0% found this document useful (0 votes)
45 views19 pages

WSN Pyq

Uploaded by

snehasharma8840
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views19 pages

WSN Pyq

Uploaded by

snehasharma8840
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

2. (a) Point out the challenges for WSNs. State few characteristic requirements Of WSNs.

Ans – Sure, here are some challenges for Wireless Sensor Networks (WSNs):

Challenges:

1. **Limited Energy:** Sensor nodes often have limited battery power, requiring energy-efficient
protocols and strategies.

2. **Network Scalability:** WSNs can consist of a large number of nodes, making network scalability a
challenge for efficient management.

3. **Node Deployment:** Proper placement of nodes is crucial for optimal coverage and connectivity.

4. **Data Aggregation:** Efficiently aggregating data from multiple sensors while minimizing energy
consumption is a challenge.

5. **Data Security:** WSNs often handle sensitive data, making security and encryption vital to protect
against unauthorized access.

6. **Node Mobility:** If nodes are mobile, maintaining connectivity and managing handoffs can be
challenging.

7. **Fault Tolerance:** Due to node failures or environmental factors, maintaining network reliability is
important.

8. **Communication Constraints:** Wireless communication can be affected by interference, signal


attenuation, and path loss.

Characteristic Requirements:

1. **Energy Efficiency:** To prolong network lifetime, nodes should consume minimal energy.

2. **Distributed Processing:** WSNs often involve distributed data processing and decision-making.

3. **Self-Organization:** Nodes should autonomously organize into an operational network without


centralized control.

4. **Adaptability:** The network should adapt to changing conditions and requirements.

5. **Data Aggregation:** Reducing redundant data transmission through aggregation helps conserve
energy.

6. **Real-time Communication:** Some applications require timely data transmission for real-time
monitoring.

7. **Scalability:** The network should handle a varying number of nodes while maintaining efficiency.
8. **Security:** Secure communication and data protection are essential to prevent unauthorized
access.

9. **Fault Tolerance:** The network should continue to function properly even in the presence of node
failures.

b) Illustrate in detail about efficient routing protocolsmechanisms for WSNs.With flooding.

Ans - Efficient routing protocols are crucial for Wireless Sensor Networks (WSNs) to ensure energy
conservation, low latency, and reliable data delivery. One of the simplest routing mechanisms is flooding,
where a message is broadcasted by a source node to all its neighbors, and those neighbors repeat the
process until the entire network is covered. However, flooding can lead to inefficient energy usage and
network congestion due to redundant transmissions. To address these issues, various enhancements and
protocols have been developed.

**1. **Directed Diffusion:**

Directed Diffusion is a data-centric approach where data is named and interests are propagated in the
network. Nodes that have the required data respond to interests, and data is then directed towards the
sink. This approach reduces redundant transmissions and enables data-centric routing.

**2. **LEACH (Low Energy Adaptive Clustering Hierarchy):**

LEACH is a cluster-based routing protocol that divides nodes into clusters with a designated cluster head
(CH). CHs aggregate data from their cluster members and transmit to a base station (sink). LEACH utilizes
randomized CH selection and rotation to balance energy consumption among nodes.

**3. **AODV (Ad-hoc On-Demand Distance Vector):**

While primarily designed for mobile ad hoc networks, AODV can also be adapted for WSNs. It establishes
routes on-demand, reducing control message overhead. Nodes maintain routing tables to establish paths
to the destination when needed.

**4. **TEEN (Threshold-sensitive Energy Efficient sensor Network protocol):**

TEEN operates by transmitting data only when a certain threshold is exceeded, conserving energy when
data is not vital. It is suitable for event-based applications where data is generated sporadically.

**5. **PEGASIS (Power-Efficient GAthering in Sensor Information Systems):**


PEGASIS creates a chain of nodes to transmit data, thereby minimizing long-distance transmissions and
utilizing cooperative communication. This approach reduces energy consumption and prolongs network
lifetime.

**6. **SPIN (Sensor Protocols for Information via Negotiation):**

SPIN uses negotiation between nodes to reduce communication overhead. Nodes advertise their data
availability, and other nodes request specific data if needed. This minimizes unnecessary data
transmissions.

