You are on page 1of 2

Wireless telecommunications is the transfer of information between two or more points that are not physically connected.

Distances can be short, such as a few metres for television remote control, or as far as thousands or even millions of kilometres for deep-space radio communications. It encompasses various types of fixed, mobile, and portable two-way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of wireless technology include GPS units, Garage door openers or garage doors, wireless computer mice, keyboards and Headset (audio), headphones, radio receivers, satellite television, broadcast television and cordless telephones. A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitorphysical or environmental conditions, such as temperature, sound, vibration, pressure, humidity, motion or pollutants and to cooperatively pass their data through the network to a main location.[1]The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. The WSN is built of "nodes" from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. The topology of the WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network. The propagation technique between the hops of the network can be routing or flooding.[2][3]
Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and from home to industry. Wireless Sensor Networks and Applications aims to provide a reference tool for the increasing number of scientists who depend upon reliable sensor networks. The book is divided into five sections: design and modeling, network management, data management, security, and applications. The eighteen selfcontained chapters are authored by experts in wireless networking. Each chapter is given expository but also scholarly treatment, covering the history of its specific topic, reviewing state-of-the-art thinking relative to the topic, and discussing currently unsolved problems of special interest. Key Features: *Explores different access control protocols and wake up strategies in wireless sensor networks; *Discusses several time-synchronization techniques and challenges, i.e., directed diffusion, tiny aggression, greedy aggression on directed diffusion; *Provides insights in network security, i.e., secure routing, and proper management; *Elaborates on numerous wireless sensor network applications, i.e., the ExScal application and the XSM platform. The topics covered within this book are intended for researchers, computer engineers, applied mathematicians, and graduate students interested in wireless sensor networks, but uninformed readers may also find this volume stimulating and helpful. Content Level Research

These features make wireless ad-hoc sensor networks more vulnerable than wired networks. This presents real challenges in the implementation of the following security requirements [5]. Data condentiality: The transmission of sensitive data should be protected for both sender and receiver in the sensor network. The typical approach to achieve this is to encrypt data using keys that are held by the receiver and sender. Message authentication: This mechanism can ensure that received data is really sent by a claimed sensor. Without authentication, malicious data can be injected, destroying the whole network. Data integrity: Due to the broadcast medium in sensor networks the message packet might be tampered by an adversary during the transmission. Some mechanisms must be provided to detect altered packets and protect data integrity. Due to inherent constraints on sensor node, there is a trade-o between security and the consumption of resources. If an application is designed to protect data more securely, the higher overhead has to be paid in the computing and communicating resources. The majority of existing algorithms cannot be implemented to secure the system. During the running time, the overhead caused by complex encryption algorithms would greatly inuence the performance of other processes in the operation system. On such a capability-restrictive and overloaded platform [6], only a small fraction of computing and memory space can be devoted to cryptographic algorithms. Thus, some inexpensive encryption algorithms are the candidates for being implemented on sensors.

In [4], the authors surveyed several inexpensive encryption

You might also like