SlideShare a Scribd company logo
http://www.iaeme.com/IJARET/index.asp 210 editor@iaeme.com
International Journal of Advanced Research in Engineering and Technology (IJARET)
Volume 10, Issue 2, March-April 2019, pp. 210-214. Article ID: IJARET_10_02_020
Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=02
ISSN Print: 0976-6480 and ISSN Online: 0976-6499
© IAEME Publication
METHODOLOGIES AND CHALLENGES OF
WSN FOR IOT
Dr Syeda Gauhar Fatima
Professor ECE dept, Deccan College of Engineering and Technology,
Darussalam, Hyderabad.
Syeda Kausar Fatima
Associate Professor, Shadan College of Engineering and Technology, Hyderabad.
Syed Mohd Ali
Research Scholar, ECE dept, JNTUH, Kukatpally, Hyderabad.
Naseer Ahmed Khan
Student, ECE Dept, Deccan College of Engineering and Technology, Darussalam, Hyderabad.
Syed Adil
Student, ECE Dept, Deccan College of Engineering and Technology, Darussalam, Hyderabad
ABTRACT
Wireless sensor networks (WSNs) are discovering a wide range of applications in
various fields, counting control networks, enhanced-living scenarios, health-care,
industrial, production monitoring and in many other sectors. Internet of Things (IoT)
confirms smart human being life, through communications between things, machines
together with peoples. Hence, Relocation of Internet from People towards an Internet
of Things (IoT) and addition of Wireless sensors in to Internet of Things enables sensors
nodes connect internet dynamically in order to cooperate and achieve their tasks.
However, when WSNs become a portion of the Internet, we must carefully examine and
scrutinize the issues involved with this integration. In this paper, we evaluate various
methods to combine WSNs into the IOT and discuss a set of challenges.
Keywords: WSN; IOT; Integration approaches; Issues; Challenges.
Cite this Article: Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Syed Mohd Ali,
Naseer Ahmed Khan and Syed Adil, Methodologies and Challenges of WSN for IOT,
International Journal of Advanced Research in Engineering and Technology, 10(2),
2019, pp. 210-214.
http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2
Methodologies and Challenges of WSN for IOT
http://www.iaeme.com/IJARET/index.asp 211 editor@iaeme.com
1. INTRODUCTION
The chief impression of IoT [1] is enduring presence for variety of objects such as radio-
frequency identification (RFID) tags, sensors, actuators, mobile phones, etc.-which, having
unique addressing schemes and are able to view each other and cooperate with their neighbors
to reach mutual goal line. Wireless sensor networks (WSNs) are ad hoc networks which contain
a big amount of small sensor nodes with limited resources and one or more base stations. If we
wish to read the data from anyplace in the world, we need to assimilate the WSNs into the
Internet as part of the IoT. A wireless sensor network (WSN) is a wireless network consisting
of spatially distributed autonomous devices using sensors to cooperatively monitor physical or
environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants,
at different locations.
Since dynamically joining of Sensor nodes in to the Internet, careful examination is required
while integrating WSN and IOT. Lot of issues are involved with this integration. These issues
and challenges are required to be handled for getting compensations and reimbursements of
such integration. This paper presents different methods of integration of WSNs and Internet,
issues and challenges. Summarization of this paper is as follows: we discoursed WSN and
Internet with a view that WSNs are part of the Internet of Things in Section I. WSN applications
are discussed in Section II taking into consideration of issues involved with this integration.
Different additional approaches are debated in Section III and critical challenges to be
addressed to realize the full potential in integration of WSN into the Internet are discussed in
Section IV. Finally in Section V, we summarize our discussion regarding integration
approaches, issues and challenges of WSN for IOT.
2. WSN APPLICATIONS
Figure 1 Internet of Things
A network of dissimilar electronic devices can be considered as Internet of Things (Fig.1)
wherein without direct intrusion of the people the interaction takes place between people and
sensing information. Here, sensing and processing of data for proper interaction will be
achieved by the Device which is acting as a smart node in the network. Using key technology
like low power wireless connectivity, Smart objects are connected to the centralized cloud and
internet.
Applications areas of the wide wireless sensor network can be segmented into different
groups viz. Monitoring of space, objects and communications between space and objects.
Further the same can be prolonged to the additional category of monitoring human beings.
