ebook img

Wireless Sensor Networks: Security, Coverage, and Localization PDF

223 Pages·2016·5.678 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Wireless Sensor Networks: Security, Coverage, and Localization

Rastko R. Selmic · Vir V. Phoha Abdul Serwadda Wireless Sensor Networks Security, Coverage, and Localization Wireless Sensor Networks Rastko R. Selmic Vir V. Phoha (cid:129) Abdul Serwadda Wireless Sensor Networks Security, Coverage, and Localization 123 RastkoR. Selmic AbdulSerwadda LouisianaTech University Department ofComputer Science Ruston, LA Texas TechUniversity USA Lubbock,TX USA VirV.Phoha Department ofElectrical Engineeringand Computer Science Syracuse University Syracuse,NY USA ISBN978-3-319-46767-2 ISBN978-3-319-46769-6 (eBook) DOI 10.1007/978-3-319-46769-6 LibraryofCongressControlNumber:2016952013 ©SpringerInternationalPublishingAG2016 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission orinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodologynowknownorhereafterdeveloped. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfrom therelevantprotectivelawsandregulationsandthereforefreeforgeneraluse. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authorsortheeditorsgiveawarranty,expressorimplied,withrespecttothematerialcontainedhereinor foranyerrorsoromissionsthatmayhavebeenmade. Printedonacid-freepaper ThisSpringerimprintispublishedbySpringerNature TheregisteredcompanyisSpringerInternationalPublishingAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland To Sue, Mila, Maksim, and Taylor. To Li, Shiela, Rekha, Krishan, and Vivek. Preface Sensorsrepresentabasicbuildingblockoftechnologysystemswedependmuchon in our daily activities such as mobile phones, smart watches, smart cars, home appliances, etc. To date Wireless Sensor Networks (WSNs) represent perhaps the mostwidelydeployedandhighlyexplorednetworksthatusesensorsaspartoftheir systems. It is through such a network that sensors communicate, share and fuse information, and thus provide foundations for applications such as large scale monitoring, surveillance, home automation, etc. With the advent of Internet of Things (IoT) and wearable devices embedded with sensors, new and exciting applications of WSNs have emerged. We expect a greater convergence of WSNs with these exciting new and emerging technologies such as the IoT. Through this book, we not only present a structural treatment of the building blocks of WSNs, which include hardware and protocols architectures, but we also presentsystems-level viewofhowWSNsoperateincludingsecurity,coverageand connectivity,andlocalizationandtracking.Onecanusetheseblockstounderstand and build complex applications or pursue research in yet open research problems. The areas are wide: how one may deploy the wireless sensor nodes? How sensor nodes within the wireless network communicate with each other? What is their architecture? What are the security issues? And many more questions and their answers are provided for general engineering and science audience. The purpose of writing this book is to give a systematic treatment of founda- tionalprinciplesofWSNs.Webelievethatthistreatmentprovidestoolstobuildor program specialized applications and conduct research in advanced topics of WSNs. Since each of us has academicexperiences, we presentthe material from a pedagogicalviewwitheachchapterprovidingalistofreferencesandalistofshort questionsandexercises.Thefieldisgrowingatsuchrapidpacethatitisimpossible tocoverallnewdevelopments;therefore,eachchapterprovidesinformationwitha balance towards pedagogy, research advances, and an enough introduction of important concepts, such that an interested reader should she be interested to explore further can then refer to cited papers in the references. vii viii Preface Ourdiscussionsinthebookaremotivatedbydemandsofapplications,thusmost of the material, especially in the later chapters, has applications in areas where sensor networks may be used or deployed. Anystudentwithauniversityundergraduateeducationinmathematics,physics, computer science, or engineering will feel comfortable following the material. Readers primarily interested in qualitative concepts rather than the underlying mathematics or the programming of WSNs can skip the more mathematical parts without missing the core concepts. The book can serve a basis for one-semester to two-semester course in WSNs. OnecanfocusonWSNfoundationsorWSNsecurityorcoverageandcontrol.We suggest the following: (cid:129) One-semester course with a focus on coverage and control of WSNs: Chaps. 