SlideShare a Scribd company logo
1 of 5
Download to read offline
http://www.iaeme.com/IJARET/index.asp 210 editor@iaeme.com
International Journal of Advanced Research in Engineering and Technology (IJARET)
Volume 10, Issue 2, March-April 2019, pp. 210-214. Article ID: IJARET_10_02_020
Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=02
ISSN Print: 0976-6480 and ISSN Online: 0976-6499
© IAEME Publication
METHODOLOGIES AND CHALLENGES OF
WSN FOR IOT
Dr Syeda Gauhar Fatima
Professor ECE dept, Deccan College of Engineering and Technology,
Darussalam, Hyderabad.
Syeda Kausar Fatima
Associate Professor, Shadan College of Engineering and Technology, Hyderabad.
Syed Mohd Ali
Research Scholar, ECE dept, JNTUH, Kukatpally, Hyderabad.
Naseer Ahmed Khan
Student, ECE Dept, Deccan College of Engineering and Technology, Darussalam, Hyderabad.
Syed Adil
Student, ECE Dept, Deccan College of Engineering and Technology, Darussalam, Hyderabad
ABTRACT
Wireless sensor networks (WSNs) are discovering a wide range of applications in
various fields, counting control networks, enhanced-living scenarios, health-care,
industrial, production monitoring and in many other sectors. Internet of Things (IoT)
confirms smart human being life, through communications between things, machines
together with peoples. Hence, Relocation of Internet from People towards an Internet
of Things (IoT) and addition of Wireless sensors in to Internet of Things enables sensors
nodes connect internet dynamically in order to cooperate and achieve their tasks.
However, when WSNs become a portion of the Internet, we must carefully examine and
scrutinize the issues involved with this integration. In this paper, we evaluate various
methods to combine WSNs into the IOT and discuss a set of challenges.
Keywords: WSN; IOT; Integration approaches; Issues; Challenges.
Cite this Article: Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Syed Mohd Ali,
Naseer Ahmed Khan and Syed Adil, Methodologies and Challenges of WSN for IOT,
International Journal of Advanced Research in Engineering and Technology, 10(2),
2019, pp. 210-214.
http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2
Methodologies and Challenges of WSN for IOT
http://www.iaeme.com/IJARET/index.asp 211 editor@iaeme.com
1. INTRODUCTION
The chief impression of IoT [1] is enduring presence for variety of objects such as radio-
frequency identification (RFID) tags, sensors, actuators, mobile phones, etc.-which, having
unique addressing schemes and are able to view each other and cooperate with their neighbors
to reach mutual goal line. Wireless sensor networks (WSNs) are ad hoc networks which contain
a big amount of small sensor nodes with limited resources and one or more base stations. If we
wish to read the data from anyplace in the world, we need to assimilate the WSNs into the
Internet as part of the IoT. A wireless sensor network (WSN) is a wireless network consisting
of spatially distributed autonomous devices using sensors to cooperatively monitor physical or
environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants,
at different locations.
Since dynamically joining of Sensor nodes in to the Internet, careful examination is required
while integrating WSN and IOT. Lot of issues are involved with this integration. These issues
and challenges are required to be handled for getting compensations and reimbursements of
such integration. This paper presents different methods of integration of WSNs and Internet,
issues and challenges. Summarization of this paper is as follows: we discoursed WSN and
Internet with a view that WSNs are part of the Internet of Things in Section I. WSN applications
are discussed in Section II taking into consideration of issues involved with this integration.
Different additional approaches are debated in Section III and critical challenges to be
addressed to realize the full potential in integration of WSN into the Internet are discussed in
Section IV. Finally in Section V, we summarize our discussion regarding integration
approaches, issues and challenges of WSN for IOT.
2. WSN APPLICATIONS
Figure 1 Internet of Things
A network of dissimilar electronic devices can be considered as Internet of Things (Fig.1)
wherein without direct intrusion of the people the interaction takes place between people and
sensing information. Here, sensing and processing of data for proper interaction will be
achieved by the Device which is acting as a smart node in the network. Using key technology
like low power wireless connectivity, Smart objects are connected to the centralized cloud and
internet.
Applications areas of the wide wireless sensor network can be segmented into different
groups viz. Monitoring of space, objects and communications between space and objects.
Further the same can be prolonged to the additional category of monitoring human beings.
