SlideShare a Scribd company logo
SYNOPSIS PRESENTATION ON 
PARAMETERS BASED DATA AGGREGATION FOR 
STATISTICAL INFORMATION EXTRACTION IN 
WIRELESS SENSOR NETWORKS 
SUBMITTED BY: 
JASLEEN KAUR 
13MCS7007 
M.E.(CN) HONS. 
BATCH:2013-2015 
1
CONTENTS 
• WIRELESS SENSOR NETWORK 
• OBJECTIVES 
• PROBLEM DEFINITION 
• DATA-AGGREGATION 
• METHODOLOGY USED 
• EXPERIMENTAL METHODOLOGY 
• CONCLUSION 
• FUTURE SCOPE 
• LITERATURE SURVEY 
• REFRENCES 
2
WIRELESS SENSOR NETWORKS 
• Consists of large number of nodes that are able to interact with 
environment by sensing and controlling the physical 
parameters. 
3
APPLICATIONS 
• Environmental/Habitat monitoring 
• Acoustic detection 
• Seismic Detection 
• Disaster relief 
• Military surveillance 
• Inventory tracking 
• Medical monitoring 
• Smart spaces 
• Process Monitoring 
• Gathering sensing information in inhospitable locations 
4
SENSOR NODE 
Sensor node Video sensor node 
5
OBJECTIVES 
• To capture the effects of aggregation over 
different scales. 
• To efficiently and accurately obtain the 
sensory data from a sensor network. 
• To reduce the energy consumption and thus 
increase the lifetime of a network. 
• Main focus is to extract the statistical 
information from sensory data(which can 
answer various queries) while keeping the 
communication cost low 
6
PROBLEM DEFINITION 
• In Wireless Sensor Networks, accurate data extraction and 
aggregation is difficult due to 
▫ Significant variations in sensor readings 
▫ Frequent link and node failure 
7
DATA-AGGREGATION 
• Aims to reduce power consumption inWSN. 
• Aims to combine and summarize the data packets of several 
nodes so that amount of data transmission is reduced. 
• Data aggregation reduces the number of transmissions thereby 
improving the bandwidth and energy utilization inWSN. 
8
METHODOLOGY USED 
SITUATION 
ANALYSIS 
PROBLEM 
DEFINITION 
DATA 
AGGREGATION 
ALGORITHM 
COMPARED 
ALGORITHMS 
9
METHODOLOGY USED 
• Literature survey of WSNs and In-network 
aggregation techniques for WSNs. 
• Data aggregation scheme 
▫ Aggregation algorithm return probability 
distribution of sensory data. 
▫ Link between a pair of sensor nodes is lossy. 
▫ Packets can be corrupted or dropped. 
▫ Routing algorithm and Protocol. 
▫ Multiple predecessors and successors. 
▫ Theoretical approximation and select parameters then 
we have, 
10
▫ Sensor nodes only need to transmit packets that contain 
distribution parameters instead of individual values 
• Aggregation Process 
SINK 
REMOTE 
NODE 
Aggregated Node 
Intermediate Node 
11
12
13
AGGREGATION PROCESS continues 
• Packet sent by node v contain a 2-tuple (wv, Θ) 
where wv is the weight of aggregate in this packet sent 
by node v. 
Θ is the set of all parameters of specific Gaussian 
mixture model 
p is packet loss rate due to node/link failure, wireless 
interference. 
PREDv = { u | v ε SUCCu } is the set of immediate 
predecessor of v in routing graph. 
14
• For intermediate nodes, wv includes the sum of all weights 
from predecessor and its own. 
• At sink s, expression Σu ε PREDs wv + 1 represents total number 
of readings. 
• Can also calculate the COUNT query by this value at sink. 
• Provide accurate and robust approximation. 
• Estimating Distribution Parameters: 
▫ Problem- Input information precisely defines two values, 
its own and value received from its predecessor. 
▫ Precisely defined input distribution is 
v’ is the neighbor of v 
15
• αv‘ = wv’ / Σ wv’ + 1 
• αo = 1 / Σ wv’ + 1 
These are the normalised weights 
• Estimation-Maximization (EM) Algorithm to solve the 
problem for finding max likelihood estimates of parameters. 
• Gaussian Estimation 
16
• Space(message size) and Time complexity 
