Submit Search
Upload
Introduction to Wireless Sensor Networks Challenges and Security
•
0 likes
•
19 views
AI-enhanced title
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i9/IRJET-V6I9329.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
IJERA Editor
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET Journal
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
csandit
file4.pdf
file4.pdf
RajShah860705
9345.pdf
9345.pdf
RajShah860705
wireless sensor network
wireless sensor network
DeepaDasarathan
Some aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...
eSAT Journals
Recommended
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
IJERA Editor
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET Journal
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
csandit
file4.pdf
file4.pdf
RajShah860705
9345.pdf
9345.pdf
RajShah860705
wireless sensor network
wireless sensor network
DeepaDasarathan
Some aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...
eSAT Journals
An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...
IJECEIAES
De3211001104
De3211001104
IJMER
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
IRJET Journal
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
Karthik
G0933443
G0933443
IOSR Journals
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
IJRES Journal
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
IAEME Publication
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
IAEME Publication
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
ijassn
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...
IJECEIAES
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
iosrjce
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
ijsrd.com
Sensors 19-03789-v2
Sensors 19-03789-v2
Nitin k
Energy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor network
BADALKUMAR56
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
sophiabelthome
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
ijwmn
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
cscpconf
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
IRJET Journal
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET Journal
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET Journal
More Related Content
What's hot
An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...
IJECEIAES
De3211001104
De3211001104
IJMER
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
IRJET Journal
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
Karthik
G0933443
G0933443
IOSR Journals
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
IJRES Journal
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
IAEME Publication
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
IAEME Publication
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
ijassn
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...
IJECEIAES
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
iosrjce
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
ijsrd.com
Sensors 19-03789-v2
Sensors 19-03789-v2
Nitin k
Energy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor network
BADALKUMAR56
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
sophiabelthome
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
ijwmn
What's hot
(18)
An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...
De3211001104
De3211001104
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
G0933443
G0933443
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
Sensors 19-03789-v2
Sensors 19-03789-v2
Energy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor network
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
Similar to Introduction to Wireless Sensor Networks Challenges and Security
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
cscpconf
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
IRJET Journal
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET Journal
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET Journal
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
IRJET Journal
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
Ijetcas14 591
Ijetcas14 591
Iasir Journals
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
IRJET Journal
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
inventionjournals
G017344246
G017344246
IOSR Journals
0512ijdps26
0512ijdps26
Er_Loveleen
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
ijtsrd
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
INFOGAIN PUBLICATION
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
ijcsa
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET Journal
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
IOSR Journals
S04404116120
S04404116120
IJERA Editor
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET Journal
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET Journal
Similar to Introduction to Wireless Sensor Networks Challenges and Security
(20)
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
Ijetcas14 591
Ijetcas14 591
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
G017344246
G017344246
0512ijdps26
0512ijdps26
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
S04404116120
S04404116120
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
PragyanshuParadkar1
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
Recently uploaded
(20)
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
Introduction to Wireless Sensor Networks Challenges and Security