Environmental monitoring is an example for application area of the wireless sensor
network. Environmental parameters like temperature, moisture or light sensor readings are
collected using WSNs for different environments including mountains, forests and glaciers.
Observing particular objects like Structural monitoring becomes the second category. It
detects the ruptures of the structure and mechanical adjustments of bridges or buildings by
Dr Syeda Gauhar Fatima, Syeda Kausar Fatima , Syed Mohd Ali , Naseer Ahmed Khan and Syed Adil
http://www.iaeme.com/IJARET/index.asp 212 editor@iaeme.com
sensing the parameters like acoustic emissions, responses to stimuli and modes of vibration,
etc.
Monitoring environmental threats like volcanic activities and floods can be considered as
an example of the combined activity of Monitoring interaction between space and objects.
Further to the projected classifications, monitoring human beings becomes the last category.
In this case, the sensors can gather information on medical conditions using different functional
parameters and also can be used in monitoring the mandatory data like in home care scenario,
etc.
High diversity of WSN applications has been demonstrated from the projected category of
applications like monitoring environments and subjects, etc. Integration of WSN into the
Internet through suitable approach by considering this scenario of diversity will be useful for
the Internet of Things.
Development of IoT substructure around WSN is under development by different
corporations [2]. Examples are ‘A Smarter Planet’ project by IBM for utilizing sensors for water
management systems and intelligent cities and CeNSE project for deployment of a worldwide
sensor network to create a “central nervous system for the Earth” by HP Labs.
3. INTEGRATION APPROACHES
Three main approaches are discussed here for Connecting WSNs to the Internet, which is
mainly considering the WSN integration degree into the Internet structure. In first approach
(Fig. 2) a single gateway is used to connect the independent WSN to the Internet. This approach
is accepted for connecting most of the WSNs to access the Internet, and also interaction between
networks.
Figure 2 Approach of Independent Network
From the cumulative integration degree point of view, the second approach (Fig.3) of hybrid
network formed which consists of two independent network structures but rare dual sensor
nodes can access of the Internet.
Figure 3 Approach of Hybrid Network
In Fig.4 , the last approach multiple sensor nodes are joining the Internet in one hop. It is
similar to the WLAN structure and forms 802.15.4 access point network.
Methodologies and Challenges of WSN for IOT
http://www.iaeme.com/IJARET/index.asp 213 editor@iaeme.com
Figure 4 Approach of Access point Network
From the first approach it is obvious that the failure of Gateway functioning leads to the
breakdown of connection between Internet and WSN. However due to the several gateways
exists in the other two approaches this type of network failure will not be clear. Hence
depending on the WSN application scenario, one of these two approached would be favored if
network structure is maintained by the required application. As per distance point of view, and
for the WSNs organized in Mesh topology the second approach is preferable. As per the WSN
application classifications discussed in the previous section, “monitoring space” and the
“monitoring interactions between objects and space” prefers this Hybrid network approach.
Since using the third and last approach Internet can be accessed in one hop, WSN
applications requiring low latency prefers this access point approach. Hence, as per the
proposed WSN applications for monitoring of objects and human beings this approach is
preferred.
It has experiential the static network configuration from the second and third integration
approaches. As it is known that gateway reprogramming is required for the new device to join
the network. Hence, this requirement cannot be achieved in the existing form from both the
approaches. To fulfill this requirement “IP to the Field” paradigm may be proposed. As per this
model, sensors nodes are provided with the intelligence apart from the sensing tasks. Protocol
translation and forwarding functionalities are only given to the Gateway. From this, dynamic
network configuration would be attained and reprogramming of gateway operations are no
longer be required.
4. CHALLENGES FOR WSNS IN AN INTERNET OF THINGS
In addition to their usual sensing functionality sensor nodes are assigned with the additional
tasks with this “IP to the Field” paradigm. Accordingly, new tasks or challenges are to be faced
by the sensor nodes with this additional responsibility. Out of these, three potential tasks are
