SlideShare a Scribd company logo
1 of 3
Download to read offline
Sarhan M. Musa et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.101-103

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Wireless Sensor Networks: Opportunities and Challenges
Matthew N. O. Sadiku* and Sarhan M. Musa*, Omonowo D. Momoh**
*

Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446
College of Engineering, Technology, and Computer Science Indiana University-Purdue University Fort
Wayne, IN 46805
**

ABSTRACT
The popularity of cell phones, laptops, PDAs and intelligent electronics has made computing devices to become
cheaper and more pervasive in daily life. The desire for connectivity among these devices has caused an
exponential growth in wireless communication. Wireless sensor networks (WSNs) provide an example of this
phenomenon.
WSNs belong to the general family of sensor networks that employ distributed sensors to
collect information on entities of interest. This paper provides a brief introduction to wireless sensor networks.
It addresses the opportunities and challenges of WSNs.
Key Words: Wireless networks, sensors, computing

I.

INTRODUCTION

A wireless sensor network (WSN) usually
consists of a large number (hundreds or thousands)
of sensor nodes deployed over a geographical region.
The wireless sensor nodes are compact, lightweighted, and battery-powered devices that can be
used in virtually any environment [1-3]. The sensor
nodes monitor physical or environmental conditions
such as temperature/heat, humidity, sound, vibration,
pressure, light, object motion, pollutants, presence of
certain objects, noise level or characteristics of an
object such as weight, size, speed, direction, and its
latest position. As shown in Figure 1, each sensor
node is made up of four components: a power unit, a
transceiver unit, a sensing unit, and a processing
unit. The node may also have some applicationdependent components such as power generator,
location
finding
system,
and
mobilizer.
Communication among the nodes is done in a
wireless fashion, and thus, the name wireless sensor
networks.
Companies such as Crossbow
(www.xbow.com) and Monnit (www.monnit.com)
have developed the necessary software and hardwire
building blocks for WSNs.
In general, there may be both sensing and
nonsensing nodes in a WSN; i.e. all sensors are
nodes but not all nodes are sensors. A sensor has
four operating modes: transmission, reception, idle
listening, and sleep. Collision occurs when there are
two or more nodes transmit at the same time.
A sensor node is designed to use an
operating system (OS). TinyOS (developed at UC
Berkeley) is perhaps the first operating system
specifically designed for WSNs. It is a generalpurpose OS. Both the TinyOS and programs written
for it are written in a special programming language
www.ijera.com

called NesC, which is essentially an extension of C
programming language.
Figure 2 presents a typical wireless sensor
network. Sensors can be deployed on the ground, in
the air, under water, in vehicles, on bodies, and
inside buildings. A network of sensors can detect
and track threats.

II.

APPLICATIONS

In September 1999, Business Week
predicted that WSN would be one of the 21 most
important technologies for the 21st century. The
number of applications of WSN is increasing
rapidly. It is generally true that applications should
shape and form the technology for which they are
intended. WSNs are no exception to this. WSNs
have been technology-driven in their development.
Advances in software technology and wireless
communication have paved the way for successful
adoption of the wireless sensor networks in various
applications. Some of the expected applications of
WSNs will require a large number of devices in
order of tens of thousands of nodes. Applications of
WSNs typically involve some kind of monitoring,
tracking, or controlling. Some of the specific
applications include the following [4-6]:
(a) Military Applications:
As with many
technologies, the development of WSNs was
motivated by military applications such as battlefield
surveillance. Typically, sensors can report vehicle
and personnel movement, allowing a close
monitoring of opposing forces. Other military
applications include monitoring friendly forces,
battlefield surveillance, reconnaissance of opposing
forces, and battle damage assessment. Sensitive
objects and structures such as atomic plants and
101 | P a g e
Sarhan M. Musa et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.101-103
ammunition depots can be protected by intelligent
sensors.
(b) Civil Engineering: Structural health monitoring
for civil structures has been a research focus for
academia and industry. Sensors can be placed in
bridges to detect structural weakness and in water
reservoirs to detect hazardous materials.
(c) Agriculture and Environment Monitoring: A
number of WSNs have been deployed for
agricultural and environmental monitoring. For
example, the Zebranet project at Princeton aims at
tracking the movement of zebras in Africa.
Researchers at University of West Australia are
developing a prototype WSN for monitoring of soil
water. Fire and floods can be detected by densely
deployed sensor networks. WSNs can potentially
advance the pursuit of geographical studies of
volcanic activity.
(d) Industrial Applications: Sensors are already
widely deployed in industrial applications, such as in
monitoring of assembly lines. Industrial robots are
equipped with sensors and are connected wirelessly
to a computer. Cars, which have sensors and
actuators in them, can be networked to improve the
efficiency of traffic.
In addition to traditional applications of
wireless sensor networks, they can also be used to
protect cultural property. In cultural property
protection, setting up fixed structure (with power
lines and communication cables) is not allowed.
Since WSNs do not require wired infrastructure, they
can be used for cultural property protection. For
example, Bulguksa temple (a Buddhist temple in
South Korea) has been designated as the world’s
cultural property by UNESCO. Such a temple
requires WSN to monitor and protect cultural
artifacts in the temple.

