Professional Documents
Culture Documents
CIA 2 Key
CIA 2 Key
Part A
SYNC messages are sent during synchronization period A SYNC control packet is
exchanged between nodes during the listening period to establish synchronization
among the neighboring nodes, i.e. schedule exchanges are accomplished by periodic
SYNC packet broadcasts to immediate neighbors.
In the first phase (SYNCH phase), node x accepts SYNCH packets from its
neighbors. In these packets, the neighbors describe their own schedule and x stores
their schedule in a table (the schedule table). Node x’s SYNCH phase is subdivided
into time slots and x’s neighbors contend according to a CSMA scheme with
additional backoff, that is, each neighbor y wishing to transmit a SYNCH packet
picks one of the time slots randomly and starts to transmit if no signal was received in
any of the previous slots. In the other case, y goes back into sleep mode and waits for
x’s next wakeup. In the other direction, since x knows a neighbor y’s schedule, x
can wake at appropriate times and send its own SYNCH packet to y (in broadcast
mode). It is not required that x broadcasts its schedule in every of y’s wakeup periods.
However, for reasons of time synchronization and to allow new nodes to learn their
local network topology, x should send SYNCH packets periodically. The according
period is called synchronization period.
• In the second phase (RTS phase), x listens for RTS packets from neighboring nodes.
In S-MAC, the RTS/CTS handshake described in Section 5.1.2 is used to reduce
collisions of data packets due to hidden-terminal situations. Again, interested
neighbors contend in this phase according to a CSMA scheme with additional
backoff.
• In the third phase (CTS phase), node x transmits a CTS packet if an RTS packet was
received in the previous phase. After this, the packet exchange continues, extending
into x’s nominal sleep time.
Procedure
Let us consider an idle node x to which a new packet destined to a neighboring
node y arrives.
First, x sends an RTS packet on the control channel without doing any carrier
sensing.
This packet carries both x’s and y’s MAC addresses.
If y receives this packet, it answers with a CTS packet if y does not know of any
ongoing transmission in its vicinity.
Upon receiving the CTS, x starts to transmit the packet to y on the data channel.
When y starts to receive the data, it sends out a busy-tone packet on the control
channel.
If x fails to receive a CTS packet within some time window, it enters the backoff
mode, where a binary exponential backoff scheme is used (i.e., the backoff time
is uniformly chosen from a time interval that is doubled after each failure to
receive a CTS).
RTS 78
X MAC address, Y MAC address
Busy Tone
X CTS Y
DATA
14. Assess the working principle of CSMA protocol used in 802.15.4 for medium access
in WSN with the help of state diagram
A network that is idle for long times and starts to become active when triggered by an
important external event. ( temperature in an environmental monitoring application),
an event generation is indicated (i.e., fire alarm).)
Upon the triggering event, all nodes wish to transmit simultaneously, potentially
creating lots of collisions.
In the case that the nodes want to send their packets periodically, the danger of
collisions is repeated if no special measures are taken.
The nodes are assumed to know an upstream neighbor to which they have to forward
packets destined for the sink. This upstream neighbor is also called the parent node.
After a node gets a new packet for transmission from its upper layers, it starts with a
random delay and initializes its trial counter num retries with zero
15. Explain the LEACH routing with the help of neat diagram. Give its advantages and
disadvantages.
Ref page 133 and PPT
16. Identify the Key management schemes in Wireless Sensor Networks. Illustrate the
key distribution and management mechanism required for secure communication in
sensor networks.
Ref notes unit 4 Page 4.21
Countermeasures
Some attacks in the physical layer are quite hard to cope with. For example, after
sensors are deployed in the field, it is difficult or infeasible to prevent every single sensor
from device tampering. Therefore, although there are some mechanisms that attempt to
reduce the occurrences of attacks, more of them focus on protecting information from
divulgence.
Encryption
In general, cryptography is the all-purpose solution to achieve security goals in WSNs.
To protect data confidentiality, cryptography is indispensable.
Cryptography can be applied to the data stored on sensors. Once data are encrypted,
even if the sensors are captured, it is difficult for the adversaries to obtain useful
information. A more costly encryption can yield higher strength, but it also drains the
limited precious energy faster and needs more memory. More often, cryptography is
applied to the data in transmission.
There are basically two categories of cryptographic mechanisms: asymmetric and
symmetric. In asymmetric mechanisms (e.g. RSA), the keys used for encryption and
decryption are different, allowing for easier key distribution. It usually requires a third
trusted party called Certificate Authority (CA) to distribute and check certificates so that
the identity of the users using a certain key can be verified. However, due to the lack of a
priori trust relationship and infrastructure support, it is infeasible to have CAs in WSNs.
Furthermore, asymmetric cryptography usually consumes more resources such as
computation and memory.