Thread Rating:
  • 1 Vote(s) - 1 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Sense-Response Applications
Post: #1

Sensor networks are widely being used for sense-response applications. The role of the sensor nodes in such applications is to monitor an area for events of interest and report the occurrence of the event to the base-station. The receipt of the event at the base-station is followed by a prompt physical response. An example of a sense-response application is the detection of fires in a forest. The sensor nodes report the occurrence of a fire upon which fire trucks are immediately dispatched to the location of the fire. Other examples of sense-response applications are intruder detection and apprehension, natural disaster monitoring, structural integrity monitoring, bio/chemical spill monitoring and containment etc.

Sensor nodes in sense-response applications are deployed with overlapping sensing regions to avoid holes in the coverage area. Thus an event is detected by more than one sensor node in the neighborhood of its occurrence. The base-station exploits this redundancy by responding to only those in the network. This is mainly done in order to avoid any false positives in the event generation process, i.e., an event is reported though it never occurred. However, this requires every sensor node to transmit a message to the base-station for every event that is detected, which expends a lot of energy. An alternative (that is often used in practice) is to have all the sensor nodes in the neighborhood of an event reach a consensus and have only one of the nodes transmit an event detection message to the base-station that implicitly contains the testimony of every node that detected the event. Sensor networks are often deployed in public and untrustworthy places. In some cases, they are also deployed in hostile areas.

The wireless medium of communication in sensor networks prevents any form of access control mechanism at the physical layer. The adversary can very easily introduce spurious messages in the network containing a false event report. This leads to energy wastage of the nodes in the network and also wastage of resources due to the physical response initiated by the base station in response to the false event report. A simple solution to thwart such attacks is to use a system wide secret key coupled with explicit authentication mechanisms. However, this solution fails to protect against internal attacks where the adversary has compromised a subset of sensor nodes.

Sensor nodes are designed to be cheap and cannot be equipped with expensive tamper-proof hardware. This coupled with the unmanned operation of the network leaves the nodes at the mercy of an adversary who can potentially steal some nodes, recover their cryptographic material, and pose them as authorized nodes in the network. We hereby refer to such nodes as internal adversaries. Internal adversaries are capable of launching more sophisticated attacks, where by posing to be real authenticated nodes, they can also suppress the generation of a message for any real event that is detected. This effectively renders the entire system to be useless.
Post: #2
will u please send the full report of this topic to the ad 'delightaml[at]'
Post: #3

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: micropumps applications**ok download in hindi, applications of fpaa, electrohydrodynamic micropumps, sence response applications, www latare sangbad coms applications, f response, applications of otical chemoflague,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  3D computer graphics and applications electronics seminars 2 3,070 31-10-2012 01:09 PM
Last Post: seminar details
  Ontology Description using OWL to Support Semantic Web Applications computer girl 0 474 09-06-2012 02:25 PM
Last Post: computer girl
  Automated and distributed management applications with Jiro technology computer girl 0 516 08-06-2012 12:25 PM
Last Post: computer girl
  Digital watermarking: algorithms and applications computer science topics 1 3,166 02-03-2012 10:20 AM
Last Post: seminar paper
  Finding Bugs in Web Applications Using Dynamic Test Generation and Explicit-State Mod seminar surveyer 2 1,672 14-02-2012 12:55 PM
Last Post: seminar paper
  AJAX - A New Approach to Web Applications computer science crazy 8 5,894 14-02-2012 12:55 PM
Last Post: seminar paper
  Data Mining Applications In E-Commerce Full Download Seminar Report and Paper Present computer science crazy 2 3,937 14-02-2012 10:45 AM
Last Post: seminar paper
  BAR CODE TECHNOLOGY AND ITS APPLICATIONS seminar class 2 2,029 19-01-2012 10:41 AM
Last Post: seminar addict
Last Post: Yogesh A. Chorey
  A Solution to Privacy Issues in RFID Item-level Applications full report seminar class 0 846 14-05-2011 10:48 AM
Last Post: seminar class