Pages

This blog is under construction

Wednesday, May 8, 2019

Issues And Challenges In Designing WSN

A WSN consists of a large number of sensor nodes that are inherently resource-constrained devices. These nodes have limited processing capability, very low storage capacity, and constrained communication bandwidth. These constraints are due to limited energy and physical size of the sensor nodes. Due to these constraints, it is difficult to directly employ the conventional security mechanisms in WSNs.

a) Limited memory: A sensor is a tiny device with only a small amount of memory and storage space. Memory is a sensor node usually includes flash memory and RAM. Flash memory is used for storing downloaded application code and RAM is used for storing application programs, sensor data, and intermediate results of computations. There is usually not enough space to run complicated algorithms after loading the OS and application code.

b) Limited power:  Energy is the biggest constraint for a WSN. In general, energy consumption in sensor nodes can be categorized in three parts: (i) energy for the sensor transducer, (ii) energy for communication among sensor nodes, and (iii) energy for microprocessor computation.

c) Unreliable communication: Unreliable communication is another serious threat to sensor security. Normally the packet-based routing of sensor networks is based on connectionless protocols and thus inherently unreliable. Packets may get damaged due to channel errors or may get dropped at highly congested nodes.

d) Higher latency in communication: In a WSN, multi-hop routing, network congestion and processing in the intermediate nodes may lead to higher latency in packet transmission. 

e) Unattended operations: Unattended operation of networks: In most cases, the nodes in a WSN are deployed in remote regions and are left unattended. The likelihood that a sensor encounters a physical attack in such an environment is therefore, very high. Remote management of a WSN makes it virtually impossible to detect physical tampering. 

f) Achieving synchronization between nodes is also another issue. 
g) Node failure, topology changes and adding of nodes and deletion of nodes is another challenging issue. 
h) Because of its transmission nature and hostile environment, security is a challenging issue. 
i) Based on the applications, sensor node has to be chosen with respect to computation rate.

No comments:

Post a Comment