Adhoc Full
Adhoc Full
Adhoc Full
3 0 0 3
OBJECTIVES:
The student should be made to:
Learn Ad hoc network and Sensor Network fundamentals
Understand the different routing protocols
Have an in-depth knowledge on sensor network architecture and design issues
Understand the transport layer and security issues possible in Ad hoc and Sensor networks
Have an exposure to mote programming platforms and tool
UNIT I AD HOC NETWORKS – INTRODUCTION AND ROUTING 9
PROTOCOLS
Elements of Ad hoc Wireless Networks, Issues in Ad hoc wireless networks, Example commercial
applications of Ad hoc networking, Ad hoc wireless Internet, Issues in Designing a Routing Protocol for
Ad Hoc Wireless Networks, Classifications of Routing Protocols, Table Driven Routing Protocols -
Destination Sequenced Distance Vector (DSDV), On–Demand Routing protocols –Ad hoc On–Demand
Distance Vector Routing (AODV).
TOTAL:45 PERIODS
OUTCOMES:
At the end of the course, the student would be able to:
Know the basics of Ad hoc networks and Wireless Sensor Networks
Apply this knowledge to identify the suitable routing algorithm based on the network and
user requirement
Apply the knowledge to identify appropriate physical and MAC layer protocols
Understand the transport layer and security issues possible in Ad hoc and sensor
networks.
Be familiar with the OS used in Wireless Sensor Networks and build basic modules
TEXT BOOKS:
1. C. Siva Ram Murthy and B. S. Manoj, ―Ad Hoc Wireless Networks Architectures and Protocols‖,
Prentice Hall, PTR, 2004. (UNIT I)
2. Holger Karl , Andreas willig, ―Protocol and Architecture for Wireless Sensor Networks‖, John wiley
publication, Jan 2006.(UNIT II-V)
References
1. Feng Zhao, Leonidas Guibas, ―Wireless Sensor Networks: an information processing
approach‖, Elsevier publication, 2004.
2. Charles E. Perkins, ―Ad Hoc Networking‖, Addison Wesley, 2000.
3. I.F. Akyildiz, W. Su, Sankarasubramaniam, E. Cayirci, ―Wireless sensor networks: a
survey‖, computer networks, Elsevier, 2002, 394 - 422.
EC8702 - AD HOC AND WIRELESS SENSOR NETWORKS
UNIT I
AD HOC NETWORKS – INTRODUCTION AND ROUTING PROTOCOLS
Elements of Ad hoc Wireless Networks, Issues in Ad hoc wireless networks,
Example commercial applications of Ad hoc networking, Ad hoc wireless
Internet, Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks,
Classifications of Routing Protocols, Table Driven Routing Protocols - Destination
Sequenced Distance Vector (DSDV), On–Demand Routing protocols –Ad hoc On–
Demand Distance Vector Routing (AODV).
Ad Hoc Wireless Network
Introduction
• Ad Hoc Network is a multi-hop relaying
network
• ALOHAnet developed in 1970
• Ethernet developed in 1980
• In 1994, Bluetooth proposed by Ericsson to
develop a short-range, low-power, low-
complexity, and inexpensive radio inteface
• WLAN 802.11 spec. is proposed in 1997
1
Cellular and Ad Hoc Wireless Networks
2
Wireless Mesh
Networks
3
B
A
D
E
Switching Center
+
Gateway
C
F
E D
Circuit-switched Packet-switched
(evolving toward packet switching) (evolving toward emulation of circuit
switching)
Seamless connectivity Frequency path break
(low call drops during handoffs) due to mobility
High cost and time of deployment Quick and cost-effective deployment
Mobile hosts are of relatively low complexity Mobile hosts require more intelligence
(should have a transceiver as well as
routing/switching capacity)
Major goals of routing and call admission are Man aim of routing is to find paths with
to maximize the call acceptance ratio and minimum overhead and also quick
minimize the call drop ratio reconfiguration of broken paths
Widely deployed and currently in the third Several issues are to be addressed for
generation successful commercial deployment even
though widespread use exists in defense
7
2009/11/2 8
Applications of Ad Hoc Wireless Networks
• Military Applications
– Establishing communication among a group of soldiers for
tactical operations
– Coordination of military object moving at high speeds
such as fleets of airplanes or ships
– Requirements: reliability, efficiency, secure communication,
and multicasting routing,
• Collaborative and Distributed Computing
– Conference, distributed files sharing
• Emergency Operations
– Search, rescue, crowd control, and commando operations
– Support real-time and fault-tolerant communication paths
8
Wireless Mesh Networks
9
Wired Network
Gateway node
Transmission range
A house with rooftop transceiver Wired link to the Internet
Wireless link
10
Internet
11
Wireless Sensor Networks
• A collection of a large number of sensor nodes
that are deployed in a particular region
• Applications:
– military, health care, home security, and
environmental monitoring
• Differences with the ad hoc wireless networks:
– Mobility of nodes, size of network, density of
