International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 Evolution of Wireless Micro Sensors and their Applications. Kolipaka Sai Sandeep#, Suresh Angadi*, # * Final Year B.Tech, Dept. of ECE, KL University, Vaddeswaram, AP, India Assistant Professor, Dept. of ECE, KL University, Vaddeswaram, AP, India Abstract—One of the most important evolution of the modern era is Wireless Sensors Technology. This paper discusses the history of research in sensor networks over the past three decades. Technologies and those trends which impact the development of sensor networks are concentrated and new applications such as infrastructural security, habitat monitoring, and mainly traffic control are presented. Technical challenges related to sensor networks and their developments include network discovery, controlling and routing, collaborative signal and information processing, tasking and security. This paper concludes by presenting few recent reviews related to sensor networks, including challenges in wireless networks and also the applications of wireless networks Keywords— Micro Sensors, wireless networks, network routing. I. INTRODUCTION The technology which is a key technology for the future is Networked micro sensors technology. Devices which cheap and smart with multiple onboard sensors, networked through several wireless links and the Internet which are deployed in large numbers, provide unprecedented platform and opportunities for instrumentation, controlling homes, cities, and the environment. In addition, wireless networked micro sensors provides an evolutionary technology for a vast spectrum of systems in the defense arena, generating new capabilities for surveillance and technical as well as other tactical applications. Modern Sensors like Smart disposable micro sensors that can be deployed on the ground, in the air, under water, on bodies, in vehicles, and inside buildings and certain environmental conditions, agricultural lands. A system of networked sensors can detect and track threats (e.g., winged and wheeled vehicles, personnel, chemical and biological agents, intruders, confidential data) and be used for weapon targeting and area denial. Each sensor node will have embedded processing capability, and will potentially have multiple onboard sensors, operating in the acoustic, seismic, infrared (IR), and magnetic modes, as well as imagers and micro radars and also. Also onboard will be storage, wireless links to neighbouring nodes, and location and positioning knowledge through the global positioning system (GPS) or local positioning algorithms. The general family of sensor networks that use multiple distributed sensors to collect information on areas of interest and they include Networked micro sensors. Present and ISSN: 2231-5381 crucial applications of sensor networks include: military sensing, physical security, air traffic control, traffic surveillance, video surveillance, industrial and manufacturing automation, distributed robotics, environment monitoring, and building and structures monitoring, Medical applications, atmospheric observance. The sensors included in these applications can be small or large, and the networks may be wired or wireless. However, common wireless networks of micro sensors probably offer the most potential in changing the world of sensing. While sensor networks for various applications may be quite different, they share common technical issues and also problems. This paper will give a Brief history of research in sensor networks, technology trends, new applications, research issues and difficult problems, and few examples of research results and also gives the importance of sensors in this modern era II. REVIEW IN SENSOR NETWORKS The development of sensor networks requires technologies from three different research areas: sensing, communication, and computing (includes hardware, software, and algorithms). Combined and separate advancements in each of these areas have driven research issues to sensor networks. Early sensor networks include the radar networks used in air traffic control and certain Defence applications. The national power grid, with its many sensors, can be viewed as one large sensor network. These systems were developed with specialized computers and communication capabilities, and before the term “sensor networks” came into vogue. A. Evolution of Military Sensor Networks in the 1980s and 1990s Even though early researchers on sensor networks had in mind large numbers of small sensors, the technology for small sensors was not quite ready. However, planners of military systems quickly recognized the benefits of sensor networks, which become a crucial component of network centric warfare certain advancements, are to be done. In platform-centric warfare, platforms “own” specific weapons, which in turn own sensors in a fairly rigid architecture and which those are different than the normal applications. To say that, sensors and weapons are mounted with and controlled by separate