SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2096
AN INTRODUCTION TO WIRELESS SENSOR NETWORKS, ITS
CHALLENGES AND SECURITY
Neha Barthwal1, Shashank Barthwal2
1Dept. of Computer Science, GBPIET, Pauri, Uttarakhand, India
2Dept. of Computer Science, GEHU, Dehradun, Uttarakhand, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract -The popularity of WSN hasbeenenormouslyon
a peak just because of its sensing technology. WSNs are in
great demand now a days due to increasing growth in
wireless devices. WSN is composed of small size, battery
powered sensor nodes which collect, process, store and
transfer the sensed data from one sensor to another. This
efficiency makes sensor network to be used for many
applications like military application, health application,
environmental application, home application, commercial
application etc. and many more. Node mobility, stability,
throughput of network and its node, clustering, Energy
efficiency, lifetime of sensor node are challenging issues of
WSN and due to this WSN has gained worldwide attentionof
researchers. Basically the researchers intention is to form
sensor network performs with maximum stability and
minimum consumption of energy, so that they can work for
long time. Batteries used in WSN can neither be changed nor
recharged so it is necessary to improve the lifetime of the
network for better performanceof WSN. Forresearchersitis
a dare to design energy efficient routing protocol for WSN.
Key Words: Sensor Node, Cluster Head, Base Station, WSN,
Clustering
1. INTRODUCTION
A wide range of sensor nodes (SN) shapes a Wireless sensor
network. Sensor nodes are low price, battery operated,
multi-functional and deployed to form a sensor field. Each
node have sensing unit, a processing unit, communication
unit and power unit. Each and every node is able to perform
smart sensing, neighbornodediscovery,data gathering,data
processing, data storage and communication with other
nodes. The sensing unit senses the surrounding, the
processing unit calculates the confined permutations of the
sensed data, and the communication unit performs
interchange of processed data among adjoining sensor
nodes.
Figure 1.1- Building block of Sensor Node
Wireless Sensor Networks is group of sensors which are
associated by wireless media. Sensors are deployed in
network and communicate with each other for data
collection. Then they forward the collected data to the Base
Station. Clustering is a process of merging sensor nodes to
form clusters and selecting cluster heads for each clusters.
Sensor node gathers the data and send it to cluster head
which is then forwarded to base station (BS). Clustering
raises the stability of network and lowers the energy
consumption of sensor nodes.
Figure 1.2- Architecture of a typical WSN
Attributes like size of the cluster, distance of sensor nodes
from CH, distance of the BS from the cluster head influence
the energy consumption in sensor nodes. More the distance
of sensor nodes from the cluster head greater the energy
dissipation for the data transmission.
Clustering process has three phases. Cluster head selection
phase, cluster’s setup phase and steady phase. The given
Sensing Unit
Power Unit
Processing
Unit
Communicati
on Unit
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2097
figure illustrate the formation of distant clusters in WSNs.
These clusters have dissimilartypeofsensornodesand each
node pass on the sensed information to the desired CH
which is responsible for forwarding the sensed data to the
sink node. Homogeneous and Heterogeneous are two forms
of clustering in WSN.
Figure 1.3- WSNs Cluster Formation
Homogenous Clustering
In homogeneous clustering, all nodes have equivalent
energy. The life of Wireless sensors node depends on life
time of the battery. There are many energy saving
methodologies which are mainly introduced to lessen the
energy consumption and thereby resulting in a mechanism
for enhanced stability of the nodes. There are many
protocols for homogeneous WSNs like LEACH, PEGASIS and
HEED protocol. Thesealgorithmswill givepoorperformance
in the heterogeneous type of network.
Heterogeneous Clustering
In heterogeneous WSNs, sensor nodes have distinct initial
energies. SN have relatively excessive energy develop into
cluster head. Stable Election Protocol, Distributed Energy
