SlideShare a Scribd company logo
1 of 8
Download to read offline
Advances in Computational Sciences and Technology
ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 733-739
© Research India Publications
http://www.ripublication.com
A Brief Research Study of Wireless Sensor Network
Preetkamal Singh1, Dr. OP Gupta2 and Sita Saini3
1
Department of Computer Science and Engineering, LGC Chaukimann,
Ludhiana, Punjab, India.
2
PAU, Ludhiana, Punjab, India.
3
Department of Computer Science and Engineering LGC Chaukimann,
Ludhiana, Punjab, India.
Abstract
Wireless Sensor Networks (WSNs) play a major role in revolutionizing the
world by its sensing technology. WSNs has emerged as that powerful
technology which has multiple applications such as such as military
operations, surveillance system, Intelligent Transport Systems (ITS) etc.
WSNs comprises of various sensor nodes, which captures the data from the
surrounding alongside monitoring the external environment. Much of the
research work is focused on making the sensor network operating with
minimum consumption of energy, so that it can survive for longer duration.
The primary concern in the direction of saving energy has been due to the
discharging of those batteries on which sensor nodes are operated. In addition
to that, WSNs are also exploited for its security aspects so that it can be used
in some confidential sectors like military battlefield. This paper, introduces the
WSN in different aspects like applications, routing and data collection,
security aspects and also briefs about simulation platform that can be used in
WSNs. This paper contributes in a fashion about introducing the WSNs in
different sectors of its operation and reflecting its significance.
Keywords: Introduction to WSN, Routing, Simulation platform in WSN,
security aspects in WSN, applications of WSN.
1. INTRODUCTION TO WSN
Advancement in wireless communication has made possible the development of
wireless sensor networks comprising of devices called sensor nodes. Sensor nodes are
734 Preetkamal Singh, Dr. OP Gupta and Sita Saini
low power, small size & cheap devices, capable of sensing, wireless communication
and computation. As soon as the sensors are deployed in the network they configure
themselves and connect with each other for data collection and thereby forwarding the
data to the Base Station.
Fig.1 Architecture of a typical WSN [1]
WSN can also be defined as a network comprising of possibly low-size and low-
complexity devices termed as nodes which are capable of sensing the environment
and communicating gathered information from the monitored area; the gathered data
can be transmitted directly or through multi –hops to sink, which can then use it
locally or is connected to other networks (e.g. internet) through gateway nodes [1].
The main components of sensor node consist of a sensing unit, a processing unit, a
transceiver and a power unit as shown in the Figure 2. Sensing unit senses the
physical quantity which is then transformed into digital one through ADC i.e. Analog
to Digital converter. Thereafter processor is used for further computations and
transceiver is used to transmit and receive data from the other nodes or from the Base
Station. Power unit is the most prominent unit in any sensor node. Once the battery is
exhausted, it can’t be replaced for unattended applications. Other units are application
dependent unit like Mobilizer, Power Generator and Location Finding System.
Fig. 2 Components of a sensor node
Power Unit
Sensor
ADC
Processor
Storage
Location Finding System
Power
Generator
Transceiver
Mobilizer
A Brief Research Study of Wireless Sensor Network 735
Fig.3 Contribution demonstration
2. CHALLENGES IN WSNs
Oneof the main design goals of WSNs is to carry out data communication while
trying to prolong the lifetime ofthe network and prevent connectivity degradation by
employing aggressive energy management techniques.The topology control in WSNs
is influenced by many challenging factors. These factors must beovercome before
efficient communication can be achieved in WSNs. In the following, we summarize
someof the challenges and design issues that affect the topology construction and
