SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2096
AN INTRODUCTION TO WIRELESS SENSOR NETWORKS, ITS
CHALLENGES AND SECURITY
Neha Barthwal1, Shashank Barthwal2
1Dept. of Computer Science, GBPIET, Pauri, Uttarakhand, India
2Dept. of Computer Science, GEHU, Dehradun, Uttarakhand, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract -The popularity of WSN hasbeenenormouslyon
a peak just because of its sensing technology. WSNs are in
great demand now a days due to increasing growth in
wireless devices. WSN is composed of small size, battery
powered sensor nodes which collect, process, store and
transfer the sensed data from one sensor to another. This
efficiency makes sensor network to be used for many
applications like military application, health application,
environmental application, home application, commercial
application etc. and many more. Node mobility, stability,
throughput of network and its node, clustering, Energy
efficiency, lifetime of sensor node are challenging issues of
WSN and due to this WSN has gained worldwide attentionof
researchers. Basically the researchers intention is to form
sensor network performs with maximum stability and
minimum consumption of energy, so that they can work for
long time. Batteries used in WSN can neither be changed nor
recharged so it is necessary to improve the lifetime of the
network for better performanceof WSN. Forresearchersitis
a dare to design energy efficient routing protocol for WSN.
Key Words: Sensor Node, Cluster Head, Base Station, WSN,
Clustering
1. INTRODUCTION
A wide range of sensor nodes (SN) shapes a Wireless sensor
network. Sensor nodes are low price, battery operated,
multi-functional and deployed to form a sensor field. Each
node have sensing unit, a processing unit, communication
unit and power unit. Each and every node is able to perform
smart sensing, neighbornodediscovery,data gathering,data
processing, data storage and communication with other
nodes. The sensing unit senses the surrounding, the
processing unit calculates the confined permutations of the
sensed data, and the communication unit performs
interchange of processed data among adjoining sensor
nodes.
Figure 1.1- Building block of Sensor Node
Wireless Sensor Networks is group of sensors which are
associated by wireless media. Sensors are deployed in
network and communicate with each other for data
collection. Then they forward the collected data to the Base
Station. Clustering is a process of merging sensor nodes to
form clusters and selecting cluster heads for each clusters.
Sensor node gathers the data and send it to cluster head
which is then forwarded to base station (BS). Clustering
raises the stability of network and lowers the energy
consumption of sensor nodes.
Figure 1.2- Architecture of a typical WSN
Attributes like size of the cluster, distance of sensor nodes
from CH, distance of the BS from the cluster head influence
the energy consumption in sensor nodes. More the distance
of sensor nodes from the cluster head greater the energy
dissipation for the data transmission.
Clustering process has three phases. Cluster head selection
phase, cluster’s setup phase and steady phase. The given
Sensing Unit
Power Unit
Processing
Unit
Communicati
on Unit
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2097
figure illustrate the formation of distant clusters in WSNs.
These clusters have dissimilartypeofsensornodesand each
node pass on the sensed information to the desired CH
which is responsible for forwarding the sensed data to the
sink node. Homogeneous and Heterogeneous are two forms
of clustering in WSN.
Figure 1.3- WSNs Cluster Formation
Homogenous Clustering
In homogeneous clustering, all nodes have equivalent
energy. The life of Wireless sensors node depends on life
time of the battery. There are many energy saving
methodologies which are mainly introduced to lessen the
energy consumption and thereby resulting in a mechanism
for enhanced stability of the nodes. There are many
protocols for homogeneous WSNs like LEACH, PEGASIS and
HEED protocol. Thesealgorithmswill givepoorperformance
in the heterogeneous type of network.
Heterogeneous Clustering
In heterogeneous WSNs, sensor nodes have distinct initial
energies. SN have relatively excessive energy develop into
cluster head. Stable Election Protocol, Distributed Energy
