SlideShare a Scribd company logo
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 1, Ver. III (Jan. - Feb .2016), PP 19-25
www.iosrjournals.org
DOI: 10.9790/2834-11121925 www.iosrjournals.org 19 | Page
A Review on Designing of Data Encrypted Wireless Sensor Node
for Energy Optimization
Miss Sneha Bele1
, Mr Prashant Khond2
1(Department of Electronics & Telecomumication/GUG,India
2(Department of Electronics & Telecomumication/GUG,India
Abstract: For full development and expansion of wireless sensor hub, energy consumption remains an
important factor to design and implement nodes. So to minimize the energy required for one to one
communication, the distance between the transmitter and receiver is calculated before used for transmission
and less power is required to transmit the measurement data is calculated and determined. To save energy, in
this paper we have designed such a structure at hub level and network level which will save energy by going in
sleep- wake mode when there is no work and sensing scheme to encrypt data packets.
Keywords: Energy efficiency, periodic sleep/wake-up scheme, received signal strength indication (RSSI),
wireless sensor network (WSN).
I. Introduction
Due to tremendous inventions and development going on in wireless sensing node made wide
applications in industrial system monitoring and environmental sensing. The amount of remote sensors, which
are ordinarily prompted as a remote sensor network (wsn), made for genuine applications has immediately
expanded in most recent years, and this pattern is required to much more help in the one years from now. The
traffic-adaptive medium access protocol has been designed to reduce energy consumption by allowing sensor
nodes to assume a low-power idle state whenever they are not working in transmission or receiving mode. But
also energy consumption remains a major hurdle for development. Energy can be saved at battery using solar
harvesting method but to save energy at node level and network is an important factor. Many researchers had
gone through many schemes and hardware. Many adaptive scaling methods, duty cycles are introduced. Further
they introduced a combination of sleep schedule with transmitter to block energy. But in this paper we are
introducing periodic sleep/wake up schemes to encrypt data both at hub level and network to optimize energy.
II. Literature Survey
M. Roseline Juliana, S.Srinivasan (Sep 2015): Recent trends in wireless sensor networks lead to the
development of new protocols for data gathering. In this paper, a secure energy efficient location aware data
gathering approach is introduced to secure data gathering. An Elliptic Curve Diffie Hellman Key Exchange
(ECDHKE) algorithm is utilized for key generation and key exchange between the sensor nodes to maintain
security and prevent the data from malicious nodes. The performance of the proposed scheme is validated in
terms of packet drop, throughput, energy consumption, residual energy and network lifetime. The proposed
scheme achieves better performance than the existing EEHA and SMART schemes.
Rakesh V, Sarala S M (June, 2015): Wireless sensor networks (WSN) has been increased day by day to
measure and monitor physical characteristics. It can implement in the area where human cannot be reached.
Each sensor node depends on power to do their activities. As the WSN has limited battery life time it’s
important to optimize power. There are many methods to optimize power in WSN. Here compression and
encryption techniques are used for optimizing power in WSN. Here optimization means reducing the amount of
energy consumption. If the input data is large then automatically the transmitters and receivers will take more
amount of energy. So here by reducing the data size by compression and by sending an encrypted version of the
compressed data, we are making the antennas to transmit and receive fewer amounts of data than the actual data
and also it will be more secured. At the receiving end by applying the decryption and reconstruction of the
compressed data, we are able to recover the complete data. Then we will compare how much energy is
optimized by different compression and encryption techniques.
Reshma Patil, Prof.S.M.Shinde (Aug 2014): Wireless sensor network is autonomous and infrastructure
less network. Now day’s different types of WSN applications are developed. Secure transmission of information
in WSN is an important issue. In this paper we introduce new approach for WSN security, we propose Secure
Energy Efficient Routing (SEER) schema that consider cost of providing security and effects on energy
efficiency. Secrete sharing method used for providing security. In this method information is divided into
multiple shares and sends via multiple disjoint paths from source to destination at different point of time. At the
destination end the original information reconstructed by combining the shares received via different paths at
A Review On Designing Of Data Encrypted Wireless Sensor Node For Energy Optimization
DOI: 10.9790/2834-11121925 www.iosrjournals.org 20 | Page
different point of time. We also calculate cost for security in term of time and its effect on energy efficiency.
Simulate the different types of attacks like wormhole, sink hole etc.
Pratik Agarwal (2013): Wireless Sensor Networks (WSNs) are made of sensor nodes with restricted
battery life and transmission capability. In this work we propose an energy efficient multipath routing algorithm
in WSN. This protocol is designed to improve the latency, resiliency and efficiency through discovering
multiple paths from the source to the destination. It has a sink initiated Route Discovery process with the
location information of the source known to the sink. There are two types of nodes which are used here one is
primary and the other is alternate. At the end of the route formation one primary path and multiple number of
alternate paths are built and all nodes except the primary are put to sleep mode which helps us to save energy
and generate a collision free path, the primary path is used to transmit the data from source to the sink and if the
route disrupts, the next best alternate route is used for the purpose and if no path exists between the source and
destination then process starts from the beginning. Our simulation finds the latency, packet delivery ratio,
average control packet overhead and total energy consumed. The protocol has 12% (approx.) less control packet
overhead in comparison to MR2 and LIEMRO,5% less average energy consumption in comparison to MR2 and
28% less average energy consumption in comparison to LIEMRO. Regarding latency the proposed protocol has
similar result to MR2 but in comparison to LIEMRO the algorithm is 24% faster. Lastly in case of Packet
Delivery Ratio the proposed protocol gives 5 %( approx.) Better result in comparison to MR2 and , 12% better
result in comparison to LIEMRO on an average.
III. Proposed Sensing Scheme
3.1 Sensing Scheme
The concept of wireless sensor node states that, except for the physical sensing capabilities, the nodes
will also be able to process the obtained data and communicate the results without wire. In recent years, many
energy conservation schemes have been proposed in the literature, which assume that data acquisition and
processing have an energy consumption that is significantly lower than communication. In addition, since each
of the sensor nodes in the network is energy constrained and each component in a sensor node consumes a