**7. **Flooding with Area Coverage:**

To enhance flooding, WSNs can employ techniques like geographical forwarding. Instead of broadcasting
blindly, nodes forward data in the direction of the target area, minimizing redundant transmissions and
conserving energy.

**8. **Geo-Routing:**

Geo-routing exploits location information of nodes to route messages efficiently. Nodes calculate the
direction to the destination and relay the message to the node closest to the target direction.

While flooding has its drawbacks, combining it with mechanisms like selective forwarding, geographical
awareness, and energy-awareness can mitigate its issues and make it more efficient in certain scenarios.
However, for most practical cases, more sophisticated routing protocols like those mentioned above are
preferred due to their ability to balance energy consumption, reduce redundancy, and improve overall
network efficiency in WSNs.

Q3 - 3 Explain the classification of MAC protocol for WSN. Differentiate between S-MAC protocol and B-
MAC protocol in detail

Ans – MAC (Medium Access Control) protocols play a critical role in managing how nodes in a Wireless
Sensor Network (WSN) access the shared wireless medium for communication. These protocols
determine how nodes schedule their transmissions to avoid collisions and efficiently utilize the limited
resources of the network. MAC protocols can be classified into three main categories: contention-based,
schedule-based, and hybrid protocols.

**1. Contention-Based MAC Protocols:**


These protocols allow nodes to contend for access to the medium. Nodes transmit data whenever they
have it, leading to a potential for collisions. Examples include CSMA (Carrier Sense Multiple Access) and
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance).

**2. Schedule-Based MAC Protocols:**

These protocols pre-determine time slots during which nodes are allowed to transmit. TDMA (Time
Division Multiple Access) and FDMA (Frequency Division Multiple Access) are examples of schedule-
based protocols. This approach minimizes collisions and is useful in scenarios where nodes’ schedules
can be coordinated.

**3. Hybrid MAC Protocols:**

These protocols combine aspects of both contention-based and schedule-based approaches. They use
contention-based mechanisms to allocate slots for communication, providing some flexibility while
reducing collisions. Examples include Z-MAC and B-MAC.

Now, let’s differentiate between the S-MAC (Sensor-MAC) protocol and the B-MAC (Berkeley-MAC)
protocol in detail:

**S-MAC Protocol:**

S-MAC is a contention-based MAC protocol designed specifically for WSNs. It aims to reduce energy
consumption by putting nodes in sleep mode when they are not actively transmitting or receiving data.
The protocol operates in two main phases:

- **Sleep Phase:** Nodes periodically enter a low-power sleep mode to conserve energy. They listen for
a predefined “sync” message from their neighbors to synchronize their wake-up times.

- **Active Phase:** Nodes wake up in a synchronized manner and contend for the channel using CSMA.
They then communicate their data to neighbors.

S-MAC’s advantages include reduced idle listening and collisions, leading to energy efficiency. However, it
introduces synchronization overhead and might not be suitable for highly dynamic networks.

**B-MAC Protocol:**
B-MAC is another contention-based MAC protocol designed for low-power wireless communication in
WSNs. It focuses on minimizing energy consumption through adaptive duty cycling and preamble
sampling. Key features of B-MAC include:

- **Preamble Sampling:** B-MAC uses a short preamble followed by a long preamble. Nodes sample the
short preamble to determine if the channel is busy. If it is busy, nodes back off, reducing energy wastage.

- **Adaptive Duty Cycling:** B-MAC adjusts the duty cycle based on the traffic load. During periods of
low activity, nodes increase the duty cycle to ensure better responsiveness. During high activity, the duty
cycle is reduced to save energy.

B-MAC’s advantages include efficient channel utilization, reduced energy consumption, and adaptability
to varying traffic loads. However, it might not perform well in highly congested or noisy environments.

In summary, S-MAC and B-MAC are both contention-based MAC protocols designed to conserve energy
in WSNs. S-MAC focuses on synchronization and reducing idle listening, while B-MAC employs preamble
sampling and adaptive duty cycling to achieve energy efficiency. The choice between the two depends
on factors like network dynamics, traffic patterns, and the desired trade-off between energy savings and
protocol complexity.

