21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.1. Applications of <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong> 11<br />

abled to tell if they are close to other devices, especially if they are carried by<br />

the same person. Simple accelerometers are used to accomplish this. Also with<br />

accelerometers, different user activities can be recognized as described <strong>in</strong> [92].<br />

The authors attached sensors to major jo<strong>in</strong>ts of the user’s body, <strong>in</strong>clud<strong>in</strong>g knees,<br />

elbows and shoulders. The results collected from experiments <strong>in</strong>dicate that activities<br />

like walk<strong>in</strong>g or writ<strong>in</strong>g on a whiteboard can be recognized with high<br />

accuracy with such rather simple sensoric equipment.<br />

2.1.3 Other Applications<br />

Several sensor networks have been prototypically deployed <strong>for</strong> scientific<br />

(e.g. [199]), military and other purposes. A survey of projects can be found,<br />

e.g., <strong>in</strong> [47] and [157]. Examples <strong>in</strong>clude<br />

• environmental monitor<strong>in</strong>g, e.g. <strong>in</strong> w<strong>in</strong>eyards, <strong>for</strong>ests, and glaciers;<br />

• self-repair<strong>in</strong>g m<strong>in</strong>efields 1 ;<br />

• improved care <strong>for</strong> the elderly through activity monitor<strong>in</strong>g;<br />

• equipment monitor<strong>in</strong>g <strong>in</strong> <strong>in</strong>dustrial <strong>in</strong>stallations;<br />

• sniper detection.<br />

To our knowledge, security – <strong>in</strong> the sense of protect<strong>in</strong>g the sensor network<br />

aga<strong>in</strong>st <strong>in</strong>trusion or data manipulation – has not been an active focus of practical<br />

deployments, which is likely due to their prototypical nature and the emphasis<br />

on technical and algorithmic problems that have to be solved <strong>for</strong> putt<strong>in</strong>g such<br />

a network <strong>in</strong>to operation. However, as the significance of sensor networks <strong>in</strong>creases<br />

<strong>in</strong> critical military, social, and <strong>in</strong>dustrial applications, security issues<br />

will become more important. The example of the Internet shows that its potential<br />

<strong>in</strong> bus<strong>in</strong>ess applications today is often constra<strong>in</strong>ed by security-relevant<br />

threats. Thus, it is crucial to anticipate possible threats to sensor networks and<br />

be prepared to provide suitable countermeasures <strong>in</strong> order to support a smooth<br />

<strong>in</strong>tegration of sensor networks <strong>in</strong>to applications.<br />

2.1.4 Security Concerns<br />

Although prototypical deployments of sensor networks have not been equipped<br />

with security measures until now, it is <strong>for</strong>eseeable that adequate security is a<br />

1 Such military applications raise important ethical questions that have hardly been addressed <strong>in</strong> the literature.<br />

They go beyond the scope of this work, but readers are encouraged to develop awareness of these issues.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!