certain amount of energy, power supply becomes important to ensure proper operation of the entire WSN as the
number of sensors deployed in a network grows. Hence, constructing effective network structures for the
application of WSN with consideration of energy efficiency is need importance.
3.1.1. Energy Consumption Calculation
After sensing the environmental parameters, the results should be transmitted to the central monitoring
unit (CMU) or other sensor nodes. In order for two sensor hubs to be in contact , the energy consumption
needed for data transmission can be expressed as
where k is the number of transmitted data bits; α is a factor valued from 2 to 5, depending on the
environment of wireless transmission; d is the distance between two sensor nodes; εamp (J/b/m2) is the
amplification coefficient to satisfy a minimum bit error rate to ensure reliable reception at the receiver; and
Ee_tx (J/b) is the energy dissipated to operate the transceiver, which is given as
where Vcc denotes the working voltage, ITP denotes the current for transmission, and K data rate
denotes the data transmission rate. The energy consumed for receiving a data stream can be expressed as
Equation (1) shows that, for a fixed distance, the energy consumed is proportional to the number of
data bits. On the other hand, the longer the distance between two sensor nodes is, the more energy will be
consumed.
3.1.2 Sensing Schemes
The network-level energy saving was realized mainly through the scheme switching of the network.
Two different schemes of the network are shown as follows.
Scheme 1: The obtained data points are transmitted to the CMU from each sensor node. The energy
consumption Edr in this case is calculated as
A Review On Designing Of Data Encrypted Wireless Sensor Node For Energy Optimization
DOI: 10.9790/2834-11121925 www.iosrjournals.org 21 | Page
Figure 1. Scheme 1 used in the greenhouse.
where N is the number of sensors, dn is the distance between each sensor node and the CMU, and kr is
number of data bits from the obtained data.scheme 1 being applied to the platform of greenhouse management
in which temperature is measured by the sensors. In each greenhouse, the sensor nodes acquire the temperature
data and transmit the data to the CMU directly without routing and relay.
Scheme 2: The sensors are grouped into different clusters, and the obtained data from each sensor node
are transmitted to the corresponding cluster head (it is defined as the sensor node that collects the data from
others in the cluster). Then, the cluster head will pack the data and transmit them to the CMU. The energy
consumption Eds in this case is calculated as
where M is the number of clusters, Nm is the number of sensors in the corresponding cluster, dj is the
distance between a sensor and its corresponding cluster head, dm is the distance between the cluster head and
the CMU, and km is the number of packed data bits for data transmission. For example, Figure. 2 shows scheme
2 being applied to the platform of greenhouse management in which the network is grouped into different
clusters.
In this scheme, each greenhouse is defined as a cluster, and the obtained data are transmitted first to
corresponding cluster head; then, the CMU will ask the cluster heads for the temperature data.
Figure 2. Scheme 2 used in the greenhouse.
A Review On Designing Of Data Encrypted Wireless Sensor Node For Energy Optimization
DOI: 10.9790/2834-11121925 www.iosrjournals.org 22 | Page
IV. The Energy-Aware Sensor Node
MODEL
To design the energy less requirement model in this paper certain data packets less requirement model
is suggested which will require less energy for communication is as:
4.1.1 Communication Module
In the two sensing schemes designed for the WSN, it is assumed that the transmission power is
minimized to ensure reliable reception at the receiver end, according to the communication distance between
two sensor nodes. Hence, awareness of the communication power as well as the adjustability of the transmitter’s
output power becomes critical in performing the sensing scheme for the designed sensor node. By assuming a
unit signal gain provided by antennas, the output power of the communication module is dominated by the
consumption for power amplifier. To transmit 1 bit to the receiver, the output power and associated received
power are expressed as
where R denotes the data transmission rate, ˆ d and d are the estimated and actual transmission
distances between the transmitter and the receiver, respectively, and PS = εamp · R is the receiver sensitivity
denoting the minimum signal power that the receiver can discern. From (7), it is seen that, if the estimated
distance ˆd < d, then the received signal cannot be identified and the communication between sensor nodes fails.
On the other hand, if ˆd > d (overestimation), which means a received power that is higher than receiver
sensitivity, then a portion of the transmission energy will be lost on the propagation path while not affecting the
results of signal reception. In this case, the energy efficiency problem is translated to the effective estimation of
communication distance between two sensor nodes.
Since all of the sensor nodes are equipped with both transmission and receiving capabilities, we can
estimate the distance between sensor nodes through received signal strength indication (RSSI). For example,
considering the case where sensing scheme 2 is applied for local data transmission from a sensor node to its
cluster head, the cluster head sends a test code with maximum transmission power PTxmax to one of the sensor
nodes in the local cluster first. By measuring the received power PRx on each sensor node, the distance to the
cluster head can be calculated as
Hence, by minimizing the estimated distance for data transmission, the minimum required power to
ensure data communication is expressed as
In this paper, Chipcon CC1101 is chosen as the RF transceiver used in the sensor node design. CC1101
is a lowcost true single chip UHF transceiver designed for very low power wireless applications. The received
signal power PRx in CC1101 is translated to a decibel (dBm) value—RSSI. The relationship between PRx and
RSSI is defined as follows:
In Rx mode, the RSSI value can be read continuously from the RSSI status register, which is a binary
complement number.
The following procedure can be used to convert the RSSI reading to an absolute power level (RSSIdBm).
Step1: Read the RSSI status register.
Step2: Convert the reading from a hexadecimal number to a decimal number (RSSIdec).
Step3: If RSSIdec ≥ 128, then RSSIdBm = (RSSIdec − 256)/ 2 − RSSIoffset.
Step4: Else if RSSIdec < 128, then RSSIdBm = RSSIdec/2 – RSSIoffset where RSSIoffset is a typical value
corresponding to the data rate and the center frequency. CC1101 is programmed for operation at 100 kb/s with
433 MHz; therefore, RSSIoffset = 75. From (9), we can further obtain the following relationship as
A Review On Designing Of Data Encrypted Wireless Sensor Node For Energy Optimization
DOI: 10.9790/2834-11121925 www.iosrjournals.org 23 | Page
where 10 · log10 PTx is the transmission power in dBm and 10 · log10 PRx is the RSSI. There is a
register PATABLE in CC1101 which is used in selecting the transmission power. From (11),
we can compute the minimum required power as
In CC1101, the format of the data packet can be configured to include the following items:
1) Preamble;
2) Synchronization word;
3) Length byte;
4) Address byte;
5) Payload;
6) CRC word.
Figure 3. Data packet in this paper.
Each item can be configured by setting the corresponding registers when initializing CC1101. In this
paper, the data packet is configured as shown in Fig. 3.
As a result, each sensor node will transmit (10 + n) byte data one time, and the energy consumption can be
computed as follows:
where n denotes the number of payload data bits needed to be transmitted. Here, temperature data are
the payload data, and
R = 100 kb/s is used in this paper.
B. Periodic Sleep/Wake-Up Scheme
Except for the adaptive RF power supply as described in the previous section, the node-level energy
saving is also achieved through the periodic sleep/wake-up scheme. As we know if a WSN is deployed in
remote fields or under harsh environments where manually recharging batteries for sensors is not feasible, one
typical alternative approach for energy saving is to turn off some sensors and to activate only a necessary set of
sensors while providing a good sensing coverage and network connectivity simultaneously [26]. In slowly
varying parameter measurements, such as temperature, not all sensor nodes are needed to stay in active mode.
Therefore, in order to save energy consumption, the sensor nodes are designed to be put into a sleep mode with
a timer that determines their sleep duration. When the timer overflows, an interrupt happens, and it will wake
those nodes up and will then perform measurements and data transmission.
4.1.2 Sensor Node Design
Each sensor node should be able to collect environmental parameters and communicate with each
other. At the same time, its corresponding hardware and software should be energy efficient and include the
functionality described in previous sections. Based on these requirements, the sensor node has been designed
and implemented as shown in Fig. 4. In this design, the MSP430F149 microcontroller is chosen as the core for
fulfilling computation and control functions of the sensor node; this is because it possesses the capability of
ultralow power consumption and short waking-up time (less than 6 μs) as compared to other commonly used
microcontrollers listed in Table I. Also, from Tables I and II, the architecture of MSP430F149, combined with
its five low-power modes (LPM0–LPM4), can be optimized to achieve extended battery life in portable
measurement applications. Furthermore, when the CPU works at the same speed (1 MHz), the energy con-
sumption ofMSP430F149 is lower than that of other commonly used microcontrollers (shown in Table I).
The supply voltage of the sensor node is 3.3 V, which is obtained using the AMS1117-3.3 voltage regulator
with low intrinsic consumption current from two 3.7-V (2400-mAh) lithium batteries. The RS232 interface is
designed for communication with the PC in environment monitoring. For example, when collecting the
temperature parameters, these temperature values can be transmitted to PC and displayed in the computer
monitor.
A Review On Designing Of Data Encrypted Wireless Sensor Node For Energy Optimization
DOI: 10.9790/2834-11121925 www.iosrjournals.org 24 | Page
V. Methodology
Figure 4. Block diagram.
A. Research methodology to be employed
The ―node level energy saving‖ is achieved by using the combination of adaptive transmission power
setting, by the periodic sleep/wake-up scheme and data encryption. While the ―network-level energy saving‖ is
achieved by adaptive network configuration.
B. Tools to be used for research work
I) Hardware Used:-Microcontroller PIC18f252, RS232, UART, Zig-bee CC2500, Temperature sensor
LM35,Transformer, Battery.
II) Software Used:- .net ,C compiler.
VI. Conclusion
In this paper, we have presented the design and implementation of an energy-aware sensor node, which
can help in constructing an energy-efficient WSN through ―node-level energy saving‖ and ―network-level
energy saving.‖ The ―node level energy saving‖ is achieved by adaptive transmission power setting and by the
periodic sleep/wake-up scheme, while the ―network-level energy saving‖ is achieved by adaptive network
configuration. For further study, more functionality, such as local data processing and data fusion algorithm,
will be added into the designed sensor node for improving the energy-saving protocol. In addition, the real-
world applications, e.g., greenhouse management, of such a WSN will be explored. The full development model
will be designed by reviewed this things.
Acknowledgement
This paper presents review made on energy Optimization techniques and have proposed researched
methodology to work in future project on designing, and encoding techniques to encrypted data on wsn to save
energy of nodes. The authors are grateful for their support.
References
[1] Jelena Markova’s Gregory Prier Peter Reiher, 2002, ―Attacking DDoS at the Source‖, Proceedings of the 10 th IEEE International
Conference on Network Protocols (ICNP’02) 1092-1648/02 $17.00 © 2002 IEEE
[2] Suraj Sharma, Pratik Agarwal,and Sanjay Kumar Jena. Energy Aware Multipath Routing for Wireless Sensor Networks. In
Nabendu Chaki, Natarajan Meghanathan, and Dhinaharan Nagamalai, editors, Computer Networks & Communications (NetCom),
volume 131 of Lecture Notes in Electrical Engineering, pages 753-760. Springer New York, 2013.
[3] Rakesh V, Sarala S M, June 2015, ―Energy Optimization In Wireless Sensor Network Using Different Compression And Encrytion
Techniques ‖, International Journal of Engineering Research and General Science Volume 3, Issue 3, Part-2 , May-June, 2015 ISSN
2091-2730
[4] Dilek Karabudak, ―Security Optimization and Data Classification in Wireless Sensor Networks‖
[5] M. Roseline Juliana, S.Srinivasan , Sep 2015, ―seladg: secure energy efficient location Aware data gathering approach for wireless
Sensor networks‖
[6] Reshma Patil, Prof.S.M.Shinde , aug 2014, ―secure energy efficient routing in Wireless sensor network‖, Reshma Patil et al,
Int.J.Computer Technology & Applications,Vol 5 (4),1392-1397 ISSN:2229-6093
WM
ucC
Temp
sensor
B
A
T
T
E
R
Y
WM
uC
W
M ucC
Voltage
sensor
B
A
T
T
E
R
Y
BATTERY
PC
A Review On Designing Of Data Encrypted Wireless Sensor Node For Energy Optimization
DOI: 10.9790/2834-11121925 www.iosrjournals.org 25 | Page
[7] Santhosh Simon, K Paulose Jacob, October 2013, ―Energy Optimized Secure Routing Protocol for Wireless Sensor Networks‖,
International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 4, October 2013
[8] C. Chong and S. P. Kumar, ―Sensor networks: Evolution, opportunities, challenges,‖ Proc. IEEE, vol. 91, no. 8, pp. 1247–1256,
Aug. 2003.
[9] R. Gao and Z. Fan, ―Architectural design of a sensory node controller for optimized energy utilization in sensor networks,‖ IEEE
Trans. Instrum.Meas., vol. 55, no. 2, pp. 415–428, Apr. 2006.
[10] Tiwari, P. Ballal, and F. L. Levis, ―Energy-efficient wireless sensor network design and implementation for condition-based
maintenance,‖ACM Trans. Sens. Netw., vol. 3, no. 1, pp. 1–23, Mar. 2007.
[11] F. Salvadori, M. Campos, P. Sausen, R. Camargo, C. Gehrke, C. Rech, M. Spohn, and A. Oliveira,―Monitoring in industrial systems
using wireless sensor network with dynamic power management,‖ IEEE Trans. Instrum. Meas., vol. 58, no. 9, pp. 3104–3111, Sep.
2009.
[12] D. Gallo, C. Landi, and N. Pasquino, ―Multisensor network for urban electromagnetic field monitoring,‖ IEEE Trans. Instrum.
Meas., vol. 58, no. 9, pp. 3315–3322, Sep. 2009.