Efficient Clustering, Threshold Sensitive Stable Election
Protocol, Enhance threshold sensitive stable election
protocol, Dual Cluster Head Routing Protocol and “DCHRP
with level four Heterogeneity are various protocols of
heterogeneous WSNs. Heterogeneous sensor networks are
considered significant in WSNs because they are related to
real life situation.
2. CHARACTERISTICS
WSN include various topologies like star, tree, mesh etc. for
communication. Characteristics of good WSN include
mobility, reliability, power efficiency, stability. WSNinclude
these feature proves beneficial forhumanwelfarethat’swhy
it has variety of application in different field like medical,
military, traffic control etc. Some other characteristics of
WSNs are-
 Simple to use
 Network is flexible
 Utilization of power is limited because of battery
 It handles node failure effectively
 It deals with mobility and heterogeneity of Sensor
Node.
 Can work with large scale distribution that is have
high scalability
 Has ability to maintain strict environmental
condition for execution
 Has unique cross layer design
3. WSN ORGANIZATION
Wireless sensor network shadows the OSI model. The
architecture of WSN composed of five layers (physical, data
link, transport, network and application) and three cross
layers (power management, mobility management and task
management). These layers collectivelyareusedtocomplete
the network and make the sensors work in an organized
way, in order to raise the efficiency of the network.
 Physical layer is accountable for frequency
selection, modulation and data encryption and
signal detection.
 Function of Data link layer is to provide a pathway
for multiplexing the data streams, data frame
detection, error control, MAC.
 For data supply network layer is used. It is
accountable for routing the information received
from transport layer i.e. finding the optimal path
for data packet to travel from sourcetodestination.
 The flow of data is needed whenthesensornetwork
make use of internet which is maintained by the
transport layer.
 Application layer is present at last and forms
software and hardware transparent to the end
user. It is responsible for presenting collected
information and traffic management
Figure 1.4- WSN organization
4. SECURITY IN WSN
Security plays a significant role in WSN. Sensitive data is
carried by sensor nodes which may be targetedbyattackers.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2098
Attacks are occurred in any system just because of lack of
security features
 Wireless communication is used in WSN,eavesdrop
is possible.
 Injecting malicious node in WSN is a cake walk for
the attacker.
 Vast number of nodes in WSN enforces security
complexity at all levels.
 Resource constraints of sensor nodes pose another
threat to security of the network in terms of
memory, energy, processing power etc. Hence
Symmetric cryptography or symmetric encryption
is used because asymmetric cryptography becomes
too expensive.
Conventional security techniques used earlier cannot be
directly or indirectly applied on WSN. Security becomes
extremely importantwhensensornetworksaredeployed,as
they are susceptible to various malicious attacks because of
its transmissionnature,resourcerestrictionanddeployment
in harsh environment. So existing security mechanisms are
not enough for WSN, and new ideas are needed.
Symmetric key techniques, asymmetric key techniques and
hash functions are crypto mechanisms used for achieving
security in wireless sensor networks, it is extremely
important to authenticate and encrypt messages sent
between sensor nodes. WSN areveryconstrainedintermsof
battery power, node lifetime, stability, throughput,
computing, and communication. WSN needs a light weight
cryptographic algorithm.
WSN’s main security aims are confidentiality, integrity,
authentication, availability, survivability, along with
efficiency, freshness and scalability.
5. ISSUES AND CHALLENGES IN DESIGNING WSN
 Resource limitation (Limited memory,computation
and power)
 Maintenance of WSN is difficult.
 Sensor node depend only on battery and the
batteries can neither be recharged nor replaced.
Hence the hardware design consideration is must.
 While deploying, the sensor nodes are scattered so
they can’t fit into any regular topology.
 Reliability of communication is another issue that
should be considered (Unreliable data transfer,