Efficient Clustering, Threshold Sensitive Stable Election
Protocol, Enhance threshold sensitive stable election
protocol, Dual Cluster Head Routing Protocol and “DCHRP
with level four Heterogeneity are various protocols of
heterogeneous WSNs. Heterogeneous sensor networks are
considered significant in WSNs because they are related to
real life situation.
2. CHARACTERISTICS
WSN include various topologies like star, tree, mesh etc. for
communication. Characteristics of good WSN include
mobility, reliability, power efficiency, stability. WSNinclude
these feature proves beneficial forhumanwelfarethat’swhy
it has variety of application in different field like medical,
military, traffic control etc. Some other characteristics of
WSNs are-
 Simple to use
 Network is flexible
 Utilization of power is limited because of battery
 It handles node failure effectively
 It deals with mobility and heterogeneity of Sensor
Node.
 Can work with large scale distribution that is have
high scalability
 Has ability to maintain strict environmental
condition for execution
 Has unique cross layer design
3. WSN ORGANIZATION
Wireless sensor network shadows the OSI model. The
architecture of WSN composed of five layers (physical, data
link, transport, network and application) and three cross
layers (power management, mobility management and task
management). These layers collectivelyareusedtocomplete
the network and make the sensors work in an organized
way, in order to raise the efficiency of the network.
 Physical layer is accountable for frequency
selection, modulation and data encryption and
signal detection.
 Function of Data link layer is to provide a pathway
for multiplexing the data streams, data frame
detection, error control, MAC.
 For data supply network layer is used. It is
accountable for routing the information received
from transport layer i.e. finding the optimal path
for data packet to travel from sourcetodestination.
 The flow of data is needed whenthesensornetwork
make use of internet which is maintained by the
transport layer.
 Application layer is present at last and forms
software and hardware transparent to the end
user. It is responsible for presenting collected
information and traffic management
Figure 1.4- WSN organization
4. SECURITY IN WSN
Security plays a significant role in WSN. Sensitive data is
carried by sensor nodes which may be targetedbyattackers.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2098
Attacks are occurred in any system just because of lack of
security features
 Wireless communication is used in WSN,eavesdrop
is possible.
 Injecting malicious node in WSN is a cake walk for
the attacker.
 Vast number of nodes in WSN enforces security
complexity at all levels.
 Resource constraints of sensor nodes pose another
threat to security of the network in terms of
memory, energy, processing power etc. Hence
Symmetric cryptography or symmetric encryption
is used because asymmetric cryptography becomes
too expensive.
Conventional security techniques used earlier cannot be
directly or indirectly applied on WSN. Security becomes
extremely importantwhensensornetworksaredeployed,as
they are susceptible to various malicious attacks because of
its transmissionnature,resourcerestrictionanddeployment
in harsh environment. So existing security mechanisms are
not enough for WSN, and new ideas are needed.
Symmetric key techniques, asymmetric key techniques and
hash functions are crypto mechanisms used for achieving
security in wireless sensor networks, it is extremely
important to authenticate and encrypt messages sent
between sensor nodes. WSN areveryconstrainedintermsof
battery power, node lifetime, stability, throughput,
computing, and communication. WSN needs a light weight
cryptographic algorithm.
WSN’s main security aims are confidentiality, integrity,
authentication, availability, survivability, along with
efficiency, freshness and scalability.
5. ISSUES AND CHALLENGES IN DESIGNING WSN
 Resource limitation (Limited memory,computation
and power)
 Maintenance of WSN is difficult.
 Sensor node depend only on battery and the
batteries can neither be recharged nor replaced.
Hence the hardware design consideration is must.
 While deploying, the sensor nodes are scattered so
they can’t fit into any regular topology.
 Reliability of communication is another issue that
should be considered (Unreliable data transfer,