discussed here: Security, quality of service (QoS) management, and network configuration.
4.1. Security
on the sensitivity of application WSNs has the capability to provide data confidentiality,
authentication, integrity and availability without having internet access. To introduce malicious
nodes in the existing network or jamming or capturing, the physical presence near the WSN is
required by the attacker. However, this opening of WSNs into the internet enables attackers to
perform their malicious activities [3] from everywhere. Hence, the issues developed by this
internet connection like malware and others should be definitely addressed by the WSNs. To
ensure efficient protection by the current WSNs they are provided with central and unique
powerful gateway. However, due to the scarce of computational resources, energy and memory
constraints it is difficult to reuse the existing security mechanism. In fact, common Mica2 motes
offer 7.3 MHz 8-bit microcontrollers with 128 Kbytes of reprogrammable flash memory, 4
Kbytes of RAM and 4 Kbytes of EEPROM. Similar to the other Internet services, sensor nodes
are yet to support the cryptography with key lengths like RSA-1024 for better confidentiality.
Dr Syeda Gauhar Fatima, Syeda Kausar Fatima , Syed Mohd Ali , Naseer Ahmed Khan and Syed Adil
http://www.iaeme.com/IJARET/index.asp 214 editor@iaeme.com
Further, to avoid different attacks arising from Internet, it is required to develop better security
mechanisms[4] taking into account of the existing resource constraints.
4.2. Quality of Service:
Considering the Intelligence provided to the sensor nodes, they are also required to contribute
to quality of service by utilization of all mixed devices of the Internet of things. These mixed
devices make the possibility of the workload distribution between the nodes with the available
resources. Due to dynamic network configurations and link characteristics, it is not adequate to
operate the existing approaches of QoS available on the Internet [5]. Hence, better approaches
are required to be developed to avoid latency and loss of data, etc.
4.3. Configuration
Additional to the security and QoS management, sensor nodes should be able to handle diverse
tasks like handling their network configuration for new node joining the in the network [6] and
ensuring self-healing competences through detection and elimination of faulty nodes and
address administration to ensure scalable network constructions, etc. However, in the Internet
it is not a common feature of joining of new node through self-configuration. Hence, for smooth
operation of this network configuration, required applications are to be installed by the user and
necessary precautions to be taken to avoid the system crashes.
5. CONCLUSION
Here, we considered selected expanded application scenarios like monitoring environments and
subjects to examine the integration of WSNs into the Internet.
Considering their main features, three different integration approaches are examined [7].
However, it is practical that these approaches are not supporting the requirement of dynamic
network configuration of Internet of Things for new node joining the network in the existing
form. Hence, as a solution to this, we considered IP to the Field pattern through providing
intellect to the sensor nodes. Further, three different challenges to be addressed are highlighted
from this pattern option: Security, QoS, and configuration management. By analyzing these
challenges, it is observed that the existing solutions in the Internet are not suitable for these
sensor networks having dynamic network configurations [8]. Hence, better mechanisms are to
be developed and adapted considering the constraints of WSNs.
REFERENCES
[1] J. A. Stankovic, “Research directions for the Internet of Things,” IEEE Internet Things J.,
vol. 1, no. 1, pp. 3–9, Feb. 2014.
[2] IBM: A Smarter Planet, http://www.ibm.com/smarterplanet/, Accessed on October 2010.
[3] J. Claessens. Trust, Security, Privacy, and Identity perspective. Panel on Future Internet
Service Offer, 2008
[4] C.P. Mayer. Security and Privacy Challenges in the Internet of Things. KiVS Workshop
on Global Sensor Network, 2009.
[5] R. Roman, J. Lopez. Integrating Wireless Sensor Networks and the Internet: a Security
Analysis. Internet Research, Vol. 19, no. 2, pp. 246-259, 2009.
[6] M. A. Ezechina, K. K. Okwara, C. A. U. Ugboaja. The Internet of Things (Iot): A Scalable
Approach to Connecting Everything. The International Journal of Engineering and Science
4(1) (2015) 09-12.
[7] Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision, architectural elements, and
future directions." Future Generation Computer Systems 29.7 (2013): 1645-1660.
[8] A. Menon1, et al. " Implementation of internet of things in bus transport system of
singapore"Asian Journal of Engineering Research(2013).

