The rapid development of wireless technology plays extremely important roles in monitoring and control related applications nowadays. This special issue aims at bringing together state-of-the-art contributions of wireless monitoring, control, actuator coordination as well as their co-designs.
In recent years, the demand for wireless communications in many monitoring and control applications has grown tremendously, such as military, aerospace, industrial, commercial, environmental, and health monitoring, etc. Some new technologies like Zigbee, Wi-Fi, Mobile Robots, and Bluetooth have already made significant contribution to data acquisition. As the same time, they arise some new challenges to guarantee a highly reliable, accurate, and fault-tolerant process. It is a critical issue to develop innovative approaches to deal with multi-variable, multi-space problem domains (detection, identification, tracking, data fusion, energy-efficiency, and fault-tolerant framework) as well as practical implementation in wireless monitoring and control application.
Introduction:
"Wireless" is a term used in communication is the transfer of information in which electromagnetic waves carry the signal over part or all of the communication path. Many of the wireless services are used in places such as, traffic control systems, remote control devices, laser light systems for point to point communications, satellite television, air band and radio navigation equipment, cellular phones, cordless computer peripherals, etc. Wireless communication and mobile computing have gained much attention from the computer and communication research community Wireless voice communication has already penetrated every modern society and increasingly wireless data service is considered a standard feature of wireless communication systems. Compared to voice communication data services are more adaptive in the sense that they don't have a strict real time requirement as voice communication that they may be delivered purely by broadcast purely by point to point communication or a mixed of both and that they call for a set of distinct performance measures such as throughput access time and power consumption Compared to wired networks wireless communication opens up the possibility of truly simultaneous data broadcast as opposed to multicast on Internet. Data access performance can be optimized by using and balancing broadcast and point to point communication methods. Despite these desirable features, however a wireless system is limited in bandwidth computational power, battery power and physical size of the clients.
Wireless 802.11 standards:
Wireless networks 802.11 Standards with 2.4 to 5 GHz bands. 802.11 Standards contain the modulation technique. From the family of 802.11 standards, the most applicable and well known protocols are 802.11b and 802.11g. In the beginning, the security was not strong but now by modification of 802.11i which is a multi emerging method the security has been developed. The family of 802.11 standards contains 802.11c, 802.11f, 802.11h, 802.11j used for modification of old versions.
The 802.11 Standards family separates each member into channels based on bands. All channels are common in every country to perform various functions. Every channel has different requirements and frequency.802.11 presenting by channels but each station selects only four or five channels to avoid overlapping and to get good result. 802.11standards have frames for the communication of data .Through frames, a station can also operate their channel and control wireless network links.
802.11a
802.11a same as original 802.11 standards, because it uses data link layer protocol and frames which are same as used in 802.11 standards. .It uses 5 GHz bandwidth for operation and 54 Mbp/s data range. It is very effective while performing more than one task at a time.The signals of 802.11a are fascinated more willingly by walls.
802.11b
802.11b also uses the media defined by 802.11 standards. 802.11b has the straight addition of modulation technology same as in 802.11. It suffered from the intrusion of other products. 2.4 GHz band is needed to operate 802.11b.There are lot of devices operated by 2.4 GHz band in 802.11b such as bluetooth,an oven, cord less phones, and monitors.
802.11g
802.11g was introduced in 2003 as a third modulation device with 2.4 GHz band. It supplies maximum data rate with 54Mb/s at physical layer. 802.11ga is also used to for limited purposes to forward error and improvement codes. The hardware of 802.11g is completely suitable with 802.11b.The most encouraging feature of 802.11g is speed therefore user modifying it rapidly. The developing rate is also low as compared to others. The improvement of 802.11b will decrease the data rate on the whole 802.11g network
802.11n
The amendments in 802.11 standards are occurring with the gap of time and according to the specifications of user or network. The recent improvement in 802.11 Standards is 802.11n. It has many new features and MIMO but it also depended on 802.11 standards. 802.11n was identified in 2009 as a final approval in 802.11 Standards family. All type of organisations were previously transferred to 802.11n networks. All these organisations are based on Wi-Fi. Alliance's Wi-Fi is a certified product for 802.11n application. To make 802.11 standard families more useful and agreeable to new era because WiFi fulfills the specifications of new era where there is no need to spend time for the arrangement of wires or cables and so on. The 802.11 standard families amend a great deal in the form of WiFi network.
