
• Home and Other Commercial Applications.

Military Applications:
• Monitoring friendly forces, equipment, and ammunition • Reconnaissance of opposing and terrain
• Battle Field surveillance and Battle damage as-sessment
• Nuclear, Biological and chemical attack detection

Example:

Area Monitoring: Wireless sensor network nodes are deployed in a particular area to sense the performance of an area.

Environmental Applications:
• Forest fire detection
• Bio-complexity mapping of the environment
• Flood detection

Example:

Forest Fire Detection: WSN nodes are deployed in forest whenever there is fire in the forest detect the fire and control the fire in the forest.

Air Pollution monitoring: To monitor the pollutants gas in the atmosphere in...

... middle of paper ...

...ymmetric Cryptography mechanism means sender and receiver shared a secret key to encrypt and decrypt the message.
AES is a better algorithm in symmetric cryptography.
Asymmetric cryptography: Asymmetric Cryptography techniques means sender have public key but receiver need private key to access the encryption key.
Elliptic Curve Cryptography is a better technique.
Hybrid Cryptographic techniques for security against wireless sensor network:
Hybrid Cryptographic techniques include symmetric and asymmetric cryptography algorithms such as AES is better symmetric cryptography technique and ECC (Elliptic Curve Cryptography) is better asymmetric cryptographic technique for WSN.
VIII.CONCLUSION
Hybrid cryptography technique used to encrypt the data on the network and the other security techniques to secure the network against the network attacks. Network can be secure

Open Document