SlideShare uma empresa Scribd logo
1 de 19
DISTRIBUTED
SENSOR
NETWORK
Sensor network:
• It consists of multiple detection stations called
sensor node
• It is equipped with a transducer,
microcomputer & transceiver and power
source.
• In sensor networks is basic on the defense
application at the beginning, especially the
Distributed Sensor Networks (DSN).
Types of sensor network:
• There are many types of sensors.
• They are used to measure and/or detect
a huge variety of conditions
Some are:
• Common sensor
• Bandwidth monitoring sensor
• Web server (HTTP) sensor
• SNMP sensor etc..
Distributed sensor network:
The implementation of sensor network using
distributed control architecture
Reasons:
• Sensor nodes are prone to failure
• For better collection of data
• To provide nodes with backup in case of
failure of the central node
History:
• In 1978,Defence Advanced Research Project
Agency developed Distributed sensor
network.
Standards:
There are a number of standardization bodies
in the field of WSNs including WAVE2M and
IEEE
Operating system:
• Operating systems such as eCos or
μC/OS used for sensor networks.
• TinyOS is perhaps the first operating
system for WSN
• LiteOS and Contiki are the other new
operating systems
Hardware:
• WSN is to produce low cost and tiny sensor
nodes.
• Node contains: radio, battery, microcontroller,
analog circuit, and sensor interface.
Software:
Algorithms and protocols need to address
the following issues:
• Lifetime maximization
• Robustness and fault tolerance
• Self-configuration
Working:
Layers used in data transmission:
Characteristics:
• Power consumption using batteries or energy
harvesting
• Ability to cope with node failures
• Mobility of nodes
• Dynamic network topology
• Scalability to large scale of deployment
• Ability to withstand harsh environmental
conditions
• Ease of use
Routing technique:
Security Requirements:
• Authentication
• Secrecy
• Countermeasures
• Key Establishment
Application:
It consists of spatially distributed autonomous
sensors to monitor physical or environmental
conditions.
Military application:
Services:
• Battlefield surveillance
• Targeting
• Battle damage assessment
• Nuclear, biological and
chemical attack detection
Environmental Application:
• habitat monitoring
• agriculture research
• fire detection
• traffic control.
• no interruption to the
environment
Health Applications:
• Widely used in health care area
• Monitor patient physiological
data.
• To control the drug
administration track.
Recent development of Home
Applications:
• Home application will step into our normal life
in the future.
Conclusion:
• The features of distributed sensor
network is developing abruptly.
• DSN has many advantages and is used in
several fields.
“It is going to make an evolution in
the Technology world”.
By,
I. Madhumithah
V. Kalpana
M.Sc(CS)
G.VENKATASWAMY
NAIDU COLLEGE

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
Cloud Security Mechanisms
Cloud Security MechanismsCloud Security Mechanisms
Cloud Security Mechanisms
 
DDBMS Paper with Solution
DDBMS Paper with SolutionDDBMS Paper with Solution
DDBMS Paper with Solution
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
S/MIME
S/MIMES/MIME
S/MIME
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
CS9222 Advanced Operating System
CS9222 Advanced Operating SystemCS9222 Advanced Operating System
CS9222 Advanced Operating System
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Windows Security Crash Course
Windows Security Crash CourseWindows Security Crash Course
Windows Security Crash Course
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Web Security
Web SecurityWeb Security
Web Security
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
CLOUD COMPUTING UNIT-1
CLOUD COMPUTING UNIT-1CLOUD COMPUTING UNIT-1
CLOUD COMPUTING UNIT-1
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 

Destaque

PFC_Analysis of IEEE 802.15.4 in WBSN
PFC_Analysis of IEEE 802.15.4 in WBSNPFC_Analysis of IEEE 802.15.4 in WBSN
PFC_Analysis of IEEE 802.15.4 in WBSNmanuay
 
Framework for preserving security and privacy in peer-to-peer content distrib...
Framework for preserving security and privacy in peer-to-peer content distrib...Framework for preserving security and privacy in peer-to-peer content distrib...
Framework for preserving security and privacy in peer-to-peer content distrib...UOC Universitat Oberta de Catalunya
 
Quality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksQuality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksIffat Anjum
 
Integrated modeling and simulation framework for wireless sensor networks
Integrated modeling and simulation framework for wireless sensor networksIntegrated modeling and simulation framework for wireless sensor networks
Integrated modeling and simulation framework for wireless sensor networksDaniele Gianni
 
MICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMyo Naung Lwin
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 

Destaque (8)

PFC_Analysis of IEEE 802.15.4 in WBSN
PFC_Analysis of IEEE 802.15.4 in WBSNPFC_Analysis of IEEE 802.15.4 in WBSN
PFC_Analysis of IEEE 802.15.4 in WBSN
 
Framework for preserving security and privacy in peer-to-peer content distrib...
Framework for preserving security and privacy in peer-to-peer content distrib...Framework for preserving security and privacy in peer-to-peer content distrib...
Framework for preserving security and privacy in peer-to-peer content distrib...
 