Conflicts and latency are some if the challenges of
WSN’s)
 Topology changes, Node failure, addition and
deletion of nodes is among other challenging issue
in WSNs.
 Transmission nature, hostile environment of WSN
and security are some of the challenging issue.
 Attaining synchronization between nodes is also
another issue.
6. APPLICATIONS OF WSN
Wireless Sensor Networks comprise of numerous types of
sensors such as seismic, thermal, low sampling rate
magnetic, infrared, visual, acoustic and radar. These
sensors are able to monitor a wide variety of ambient
conditions like humidity, temperature, lightning, vehicular
movement, pressure, soil makeup, noise levels and so on.
WSN application can be classified into following categories:
 Military applications (enemy tracking, security
detection, surveillance)
 Environmental applications ( air pollution detection,
landslide detection, forest fire detection, animal
tracking, water quality monitoring, natural disaster
prevention, flood detection, weather prediction,)
 Healthcare applications (implanted, wearable and
surroundingembeddedmedical devices,monitoringand
tracking of doctors and patients,
 Home applications (smart lighting, cooling and heating
devices)
 Industrial applications (data logging, wine production,
structural and machine health monitoring etc.)
 Transportation application (monitoring of traffic,
dynamic routing management
7. ADVANTAGES
 Flexible infrastructure
 Easily implemented
 Fruitful for society
 Can deal with numerous nodes at a time
 Made up of three distant topologies(mesh, tree, star)
 It can be deployed on vast scale
 Can be monitored and accessed with remote locations
 Support embedded systems
 Increasing the number of sensor nodes is easy.
 Execution is cheap
 Saves cost as it avoids plenty of wiring.
 Suitable for unreachable areas such as over the seas,
mountains
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2099
8. DISADVANTAGES
 WSN possess lower storage capacity (approx. few
hundred kilobytes)
 Comparatively less secure than wired network
 Hackers can easily hack sensor network and acquire all
data.
 Slow Communication and transmission speed
 SN are more prone to failure
 Easily distracted by its surrounding
 Slow processing power
 Works for short communication range
 Require minimal energy efficient protocol
 Have batteries with limited lifetime
 Need of extra equipment for setup like computer
9. CONCLUSIONS
Over the last few years hyper efficient design of WSN has
become a leading platform for research and development.
WSN started a revolution in technical field and attracts
researchers toward it. Its sensing technology enhance its
popularity worldwide. Researchers in WSN mainly focuses
on hike in lifetime and stability of sensor nodes. Major
research areas of WSN are distributed signal processing,
data fusion, energy efficient routing algorithms, and
security of WSN. WSN has highly influenced our life in all
aspects. It has wide range of applications. With the short
introduction of WSN, its organization, characteristics and
challenges have been discussed as well the application of
WSN have been highlighted along with the advantage and
disadvantages of WSN.
REFERENCES
[1] I.F. Akyildiz, S. Weilian, Y. Sankarasubramaniam,
E.Cayirci, “A survey on sensor networks”, IEEE
Communications Magazine, Vol. 40, Issue (8), pp.
102-114, 2002.
[2] Samira Kalantary, Sara Taghipour, “ A Survey on
architectures, protocols, applications and
management in wireless Sensor Networks”,Journal
of Advanced Computer Science & Technoloy, pp. 1-
11, 2014.
[3] KazemSohraby, Daniel Minoli,TaiebZnati,“Wireless
Sensor Networks”, Wiley Publications, Second
Edition.
[4] Gaurav Sharma, SumanBala, Anil K. Verma,
“Security Frameworks for Wireless Sensor
Networks-Review,” 2nd International Conference
on Communication, Computing & Security [ICCCS-
2012], No. 6, pp. 978 – 987, 2012.
[5] Muhammad Zahid Khan et al., “Limitations of
Simulation Tools for Large-Scale Wireless Sensor
Networks,” Workshops of International Conference
on Advanced Information Networking and
Applications, pp. 820-825, 2011.
[6] M. Ben Salah, A. Boulouz. "Energy Efficient
Clustering Based OnLEACH." IEEE,2016IEEE,2016
[7] H. Mohammad, M. AfsarandN.Tayarani,“Clustering
in sensor network: A literature survey”, Journal of
Network & Computer Appl., 2014.