More Related Content

What's hot

Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
IRJET Journal
 
Harvesting aware energy management for time-critical wireless sensor networks
Harvesting aware energy management for time-critical wireless sensor networksHarvesting aware energy management for time-critical wireless sensor networks
Harvesting aware energy management for time-critical wireless sensor networks
IEEEFINALYEARPROJECTS
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ijasuc
 
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
ijsrd.com
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
IJCI JOURNAL
 
1 ijcse-01179-6
1 ijcse-01179-61 ijcse-01179-6
1 ijcse-01179-6
Shivlal Mewada
 
Energy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A ReviewEnergy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A Review
IOSR Journals
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
eSAT Publishing House
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
eSAT Publishing House
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...
eSAT Journals
 
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using  Genetic AlgorithmsOptimized Projected Strategy for Enhancement of WSN Using  Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
IJMER
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Editor IJARCET
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
IJCNCJournal
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
Jasleen Kaur (Chandigarh University)
 
Review Paper on Energy Efficient Protocol in Wireless Sensor Network
Review Paper on Energy Efficient Protocol in Wireless Sensor NetworkReview Paper on Energy Efficient Protocol in Wireless Sensor Network
Review Paper on Energy Efficient Protocol in Wireless Sensor Network
IJERA Editor
 
K010326568
K010326568K010326568
K010326568
IOSR Journals
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
ijdpsjournal
 
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEYDATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
ijasuc
 

What's hot (19)

Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
 
Harvesting aware energy management for time-critical wireless sensor networks
Harvesting aware energy management for time-critical wireless sensor networksHarvesting aware energy management for time-critical wireless sensor networks
Harvesting aware energy management for time-critical wireless sensor networks
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
 
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
 
J031101064069
J031101064069J031101064069
J031101064069
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
 
1 ijcse-01179-6
1 ijcse-01179-61 ijcse-01179-6
1 ijcse-01179-6
 
Energy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A ReviewEnergy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A Review
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...
 
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using  Genetic AlgorithmsOptimized Projected Strategy for Enhancement of WSN Using  Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Review Paper on Energy Efficient Protocol in Wireless Sensor Network
Review Paper on Energy Efficient Protocol in Wireless Sensor NetworkReview Paper on Energy Efficient Protocol in Wireless Sensor Network
Review Paper on Energy Efficient Protocol in Wireless Sensor Network
 
K010326568
K010326568K010326568
K010326568
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
 
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEYDATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
 

Viewers also liked

I012625461
I012625461I012625461
I012625461
IOSR Journals
 
A1302040105
A1302040105A1302040105
A1302040105
IOSR Journals
 
J017335863
J017335863J017335863
J017335863
IOSR Journals
 
C017611624
C017611624C017611624
C017611624
IOSR Journals
 
B017622430
B017622430B017622430
B017622430
IOSR Journals
 
Causes of Delay in Construction of Bridge Girders
Causes of Delay in Construction of Bridge GirdersCauses of Delay in Construction of Bridge Girders
Causes of Delay in Construction of Bridge Girders
IOSR Journals
 
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti StatePath-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
IOSR Journals
 
Influence of Cr Doping On Structural, Morphological and Optical Properties of...
Influence of Cr Doping On Structural, Morphological and Optical Properties of...Influence of Cr Doping On Structural, Morphological and Optical Properties of...
Influence of Cr Doping On Structural, Morphological and Optical Properties of...
IOSR Journals
 
I012625461
I012625461I012625461
I012625461
IOSR Journals
 
B010340611
B010340611B010340611
B010340611
IOSR Journals
 
F017163443
F017163443F017163443
F017163443
IOSR Journals
 
Q180305116119
Q180305116119Q180305116119
Q180305116119
IOSR Journals
 
G010424248
G010424248G010424248
G010424248
IOSR Journals
 
D1103042431
D1103042431D1103042431
D1103042431
IOSR Journals
 
K012447075
K012447075K012447075
K012447075
IOSR Journals
 
Q130402109113
Q130402109113Q130402109113
Q130402109113
IOSR Journals
 
B1303020508
B1303020508B1303020508
B1303020508
IOSR Journals
 
E010113235
E010113235E010113235
E010113235
IOSR Journals
 
L010326978
L010326978L010326978
L010326978
IOSR Journals
 
P010227680
P010227680P010227680
P010227680
IOSR Journals
 

Viewers also liked (20)

I012625461
I012625461I012625461
I012625461
 
A1302040105
A1302040105A1302040105
A1302040105
 
J017335863
J017335863J017335863
J017335863
 
C017611624
C017611624C017611624
C017611624
 
B017622430
B017622430B017622430
B017622430
 
Causes of Delay in Construction of Bridge Girders
Causes of Delay in Construction of Bridge GirdersCauses of Delay in Construction of Bridge Girders
Causes of Delay in Construction of Bridge Girders
 
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti StatePath-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
Path-Loss Determination of 91.5 MHZ FM Radio Channel of Ekiti State
 
Influence of Cr Doping On Structural, Morphological and Optical Properties of...
Influence of Cr Doping On Structural, Morphological and Optical Properties of...Influence of Cr Doping On Structural, Morphological and Optical Properties of...
Influence of Cr Doping On Structural, Morphological and Optical Properties of...
 