4. (a) Explain the potential applications of wireless sensor networks.

Ans - **(a) Potential Applications of Wireless Sensor Networks:**

Wireless Sensor Networks (WSNs) have a wide range of potential applications due to their ability to
monitor, collect, and transmit data from the physical world. Here are some prominent application areas:

1. **Environmental Monitoring:** WSNs can monitor environmental parameters such as


temperature, humidity, air quality, and pollution levels in urban and rural areas. They’re used for
weather forecasting, disaster prediction, and ecological research.

2. **Healthcare:** WSNs enable continuous health monitoring of patients, tracking vital signs like
heart rate, body temperature, and blood pressure. They can be used for elderly care and
monitoring patients with chronic illnesses.
3. **Industrial Automation:** WSNs are used for real-time monitoring of industrial processes,
equipment condition, and production lines. They enhance efficiency, reduce downtime, and
ensure worker safety.

4. **Precision Agriculture:** WSNs help optimize crop management by monitoring soil conditions,
moisture levels, and crop health. This leads to efficient resource utilization and increased crop
yield.

5. **Structural Health Monitoring:** WSNs can monitor the condition of structures such as
bridges, dams, and buildings. They detect anomalies, cracks, and vibrations, ensuring early
maintenance and preventing failures.

6. **Smart Cities:** WSNs contribute to smart city initiatives by monitoring traffic, parking, energy
consumption, waste management, and public safety. They enhance urban planning and resource
allocation.

7. **Wildlife Tracking:** WSNs aid in tracking and studying animal behavior, migration patterns,
and habitat conditions. This is crucial for wildlife conservation efforts.

8. **Military and Surveillance:** WSNs provide battlefield surveillance, border security, and
situational awareness in military applications. They can also detect and respond to unauthorized
intrusions.

9. **Home Automation:** WSNs enable home automation by monitoring and controlling


appliances, lighting, security systems, and energy usage for improved convenience and energy
efficiency.

10. **Retail and Inventory Management:** WSNs are used for monitoring inventory levels, tracking
goods, and optimizing supply chains in retail and logistics sectors.
11. **Underwater Exploration:** WSNs are employed for oceanographic research, monitoring
underwater ecosystems, and exploring underwater resources.

(b) Explain hidden node and exposed node problem.

**(b) Hidden Node and Exposed Node Problems:**

Both the hidden node and exposed node problems arise in wireless communication scenarios and can
affect the performance of wireless networks, including Wireless Sensor Networks (WSNs):

1. **Hidden Node Problem:** This occurs when two nodes are within the range of a common
receiver but are out of range of each other. As a result, they cannot detect each other’s
transmissions and might transmit simultaneously, causing interference at the receiver. This leads
to packet collisions and reduced communication efficiency.

2. **Exposed Node Problem:** This occurs when a node refrains from transmitting due to
interference concerns even though the interfering node is actually out of the receiver’s range.
This can result in inefficient spectrum utilization, as nodes might unnecessarily delay their
transmissions.

These problems are typically addressed through mechanisms like the Request to Send/Clear to Send
(RTS/CTS) mechanism, which helps mitigate the hidden node problem by reserving the channel during
data transmission. Exposed node problems can be mitigated by using carrier sensing and dynamic
channel allocation techniques.

5. (a) What are the different types of localization techniques used in WSN?

Ans - **(a) Types of Localization Techniques in WSN:**

Localization in Wireless Sensor Networks (WSNs) refers to determining the physical locations of sensor
nodes. Accurate node localization is important for applications like target tracking, environmental
monitoring, and geographical routing. Different localization techniques are employed based on the
available hardware, network infrastructure, and desired accuracy. Here are some common types of
localization techniques:
1. **Range-based Techniques:** These methods use distance or signal strength measurements
between nodes to calculate their relative positions. Examples include Time of Flight (ToF) and
Received Signal Strength Indicator (RSSI) based methods.