More Related Content

What's hot

An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...IJECEIAES
 
De3211001104
De3211001104De3211001104
De3211001104IJMER
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolIJRES Journal
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKIAEME Publication
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2Nitin k
 
Energy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor networkEnergy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor networkBADALKUMAR56
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5sophiabelthome
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...ijwmn
 

What's hot (18)

An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...
 
De3211001104
De3211001104De3211001104
De3211001104
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
G0933443
G0933443G0933443
G0933443
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2
 
Energy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor networkEnergy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor network
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
 

Similar to Introduction to Wireless Sensor Networks Challenges and Security

CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformImplementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkIRJET Journal
 
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...inventionjournals
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET Journal
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET Journal
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 

Similar to Introduction to Wireless Sensor Networks Challenges and Security (20)

CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformImplementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
 
G017344246
G017344246G017344246
G017344246
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
S04404116120
S04404116120S04404116120
S04404116120
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 

Recently uploaded (20)

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 

Introduction to Wireless Sensor Networks Challenges and Security

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2096 AN INTRODUCTION TO WIRELESS SENSOR NETWORKS, ITS CHALLENGES AND SECURITY Neha Barthwal1, Shashank Barthwal2 1Dept. of Computer Science, GBPIET, Pauri, Uttarakhand, India 2Dept. of Computer Science, GEHU, Dehradun, Uttarakhand, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract -The popularity of WSN hasbeenenormouslyon a peak just because of its sensing technology. WSNs are in great demand now a days due to increasing growth in wireless devices. WSN is composed of small size, battery powered sensor nodes which collect, process, store and transfer the sensed data from one sensor to another. This efficiency makes sensor network to be used for many applications like military application, health application, environmental application, home application, commercial application etc. and many more. Node mobility, stability, throughput of network and its node, clustering, Energy efficiency, lifetime of sensor node are challenging issues of WSN and due to this WSN has gained worldwide attentionof researchers. Basically the researchers intention is to form sensor network performs with maximum stability and minimum consumption of energy, so that they can work for long time. Batteries used in WSN can neither be changed nor recharged so it is necessary to improve the lifetime of the network for better performanceof WSN. Forresearchersitis a dare to design energy efficient routing protocol for WSN. Key Words: Sensor Node, Cluster Head, Base Station, WSN, Clustering 1. INTRODUCTION A wide range of sensor nodes (SN) shapes a Wireless sensor network. Sensor nodes are low price, battery operated, multi-functional and deployed to form a sensor field. Each node have sensing unit, a processing unit, communication unit and power unit. Each and every node is able to perform smart sensing, neighbornodediscovery,data gathering,data processing, data storage and communication with other nodes. The sensing unit senses the surrounding, the processing unit calculates the confined permutations of the sensed data, and the communication unit performs interchange of processed data among adjoining sensor nodes. Figure 1.1- Building block of Sensor Node Wireless Sensor Networks is group of sensors which are associated by wireless media. Sensors are deployed in network and communicate with each other for data collection. Then they forward the collected data to the Base Station. Clustering is a process of merging sensor nodes to form clusters and selecting cluster heads for each clusters. Sensor node gathers the data and send it to cluster head which is then forwarded to base station (BS). Clustering raises the stability of network and lowers the energy consumption of sensor nodes. Figure 1.2- Architecture of a typical WSN Attributes like size of the cluster, distance of sensor nodes from CH, distance of the BS from the cluster head influence the energy consumption in sensor nodes. More the distance of sensor nodes from the cluster head greater the energy dissipation for the data transmission. Clustering process has three phases. Cluster head selection phase, cluster’s setup phase and steady phase. The given Sensing Unit Power Unit Processing Unit Communicati on Unit