Wireless Network Risks:
The most 802.11 risks are categorized in to basic categories :
1. Unauthorized network monitoring
2. Jamming the signal
3. Insertion attacks
4. Wrong configuration
5. Attacks on encryption
6. Breach through the access point password cracking
Day by day the numbers of applications that can be supported by the wireless technology are increasing. People can access the internet from any public area such as cafes, airports, hotels etc. There are some privacy issues are concern when comes to the public hotpots that are ex: if suppose a customer want to create an account on a website he has to give the name and some other personal details as any of the above mentioned attacks may give a chance to get these details to attackers .
It is important to understand that which open networks are real threats can an unauthorized user can access the personal details such as bank details, user names. For example a person using with a site SSL encryption is secure as private networks. Only there is a security risk possibility for the users who can use the HTTP site. Which are not secured by any encryption? When comes to the email services such as yahoo and Google etc email services which do not use any encryption methods which cannot be secure so an attackers can see the login details of the users and even the files which can be are transferred can also be vulnerable .initially all of these provides the threats to wireless network security there are more threats that are malicious code and all the users of the system know that what the security issues and the what are the properties and its flaws malicious hackers or crackers who will break the into the system without authorization and usually for personal gain or to damage the network these are mainly effect the Confidentiality, integrity, authenticity, and availability the main objectives of the all security polices . Risks in wireless is equal to the all the risks in the wired network and the new risks introduced by the weakness in the wireless protocols. To stop these organizations need to implements the security assessments before to implement the wireless networks. In this assessment they need to know about the normal security risk to the optimal performance once this is completed it can install the risk assessment
protecting the confidentiality and availability and integrity is known as the protection of the wireless networks there are several attacks on the wireless networks I am going to discuss the several attacks on the wireless network
1. traffic analysis is a very simple technique to attack on network in this technique the attacker can access the information such as the activities going on the network and the physical location of the nodes, the environment of the wireless networks and information about the protocols which are used in the network because different protocols provides the different security services so leaking the protocol information may cause big problem to the network
Eavesdropping is technique which is used to to tack the UN-encrypted wireless sessions from which the data can be extracted and that is used for the dangerous kinds and another kind of the eavesdropping is known that the attacker injects the packets in the network packets in the network this kind of attacks happens in the encrypted networks . An attacker injects the packets and receives the packet in the reverse to understand the encryption techniques and breach the network
the above mentioned attacks are mainly effect the networks but not the specific users. Once an attacker get access the network then attacker starts another type of threats starts to accessing the network devices but some times the privileges given to the resources in the network prevents the attackers to access the resources
Another type of attack is that the interference the sessions and after that it does not allow the station to reestablish connection with access point. Than the attacker establishes connection with access point. Now there are two connections between the AP and the two workstations now the attacker workstation can access the communication between the end user and the access point
Confidentiality is the property of the data in general security is necessary for the most of the organizations . wireless is the broadcast network to maintain Confidentiality is not an easy thing today so many packet analyzers available in the internet which are commonly used to braking the network for example a access point transmitting the 3000 bytes at 11mbps will take 24 bit space after approximately 10hours
RADIO-FREQUENCY IDENTIFICATION (RFID): C:\Users\Praveen\Downloads\rfid-chip.jpg
Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits the identity (in the form of a unique serial number) of an object or person wirelessly, using radio waves. It's grouped under the broad category of automatic identification technologies.
A basic RFID system consists of three components:
An antenna or coil
A transceiver (with decoder)
A transponder (RF tag) electronically programmed with unique information
The antenna emits radio signals to activate the tag and to read and write data to it.
The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power output and the radio frequency used. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal.
The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing.