III.

CHALLENGES

As noted above, wireless sensor networks
have a wide range of potential applications.
However, there are many challenging problems that
must be addressed for efficient operation of WSNs in
real applications and current technology is not up to
meeting some of these challenges. These challenges
include [7-9]:
(a) Size: The main challenge is to produce low cost
and tiny sensor nodes. Miniaturization and low cost
will follow from the recent and future development
in the field of micro-electro-mechanical systems
(MEMs). Several aspects of WSN nodes can be
miniaturized with MEMs technology.

www.ijera.com

www.ijera.com

(b) Energy: Energy is the scarcest resource of WSN
nodes and it determines the lifetime of WSNs. Being
a microelectronic device, a sensor node can be
equipped with a limited power source (less than 0.5
Ah, 1.2 V). Sensor nodes may be equipped with
effective power scavenging techniques, such as solar
cells, because it is not easy to access or replace them
after deployment. For those that use battery, battery
lifetime is one of the critical factors to consider in
the network design.
(c) Storage: The use of wireless channels and the
reliability of sensor nodes lead to a new approach for
data storage and retrieval. The new approach is to
have data stored
locally within the sensors.
(d) Routing: The design of routing protocols in
WSNs is influenced by several challenging factors
that must be overcome in order to achieve efficient
communication. Routing in WSNs differs from the
one in conventional IP networks. Getting data from
all the thousands of sensors may result in the receipt
of irrelevant and redundant data from nodes. This is
definitely inefficient at the level of storage and
energy.
(e) Security: WSNs communicate important private
data and security is a crucial issue. We recall that
many WSNs are used for military or surveillance
purposes. One way to ensure data security is to use
encryption, but this is not practical for efficiency and
resource constraints.
It is difficult, if not impossible, to meet
these challenges in a single network. Most WSNs
are application specific and are designed to meet the
challenges for that specific application.

IV.

CONCLUSIONS

This paper presents an overview of wireless
sensor networks. It is hoped that the reader would
have an appreciation of the applications for which
WSNs are intended.
The study of WSNs is
challenging because it requires an enormous breadth
of knowledge from a variety of disciplines including
signal processing, networking and protocols,
embedded systems, and distributed algorithms. The
field of WSN is gaining interest among researchers
and diverse groups such as environmental, public
safety, military, and medicine. The development and
applications of WSNs have made them to be hot
research topics. Sensor network technology will
have a significant impact on our lives in the 21 st
century.

102 | P a g e
Sarhan M. Musa et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.101-103
REFERENCES
[1]

[2]

[3]

[4]

[5]

I. F. Akylidiz et al., “A survey on sensor
networks,”
IEEE
Communications
Magazine, Aug. 2002, pp. 102-114.
l. Mokdad et al., “Performance evaluation
tools for QoS MAC protocol for wireless
sensor networks,” Ad Hoc Networks, vol.
12, 2014, pp. 86-99.
R. I. de Silva et al., “Spatial query
processing in wireless sensor networks—A
survey,” Information Fusion, vol. 15, 2014,
pp. 32-34.
H. Karl and A. Willig, Protocols and
Architectures for Wireless Sensor Networks.
Chichester, UK: John Wiley & Sons, 2005,
pp. 3-7.
H. K. Patil and T. M. Chen, “Wireless
Sensor Network Security,’ in J. Vacca (ed.),
Computer and Information Security
Handbook. San Francisco, CA: Morgan