2. **Range-free Techniques:** These methods do not rely on measuring distances directly but use
connectivity and communication patterns to estimate positions. Examples include DV-Hop,
Centroid, and Amorphous algorithms.

3. **Trilateration:** This technique determines a node’s position by intersecting circles or spheres


based on distance measurements from known reference points.

4. **Multilateration:** Similar to trilateration, multilateration uses distance measurements from


multiple reference points to estimate a node’s position in three-dimensional space.

5. **Angle of Arrival (AoA):** AoA techniques use the angles of incoming signals to determine a
node’s location. This requires specialized hardware with directional antennas.

6. **Time Difference of Arrival (TDoA):** TDoA calculates a node’s position based on the
differences in signal arrival times at multiple reference nodes.

7. **Fingerprinting:** This method creates a database of signal strength values at known locations.
A node’s position is then estimated by matching its observed signal strengths to the database.

(b) Explain the IEEE 802.15.4 and Zig Bee protocol.

**(b) IEEE 802.15.4 and Zigbee Protocol:**


IEEE 802.15.4 is a standard that defines the physical (PHY) and medium access control (MAC) layers for
low-rate wireless personal area networks (LR-WPANs). Zigbee is a communication protocol built on top
of the IEEE 802.15.4 standard. Here’s an explanation of both:

**IEEE 802.15.4:**

- **Physical Layer (PHY):** IEEE 802.15.4 supports multiple PHYs, including the 2.4 GHz band and sub-
GHz bands. It offers options for different data rates and ranges to accommodate various application
requirements.

- **MAC Layer:** The MAC layer defines mechanisms for channel access, beacon management, and
frame formats. It supports both beacon-enabled and non-beacon-enabled modes of communication.

**Zigbee Protocol:**

Zigbee builds upon the IEEE 802.15.4 standard, adding network and application layers to create a robust
communication framework. It is designed for low-power, low-data-rate, and short-range wireless
communication. Zigbee defines various device types:

- **Zigbee Coordinator:** The central node that initializes and manages the network.

- **Zigbee Router:** Intermediate nodes that relay data between end devices and the coordinator.

- **Zigbee End Device:** Nodes with limited capabilities that communicate through routers or the
coordinator.

Zigbee protocol features include:

- **Network Topologies:** Zigbee supports star, tree, and mesh network topologies, allowing flexible
network configurations.

- **Energy Efficiency:** Zigbee devices can operate on battery power for extended periods due to low-
duty-cycle communication.

- **Security:** Zigbee provides security mechanisms like encryption and authentication to ensure secure
communication.

- **Application Profiles:** Zigbee defines application profiles for specific use cases, such as home
automation, industrial control, and healthcare.

.Q6.With a neat diagram, explain the sensor network architecture.


Ans - I'm sorry, but I'm a text-based AI and I can't directly create visual diagrams. However, I can certainly
describe the typical sensor network architecture to you:

A Wireless Sensor Network (WSN) architecture generally consists of several components that work
together to enable communication and data processing. While I can't draw a diagram, I can describe the
key components:

1. **Sensor Nodes:** These are the fundamental building blocks of the network. Sensor nodes are
equipped with sensors to capture data from the environment. Each node typically contains a sensing
unit, a processing unit, a transceiver for wireless communication, and a power source (usually a battery).

2. **Sensor Network Coordinator (Sink):** This is a special node that acts as a central point for data
collection. It collects and aggregates data from sensor nodes and often has more processing power and
energy resources compared to regular sensor nodes.

3. **Communication Infrastructure:** The nodes communicate wirelessly using radio frequency signals.
They form an ad hoc network, where nodes can directly communicate with each other or route their
data through intermediate nodes to reach the coordinator.

4. **Data Aggregation Unit:** In large networks, intermediate nodes or cluster heads may perform data
aggregation. They collect data from multiple nodes and process or compress it before sending it to the
coordinator. This reduces the amount of data transmitted and conserves energy.

5. **Power Management:** Due to the limited energy resources of sensor nodes, power management is
crucial. Techniques like duty cycling (turning nodes on and off) and optimizing communication protocols
help prolong the network's lifetime.

