21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.1. Applications of <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong> 9<br />

without tamper<strong>in</strong>g with any physical <strong>in</strong>frastructure.<br />

• <strong>Sensor</strong> networks are often operated <strong>in</strong> open, publicly accessible space.<br />

This enables physical access to sensor nodes.<br />

• The implementation of security mechanisms, such as cryptography or <strong>in</strong>trusion<br />

detection, must respect the limited computational and energy resources,<br />

and the limited communication bandwidth.<br />

2.1 Applications of <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong><br />

<strong>Sensor</strong> networks are tools to bridge the gap between the physical and the virtual<br />

world. They allow to automatically collect <strong>in</strong><strong>for</strong>mation about physical phenomena,<br />

immediately process this <strong>in</strong><strong>for</strong>mation and transfer the results <strong>in</strong>to background<br />

<strong>in</strong><strong>for</strong>mation systems. This process<strong>in</strong>g delivers high-level <strong>in</strong><strong>for</strong>mation<br />

accord<strong>in</strong>g to the application’s requirements. <strong>Sensor</strong> nodes organize themselves<br />

autonomously, work <strong>in</strong> a collaborative manner, and are designed <strong>for</strong> energyefficiency.<br />

This allows it to monitor large geographical areas or <strong>in</strong>accessible<br />

spaces over long periods of time without the need of human <strong>in</strong>tervention. A<br />

comprehensive survey of sensor network architectures and applications can be<br />

found <strong>in</strong> [2].<br />

2.1.1 Surveillance<br />

An important application class <strong>for</strong> sensor networks is their use <strong>for</strong> the protection<br />

of assets or people. By def<strong>in</strong>ition, sensor networks are highly suitable <strong>for</strong><br />

data collection. This capability can be exploited <strong>for</strong> surveillance purposes, most<br />

importantly <strong>for</strong> the detection of <strong>in</strong>truders [62] or physical security breaches, or<br />

more generally <strong>for</strong> “perimeter protection” [8], where an area around a threatened<br />

entity (which is possibly mov<strong>in</strong>g) is under surveillance. Today, there already<br />

exists an <strong>in</strong>dustry <strong>for</strong> surveillance tools such as video cameras, motion<br />

detectors, burglar alarms, etc. <strong>Sensor</strong> networks add two new qualities to such<br />

systems, first the large number of t<strong>in</strong>y devices that can be deployed <strong>in</strong> an ad hoc<br />

manner, and second the self-organization of these devices <strong>for</strong> communication<br />

and configuration. Thus, with the wide-spread availability of wireless sensor<br />

network technology, it will become possible to put areas under surveillance that<br />

would not be economically feasible today. Besides the potential ga<strong>in</strong>s to (both<br />

public and private) security, this will have severe impact on people’s privacy<br />

and may also have severe consequences <strong>for</strong> politics and society [26].

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!