▫ More parameters we use more accurate the result is. 
• Experimental Methodology 
Communication cost 
Histogram that results from 
our algo and q-digest 
17
Performance comparison of the Algorithms in the presence of 
link failures 
Error rates 
18
METHODOLOGY OVERVIEW 
1. Situation Analysis 
2. Problem Definition 
3. Taking Assumptions 
4. Creating Network Model 
5. Aggregation Scheme 
6. Theoretical assumption in aggregation process 
7. Estimating distribution parameters using EM algorithm 
8. GMM Estimation 
9. Compared Algorithms 
19
CONCLUSION 
• Technique is scalable. 
• Robust against link failures. 
• The network communication cost is reduced. 
• Preserves the accuracy of estimation. 
• Avoid loss of valuable statistical information. 
• It is the first study on using the “Mixture 
Models”. 
• There are several directions in future. 
20
FUTURE SCOPE 
• To design a more efficient algorithm by using prediction to 
exploit the temporal correlation of sensory data. 
• To use geometry algorithms to facilitate information extraction 
algortithm. 
21
WORK DONE 
22
23
24
25
26
27
28
29
30
31
32
33
LITERATURE SURVEY 
• Survey of data-aggregation techniques using soft computing 
▫ Types of Aggregation Techniques 
Centralised Approach 
In-network Aggregation 
Size reduction 
Without size reduction 
Tree-based approach 
Cluster-based approach 
▫ Data aggregation using soft computing method 
Fuzzy-based data aggregation 
Swarm-based data aggregation 
Neural-based data aggregation 
GA-based data aggregation 
34
LITERATURE SURVEY continued.. 
• Literature Survey on wireless sensor networks 
▫ Differences between ad-hoc and sensor networks 
▫ Design factors like fault tolerance, scalability, topology, hardware 
constraints, transmission media etc 
▫ Physical Layer 
▫ Data Link Layer 
SMACS and EAR 
CSMA-Based Medium Access 
Hybrid TDMA/FDMA CSMA-Based Medium Access 
▫ Network Layer 
Flooding 
Gossiping 
SPIN 
LEACH 
35
LITERATURE SURVEY continued.. 
▫ SAR 
▫ Directed Diffusion 
• Routing Protocols 
▫ Rumor routing algorithm 
▫ Energy-efficient communication protocol for wireless micro 
sensors 
• MAC layer 
▫ Must be energy efficient 
▫ Allows fair bandwidth allocation to all nodes 
▫ CSMA strategy 
• Energy concerns 
▫ When node is in listening mode, energy expenditure is minimal 
▫ Difficulty in defining when the network dies? 
36
LITERATURE SURVEY continued.. 
• Security 
▫ Solution- Resurrecting Duckling security policy model 
▫ Talking to strangers 
• Open research issues 
▫ Development of a new transport protocol 
▫ Development of a new routing protocol 
▫ Survey on routing protocols for sensor networks 
▫ Interaction with other networks as well as cooperation among 
sensor networks 
37
38 
REFERENCES 
• [1] Hongbo Jiang,Member,IEEE,Shudong Jin,Member,IEEE, and 
Chonggang Wang, Senior Member,IEEE,“Parameter-Based Data 
Aggregation for statistical Information Extraction in Wireless 
Sensor Networks” in IEEE TRANSACTIONS ON VEHICULAR 
TECHNOLOGY, VOL. 59, NO. 8,OCTOBER 2010. 
• [2]http://www.academia.edu/890321/Wireless_Sensor_Networks_Is 
sues_Challenges_and_Survey_of_Solutions 
• [3] http://en.wikipedia.org/wiki/Secure_Data_Aggregation_in_WSN 
• [4]Hevin Rajesh Dhasian, Paramasivan Balasubramanian “Survey 
of data aggregation techniques using soft computing in wireless 
sensor networks” in IET inf.Secur.,2013,Vol.7, Iss.4,pp.336-342 
• [5]ELENA FASLO AND MICHELE ROSSI, DEI, UNIVERSITY 
OF PADOVA;JORG WIDMER,DOCOMO EURO-LABS; 
MICHELE ZORZI,DEI,UNIVERSITY OF PADOVA,“ In-network 
aggregation techniques for wireless sensor networks:A survey” in 
IEEE Wireless Communications April 2007
REFERENCES continued.. 
• “Literature survey on wireless sensor networks” on July 
16,2003 
39
40