maintenance in WSNs [2].
a. Node deployment: Node deployment in WSNs is application dependent and
affects the performance of topology control algorithms. The deployment can
be either deterministic or randomized. In deterministic deployment, the
sensors are manually placed and data is routed through pre-determined paths.
However, in random node deployment, the sensor nodes are scattered
randomly creating an infrastructure in an ad hoc manner.
b. Energy consumption without losing accuracy: Sensor nodes can use up
their limited supply of energy performing computations and transmitting
information in a wireless environment. As such, energy-conserving forms of
communication and computation are essential. Sensor node lifetime shows a
strong dependence on the battery lifetime.
c. Data Reporting Model: Data sensing and reporting in WSNs is dependent on
the application and the time criticality of the data reporting. Data reporting can
Our Contribution
(Brief Study about)
Applications of WSNs
Introduction to WSN
Challenges in WSNs
Security aspects in WSN
Simulation platform in WSN
736 Preetkamal Singh, Dr. OP Gupta and Sita Saini
be categorized as either time-driven (continuous), event-driven, query-driven,
and hybrid. The time-driven delivery model is suitable for applications that
require periodic data monitoring. As such, sensor nodes will periodically
switch on their sensors and transmitters, sense the environment and transmit
the data of interest at constant periodic time intervals.
d. Node/Link Heterogeneity: In many studies, all sensor nodes were assumed to
be homogeneous, i.e., having equal capacity in terms of computation,
communication, and power. However, depending on the application a sensor
node can have different role or capability.
e. Fault Tolerance: Some sensor nodes may fail or be blocked due to lack of
power, physical damage, or environmental interference. The failure of sensor
nodes should not affect the overall task of the sensor network. If many nodes
fail, MAC and topology control algorithms must accommodate formation of
new links and routes to the data collection base stations.
f. Scalability: The number of sensor nodes deployed in the sensing area may be
in the order of hundreds or thousands, or more. Any topology control scheme
must be able to work with this huge number of sensor nodes. In addition,
sensor network routing control algorithms should be scalable enough to
respond to events in the environment. Until an event occurs, most of the
sensors can remain in the sleep state, with data from the few remaining sensors
providing a coarse quality.
g. Security: In some applications, the communication among nodes is required
to be secured enough so as to maintain the confidentiality. It is mostly required
while dealing with the military applications like battlefield surveillance,
military operations etc.
3. APPLICATIONS OF WSN
Wireless Sensor Networks may consist of many different types of sensors such as
seismic, low sampling rate magnetic, thermal, visual, infrared, acoustic and
radar. They are able to monitor a wide variety of ambient conditions that include
temperature, humidity, vehicular movement, lightning condition, pressure, soil
makeup, noise levels, the presence or absence of certain kinds of objects,
mechanical stress levels on attached objects, and the current characteristics such
as speed, direction and size of an object. WSN application can be classified into
following categories:
a. Military applications:
b. Environmental applications:
c. Healthcare applications:
d. Home applications:
e. Traffic control:
A Brief Research Study of Wireless Sensor Network 737
Fig. 4 Applications of WSN [3]
4. SECURITY ASPECTS OF WSN
The popularity of WSN has been tremendously on a peak with respect to different
applications like climate change, environmental monitoring, traffic monitoring and
home automation. Therefore keeping the WSN has always been a challenging task.
Cryptography provides security through symmetric key techniques, asymmetric key
techniques and hash function. Since WSN are very constrained in terms of computing,