6. **Localization and Tracking:** Some WSNs require the ability to determine the physical location of
nodes. This is achieved through various localization techniques, enabling applications like asset tracking
and target localization.

7. **Network Management:** This includes tasks like routing algorithms, network topology
maintenance, and addressing schemes. It ensures efficient data delivery and reliable communication
within the network.
8. **Application Specific Processing:** Depending on the application, nodes may perform specific
processing on the collected data before transmitting it. For instance, in environmental monitoring, nodes
might calculate averages or detect anomalies before sending data.

While I can't draw a visual diagram, you can search online for "Wireless Sensor Network Architecture" to
find visual representations that illustrate these components.

8. (a) Explain protocol. Energy efficient routing

**(a) Energy-Efficient Routing Protocol:**


An energy-efficient routing protocol in a Wireless Sensor Network (WSN) is a set of rules and algorithms
designed to optimize the use of energy resources while transmitting data among sensor nodes. The goal
is to prolong the network's lifetime by minimizing energy consumption during communication. Such
protocols are vital because sensor nodes often operate on limited battery power, and energy
conservation is crucial for the network's sustainability. Here are some strategies commonly used in
energy-efficient routing protocols:

1. **Data Aggregation:** Instead of sending raw data, nodes can aggregate and summarize data locally
before forwarding it. This reduces the amount of data transmitted and lowers energy consumption.

2. **Sleep Scheduling:** Nodes can be put into sleep mode when not actively transmitting or receiving.
Sleep scheduling mechanisms ensure that nodes wake up only when necessary, conserving energy
during idle periods.

3. **Multi-Hop Communication:** Instead of sending data directly to the base station, nodes relay data
through intermediate nodes. Shorter hops often consume less energy compared to transmitting over
longer distances.

4. **Load Balancing:** Distributing traffic evenly across the network helps prevent certain nodes from
becoming "hotspots" with excessive energy consumption.

5. **Adaptive Transmission Power:** Adjusting transmission power based on the distance to the
destination can help optimize energy usage. Nodes can use higher power for distant nodes and lower
power for nearby nodes.

6. **Energy-Aware Routing:** Selecting routes that involve nodes with more energy resources helps
balance energy consumption across the network.

7. **Duty Cycling:** Nodes periodically turn off their radios to conserve energy during idle periods. This
can be synchronized or asynchronous, depending on the protocol.

8. **Cross-Layer Design:** Coordinating actions between different layers of the protocol stack can lead
to more energy-efficient routing decisions.
**(b) Geo-Cast Routing Protocol:**

Geo-Cast is a routing protocol in WSNs designed for multicasting data to a specific geographical area.
Unlike unicast (point-to-point) and broadcast (to all nodes), geo-cast targets a specific geographic region,
allowing efficient data delivery to nodes in that area. Here's how it works:

1. **Region Specification:** The sender defines a geographical region (e.g., using coordinates or a
polygon) where the data should be delivered.

2. **Neighbor Discovery:** Nodes determine their geographic positions and exchange this information
with neighbors. This helps in building a local topology.

3. **Routing Decision:** Intermediate nodes determine if they fall within the specified region. If they
do, they forward the data. Otherwise, they do not participate in forwarding.

4. **Limited Flooding:** Geo-cast protocols usually involve controlled flooding within the specified
region. Nodes within the region relay the data, but those outside the region do not participate, reducing
unnecessary energy consumption.

5. **Dynamic Region Updates:** If the target region changes or if nodes move, the sender can
dynamically update the region specification.

Geo-cast protocols are useful in scenarios like wildlife monitoring, environmental event detection, and
disaster response, where data needs to be efficiently delivered to a specific geographical area.

Keep in mind that while geo-cast protocols can be energy-efficient for specific applications, they might
not be suitable for all scenarios, especially in highly dynamic environments or when precise geographic
targeting is challenging. (b) Explain in detail about the geo-cast routing protocol.