[6]

[7]

[8]

[9]

www.ijera.com

Kaufmann Publishers, 2013, 2nd ed.,chapter
15, pp. 349-397.
E. Aleisa, “Wireless sensor networks
framework for water resource management
that supports QoS in the Kingdom of Saudi
Arabia,” Procedia Computer Science, vol.
19, 2013, pp. 232-239.
M. Ilyas and I. Mahgoub (eds.), Handbook
of Sensor Networks: Compact Wireless and
Wired Sensing Systems. Boca Raton, FL:
CRC Press, 2005, pp. 1.1-1.14.’
J. Lopez and J. Zhou, Wireless Sensor
Network
Security.
Amsterdam,
Neverthelands: IOS Press, 2008, pp. 164122.
Y. Li, M. T. Thai, and W. Wu, Wireless
Sensor Networks and Applications. New
York, NY: Springer, 2008, pp. 403-421.

Figure 1 Components of a sensor node.

Figure 2
www.ijera.com

Wireless sensor network with Internet access
103 | P a g e

More Related Content

What's hot

IRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security SystemIRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security SystemIRJET Journal
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET Journal
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
 
The sensors networks wsn and vsn a
The sensors networks wsn and vsn aThe sensors networks wsn and vsn a
The sensors networks wsn and vsn aijwmn
 
IRJET- Future of Wireless Mobile Communication with Nanotechnology and Applic...
IRJET- Future of Wireless Mobile Communication with Nanotechnology and Applic...IRJET- Future of Wireless Mobile Communication with Nanotechnology and Applic...
IRJET- Future of Wireless Mobile Communication with Nanotechnology and Applic...IRJET Journal
 
The Internet of Nano Things (IoNT)
The Internet of Nano Things (IoNT)The Internet of Nano Things (IoNT)
The Internet of Nano Things (IoNT)Haider Tarish Haider
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)IAESIJEECS
 
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSSURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSijasuc
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET Journal
 
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensors
Wireless Multimedia Sensor Network: A Survey on Multimedia SensorsWireless Multimedia Sensor Network: A Survey on Multimedia Sensors
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensorsidescitation
 
ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...
ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...
ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...ijasuc
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyClayton Hatathlie
 
Smart Materials For Military Applications
Smart Materials For Military ApplicationsSmart Materials For Military Applications
Smart Materials For Military ApplicationsAnupam_Tiwari
 
736 ijar 14994
736 ijar 14994736 ijar 14994
736 ijar 14994mrewaabd
 
Internet of nano things
Internet of nano thingsInternet of nano things
Internet of nano thingsCV Kashyap
 
Detailed analysis of fiber optic networks and its benefits in defense applica...
Detailed analysis of fiber optic networks and its benefits in defense applica...Detailed analysis of fiber optic networks and its benefits in defense applica...
Detailed analysis of fiber optic networks and its benefits in defense applica...IAEME Publication
 

What's hot (20)

IRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security SystemIRJET- Wireless Sensor Network for Railway Security System
IRJET- Wireless Sensor Network for Railway Security System
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
The sensors networks wsn and vsn a
The sensors networks wsn and vsn aThe sensors networks wsn and vsn a
The sensors networks wsn and vsn a
 
IRJET- Future of Wireless Mobile Communication with Nanotechnology and Applic...
IRJET- Future of Wireless Mobile Communication with Nanotechnology and Applic...IRJET- Future of Wireless Mobile Communication with Nanotechnology and Applic...
IRJET- Future of Wireless Mobile Communication with Nanotechnology and Applic...
 
The Internet of Nano Things (IoNT)
The Internet of Nano Things (IoNT)The Internet of Nano Things (IoNT)
The Internet of Nano Things (IoNT)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
 
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSSURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
 
Akansu master's project ws ns
Akansu master's project ws nsAkansu master's project ws ns
Akansu master's project ws ns
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
 
I010224146
I010224146I010224146
I010224146
 
Nokia morph technology
Nokia morph technologyNokia morph technology
Nokia morph technology
 
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensors
Wireless Multimedia Sensor Network: A Survey on Multimedia SensorsWireless Multimedia Sensor Network: A Survey on Multimedia Sensors
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensors
 
ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...
ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...
ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
 
Smart Materials For Military Applications
Smart Materials For Military ApplicationsSmart Materials For Military Applications
Smart Materials For Military Applications
 
736 ijar 14994
736 ijar 14994736 ijar 14994
736 ijar 14994
 
Internet of nano things
Internet of nano thingsInternet of nano things
Internet of nano things
 
Detailed analysis of fiber optic networks and its benefits in defense applica...
Detailed analysis of fiber optic networks and its benefits in defense applica...Detailed analysis of fiber optic networks and its benefits in defense applica...
Detailed analysis of fiber optic networks and its benefits in defense applica...
 