communication and battery power, it requires a light weight cryptographic algorithm.
Due to constraints of sensor nodes, the selection of cryptographic technique is vital in
WSN. Cryptography in WSN can be explained in the following three aspects:
symmetric, asymmetric and hash function [4].
738 Preetkamal Singh, Dr. OP Gupta and Sita Saini
Fig.5 Security in WSN [4]
5. SIMULATION PLATFORM IN WSN
In WSNs, simulation is one of the most predominant evaluation methodologies for the
development of new communication architectures, and network protocols as well as to
test and validate the existing one in various scenarios. Simulation helps researchers to
get significant information on feasibility and practicability crucial to the
implementation of the system prior to investing significant time and money. In WSNs,
simulation based testing and validation has many advantages, such as: ease of
implementation, lower cost, flexibility and possibility of testing large-scale networks.
The availability of a large number of simulation tools and specific requirement (e.g.
energy-constraints, large-scale deployment) of WSNs makes it difficult for a user to
choose a nearly perfect tool for his evaluation. To address this issue, survey is
presented [] some of the most widely-used and state-of-the-art simulation tools for
WSNs. The aim is to help researchers in the selection of an appropriate simulation
tool to evaluate their work, and to acquire reliable results for large-scale WSNs [5].
Table 1: Comparison table of the reviewed simulation tools
Tools
Features
Interface Accessibility & User
Support
Availability of
WSNs
Modules
Scalability
NS-2 C++/OTcl with limited
visual support
Open source with
Good user
support
Excellent Limited
OMNeT++ C++/NED with good
GUI and debugging
support
Free for academic use,
licence for
commercial use with
Good user
support
Excellent Large-scale
GloMoSim Parsec (C-Based) with
limited visual support
Open source with
Poor user support
Good Large-scale
A Brief Research Study of Wireless Sensor Network 739
OPNET C or C++/Java with
Excellent GUI and
debugging support
Free for academic use,
licence for
commercial use with
Excellent
user support
Excellent Moderate
SENSE C++ with good GUI
support
Open source with Poor
user
support
Excellent Large-scale
TOSSIM C++/Python with good
GUI support
Open source (BSD)
with Excellent
user support
Good Large-scale
GTSNetS C++ with good user
interface & visual
support
Open source with good
user
support
Excellent Very Large-
scale
6. CONCLUSION
WSNs have been profoundly used in various sectors of human life. The sensing
technology has made it possible for any sensor node to communicate and respond to
the different attributes. This paper has briefed about various aspects in WSN. With the
brief introduction to the WSN, the special issues have been discussed. Applications
have been highlighted along with the security aspects in WSN. Thereafter the tabular
comparison of different simulation software’s has been given. It can be concluded
from the study done in this paper, that WSN has revolutionized almost every sector of
modern era. It has huge scope of research in handling different aspects of human life.
REFERENCES
[1] I.F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, E.Cayirci, “A survey on
sensor networks”, IEEE Communications Magazine, Vol. 40, Issue (8), pp.
102-114, 2002.
[2] Samira Kalantary, Sara Taghipour, “ A Survey on architectures, protocols,
applications and management in wireless Sensor Networks”, Journal of
Advanced Computer Science & Technoloy, pp. 1-11, 2014.
[3] KazemSohraby, Daniel Minoli, TaiebZnati, “Wireless Sensor Networks”,
Wiley Publications, Second Edition.
[4] Gaurav Sharma, SumanBala, Anil K. Verma, “Security Frameworks for
Wireless Sensor Networks-Review,” 2nd International Conference on
Communication, Computing & Security [ICCCS-2012] , No. 6, pp. 978 – 987,
2012.
[5] Muhammad Zahid Khan et al. , “Limitations of Simulation Tools for Large-
Scale Wireless Sensor Networks,” Workshops of International Conference on
Advanced Information Networking and Applications, pp. 820-825, 2011.
740 Preetkamal Singh, Dr. OP Gupta and Sita Saini