C:\Users\Praveen\Downloads\clip_image002.jpg
RFID Frequencies:
RFID systems can use a variety of frequencies to communicate, but because radio waves work and act differently at different frequencies, a frequency for a specific RFID system is often dependant on its application. High frequency RFID systems (850 MHz to 950 MHz and 2.4 GHz to 2.5 GHz) offer transmission ranges of more than 90 feet, although wavelengths in the 2.4 GHz range are absorbed by water, which includes the human body, and therefore has limitations.
Wireless technology is gain in go polarity because of its less cost and simple use. We are familiar with radio and mobile phones that use wireless technology. There are many available functional applications for wireless and the crashed developments happening in this field are set to change the future.
Wireless can be divided into following categories: -
Portable wireless - It includes the operation of battery-operated wireless devices or systems such as cell phones and PCS units
fixed wireless - it includes the operation of wireless devices or systems connected to the Internet and modems
Mobile wireless -It includes the use of wireless devices or systems in moving motor vehicles, which include the automotive cell cellular phone and computers.
Various wireless technologies which are in use are, cell phones, remote controls, wireless microphones, wireless L AN, Wi-Fi, wireless broadband, Bluetooth, etc.
Bluetooth:
Bluetooth is an always-on, lowest-range radio hook up that consist of a microchip. It was initially created by Swedish mobile phone maker Ericsson in 1994 introduced laptop computers to make calls over a mobile phone. Since more than thousand organisations have registered on to produce Bluetooth the low-power short-range wireless for a broad range of devices. Organisation holders look for Bluetooth to be setup in millions of devices by 2005.
The Bluetooth fundamentals are released by an organisation known as the Bluetooth SIG (special interest group).
The idea behind Bluetooth is to support a small-range wireless capability. Using the 2.4 GHz band, ready for use globally for irregular low-power uses, two Bluetooth devices within 10 m of each other can drag up to 720 Kbps of speed. Bluetooth is advised to provide an open-ended list of applications, containing data , telephone numbers, audio, graphics, and even video. For example, audio devices can hold headsets, cordless and standard phones, home stereos, and digital MP3 players. Following are some examples of the facilities that Bluetooth can supply consumers:
Make calls from a wireless headset linked remotely to a cell phone;
remove cables connecting computers to printers, keyboards, and the mouse;
link up MP3 players wirelessly to other devices to download music;
organize home networks so that you can remotely control air conditioning, the oven, and children's Internet surfing;
Bluetooth Applications
Bluetooth is created to operate in an environment of several users. Up to eight devices can associate with in a small network called a piconet. Ten of these piconets can synchronize in the same network range of the Bluetooth radio. To support security, each link is put in to code and secured against eavesdropping and obstruction.
Bluetooth supports 3 general functional fields using short-range wireless connections:
Data and voice access points - Bluetooth assist the progress of real-time voice and data transmissions by supplying easy wireless connection of movable and fixed communications devices;
Cable replacement - Bluetooth removes the need for numerous, generally fix cable attachments for connecting basically any kind of communications device. Connections are direct and are managed even when devices are not within line of field. The range of each radio is nearly 10 m, but can be increased to 100 m with an optional amplifier;
Ad hoc networking - A device with a Bluetooth radio can organize a connection to another Bluetooth radio as soon as it appears into range.
The supported channel configurations are as follows:
Configuration
Max. Data Rate Upstream
Max. Data Rate Downstream
3 Simultaneous Voice Channels
64 kb/sec X 3 channels
64 kb/sec X 3 channels
Symmetric Data
433.9 kb/sec
433.9 kb/sec
Asymmetric Data
723.2 kb/sec or 57.6 kb/sec
57.6 kb/sec or 723.2 kb/sec
WIMAX:
WiMAX is also known as Worldwide Interoperability for Microwave Access. WiMAX technology allows general delivery of wireless broadband service for ï¬xed and/or mobile users, and became a entity in 2006 when Korea Telecom started the arrangement of a 2.3 GHz version of mobile WiMAX service called WiBRO in the Seoul metropolitan area to offer high performance for data and video. In the market forecast published in April 2008, WiMAX Forum Subscriber and User Forecast Study, the WiMAX Forum projects a rather aggressive forecast of more than 133 million WiMAX users globally by 2012 (WiMAX Forum, 2008c). The WiMAX Forum also claims that there are more than 250 trials and
deployments worldwide. The WiMAX Forum is an industry-led non-proï¬t organization which, as of the 1st quarter of 2008, has more than 540 member companies including service providers, equipment vendors, chip vendors and content providers. Its primary mission is to ensure interoperability among IEEE 802.16 based products through its certiï¬cation process. The air interface of WiMAX technology is based on the IEEE 802.16 standards. In particular, the current Mobile WiMAX technology is mainly based on the IEEE 802.16e amendment (IEEE, 2006a), approved by the IEEE in December 2005, which speciï¬es the Orthogonal Frequency Division Multiple Access (OFDMA) air interface and provides support for mobility.