More Related Content

What's hot

WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
ArunChokkalingam
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
PeriyanayagiS
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
ArunChokkalingam
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Ganesh Khadsan
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
Pradeep Kumar TS
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access Protocol
Gaurav Chauhan
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
juno susi
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor network
Shiwangi Thakur
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
Md Waresul Islam
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
Mahbubur Rahman
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
Zaahir Salam
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
ArunChokkalingam
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 

What's hot (20)

Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Manet
ManetManet
Manet
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access Protocol
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Data aggregation in wireless sensor network
Data aggregation in wireless sensor networkData aggregation in wireless sensor network
Data aggregation in wireless sensor network
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
QoS in WSN thesis
QoS in WSN thesisQoS in WSN thesis
QoS in WSN thesis
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 

Viewers also liked

A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networkspraveen369
 
LEOSAR and LEOSAT
LEOSAR and LEOSAT LEOSAR and LEOSAT
LEOSAR and LEOSAT
sagun subedi
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
Bala Lavanya
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
IOSR Journals
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Sigma web solutions pvt. ltd.
 
Session 5.6 towards a semantic outlier detection framework in wireless sens...
Session 5.6   towards a semantic outlier detection framework in wireless sens...Session 5.6   towards a semantic outlier detection framework in wireless sens...
Session 5.6 towards a semantic outlier detection framework in wireless sens...
semanticsconference
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
studying telecommuciation engineering
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
Priya Kaushal
 
Linear books to open world adventure
Linear books to open world adventureLinear books to open world adventure
Linear books to open world adventure
semanticsconference
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
Karthik
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
ahmad abdelhafeez
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
Mshari Alabdulkarim
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor Networks
Souhaiel tekaya
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
Karthik
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
deawoo Kim
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
FAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKFAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKPavithraRShettigar
 

Viewers also liked (20)

A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
 
LEOSAR and LEOSAT
LEOSAR and LEOSAT LEOSAR and LEOSAT
LEOSAR and LEOSAT
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Lecture3 - Machine Learning
Lecture3 - Machine LearningLecture3 - Machine Learning
Lecture3 - Machine Learning
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
Session 5.6 towards a semantic outlier detection framework in wireless sens...
Session 5.6   towards a semantic outlier detection framework in wireless sens...Session 5.6   towards a semantic outlier detection framework in wireless sens...
Session 5.6 towards a semantic outlier detection framework in wireless sens...
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
Linear books to open world adventure
Linear books to open world adventureLinear books to open world adventure
Linear books to open world adventure
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
FAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORKFAULT DETECTION IN WIRELESS SENSOR NETWORK
FAULT DETECTION IN WIRELESS SENSOR NETWORK
 

Similar to Data aggregation in wireless sensor networks

Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
Kathirvel Ayyaswamy
 
Computational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsnComputational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsnTAIWAN
 
wsn
wsnwsn
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
IOSR Journals
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
IOSR Journals
 
Distributed compressive sampling for lifetime
Distributed compressive sampling for lifetimeDistributed compressive sampling for lifetime
Distributed compressive sampling for lifetimetopssy
 
Veltech university.pptx
Veltech university.pptxVeltech university.pptx
Veltech university.pptx
sundar602496
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
ijasuc
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
IJCI JOURNAL
 
Kanchan ppt
Kanchan pptKanchan ppt
Kanchan ppt
vimalmanit
 
Presentation on sensor network
Presentation on sensor networkPresentation on sensor network
Presentation on sensor network
sarathanjabam
 
Multi-hop Communication for the Next Generation (xG) Wireless Network
Multi-hop Communication for the Next Generation (xG) Wireless NetworkMulti-hop Communication for the Next Generation (xG) Wireless Network
Multi-hop Communication for the Next Generation (xG) Wireless Network
M. Shamim Kaiser
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
915086731
 
Sem
SemSem
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptx
IrawanAbiyantoro1
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
theijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
Clustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionClustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow Detection
APNIC
 
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...
theijes
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
ijsrd.com
 

Similar to Data aggregation in wireless sensor networks (20)

Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
 
Computational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsnComputational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsn
 
wsn
wsnwsn
wsn
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
Distributed compressive sampling for lifetime
Distributed compressive sampling for lifetimeDistributed compressive sampling for lifetime
Distributed compressive sampling for lifetime
 
Veltech university.pptx
Veltech university.pptxVeltech university.pptx
Veltech university.pptx
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
 
Kanchan ppt
Kanchan pptKanchan ppt
Kanchan ppt
 
Presentation on sensor network
Presentation on sensor networkPresentation on sensor network
Presentation on sensor network
 
Multi-hop Communication for the Next Generation (xG) Wireless Network
Multi-hop Communication for the Next Generation (xG) Wireless NetworkMulti-hop Communication for the Next Generation (xG) Wireless Network
Multi-hop Communication for the Next Generation (xG) Wireless Network
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 
Sem
SemSem
Sem
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptx
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
Clustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionClustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow Detection
 
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 

More from Jasleen Kaur (Chandigarh University)

Graphs data structures
Graphs data structuresGraphs data structures
Graphs data structures
Jasleen Kaur (Chandigarh University)
 
B+ trees and height balance tree
B+ trees and height balance treeB+ trees and height balance tree
B+ trees and height balance tree
Jasleen Kaur (Chandigarh University)
 
Basics of c++
Basics of c++Basics of c++
Static variables
Static variablesStatic variables
Operating system notes pdf
Operating system notes pdfOperating system notes pdf
Operating system notes pdf
Jasleen Kaur (Chandigarh University)
 
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
Jasleen Kaur (Chandigarh University)
 
03 function overloading
03 function overloading03 function overloading
03 function overloading
Jasleen Kaur (Chandigarh University)
 
Chapter 2.datatypes and operators
Chapter 2.datatypes and operatorsChapter 2.datatypes and operators
Chapter 2.datatypes and operators
Jasleen Kaur (Chandigarh University)
 
Chapter 1
Chapter 1Chapter 1
Remote desktop connection
Remote desktop connectionRemote desktop connection
Remote desktop connection
Jasleen Kaur (Chandigarh University)
 
Operators in C Programming
Operators in C ProgrammingOperators in C Programming
Operators in C Programming
Jasleen Kaur (Chandigarh University)
 
Pointers in C Programming
Pointers in C ProgrammingPointers in C Programming
Pointers in C Programming
Jasleen Kaur (Chandigarh University)
 
Calculating garbage value in case of overflow
Calculating garbage value in case of overflowCalculating garbage value in case of overflow
Calculating garbage value in case of overflow
Jasleen Kaur (Chandigarh University)
 
Final jasleen ppt
Final jasleen pptFinal jasleen ppt
License Plate recognition
License Plate recognitionLicense Plate recognition
License Plate recognition
Jasleen Kaur (Chandigarh University)
 
The solar system
The solar system The solar system
The solar system
The solar systemThe solar system
Afforestation environmental issue
Afforestation environmental issueAfforestation environmental issue
Afforestation environmental issue
Jasleen Kaur (Chandigarh University)
 

More from Jasleen Kaur (Chandigarh University) (19)

Graphs data structures
Graphs data structuresGraphs data structures
Graphs data structures
 
B+ trees and height balance tree
B+ trees and height balance treeB+ trees and height balance tree
B+ trees and height balance tree
 
Basics of c++
Basics of c++Basics of c++
Basics of c++
 
Static variables
Static variablesStatic variables
Static variables
 
Operating system notes pdf
Operating system notes pdfOperating system notes pdf
Operating system notes pdf
 
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
 
03 function overloading
03 function overloading03 function overloading
03 function overloading
 
Chapter 2.datatypes and operators
Chapter 2.datatypes and operatorsChapter 2.datatypes and operators
Chapter 2.datatypes and operators
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Remote desktop connection
Remote desktop connectionRemote desktop connection
Remote desktop connection
 
Operators in C Programming
Operators in C ProgrammingOperators in C Programming
Operators in C Programming
 
Pointers in C Programming
Pointers in C ProgrammingPointers in C Programming
Pointers in C Programming
 
Calculating garbage value in case of overflow
Calculating garbage value in case of overflowCalculating garbage value in case of overflow
Calculating garbage value in case of overflow
 