More Related Content

Similar to A Brief Research Study Of Wireless Sensor Network

Wireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsWireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsAshishDPatel1
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET Journal
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkIRJET Journal
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509IJERA Editor
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 
A Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor NetworkA Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor NetworkCrystal Sanchez
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksAuwal Amshi
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Easy n Inspire L
 

Similar to A Brief Research Study Of Wireless Sensor Network (20)

Wireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsWireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and Applications
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
A Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor NetworkA Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor Network
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
50120140505014
5012014050501450120140505014
50120140505014
 

More from Cassie Romero

(10 SheetsSet) European Pastoral Style Retro Love Le
(10 SheetsSet) European Pastoral Style Retro Love Le(10 SheetsSet) European Pastoral Style Retro Love Le
(10 SheetsSet) European Pastoral Style Retro Love LeCassie Romero
 
Columbia College Chicago, Chicago Admission, Criteria Application
Columbia College Chicago, Chicago Admission, Criteria ApplicationColumbia College Chicago, Chicago Admission, Criteria Application
Columbia College Chicago, Chicago Admission, Criteria ApplicationCassie Romero
 
The Writers Work Guide To Beating Writers Blo
The Writers Work Guide To Beating Writers BloThe Writers Work Guide To Beating Writers Blo
The Writers Work Guide To Beating Writers BloCassie Romero
 
009 Essay Example 10191 Thumb Marathi On Thats
009 Essay Example 10191 Thumb Marathi On Thats009 Essay Example 10191 Thumb Marathi On Thats
009 Essay Example 10191 Thumb Marathi On ThatsCassie Romero
 
Motivationessay - 10 Steps In Writing A Motivation Essay
Motivationessay - 10 Steps In Writing A Motivation EssayMotivationessay - 10 Steps In Writing A Motivation Essay
Motivationessay - 10 Steps In Writing A Motivation EssayCassie Romero
 
London Poem Analysis- GCSE Study Flashcards,
London Poem Analysis- GCSE Study Flashcards,London Poem Analysis- GCSE Study Flashcards,
London Poem Analysis- GCSE Study Flashcards,Cassie Romero
 
Personal Narrative Examples 7Th Grade E. Online assignment writing service.
Personal Narrative Examples 7Th Grade E. Online assignment writing service.Personal Narrative Examples 7Th Grade E. Online assignment writing service.
Personal Narrative Examples 7Th Grade E. Online assignment writing service.Cassie Romero
 
Common App Word Limit. Tough To Keep Your Essay
Common App Word Limit. Tough To Keep Your EssayCommon App Word Limit. Tough To Keep Your Essay
Common App Word Limit. Tough To Keep Your EssayCassie Romero
 
DragonS Den Curriculum Hook Y. Online assignment writing service.
DragonS Den Curriculum Hook Y. Online assignment writing service.DragonS Den Curriculum Hook Y. Online assignment writing service.
DragonS Den Curriculum Hook Y. Online assignment writing service.Cassie Romero
 
Writing Learn To Write Better Academic Essays Pdf Sitedoct.Org
Writing Learn To Write Better Academic Essays Pdf Sitedoct.OrgWriting Learn To Write Better Academic Essays Pdf Sitedoct.Org
Writing Learn To Write Better Academic Essays Pdf Sitedoct.OrgCassie Romero
 
St Joseph Hospital Apa Paper. Online assignment writing service.
St Joseph Hospital Apa Paper. Online assignment writing service.St Joseph Hospital Apa Paper. Online assignment writing service.
St Joseph Hospital Apa Paper. Online assignment writing service.Cassie Romero
 
Community Medical Windshield Survey Horizo
Community Medical Windshield Survey HorizoCommunity Medical Windshield Survey Horizo
Community Medical Windshield Survey HorizoCassie Romero
 
An Academic Essay The Op. Online assignment writing service.
An Academic Essay The Op. Online assignment writing service.An Academic Essay The Op. Online assignment writing service.
An Academic Essay The Op. Online assignment writing service.Cassie Romero
 
Paper The Word Is Pretty Paper. True Stories. And Sc
Paper The Word Is Pretty Paper. True Stories. And ScPaper The Word Is Pretty Paper. True Stories. And Sc
Paper The Word Is Pretty Paper. True Stories. And ScCassie Romero
 
Info Terpopuler Structure Introduction. Online assignment writing service.
Info Terpopuler Structure Introduction. Online assignment writing service.Info Terpopuler Structure Introduction. Online assignment writing service.
Info Terpopuler Structure Introduction. Online assignment writing service.Cassie Romero
 
Foolscap Paper A4 Size 100 Sheets 70Gm Shopee Mala
Foolscap Paper A4 Size 100 Sheets 70Gm Shopee MalaFoolscap Paper A4 Size 100 Sheets 70Gm Shopee Mala
Foolscap Paper A4 Size 100 Sheets 70Gm Shopee MalaCassie Romero
 
How To Write Grad Essay - Abigaile Words
How To Write Grad Essay - Abigaile WordsHow To Write Grad Essay - Abigaile Words
How To Write Grad Essay - Abigaile WordsCassie Romero
 
Winter Writing Paper - Have Fun Teaching
Winter Writing Paper - Have Fun TeachingWinter Writing Paper - Have Fun Teaching
Winter Writing Paper - Have Fun TeachingCassie Romero
 