I012625461
I012625461I012625461
I012625461
 
B010340611
B010340611B010340611
B010340611
 
F017163443
F017163443F017163443
F017163443
 
Q180305116119
Q180305116119Q180305116119
Q180305116119
 
G010424248
G010424248G010424248
G010424248
 
D1103042431
D1103042431D1103042431
D1103042431
 
K012447075
K012447075K012447075
K012447075
 
Q130402109113
Q130402109113Q130402109113
Q130402109113
 
B1303020508
B1303020508B1303020508
B1303020508
 
E010113235
E010113235E010113235
E010113235
 
L010326978
L010326978L010326978
L010326978
 
P010227680
P010227680P010227680
P010227680
 

Similar to C011131925

Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
theijes
 
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
IJECEIAES
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET Journal
 
Communication Cost Reduction by Data Aggregation: A Survey
Communication Cost Reduction by Data Aggregation: A SurveyCommunication Cost Reduction by Data Aggregation: A Survey
Communication Cost Reduction by Data Aggregation: A Survey
IJMTST Journal
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
IJCNCJournal
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
IJCNCJournal
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
IAEME Publication
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
IAEME Publication
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
IJET - International Journal of Engineering and Techniques
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET Journal
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065
auwalaumar
 
A LOW-ENERGY DATA AGGREGATION PROTOCOL USING AN EMERGENCY EFFICIENT HYBRID ME...
A LOW-ENERGY DATA AGGREGATION PROTOCOL USING AN EMERGENCY EFFICIENT HYBRID ME...A LOW-ENERGY DATA AGGREGATION PROTOCOL USING AN EMERGENCY EFFICIENT HYBRID ME...
A LOW-ENERGY DATA AGGREGATION PROTOCOL USING AN EMERGENCY EFFICIENT HYBRID ME...
IJCNCJournal
 
Kb3418101813
Kb3418101813Kb3418101813
Kb3418101813
IJERA Editor
 
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
IJEACS
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
IJERA Editor
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
IJERA Editor
 
A review on energy efficient clustering routing
A review on energy efficient clustering routingA review on energy efficient clustering routing
A review on energy efficient clustering routing
eSAT Publishing House
 
Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...
IJECEIAES
 
3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)
IAESIJEECS
 
Opportunistic routing algorithm for relay node selection in wireless sensor n...
Opportunistic routing algorithm for relay node selection in wireless sensor n...Opportunistic routing algorithm for relay node selection in wireless sensor n...
Opportunistic routing algorithm for relay node selection in wireless sensor n...
redpel dot com
 

Similar to C011131925 (20)

Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
A Novel Technique to Enhance the Lifetime of Wireless Sensor Networks through...
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
Communication Cost Reduction by Data Aggregation: A Survey
Communication Cost Reduction by Data Aggregation: A SurveyCommunication Cost Reduction by Data Aggregation: A Survey
Communication Cost Reduction by Data Aggregation: A Survey
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065
 
A LOW-ENERGY DATA AGGREGATION PROTOCOL USING AN EMERGENCY EFFICIENT HYBRID ME...
A LOW-ENERGY DATA AGGREGATION PROTOCOL USING AN EMERGENCY EFFICIENT HYBRID ME...A LOW-ENERGY DATA AGGREGATION PROTOCOL USING AN EMERGENCY EFFICIENT HYBRID ME...
A LOW-ENERGY DATA AGGREGATION PROTOCOL USING AN EMERGENCY EFFICIENT HYBRID ME...
 
Kb3418101813
Kb3418101813Kb3418101813
Kb3418101813
 
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
A review on energy efficient clustering routing
A review on energy efficient clustering routingA review on energy efficient clustering routing
A review on energy efficient clustering routing
 
Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...Energy efficient routing in wireless sensor network based on mobile sink guid...
Energy efficient routing in wireless sensor network based on mobile sink guid...
 
3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)
 
Opportunistic routing algorithm for relay node selection in wireless sensor n...
Opportunistic routing algorithm for relay node selection in wireless sensor n...Opportunistic routing algorithm for relay node selection in wireless sensor n...
Opportunistic routing algorithm for relay node selection in wireless sensor n...
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 
C011121114
C011121114C011121114
C011121114
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 
C011121114
C011121114C011121114
C011121114
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