More Related Content

What's hot

IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS SystemIRJET Journal
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKIAEME Publication
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
 
Implementation of embedded real time monitoring temperature and humidity system
Implementation of embedded real time monitoring temperature and humidity systemImplementation of embedded real time monitoring temperature and humidity system
Implementation of embedded real time monitoring temperature and humidity systemJournal Papers
 
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...IAEME Publication
 
High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0Journal Papers
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Journal Papers
 
EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...
EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...
EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...IJNSA Journal
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 
Secure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmSecure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmIJERA Editor
 
IRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival SystemIRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival SystemIRJET Journal
 
IRJET-E-Waste Management using Robotics
IRJET-E-Waste Management using RoboticsIRJET-E-Waste Management using Robotics
IRJET-E-Waste Management using RoboticsIRJET Journal
 

What's hot (20)

IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
Implementation of embedded real time monitoring temperature and humidity system
Implementation of embedded real time monitoring temperature and humidity systemImplementation of embedded real time monitoring temperature and humidity system
Implementation of embedded real time monitoring temperature and humidity system
 
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
 
K017547981
K017547981K017547981
K017547981
 
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
A1104010105
A1104010105A1104010105
A1104010105
 
High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
574 501-507
574 501-507574 501-507
574 501-507
 
EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...
EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...
EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
 
Secure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmSecure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing Paradigm
 
IRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival SystemIRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival System
 
IRJET-E-Waste Management using Robotics
IRJET-E-Waste Management using RoboticsIRJET-E-Waste Management using Robotics
IRJET-E-Waste Management using Robotics
 

Similar to METHODOLOGIES AND CHALLENGES OF WSN FOR IOT

OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSIJCNCJournal
 
Integration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor networkIntegration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor networkIJECEIAES
 
Software defined fog platform
Software defined fog platform Software defined fog platform
Software defined fog platform IJECEIAES
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
 
OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING
OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING
OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING AlAtfat
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET Journal
 
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...IRJET Journal
 
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU TechniqueIRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU TechniqueIRJET Journal
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfkanaka vardhini
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfraja118355
 
IoT & Applications Digital Notes (1).pdf
IoT & Applications Digital Notes (1).pdfIoT & Applications Digital Notes (1).pdf
IoT & Applications Digital Notes (1).pdfssusere169ea1
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfMaaheenKashish
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
 
Design and implement WSN/IOT smart parking management system using microcontr...
Design and implement WSN/IOT smart parking management system using microcontr...Design and implement WSN/IOT smart parking management system using microcontr...
Design and implement WSN/IOT smart parking management system using microcontr...IJECEIAES
 

Similar to METHODOLOGIES AND CHALLENGES OF WSN FOR IOT (20)

Research, challenges and opportunities in software define radio technologies
Research, challenges and opportunities in software define radio  technologiesResearch, challenges and opportunities in software define radio  technologies
Research, challenges and opportunities in software define radio technologies
 
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
 
Integration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor networkIntegration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor network
 
Software defined fog platform
Software defined fog platform Software defined fog platform
Software defined fog platform
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
 
IoTwlcHITnewSlideshare.pptx
IoTwlcHITnewSlideshare.pptxIoTwlcHITnewSlideshare.pptx
IoTwlcHITnewSlideshare.pptx
 
OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING
OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING
OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
Iot Report
Iot ReportIot Report
Iot Report
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
 
11. 23762.pdf
11. 23762.pdf11. 23762.pdf
11. 23762.pdf
 
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
 
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU TechniqueIRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
 
IoT & Applications Digital Notes (1).pdf
IoT & Applications Digital Notes (1).pdfIoT & Applications Digital Notes (1).pdf
IoT & Applications Digital Notes (1).pdf
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
 