Environmental monitoring is an example for application area of the wireless sensor
network. Environmental parameters like temperature, moisture or light sensor readings are
collected using WSNs for different environments including mountains, forests and glaciers.
Observing particular objects like Structural monitoring becomes the second category. It
detects the ruptures of the structure and mechanical adjustments of bridges or buildings by
Dr Syeda Gauhar Fatima, Syeda Kausar Fatima , Syed Mohd Ali , Naseer Ahmed Khan and Syed Adil
http://www.iaeme.com/IJARET/index.asp 212 editor@iaeme.com
sensing the parameters like acoustic emissions, responses to stimuli and modes of vibration,
etc.
Monitoring environmental threats like volcanic activities and floods can be considered as
an example of the combined activity of Monitoring interaction between space and objects.
Further to the projected classifications, monitoring human beings becomes the last category.
In this case, the sensors can gather information on medical conditions using different functional
parameters and also can be used in monitoring the mandatory data like in home care scenario,
etc.
High diversity of WSN applications has been demonstrated from the projected category of
applications like monitoring environments and subjects, etc. Integration of WSN into the
Internet through suitable approach by considering this scenario of diversity will be useful for
the Internet of Things.
Development of IoT substructure around WSN is under development by different
corporations [2]. Examples are ‘A Smarter Planet’ project by IBM for utilizing sensors for water
management systems and intelligent cities and CeNSE project for deployment of a worldwide
sensor network to create a “central nervous system for the Earth” by HP Labs.
3. INTEGRATION APPROACHES
Three main approaches are discussed here for Connecting WSNs to the Internet, which is
mainly considering the WSN integration degree into the Internet structure. In first approach
(Fig. 2) a single gateway is used to connect the independent WSN to the Internet. This approach
is accepted for connecting most of the WSNs to access the Internet, and also interaction between
networks.
Figure 2 Approach of Independent Network
From the cumulative integration degree point of view, the second approach (Fig.3) of hybrid
network formed which consists of two independent network structures but rare dual sensor
nodes can access of the Internet.
Figure 3 Approach of Hybrid Network
In Fig.4 , the last approach multiple sensor nodes are joining the Internet in one hop. It is
similar to the WLAN structure and forms 802.15.4 access point network.
Methodologies and Challenges of WSN for IOT
http://www.iaeme.com/IJARET/index.asp 213 editor@iaeme.com
Figure 4 Approach of Access point Network
From the first approach it is obvious that the failure of Gateway functioning leads to the
breakdown of connection between Internet and WSN. However due to the several gateways
exists in the other two approaches this type of network failure will not be clear. Hence
depending on the WSN application scenario, one of these two approached would be favored if
network structure is maintained by the required application. As per distance point of view, and
for the WSNs organized in Mesh topology the second approach is preferable. As per the WSN
application classifications discussed in the previous section, “monitoring space” and the
“monitoring interactions between objects and space” prefers this Hybrid network approach.
Since using the third and last approach Internet can be accessed in one hop, WSN
applications requiring low latency prefers this access point approach. Hence, as per the
proposed WSN applications for monitoring of objects and human beings this approach is
preferred.
It has experiential the static network configuration from the second and third integration
approaches. As it is known that gateway reprogramming is required for the new device to join
the network. Hence, this requirement cannot be achieved in the existing form from both the
approaches. To fulfill this requirement “IP to the Field” paradigm may be proposed. As per this
model, sensors nodes are provided with the intelligence apart from the sensing tasks. Protocol
translation and forwarding functionalities are only given to the Gateway. From this, dynamic
network configuration would be attained and reprogramming of gateway operations are no
longer be required.
4. CHALLENGES FOR WSNS IN AN INTERNET OF THINGS
In addition to their usual sensing functionality sensor nodes are assigned with the additional
tasks with this “IP to the Field” paradigm. Accordingly, new tasks or challenges are to be faced
by the sensor nodes with this additional responsibility. Out of these, three potential tasks are
