Evolution of Wireless Micro Sensors and their Applications.

advertisement
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013
Evolution of Wireless Micro Sensors and their
Applications.
Kolipaka Sai Sandeep#, Suresh Angadi*,
#
*
Final Year B.Tech, Dept. of ECE, KL University, Vaddeswaram, AP, India
Assistant Professor, Dept. of ECE, KL University, Vaddeswaram, AP, India
Abstract—One of the most important evolution of the modern era
is Wireless Sensors Technology. This paper discusses the history
of research in sensor networks over the past three decades.
Technologies and those trends which impact the development of
sensor networks are concentrated and new applications such as
infrastructural security, habitat monitoring, and mainly traffic
control are presented. Technical challenges related to sensor
networks and their developments include network discovery,
controlling and routing, collaborative signal and information
processing, tasking and security. This paper concludes by
presenting few recent reviews related to sensor networks,
including challenges in wireless networks and also the
applications of wireless networks
Keywords— Micro Sensors, wireless networks, network routing.
I. INTRODUCTION
The technology which is a key technology for the future is
Networked micro sensors technology. Devices which cheap
and smart with multiple onboard sensors, networked through
several wireless links and the Internet which are deployed in
large numbers, provide unprecedented platform and
opportunities for instrumentation, controlling homes, cities,
and the environment. In addition, wireless networked micro
sensors provides an evolutionary technology for a vast
spectrum of systems in the defense arena, generating new
capabilities for surveillance and technical as well as other
tactical applications.
Modern Sensors like Smart disposable micro sensors that
can be deployed on the ground, in the air, under water, on
bodies, in vehicles, and inside buildings and certain
environmental conditions, agricultural lands. A system of
networked sensors can detect and track threats (e.g., winged
and wheeled vehicles, personnel, chemical and biological
agents, intruders, confidential data) and be used for weapon
targeting and area denial. Each sensor node will have
embedded processing capability, and will potentially have
multiple onboard sensors, operating in the acoustic, seismic,
infrared (IR), and magnetic modes, as well as imagers and
micro radars and also. Also onboard will be storage, wireless
links to neighbouring nodes, and location and positioning
knowledge through the global positioning system (GPS) or
local positioning algorithms.
The general family of sensor networks that use multiple
distributed sensors to collect information on areas of interest
and they include Networked micro sensors. Present and
ISSN: 2231-5381
crucial applications of sensor networks include: military
sensing, physical security, air traffic control, traffic
surveillance, video surveillance, industrial and manufacturing
automation, distributed robotics, environment monitoring, and
building and structures monitoring, Medical applications,
atmospheric observance. The sensors included in these
applications can be small or large, and the networks may be
wired or wireless. However, common wireless networks of
micro sensors probably offer the most potential in changing
the world of sensing.
While sensor networks for various applications may be
quite different, they share common technical issues and also
problems. This paper will give a Brief history of research in
sensor networks, technology trends, new applications,
research issues and difficult problems, and few examples of
research results and also gives the importance of sensors in
this modern era
II. REVIEW IN SENSOR NETWORKS
The development of sensor networks requires technologies
from three different research areas: sensing, communication,
and computing (includes hardware, software, and algorithms).
Combined and separate advancements in each of these areas
have driven research issues to sensor networks. Early sensor
networks include the radar networks used in air traffic control
and certain Defence applications. The national power grid,
with its many sensors, can be viewed as one large sensor network. These systems were developed with specialized
computers and communication capabilities, and before the
term “sensor networks” came into vogue.
A. Evolution of Military Sensor Networks in the 1980s
and 1990s
Even though early researchers on sensor networks had in
mind large numbers of small sensors, the technology for small
sensors was not quite ready. However, planners of military
systems quickly recognized the benefits of sensor networks,
which become a crucial component of network centric warfare
certain advancements, are to be done. In platform-centric
warfare, platforms “own” specific weapons, which in turn
own sensors in a fairly rigid architecture and which those are
different than the normal applications. To say that, sensors
and weapons are mounted with and controlled by separate
http://www.ijettjournal.org
Page 1442
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013
platforms that operates independently. In network centric
warfare, sensors need not to be necessarily belonging to
weapons or platforms. Instead, they collaborate with each
other over a communication network, and information is sent
to the appropriate “shooters.” Sensor networks can improve
detection and tracking performance through multiple
observations, geometric and phenomenological diversity,
extended detection range, and faster response time. Also, the
development cost is lower by exploiting commercial network
technology and common network interfaces.