Design and implement WSN/IOT smart parking management system using microcontr...
Design and implement WSN/IOT smart parking management system using microcontr...Design and implement WSN/IOT smart parking management system using microcontr...
Design and implement WSN/IOT smart parking management system using microcontr...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

METHODOLOGIES AND CHALLENGES OF WSN FOR IOT

  • 1. http://www.iaeme.com/IJARET/index.asp 210 editor@iaeme.com International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 10, Issue 2, March-April 2019, pp. 210-214. Article ID: IJARET_10_02_020 Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=02 ISSN Print: 0976-6480 and ISSN Online: 0976-6499 © IAEME Publication METHODOLOGIES AND CHALLENGES OF WSN FOR IOT Dr Syeda Gauhar Fatima Professor ECE dept, Deccan College of Engineering and Technology, Darussalam, Hyderabad. Syeda Kausar Fatima Associate Professor, Shadan College of Engineering and Technology, Hyderabad. Syed Mohd Ali Research Scholar, ECE dept, JNTUH, Kukatpally, Hyderabad. Naseer Ahmed Khan Student, ECE Dept, Deccan College of Engineering and Technology, Darussalam, Hyderabad. Syed Adil Student, ECE Dept, Deccan College of Engineering and Technology, Darussalam, Hyderabad ABTRACT Wireless sensor networks (WSNs) are discovering a wide range of applications in various fields, counting control networks, enhanced-living scenarios, health-care, industrial, production monitoring and in many other sectors. Internet of Things (IoT) confirms smart human being life, through communications between things, machines together with peoples. Hence, Relocation of Internet from People towards an Internet of Things (IoT) and addition of Wireless sensors in to Internet of Things enables sensors nodes connect internet dynamically in order to cooperate and achieve their tasks. However, when WSNs become a portion of the Internet, we must carefully examine and scrutinize the issues involved with this integration. In this paper, we evaluate various methods to combine WSNs into the IOT and discuss a set of challenges. Keywords: WSN; IOT; Integration approaches; Issues; Challenges. Cite this Article: Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Syed Mohd Ali, Naseer Ahmed Khan and Syed Adil, Methodologies and Challenges of WSN for IOT, International Journal of Advanced Research in Engineering and Technology, 10(2), 2019, pp. 210-214. http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2
  • 2. Methodologies and Challenges of WSN for IOT http://www.iaeme.com/IJARET/index.asp 211 editor@iaeme.com 1. INTRODUCTION The chief impression of IoT [1] is enduring presence for variety of objects such as radio- frequency identification (RFID) tags, sensors, actuators, mobile phones, etc.-which, having unique addressing schemes and are able to view each other and cooperate with their neighbors to reach mutual goal line. Wireless sensor networks (WSNs) are ad hoc networks which contain a big amount of small sensor nodes with limited resources and one or more base stations. If we wish to read the data from anyplace in the world, we need to assimilate the WSNs into the Internet as part of the IoT. A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. Since dynamically joining of Sensor nodes in to the Internet, careful examination is required while integrating WSN and IOT. Lot of issues are involved with this integration. These issues and challenges are required to be handled for getting compensations and reimbursements of such integration. This paper presents different methods of integration of WSNs and Internet, issues and challenges. Summarization of this paper is as follows: we discoursed WSN and Internet with a view that WSNs are part of the Internet of Things in Section I. WSN applications are discussed in Section II taking into consideration of issues involved with this integration. Different additional approaches are debated in Section III and critical challenges to be addressed to realize the full potential in integration of WSN into the Internet are discussed in Section IV. Finally in Section V, we summarize our discussion regarding integration approaches, issues and challenges of WSN for IOT. 2. WSN APPLICATIONS Figure 1 Internet of Things A network of dissimilar electronic devices can be considered as Internet of Things (Fig.1) wherein without direct intrusion of the people the interaction takes place between people and sensing information. Here, sensing and processing of data for proper interaction will be achieved by the Device which is acting as a smart node in the network. Using key technology like low power wireless connectivity, Smart objects are connected to the centralized cloud and internet. Applications areas of the wide wireless sensor network can be segmented into different groups viz. Monitoring of space, objects and communications between space and objects. Further the same can be prolonged to the additional category of monitoring human beings. Environmental monitoring is an example for application area of the wireless sensor network. Environmental parameters like temperature, moisture or light sensor readings are collected using WSNs for different environments including mountains, forests and glaciers. Observing particular objects like Structural monitoring becomes the second category. It detects the ruptures of the structure and mechanical adjustments of bridges or buildings by