Conflicts and latency are some if the challenges of
WSN’s)
 Topology changes, Node failure, addition and
deletion of nodes is among other challenging issue
in WSNs.
 Transmission nature, hostile environment of WSN
and security are some of the challenging issue.
 Attaining synchronization between nodes is also
another issue.
6. APPLICATIONS OF WSN
Wireless Sensor Networks comprise of numerous types of
sensors such as seismic, thermal, low sampling rate
magnetic, infrared, visual, acoustic and radar. These
sensors are able to monitor a wide variety of ambient
conditions like humidity, temperature, lightning, vehicular
movement, pressure, soil makeup, noise levels and so on.
WSN application can be classified into following categories:
 Military applications (enemy tracking, security
detection, surveillance)
 Environmental applications ( air pollution detection,
landslide detection, forest fire detection, animal
tracking, water quality monitoring, natural disaster
prevention, flood detection, weather prediction,)
 Healthcare applications (implanted, wearable and
surroundingembeddedmedical devices,monitoringand
tracking of doctors and patients,
 Home applications (smart lighting, cooling and heating
devices)
 Industrial applications (data logging, wine production,
structural and machine health monitoring etc.)
 Transportation application (monitoring of traffic,
dynamic routing management
7. ADVANTAGES
 Flexible infrastructure
 Easily implemented
 Fruitful for society
 Can deal with numerous nodes at a time
 Made up of three distant topologies(mesh, tree, star)
 It can be deployed on vast scale
 Can be monitored and accessed with remote locations
 Support embedded systems
 Increasing the number of sensor nodes is easy.
 Execution is cheap
 Saves cost as it avoids plenty of wiring.
 Suitable for unreachable areas such as over the seas,
mountains
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2099
8. DISADVANTAGES
 WSN possess lower storage capacity (approx. few
hundred kilobytes)
 Comparatively less secure than wired network
 Hackers can easily hack sensor network and acquire all
data.
 Slow Communication and transmission speed
 SN are more prone to failure
 Easily distracted by its surrounding
 Slow processing power
 Works for short communication range
 Require minimal energy efficient protocol
 Have batteries with limited lifetime
 Need of extra equipment for setup like computer
9. CONCLUSIONS
Over the last few years hyper efficient design of WSN has
become a leading platform for research and development.
WSN started a revolution in technical field and attracts
researchers toward it. Its sensing technology enhance its
popularity worldwide. Researchers in WSN mainly focuses
on hike in lifetime and stability of sensor nodes. Major
research areas of WSN are distributed signal processing,
data fusion, energy efficient routing algorithms, and
security of WSN. WSN has highly influenced our life in all
aspects. It has wide range of applications. With the short
introduction of WSN, its organization, characteristics and
challenges have been discussed as well the application of
WSN have been highlighted along with the advantage and
disadvantages of WSN.
REFERENCES
[1] I.F. Akyildiz, S. Weilian, Y. Sankarasubramaniam,
E.Cayirci, “A survey on sensor networks”, IEEE
Communications Magazine, Vol. 40, Issue (8), pp.
102-114, 2002.
[2] Samira Kalantary, Sara Taghipour, “ A Survey on
architectures, protocols, applications and
management in wireless Sensor Networks”,Journal
of Advanced Computer Science & Technoloy, pp. 1-
11, 2014.
[3] KazemSohraby, Daniel Minoli,TaiebZnati,“Wireless
Sensor Networks”, Wiley Publications, Second
Edition.
[4] Gaurav Sharma, SumanBala, Anil K. Verma,
“Security Frameworks for Wireless Sensor
Networks-Review,” 2nd International Conference
on Communication, Computing & Security [ICCCS-
2012], No. 6, pp. 978 – 987, 2012.
[5] Muhammad Zahid Khan et al., “Limitations of
Simulation Tools for Large-Scale Wireless Sensor
Networks,” Workshops of International Conference
on Advanced Information Networking and
Applications, pp. 820-825, 2011.
[6] M. Ben Salah, A. Boulouz. "Energy Efficient
Clustering Based OnLEACH." IEEE,2016IEEE,2016
[7] H. Mohammad, M. AfsarandN.Tayarani,“Clustering
in sensor network: A literature survey”, Journal of
Network & Computer Appl., 2014.