http://www.ijettjournal.org Page 1442 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 platforms that operates independently. In network centric warfare, sensors need not to be necessarily belonging to weapons or platforms. Instead, they collaborate with each other over a communication network, and information is sent to the appropriate “shooters.” Sensor networks can improve detection and tracking performance through multiple observations, geometric and phenomenological diversity, extended detection range, and faster response time. Also, the development cost is lower by exploiting commercial network technology and common network interfaces. B. Sensing Network Research in the 21st Century Recent advances in computing and communication have caused a significant shift in sensor network research and brought it closer to achieving the actual vision. Small and inexpensive sensors based upon micro electro mechanical system (MEMS) technology, wireless networking, and costless low-power processors allow the deployment of wireless ad hoc networks for various applications Defence Advanced Research Projects Agency (DAPRA) pursued two key research and development thrusts. New networking techniques have been developed primarily. In the battlefield context, these sensor devices or nodes should be ready for rapid deployment, in an ad-hoc fashion, and in highly dynamic environments. Modern day’s networking techniques, developed for voice and data and relying on a fixed infrastructure will not suffice for battlefield use. Thus, the program developed new networking techniques suitable for highly dynamic ad-hoc environments. The second thrust was networked information processing, i.e., how to extract useful, reliable, and timely information from the deployed sensor network. This implies leveraging the distributed computing environment created by these sensors for signal and information processing in the network, and for dynamic and interactive querying and tasking the sensor network. Sens IT generated new capabilities relative to today’s sensors. Current systems such as the Tactical Automated Security System (TASS) for perimeter security are dedicated rather than programmable. They use technologies based on transmit only nodes and a long range detection paradigm. Sens IT networks have new capabilities. The networks are interactive and programmable with dynamic tasking and querying. A multitasking feature in the system allows multiple simultaneous users. Finally, since detection ranges are much shorter in a sensor system, the software and algorithms can exploit the proximity of devices to threats to drastically improve the accuracy of detection and tracking. The software and the overall system design supports low latency, energyefficient operation, built in autonomy and survivability, and low probability of detection of operation. As a result, a network of Sens IT nodes can support detection, identification, and tracking of threats, as well as targeting and communication, both within the network and to outside the network, such as an overhead asset. ISSN: 2231-5381 . III. TECHNOLOGY TRENDS Current sensor networks can exploit technologies that are not available 20 years ago and perform functions that were not even imagined or dreamed of at that time. Sensors, processors, and communication devices are all getting much smaller and cheaper. Commercial companies such as Ember, Crossbow, and Sensoria are now building and deploying small sensor nodes and systems. These companies provide a vision of how our daily lives will be enhanced through a network of small, embedded sensor nodes. In addition to products from these companies, commercial off-the-shelf personal digital assistants (PDAs) using Palm or Pocket PC operating systems contain significant computing power in a small package. These can easily be “ruggedized” to become processing nodes in a sensor network. Some of these devices even have built-in sensing capabilities, such as cameras. These powerful processors can be hooked to MEMS devices and machines along with extensive databases and communication platforms to bring about a new era of technologically sophisticated sensor nets. Wireless Networks Wireless networks based upon IEEE 802.11 standards can now provide bandwidth approaching those of wired networks. At the same time, the IEEE has noticed the low expense and high capabilities that sensor networks offer. The organization has defined the IEEE 802.15 standard for personal area networks (PANs), with “personal net-works” defined to have a radius of 5 to 10 m. Networks of short-range sensors are the ideal technology to be employed in PANs. The IEEE encouragement of the development of technologies and algorithms for such short ranges ensures continued development of low cost sensor nets. Further-more, increases in chip capacity and processor production capabilities have reduced the energy per bit requirement for both computing and communication. Sensing, computing, and communications can now be performed on a