Viewers also liked

8 sentença judicial
8   sentença judicial8   sentença judicial
8 sentença judicialVitor Lessa
 
Nextlevel plano de compensação
Nextlevel plano de compensaçãoNextlevel plano de compensação
Nextlevel plano de compensaçãocelena66
 
Cuestionario n 2
Cuestionario n  2Cuestionario n  2
Cuestionario n 2Mari Perez
 
Presentación de "Mal de escuela" Daniel Pennac
Presentación de "Mal de escuela" Daniel PennacPresentación de "Mal de escuela" Daniel Pennac
Presentación de "Mal de escuela" Daniel Pennacmaldeescuela
 
Farmacología básica 2008, pp. 167 – 173
Farmacología básica 2008, pp. 167 – 173Farmacología básica 2008, pp. 167 – 173
Farmacología básica 2008, pp. 167 – 173J C
 
Growing Organic Produce in Greenhouses
Growing Organic Produce in GreenhousesGrowing Organic Produce in Greenhouses
Growing Organic Produce in GreenhousesGGS Structures Inc.
 
tutorial 1º acesso à comunidade jovem sus
tutorial 1º acesso à comunidade jovem sustutorial 1º acesso à comunidade jovem sus
tutorial 1º acesso à comunidade jovem susemsead
 
O matrimónio perfeito
O matrimónio perfeitoO matrimónio perfeito
O matrimónio perfeitoRui Paixão
 
Alteracao na producao de hormonio de crescimento e tireoide
Alteracao na producao de hormonio de crescimento e tireoideAlteracao na producao de hormonio de crescimento e tireoide
Alteracao na producao de hormonio de crescimento e tireoideUniversidade Lurio
 
1 as batalhas de josué amalequitas
1 as batalhas de josué  amalequitas1 as batalhas de josué  amalequitas
1 as batalhas de josué amalequitaszecalu
 
Discipulado eco 1 funadamentos
Discipulado eco 1   funadamentosDiscipulado eco 1   funadamentos
Discipulado eco 1 funadamentosDevotio Christus
 
01 lógica, conjuntos e intervalos
01 lógica, conjuntos e intervalos01 lógica, conjuntos e intervalos
01 lógica, conjuntos e intervalosFelipe Renan
 

Viewers also liked (20)

Ar4102321325
Ar4102321325Ar4102321325
Ar4102321325
 
X4102188192
X4102188192X4102188192
X4102188192
 
8 sentença judicial
8   sentença judicial8   sentença judicial
8 sentença judicial
 
Nextlevel plano de compensação
Nextlevel plano de compensaçãoNextlevel plano de compensação
Nextlevel plano de compensação
 
Los meses del año
Los meses del añoLos meses del año
Los meses del año
 
Cuestionario n 2
Cuestionario n  2Cuestionario n  2
Cuestionario n 2
 
Tour Colombia 2015 presentacion
Tour Colombia 2015 presentacionTour Colombia 2015 presentacion
Tour Colombia 2015 presentacion
 
Presentación de "Mal de escuela" Daniel Pennac
Presentación de "Mal de escuela" Daniel PennacPresentación de "Mal de escuela" Daniel Pennac
Presentación de "Mal de escuela" Daniel Pennac
 
Farmacología básica 2008, pp. 167 – 173
Farmacología básica 2008, pp. 167 – 173Farmacología básica 2008, pp. 167 – 173
Farmacología básica 2008, pp. 167 – 173
 
Growing Organic Produce in Greenhouses
Growing Organic Produce in GreenhousesGrowing Organic Produce in Greenhouses
Growing Organic Produce in Greenhouses
 
tutorial 1º acesso à comunidade jovem sus
tutorial 1º acesso à comunidade jovem sustutorial 1º acesso à comunidade jovem sus
tutorial 1º acesso à comunidade jovem sus
 