deployment, power constraints, data/information
fusion, traffic distribution
12
Hybrid Wireless Networks
• HWN such as Multi-hop cellular networks and
integrated cellular ad hoc relay networks
– The base station maintains the information about the
topology of the network for efficient routing
– The capacity of a cellular network can be increased if the
network incorporates the properties of multi-hop relaying
along with the support of existing fixed infrastructure
• Advantages:
– Higher capacity than cellular networks due to better
channel reuse
– Increased flexibility and reliability in routing
– Better coverage and connectivity in holes
13
B
A
E Switching Center
+
Gateway
15
Medium Access Scheme
• Distributed operation
– fully distributed involving minimum control overhead
• Synchronization
– Mandatory for TDMA-based systems
• Hidden terminals
– Can significantly reduce the throughput of a MAC protocol
• Exposed terminals
– To improve the efficiency of the MAC protocol, the exposed
nodes should be allowed to transmit in a controlled fashion
without causing collision to the on-going data transfer
• Access delay
16
The Major Issues of MAC Scheme
• Throughput and access delay
– To minimize the occurrence of collision, maximize channel
utilization, and minimize controloverhead
• Fairness
– Equal share or weighted share of the bandwidth to all
competing nodes
• Real-time traffic support
• Resource reservation
– Such as BW, buffer space, and processing power
• Capability for power control
• Adaptive rate control
• Use of directional antennas
1
18
2009/11/2 7
The Major Challenge of Routing Protocol
18
The Major Requirement of Routing Protocol
• Minimum route acquisition delay
• Quick route reconfiguration: to handle path breaks
• Loop-free routing
• Distributed routing approach
• Minimum control overhead
• Scalability
• Provisioning of QoS:
• supporting differentiated classes of services
• Support for time-sensitive traffic
• Security and privacy
19
The Major Issues in Multicast Routing
Protocols
• Robustness
– recover and reconfigure quickly from link breaks
• Efficiency
– minimum number of transmissions to deliver a data packet
to all the group members
• Minimal Control overhead
• QoS support
• Efficient group management
• Scalability
• Security
20
Transport Layer Protocols
21
Quality of Service Provisioning
• QoS often requires negotiation between the host and
the network, resource reservation schemes, priority
scheduling and call admission control
• QoS in Ad hoc wireless networks can be on a per
flow, per link, or per node
• Qos Parameters: different applications have different
requirements
– Multimedia: bandwidth and delay are the key parameters
– Military: BW, delay, security and reliability
– Emergency search –and-rescue: availability is the key
parameters, multiple link disjoint paths
– WSN: battery life, minimum energy consumption
22
Quality of Service Provisioning
• QoS-aware routing:
– To have the routing use QoS parameters for finding a path
– The parameters are network through put, packet delivery
ratio, reliability, delay, delay jitter, packet lost rate, bit error
rate, and path loss
• QoS framework:
– A frame work for QoS is a complete system that attempts
to provide the promised service
– The QoS modules such as routing protocol, signaling
protocol, and resource management should react
promptly according to changes in the network state
23
Self-Organization
24
Security
• The attack against ad hoc wireless networks are
classified into two types: passive and active attacks
• Passive attack: malicious nodes to observe the
nature of activities and to obtain information in the
network without disrupting the operation
• Active attack: disrupt the operation of the network
– Internal attack: nodes belong to the same network
– External attack: nodes outside the network
25
Major Security Threats
• Denial of service: either consume the network BW or
overloading the system
• Resource consumption
– Energy depletion: by directing unnecessary traffic through
nodes
– Buffer overflow: filling unwanted data, routing table attack
(filling nonexistent destinations)
• Host impersonation: A compromised node can act as
another node and respond control packets to create
wrong route entries and terminate the traffic
• Information disclosure: support useful traffic pattern
• Interference: create wide-spectrum noise
26
Addressing and Service Discovery
27
Energy Management
• Transmission power management:
– RF hardware design ensure minimum power consumption
– Uses variable power MAC protocol
– Load balance in network layer
– Reducing the number of retransmissions at the transport
layer
– Application software developed for mobile computers
28
Energy Management (cont.)
