Mobile Devices and Wireless Communication

1914 Words4 Pages

Introduction With the increasing popularity of mobile devices and recent developments in wireless communication, wireless sensor networks are one of the upcoming fields of interest from research perspective. Sensor networks consists of ‘smart nodes’ which are resource constrained in terms of memory, energy, computation power. These nodes communicate wirelessly and pass their information to the main node usually called as sink node or base station. these sensor nodes comprised of their own sensors ,processor, radio transceiver, energy resource usually a battery providing them the ability of sensing, processing and communication capability. The first implementation of the wireless sensor networks was by military applications but nowadays these networks are used in environmental applications, medical applications, home appliances and various other commercial and consumer applications. In wireless sensor networks the sensor nodes are deployed densely which work collaboratively to monitor the specific task and then communicating with each other or with a base station. The topology of sensor networks may range from simple flat model to multihop clustering model. These networks have low memory, low bandwidth, low power and large scale node and the various other factors influencing the design of sensor networks are: fault tolerance, scalability, production costs, operating environment, hardware constraints etc. Therefore, the design of these networks must encounter all these factors. However, due to wireless nature of these networks and no tamper-resistant hardware makes it vulnerable to various types of attacks and these attacks are possible almost every layer of the OSI layer. As these networks are physically weak networks it is ve... ... middle of paper ... ...or the network traffic on the communication channels without the knowledge of sending and receiving party. As in the wireless sensor networks wireless signals are broadcasted which are accessible to the public and attacker can easily plug himself between the ranges of communication channel. 3: Jamming: These types of attacks are performed by deploying large number of nodes which can cause intense noise in the network and occupying the network channels making the transmission media unavailable for the other nodes. These types of attacks rarely occur because these jamming devices are easily detectable as sensor nodes sense the noise which is much larger than the usual noise in the network. MAC layer: At this layer the attacker tries to disrupt the various coordination rules and produces the harmful traffic. They also tries to spoof the identities at MAC layer.

Open Document