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2096 AN INTRODUCTION TO WIRELESS SENSOR NETWORKS, ITS CHALLENGES AND SECURITY Neha Barthwal1, Shashank Barthwal2 1Dept. of Computer Science, GBPIET, Pauri, Uttarakhand, India 2Dept. of Computer Science, GEHU, Dehradun, Uttarakhand, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract -The popularity of WSN hasbeenenormouslyon a peak just because of its sensing technology. WSNs are in great demand now a days due to increasing growth in wireless devices. WSN is composed of small size, battery powered sensor nodes which collect, process, store and transfer the sensed data from one sensor to another. This efficiency makes sensor network to be used for many applications like military application, health application, environmental application, home application, commercial application etc. and many more. Node mobility, stability, throughput of network and its node, clustering, Energy efficiency, lifetime of sensor node are challenging issues of WSN and due to this WSN has gained worldwide attentionof researchers. Basically the researchers intention is to form sensor network performs with maximum stability and minimum consumption of energy, so that they can work for long time. Batteries used in WSN can neither be changed nor recharged so it is necessary to improve the lifetime of the network for better performanceof WSN. Forresearchersitis a dare to design energy efficient routing protocol for WSN. Key Words: Sensor Node, Cluster Head, Base Station, WSN, Clustering 1. INTRODUCTION A wide range of sensor nodes (SN) shapes a Wireless sensor network. Sensor nodes are low price, battery operated, multi-functional and deployed to form a sensor field. Each node have sensing unit, a processing unit, communication unit and power unit. Each and every node is able to perform smart sensing, neighbornodediscovery,data gathering,data processing, data storage and communication with other nodes. The sensing unit senses the surrounding, the processing unit calculates the confined permutations of the sensed data, and the communication unit performs interchange of processed data among adjoining sensor nodes. Figure 1.1- Building block of Sensor Node Wireless Sensor Networks is group of sensors which are associated by wireless media. Sensors are deployed in network and communicate with each other for data collection. Then they forward the collected data to the Base Station. Clustering is a process of merging sensor nodes to form clusters and selecting cluster heads for each clusters. Sensor node gathers the data and send it to cluster head which is then forwarded to base station (BS). Clustering raises the stability of network and lowers the energy consumption of sensor nodes. Figure 1.2- Architecture of a typical WSN Attributes like size of the cluster, distance of sensor nodes from CH, distance of the BS from the cluster head influence the energy consumption in sensor nodes. More the distance of sensor nodes from the cluster head greater the energy dissipation for the data transmission. Clustering process has three phases. Cluster head selection phase, cluster’s setup phase and steady phase. The given Sensing Unit Power Unit Processing Unit Communicati on Unit
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2097 figure illustrate the formation of distant clusters in WSNs. These clusters have dissimilartypeofsensornodesand each node pass on the sensed information to the desired CH which is responsible for forwarding the sensed data to the sink node. Homogeneous and Heterogeneous are two forms of clustering in WSN. Figure 1.3- WSNs Cluster Formation Homogenous Clustering In homogeneous clustering, all nodes have equivalent energy. The life of Wireless sensors node depends on life time of the battery. There are many energy saving methodologies which are mainly introduced to lessen the energy consumption and thereby resulting in a mechanism for enhanced stability of the nodes. There are many protocols for homogeneous WSNs like LEACH, PEGASIS and HEED protocol. Thesealgorithmswill givepoorperformance in the heterogeneous type of network. Heterogeneous Clustering In heterogeneous WSNs, sensor nodes have distinct initial energies. SN have relatively excessive energy develop into cluster head. Stable Election Protocol, Distributed Energy Efficient Clustering, Threshold Sensitive Stable Election Protocol, Enhance threshold sensitive stable election protocol, Dual Cluster Head Routing Protocol and “DCHRP with level four Heterogeneity are various protocols of heterogeneous WSNs. Heterogeneous sensor networks are considered significant in WSNs because they are related to real life situation. 2. CHARACTERISTICS WSN include various topologies like star, tree, mesh etc. for communication. Characteristics of good WSN include mobility, reliability, power efficiency, stability. WSNinclude these feature proves beneficial forhumanwelfarethat’swhy it has variety of application in different field like medical, military, traffic control etc. Some other characteristics of WSNs are- Simple to use Network is flexible Utilization of power is limited because of battery It handles node failure effectively It deals with mobility and heterogeneity of Sensor Node. Can work with large scale distribution that is have high scalability Has ability to maintain strict environmental condition for execution Has unique cross layer design 3. WSN ORGANIZATION Wireless sensor network shadows the OSI model. The architecture of WSN composed of five layers (physical, data link, transport, network and application) and three cross layers (power management, mobility management and task management). These layers collectivelyareusedtocomplete the network and make the sensors work in an organized way, in order to raise the efficiency of the network. Physical layer is accountable for frequency selection, modulation and data encryption and signal detection. Function of Data link layer is to provide a pathway for multiplexing the data streams, data frame detection, error control, MAC. For data supply network layer is used. It is accountable for routing the information received from transport layer i.e. finding the optimal path for data packet to travel from sourcetodestination. The flow of data is needed whenthesensornetwork make use of internet which is maintained by the transport layer. Application layer is present at last and forms software and hardware transparent to the end user. It is responsible for presenting collected information and traffic management Figure 1.4- WSN organization 4. SECURITY IN WSN Security plays a significant role in WSN. Sensitive data is carried by sensor nodes which may be targetedbyattackers.