B. Sensing Network Research in the 21st Century
Recent advances in computing and communication
have caused a significant shift in sensor network research and
brought it closer to achieving the actual vision. Small and
inexpensive sensors based upon micro electro mechanical
system (MEMS) technology, wireless networking, and
costless low-power processors allow the deployment of
wireless ad hoc networks for various applications
Defence Advanced Research Projects Agency
(DAPRA) pursued two key research and development thrusts.
New networking techniques have been developed primarily.
In the battlefield context, these sensor devices or nodes should
be ready for rapid deployment, in an ad-hoc fashion, and in
highly dynamic environments. Modern day’s networking
techniques, developed for voice and data and relying on a
fixed infrastructure will not suffice for battlefield use. Thus,
the program developed new networking techniques suitable
for highly dynamic ad-hoc environments. The second thrust
was networked information processing, i.e., how to extract
useful, reliable, and timely information from the deployed
sensor network. This implies leveraging the distributed
computing environment created by these sensors for signal
and information processing in the network, and for dynamic
and interactive querying and tasking the sensor network.
Sens IT generated new capabilities relative to today’s
sensors. Current systems such as the Tactical Automated
Security System (TASS) for perimeter security are dedicated
rather than programmable. They use technologies based on
transmit only nodes and a long range detection paradigm. Sens
IT networks have new capabilities. The networks are
interactive and programmable with dynamic tasking and
querying. A multitasking feature in the system allows multiple
simultaneous users. Finally, since detection ranges are much
shorter in a sensor system, the software and algorithms can
exploit the proximity of devices to threats to drastically
improve the accuracy of detection and tracking. The software
and the overall system design supports low latency, energyefficient operation, built in autonomy and survivability, and
low probability of detection of operation. As a result, a
network of Sens IT nodes can support detection,
identification, and tracking of threats, as well as targeting and
communication, both within the network and to outside the
network, such as an overhead asset.
ISSN: 2231-5381
.
III. TECHNOLOGY TRENDS
Current sensor networks can exploit technologies that are
not available 20 years ago and perform functions that were not
even imagined or dreamed of at that time. Sensors, processors,
and communication devices are all getting much smaller and
cheaper. Commercial companies such as Ember, Crossbow,
and Sensoria are now building and deploying small sensor
nodes and systems. These companies provide a vision of how
our daily lives will be enhanced through a network of small,
embedded sensor nodes. In addition to products from these
companies, commercial off-the-shelf personal digital
assistants (PDAs) using Palm or Pocket PC operating systems
contain significant computing power in a small package.
These can easily be “ruggedized” to become processing nodes
in a sensor network. Some of these devices even have built-in
sensing capabilities, such as cameras. These powerful
processors can be hooked to MEMS devices and machines
along with extensive databases and communication platforms
to bring about a new era of technologically sophisticated
sensor nets.
Wireless Networks
Wireless networks based upon IEEE 802.11 standards
can now provide bandwidth approaching those of wired
networks. At the same time, the IEEE has noticed the low
expense and high capabilities that sensor networks offer. The
organization has defined the IEEE 802.15 standard for
personal area networks (PANs), with “personal net-works”
defined to have a radius of 5 to 10 m. Networks of short-range
sensors are the ideal technology to be employed in PANs. The
IEEE encouragement of the development of technologies and
algorithms for such short ranges ensures continued
development of low cost sensor nets. Further-more, increases
in chip capacity and processor production capabilities have
reduced the energy per bit requirement for both computing
and
communication.
Sensing,
computing,
and
communications can now be performed on a single chip,
further reducing the cost and allowing deployment in ever
larger numbers.