Q8 Explain in detail about the different localization mechanisms

Ans -
Localization in Wireless Sensor Networks (WSNs) involves determining the physical positions of sensor
nodes. Various localization mechanisms are employed based on factors like accuracy requirements,
available hardware, and network infrastructure. Here are the different types of localization mechanisms:

1. **Range-Based Techniques:**

- **Time of Flight (ToF):** This technique measures the time taken for a signal to travel between two
nodes. By knowing the signal propagation speed, the distance can be calculated. ToF requires
synchronized clocks and precise time measurements.

- **Received Signal Strength Indicator (RSSI):** RSSI-based methods estimate distances based on the
strength of received signals. As distance increases, signal strength decreases. However, RSSI is influenced
by interference and environmental factors.

2. **Range-Free Techniques:**

- **DV-Hop (Distance Vector Hop):** Nodes with known positions act as anchors. Nodes estimate their
distance to anchors, and distances are “hopped” to determine the position. It’s independent of signal
strength and requires no synchronization.

- **Amorphous:** This technique relies on connectivity information. Nodes use information about
neighbors to estimate their positions. It’s robust but less accurate than range-based methods.

3. **Trilateration:**

- **2D Trilateration:** Requires distance measurements from at least three anchor nodes. The
intersection of circles (or spheres in 3D) centered on anchor nodes gives the node’s position.

- **Multilateration:** Requires distance measurements from more than three anchor nodes. It uses a
geometric intersection to calculate the position, providing redundancy and accuracy.

4. **Angle of Arrival (AoA):**

- Nodes use directional antennas to estimate angles of incoming signals. By triangulating angle
information from multiple nodes, a node’s position can be determined.

5. **Time Difference of Arrival (TDoA):**

- Nodes measure the difference in signal arrival times at multiple reference nodes. By combining TDoA
measurements, a node’s position can be calculated.
6. **Fingerprinting:**

- A database of signal strength values is created for known locations. Nodes match their observed
signal strengths to the database to estimate their positions.

7. **Scene Analysis:**

- In visual sensor networks, scene analysis techniques use visual data to estimate node positions based
on landmarks, patterns, or known features in the environment.

8. **Mobile Beacon-Assisted Localization:**

- Mobile beacons with known positions move through the network. Nodes estimate their positions
based on their distance from these moving beacons.

9. **Collaborative Localization:**

- Nodes cooperate to estimate positions collectively. They exchange measurements and assist each
other in calculating positions.

It’s important to note that no single mechanism is perfect for all scenarios. The choice depends on
factors like accuracy, cost, energy consumption, and environmental conditions. Hybrid approaches that
combine multiple mechanisms or sensor modalities are often used to achieve higher accuracy and
reliability in WSN localization.

9. (a) State the deployment options for WSNs. What is data-centric network

Ans - **(a) Deployment Options for WSNs:**

Wireless Sensor Networks (WSNs) can be deployed in various configurations to suit different application
requirements. Here are some common deployment options:

1. **Random Deployment:** Nodes are scattered randomly within the target area. This is suitable
for scenarios where node placement precision is not critical. However, it can result in uneven
node density and coverage.
2. **Uniform Deployment:** Nodes are evenly distributed across the area. It provides better
coverage and reduces coverage gaps, but it might lead to inefficient resource utilization in some
cases.

3. **Grid Deployment:** Nodes are placed in a grid pattern, ensuring uniform coverage. This
approach is suitable for scenarios where the area can be divided into a grid.

4. **Gradient-Based Deployment:** Nodes are deployed along environmental gradients (e.g.,


temperature, humidity) to capture spatial variations. This is useful for environmental monitoring.

5. **Mobile Node Deployment:** Nodes are mobile and can move around to collect data from
different locations. This is common in scenarios like wildlife tracking.

6. **Clustered Deployment:** Nodes are organized into clusters, with a cluster head responsible
for aggregating and forwarding data to a base station. This improves scalability and energy
efficiency.

7. **Adaptive Deployment:** Nodes are deployed based on real-time conditions or events. For
example, nodes might be placed near a forest fire to monitor its spread.

8. **Anchor Node Deployment:** Nodes with known positions (anchor nodes) are deployed
strategically. Other nodes use measurements from these anchors for localization.