Quality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksQuality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networks
 
Ecg
EcgEcg
Ecg
 
Integrated modeling and simulation framework for wireless sensor networks
Integrated modeling and simulation framework for wireless sensor networksIntegrated modeling and simulation framework for wireless sensor networks
Integrated modeling and simulation framework for wireless sensor networks
 
MICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor Network
 
Wireless Body Sensor Networks
Wireless Body Sensor Networks Wireless Body Sensor Networks
Wireless Body Sensor Networks
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 

Semelhante a Distributed sensor network

Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxJavaTech1
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksGokuldhev mony
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areasAmulya Anu
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Yogesh Fulara
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey915086731
 
An overview of a wireless sensor network communication
An overview of a wireless sensor network communicationAn overview of a wireless sensor network communication
An overview of a wireless sensor network communicationphbhagwat
 
An overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication pptAn overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication pptphbhagwat
 
Module 1 Lec 1-6- WSN-EC6128.pdf
Module 1 Lec 1-6- WSN-EC6128.pdfModule 1 Lec 1-6- WSN-EC6128.pdf
Module 1 Lec 1-6- WSN-EC6128.pdfShreyaPandey184291
 
Living on the iot edge
Living on the iot edgeLiving on the iot edge
Living on the iot edgeSteve Mylroie
 
Enhancing the Performance of WSN
Enhancing the Performance of WSNEnhancing the Performance of WSN
Enhancing the Performance of WSNDheeraj Kumar
 

Semelhante a Distributed sensor network (20)

Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
LEACH Protocol
LEACH ProtocolLEACH Protocol
LEACH Protocol
 
Sem
SemSem
Sem
 
Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areas
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 
An overview of a wireless sensor network communication
An overview of a wireless sensor network communicationAn overview of a wireless sensor network communication
An overview of a wireless sensor network communication
 
An overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication pptAn overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication ppt
 
Module 1 Lec 1-6- WSN-EC6128.pdf
Module 1 Lec 1-6- WSN-EC6128.pdfModule 1 Lec 1-6- WSN-EC6128.pdf
Module 1 Lec 1-6- WSN-EC6128.pdf
 
Living on the iot edge
Living on the iot edgeLiving on the iot edge
Living on the iot edge
 
IDS WSN.ppt
IDS WSN.pptIDS WSN.ppt
IDS WSN.ppt
 
TinyOS Course 00: Introduction to WSN
TinyOS Course 00: Introduction to WSNTinyOS Course 00: Introduction to WSN
TinyOS Course 00: Introduction to WSN
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Wsn handbook
Wsn handbookWsn handbook
Wsn handbook
 
Enhancing the Performance of WSN
Enhancing the Performance of WSNEnhancing the Performance of WSN
Enhancing the Performance of WSN
 

Mais de Madhumithah Ilango (9)

Project confiration-letter-sample
Project confiration-letter-sampleProject confiration-letter-sample
Project confiration-letter-sample
 
4 g technology
4 g technology4 g technology
4 g technology
 
Network security
Network security Network security
Network security
 
Clientserver
ClientserverClientserver
Clientserver
 
Bit info
Bit infoBit info
Bit info
 
Network simulator
Network  simulatorNetwork  simulator
Network simulator
 
Network security
Network security Network security
Network security
 
Gps
GpsGps
Gps
 
4 g technology
4 g technology4 g technology
4 g technology
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Distributed sensor network

  • 2. Sensor network: • It consists of multiple detection stations called sensor node • It is equipped with a transducer, microcomputer & transceiver and power source. • In sensor networks is basic on the defense application at the beginning, especially the Distributed Sensor Networks (DSN).
  • 3. Types of sensor network: • There are many types of sensors. • They are used to measure and/or detect a huge variety of conditions Some are: • Common sensor • Bandwidth monitoring sensor • Web server (HTTP) sensor • SNMP sensor etc..
  • 4. Distributed sensor network: The implementation of sensor network using distributed control architecture Reasons: • Sensor nodes are prone to failure • For better collection of data • To provide nodes with backup in case of failure of the central node
  • 5. History: • In 1978,Defence Advanced Research Project Agency developed Distributed sensor network. Standards: There are a number of standardization bodies in the field of WSNs including WAVE2M and IEEE
  • 6. Operating system: • Operating systems such as eCos or μC/OS used for sensor networks. • TinyOS is perhaps the first operating system for WSN • LiteOS and Contiki are the other new operating systems
  • 7. Hardware: • WSN is to produce low cost and tiny sensor nodes. • Node contains: radio, battery, microcontroller, analog circuit, and sensor interface. Software: Algorithms and protocols need to address the following issues: • Lifetime maximization • Robustness and fault tolerance • Self-configuration
  • 9. Layers used in data transmission:
  • 10. Characteristics: • Power consumption using batteries or energy harvesting • Ability to cope with node failures • Mobility of nodes • Dynamic network topology • Scalability to large scale of deployment • Ability to withstand harsh environmental conditions • Ease of use
  • 12. Security Requirements: • Authentication • Secrecy • Countermeasures • Key Establishment Application: It consists of spatially distributed autonomous sensors to monitor physical or environmental conditions.
  • 13.
  • 14. Military application: Services: • Battlefield surveillance • Targeting • Battle damage assessment • Nuclear, biological and chemical attack detection
  • 15. Environmental Application: • habitat monitoring • agriculture research • fire detection • traffic control. • no interruption to the environment
  • 16. Health Applications: • Widely used in health care area • Monitor patient physiological data. • To control the drug administration track.
  • 17. Recent development of Home Applications: • Home application will step into our normal life in the future.
  • 18. Conclusion: • The features of distributed sensor network is developing abruptly. • DSN has many advantages and is used in several fields. “It is going to make an evolution in the Technology world”.