  • 3. Dr Syeda Gauhar Fatima, Syeda Kausar Fatima , Syed Mohd Ali , Naseer Ahmed Khan and Syed Adil http://www.iaeme.com/IJARET/index.asp 212 editor@iaeme.com sensing the parameters like acoustic emissions, responses to stimuli and modes of vibration, etc. Monitoring environmental threats like volcanic activities and floods can be considered as an example of the combined activity of Monitoring interaction between space and objects. Further to the projected classifications, monitoring human beings becomes the last category. In this case, the sensors can gather information on medical conditions using different functional parameters and also can be used in monitoring the mandatory data like in home care scenario, etc. High diversity of WSN applications has been demonstrated from the projected category of applications like monitoring environments and subjects, etc. Integration of WSN into the Internet through suitable approach by considering this scenario of diversity will be useful for the Internet of Things. Development of IoT substructure around WSN is under development by different corporations [2]. Examples are ‘A Smarter Planet’ project by IBM for utilizing sensors for water management systems and intelligent cities and CeNSE project for deployment of a worldwide sensor network to create a “central nervous system for the Earth” by HP Labs. 3. INTEGRATION APPROACHES Three main approaches are discussed here for Connecting WSNs to the Internet, which is mainly considering the WSN integration degree into the Internet structure. In first approach (Fig. 2) a single gateway is used to connect the independent WSN to the Internet. This approach is accepted for connecting most of the WSNs to access the Internet, and also interaction between networks. Figure 2 Approach of Independent Network From the cumulative integration degree point of view, the second approach (Fig.3) of hybrid network formed which consists of two independent network structures but rare dual sensor nodes can access of the Internet. Figure 3 Approach of Hybrid Network In Fig.4 , the last approach multiple sensor nodes are joining the Internet in one hop. It is similar to the WLAN structure and forms 802.15.4 access point network.
  • 4. Methodologies and Challenges of WSN for IOT http://www.iaeme.com/IJARET/index.asp 213 editor@iaeme.com Figure 4 Approach of Access point Network From the first approach it is obvious that the failure of Gateway functioning leads to the breakdown of connection between Internet and WSN. However due to the several gateways exists in the other two approaches this type of network failure will not be clear. Hence depending on the WSN application scenario, one of these two approached would be favored if network structure is maintained by the required application. As per distance point of view, and for the WSNs organized in Mesh topology the second approach is preferable. As per the WSN application classifications discussed in the previous section, “monitoring space” and the “monitoring interactions between objects and space” prefers this Hybrid network approach. Since using the third and last approach Internet can be accessed in one hop, WSN applications requiring low latency prefers this access point approach. Hence, as per the proposed WSN applications for monitoring of objects and human beings this approach is preferred. It has experiential the static network configuration from the second and third integration approaches. As it is known that gateway reprogramming is required for the new device to join the network. Hence, this requirement cannot be achieved in the existing form from both the approaches. To fulfill this requirement “IP to the Field” paradigm may be proposed. As per this model, sensors nodes are provided with the intelligence apart from the sensing tasks. Protocol translation and forwarding functionalities are only given to the Gateway. From this, dynamic network configuration would be attained and reprogramming of gateway operations are no longer be required. 4. CHALLENGES FOR WSNS IN AN INTERNET OF THINGS In addition to their usual sensing functionality sensor nodes are assigned with the additional tasks with this “IP to the Field” paradigm. Accordingly, new tasks or challenges are to be faced by the sensor nodes with this additional responsibility. Out of these, three potential tasks are discussed here: Security, quality of service (QoS) management, and network configuration. 