More Related Content

What's hot

An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...
IJECEIAES
 
De3211001104
De3211001104De3211001104
De3211001104IJMER
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
IRJET Journal
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
Karthik
 
G0933443
G0933443G0933443
G0933443
IOSR Journals
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
IJRES Journal
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
IAEME Publication
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
IAEME Publication
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
ijassn
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal
 
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...
IJECEIAES
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
iosrjce
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
ijsrd.com
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2
Nitin k
 
Energy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor networkEnergy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor network
BADALKUMAR56
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
sophiabelthome
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI
 
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
ijwmn
 

What's hot (18)

An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...
 
De3211001104
De3211001104De3211001104
De3211001104
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
G0933443
G0933443G0933443
G0933443
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...Secured node detection technique based on artificial neural network for wirel...
Secured node detection technique based on artificial neural network for wirel...
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2
 
Energy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor networkEnergy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor network
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
 

Similar to IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security

CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
cscpconf
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
IRJET Journal
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET Journal
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET Journal
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
 
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformImplementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
Iasir Journals
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
IRJET Journal
 
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
inventionjournals
 
G017344246
G017344246G017344246
G017344246
IOSR Journals
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
Er_Loveleen
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
ijtsrd
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
INFOGAIN PUBLICATION
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
ijcsa
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET Journal
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
IOSR Journals
 
S04404116120
S04404116120S04404116120
S04404116120
IJERA Editor
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET Journal
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET Journal
 

Similar to IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security (20)

CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformImplementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
 
G017344246
G017344246G017344246
G017344246
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
S04404116120
S04404116120S04404116120
S04404116120
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 

Recently uploaded (20)