IV. NEW ERA APPLICATIONS
Research on sensor networks was originally motivated by
military applications. Examples of military sensor networks
range from large scale acoustic surveillance systems for ocean
surveillance to small networks of unattended ground sensors
for ground target detection. However, the availability of lowcost sensors and communication networks has resulted in the
development of many other potential applications, from
infrastructure security to industrial sensing. The following are
a few examples.
http://www.ijettjournal.org
Page 1443
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013
Health Grounds
Nowadays Wireless sensor networks are being used to
monitor and track elders, patients for health care purposes,
which can significantly relieve the severe shortage of health
care personnel and reduce the health care expenditures in the
current health care systems. These sensors have created great
changes in medical environment. For example sensors can be
deployed in a patient’s home to monitor the behaviours of the
patient. It can alert doctors when the patient falls and requires
immediate medical attention.
Home Intelligence and office applications
Wireless sensor networks can be used to provide more
convenient and secure living environments for human beings.
For example, wireless sensors can be used to automatically
read utility meters in a home like water, gas, electricity and
then send the readings to a remote centre through wireless
communication. It also provides theft security and fire alarms.
Agriculture and Food Industry
One of the innovative and inspirational sectors includes this
industry; using a wireless network helps the farmers from the
maintenance of wiring in a difficult environment. Certain
monitoring systems like Gravity feed water systems can be
monitored using pressure transmitters to monitor water tank
levels, they can be controlled using wireless I/O devices and
water use can be measured and wirelessly transmitted back to
a central control for billing. Modernization of irrigation
enables more efficient water use and reduces waste and is
more helpful to the farmers.
Modern Industrial Sensing
This industry encourages the sensors systems and
companies researching in this sector economically. More
amount of research work is encouraged for better outputs and
efficient production for industries. Monitoring machine
“health” through determination of vibration or wear and
lubrication levels, and the insertion of sensors into regions
inaccessible by humans, are just two examples of industrial
applications of sensors. Remote and wireless sensors in
particular can enable a factory to be instrumented after the fact
to ensure the maintain compliance with federal safety and
guidelines while keeping installation costs low. Spectral
sensors are one of the examples of sensing in an industrial
environment. From simple optical devices such as optrodes
and pH probes to true spectral devices that can function as
miniature spectrometers, optical sensors can replace existing
instruments and performance of material properties and
composition of measurements. Optical sensing is also
facilitated by miniaturization, as low cost charge coupled
device (CCD) array devices and micro engineering enable
smaller, smarter sensors.
ISSN: 2231-5381
Traffic Control
Vehicle traffic monitoring and control is a major problem
which can be easily tackled by Sensor networks. Most traffic
intersections have either overhead or buried sensors to detect
vehicles and control traffic lights. Furthermore, video cameras
are frequently used to monitor road segments with heavy
traffic, with the video sent to human operators at central
locations. However, these sensors and the communication
network that connect them are costly; thus, traffic monitoring
is generally limited to a few critical points. Inexpensive
wireless ad hoc networks will completely change the
landscape of traffic monitoring and control. Cheap sensors
with embedded networking capability can be deployed at
every road intersection to detect and count vehicle traffic and
estimate its speed. The sensors will communicate with
neighbouring nodes to develop a “global traffic picture” which
can be queried by human operators or automated algorithms.
ATTACKS ON WIRELESS SENSOR NETWORKS
The following are the types of attacks on wireless sensor
networks:1. Denial of service (DOS) Attack
2. Protocol specific Attack
3. Impersonation Attack
4. Node compromise
5. Common Attacks
Denial of Service (DOS) Attack
A Denial of Service attack on WSN may have several
forms. One is jamming attack, in which an attacker jams the
communication channel and avoids any member of the
network in the affected area to send or receive any packet. The
other one is node collaboration, in which a set of nodes act
maliciously and prevent broadcast messages from reaching
certain sections of the sensor networks. The third one includes
power exhaustion, in which an attacker repeatedly requests
packets from sensors to reduce their battery life.
Protocol specific Attack
The attacks which were against routing protocols in WSN
are: Corruption of the internal control information such as the
routing tables called as Spoofed routing information, the other
is selective forwarding of the packets that traverse a malicious
node depending on some criteria called as Selective
forwarding, Creation of a wormhole that captures the
information at one location and replays them in another
location either unchanged or tampered called as Wormhole
attack, Hello flood attack- creation of false control packets
during the deployment of the network.
http://www.ijettjournal.org
Page 1444
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013
Impersonation and Node replication Attack
discrete monitoring could drastically
understanding of our physical environment.