30
Deployment Considerations
• The deployment of a commercial ad hoc wireless
network has the following benefits
– Low cost of deployment
– Incremental deployment
– Short deployment time
– Re-configurability
31
Major Issues for Deployment
• Scenario of deployment
– Military deployment
• Data-centric (e.g. WSN)
• User-centric (soldiers or vehicles carrying with wireless
communication devices)
– Emergency operations deployment
– Commercial wide-area deployment
– Home network deployment
• Required longevity of network: regenerative power
source can be deployed when the connectivityis
required for a longer duration of time
• Area of coverage 32
Major Issues for Deployment
33
Ad Hoc Wireless in Internet
• Similar to wireless internet, the ad hoc
wireless internet extends the service of the
Internet to the end user over an ad hoc
wireless network
• Gateways: entry points to the wired Internet
• Address mobility: similar to the Mobile IP
• Routing: major problem in ad hoc wireless Internet
• Transport layer protocol
• Load balancing, pricing/billing, security, QoS
• Service, address, and location discovery
34
TCP/IP protocol stack TCP/IP protocol stack TCP/IP protocol stack
Application Layer Application Layer Application Layer
(HTTP, TELNET, SMTP, (HTTP, TELNET, SMTP, (HTTP, TELNET, SMTP,
etc.) etc.) etc.)
Transport Layer Transport Layer Transport Layer
(TCP/UDP) (TCP/UDP) (TCP/UDP)
Network Layer Network Layer Network Layer Network Layer
(IPv4/IPv6) (IPv4/IPv6) (IPv4/IPv6) (IPv4/IPv6)
802.11/HIPERLAN 802.11/HIPERLAN 802.3/802.4/802.5
802.11 802.3/802.4/80
HIPERLAN 2.5
Internet
Mobile node that Mobile node that can relay Ad hoc wireless Internet
can be connected packets to any mobile node gateway connected to a
to any AP running running ad hoc wireless subnet of the Internet
ad hoc wireless routing protocol
routing protocol
Multi-hop wireless part of ad hoc wireless Internet Traditional wired Internet
Gateway Node
■ 1
Introduction
• Routing protocols used in wired networks cannot
be directly applied to ad hoc wireless networks
– Highly dynamic topology
– No infrastructure for centralized administration
– Bandwidth constrained
– Energy constrained
• For the above reasons, we need to design new
routing protocols for ad hoc networks
■ 2
Issues in Designing a Routing Protocol
• Mobility:
– Ad hoc is highly dynamic due to the movement of nodes
– Node movement causes frequent path breaks
– The path repair in wired network has slow convergence
• Bandwidth Constraint:
– Wireless has less bandwidth due to the limited radio band:
Less data rate and difficult to maintain topology
information
– Frequent change of topology causes more overhead of
topology maintenance
– Target: Bandwidth optimization and design topology
update mechanism with less overhead
■ 3
Issues in Designing a Routing Protocol
• Error-prone shared broadcast radio channel:
– Wireless links have time varying characteristics in terms
of link capacity and link-error probability
– Target: Interact with MAC layer to find better-quality link
– Hidden terminal problem causes packet collision
– Target: Find routes through better quality links and find
path with less congestion
• Hidden and exposed terminal problems
– RTS-CTS control packet cannot ensure collision free, see
Fig. 7.2
• Resource Constraints:
– Limited battery life and limited processing power
– Target: optimally manage these resources
■ 4
T R A B
r
Collision
R RTS CTS Data RTS
B Data
Time
■
Figure 7.2. Hidden terminal problem with RTS-CTS-Data-ACK scheme. ■
5
5
Characteristics of an Ideal Routing Protocol
for Ad Hoc
• Fully distributed
• Adaptive to frequent topology changes
• Minimum connection setup time is desired
• Localized
– global maintenance involves a huge state propagation
control overhead
• Loop free and free from stale routes
• Packet collision must seldom happen
■ 6
Characteristics of an Ideal Routing Protocol
for Ad Hoc (cont.)