C011131925

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 1, Ver. III (Jan. - Feb .2016), PP 19-25 www.iosrjournals.org DOI: 10.9790/2834-11121925 www.iosrjournals.org 19 | Page A Review on Designing of Data Encrypted Wireless Sensor Node for Energy Optimization Miss Sneha Bele1 , Mr Prashant Khond2 1(Department of Electronics & Telecomumication/GUG,India 2(Department of Electronics & Telecomumication/GUG,India Abstract: For full development and expansion of wireless sensor hub, energy consumption remains an important factor to design and implement nodes. So to minimize the energy required for one to one communication, the distance between the transmitter and receiver is calculated before used for transmission and less power is required to transmit the measurement data is calculated and determined. To save energy, in this paper we have designed such a structure at hub level and network level which will save energy by going in sleep- wake mode when there is no work and sensing scheme to encrypt data packets. Keywords: Energy efficiency, periodic sleep/wake-up scheme, received signal strength indication (RSSI), wireless sensor network (WSN). I. Introduction Due to tremendous inventions and development going on in wireless sensing node made wide applications in industrial system monitoring and environmental sensing. The amount of remote sensors, which are ordinarily prompted as a remote sensor network (wsn), made for genuine applications has immediately expanded in most recent years, and this pattern is required to much more help in the one years from now. The traffic-adaptive medium access protocol has been designed to reduce energy consumption by allowing sensor nodes to assume a low-power idle state whenever they are not working in transmission or receiving mode. But also energy consumption remains a major hurdle for development. Energy can be saved at battery using solar harvesting method but to save energy at node level and network is an important factor. Many researchers had gone through many schemes and hardware. Many adaptive scaling methods, duty cycles are introduced. Further they introduced a combination of sleep schedule with transmitter to block energy. But in this paper we are introducing periodic sleep/wake up schemes to encrypt data both at hub level and network to optimize energy. II. Literature Survey M. Roseline Juliana, S.Srinivasan (Sep 2015): Recent trends in wireless sensor networks lead to the development of new protocols for data gathering. In this paper, a secure energy efficient location aware data gathering approach is introduced to secure data gathering. An Elliptic Curve Diffie Hellman Key Exchange (ECDHKE) algorithm is utilized for key generation and key exchange between the sensor nodes to maintain security and prevent the data from malicious nodes. The performance of the proposed scheme is validated in terms of packet drop, throughput, energy consumption, residual energy and network lifetime. The proposed scheme achieves better performance than the existing EEHA and SMART schemes. Rakesh V, Sarala S M (June, 2015): Wireless sensor networks (WSN) has been increased day by day to measure and monitor physical characteristics. It can implement in the area where human cannot be reached. Each sensor node depends on power to do their activities. As the WSN has limited battery life time it’s important to optimize power. There are many methods to optimize power in WSN. Here compression and encryption techniques are used for optimizing power in WSN. Here optimization means reducing the amount of energy consumption. If the input data is large then automatically the transmitters and receivers will take more amount of energy. So here by reducing the data size by compression and by sending an encrypted version of the compressed data, we are making the antennas to transmit and receive fewer amounts of data than the actual data and also it will be more secured. At the receiving end by applying the decryption and reconstruction of the compressed data, we are able to recover the complete data. Then we will compare how much energy is optimized by different compression and encryption techniques. Reshma Patil, Prof.S.M.Shinde (Aug 2014): Wireless sensor network is autonomous and infrastructure less network. Now day’s different types of WSN applications are developed. Secure transmission of information in WSN is an important issue. In this paper we introduce new approach for WSN security, we propose Secure Energy Efficient Routing (SEER) schema that consider cost of providing security and effects on energy efficiency. Secrete sharing method used for providing security. In this method information is divided into multiple shares and sends via multiple disjoint paths from source to destination at different point of time. At the destination end the original information reconstructed by combining the shares received via different paths at
  • 2. A Review On Designing Of Data Encrypted Wireless Sensor Node For Energy Optimization DOI: 10.9790/2834-11121925 www.iosrjournals.org 20 | Page different point of time. We also calculate cost for security in term of time and its effect on energy efficiency. Simulate the different types of attacks like wormhole, sink hole etc. Pratik Agarwal (2013): Wireless Sensor Networks (WSNs) are made of sensor nodes with restricted battery life and transmission capability. In this work we propose an energy efficient multipath routing algorithm in WSN. This protocol is designed to improve the latency, resiliency and efficiency through discovering multiple paths from the source to the destination. It has a sink initiated Route Discovery process with the location information of the source known to the sink. There are two types of nodes which are used here one is primary and the other is alternate. At the end of the route formation one primary path and multiple number of alternate paths are built and all nodes except the primary are put to sleep mode which helps us to save energy and generate a collision free path, the primary path is used to transmit the data from source to the sink and if the route disrupts, the next best alternate route is used for the purpose and if no path exists between the source and destination then process starts from the beginning. Our simulation finds the latency, packet delivery ratio, average control packet overhead and total energy consumed. The protocol has 12% (approx.) less control packet overhead in comparison to MR2 and LIEMRO,5% less average energy consumption in comparison to MR2 and 28% less average energy consumption in comparison to LIEMRO. Regarding latency the proposed protocol has similar result to MR2 but in comparison to LIEMRO the algorithm is 24% faster. Lastly in case of Packet Delivery Ratio the proposed protocol gives 5 %( approx.) Better result in comparison to MR2 and , 12% better result in comparison to LIEMRO on an average. III. Proposed Sensing Scheme 3.1 Sensing Scheme The concept of wireless sensor node states that, except for the physical sensing capabilities, the nodes will also be able to process the obtained data and communicate the results without wire. In recent years, many energy conservation schemes have been proposed in the literature, which assume that data acquisition and processing have an energy consumption that is significantly lower than communication. In addition, since each of the sensor nodes in the network is energy constrained and each component in a sensor node consumes a certain amount of energy, power supply becomes important to ensure proper operation of the entire WSN as the number of sensors deployed in a network grows. Hence, constructing effective network structures for the application of WSN with consideration of energy efficiency is need importance. 