Final jasleen ppt
Final jasleen pptFinal jasleen ppt
Final jasleen ppt
 
License Plate recognition
License Plate recognitionLicense Plate recognition
License Plate recognition
 
The solar system
The solar system The solar system
The solar system
 
The solar system
The solar systemThe solar system
The solar system
 
Afforestation environmental issue
Afforestation environmental issueAfforestation environmental issue
Afforestation environmental issue
 
Network security
Network securityNetwork security
Network security
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Data aggregation in wireless sensor networks

  • 1. SYNOPSIS PRESENTATION ON PARAMETERS BASED DATA AGGREGATION FOR STATISTICAL INFORMATION EXTRACTION IN WIRELESS SENSOR NETWORKS SUBMITTED BY: JASLEEN KAUR 13MCS7007 M.E.(CN) HONS. BATCH:2013-2015 1
  • 2. CONTENTS • WIRELESS SENSOR NETWORK • OBJECTIVES • PROBLEM DEFINITION • DATA-AGGREGATION • METHODOLOGY USED • EXPERIMENTAL METHODOLOGY • CONCLUSION • FUTURE SCOPE • LITERATURE SURVEY • REFRENCES 2
  • 3. WIRELESS SENSOR NETWORKS • Consists of large number of nodes that are able to interact with environment by sensing and controlling the physical parameters. 3
  • 4. APPLICATIONS • Environmental/Habitat monitoring • Acoustic detection • Seismic Detection • Disaster relief • Military surveillance • Inventory tracking • Medical monitoring • Smart spaces • Process Monitoring • Gathering sensing information in inhospitable locations 4
  • 5. SENSOR NODE Sensor node Video sensor node 5
  • 6. OBJECTIVES • To capture the effects of aggregation over different scales. • To efficiently and accurately obtain the sensory data from a sensor network. • To reduce the energy consumption and thus increase the lifetime of a network. • Main focus is to extract the statistical information from sensory data(which can answer various queries) while keeping the communication cost low 6
  • 7. PROBLEM DEFINITION • In Wireless Sensor Networks, accurate data extraction and aggregation is difficult due to ▫ Significant variations in sensor readings ▫ Frequent link and node failure 7
  • 8. DATA-AGGREGATION • Aims to reduce power consumption inWSN. • Aims to combine and summarize the data packets of several nodes so that amount of data transmission is reduced. • Data aggregation reduces the number of transmissions thereby improving the bandwidth and energy utilization inWSN. 8
  • 9. METHODOLOGY USED SITUATION ANALYSIS PROBLEM DEFINITION DATA AGGREGATION ALGORITHM COMPARED ALGORITHMS 9
  • 10. METHODOLOGY USED • Literature survey of WSNs and In-network aggregation techniques for WSNs. • Data aggregation scheme ▫ Aggregation algorithm return probability distribution of sensory data. ▫ Link between a pair of sensor nodes is lossy. ▫ Packets can be corrupted or dropped. ▫ Routing algorithm and Protocol. ▫ Multiple predecessors and successors. ▫ Theoretical approximation and select parameters then we have, 10
  • 11. ▫ Sensor nodes only need to transmit packets that contain distribution parameters instead of individual values • Aggregation Process SINK REMOTE NODE Aggregated Node Intermediate Node 11
  • 12. 12
  • 13. 13
  • 14. AGGREGATION PROCESS continues • Packet sent by node v contain a 2-tuple (wv, Θ) where wv is the weight of aggregate in this packet sent by node v. Θ is the set of all parameters of specific Gaussian mixture model p is packet loss rate due to node/link failure, wireless interference. PREDv = { u | v ε SUCCu } is the set of immediate predecessor of v in routing graph. 14
  • 15. • For intermediate nodes, wv includes the sum of all weights from predecessor and its own. • At sink s, expression Σu ε PREDs wv + 1 represents total number of readings. • Can also calculate the COUNT query by this value at sink. • Provide accurate and robust approximation. • Estimating Distribution Parameters: ▫ Problem- Input information precisely defines two values, its own and value received from its predecessor. ▫ Precisely defined input distribution is v’ is the neighbor of v 15