• Converge to optimal route quickly
• Optimally use scarce resource
– Bandwidth, computing power, memory, and battery
• Remote parts of the network must not cause updates
in the topology information maintained by this node
• Provide quality of service and support for time-
sensitive traffic
■ 7
Classifications of Routing Protocols
• Routing protocol can be broadly classified into four
categories :
– Routing information update mechanism
– Use of temporal information for routing
– Routing topology
– Utilization of specific resource
• These classification is not mutually exclusive
■ 8
Based on the Routing Information Update
Mechanism
• Proactive or table-driven routing protocols
– Maintain routing information in the routing table
– Routing information is flooded in the whole network
– Runs path-finding algorithm with the routing table
• Reactive or on-demand routing protocols
– Obtain the necessary path while required
• Hybrid routing protocols
– In the zone of given node : use table-driven
– Out of the zone of given node : use on-demand
■ 9
Based on the Use of Temporal Information
for Routing
• Using past temporal information
– Past status of the links or
– the status of links at the time of routing to make routing
decision
• Using future temporal information
– Expected future status of the links to make decision
– Node lifetime is also included
• Ex: remaining battery charge, prediction of location,
and link availability
■ 10
Based on the Routing Topology
■ 11
Based on the Utilization of Specific Resource
• Power-aware routing
– Minimize consumption of resource
• Ex: Battery power
• Geographical information assisted routing
– Improve the routing performance
– Reduce control overhead
■ 12
Classifications of Routing Protocol:
(3) (1)
■ 13
• Table-Driven Routing Protocols
• On-Demand Routing Protocols
■ 14
Table-Driven Routing Protocols
■ 15
Destination Sequenced Distance-Vector
Routing Protocol (DSDV)
• Enhanced from distributed Bellman-Ford
algorithm
• Obtain a table that contains shortest path from
this node to every node
• Incorporate table updates with increasing
sequence number tags
– Prevent loops
– Counter the count-to-infinity problem
– Faster convergence
■ 16
DSDV (Cont.)
■ 17
DSDV (Cont.)
■ 18
■ 19
11 DestinationID
Node 15
Movement Dest NextNode Dist SeqNo
14 2 2 1 22
13
3 2 2 26
4 5 2 32
11 12
9 5 5 1 134
8 6 6 1 144
7 2 3 162
10
8 5 3 170
9 2 4 186
4 7
10 6 2 142
6 11 5 4 180
5
12 5 3 190
3
13 5 4 198
2 14 6 3 214
1
15 5 4 256
SourceID
■ 21
On-demand Routing Protocol
■ 22
On-demand Routing Protocol
■ 23
Dynamic Source Routing Protocol (DSR)
■ 24
Routing Discovery
DestinationID
15
14
13
Network Link
11 12
9
8 RouteRequest
10
RouteReply
4 7
Path1: 1-2-3-7-9-13-15
6 Path2: 1-5-4-12-15
5
Path3: 1-6-10-11-14-15
3
2
1
Sour ceID
Figure 7.10. Route establishment in DSR. 2
36
■■
5
Routing Maintain DestinationID
15
14
13
Network Link
11 12
9
Selected Path
8
10 RouteError
4 7 Broken Link
6
5
2
1
SourceID
Gateways IP backbone
s
Server
Router
• In mobile ad hoc
networks (MANET):
• Mobility changes
neighborhood relationship
• Must be compensated for
• E.g., routes in the network
have to be changed
• Complicated by scale
• Large number of such
nodes difficult to support
SS 05 Ad hoc & sensor networs - Ch 1: Motivation & Applications 12
Battery-operated devices ! energy-efficient operation
• Often (not always!), participants in an ad hoc network draw
energy from batteries
• Desirable: long run time for
• Individual devices
• Network as a whole
! Energy-efficient networking protocols
• E.g., use multi-hop routes with low energy consumption (energy/bit)
• E.g., take available battery capacity of devices into account
• How to resolve conflicts between different optimizations?
• Alternative concept:
Instead of focusing interaction on humans, focus on
interacting with environment
• Network is embedded in environment
• Nodes in the network are equipped with sensing and actuation to
measure/influence environment
• Nodes process information and communicate it wirelessly
• Energy supply?
• Limited from point of deployment?
• Some form of recharging, energy scavenging from environment?