discussed here: Security, quality of service (QoS) management, and network configuration.
4.1. Security
on the sensitivity of application WSNs has the capability to provide data confidentiality,
authentication, integrity and availability without having internet access. To introduce malicious
nodes in the existing network or jamming or capturing, the physical presence near the WSN is
required by the attacker. However, this opening of WSNs into the internet enables attackers to
perform their malicious activities [3] from everywhere. Hence, the issues developed by this
internet connection like malware and others should be definitely addressed by the WSNs. To
ensure efficient protection by the current WSNs they are provided with central and unique
powerful gateway. However, due to the scarce of computational resources, energy and memory
constraints it is difficult to reuse the existing security mechanism. In fact, common Mica2 motes
offer 7.3 MHz 8-bit microcontrollers with 128 Kbytes of reprogrammable flash memory, 4
Kbytes of RAM and 4 Kbytes of EEPROM. Similar to the other Internet services, sensor nodes
are yet to support the cryptography with key lengths like RSA-1024 for better confidentiality.
Dr Syeda Gauhar Fatima, Syeda Kausar Fatima , Syed Mohd Ali , Naseer Ahmed Khan and Syed Adil
http://www.iaeme.com/IJARET/index.asp 214 editor@iaeme.com
Further, to avoid different attacks arising from Internet, it is required to develop better security
mechanisms[4] taking into account of the existing resource constraints.
4.2. Quality of Service:
Considering the Intelligence provided to the sensor nodes, they are also required to contribute
to quality of service by utilization of all mixed devices of the Internet of things. These mixed
devices make the possibility of the workload distribution between the nodes with the available
resources. Due to dynamic network configurations and link characteristics, it is not adequate to
operate the existing approaches of QoS available on the Internet [5]. Hence, better approaches
are required to be developed to avoid latency and loss of data, etc.
4.3. Configuration
Additional to the security and QoS management, sensor nodes should be able to handle diverse
tasks like handling their network configuration for new node joining the in the network [6] and
ensuring self-healing competences through detection and elimination of faulty nodes and
address administration to ensure scalable network constructions, etc. However, in the Internet
it is not a common feature of joining of new node through self-configuration. Hence, for smooth
operation of this network configuration, required applications are to be installed by the user and
necessary precautions to be taken to avoid the system crashes.
5. CONCLUSION
Here, we considered selected expanded application scenarios like monitoring environments and
subjects to examine the integration of WSNs into the Internet.
Considering their main features, three different integration approaches are examined [7].
However, it is practical that these approaches are not supporting the requirement of dynamic
network configuration of Internet of Things for new node joining the network in the existing
form. Hence, as a solution to this, we considered IP to the Field pattern through providing
intellect to the sensor nodes. Further, three different challenges to be addressed are highlighted
from this pattern option: Security, QoS, and configuration management. By analyzing these
challenges, it is observed that the existing solutions in the Internet are not suitable for these
sensor networks having dynamic network configurations [8]. Hence, better mechanisms are to
be developed and adapted considering the constraints of WSNs.
REFERENCES
[1] J. A. Stankovic, “Research directions for the Internet of Things,” IEEE Internet Things J.,
vol. 1, no. 1, pp. 3–9, Feb. 2014.
[2] IBM: A Smarter Planet, http://www.ibm.com/smarterplanet/, Accessed on October 2010.
[3] J. Claessens. Trust, Security, Privacy, and Identity perspective. Panel on Future Internet
Service Offer, 2008
[4] C.P. Mayer. Security and Privacy Challenges in the Internet of Things. KiVS Workshop
on Global Sensor Network, 2009.
[5] R. Roman, J. Lopez. Integrating Wireless Sensor Networks and the Internet: a Security
Analysis. Internet Research, Vol. 19, no. 2, pp. 246-259, 2009.
[6] M. A. Ezechina, K. K. Okwara, C. A. U. Ugboaja. The Internet of Things (Iot): A Scalable
Approach to Connecting Everything. The International Journal of Engineering and Science
4(1) (2015) 09-12.
[7] Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision, architectural elements, and
future directions." Future Generation Computer Systems 29.7 (2013): 1645-1660.
[8] A. Menon1, et al. " Implementation of internet of things in bus transport system of
singapore"Asian Journal of Engineering Research(2013).