Mobile WiMAX:
Mobile WiMAX can be considered as the next revolution in wireless technology that will enable pervasive, high-speed connectivity to meet the ever-increasing demand for broadband Internet. Delivering the next leap in the mobile network evolution with fourth generation (4G) wireless, WiMAX will drive a wide array of devices well beyond what's available today, including notebooks, Mobile Internet Devices (MIDs), smart phones, consumer electronic devices, and more.
Generations of mobile networking:
First Generation (1G)
1981 - NMT launch
The first mobile systems were build on analogue transmission. They have a less traffic frequency of one call per radio channel, poor voice quality, and they allow insecure and unencrypted communication, which led to the spoofing of identification.
Second Generation (2G)
1991 - GSM launch
The second generation of mobile systems are based on digital communication with a number of different standards (GSM, ERMES, CT2, CT3, DCS 1800, DECT). GSM (Global System for Mobile) communications is the most in demand standard in use today, using 900MHz and 1800MHz frequency bands. GSM mobile systems created digital communication using SIM (Subscriber Identity Module) method to justify a user for identification and billing purposes, and to put in to code the data to prevent eavesdropping. The transmission uses TDMA (Time Division Multiple Access) and CDMAOne (Code Division Multiple Access One) methods to increase the amount of information transferred on the network. Mobility is provided at layer 2, which stops seamless roaming between heterogeneous connected networks and routing domains. This means each operator must cover the whole area or have arrangements in place to allow roaming.
Second to Third Generation Bridge (2.5G)
2000 - GPRS launch
The introduction of GPRS is known as an extra period of mobile networking development, accross 2G and 3G. GPRS (General Packet Radio Service) is a data service which allows mobile devices to send and receive e-mails and picture messages. It owns a very popular operating speeds of up to 115kbit/s, which has been increased to a maximum of 384kbit/s by using EDGE (Enhanced Data rates for Global Evolution - see http://www.attwireless.com). Typical GSM data transmission rates at 9.6kbit/s. JANET® is a registered trademark of the Higher Education Funding Councils for England, Scotland and Wales. The JNT Association is the registered user of the trademark. JANET, the United Kingdom's education and research network, is funded by the Joint Information Systems Committee (JISC).
Third Generation (3G)
http://t2.gstatic.com/images?q=tbn:ANd9GcSbEIfdlSzj1XzbxcxThkGJ-Mvx69_Gh3SaSnEYIVQifHealzqh-g&t=1
2003 - First UK 3G launch
The third generation of mobile systems unifies different mobile technology standards, and uses higher frequency bands for transmission and Code Division Multiple Access to deliver data rates of up to 2Mbit/s to support multimedia services (MMS: voice, video and data). The European standard is UMTS (Universal Mobile Telecommunication Systems). Mobile systems continue to use digital transmission with SIM authentication for billing systems and for data encryption.Data transmission use a WCDMA (Wideband Code Division Multiple Access). One technique to achieve data rates between 384kbit/s and 2048kbit/s. Some 3G suppliers use ATM (Asynchronous Transfer Mode) for their 'over the air' network with MPLS (Multiprotocol Label Switching) or IP for their backbone network. Mobility is still supported at layer 2, and therefore like 2G it still prohibits seamless roaming across heterogeneous access networks and routing domains. The transmission band frequencies are between 1900 and 2200 MHz. All UMTS licence holders in the UK hold a 20 year licence with the condition that 80% population coverage is achieved by 31 December 2007. The current third generation licensed operators in the UK can be seen below (as at August 2004).