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2097 figure illustrate the formation of distant clusters in WSNs. These clusters have dissimilartypeofsensornodesand each node pass on the sensed information to the desired CH which is responsible for forwarding the sensed data to the sink node. Homogeneous and Heterogeneous are two forms of clustering in WSN. Figure 1.3- WSNs Cluster Formation Homogenous Clustering In homogeneous clustering, all nodes have equivalent energy. The life of Wireless sensors node depends on life time of the battery. There are many energy saving methodologies which are mainly introduced to lessen the energy consumption and thereby resulting in a mechanism for enhanced stability of the nodes. There are many protocols for homogeneous WSNs like LEACH, PEGASIS and HEED protocol. Thesealgorithmswill givepoorperformance in the heterogeneous type of network. Heterogeneous Clustering In heterogeneous WSNs, sensor nodes have distinct initial energies. SN have relatively excessive energy develop into cluster head. Stable Election Protocol, Distributed Energy Efficient Clustering, Threshold Sensitive Stable Election Protocol, Enhance threshold sensitive stable election protocol, Dual Cluster Head Routing Protocol and “DCHRP with level four Heterogeneity are various protocols of heterogeneous WSNs. Heterogeneous sensor networks are considered significant in WSNs because they are related to real life situation. 2. CHARACTERISTICS WSN include various topologies like star, tree, mesh etc. for communication. Characteristics of good WSN include mobility, reliability, power efficiency, stability. WSNinclude these feature proves beneficial forhumanwelfarethat’swhy it has variety of application in different field like medical, military, traffic control etc. Some other characteristics of WSNs are-  Simple to use  Network is flexible  Utilization of power is limited because of battery  It handles node failure effectively  It deals with mobility and heterogeneity of Sensor Node.  Can work with large scale distribution that is have high scalability  Has ability to maintain strict environmental condition for execution  Has unique cross layer design 3. WSN ORGANIZATION Wireless sensor network shadows the OSI model. The architecture of WSN composed of five layers (physical, data link, transport, network and application) and three cross layers (power management, mobility management and task management). These layers collectivelyareusedtocomplete the network and make the sensors work in an organized way, in order to raise the efficiency of the network.  Physical layer is accountable for frequency selection, modulation and data encryption and signal detection.  Function of Data link layer is to provide a pathway for multiplexing the data streams, data frame detection, error control, MAC.  For data supply network layer is used. It is accountable for routing the information received from transport layer i.e. finding the optimal path for data packet to travel from sourcetodestination.  The flow of data is needed whenthesensornetwork make use of internet which is maintained by the transport layer.  Application layer is present at last and forms software and hardware transparent to the end user. It is responsible for presenting collected information and traffic management Figure 1.4- WSN organization 4. SECURITY IN WSN Security plays a significant role in WSN. Sensitive data is carried by sensor nodes which may be targetedbyattackers.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2098 Attacks are occurred in any system just because of lack of security features  Wireless communication is used in WSN,eavesdrop is possible.  Injecting malicious node in WSN is a cake walk for the attacker.  Vast number of nodes in WSN enforces security complexity at all levels.  Resource constraints of sensor nodes pose another threat to security of the network in terms of memory, energy, processing power etc. Hence Symmetric cryptography or symmetric encryption is used because asymmetric cryptography becomes too expensive. Conventional security techniques used earlier cannot be directly or indirectly applied on WSN. Security becomes extremely importantwhensensornetworksaredeployed,as they are susceptible to various malicious attacks because of its transmissionnature,resourcerestrictionanddeployment in harsh environment. So existing security mechanisms are not enough for WSN, and new ideas are needed. Symmetric key techniques, asymmetric key techniques and hash functions are crypto mechanisms used for achieving security in wireless sensor networks, it is extremely important to authenticate and encrypt messages sent between sensor nodes. WSN areveryconstrainedintermsof battery power, node lifetime, stability, throughput, computing, and communication. WSN needs a light weight cryptographic algorithm. WSN’s main security aims are confidentiality, integrity, authentication, availability, survivability, along with efficiency, freshness and scalability. 