A WSN consists of a large number of sensor nodes that are inherently resource-constrained
devices. These nodes have limited processing capability, very low storage capacity, and
constrained communication bandwidth. These constraints are due to limited energy and
physical size of the sensor nodes. Due to these constraints, it is difficult to directly employ the
conventional security mechanisms in WSNs.
a) Limited memory: A sensor is a tiny device with only a small amount of memory and
storage space. Memory is a sensor node usually includes flash memory and RAM. Flash
memory is used for storing downloaded application code and RAM is used for storing
application programs, sensor data, and intermediate results of computations. There is usually
not enough space to run complicated algorithms after loading the OS and application code.
b) Limited power: Energy is the biggest constraint for a WSN. In general, energy
consumption in sensor nodes can be categorized in three parts: (i) energy for the sensor
transducer, (ii) energy for communication among sensor nodes, and (iii) energy for
microprocessor computation.
c) Unreliable communication: Unreliable communication is another serious threat to sensor
security. Normally the packet-based routing of sensor networks is based on connectionless
protocols and thus inherently unreliable. Packets may get damaged due to channel errors or
may get dropped at highly congested nodes.
d) Higher latency in communication: In a WSN, multi-hop routing, network congestion and
processing in the intermediate nodes may lead to higher latency in packet transmission.
e) Unattended operations: Unattended operation of networks: In most cases, the nodes in a WSN are deployed in
remote regions and are left unattended. The likelihood that a sensor encounters a physical
attack in such an environment is therefore, very high. Remote management of a WSN makes it
virtually impossible to detect physical tampering.
f) Achieving synchronization between nodes is also another issue.
g) Node failure, topology changes and adding of nodes and deletion of nodes is
another challenging issue.
h) Because of its transmission nature and hostile environment, security is a
challenging issue.
i) Based on the applications, sensor node has to be chosen with respect to
computation rate.
No comments:
Post a Comment