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2098 Attacks are occurred in any system just because of lack of security features Wireless communication is used in WSN,eavesdrop is possible. Injecting malicious node in WSN is a cake walk for the attacker. Vast number of nodes in WSN enforces security complexity at all levels. Resource constraints of sensor nodes pose another threat to security of the network in terms of memory, energy, processing power etc. Hence Symmetric cryptography or symmetric encryption is used because asymmetric cryptography becomes too expensive. Conventional security techniques used earlier cannot be directly or indirectly applied on WSN. Security becomes extremely importantwhensensornetworksaredeployed,as they are susceptible to various malicious attacks because of its transmissionnature,resourcerestrictionanddeployment in harsh environment. So existing security mechanisms are not enough for WSN, and new ideas are needed. Symmetric key techniques, asymmetric key techniques and hash functions are crypto mechanisms used for achieving security in wireless sensor networks, it is extremely important to authenticate and encrypt messages sent between sensor nodes. WSN areveryconstrainedintermsof battery power, node lifetime, stability, throughput, computing, and communication. WSN needs a light weight cryptographic algorithm. WSN’s main security aims are confidentiality, integrity, authentication, availability, survivability, along with efficiency, freshness and scalability. 5. ISSUES AND CHALLENGES IN DESIGNING WSN Resource limitation (Limited memory,computation and power) Maintenance of WSN is difficult. Sensor node depend only on battery and the batteries can neither be recharged nor replaced. Hence the hardware design consideration is must. While deploying, the sensor nodes are scattered so they can’t fit into any regular topology. Reliability of communication is another issue that should be considered (Unreliable data transfer, Conflicts and latency are some if the challenges of WSN’s) Topology changes, Node failure, addition and deletion of nodes is among other challenging issue in WSNs. Transmission nature, hostile environment of WSN and security are some of the challenging issue. Attaining synchronization between nodes is also another issue. 6. APPLICATIONS OF WSN Wireless Sensor Networks comprise of numerous types of sensors such as seismic, thermal, low sampling rate magnetic, infrared, visual, acoustic and radar. These sensors are able to monitor a wide variety of ambient conditions like humidity, temperature, lightning, vehicular movement, pressure, soil makeup, noise levels and so on. WSN application can be classified into following categories: Military applications (enemy tracking, security detection, surveillance) Environmental applications ( air pollution detection, landslide detection, forest fire detection, animal tracking, water quality monitoring, natural disaster prevention, flood detection, weather prediction,) Healthcare applications (implanted, wearable and surroundingembeddedmedical devices,monitoringand tracking of doctors and patients, Home applications (smart lighting, cooling and heating devices) Industrial applications (data logging, wine production, structural and machine health monitoring etc.) Transportation application (monitoring of traffic, dynamic routing management 7. ADVANTAGES Flexible infrastructure Easily implemented Fruitful for society Can deal with numerous nodes at a time Made up of three distant topologies(mesh, tree, star) It can be deployed on vast scale Can be monitored and accessed with remote locations Support embedded systems Increasing the number of sensor nodes is easy. Execution is cheap Saves cost as it avoids plenty of wiring. Suitable for unreachable areas such as over the seas, mountains
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2099 8. DISADVANTAGES WSN possess lower storage capacity (approx. few hundred kilobytes) Comparatively less secure than wired network Hackers can easily hack sensor network and acquire all data. Slow Communication and transmission speed SN are more prone to failure Easily distracted by its surrounding Slow processing power Works for short communication range Require minimal energy efficient protocol Have batteries with limited lifetime Need of extra equipment for setup like computer 9. CONCLUSIONS Over the last few years hyper efficient design of WSN has become a leading platform for research and development. WSN started a revolution in technical field and attracts researchers toward it. Its sensing technology enhance its popularity worldwide. Researchers in WSN mainly focuses on hike in lifetime and stability of sensor nodes. Major research areas of WSN are distributed signal processing, data fusion, energy efficient routing algorithms, and security of WSN. WSN has highly influenced our life in all aspects. It has wide range of applications. With the short introduction of WSN, its organization, characteristics and challenges have been discussed as well the application of WSN have been highlighted along with the advantage and disadvantages of WSN. REFERENCES [1] I.F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, E.Cayirci, “A survey on sensor networks”, IEEE Communications Magazine, Vol. 40, Issue (8), pp. 102-114, 2002. [2] Samira Kalantary, Sara Taghipour, “ A Survey on architectures, protocols, applications and management in wireless Sensor Networks”,Journal of Advanced Computer Science & Technoloy, pp. 1- 11, 2014. [3] KazemSohraby, Daniel Minoli,TaiebZnati,“Wireless Sensor Networks”, Wiley Publications, Second Edition. [4] Gaurav Sharma, SumanBala, Anil K. Verma, “Security Frameworks for Wireless Sensor Networks-Review,” 2nd International Conference on Communication, Computing & Security [ICCCS- 2012], No. 6, pp. 978 – 987, 2012. [5] Muhammad Zahid Khan et al., “Limitations of Simulation Tools for Large-Scale Wireless Sensor Networks,” Workshops of International Conference on Advanced Information Networking and Applications, pp. 820-825, 2011. [6] M. Ben Salah, A. Boulouz. "Energy Efficient Clustering Based OnLEACH." IEEE,2016IEEE,2016 [7] H. Mohammad, M. AfsarandN.Tayarani,“Clustering in sensor network: A literature survey”, Journal of Network & Computer Appl., 2014.
Download now