It is the most common attack which can be launched using
compromised node, in which a malicious node impersonates a
legitimate node and uses its identity to mount an active attack
such as node replication. In a Node Replication attack, a
single node takes on multiple identities to deceive or divert
other nodes. On the other hand, the node replication attack is
the duplication of sensor nodes.
The term compromised is yet to be said when an attacker
gains control or access to the sensor node itself after it has
been deployed. Certain severe and complex attacks can be
easily launched from compromised nodes, since the subverted
node is a full- fledged member of the sensor network.
[12]
SIEMENS, TC35i Hardware Interface Description [M]. April 14,20
Rajesh, N.N.Ramesh and S.M.Prakhya 2010.
Wireless sensor detection and notification system. International
conference on mechanical and electrical technology.
The IEEE website. [Online]. Available: http://www.ieee.org/
An Wireless Network Device.
M.Rajendra Prasad, P.Aswani Kumari paper published in IJTEL.
http://en.wikipedia.org/wiki/networks
http://www.libelium.com/wireless_sensor_networks_to_detec_forest_fi
res/
http://en.wikipedia.org/wiki/Applications of sensors
Sensor networks:Evolution,Oppurtunities and Challenges by chee yee
chong and srikanta P.kumar
J. Hill, R. Szewczyk, A, Woo, S. Hollar, D. Culler, and K. Pister,
System Architecture Directions for Networked Sensors, ASPLOS,
November 2000.
A.D. Wood and J.A. Stankovic, (2002) “Denial of Service in Sensor
Networks,” Computer, vol. 35, no. 10, 2002, pp. 54– 62.
Culler, D. E and Hong, W., “Wireless Sensor Networks”,
Communication of the ACM, Vol. 47, No. 6, June 2004, pp. 30-33.
J. R. Douceur,(2002) “The Sybil Attack,” in 1st International Workshop
[13]
on Peer-to-Peer Systems (IPTPS ‟02).
An overview of wireless sensor networks S.Prasanna,Srinivasa rao
[3]
[4]
[5]
[6]
[7]
[8]
Common Attacks
Certain common attacks like eavesdropping which is an
adversary that can easily retrieve valuable data from the
transmitted packets that are sent. The second common attack
is Message modification which includes the adversary can
intercept the packets and modify them. The third common
attack is message replay which is the adversary that can
retransmit the contents of the packets at a later time.
our
REFERENCES
[1]
[2]
Node compromise Attack
enhance
[9]
[10]
[11]
MEASURES FOR COUNTERING ATTACKS AND THREATS
A Vast amount of research is being done in this sector
nowadays. We need to use Strong encryption Techniques and
Time Stamps are to be used. A proper authentication is a key
defence. A trusted key server or base station is used for the
authentication of nodes for encrypted communications.
Verifying the bidirectionality of the local links before using
them is effective.
V. CONCLUSION
Technological advances in the past decade have
completely changed the situation. MEMS technology, more
reliable wireless communication, and low price manufacturing
have resulted in small, inexpensive, and powerful sensors with
embedded technical processing and wireless networking
ability. Such wireless sensor networks can be used in many
modern applications, ranging from environmental monitoring
to industrial sensing, as well as traditional military
applications. In fact, the applications are only limited by our
imagination. Networks of small, possibly microscopic sensors
embedded in the fabric of society in buildings and machinery,
and even on people, performing automated continual and
ISSN: 2231-5381
BIOGRAPHY
Kolipaka Sai Sandeep# was born in 1992 in
Krishna District. He is currently pursing
B.Tech Electronics degree from
K L University. He is interested in TeleCommunication and Embedded Systems.
Email:sandeep.ece9@gmail.com
Suresh Angadi* is presently working as a
Asst.Professor in K L University. He
received his B.Tech degree in electronics
and communication in G.V.P College of
Engineering, vizag, 2007 and completed
M.tech in National Institute of Technology
in 2009, Bhopal. His area of interest is
communication systems.
Email: Suresh.a@kluniversity.in
http://www.ijettjournal.org
Page 1445
Download