This Is How You Write A College Essay In 2020 Co
This Is How You Write A College Essay In 2020  CoThis Is How You Write A College Essay In 2020  Co
This Is How You Write A College Essay In 2020 CoCassie Romero
 
Printable Polar Bear Journal Page Wild Bear Stationery
Printable Polar Bear Journal Page Wild Bear StationeryPrintable Polar Bear Journal Page Wild Bear Stationery
Printable Polar Bear Journal Page Wild Bear StationeryCassie Romero
 

More from Cassie Romero (20)

(10 SheetsSet) European Pastoral Style Retro Love Le
(10 SheetsSet) European Pastoral Style Retro Love Le(10 SheetsSet) European Pastoral Style Retro Love Le
(10 SheetsSet) European Pastoral Style Retro Love Le
 
Columbia College Chicago, Chicago Admission, Criteria Application
Columbia College Chicago, Chicago Admission, Criteria ApplicationColumbia College Chicago, Chicago Admission, Criteria Application
Columbia College Chicago, Chicago Admission, Criteria Application
 
The Writers Work Guide To Beating Writers Blo
The Writers Work Guide To Beating Writers BloThe Writers Work Guide To Beating Writers Blo
The Writers Work Guide To Beating Writers Blo
 
009 Essay Example 10191 Thumb Marathi On Thats
009 Essay Example 10191 Thumb Marathi On Thats009 Essay Example 10191 Thumb Marathi On Thats
009 Essay Example 10191 Thumb Marathi On Thats
 
Motivationessay - 10 Steps In Writing A Motivation Essay
Motivationessay - 10 Steps In Writing A Motivation EssayMotivationessay - 10 Steps In Writing A Motivation Essay
Motivationessay - 10 Steps In Writing A Motivation Essay
 
London Poem Analysis- GCSE Study Flashcards,
London Poem Analysis- GCSE Study Flashcards,London Poem Analysis- GCSE Study Flashcards,
London Poem Analysis- GCSE Study Flashcards,
 
Personal Narrative Examples 7Th Grade E. Online assignment writing service.
Personal Narrative Examples 7Th Grade E. Online assignment writing service.Personal Narrative Examples 7Th Grade E. Online assignment writing service.
Personal Narrative Examples 7Th Grade E. Online assignment writing service.
 
Common App Word Limit. Tough To Keep Your Essay
Common App Word Limit. Tough To Keep Your EssayCommon App Word Limit. Tough To Keep Your Essay
Common App Word Limit. Tough To Keep Your Essay
 
DragonS Den Curriculum Hook Y. Online assignment writing service.
DragonS Den Curriculum Hook Y. Online assignment writing service.DragonS Den Curriculum Hook Y. Online assignment writing service.
DragonS Den Curriculum Hook Y. Online assignment writing service.
 
Writing Learn To Write Better Academic Essays Pdf Sitedoct.Org
Writing Learn To Write Better Academic Essays Pdf Sitedoct.OrgWriting Learn To Write Better Academic Essays Pdf Sitedoct.Org
Writing Learn To Write Better Academic Essays Pdf Sitedoct.Org
 
St Joseph Hospital Apa Paper. Online assignment writing service.
St Joseph Hospital Apa Paper. Online assignment writing service.St Joseph Hospital Apa Paper. Online assignment writing service.
St Joseph Hospital Apa Paper. Online assignment writing service.
 
Community Medical Windshield Survey Horizo
Community Medical Windshield Survey HorizoCommunity Medical Windshield Survey Horizo
Community Medical Windshield Survey Horizo
 
An Academic Essay The Op. Online assignment writing service.
An Academic Essay The Op. Online assignment writing service.An Academic Essay The Op. Online assignment writing service.
An Academic Essay The Op. Online assignment writing service.
 