1–3, 5, 6, and 8. (cid:129) One-semestercoursewithafocusonsecurityofWSNs:Chaps.1,2,4,7,and8. (cid:129) One-semester course with a focus on foundations of WSNs: Chaps. 1–3, 5, and 7. (cid:129) One-semester course with a focus on WSN hardware: Chaps. 1–3, 5, and 8. For a two-semester sequence, one can pick and choose the chapters. For example, one scenario may be as follows: follow first three chapters in the first semester supplemented by parts of chapters on security, coverage or control. Amore appliedcourse may include Chap. 8in thefirst semesterreplacing fullyor partially the content from security, coverage, and control. In the second semester, Chaps. 4–6 can be covered supplemented by course projects. The book is organized as follows. Chapter 1 provides foundations and gives a general description of WSNs, most commonapplicationwhereWSNsareusedandcommoncommunicationprotocols that are basis for a WSN. Chapter 2 covers background material needed to understand WSN topology, protocols, routing, coverage, etc. We include basic mathematical models that are usedlaterinthebooksuchasVoronoidiagramsandDelaunaytriangulations.This chapter is recommended to be studied before coverage and connectivity or local- ization and tracking are covered. Chapter 3 presents a WSN architecture including both hardware structure and functionaldetailsofallmajorcomponentsinthesensornodeandalayerednetwork architecture and description of various protocols. When we discuss hardware components, we present each building block of a sensor node and their important functional principles. For instance, we list important and common sensors that engineersandscientistmightencounterwhendealingwithWSNs,anddiscusstheir sensing principles. Similarly, when we discuss medium access protocols, we talk about common protocols that are currently in use. Chapters 1–3 cover a basic background related to WSNs. Chapter 4 is a more focused material related to WSN security issues. Why are WSN predisposed to various security threats and what are the most important vulnerabilities? We cover basic attack and defense strategies that are applicable to a WSN. When discussing Preface ix security,robustnessofthenetworkiscloselyrelatedtosensorfaults,propersensor faultdetectionandmitigation.Maliciousdataononesensornodecanbeinterpreted and detected as a fault within the next hop in multi-hop network. Chapter 5 presents coverage and connectivity, two related characteristics of the networkandimportantqualityofservicemeasures.Wediscussbasicmathematical models for coverage and connectivity and then study more in-depth theoretical conceptsrelatedtocoverageholes.Thisisalsoimportantfromthesecuritypointof viewwhereanycoverageholeinthesensornetworkmightrepresentavulnerability point. Chapter 6 covers another advanced topics—localization and tracking as well as important algorithms that are used today in such applications. Chapter 7 provides a quality of service overview. Here we acknowledge that some quality of service measures are already covered in other chapters, such as coverage, and we discuss in more details only such measures that have not been covered previously. Chapter 8 presents WSN platforms that are in use, some that have more of a historic value at the moment, and some that witnessed their own evolution into other closely related products. We have tried to find a balance between simplicity, depth of treatment, and coveringenoughmaterialwithouttheriskofappearingsuperficial.Wehopethatwe have succeeded in this endeavor. A part of the research covered in the book was supported by the Air Force Research Laboratory (AFRL) at WPAFB, Sensors Directorate. We thank Todd JenkinsandAtindraMitra(late)atAFRL.Weacknowledgethehelpandsupportof Jinko Kanno in preparing material included in the Coverage and Connectivity chapter and Md Enam Karim in preparing material for the QoS chapter. We appreciate the help, support, and guidance of Jennifer Malat and Susan Lagerstrom-Fife from Springer in preparing this book. Ruston, USA Rastko R. Selmic Syracuse, USA Vir V. Phoha Lubbock, USA Abdul Serwadda Contents 1 Introduction.... .... .... ..... .... .... .... .... .... ..... .... 1 1.1 Sensor Networks. .... ..... .... .... .... .... .... ..... .... 2 1.2 Wireless Sensor Networks .. .... .... .... .... .... ..... .... 7 1.2.1 Historical Perspective, Aloha Networks.. .... ..... .... 7 1.2.2 Background on Wireless Sensor Networks ... ..... .... 