single chip, further reducing the cost and allowing deployment in ever larger numbers. IV. NEW ERA APPLICATIONS Research on sensor networks was originally motivated by military applications. Examples of military sensor networks range from large scale acoustic surveillance systems for ocean surveillance to small networks of unattended ground sensors for ground target detection. However, the availability of lowcost sensors and communication networks has resulted in the development of many other potential applications, from infrastructure security to industrial sensing. The following are a few examples. http://www.ijettjournal.org Page 1443 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 Health Grounds Nowadays Wireless sensor networks are being used to monitor and track elders, patients for health care purposes, which can significantly relieve the severe shortage of health care personnel and reduce the health care expenditures in the current health care systems. These sensors have created great changes in medical environment. For example sensors can be deployed in a patient’s home to monitor the behaviours of the patient. It can alert doctors when the patient falls and requires immediate medical attention. Home Intelligence and office applications Wireless sensor networks can be used to provide more convenient and secure living environments for human beings. For example, wireless sensors can be used to automatically read utility meters in a home like water, gas, electricity and then send the readings to a remote centre through wireless communication. It also provides theft security and fire alarms. Agriculture and Food Industry One of the innovative and inspirational sectors includes this industry; using a wireless network helps the farmers from the maintenance of wiring in a difficult environment. Certain monitoring systems like Gravity feed water systems can be monitored using pressure transmitters to monitor water tank levels, they can be controlled using wireless I/O devices and water use can be measured and wirelessly transmitted back to a central control for billing. Modernization of irrigation enables more efficient water use and reduces waste and is more helpful to the farmers. Modern Industrial Sensing This industry encourages the sensors systems and companies researching in this sector economically. More amount of research work is encouraged for better outputs and efficient production for industries. Monitoring machine “health” through determination of vibration or wear and lubrication levels, and the insertion of sensors into regions inaccessible by humans, are just two examples of industrial applications of sensors. Remote and wireless sensors in particular can enable a factory to be instrumented after the fact to ensure the maintain compliance with federal safety and guidelines while keeping installation costs low. Spectral sensors are one of the examples of sensing in an industrial environment. From simple optical devices such as optrodes and pH probes to true spectral devices that can function as miniature spectrometers, optical sensors can replace existing instruments and performance of material properties and composition of measurements. Optical sensing is also facilitated by miniaturization, as low cost charge coupled device (CCD) array devices and micro engineering enable smaller, smarter sensors. ISSN: 2231-5381 Traffic Control Vehicle traffic monitoring and control is a major problem which can be easily tackled by Sensor networks. Most traffic intersections have either overhead or buried sensors to detect vehicles and control traffic lights. Furthermore, video cameras are frequently used to monitor road segments with heavy traffic, with the video sent to human operators at central locations. However, these sensors and the communication network that connect them are costly; thus, traffic monitoring is generally limited to a few critical points. Inexpensive wireless ad hoc networks will completely change the landscape of traffic monitoring and control. Cheap sensors with embedded networking capability can be deployed at every road intersection to detect and count vehicle traffic and estimate its speed. The sensors will communicate with neighbouring nodes to develop a “global traffic picture” which can be queried by human operators or automated algorithms. ATTACKS ON WIRELESS SENSOR NETWORKS The following are the types of attacks on wireless sensor networks:1. Denial of service (DOS) Attack 2. Protocol specific Attack 3. Impersonation Attack 4. Node compromise 5. Common Attacks Denial of Service (DOS) Attack A Denial of Service attack on WSN may have several forms. One is jamming attack, in which an attacker jams the communication channel and avoids any member of the network in the affected area to send or receive any packet. The other one is node collaboration, in which a set of nodes act maliciously and prevent broadcast messages from reaching certain sections of the sensor networks. The third one includes power