Sense-Response Applications
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator

Posts: 3,048
Joined: Dec 2008
23-09-2008, 12:46 AM

Sensor networks are widely being used for sense-response applications. The role of the sensor nodes in such applications is to monitor an area for events of interest and report the occurrence of the event to the base-station. The receipt of the event at the base-station is followed by a prompt physical response. An example of a sense-response application is the detection of fires in a forest. The sensor nodes report the occurrence of a fire upon which fire trucks are immediately dispatched to the location of the fire. Other examples of sense-response applications are intruder detection and apprehension, natural disaster monitoring, structural integrity monitoring, bio/chemical spill monitoring and containment etc.

Sensor nodes in sense-response applications are deployed with overlapping sensing regions to avoid holes in the coverage area. Thus an event is detected by more than one sensor node in the neighborhood of its occurrence. The base-station exploits this redundancy by responding to only those in the network. This is mainly done in order to avoid any false positives in the event generation process, i.e., an event is reported though it never occurred. However, this requires every sensor node to transmit a message to the base-station for every event that is detected, which expends a lot of energy. An alternative (that is often used in practice) is to have all the sensor nodes in the neighborhood of an event reach a consensus and have only one of the nodes transmit an event detection message to the base-station that implicitly contains the testimony of every node that detected the event. Sensor networks are often deployed in public and untrustworthy places. In some cases, they are also deployed in hostile areas.

The wireless medium of communication in sensor networks prevents any form of access control mechanism at the physical layer. The adversary can very easily introduce spurious messages in the network containing a false event report. This leads to energy wastage of the nodes in the network and also wastage of resources due to the physical response initiated by the base station in response to the false event report. A simple solution to thwart such attacks is to use a system wide secret key coupled with explicit authentication mechanisms. However, this solution fails to protect against internal attacks where the adversary has compromised a subset of sensor nodes.

Sensor nodes are designed to be cheap and cannot be equipped with expensive tamper-proof hardware. This coupled with the unmanned operation of the network leaves the nodes at the mercy of an adversary who can potentially steal some nodes, recover their cryptographic material, and pose them as authorized nodes in the network. We hereby refer to such nodes as internal adversaries. Internal adversaries are capable of launching more sophisticated attacks, where by posing to be real authenticated nodes, they can also suppress the generation of a message for any real event that is detected. This effectively renders the entire system to be useless.
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: ppt on sesnse response technology, sense response applications seminar abstract, sense response application, what is sense response technology, images for sense response application, sense response technology seminar ppt, sense response application images,
Popular Searches: applications of i nternet, what is sense response technology, ddiffrent applications of unternet, applications of str433, microcontrolar in militerry applications, response dx, ppt files on sense response application,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Intelligent Systems and Applications in IT Management pdf study tips 0 649 22-02-2013, 03:59 PM
Last Post: study tips
  Data Mining In Telemedicine Applications PPT seminar flower 0 1,088 06-09-2012, 01:01 PM
Last Post: seminar flower
Last Post: seminar flower
  Technologies for Virtual Reality/Tele-Immersion Applications: Issues of Research .... uploader 0 434 16-05-2012, 12:02 PM
Last Post: uploader
  Phase Spectra Analysis for Signal Recognition and Sequencing Applications seminar ideas 0 548 11-05-2012, 01:37 PM
Last Post: seminar ideas
  Theory of Image Analysis : Applications and Implications in the present Global ..... uploader 0 454 11-05-2012, 01:01 PM
Last Post: uploader
  Interactive voice response system project uploader 0 498 04-05-2012, 11:56 AM
Last Post: project uploader
  How to formulate image processing applications project uploader 0 448 01-05-2012, 11:03 AM
Last Post: project uploader
Last Post: seminar paper
  System Interface for an Integrated Intelligent Safety System for Vehicle Applications project uploader 0 462 19-03-2012, 10:52 AM
Last Post: project uploader