• E.g., solar cells
! Big similarities
• Differences
• Scale – WSN often intended for larger scale
• Real-time – WSN usually not intended to provide (hard) real-time
guarantees as attempted by fieldbuses
Memory
Communication Sensor(s)/
Controller
device actuator(s)
Power supply
• Example microcontrollers
• Texas Instruments MSP430
• 16-bit RISC core, up to 4 MHz, versions with 2-10 kbytes RAM,
several DACs, RT clock, prices start at 0.49 US$
• Atmel ATMega
• 8-bit controller, larger memory than MSP430, slower
• Passive, omnidirectional
• Examples: light, thermometer, microphones, hygrometer, …
• Passive, narrow-beam
• Example: Camera
• Active sensors
• Example: Radar
Primary batteries
Chemistry Zinc-air Lithium Alkaline
Energy (J/cm3) 3780 2880 1200
Secondary batteries
Chemistry Lithium NiMHd NiCd
Energy (J/cm3) 1080 860 650
• Number of instructions
• Energy per instruction: 1 nJ
• Small battery (“smart dust”): 1 J = 1 Ws
• Corresponds: 109 instructions!
• Lifetime
• Or: Require a single day operational lifetime = 24¢60¢60 =86400 s
• 1 Ws / 86400s ¼ 11.5 W as max. sustained power consumption!
• Not feasible!
• Typical modes
• Controller: Active, idle, sleep
• Radio mode: Turn on/off transmitter/receiver, both
• Overview
DC power RF power
AC power TRX TOC RF
3200W 480W
3802W 2400W 120W
PS -48V
TRXs ACE
84% Combining
• Details
supply cabling
300W mon
220V -48V -48V
85% 99%
3802W 3232W 3200W Fans (No active cooling)
cooling
PAs consume 2400W 500W
dominant part of power
12 transceivers
(12*140W)/2400W=70%
200W
idle
140W 60W
Usable PA efficiency Converter
TOC
47% 110W
PA 10W
15W
40W
3
Principal options and difficulties
Medium access in wireless networks is difficult mainly
because of
Impossible (or very difficult) to sende and receive at the same time
Interference situation at receiver is what counts for transmission
success, but can be very different from what sender can observe
High error rates (for signaling packets) compound the issues
Requirement
As usual: high throughput, low overhead, low error rates, …
Additionally: energy-efficient, handle switched off devices!
4
Requirements for energy-efficient MAC protocols
Recall
Transmissions are costly
Receiving about as expensive as transmitting
Idling can be cheaper but is still expensive
Energy problems
Collisions – wasted effort when two packets collide
Overhearing – waste effort in receiving a packet destined for
another node
Idle listening – sitting idly and trying to receive when nobody is
sending
Protocol overhead
5
Main options
Centralized
Distributed
Schedule- Contention-
based based Schedule- Contention-
based based
Fixed Demand
assignment assignment Fixed Demand
assignment assignment
6
Centralized medium access
Idea: Have a central station control when a node may
access the medium
Example: Polling, centralized computation of TDMA schedules
Advantage: Simple, quite efficient (e.g., no collisions), burdens the
central station
9
Distributed, contention-based MAC
Basic ideas for a distributed MAC
ALOHA – no good in most cases
Listen before talk (Carrier Sense Multiple Access, CSMA) –
better, but suffers from sender not knowing what is going on at
receiver, might destroy packets despite first listening for a
! Receiver additionally needs some possibility to inform
possible senders in its vicinity about impending
transmission (to “shut them up” for this duration)
Hidden
terminal Also:
scenario: recall
exposed
terminal
A B C D
scenario
Similarly: Ongoing
Busy tone by C transmission near B
Control RTS CTS destroys RTS by
channel A!B B !A busy tone
Time
Data No data!
channel
Overview
Practically:
Each node maintains topology table of network (as in LS)
Unlike LS: only distribute link state updates locally
More frequent routing updates for nodes with smaller scope
Reactive protocols – DSR
In a reactive protocol, how to forward a packet to
destination?
Initially, no information about next hop is available at all
One (only?) possible recourse: Send packet to all neighbors –
flood the network
Hope: At some point, packet will reach destination and an answer
is sent pack – use this answer for backward learning the route
from destination to source
2 1 2
1
[1,7,2] 7
7
[1,4,6] 5
5
4 4 3
3 6
6 [5,3,7,1]
[1,7,3]
Braided paths
Source Sink
Primary path
Overview
Destination 1
For each source,
minimize maximum cost Shortest path tree
to each destination Source Destination 2
2
This is obtained by
overlapping the individual
2 1
shortest paths as
computed by a normal
routing protocol Destination 1
Summary of options (broadcast/multicast)
Broadcast Multicast
5 3 4 3 2 3
S 1 B S (1) B S (3) B
10 9 7
3 7 2 7 7
D 1 D 1 D 1
Round 4: A Round 5: A
C C C
2 3 3
S (3) B S (5) B
7 10
6 7
D D
C (1) C (1)
Example for mesh-based multicast
Two-tier data dissemination
Overlay a mesh, route along mesh intersections
Broadcast within the quadrant where the destination is (assumed
to be) located
Sink
Event
Overview
B K
F H
Z
A D
Enter
J
face L
routing G
C
Geographic routing without positions – GEM
Apparent contradiction: geographic, but no position?
