Security in Wireless Sensor Networks – Lab Report Example

Download full paperFile format: .doc, available for editing

The paper “ Security in Wireless Sensor Networks” is an actual example of a lab report on information technology. The WSN technology was, initially, arrived at as a way of facilitating the operations of the armed forces; however, its objectives have ever since been extending to the medical, traffic, and various consumers and industrial sectors. The WSN setup comprises of everywhere from some a hundred to more than a thousand of the sensor nodes. These sensor nodes equipment comprise of the radio transceivers alongside the antennae, microcontrollers, interfacing electronic circuits, as well as the energy sources, especially the batteries.

The sizes of these sensor nodes might similarly be ranging from the sizes of the shoeboxes to a smaller value that is equivalent to the grains of the dust. Perse, the prices of these WSNs are varying from at least a few pennies to as much as the hundreds of US dollars. The prices vary according to the functionality factors of the sensors such as the energy consumed, computational speed rates, bandwidths, and their memory. The Wireless sensor network technology is gradually becoming popular as a result of their likely cheaper solutions to the various real-global challenges.

Their lower costs provide means deploying large sensor arrays within various conditions that have the capability of executing both the military and national chores. However, the sensor networks, in addition, introduce an enormous resource constraint as a result of their absence of information storage and power. All these are a representation of the main hindrances to the realization of the conventional computer security approach within the wireless sensor networks. The undependable communication channels, as well as the unattended operations, have also been making the security defense to be more unreliable.

Indeed, wireless sensors, usually, comprise of the processing properties of the machines that are at least a decade old, and the industrial tendency is Reducing the charges of the wireless sensors at the same time as to maintain the same computing power. Having this in focus, studies are being carried out while addressing the challenges associated with the optimization of the processing abilities and energy banks of the wireless sensor nodes. The abovementioned studies are carried at the same time ensuring that they are secure from the potential attackers.

Various features of the wireless sensor networks have been studied comprising of secured and efficient routing, data aggregation, and group formation. Since the security of the transmitted data is a matter of concern, this paper has reviewed ten academic journals that are addressing this matter. The paper has started by introducing the meaning of the term wireless sensor networks and goes forth to state the various factors that result in the insecurity of the transmitted data. We have also researched and reported on various methods that are being used in combating the current insecurity of data in the wireless sensor networks.

The paper also points out our proposed approach to the security matter of the transmitted data. Security in Wireless Sensor NetworksThe term wireless sensor network (WSN) is when referring to any collection of the spatially single and committed sensor. The system is used in monitoring and recording the physical conditions of the setup and is used in organizing the data that has been collected at a central place.

A WSN measures environmental situations like temperatures, sound, pollution level, dampness, wind velocity and course, pressure, etc [1].

Reference

List

1. Yun Li and Jian Ren. Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks. INFOCOM, 2010 Proceedings IEEE, Vol 1, 2010, pp 1-9

2. Daniel Sora. Security Issues in Wireless Sensor Networks, Vol 6, 2010, No 4

3. Magno, M.; Boyle, D.; Brunelli, D.; O'Flynn, B.; Popovici, E.; Benini, L. "Extended Wireless Monitoring Through Intelligent Hybrid Energy Supply". IEEE Transactions on Industrial Electronics 61 (4): 1871. 2014, 23-46

4. Muaz Niazi and Amir Hussain. A Novel Agent-Based Simulation Framework for Sensing in Complex Adaptive Environments. IEEE Sensors Journal, Vol.11 No. 2, 2011, 404–412

5. Min Chen, Sergio Gonzalez, Yan Zhang, Victor C. M. Leung. Multi-Agent Itinerary Planning for Wireless Sensor Networks, Volume 22, 2009, pp 584-597

6. Zhen, B., Li, H. -B., and Kohno, R. “Networking issues in medical implant communications”. International Journal of Multimedia and Ubiquitous Engineering. 4(1), January 2009.

7. Moshaddique Al Ameen, Jingwei Liu & Kyungsup Kwak, Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications, vol 1, 2010, 93-101

8. Ashraf, A., Rajput, A., Mussadiq, M., Chowdhry, B. S., and Hashmi, M. “SNR based digital estimation of security in wireless

sensor networks”. In Communications Infrastructure. Systems and Applications in Europe, Vol. 16, 2009, 35–45.

9. Zhu, X., Fang, Y., and Wang, Y., “How to secure multi-domain wireless mesh networks”. Wireless Networks, July 2009.

10. Ma, D., Soriente, C., and Tsudik, G., “New adversary and new Threats”: Security in unattended sensor networks. IEEE Netw. 23 (2), 2009, 43–48.

Download full paperFile format: .doc, available for editing
Contact Us