More Related Content

What's hot

IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
IRJET Journal
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
IAEME Publication
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
IAEME Publication
 
Implementation of embedded real time monitoring temperature and humidity system
Implementation of embedded real time monitoring temperature and humidity systemImplementation of embedded real time monitoring temperature and humidity system
Implementation of embedded real time monitoring temperature and humidity system
Journal Papers
 
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
IAEME Publication
 
K017547981
K017547981K017547981
K017547981
IOSR Journals
 
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
IJET - International Journal of Engineering and Techniques
 
A1104010105
A1104010105A1104010105
A1104010105
IOSR Journals
 
High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0
Journal Papers
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
AM Publications
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Journal Papers
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
IJET - International Journal of Engineering and Techniques
 
574 501-507
574 501-507574 501-507
574 501-507
idescitation
 
EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...
EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...
EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...
IJNSA Journal
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET Journal
 
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Secure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmSecure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing Paradigm
IJERA Editor
 
IRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival SystemIRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival System
IRJET Journal
 
IRJET-E-Waste Management using Robotics
IRJET-E-Waste Management using RoboticsIRJET-E-Waste Management using Robotics
IRJET-E-Waste Management using Robotics
IRJET Journal
 

What's hot (20)

IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
Implementation of embedded real time monitoring temperature and humidity system
Implementation of embedded real time monitoring temperature and humidity systemImplementation of embedded real time monitoring temperature and humidity system
Implementation of embedded real time monitoring temperature and humidity system
 
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
 
K017547981
K017547981K017547981
K017547981
 
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
A1104010105
A1104010105A1104010105
A1104010105
 
High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...Implementation of vehicle ventilation system using node mcu esp8266 for remot...
Implementation of vehicle ventilation system using node mcu esp8266 for remot...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
574 501-507
574 501-507574 501-507
574 501-507
 
EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...
EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...
EFFECT OF INTER PACKET DELAY IN PERFORMANCE ANALYSIS OF COEXISTENCE HETEROGEN...
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
 
Secure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmSecure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing Paradigm
 
IRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival SystemIRJET - SMS based Data Retreival System
IRJET - SMS based Data Retreival System
 
IRJET-E-Waste Management using Robotics
IRJET-E-Waste Management using RoboticsIRJET-E-Waste Management using Robotics
IRJET-E-Waste Management using Robotics
 

Similar to METHODOLOGIES AND CHALLENGES OF WSN FOR IOT

Research, challenges and opportunities in software define radio technologies
Research, challenges and opportunities in software define radio  technologiesResearch, challenges and opportunities in software define radio  technologies
Research, challenges and opportunities in software define radio technologies
International Journal of Reconfigurable and Embedded Systems
 
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
IJCNCJournal
 
Integration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor networkIntegration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor network
IJECEIAES
 
Software defined fog platform
Software defined fog platform Software defined fog platform
Software defined fog platform
IJECEIAES
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
IJECEIAES
 