Construct virtual coordinates that preserve enough
neighborhood information to be useful in geographic
routing but do not require actual position determination
A4
A3
A2
A1
1 D-1
40
D
Overview
41
Location-based Multicast (LBM)
Geocasting by geographically restricted flooding
Define a “forwarding” zone – nodes in this zone will forward
the packet to make it reach the destination zone
Forwarding zone specified in packet or recomputed along the way
Static zone – smallest rectangle containing original source and
destination zone
Adaptive zone – smallest rectangle containing forwarding node
and destination zone
Possible dead ends again
Adaptive distances – packet is forwarded by node u if node u is
closer to destination zone’s center than predecessor node v
(packet has made progress)
Packet is always forwarded by nodes within the destination
zone itself
42
Determining next hops based on Voronoi diagrams
Goal: Use that neighbor to forward packet that is closest to
destination among all the neighbors
Use Voronoi diagram computed for the set of neighbors of
the node currently holding the packet
S
D
A
43
Geocasting using ad hoc routing – GeoTORA
Recall TORA protocol: Nodes compute a DAG with
destination as the only sink
Observation: Forwarding along the DAG still works if
multiple nodes are destination (graph has multiple sinks)
GeoTORA: All nodes in the destination region act as sinks
Forwarding along DAG; all sinks also locally broadcast the packet
in the destination region
44
Trajectory-based forwarding (TBF)
Think in terms of an “agent”: Should travel around the
network, e.g., collecting measurements
Random forwarding may take a long time
Idea: Provide the agent with a certain trajectory along
which to travel
Described,
e.g., by a
simple curve
Forward
to node closest
to this trajectory
45
Mobile nodes, mobile sinks
Mobile nodes cause Source
some additional problems
E.g., multicast tree to
distribute readings has to Sink moves
be adapted downward
Source
Source
Sink
moves
upward
46
Conclusion
Routing exploit various sources of information to find
destination of a packet
Explicitly constructed routing tables
Implicit topology/neighborhood information via positions
Routing can make some difference for network lifetime
However, in some scenarios (streaming data to a single sink),
there is only so much that can be done
Energy efficiency does not equal lifetime, holds for routing as well
Non-standard routing tasks (multicasting, geocasting)
require adapted protocols
47
Unit 4
Security in Wireless Sensor
Networks
Overview
• WSN security: Too many problems... A number of solutions...
Enough?
• Issues include:
– key establishment
– secrecy
– authentication
– privacy
– denial-of-service attacks More info in a later set of slides
– secure routing More info in a later set of slides
– node capture
• Injection attacks
– Transmit malicious routing information into the network
resulting in routing inconsistencies
– Authentication might guard against injection attacks, but
some routing protocols are vulnerable to replay by the
attacker of legitimate routing messages
Anthony D. Wood
and John A. Stankovic
Why Security?
• Battlefield
• Disasters
– Protect the location and status of casualties from
unauthorized disclosure, particularly if the disaster relates
to ongoing terrorist activities
• Public safety
– False alarms about chemical, biological, or environmental
threats could cause panic or disregard for warning systems.