4.1. Security on the sensitivity of application WSNs has the capability to provide data confidentiality, authentication, integrity and availability without having internet access. To introduce malicious nodes in the existing network or jamming or capturing, the physical presence near the WSN is required by the attacker. However, this opening of WSNs into the internet enables attackers to perform their malicious activities [3] from everywhere. Hence, the issues developed by this internet connection like malware and others should be definitely addressed by the WSNs. To ensure efficient protection by the current WSNs they are provided with central and unique powerful gateway. However, due to the scarce of computational resources, energy and memory constraints it is difficult to reuse the existing security mechanism. In fact, common Mica2 motes offer 7.3 MHz 8-bit microcontrollers with 128 Kbytes of reprogrammable flash memory, 4 Kbytes of RAM and 4 Kbytes of EEPROM. Similar to the other Internet services, sensor nodes are yet to support the cryptography with key lengths like RSA-1024 for better confidentiality.
  • 5. Dr Syeda Gauhar Fatima, Syeda Kausar Fatima , Syed Mohd Ali , Naseer Ahmed Khan and Syed Adil http://www.iaeme.com/IJARET/index.asp 214 editor@iaeme.com Further, to avoid different attacks arising from Internet, it is required to develop better security mechanisms[4] taking into account of the existing resource constraints. 4.2. Quality of Service: Considering the Intelligence provided to the sensor nodes, they are also required to contribute to quality of service by utilization of all mixed devices of the Internet of things. These mixed devices make the possibility of the workload distribution between the nodes with the available resources. Due to dynamic network configurations and link characteristics, it is not adequate to operate the existing approaches of QoS available on the Internet [5]. Hence, better approaches are required to be developed to avoid latency and loss of data, etc. 4.3. Configuration Additional to the security and QoS management, sensor nodes should be able to handle diverse tasks like handling their network configuration for new node joining the in the network [6] and ensuring self-healing competences through detection and elimination of faulty nodes and address administration to ensure scalable network constructions, etc. However, in the Internet it is not a common feature of joining of new node through self-configuration. Hence, for smooth operation of this network configuration, required applications are to be installed by the user and necessary precautions to be taken to avoid the system crashes. 5. CONCLUSION Here, we considered selected expanded application scenarios like monitoring environments and subjects to examine the integration of WSNs into the Internet. Considering their main features, three different integration approaches are examined [7]. However, it is practical that these approaches are not supporting the requirement of dynamic network configuration of Internet of Things for new node joining the network in the existing form. Hence, as a solution to this, we considered IP to the Field pattern through providing intellect to the sensor nodes. Further, three different challenges to be addressed are highlighted from this pattern option: Security, QoS, and configuration management. By analyzing these challenges, it is observed that the existing solutions in the Internet are not suitable for these sensor networks having dynamic network configurations [8]. Hence, better mechanisms are to be developed and adapted considering the constraints of WSNs. REFERENCES [1] J. A. Stankovic, “Research directions for the Internet of Things,” IEEE Internet Things J., vol. 1, no. 1, pp. 3–9, Feb. 2014. [2] IBM: A Smarter Planet, http://www.ibm.com/smarterplanet/, Accessed on October 2010. [3] J. Claessens. Trust, Security, Privacy, and Identity perspective. Panel on Future Internet Service Offer, 2008 [4] C.P. Mayer. Security and Privacy Challenges in the Internet of Things. KiVS Workshop on Global Sensor Network, 2009. [5] R. Roman, J. Lopez. Integrating Wireless Sensor Networks and the Internet: a Security Analysis. Internet Research, Vol. 19, no. 2, pp. 246-259, 2009. [6] M. A. Ezechina, K. K. Okwara, C. A. U. Ugboaja. The Internet of Things (Iot): A Scalable Approach to Connecting Everything. The International Journal of Engineering and Science 4(1) (2015) 09-12. [7] Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision, architectural elements, and future directions." Future Generation Computer Systems 29.7 (2013): 1645-1660. [8] A. Menon1, et al. " Implementation of internet of things in bus transport system of singapore"Asian Journal of Engineering Research(2013).