9. **Barrier Deployment:** Nodes are placed along a boundary or barrier, such as a river or a wall,
to monitor events or activities near the barrier.

10. **Mobile Sink Deployment:** A mobile sink or base station moves around the network area to
collect data from nodes. This can improve network lifetime and data delivery efficiency.
**(b) Data-Centric Network:**

A data-centric network (also known as a data-centric wireless sensor network) is a type of network
architecture where the focus is on the data itself rather than the individual sensor nodes. In a data-
centric network:

- **Data Naming:** Data is named based on its content or the type of information it represents. This
allows users or applications to request specific types of data.

- **Data Dissemination:** Instead of querying specific nodes, users or applications request data by its
name. The network forwards the request to nodes that have the relevant data, and they respond
accordingly.

- **Data Aggregation:** Data-centric networks often aggregate data at intermediate nodes before
transmitting it to a sink. This reduces the amount of data sent over the network, conserving energy and
bandwidth.

Data-centric networks are efficient for applications where the focus is on the data produced by the
network rather than the individual sensor nodes. Examples include environmental monitoring, where
users are interested in specific environmental parameters such as temperature, humidity, or pollution
levels. The architecture is well-suited for large-scale sensor networks where the sheer volume of data
generated requires efficient and organized data management and delivery.

(b) How to detect unauthorized activity using a sensor network

Ans -

Detecting unauthorized activities using a sensor network involves monitoring and analyzing sensor data
to identify deviations or patterns that indicate unauthorized access, intrusion, or abnormal behavior.
Here’s a general approach to detecting unauthorized activity using a sensor network:

1. **Sensor Selection and Placement:**

- Choose appropriate sensor types (e.g., motion sensors, acoustic sensors, vibration sensors) based on
the nature of the activity you want to detect.

- Determine optimal sensor placement to cover vulnerable entry points and critical areas.
2. **Data Collection and Preprocessing:**

- Sensors continuously collect data, such as motion patterns, sound levels, or temperature changes.

- Preprocess the raw sensor data to remove noise and outliers, ensuring the accuracy of the analysis.

3. **Baseline Establishment:**

- Establish a baseline or normal behavior pattern for each sensor node or area. This baseline represents
typical sensor readings during non-threatening situations.

4. **Anomaly Detection:**

- Compare real-time sensor data to the established baseline.

- If sensor readings deviate significantly from the baseline, it could indicate an unauthorized activity.

- Use statistical methods (e.g., mean, median, standard deviation) or machine learning algorithms to
detect anomalies.

5. **Thresholding:**

- Set threshold values that define the acceptable range of sensor readings.

- If sensor readings go beyond these thresholds, generate an alert indicating a potential unauthorized
activity.

6. **Multi-Sensor Fusion:**

- Combine data from multiple sensors to increase the accuracy of detection.

- Fusion techniques might involve weighting sensor inputs based on their reliability or fusing data using
algorithms like Kalman filtering.

7. **Event Correlation:**

- Correlate events from different sensors to determine if multiple sensors indicate the same
unauthorized activity.

- Avoid false positives by considering correlated events rather than isolated deviations.

8. **Real-Time Monitoring and Alerts:**


- Continuously monitor sensor data in real-time.

- If an unauthorized activity is detected, generate alerts to notify security personnel or initiate


automated responses (e.g., turning on lights, sounding alarms).

9. **Dynamic Threshold Adjustment:**

- To adapt to changing environments, adjust threshold values dynamically based on contextual


information, time of day, or specific conditions.

10. **Feedback Loop and Model Updating:**

- Continuously evaluate the effectiveness of the detection system.

- Update baselines and models as the environment or network dynamics change.

11. **Verification and Response:**

- Investigate the alerts and validate whether the detected activity is indeed unauthorized.

- Depending on the verification outcome, initiate appropriate responses, such as alerting authorities or
security personnel.

Implementing unauthorized activity detection in a sensor network requires careful planning, sensor
configuration, data analysis, and response strategies. It’s important to strike a balance between
detecting actual unauthorized activities and avoiding false alarms.

You might also like