Apresentação Cover V3
Apresentação Cover V3Apresentação Cover V3
Apresentação Cover V3
 
Un buen proposito
Un buen propositoUn buen proposito
Un buen proposito
 
O matrimónio perfeito
O matrimónio perfeitoO matrimónio perfeito
O matrimónio perfeito
 
ESTATUTO DO DCE UFGD
ESTATUTO DO DCE UFGDESTATUTO DO DCE UFGD
ESTATUTO DO DCE UFGD
 
Alteracao na producao de hormonio de crescimento e tireoide
Alteracao na producao de hormonio de crescimento e tireoideAlteracao na producao de hormonio de crescimento e tireoide
Alteracao na producao de hormonio de crescimento e tireoide
 
Pupilpad Presentation (1)
Pupilpad Presentation (1)Pupilpad Presentation (1)
Pupilpad Presentation (1)
 
1 as batalhas de josué amalequitas
1 as batalhas de josué  amalequitas1 as batalhas de josué  amalequitas
1 as batalhas de josué amalequitas
 
Discipulado eco 1 funadamentos
Discipulado eco 1   funadamentosDiscipulado eco 1   funadamentos
Discipulado eco 1 funadamentos
 
01 lógica, conjuntos e intervalos
01 lógica, conjuntos e intervalos01 lógica, conjuntos e intervalos
01 lógica, conjuntos e intervalos
 

Similar to O4101101103

A Review On Wireless Sensor Network
A Review On Wireless Sensor NetworkA Review On Wireless Sensor Network
A Review On Wireless Sensor NetworkLori Moore
 
A Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor NetworkA Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor NetworkCrystal Sanchez
 
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) IJCSES Journal
 
Wireless Sensor Networks in Chemical Industry
Wireless Sensor Networks in Chemical IndustryWireless Sensor Networks in Chemical Industry
Wireless Sensor Networks in Chemical Industryjournal ijrtem
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor networkJawhar Ali
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
 
Review Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnReview Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnYen Kheng Tan (PhD, SrMIEEE)
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKNishant Bhardwaj
 
wireless sensor networks & application :forest fire detection
 wireless sensor networks  & application :forest fire detection wireless sensor networks  & application :forest fire detection
wireless sensor networks & application :forest fire detectionMueenudheen Shafaquath V P
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkNeha Kulkarni
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks ProtocolsA Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks ProtocolsMary Montoya
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksabdullah roomi
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Easy n Inspire L
 
wireless sensor networks based on iot
wireless sensor networks based on iotwireless sensor networks based on iot
wireless sensor networks based on iotEswari Cheedella
 

Similar to O4101101103 (20)

A Review On Wireless Sensor Network
A Review On Wireless Sensor NetworkA Review On Wireless Sensor Network
A Review On Wireless Sensor Network
 
A Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor NetworkA Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor Network
 
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
 
Wireless Sensor Networks in Chemical Industry
Wireless Sensor Networks in Chemical IndustryWireless Sensor Networks in Chemical Industry
Wireless Sensor Networks in Chemical Industry
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networks
 
Review Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnReview Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable Wsn
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
 
wireless sensor networks & application :forest fire detection
 wireless sensor networks  & application :forest fire detection wireless sensor networks  & application :forest fire detection
wireless sensor networks & application :forest fire detection
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
Wsn by checkmate
Wsn by checkmateWsn by checkmate
Wsn by checkmate
 
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks ProtocolsA Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
Wireless sensor Networks.ppt
Wireless sensor Networks.pptWireless sensor Networks.ppt
Wireless sensor Networks.ppt
 
wireless sensor networks based on iot
wireless sensor networks based on iotwireless sensor networks based on iot
wireless sensor networks based on iot
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