Fourth Generation (4G)
2007+?
4G is still at the research stage. It is based on an ad hoc networking model where there is no need for a fixed infrastructure function. Ad hoc networking needs global mobility features (e.g. Mobile IP) and connection to a global IPv6 network to provide an IP address for every mobile device. Seamless roaming in heterogeneous IP networks (e.g. 802.11 WLAN, GPRS and UMTS) will be possible with higher data rates, from 2Mbit/s to 10-100Mbit/s, offering reduced delays and new services. As mobile devices will not be surley on a fixed framework, they need build up intelligence to self design in ad hoc networks and have routing capabilities to route over a packet-switched network.
Future of wireless and mobile computing:
According to R.Tafazolli (ed.), 7 trillion wireless devices serving 7 billion people by 2017.
Sensors and RFID tags will be added to more and more goods, where they will communicate wirelessly.
Communications between machines will grow faster than communications between humans.
Sensors and tags will be embedded in
- Vehicles
- Transport systems
- Weather systems
- Building infrastructure
- Furniture
- Doors and Windows for security.
It's exciting to imagine the future of wireless technologies in-flight beyond in flight entertainment, Internet (surfing, emailing, social networking) and making phone calls. Cell phone-enabled planes means the cabin is transformed into a vibrant, interactive space.Imagine the new in-flight user experiences created by wifi and gsm:
http://culturecartography.files.wordpress.com/2011/01/project_panasonic_flight_path_01.jpg
Very targeted/tailored interactive HD in-show advertising (enabled by rich tracking logs)?
A coupon for free food might be pushed to your cell phone (the airline engaging you during the flight)?
You might be able to look out your plane window and see Augmented Reality (AR) tagged terrain?
The Sky Mall catalog could offer demo videos of its' products via QR codes?
You might be able to use a facial recognition App to get profile info on a flight attendant?
Sixth sense technology:
SixthSense is a wearable device developed by Pranav Mistry, a PhD student in the Fluid Interfaces Group at the MIT MediaLab. It is similar to Telepointer, a neckworn projector/camera system developed by Media Lab student Steve Mann (which Mann originally referred to as "Synthetic Synesthesia of the Sixth Sense").
http://t2.gstatic.com/images?q=tbn:ANd9GcQfAotv8weYoira9iPLEIqsoXbBTjM93ado7_oFvo1gSnbtZihf
http://t2.gstatic.com/images?q=tbn:ANd9GcT8k09IxOttAAtf2LOXI29-tfBOx7E_ipzH_KuO5glTEsElKteF
Applications in the future
For navigation in cars, dedicated devices with built-in GPS and maps
Built-in GPS Mobile.
Mobile television, already deployed in some Asian countries like Korea and Japan, facilitated by the standard DVB-H.
Download of music is becoming more important and is already offered by service providers as well as handheld manufacturers.
Push email and PIM functionalities, as pioneered by Blackberry/RIM, are highly valued by many business users.
Social networks such as MySpace and Face book are becoming important on mobiles as well.
Today's wireless technologies can be used for satellite communications including voice and picture. Satellite TV is a good example here. Many other wireless technologies such as wireless internet, Wi-Fi,etc., are in use. Speed is an important aspect of life, these days. High speed internet is in demand .
Conclusion :
providing the security to wireless networks and giving the privacy to the user is an big task because proving the security in the wireless means threats in WIFI and wired together and the threats provided by the newly emerging technologies so with the proper risk assessment and the planning the network security is the good way to provide the security to the because when comes to the university the level of security is different and the offices and bank security needs are different so what come to say that the protocols which are developed by the organizations such as 802.11 will cover the every end user requirements so according to the requirement of the organization need to change the security policies an the open networks are always threat to end users because it is not possible to provide the security to the every end user only way to create the security is giving the unique encryption methods to every user which is a difficult task . but open networks provides the grater opportunities to the user to connect all time