90 likes | 107 Views
This project aims to implement and estimate the cost of adding security features to wireless sensor network (WSN) routing protocols. Mathematical models will be used to estimate the extra energy consumption of routing protocols due to security features, and empirical values will be compared to validate the model.
E N D
Implement and Estimating Cost of Security in Wireless Sensor network’s Routing Protocols using PPECEM Model A wireless sensor network (WSN) essentially ad hoc networks consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location
WSN consists of 3 module • Sensor module collects the observations from surrounding environmental analog information such as light, sound, shocks, etc, converts it to the digital signal via the analog to digital converter (ADC), and then transfers to the processor unit • Processor module manages the cooperation between the units in the sensor, the collaborations between other WSN nodes in the network. • Wireless communication module communicate between WSN nodes and Base Station
Applications of WSN • Sensor Web/ Sensor Grid, Internet of things,M2M • Ubiquitous Computing : Smart home/Cities, smart meter, smart TV/appliances,. • Future with GrapheneSmart dust is hot. • Message Queue Telemetry Transport (MQTT). Used by Facebook,IBM smart planet initiatives • Already in use Disaster management, Alternative energy , health monitoring, agriculture, defense.
Energy Most critical in WSN • WSN nodes are very small and design is dominates by size of battery. WSN are using various technology like energy harvesting ,piezoelectric material technology to reduce size of battery. • Power consumption in sensor networks can be divided into three domains: sensing, communication and data processing. • Router node consume more power than leaf nodes. Due to unbalanced energy consumption, WSN nodes on busy routing paths may drain their batteries faster than other nodes, Energy aware routing is important.
(Routing) Protocols classification • data-centric: like directed diffusion, sensor protocols for information via negotiation (SPIN) and power aware many-to-many routing fall into this category • cluster-based: Low-energy adaptive clustering hierarchy (LEACH) is an example of a cluster-based sensor network routing algorithm. • location-based: minimum energy communication network (MECN) and geographic adaptive fidelity (GAF) are location-based routing algorithms.
Practical Routing Protocol Energy Consumption Estimation Model (PPECEM) • QOverall= QCPU + QRadioTrans + QRadioRcv • QCPU= PCPU * TCPU= PCPU * (BEnc * TBEnc + BDec * TBDec +BMac * TBMac+ TRadioActive). • PX in Eq. 2 represents the power of device X. • TX means the computation time of device X • TBY denotes the per-byte time consumed for doing operation Y. • BY indicates the amount of bytes to be computed by operation Y • Enc, Dec and Mac denote the encryption, decryption, and MAC digest generation operations respectively • TRadioActive represents the radio transceiver’s active time, as the processor module remains active while the radio chip is turned on. • QRadioTrans = PRadioTrans * (KTrans * BTrans + TStartup) • QRadioRcv = PRadioRcv * (KRcv * BRcv + TIdle)
Project Goals • Decide the price of adding security to WSN routing protocols or further estimate the network lifetime of their WSNs • Mathematical models used to estimate extra energy consumption of routing protocols due to security features in WSN. • Empirical values and physical actual values are compared to validate model for different routing protocols.