8 1.3 WSN Applications ... ..... .... .... .... .... .... ..... .... 12 1.4 WSN Common Communication Standards.. .... .... ..... .... 17 Questions and Exercises ... ..... .... .... .... .... .... ..... .... 19 References.. .... .... .... ..... .... .... .... .... .... ..... .... 20 2 Topology, Routing, and Modeling Tools .. .... .... .... ..... .... 23 2.1 Topology and Routing Protocols in WSNs.. .... .... ..... .... 23 2.1.1 Topology in WSNs. .... .... .... .... .... ..... .... 23 2.1.2 Routing Protocols in WSNs .. .... .... .... ..... .... 24 2.2 Modeling Tools . .... ..... .... .... .... .... .... ..... .... 30 2.2.1 Voronoi Diagrams.. .... .... .... .... .... ..... .... 30 2.2.2 Delaunay Triangulations . .... .... .... .... ..... .... 33 Questions and Exercises ... ..... .... .... .... .... .... ..... .... 35 References.. .... .... .... ..... .... .... .... .... .... ..... .... 35 3 WSN Architecture... .... ..... .... .... .... .... .... ..... .... 37 3.1 Components of a Wireless Sensor Node.... .... .... ..... .... 38 3.1.1 Sensors and Actuators... .... .... .... .... ..... .... 39 3.1.2 Microcontrollers and Microprocessors... .... ..... .... 54 3.1.3 Radios Transceivers and Antennas . .... .... ..... .... 64 3.2 Layered Network Architecture ... .... .... .... .... ..... .... 67 3.2.1 Physical Layer..... .... .... .... .... .... ..... .... 68 3.2.2 Link Layer .. ..... .... .... .... .... .... ..... .... 69 3.2.3 Medium Access Protocols in WSNs .... .... ..... .... 70 3.2.4 Network Layer .... .... .... .... .... .... ..... .... 74 3.2.5 Transport Layer.... .... .... .... .... .... ..... .... 74 xi xii Contents Questions and Exercises ... ..... .... .... .... .... .... ..... .... 78 References.. .... .... .... ..... .... .... .... .... .... ..... .... 79 4 Security in WSNs ... .... ..... .... .... .... .... .... ..... .... 83 4.1 Why WSNs are Predisposed to Attacks? ... .... .... ..... .... 83 4.2 Security Requirements ..... .... .... .... .... .... ..... .... 84 4.3 WSN Attacks and Defenses . .... .... .... .... .... ..... .... 86 4.3.1 Physical Layer Attacks .. .... .... .... .... ..... .... 86 4.3.2 Physical Layer Defenses . .... .... .... .... ..... .... 87 4.3.3 Link Layer Attacks . .... .... .... .... .... ..... .... 88 4.3.4 Link Layer Defenses.... .... .... .... .... ..... .... 88 4.3.5 Network Layer Attacks.. .... .... .... .... ..... .... 89 4.3.6 Network Layer Defenses. .... .... .... .... ..... .... 92 4.3.7 Transport Layer Attacks . .... .... .... .... ..... .... 92 4.3.8 Transport Layer Defenses .... .... .... .... ..... .... 92 4.3.9 Application Layer Attacks.... .... .... .... ..... .... 93 4.3.10 Application Layer Defenses... .... .... .... ..... .... 93 4.4 Cryptography in Sensor Networks .... .... .... .... ..... .... 94 4.4.1 Symmetric Key Cryptography in WSNs . .... ..... .... 94 4.4.2 Asymmetric Key Cryptography in WSNs .... ..... .... 97 4.5 Faults in WSNs . .... ..... .... .... .... .... .... ..... .... 98 4.5.1 Fault-Aware WSNs. .... .... .... .... .... ..... .... 98 4.5.2 Sensor Faults in WSNs.. .... .... .... .... ..... .... 99 4.5.3 Mathematical Models for Sensor Faults.. .... ..... .... 102 Questions and Exercises ... ..... .... .... .... .... .... ..... .... 111 References.. .... .... .... ..... .... .... .... .... .... ..... .... 112 5 Coverage and Connectivity..... .... .... .... .... .... ..... .... 117 5.1 Modeling Sensor Networks Using Graphs .. .... .... ..... .... 118 5.1.1 Communication Graphs.. .... .... .... .... ..... .... 119 5.2 Coverage .. .... .... ..... .... .... .... .... .... ..... .... 122 5.2.1 Coverage Holes.... .... .... .... .... .... ..... .... 124 5.3 Connectivity.... .... ..... .... .... .... .... .... ..... .... 127 5.3.1 Graph Laplacian ... .... .... .... .... .... ..... .... 129 5.4 Coverage Models Using Voronoi Diagrams. .... .... ..... .... 133 5.5 Simplicial Complexes. ..... .... .... .... .... .... ..... .... 134 5.5.1 From WSNs to Simplicial Complexes... .... ..... .... 135 5.5.2 Comparison of Čech Complex and Rips Complex .. .... 137 5.5.3 Subcomplexes with Planar Topology.... .... ..... .... 139 5.6 Simplicial Homology and Coverage Holes.. .... .... ..... .... 141 5.7 K-Coverage. .... .... ..... .... .... .... .... .... ..... .... 144 5.8 Coverage Control.... ..... .... .... .... .... .... ..... .... 145 Questions and Exercises ... ..... .... .... .... .... .... ..... .... 149 References.. .... .... .... ..... .... .... .... .... .... ..... .... 150

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.