O4101101103

  • 1. Sarhan M. Musa et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.101-103 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Wireless Sensor Networks: Opportunities and Challenges Matthew N. O. Sadiku* and Sarhan M. Musa*, Omonowo D. Momoh** * Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446 College of Engineering, Technology, and Computer Science Indiana University-Purdue University Fort Wayne, IN 46805 ** ABSTRACT The popularity of cell phones, laptops, PDAs and intelligent electronics has made computing devices to become cheaper and more pervasive in daily life. The desire for connectivity among these devices has caused an exponential growth in wireless communication. Wireless sensor networks (WSNs) provide an example of this phenomenon. WSNs belong to the general family of sensor networks that employ distributed sensors to collect information on entities of interest. This paper provides a brief introduction to wireless sensor networks. It addresses the opportunities and challenges of WSNs. Key Words: Wireless networks, sensors, computing I. INTRODUCTION A wireless sensor network (WSN) usually consists of a large number (hundreds or thousands) of sensor nodes deployed over a geographical region. The wireless sensor nodes are compact, lightweighted, and battery-powered devices that can be used in virtually any environment [1-3]. The sensor nodes monitor physical or environmental conditions such as temperature/heat, humidity, sound, vibration, pressure, light, object motion, pollutants, presence of certain objects, noise level or characteristics of an object such as weight, size, speed, direction, and its latest position. As shown in Figure 1, each sensor node is made up of four components: a power unit, a transceiver unit, a sensing unit, and a processing unit. The node may also have some applicationdependent components such as power generator, location finding system, and mobilizer. Communication among the nodes is done in a wireless fashion, and thus, the name wireless sensor networks. Companies such as Crossbow (www.xbow.com) and Monnit (www.monnit.com) have developed the necessary software and hardwire building blocks for WSNs. In general, there may be both sensing and nonsensing nodes in a WSN; i.e. all sensors are nodes but not all nodes are sensors. A sensor has four operating modes: transmission, reception, idle listening, and sleep. Collision occurs when there are two or more nodes transmit at the same time. A sensor node is designed to use an operating system (OS). TinyOS (developed at UC Berkeley) is perhaps the first operating system specifically designed for WSNs. It is a generalpurpose OS. Both the TinyOS and programs written for it are written in a special programming language www.ijera.com called NesC, which is essentially an extension of C programming language. Figure 2 presents a typical wireless sensor network. Sensors can be deployed on the ground, in the air, under water, in vehicles, on bodies, and inside buildings. A network of sensors can detect and track threats. II. APPLICATIONS In September 1999, Business Week predicted that WSN would be one of the 21 most important technologies for the 21st century. The number of applications of WSN is increasing rapidly. It is generally true that applications should shape and form the technology for which they are intended. WSNs are no exception to this. WSNs have been technology-driven in their development. Advances in software technology and wireless communication have paved the way for successful adoption of the wireless sensor networks in various applications. Some of the expected applications of WSNs will require a large number of devices in order of tens of thousands of nodes. Applications of WSNs typically involve some kind of monitoring, tracking, or controlling. Some of the specific applications include the following [4-6]: (a) Military Applications: As with many technologies, the development of WSNs was motivated by military applications such as battlefield surveillance. Typically, sensors can report vehicle and personnel movement, allowing a close monitoring of opposing forces. Other military applications include monitoring friendly forces, battlefield surveillance, reconnaissance of opposing forces, and battle damage assessment. Sensitive objects and structures such as atomic plants and 101 | P a g e
  • 2. Sarhan M. Musa et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.101-103 ammunition depots can be protected by intelligent sensors. (b) Civil Engineering: Structural health monitoring for civil structures has been a research focus for academia and industry. Sensors can be placed in bridges to detect structural weakness and in water reservoirs to detect hazardous materials. (c) Agriculture and Environment Monitoring: A number of WSNs have been deployed for agricultural and environmental monitoring. For example, the Zebranet project at Princeton aims at tracking the movement of zebras in Africa. Researchers at University of West Australia are developing a prototype WSN for monitoring of soil water. Fire and floods can be detected by densely deployed sensor networks. WSNs can potentially advance the pursuit of geographical studies of volcanic activity. (d) Industrial Applications: Sensors are already