5. ISSUES AND CHALLENGES IN DESIGNING WSN  Resource limitation (Limited memory,computation and power)  Maintenance of WSN is difficult.  Sensor node depend only on battery and the batteries can neither be recharged nor replaced. Hence the hardware design consideration is must.  While deploying, the sensor nodes are scattered so they can’t fit into any regular topology.  Reliability of communication is another issue that should be considered (Unreliable data transfer, Conflicts and latency are some if the challenges of WSN’s)  Topology changes, Node failure, addition and deletion of nodes is among other challenging issue in WSNs.  Transmission nature, hostile environment of WSN and security are some of the challenging issue.  Attaining synchronization between nodes is also another issue. 6. APPLICATIONS OF WSN Wireless Sensor Networks comprise of numerous types of sensors such as seismic, thermal, low sampling rate magnetic, infrared, visual, acoustic and radar. These sensors are able to monitor a wide variety of ambient conditions like humidity, temperature, lightning, vehicular movement, pressure, soil makeup, noise levels and so on. WSN application can be classified into following categories:  Military applications (enemy tracking, security detection, surveillance)  Environmental applications ( air pollution detection, landslide detection, forest fire detection, animal tracking, water quality monitoring, natural disaster prevention, flood detection, weather prediction,)  Healthcare applications (implanted, wearable and surroundingembeddedmedical devices,monitoringand tracking of doctors and patients,  Home applications (smart lighting, cooling and heating devices)  Industrial applications (data logging, wine production, structural and machine health monitoring etc.)  Transportation application (monitoring of traffic, dynamic routing management 7. ADVANTAGES  Flexible infrastructure  Easily implemented  Fruitful for society  Can deal with numerous nodes at a time  Made up of three distant topologies(mesh, tree, star)  It can be deployed on vast scale  Can be monitored and accessed with remote locations  Support embedded systems  Increasing the number of sensor nodes is easy.  Execution is cheap  Saves cost as it avoids plenty of wiring.  Suitable for unreachable areas such as over the seas, mountains
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2099 8. DISADVANTAGES  WSN possess lower storage capacity (approx. few hundred kilobytes)  Comparatively less secure than wired network  Hackers can easily hack sensor network and acquire all data.  Slow Communication and transmission speed  SN are more prone to failure  Easily distracted by its surrounding  Slow processing power  Works for short communication range  Require minimal energy efficient protocol  Have batteries with limited lifetime  Need of extra equipment for setup like computer 9. CONCLUSIONS Over the last few years hyper efficient design of WSN has become a leading platform for research and development. WSN started a revolution in technical field and attracts researchers toward it. Its sensing technology enhance its popularity worldwide. Researchers in WSN mainly focuses on hike in lifetime and stability of sensor nodes. Major research areas of WSN are distributed signal processing, data fusion, energy efficient routing algorithms, and security of WSN. WSN has highly influenced our life in all aspects. It has wide range of applications. With the short introduction of WSN, its organization, characteristics and challenges have been discussed as well the application of WSN have been highlighted along with the advantage and disadvantages of WSN. REFERENCES [1] I.F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, E.Cayirci, “A survey on sensor networks”, IEEE Communications Magazine, Vol. 40, Issue (8), pp. 102-114, 2002. [2] Samira Kalantary, Sara Taghipour, “ A Survey on architectures, protocols, applications and management in wireless Sensor Networks”,Journal of Advanced Computer Science & Technoloy, pp. 1- 11, 2014. [3] KazemSohraby, Daniel Minoli,TaiebZnati,“Wireless Sensor Networks”, Wiley Publications, Second Edition. [4] Gaurav Sharma, SumanBala, Anil K. Verma, “Security Frameworks for Wireless Sensor Networks-Review,” 2nd International Conference on Communication, Computing & Security [ICCCS- 2012], No. 6, pp. 978 – 987, 2012. [5] Muhammad Zahid Khan et al., “Limitations of Simulation Tools for Large-Scale Wireless Sensor Networks,” Workshops of International Conference on Advanced Information Networking and Applications, pp. 820-825, 2011. [6] M. Ben Salah, A. Boulouz. "Energy Efficient Clustering Based OnLEACH." IEEE,2016IEEE,2016 [7] H. Mohammad, M. AfsarandN.Tayarani,“Clustering in sensor network: A literature survey”, Journal of Network & Computer Appl., 2014.