Paper The Word Is Pretty Paper. True Stories. And Sc
Paper The Word Is Pretty Paper. True Stories. And ScPaper The Word Is Pretty Paper. True Stories. And Sc
Paper The Word Is Pretty Paper. True Stories. And Sc
 
Info Terpopuler Structure Introduction. Online assignment writing service.
Info Terpopuler Structure Introduction. Online assignment writing service.Info Terpopuler Structure Introduction. Online assignment writing service.
Info Terpopuler Structure Introduction. Online assignment writing service.
 
Foolscap Paper A4 Size 100 Sheets 70Gm Shopee Mala
Foolscap Paper A4 Size 100 Sheets 70Gm Shopee MalaFoolscap Paper A4 Size 100 Sheets 70Gm Shopee Mala
Foolscap Paper A4 Size 100 Sheets 70Gm Shopee Mala
 
How To Write Grad Essay - Abigaile Words
How To Write Grad Essay - Abigaile WordsHow To Write Grad Essay - Abigaile Words
How To Write Grad Essay - Abigaile Words
 
Winter Writing Paper - Have Fun Teaching
Winter Writing Paper - Have Fun TeachingWinter Writing Paper - Have Fun Teaching
Winter Writing Paper - Have Fun Teaching
 
This Is How You Write A College Essay In 2020 Co
This Is How You Write A College Essay In 2020  CoThis Is How You Write A College Essay In 2020  Co
This Is How You Write A College Essay In 2020 Co
 
Printable Polar Bear Journal Page Wild Bear Stationery
Printable Polar Bear Journal Page Wild Bear StationeryPrintable Polar Bear Journal Page Wild Bear Stationery
Printable Polar Bear Journal Page Wild Bear Stationery
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,
à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,
à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,Virag Sontakke
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïžcall girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,
à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,
à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïžcall girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in Kamla Market (DELHI) 🔝 >àŒ’9953330565🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