widely deployed in industrial applications, such as in monitoring of assembly lines. Industrial robots are equipped with sensors and are connected wirelessly to a computer. Cars, which have sensors and actuators in them, can be networked to improve the efficiency of traffic. In addition to traditional applications of wireless sensor networks, they can also be used to protect cultural property. In cultural property protection, setting up fixed structure (with power lines and communication cables) is not allowed. Since WSNs do not require wired infrastructure, they can be used for cultural property protection. For example, Bulguksa temple (a Buddhist temple in South Korea) has been designated as the world’s cultural property by UNESCO. Such a temple requires WSN to monitor and protect cultural artifacts in the temple. III. CHALLENGES As noted above, wireless sensor networks have a wide range of potential applications. However, there are many challenging problems that must be addressed for efficient operation of WSNs in real applications and current technology is not up to meeting some of these challenges. These challenges include [7-9]: (a) Size: The main challenge is to produce low cost and tiny sensor nodes. Miniaturization and low cost will follow from the recent and future development in the field of micro-electro-mechanical systems (MEMs). Several aspects of WSN nodes can be miniaturized with MEMs technology. www.ijera.com www.ijera.com (b) Energy: Energy is the scarcest resource of WSN nodes and it determines the lifetime of WSNs. Being a microelectronic device, a sensor node can be equipped with a limited power source (less than 0.5 Ah, 1.2 V). Sensor nodes may be equipped with effective power scavenging techniques, such as solar cells, because it is not easy to access or replace them after deployment. For those that use battery, battery lifetime is one of the critical factors to consider in the network design. (c) Storage: The use of wireless channels and the reliability of sensor nodes lead to a new approach for data storage and retrieval. The new approach is to have data stored locally within the sensors. (d) Routing: The design of routing protocols in WSNs is influenced by several challenging factors that must be overcome in order to achieve efficient communication. Routing in WSNs differs from the one in conventional IP networks. Getting data from all the thousands of sensors may result in the receipt of irrelevant and redundant data from nodes. This is definitely inefficient at the level of storage and energy. (e) Security: WSNs communicate important private data and security is a crucial issue. We recall that many WSNs are used for military or surveillance purposes. One way to ensure data security is to use encryption, but this is not practical for efficiency and resource constraints. It is difficult, if not impossible, to meet these challenges in a single network. Most WSNs are application specific and are designed to meet the challenges for that specific application. IV. CONCLUSIONS This paper presents an overview of wireless sensor networks. It is hoped that the reader would have an appreciation of the applications for which WSNs are intended. The study of WSNs is challenging because it requires an enormous breadth of knowledge from a variety of disciplines including signal processing, networking and protocols, embedded systems, and distributed algorithms. The field of WSN is gaining interest among researchers and diverse groups such as environmental, public safety, military, and medicine. The development and applications of WSNs have made them to be hot research topics. Sensor network technology will have a significant impact on our lives in the 21 st century. 102 | P a g e
  • 3. Sarhan M. Musa et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 1), January 2014, pp.101-103 REFERENCES [1] [2] [3] [4] [5] I. F. Akylidiz et al., “A survey on sensor networks,” IEEE Communications Magazine, Aug. 2002, pp. 102-114. l. Mokdad et al., “Performance evaluation tools for QoS MAC protocol for wireless sensor networks,” Ad Hoc Networks, vol. 12, 2014, pp. 86-99. R. I. de Silva et al., “Spatial query processing in wireless sensor networks—A survey,” Information Fusion, vol. 15, 2014, pp. 32-34. H. Karl and A. Willig, Protocols and Architectures for Wireless Sensor Networks. Chichester, UK: John Wiley & Sons, 2005, pp. 3-7. H. K. Patil and T. M. Chen, “Wireless Sensor Network Security,’ in J. Vacca (ed.), Computer and Information Security Handbook. San Francisco, CA: Morgan [6] [7] [8] [9] www.ijera.com Kaufmann Publishers, 2013, 2nd ed.,chapter 15, pp. 349-397. E. Aleisa, “Wireless sensor networks framework for water resource management that supports QoS in the Kingdom of Saudi Arabia,” Procedia Computer Science, vol. 19, 2013, pp. 232-239. M. Ilyas and I. Mahgoub (eds.), Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems. Boca Raton, FL: CRC Press, 2005, pp. 1.1-1.14.’ J. Lopez and J. Zhou, Wireless Sensor Network Security. Amsterdam, Neverthelands: IOS Press, 2008, pp. 164122. Y. Li, M. T. Thai, and W. Wu, Wireless Sensor Networks and Applications. New York, NY: Springer, 2008, pp. 403-421. Figure 1 Components of a sensor node. Figure 2 www.ijera.com Wireless sensor network with Internet access 103 | P a g e