exhaustion, in which an attacker repeatedly requests packets from sensors to reduce their battery life. Protocol specific Attack The attacks which were against routing protocols in WSN are: Corruption of the internal control information such as the routing tables called as Spoofed routing information, the other is selective forwarding of the packets that traverse a malicious node depending on some criteria called as Selective forwarding, Creation of a wormhole that captures the information at one location and replays them in another location either unchanged or tampered called as Wormhole attack, Hello flood attack- creation of false control packets during the deployment of the network. http://www.ijettjournal.org Page 1444 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 Impersonation and Node replication Attack discrete monitoring could drastically understanding of our physical environment. It is the most common attack which can be launched using compromised node, in which a malicious node impersonates a legitimate node and uses its identity to mount an active attack such as node replication. In a Node Replication attack, a single node takes on multiple identities to deceive or divert other nodes. On the other hand, the node replication attack is the duplication of sensor nodes. The term compromised is yet to be said when an attacker gains control or access to the sensor node itself after it has been deployed. Certain severe and complex attacks can be easily launched from compromised nodes, since the subverted node is a full- fledged member of the sensor network. [12] SIEMENS, TC35i Hardware Interface Description [M]. April 14,20 Rajesh, N.N.Ramesh and S.M.Prakhya 2010. Wireless sensor detection and notification system. International conference on mechanical and electrical technology. The IEEE website. [Online]. Available: http://www.ieee.org/ An Wireless Network Device. M.Rajendra Prasad, P.Aswani Kumari paper published in IJTEL. http://en.wikipedia.org/wiki/networks http://www.libelium.com/wireless_sensor_networks_to_detec_forest_fi res/ http://en.wikipedia.org/wiki/Applications of sensors Sensor networks:Evolution,Oppurtunities and Challenges by chee yee chong and srikanta P.kumar J. Hill, R. Szewczyk, A, Woo, S. Hollar, D. Culler, and K. Pister, System Architecture Directions for Networked Sensors, ASPLOS, November 2000. A.D. Wood and J.A. Stankovic, (2002) “Denial of Service in Sensor Networks,” Computer, vol. 35, no. 10, 2002, pp. 54– 62. Culler, D. E and Hong, W., “Wireless Sensor Networks”, Communication of the ACM, Vol. 47, No. 6, June 2004, pp. 30-33. J. R. Douceur,(2002) “The Sybil Attack,” in 1st International Workshop [13] on Peer-to-Peer Systems (IPTPS ‟02). An overview of wireless sensor networks S.Prasanna,Srinivasa rao [3] [4] [5] [6] [7] [8] Common Attacks Certain common attacks like eavesdropping which is an adversary that can easily retrieve valuable data from the transmitted packets that are sent. The second common attack is Message modification which includes the adversary can intercept the packets and modify them. The third common attack is message replay which is the adversary that can retransmit the contents of the packets at a later time. our REFERENCES [1] [2] Node compromise Attack enhance [9] [10] [11] MEASURES FOR COUNTERING ATTACKS AND THREATS A Vast amount of research is being done in this sector nowadays. We need to use Strong encryption Techniques and Time Stamps are to be used. A proper authentication is a key defence. A trusted key server or base station is used for the authentication of nodes for encrypted communications. Verifying the bidirectionality of the local links before using them is effective. V. CONCLUSION Technological advances in the past decade have completely changed the situation. MEMS technology, more reliable wireless communication, and low price manufacturing have resulted in small, inexpensive, and powerful sensors with embedded technical processing and wireless networking ability. Such wireless sensor networks can be used in many modern applications, ranging from environmental monitoring to industrial sensing, as well as traditional military applications. In fact, the applications are only limited by our imagination. Networks of small, possibly microscopic sensors embedded in the fabric of society in buildings and machinery, and even on people, performing automated continual and ISSN: 2231-5381 BIOGRAPHY Kolipaka Sai Sandeep# was born in 1992 in Krishna District. He is currently pursing B.Tech Electronics degree from K L University. He is interested in TeleCommunication and Embedded Systems. Email:sandeep.ece9@gmail.com Suresh Angadi* is presently working as a Asst.Professor in K L University. He received his B.Tech degree in electronics and communication in G.V.P College of Engineering, vizag, 2007 and completed M.tech in National Institute of Technology in 2009, Bhopal. His area of interest is communication systems. Email: Suresh.a@kluniversity.in http://www.ijettjournal.org Page 1445