  • 16. • αv‘ = wv’ / Σ wv’ + 1 • αo = 1 / Σ wv’ + 1 These are the normalised weights • Estimation-Maximization (EM) Algorithm to solve the problem for finding max likelihood estimates of parameters. • Gaussian Estimation 16
  • 17. • Space(message size) and Time complexity ▫ More parameters we use more accurate the result is. • Experimental Methodology Communication cost Histogram that results from our algo and q-digest 17
  • 18. Performance comparison of the Algorithms in the presence of link failures Error rates 18
  • 19. METHODOLOGY OVERVIEW 1. Situation Analysis 2. Problem Definition 3. Taking Assumptions 4. Creating Network Model 5. Aggregation Scheme 6. Theoretical assumption in aggregation process 7. Estimating distribution parameters using EM algorithm 8. GMM Estimation 9. Compared Algorithms 19
  • 20. CONCLUSION • Technique is scalable. • Robust against link failures. • The network communication cost is reduced. • Preserves the accuracy of estimation. • Avoid loss of valuable statistical information. • It is the first study on using the “Mixture Models”. • There are several directions in future. 20
  • 21. FUTURE SCOPE • To design a more efficient algorithm by using prediction to exploit the temporal correlation of sensory data. • To use geometry algorithms to facilitate information extraction algortithm. 21
  • 23. 23
  • 24. 24
  • 25. 25
  • 26. 26
  • 27. 27
  • 28. 28
  • 29. 29
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. 33
  • 34. LITERATURE SURVEY • Survey of data-aggregation techniques using soft computing ▫ Types of Aggregation Techniques Centralised Approach In-network Aggregation Size reduction Without size reduction Tree-based approach Cluster-based approach ▫ Data aggregation using soft computing method Fuzzy-based data aggregation Swarm-based data aggregation Neural-based data aggregation GA-based data aggregation 34
  • 35. LITERATURE SURVEY continued.. • Literature Survey on wireless sensor networks ▫ Differences between ad-hoc and sensor networks ▫ Design factors like fault tolerance, scalability, topology, hardware constraints, transmission media etc ▫ Physical Layer ▫ Data Link Layer SMACS and EAR CSMA-Based Medium Access Hybrid TDMA/FDMA CSMA-Based Medium Access ▫ Network Layer Flooding Gossiping SPIN LEACH 35
  • 36. LITERATURE SURVEY continued.. ▫ SAR ▫ Directed Diffusion • Routing Protocols ▫ Rumor routing algorithm ▫ Energy-efficient communication protocol for wireless micro sensors • MAC layer ▫ Must be energy efficient ▫ Allows fair bandwidth allocation to all nodes ▫ CSMA strategy • Energy concerns ▫ When node is in listening mode, energy expenditure is minimal ▫ Difficulty in defining when the network dies? 36
  • 37. LITERATURE SURVEY continued.. • Security ▫ Solution- Resurrecting Duckling security policy model ▫ Talking to strangers • Open research issues ▫ Development of a new transport protocol ▫ Development of a new routing protocol ▫ Survey on routing protocols for sensor networks ▫ Interaction with other networks as well as cooperation among sensor networks 37
  • 38. 38 REFERENCES • [1] Hongbo Jiang,Member,IEEE,Shudong Jin,Member,IEEE, and Chonggang Wang, Senior Member,IEEE,“Parameter-Based Data Aggregation for statistical Information Extraction in Wireless Sensor Networks” in IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 8,OCTOBER 2010. • [2]http://www.academia.edu/890321/Wireless_Sensor_Networks_Is sues_Challenges_and_Survey_of_Solutions • [3] http://en.wikipedia.org/wiki/Secure_Data_Aggregation_in_WSN • [4]Hevin Rajesh Dhasian, Paramasivan Balasubramanian “Survey of data aggregation techniques using soft computing in wireless sensor networks” in IET inf.Secur.,2013,Vol.7, Iss.4,pp.336-342 • [5]ELENA FASLO AND MICHELE ROSSI, DEI, UNIVERSITY OF PADOVA;JORG WIDMER,DOCOMO EURO-LABS; MICHELE ZORZI,DEI,UNIVERSITY OF PADOVA,“ In-network aggregation techniques for wireless sensor networks:A survey” in IEEE Wireless Communications April 2007
  • 39. REFERENCES continued.. • “Literature survey on wireless sensor networks” on July 16,2003 39
  • 40. 40