3.1.1. Energy Consumption Calculation After sensing the environmental parameters, the results should be transmitted to the central monitoring unit (CMU) or other sensor nodes. In order for two sensor hubs to be in contact , the energy consumption needed for data transmission can be expressed as where k is the number of transmitted data bits; α is a factor valued from 2 to 5, depending on the environment of wireless transmission; d is the distance between two sensor nodes; εamp (J/b/m2) is the amplification coefficient to satisfy a minimum bit error rate to ensure reliable reception at the receiver; and Ee_tx (J/b) is the energy dissipated to operate the transceiver, which is given as where Vcc denotes the working voltage, ITP denotes the current for transmission, and K data rate denotes the data transmission rate. The energy consumed for receiving a data stream can be expressed as Equation (1) shows that, for a fixed distance, the energy consumed is proportional to the number of data bits. On the other hand, the longer the distance between two sensor nodes is, the more energy will be consumed. 3.1.2 Sensing Schemes The network-level energy saving was realized mainly through the scheme switching of the network. Two different schemes of the network are shown as follows. Scheme 1: The obtained data points are transmitted to the CMU from each sensor node. The energy consumption Edr in this case is calculated as
  • 3. A Review On Designing Of Data Encrypted Wireless Sensor Node For Energy Optimization DOI: 10.9790/2834-11121925 www.iosrjournals.org 21 | Page Figure 1. Scheme 1 used in the greenhouse. where N is the number of sensors, dn is the distance between each sensor node and the CMU, and kr is number of data bits from the obtained data.scheme 1 being applied to the platform of greenhouse management in which temperature is measured by the sensors. In each greenhouse, the sensor nodes acquire the temperature data and transmit the data to the CMU directly without routing and relay. Scheme 2: The sensors are grouped into different clusters, and the obtained data from each sensor node are transmitted to the corresponding cluster head (it is defined as the sensor node that collects the data from others in the cluster). Then, the cluster head will pack the data and transmit them to the CMU. The energy consumption Eds in this case is calculated as where M is the number of clusters, Nm is the number of sensors in the corresponding cluster, dj is the distance between a sensor and its corresponding cluster head, dm is the distance between the cluster head and the CMU, and km is the number of packed data bits for data transmission. For example, Figure. 2 shows scheme 2 being applied to the platform of greenhouse management in which the network is grouped into different clusters. In this scheme, each greenhouse is defined as a cluster, and the obtained data are transmitted first to corresponding cluster head; then, the CMU will ask the cluster heads for the temperature data. Figure 2. Scheme 2 used in the greenhouse.
  • 4. A Review On Designing Of Data Encrypted Wireless Sensor Node For Energy Optimization DOI: 10.9790/2834-11121925 www.iosrjournals.org 22 | Page IV. The Energy-Aware Sensor Node MODEL To design the energy less requirement model in this paper certain data packets less requirement model is suggested which will require less energy for communication is as: 4.1.1 Communication Module In the two sensing schemes designed for the WSN, it is assumed that the transmission power is minimized to ensure reliable reception at the receiver end, according to the communication distance between two sensor nodes. Hence, awareness of the communication power as well as the adjustability of the transmitter’s output power becomes critical in performing the sensing scheme for the designed sensor node. By assuming a unit signal gain provided by antennas, the output power of the communication module is dominated by the consumption for power amplifier. To transmit 1 bit to the receiver, the output power and associated received power are expressed as where R denotes the data transmission rate, ˆ d and d are the estimated and actual transmission distances between the transmitter and the receiver, respectively, and PS = εamp · R is the receiver sensitivity denoting the minimum signal power that the receiver can discern. From (7), it is seen that, if the estimated distance ˆd < d, then the received signal cannot be identified and the communication between sensor nodes fails. On the other hand, if ˆd > d (overestimation), which means a received power that is higher than receiver sensitivity, then a portion of the transmission energy will be lost on the propagation path while not affecting the results of signal reception. In this case, the energy efficiency problem is translated to the effective estimation of communication distance between two sensor nodes. Since all of the sensor nodes are equipped with both transmission and receiving capabilities, we can estimate the distance between sensor nodes through received signal strength indication (RSSI). For example, considering the case where sensing scheme 2 is applied for local data transmission from a sensor node to its cluster head, the cluster head sends a test code with maximum transmission power PTxmax to one of the sensor nodes in the local cluster first. By measuring the received power PRx on each sensor node, the distance to the cluster head can be calculated as Hence, by minimizing the estimated distance for data transmission, the minimum required power to ensure data communication is expressed as In this paper, Chipcon CC1101 is chosen as the RF transceiver used in the sensor node design. CC1101 is a lowcost true single chip UHF transceiver designed for very low power wireless applications. The received signal power PRx in CC1101 is translated to a decibel (dBm) value—RSSI. The relationship between PRx and RSSI is defined as follows: In Rx mode, the RSSI value can be read continuously from the RSSI status register, which is a binary complement number. The following procedure can be used to convert the RSSI reading to an absolute power level (RSSIdBm). Step1: Read the RSSI status register. Step2: Convert the reading from a hexadecimal number to a decimal number (RSSIdec). Step3: If RSSIdec ≥ 128, then RSSIdBm = (RSSIdec − 256)/ 2 − RSSIoffset. Step4: Else if RSSIdec < 128, then RSSIdBm = RSSIdec/2 – RSSIoffset where RSSIoffset is a typical value corresponding to the data rate and the center frequency. CC1101 is programmed for operation at 100 kb/s with 433 MHz; therefore, RSSIoffset = 75. From (9), we can further obtain the following relationship as