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 

IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2096 AN INTRODUCTION TO WIRELESS SENSOR NETWORKS, ITS CHALLENGES AND SECURITY Neha Barthwal1, Shashank Barthwal2 1Dept. of Computer Science, GBPIET, Pauri, Uttarakhand, India 2Dept. of Computer Science, GEHU, Dehradun, Uttarakhand, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract -The popularity of WSN hasbeenenormouslyon a peak just because of its sensing technology. WSNs are in great demand now a days due to increasing growth in wireless devices. WSN is composed of small size, battery powered sensor nodes which collect, process, store and transfer the sensed data from one sensor to another. This efficiency makes sensor network to be used for many applications like military application, health application, environmental application, home application, commercial application etc. and many more. Node mobility, stability, throughput of network and its node, clustering, Energy efficiency, lifetime of sensor node are challenging issues of WSN and due to this WSN has gained worldwide attentionof researchers. Basically the researchers intention is to form sensor network performs with maximum stability and minimum consumption of energy, so that they can work for long time. Batteries used in WSN can neither be changed nor recharged so it is necessary to improve the lifetime of the network for better performanceof WSN. Forresearchersitis a dare to design energy efficient routing protocol for WSN. Key Words: Sensor Node, Cluster Head, Base Station, WSN, Clustering 1. INTRODUCTION A wide range of sensor nodes (SN) shapes a Wireless sensor network. Sensor nodes are low price, battery operated, multi-functional and deployed to form a sensor field. Each node have sensing unit, a processing unit, communication unit and power unit. Each and every node is able to perform smart sensing, neighbornodediscovery,data gathering,data processing, data storage and communication with other nodes. The sensing unit senses the surrounding, the processing unit calculates the confined permutations of the sensed data, and the communication unit performs interchange of processed data among adjoining sensor nodes. Figure 1.1- Building block of Sensor Node Wireless Sensor Networks is group of sensors which are associated by wireless media. Sensors are deployed in network and communicate with each other for data collection. Then they forward the collected data to the Base Station. Clustering is a process of merging sensor nodes to form clusters and selecting cluster heads for each clusters. Sensor node gathers the data and send it to cluster head which is then forwarded to base station (BS). Clustering raises the stability of network and lowers the energy consumption of sensor nodes. Figure 1.2- Architecture of a typical WSN Attributes like size of the cluster, distance of sensor nodes from CH, distance of the BS from the cluster head influence the energy consumption in sensor nodes. More the distance of sensor nodes from the cluster head greater the energy dissipation for the data transmission. Clustering process has three phases. Cluster head selection phase, cluster’s setup phase and steady phase. The given Sensing Unit Power Unit Processing Unit Communicati on Unit
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2097 figure illustrate the formation of distant clusters in WSNs. These clusters have dissimilartypeofsensornodesand each node pass on the sensed information to the desired CH which is responsible for forwarding the sensed data to the sink node. Homogeneous and Heterogeneous are two forms of clustering in WSN. Figure 1.3- WSNs Cluster Formation Homogenous Clustering In homogeneous clustering, all nodes have equivalent energy. The life of Wireless sensors node depends on life time of the battery. There are many energy saving methodologies which are mainly introduced to lessen the energy consumption and thereby resulting in a mechanism for enhanced stability of the nodes. There are many protocols for homogeneous WSNs like LEACH, PEGASIS and HEED protocol. Thesealgorithmswill givepoorperformance in the heterogeneous type of network. Heterogeneous Clustering In heterogeneous WSNs, sensor nodes have distinct initial energies. SN have relatively excessive energy develop into cluster head. Stable Election Protocol, Distributed Energy Efficient Clustering, Threshold Sensitive Stable Election Protocol, Enhance threshold sensitive stable election protocol, Dual Cluster Head Routing Protocol and “DCHRP with level four Heterogeneity are various protocols of heterogeneous WSNs. Heterogeneous sensor networks are considered significant in WSNs because they are related to real life situation. 2. CHARACTERISTICS WSN include various topologies like star, tree, mesh etc. for communication. Characteristics of good WSN include mobility, reliability, power efficiency, stability. WSNinclude these feature proves beneficial forhumanwelfarethat’swhy it has variety of application in different field like medical, military, traffic control etc. Some other characteristics of WSNs are-  Simple to use  Network is flexible  Utilization of power is limited because of battery  It handles node failure effectively  It deals with mobility and heterogeneity of Sensor Node.  Can work with large scale distribution that is have high scalability  Has ability to maintain strict environmental condition for execution  Has unique cross layer design 3. WSN ORGANIZATION Wireless sensor network shadows the OSI model. The architecture of WSN composed of five layers (physical, data link, transport, network and application) and three cross layers (power management, mobility management and task management). These layers collectivelyareusedtocomplete the network and make the sensors work in an organized way, in order to raise the efficiency of the network.  Physical layer is accountable for frequency selection, modulation and data encryption and signal detection.  Function of Data link layer is to provide a pathway for multiplexing the data streams, data frame detection, error control, MAC.  For data supply network layer is used. It is accountable for routing the information received from transport layer i.e. finding the optimal path for data packet to travel from sourcetodestination.  The flow of data is needed whenthesensornetwork make use of internet which is maintained by the transport layer.  