A Brief Research Study Of Wireless Sensor Network

  • 1. Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 733-739 © Research India Publications http://www.ripublication.com A Brief Research Study of Wireless Sensor Network Preetkamal Singh1, Dr. OP Gupta2 and Sita Saini3 1 Department of Computer Science and Engineering, LGC Chaukimann, Ludhiana, Punjab, India. 2 PAU, Ludhiana, Punjab, India. 3 Department of Computer Science and Engineering LGC Chaukimann, Ludhiana, Punjab, India. Abstract Wireless Sensor Networks (WSNs) play a major role in revolutionizing the world by its sensing technology. WSNs has emerged as that powerful technology which has multiple applications such as such as military operations, surveillance system, Intelligent Transport Systems (ITS) etc. WSNs comprises of various sensor nodes, which captures the data from the surrounding alongside monitoring the external environment. Much of the research work is focused on making the sensor network operating with minimum consumption of energy, so that it can survive for longer duration. The primary concern in the direction of saving energy has been due to the discharging of those batteries on which sensor nodes are operated. In addition to that, WSNs are also exploited for its security aspects so that it can be used in some confidential sectors like military battlefield. This paper, introduces the WSN in different aspects like applications, routing and data collection, security aspects and also briefs about simulation platform that can be used in WSNs. This paper contributes in a fashion about introducing the WSNs in different sectors of its operation and reflecting its significance. Keywords: Introduction to WSN, Routing, Simulation platform in WSN, security aspects in WSN, applications of WSN. 1. INTRODUCTION TO WSN Advancement in wireless communication has made possible the development of wireless sensor networks comprising of devices called sensor nodes. Sensor nodes are
  • 2. 734 Preetkamal Singh, Dr. OP Gupta and Sita Saini low power, small size & cheap devices, capable of sensing, wireless communication and computation. As soon as the sensors are deployed in the network they configure themselves and connect with each other for data collection and thereby forwarding the data to the Base Station. Fig.1 Architecture of a typical WSN [1] WSN can also be defined as a network comprising of possibly low-size and low- complexity devices termed as nodes which are capable of sensing the environment and communicating gathered information from the monitored area; the gathered data can be transmitted directly or through multi –hops to sink, which can then use it locally or is connected to other networks (e.g. internet) through gateway nodes [1]. The main components of sensor node consist of a sensing unit, a processing unit, a transceiver and a power unit as shown in the Figure 2. Sensing unit senses the physical quantity which is then transformed into digital one through ADC i.e. Analog to Digital converter. Thereafter processor is used for further computations and transceiver is used to transmit and receive data from the other nodes or from the Base Station. Power unit is the most prominent unit in any sensor node. Once the battery is exhausted, it can’t be replaced for unattended applications. Other units are application dependent unit like Mobilizer, Power Generator and Location Finding System. Fig. 2 Components of a sensor node Power Unit Sensor ADC Processor Storage Location Finding System Power Generator Transceiver Mobilizer
  • 3. A Brief Research Study of Wireless Sensor Network 735 Fig.3 Contribution demonstration 2. CHALLENGES IN WSNs Oneof the main design goals of WSNs is to carry out data communication while trying to prolong the lifetime ofthe network and prevent connectivity degradation by employing aggressive energy management techniques.The topology control in WSNs is influenced by many challenging factors. These factors must beovercome before efficient communication can be achieved in WSNs. In the following, we summarize someof the challenges and design issues that affect the topology construction and maintenance in WSNs [2]. a. Node deployment: Node deployment in WSNs is application dependent and affects the performance of topology control algorithms. The deployment can be either deterministic or randomized. In deterministic deployment, the sensors are manually placed and data is routed through pre-determined paths. However, in random node deployment, the sensor nodes are scattered randomly creating an infrastructure in an ad hoc manner. b. Energy consumption without losing accuracy: Sensor nodes can use up their limited supply of energy performing computations and transmitting information in a wireless environment. As such, energy-conserving forms of communication and computation are essential. Sensor node lifetime shows a strong dependence on the battery lifetime. c. Data Reporting Model: Data sensing and reporting in WSNs is dependent on the application and the time criticality of the data reporting. Data reporting can Our Contribution (Brief Study about) Applications of WSNs Introduction to WSN Challenges in WSNs Security aspects in WSN Simulation platform in WSN
  • 4. 736 Preetkamal Singh, Dr. OP Gupta and Sita Saini be categorized as either time-driven (continuous), event-driven, query-driven, and hybrid. The time-driven delivery model is suitable for applications that require periodic data monitoring. As such, sensor nodes will periodically switch on their sensors and transmitters, sense the environment and transmit the data of interest at constant periodic time intervals. d. Node/Link Heterogeneity: In many studies, all sensor nodes were assumed to be homogeneous, i.e., having equal capacity in terms of computation, communication, and power. However, depending on the application a sensor node can have different role or capability. e. Fault Tolerance: Some sensor nodes may fail or be blocked due to lack of power, physical damage, or environmental interference. The failure of sensor nodes should not affect the overall task of the sensor network. If many nodes fail, MAC and topology control algorithms must accommodate formation of new links