  • 5. A Review On Designing Of Data Encrypted Wireless Sensor Node For Energy Optimization DOI: 10.9790/2834-11121925 www.iosrjournals.org 23 | Page where 10 · log10 PTx is the transmission power in dBm and 10 · log10 PRx is the RSSI. There is a register PATABLE in CC1101 which is used in selecting the transmission power. From (11), we can compute the minimum required power as In CC1101, the format of the data packet can be configured to include the following items: 1) Preamble; 2) Synchronization word; 3) Length byte; 4) Address byte; 5) Payload; 6) CRC word. Figure 3. Data packet in this paper. Each item can be configured by setting the corresponding registers when initializing CC1101. In this paper, the data packet is configured as shown in Fig. 3. As a result, each sensor node will transmit (10 + n) byte data one time, and the energy consumption can be computed as follows: where n denotes the number of payload data bits needed to be transmitted. Here, temperature data are the payload data, and R = 100 kb/s is used in this paper. B. Periodic Sleep/Wake-Up Scheme Except for the adaptive RF power supply as described in the previous section, the node-level energy saving is also achieved through the periodic sleep/wake-up scheme. As we know if a WSN is deployed in remote fields or under harsh environments where manually recharging batteries for sensors is not feasible, one typical alternative approach for energy saving is to turn off some sensors and to activate only a necessary set of sensors while providing a good sensing coverage and network connectivity simultaneously [26]. In slowly varying parameter measurements, such as temperature, not all sensor nodes are needed to stay in active mode. Therefore, in order to save energy consumption, the sensor nodes are designed to be put into a sleep mode with a timer that determines their sleep duration. When the timer overflows, an interrupt happens, and it will wake those nodes up and will then perform measurements and data transmission. 4.1.2 Sensor Node Design Each sensor node should be able to collect environmental parameters and communicate with each other. At the same time, its corresponding hardware and software should be energy efficient and include the functionality described in previous sections. Based on these requirements, the sensor node has been designed and implemented as shown in Fig. 4. In this design, the MSP430F149 microcontroller is chosen as the core for fulfilling computation and control functions of the sensor node; this is because it possesses the capability of ultralow power consumption and short waking-up time (less than 6 μs) as compared to other commonly used microcontrollers listed in Table I. Also, from Tables I and II, the architecture of MSP430F149, combined with its five low-power modes (LPM0–LPM4), can be optimized to achieve extended battery life in portable measurement applications. Furthermore, when the CPU works at the same speed (1 MHz), the energy con- sumption ofMSP430F149 is lower than that of other commonly used microcontrollers (shown in Table I). The supply voltage of the sensor node is 3.3 V, which is obtained using the AMS1117-3.3 voltage regulator with low intrinsic consumption current from two 3.7-V (2400-mAh) lithium batteries. The RS232 interface is designed for communication with the PC in environment monitoring. For example, when collecting the temperature parameters, these temperature values can be transmitted to PC and displayed in the computer monitor.
  • 6. A Review On Designing Of Data Encrypted Wireless Sensor Node For Energy Optimization DOI: 10.9790/2834-11121925 www.iosrjournals.org 24 | Page V. Methodology Figure 4. Block diagram. A. Research methodology to be employed The ―node level energy saving‖ is achieved by using the combination of adaptive transmission power setting, by the periodic sleep/wake-up scheme and data encryption. While the ―network-level energy saving‖ is achieved by adaptive network configuration. B. Tools to be used for research work I) Hardware Used:-Microcontroller PIC18f252, RS232, UART, Zig-bee CC2500, Temperature sensor LM35,Transformer, Battery. II) Software Used:- .net ,C compiler. VI. Conclusion In this paper, we have presented the design and implementation of an energy-aware sensor node, which can help in constructing an energy-efficient WSN through ―node-level energy saving‖ and ―network-level energy saving.‖ The ―node level energy saving‖ is achieved by adaptive transmission power setting and by the periodic sleep/wake-up scheme, while the ―network-level energy saving‖ is achieved by adaptive network configuration. For further study, more functionality, such as local data processing and data fusion algorithm, will be added into the designed sensor node for improving the energy-saving protocol. In addition, the real- world applications, e.g., greenhouse management, of such a WSN will be explored. The full development model will be designed by reviewed this things. Acknowledgement This paper presents review made on energy Optimization techniques and have proposed researched methodology to work in future project on designing, and encoding techniques to encrypted data on wsn to save energy of nodes. The authors are grateful for their support. References [1] Jelena Markova’s Gregory Prier Peter Reiher, 2002, ―Attacking DDoS at the Source‖, Proceedings of the 10 th IEEE International Conference on Network Protocols (ICNP’02) 1092-1648/02 $17.00 © 2002 IEEE [2] Suraj Sharma, Pratik Agarwal,and Sanjay Kumar Jena. Energy Aware Multipath Routing for Wireless Sensor Networks. In Nabendu Chaki, Natarajan Meghanathan, and Dhinaharan Nagamalai, editors, Computer Networks & Communications (NetCom), volume 131 of Lecture Notes in Electrical Engineering, pages 753-760. Springer New York, 2013. [3] Rakesh V, Sarala S M, June 2015, ―Energy Optimization In Wireless Sensor Network Using Different Compression And Encrytion Techniques ‖, International Journal of Engineering Research and General Science Volume 3, Issue 3, Part-2 , May-June, 2015 ISSN 2091-2730 [4] Dilek Karabudak, ―Security Optimization and Data Classification in Wireless Sensor Networks‖ [5] M. Roseline Juliana, S.Srinivasan , Sep 2015, ―seladg: secure energy efficient location Aware data gathering approach for wireless Sensor networks‖ [6] Reshma Patil, Prof.S.M.Shinde , aug 2014, ―secure energy efficient routing in Wireless sensor network‖, Reshma Patil et al, Int.J.Computer Technology & Applications,Vol 5 (4),1392-1397 ISSN:2229-6093 WM ucC Temp sensor B A T T E R Y WM uC W M ucC Voltage sensor B A T T E R Y BATTERY PC
  • 7. A Review On Designing Of Data Encrypted Wireless Sensor Node For Energy Optimization DOI: 10.9790/2834-11121925 www.iosrjournals.org 25 | Page [7] Santhosh Simon, K Paulose Jacob, October 2013, ―Energy Optimized Secure Routing Protocol for Wireless Sensor Networks‖, International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 4, October 2013 [8] C. Chong and S. P. Kumar, ―Sensor networks: Evolution, opportunities, challenges,‖ Proc. IEEE, vol. 91, no. 8, pp. 1247–1256, Aug. 2003. [9] R. Gao and Z. Fan, ―Architectural design of a sensory node controller for optimized energy utilization in sensor networks,‖ IEEE Trans. Instrum.Meas., vol. 55, no. 2, pp. 415–428, Apr. 2006. [10] Tiwari, P. Ballal, and F. L. Levis, ―Energy-efficient wireless sensor network design and implementation for condition-based maintenance,‖ACM Trans. Sens. Netw., vol. 3, no. 1, pp. 1–23, Mar. 2007. [11] F. Salvadori, M. Campos, P. Sausen, R. Camargo, C. Gehrke, C. Rech, M. Spohn, and A. Oliveira,―Monitoring in industrial systems using wireless sensor network with dynamic power management,‖ IEEE Trans. Instrum. Meas., vol. 58, no. 9, pp. 3104–3111, Sep. 2009. [12] D. Gallo, C. Landi, and N. Pasquino, ―Multisensor network for urban electromagnetic field monitoring,‖ IEEE Trans. Instrum. Meas., vol. 58, no. 9, pp. 3315–3322, Sep. 2009.