Application layer is present at last and forms software and hardware transparent to the end user. It is responsible for presenting collected information and traffic management Figure 1.4- WSN organization 4. SECURITY IN WSN Security plays a significant role in WSN. Sensitive data is carried by sensor nodes which may be targetedbyattackers.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2098 Attacks are occurred in any system just because of lack of security features  Wireless communication is used in WSN,eavesdrop is possible.  Injecting malicious node in WSN is a cake walk for the attacker.  Vast number of nodes in WSN enforces security complexity at all levels.  Resource constraints of sensor nodes pose another threat to security of the network in terms of memory, energy, processing power etc. Hence Symmetric cryptography or symmetric encryption is used because asymmetric cryptography becomes too expensive. Conventional security techniques used earlier cannot be directly or indirectly applied on WSN. Security becomes extremely importantwhensensornetworksaredeployed,as they are susceptible to various malicious attacks because of its transmissionnature,resourcerestrictionanddeployment in harsh environment. So existing security mechanisms are not enough for WSN, and new ideas are needed. Symmetric key techniques, asymmetric key techniques and hash functions are crypto mechanisms used for achieving security in wireless sensor networks, it is extremely important to authenticate and encrypt messages sent between sensor nodes. WSN areveryconstrainedintermsof battery power, node lifetime, stability, throughput, computing, and communication. WSN needs a light weight cryptographic algorithm. WSN’s main security aims are confidentiality, integrity, authentication, availability, survivability, along with efficiency, freshness and scalability. 5. ISSUES AND CHALLENGES IN DESIGNING WSN  Resource limitation (Limited memory,computation and power)  Maintenance of WSN is difficult.  Sensor node depend only on battery and the batteries can neither be recharged nor replaced. Hence the hardware design consideration is must.  While deploying, the sensor nodes are scattered so they can’t fit into any regular topology.  Reliability of communication is another issue that should be considered (Unreliable data transfer, Conflicts and latency are some if the challenges of WSN’s)  Topology changes, Node failure, addition and deletion of nodes is among other challenging issue in WSNs.  Transmission nature, hostile environment of WSN and security are some of the challenging issue.  Attaining synchronization between nodes is also another issue. 6. APPLICATIONS OF WSN Wireless Sensor Networks comprise of numerous types of sensors such as seismic, thermal, low sampling rate magnetic, infrared, visual, acoustic and radar. These sensors are able to monitor a wide variety of ambient conditions like humidity, temperature, lightning, vehicular movement, pressure, soil makeup, noise levels and so on. WSN application can be classified into following categories:  Military applications (enemy tracking, security detection, surveillance)  Environmental applications ( air pollution detection, landslide detection, forest fire detection, animal tracking, water quality monitoring, natural disaster prevention, flood detection, weather prediction,)  Healthcare applications (implanted, wearable and surroundingembeddedmedical devices,monitoringand tracking of doctors and patients,  Home applications (smart lighting, cooling and heating devices)  Industrial applications (data logging, wine production, structural and machine health monitoring etc.)  Transportation application (monitoring of traffic, dynamic routing management 7. ADVANTAGES  Flexible infrastructure  Easily implemented  Fruitful for society  Can deal with numerous nodes at a time  Made up of three distant topologies(mesh, tree, star)  It can be deployed on vast scale  Can be monitored and accessed with remote locations  Support embedded systems  Increasing the number of sensor nodes is easy.  Execution is cheap  Saves cost as it avoids plenty of wiring.  Suitable for unreachable areas such as over the seas, mountains
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2099 8. DISADVANTAGES  WSN possess lower storage capacity (approx. few hundred kilobytes)  Comparatively less secure than wired network  Hackers can easily hack sensor network and acquire all data.  Slow Communication and transmission speed  SN are more prone to failure  Easily distracted by its surrounding  Slow processing power  Works for short communication range  Require minimal energy efficient protocol  Have batteries with limited lifetime  Need of extra equipment for setup like computer 9. CONCLUSIONS Over the last few years hyper efficient design of WSN has become a leading platform for research and development. WSN started a revolution in technical field and attracts researchers toward it. Its sensing technology enhance its popularity worldwide. Researchers in WSN mainly focuses on hike in lifetime and stability of sensor nodes. Major research areas of WSN are distributed signal processing, data fusion, energy efficient routing algorithms, and security of WSN. WSN has highly influenced our life in all aspects. It has wide range of applications. With the short introduction of WSN, its organization, characteristics and challenges have been discussed as well the application of WSN have been highlighted along with the advantage and disadvantages of WSN. REFERENCES [1] I.F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, E.Cayirci, “A survey on sensor networks”, IEEE Communications Magazine, Vol. 40, Issue (8), pp. 102-114, 2002. [2] Samira Kalantary, Sara Taghipour, “ A Survey on architectures, protocols, applications and management in wireless Sensor Networks”,Journal of Advanced Computer Science & Technoloy, pp. 1- 11, 2014. [3] KazemSohraby, Daniel Minoli,TaiebZnati,“Wireless Sensor Networks”, Wiley Publications, Second Edition. [4] Gaurav Sharma, SumanBala, Anil K. Verma, “Security Frameworks for Wireless Sensor Networks-Review,” 2nd International Conference on Communication, Computing & Security [ICCCS- 2012], No. 6, pp. 978 – 987, 2012. [5] Muhammad Zahid Khan et al., “Limitations of Simulation Tools for Large-Scale Wireless Sensor Networks,” Workshops of International Conference on Advanced Information Networking and Applications, pp. 820-825, 2011. [6] M. Ben Salah, A. Boulouz. "Energy Efficient Clustering Based OnLEACH." IEEE,2016IEEE,2016 [7] H. Mohammad, M. AfsarandN.Tayarani,“Clustering in sensor network: A literature survey”, Journal of Network & Computer Appl., 2014.