and routes to the data collection base stations. f. Scalability: The number of sensor nodes deployed in the sensing area may be in the order of hundreds or thousands, or more. Any topology control scheme must be able to work with this huge number of sensor nodes. In addition, sensor network routing control algorithms should be scalable enough to respond to events in the environment. Until an event occurs, most of the sensors can remain in the sleep state, with data from the few remaining sensors providing a coarse quality. g. Security: In some applications, the communication among nodes is required to be secured enough so as to maintain the confidentiality. It is mostly required while dealing with the military applications like battlefield surveillance, military operations etc. 3. APPLICATIONS OF WSN Wireless Sensor Networks may consist of many different types of sensors such as seismic, low sampling rate magnetic, thermal, visual, infrared, acoustic and radar. They are able to monitor a wide variety of ambient conditions that include temperature, humidity, vehicular movement, lightning condition, pressure, soil makeup, noise levels, the presence or absence of certain kinds of objects, mechanical stress levels on attached objects, and the current characteristics such as speed, direction and size of an object. WSN application can be classified into following categories: a. Military applications: b. Environmental applications: c. Healthcare applications: d. Home applications: e. Traffic control:
  • 5. A Brief Research Study of Wireless Sensor Network 737 Fig. 4 Applications of WSN [3] 4. SECURITY ASPECTS OF WSN The popularity of WSN has been tremendously on a peak with respect to different applications like climate change, environmental monitoring, traffic monitoring and home automation. Therefore keeping the WSN has always been a challenging task. Cryptography provides security through symmetric key techniques, asymmetric key techniques and hash function. Since WSN are very constrained in terms of computing, communication and battery power, it requires a light weight cryptographic algorithm. Due to constraints of sensor nodes, the selection of cryptographic technique is vital in WSN. Cryptography in WSN can be explained in the following three aspects: symmetric, asymmetric and hash function [4].
  • 6. 738 Preetkamal Singh, Dr. OP Gupta and Sita Saini Fig.5 Security in WSN [4] 5. SIMULATION PLATFORM IN WSN In WSNs, simulation is one of the most predominant evaluation methodologies for the development of new communication architectures, and network protocols as well as to test and validate the existing one in various scenarios. Simulation helps researchers to get significant information on feasibility and practicability crucial to the implementation of the system prior to investing significant time and money. In WSNs, simulation based testing and validation has many advantages, such as: ease of implementation, lower cost, flexibility and possibility of testing large-scale networks. The availability of a large number of simulation tools and specific requirement (e.g. energy-constraints, large-scale deployment) of WSNs makes it difficult for a user to choose a nearly perfect tool for his evaluation. To address this issue, survey is presented [] some of the most widely-used and state-of-the-art simulation tools for WSNs. The aim is to help researchers in the selection of an appropriate simulation tool to evaluate their work, and to acquire reliable results for large-scale WSNs [5]. Table 1: Comparison table of the reviewed simulation tools Tools Features Interface Accessibility & User Support Availability of WSNs Modules Scalability NS-2 C++/OTcl with limited visual support Open source with Good user support Excellent Limited OMNeT++ C++/NED with good GUI and debugging support Free for academic use, licence for commercial use with Good user support Excellent Large-scale GloMoSim Parsec (C-Based) with limited visual support Open source with Poor user support Good Large-scale
  • 7. A Brief Research Study of Wireless Sensor Network 739 OPNET C or C++/Java with Excellent GUI and debugging support Free for academic use, licence for commercial use with Excellent user support Excellent Moderate SENSE C++ with good GUI support Open source with Poor user support Excellent Large-scale TOSSIM C++/Python with good GUI support Open source (BSD) with Excellent user support Good Large-scale GTSNetS C++ with good user interface & visual support Open source with good user support Excellent Very Large- scale 6. CONCLUSION WSNs have been profoundly used in various sectors of human life. The sensing technology has made it possible for any sensor node to communicate and respond to the different attributes. This paper has briefed about various aspects in WSN. With the brief introduction to the WSN, the special issues have been discussed. Applications have been highlighted along with the security aspects in WSN. Thereafter the tabular comparison of different simulation software’s has been given. It can be concluded from the study done in this paper, that WSN has revolutionized almost every sector of modern era. It has huge scope of research in handling different aspects of human life. REFERENCES [1] I.F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, E.Cayirci, “A survey on sensor networks”, IEEE Communications Magazine, Vol. 40, Issue (8), pp. 102-114, 2002. [2] Samira Kalantary, Sara Taghipour, “ A Survey on architectures, protocols, applications and management in wireless Sensor Networks”, Journal of Advanced Computer Science & Technoloy, pp. 1-11, 2014. [3] KazemSohraby, Daniel Minoli, TaiebZnati, “Wireless Sensor Networks”, Wiley Publications, Second Edition. [4] Gaurav Sharma, SumanBala, Anil K. Verma, “Security Frameworks for Wireless Sensor Networks-Review,” 2nd International Conference on Communication, Computing & Security [ICCCS-2012] , No. 6, pp. 978 – 987, 2012. [5] Muhammad Zahid Khan et al. , “Limitations of Simulation Tools for Large- Scale Wireless Sensor Networks,” Workshops of International Conference on Advanced Information Networking and Applications, pp. 820-825, 2011.
  • 8. 740 Preetkamal Singh, Dr. OP Gupta and Sita Saini