Sense-Response Applications
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
23-09-2008, 12:46 AM


Sensor networks are widely being used for sense-response applications. The role of the sensor nodes in such applications is to monitor an area for events of interest and report the occurrence of the event to the base-station. The receipt of the event at the base-station is followed by a prompt physical response. An example of a sense-response application is the detection of fires in a forest. The sensor nodes report the occurrence of a fire upon which fire trucks are immediately dispatched to the location of the fire. Other examples of sense-response applications are intruder detection and apprehension, natural disaster monitoring, structural integrity monitoring, bio/chemical spill monitoring and containment etc.

Sensor nodes in sense-response applications are deployed with overlapping sensing regions to avoid holes in the coverage area. Thus an event is detected by more than one sensor node in the neighborhood of its occurrence. The base-station exploits this redundancy by responding to only those in the network. This is mainly done in order to avoid any false positives in the event generation process, i.e., an event is reported though it never occurred. However, this requires every sensor node to transmit a message to the base-station for every event that is detected, which expends a lot of energy. An alternative (that is often used in practice) is to have all the sensor nodes in the neighborhood of an event reach a consensus and have only one of the nodes transmit an event detection message to the base-station that implicitly contains the testimony of every node that detected the event. Sensor networks are often deployed in public and untrustworthy places. In some cases, they are also deployed in hostile areas.

The wireless medium of communication in sensor networks prevents any form of access control mechanism at the physical layer. The adversary can very easily introduce spurious messages in the network containing a false event report. This leads to energy wastage of the nodes in the network and also wastage of resources due to the physical response initiated by the base station in response to the false event report. A simple solution to thwart such attacks is to use a system wide secret key coupled with explicit authentication mechanisms. However, this solution fails to protect against internal attacks where the adversary has compromised a subset of sensor nodes.

Sensor nodes are designed to be cheap and cannot be equipped with expensive tamper-proof hardware. This coupled with the unmanned operation of the network leaves the nodes at the mercy of an adversary who can potentially steal some nodes, recover their cryptographic material, and pose them as authorized nodes in the network. We hereby refer to such nodes as internal adversaries. Internal adversaries are capable of launching more sophisticated attacks, where by posing to be real authenticated nodes, they can also suppress the generation of a message for any real event that is detected. This effectively renders the entire system to be useless.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Intelligent Systems and Applications in IT Management pdf study tips 0 662 22-02-2013, 03:59 PM
Last Post: study tips
  Data Mining In Telemedicine Applications PPT seminar flower 0 1,099 06-09-2012, 01:01 PM
Last Post: seminar flower
  2D-3D POSE INVARIANT FACE RECOGNITION SYSTEM FOR MULTIMEDIA APPLICATIONS seminar flower 0 566 01-06-2012, 11:01 AM
Last Post: seminar flower
  Technologies for Virtual Reality/Tele-Immersion Applications: Issues of Research .... uploader 0 447 16-05-2012, 12:02 PM
Last Post: uploader
  Phase Spectra Analysis for Signal Recognition and Sequencing Applications seminar ideas 0 549 11-05-2012, 01:37 PM
Last Post: seminar ideas
  Theory of Image Analysis : Applications and Implications in the present Global ..... uploader 0 454 11-05-2012, 01:01 PM
Last Post: uploader
  Interactive voice response system project uploader 0 510 04-05-2012, 11:56 AM
Last Post: project uploader
  How to formulate image processing applications project uploader 0 458 01-05-2012, 11:03 AM
Last Post: project uploader
  GRADIENT PROFILE PRIOR AND ITS APPLICATIONS IN IMAGE SUPER-RESOLUTION AND ENHANCEMENT seminar paper 0 771 12-04-2012, 01:11 PM
Last Post: seminar paper
  System Interface for an Integrated Intelligent Safety System for Vehicle Applications project uploader 0 475 19-03-2012, 10:52 AM
Last Post: project uploader