Sense-Response Applications
Thread Rating:
  • 1 Vote(s) - 1 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
22-09-2008, 10:14 AM


Sensor networks are widely being used for sense-response applications. The role of the sensor nodes in such applications is to monitor an area for events of interest and report the occurrence of the event to the base-station. The receipt of the event at the base-station is followed by a prompt physical response. An example of a sense-response application is the detection of fires in a forest. The sensor nodes report the occurrence of a fire upon which fire trucks are immediately dispatched to the location of the fire. Other examples of sense-response applications are intruder detection and apprehension, natural disaster monitoring, structural integrity monitoring, bio/chemical spill monitoring and containment etc.

Sensor nodes in sense-response applications are deployed with overlapping sensing regions to avoid holes in the coverage area. Thus an event is detected by more than one sensor node in the neighborhood of its occurrence. The base-station exploits this redundancy by responding to only those in the network. This is mainly done in order to avoid any false positives in the event generation process, i.e., an event is reported though it never occurred. However, this requires every sensor node to transmit a message to the base-station for every event that is detected, which expends a lot of energy. An alternative (that is often used in practice) is to have all the sensor nodes in the neighborhood of an event reach a consensus and have only one of the nodes transmit an event detection message to the base-station that implicitly contains the testimony of every node that detected the event. Sensor networks are often deployed in public and untrustworthy places. In some cases, they are also deployed in hostile areas.

The wireless medium of communication in sensor networks prevents any form of access control mechanism at the physical layer. The adversary can very easily introduce spurious messages in the network containing a false event report. This leads to energy wastage of the nodes in the network and also wastage of resources due to the physical response initiated by the base station in response to the false event report. A simple solution to thwart such attacks is to use a system wide secret key coupled with explicit authentication mechanisms. However, this solution fails to protect against internal attacks where the adversary has compromised a subset of sensor nodes.

Sensor nodes are designed to be cheap and cannot be equipped with expensive tamper-proof hardware. This coupled with the unmanned operation of the network leaves the nodes at the mercy of an adversary who can potentially steal some nodes, recover their cryptographic material, and pose them as authorized nodes in the network. We hereby refer to such nodes as internal adversaries. Internal adversaries are capable of launching more sophisticated attacks, where by posing to be real authenticated nodes, they can also suppress the generation of a message for any real event that is detected. This effectively renders the entire system to be useless.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
delightaml
Active In SP
**

Posts: 1
Joined: Jul 2009
#2
19-07-2009, 08:25 AM

will u please send the full report of this topic to the ad 'delightaml@yahoo.co.in'
Reply
p.diljith
Active In SP
**

Posts: 5
Joined: Jul 2009
#3
19-07-2009, 11:36 AM

thankds
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  nanochemistry applications ppt jaseelati 0 258 18-12-2014, 02:11 PM
Last Post: jaseelati
  Computer Science and Applications seminar ideas 2 6,675 20-03-2014, 04:28 PM
Last Post: navasfiroz
  An Artificial Neural Networks Primer with Financial Applications Examples seminar projects maker 0 472 14-09-2013, 04:49 PM
Last Post: seminar projects maker
  Offloading Android Applications to the Cloud without Customizing Android pdf seminar projects maker 0 371 13-09-2013, 03:14 PM
Last Post: seminar projects maker
  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications study tips 0 387 22-08-2013, 03:29 PM
Last Post: study tips
  Embedded Palm Device For Guiding Applications Using ARM-7 and RFID Techniques. seminar paper 1 1,012 12-08-2013, 11:07 PM
Last Post: tamilarasi.k
  Double Guard: Detecting intrusions in multitier web applications seminar flower 5 3,211 30-07-2013, 09:47 AM
Last Post: study tips
  MILITARY APPLICATIONS OF GIS pdf study tips 0 332 28-06-2013, 02:24 PM
Last Post: study tips
  Report on Wireless WAN Applications study tips 0 250 27-06-2013, 03:30 PM
Last Post: study tips
  Content-Addressable memory (CAM) and its network applications pdf study tips 0 307 24-06-2013, 03:52 PM
Last Post: study tips