An attack on the system’s availability could precede a real
attack on the protected resource
• Home healthcare
– Because protecting privacy is paramount, only authorized
users can query or monitor the network. These networks can
also form critical pieces of an accident-notification chain,
thus they must be protected from failure
DENIAL OF SERVICE THREAT
• Intentional Attack
Adversary Capability
• Jamming
– Defenses
• Spread-spectrum
• Region mapping: Less expensive
• Tampering
– Defenses: Tamper-proofing, hiding
Link Layer Attacks
• Collision
– Use error-correcting codes
• Exhaustion
– Rate limitation
• Unfairness
– Small frames
Network and Routing Attacks
• Neglect
– Drops packets arbitrarily
• Greed
– Gives undue priority to it’s own messages
• Flooding
– Client puzzles
• Make the adversary commit resources
• Only useful if the adversary has limited
resources
• Desynchronization
– Authentication
PROTOCOL VULNERABILITIES to
DoS
• Device capability
– Mote class attacker
– Laptop class attacker: more energy, more
powerful CPU, sensitive antenna, more radio
power
• Attacker type
– Outside attacker: External to the network
– Inside attacker: Authorized node in the
WSN is compromised or malicious
Security Goals
• Secure routing
– Support integrity, authenticity, availability
of messages in presence of attack
– Data confidentiality
Potential Attacks
• Specific to WSNs
– All packets are directed to base station
– A malicious node advertises a high quality
link to the base station to attract a lot of
packets
– Enable other attacks, e.g., selective
forwarding or wormhole attack
Sybil attack
• Specific to WSNs
– In some protocols, nodes have to periodically
broadcast “hello” to advertise themselves
• Not authenticated!
– Laptop-class attacker can convince it’s a neighbor
of distant nodes by sending high power hello
messages
Acknowledge spoofing
• TinyOS beaconing
– Construct a BFS rooted at the base station
– Beacons are not authenticated
– Adversary can take over the whole WSN by
broadcasting beacons
Directed diffusion
• Replay interest
• Selective forwarding & data tampering
• Inject false data
Geographic routing
• Authenticated broadcast
– uTESLA
Error?
HWClock
nesC
An application must contain the Main module
which links the code to the scheduler at run
time.
The Main has a single StdControl interface,
which is the ultimate source of initialization of
all components.
nesC—concurrency and
atomicity
A keyword atomic to indicate that the
execution of a block of statements should not
be preempted.
Method calls are not allowed in atomic block.
A shared variable x is outside of an atomic
statement is a compile-time error.
A norace declaration of the variable can
prevent the compiler from checking the race
condition on that variable.
nesC—concurrency and
atomicity
Fig7.11
7.3.3 Dataflow-style language:
TinyGALS
Dataflow languages are intuitive for
expressing computation on interrelated data
units by specifying data dependencies among
them.
A data flow program has a set of processing
units called actors.
Actors have ports to receive and produce
data.
TinyGALS
Fig
7.13,14,15
Queue size
7.4~7.6
Node-Level Simulators
For engineer to perform performance study,
which in terms of
Power
Bandwidth
Etc
Node-Level Simulators (2)
Simulators are consisted by the following
models
Sensor node model
Communication model
Physical environment model
Statistics and visualization
Time concept
A sensor network simulator simulates the
behavior of sensor network with respect to
time
In which, time may advance in differ ways:
cycle-driven or discrete-event.
Cycle-driven simulation
A cycle-driven (CD) discretize the continuous
real time into ticks
Simulator computes phenomenon at each
tick. Like: physical environment, sensing data,
communication data, etc.
Communication by RF is assumed to be
finished in a tick.
Cycle-driven simulation cont.
CD simulators are easy to implement and use
Most CD simulators issue are detecting and
dealing cycle dependencies among nodes
(ex: RF) or algorithms (ex: Thread).
Discrete-event simulation
Discrete-event (DE) simulator assumes the
time is continuous.
Usually use a Global event queue to store
events.
All events are stored chronologically in the
Global event queue.
Example figure
Sending a big file(1MB), 0.1MB/s max.
CD
Ticks
DE
Comparison
DE simulators are considered as better than
CD simulators, because they are more actual.
But they’re more complex to design and
implement.
Most popular sensor network simulators are
DE simulators, like TOSSIM and NS2.
Ns2 + Sensor network
Ns2 was meant to be wired network simulator,
so extensions are being made for wireless
(802.11,TDMA) and sensor networks.
Ns2 + Sensor network cont.
Protocol supported:
802.3
802.11
TDMA
Ad hoc routing
Sensor network routing
TOSSIM
Which is dedicated to TinyOS applications to
running on Motes.
With some visualization packet, the TinyViz.
Result can be plot in some more
understandable graphs.
State-Centric Programming
Applications that isn’t just simply generic
distributed programs over an ad hoc network.
We have to centralize data into nodes.
EX: target tracking.
State-Centric Programming
Def:
X: state of a system
U: inputs
Y: outputs
K: update index
F: state update function
G: output observation function
State-Centric Programming
Xk+1 = F( Xk, Uk )
Yk = G( Xk ,Uk)