IoTwlcHITnewSlideshare.pptx
IoTwlcHITnewSlideshare.pptxIoTwlcHITnewSlideshare.pptx
OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING
OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING
OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING
AlAtfat
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
IJCNCJournal
 
Iot Report
Iot ReportIot Report
Iot Report
Rajnish Raj
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET Journal
 
11. 23762.pdf
11. 23762.pdf11. 23762.pdf
11. 23762.pdf
TELKOMNIKA JOURNAL
 
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU TechniqueIRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET Journal
 
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET Journal
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
kanaka vardhini
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
MaaheenKashish
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
raja118355
 
IoT & Applications Digital Notes (1).pdf
IoT & Applications Digital Notes (1).pdfIoT & Applications Digital Notes (1).pdf
IoT & Applications Digital Notes (1).pdf
ssusere169ea1
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
IJERA Editor
 
Design and implement WSN/IOT smart parking management system using microcontr...
Design and implement WSN/IOT smart parking management system using microcontr...Design and implement WSN/IOT smart parking management system using microcontr...
Design and implement WSN/IOT smart parking management system using microcontr...
IJECEIAES
 

Similar to METHODOLOGIES AND CHALLENGES OF WSN FOR IOT (20)

Research, challenges and opportunities in software define radio technologies
Research, challenges and opportunities in software define radio  technologiesResearch, challenges and opportunities in software define radio  technologies
Research, challenges and opportunities in software define radio technologies
 
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
 
Integration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor networkIntegration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor network
 
Software defined fog platform
Software defined fog platform Software defined fog platform
Software defined fog platform
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
 
IoTwlcHITnewSlideshare.pptx
IoTwlcHITnewSlideshare.pptxIoTwlcHITnewSlideshare.pptx
IoTwlcHITnewSlideshare.pptx
 
OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING
OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING
OPPORTUNISTIC MANET AND ITS ROLE IN NEXTGENERATION ANDROID IOT NETWORKING
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
Iot Report
Iot ReportIot Report
Iot Report
 
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
 
11. 23762.pdf
11. 23762.pdf11. 23762.pdf
11. 23762.pdf
 
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU TechniqueIRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
 
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
IRJET- Integrating Wireless Sensor Networks with Cloud Computing and Emerging...
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
 
IoT & Applications Digital Notes (1).pdf
IoT & Applications Digital Notes (1).pdfIoT & Applications Digital Notes (1).pdf
IoT & Applications Digital Notes (1).pdf
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
 
Design and implement WSN/IOT smart parking management system using microcontr...
Design and implement WSN/IOT smart parking management system using microcontr...Design and implement WSN/IOT smart parking management system using microcontr...
Design and implement WSN/IOT smart parking management system using microcontr...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
shivani5543
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 

Recently uploaded (20)

Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 

METHODOLOGIES AND CHALLENGES OF WSN FOR IOT

  • 1. http://www.iaeme.com/IJARET/index.asp 210 editor@iaeme.com International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 10, Issue 2, March-April 2019, pp. 210-214. Article ID: IJARET_10_02_020 Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=02 ISSN Print: 0976-6480 and ISSN Online: 0976-6499 © IAEME Publication METHODOLOGIES AND CHALLENGES OF WSN FOR IOT Dr Syeda Gauhar Fatima Professor ECE dept, Deccan College of Engineering and Technology, Darussalam, Hyderabad. Syeda Kausar Fatima Associate Professor, Shadan College of Engineering and Technology, Hyderabad. Syed Mohd Ali Research Scholar, ECE dept, JNTUH, Kukatpally, Hyderabad. Naseer Ahmed Khan Student, ECE Dept, Deccan College of Engineering and Technology, Darussalam, Hyderabad. Syed Adil Student, ECE Dept, Deccan College of Engineering and Technology, Darussalam, Hyderabad ABTRACT Wireless sensor networks (WSNs) are discovering a wide range of applications in various fields, counting control networks, enhanced-living scenarios, health-care, industrial, production monitoring and in many other sectors. Internet of Things (IoT) confirms smart human being life, through communications between things, machines together with peoples. Hence, Relocation of Internet from People towards an Internet of Things (IoT) and addition of Wireless sensors in to Internet of Things enables sensors nodes connect internet dynamically in order to cooperate and achieve their tasks. However, when WSNs become a portion of the Internet, we must carefully examine and scrutinize the issues involved with this integration. In this paper, we evaluate various methods to combine WSNs into the IOT and discuss a set of challenges. Keywords: WSN; IOT; Integration approaches; Issues; Challenges. Cite this Article: Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Syed Mohd Ali, Naseer Ahmed Khan and Syed Adil, Methodologies and Challenges of WSN for IOT, International Journal of Advanced Research in Engineering and Technology, 10(2), 2019, pp. 210-214. http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2
  • 2. Methodologies and Challenges of WSN for IOT http://www.iaeme.com/IJARET/index.asp 211 editor@iaeme.com 1. INTRODUCTION The chief impression of IoT [1] is enduring presence for variety of objects such as radio- frequency identification (RFID) tags, sensors, actuators, mobile phones, etc.-which, having unique addressing schemes and are able to view each other and cooperate with their neighbors to reach mutual goal line. Wireless sensor networks (WSNs) are ad hoc networks which contain a big amount of small sensor nodes with limited resources and one or more base stations. If we wish to read the data from anyplace in the world, we need to assimilate the WSNs into the Internet as part of the IoT. A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. Since dynamically joining of Sensor nodes in to the Internet, careful examination is required while integrating WSN and IOT. Lot of issues are involved with this integration. These issues and challenges are required to be handled for getting compensations and reimbursements of such integration. This paper presents different methods of integration of WSNs and Internet, issues and challenges. Summarization of this paper is as follows: we discoursed WSN and Internet with a view that WSNs are part of the Internet of Things in Section I. WSN applications are discussed in Section II taking into consideration of issues involved with this integration. Different additional approaches are debated in Section III and critical challenges to be addressed to realize the full potential in integration of WSN into the Internet are discussed in Section IV. Finally in Section V, we summarize our discussion regarding integration approaches, issues and challenges of WSN for IOT. 2. WSN APPLICATIONS Figure 1 Internet of Things A network of dissimilar electronic devices can be considered as Internet of Things (Fig.1) wherein without direct intrusion of the people the interaction takes place between people and sensing information. Here, sensing and processing of data for proper interaction will be achieved by the Device which is acting as a smart node in the network. Using key technology like low power wireless connectivity, Smart objects are connected to the centralized cloud and internet. Applications areas of the wide wireless sensor network can be segmented into different groups viz. Monitoring of space, objects and communications between space and objects. Further the same can be prolonged to the additional category of monitoring human beings. Environmental monitoring is an example for application area of the wireless sensor network. Environmental parameters like temperature, moisture or light sensor readings are collected using WSNs for different environments including mountains, forests and glaciers. Observing particular objects like Structural monitoring becomes the second category. It detects the ruptures of the structure and mechanical adjustments of bridges or buildings by
  • 3. Dr Syeda Gauhar Fatima, Syeda Kausar Fatima , Syed Mohd Ali , Naseer Ahmed Khan and Syed Adil http://www.iaeme.com/IJARET/index.asp 212 editor@iaeme.com sensing the parameters like acoustic emissions, responses to stimuli and modes of vibration, etc. Monitoring environmental threats like volcanic activities and floods can be considered as an example of the combined activity of Monitoring interaction between space and objects. Further to the projected classifications, monitoring human beings becomes the last category. In this case, the sensors can gather information on medical conditions using different functional parameters and also can be used in monitoring the mandatory data like in home care scenario, etc. High diversity of WSN applications has been demonstrated from the projected category of applications like monitoring environments and subjects, etc. Integration of WSN into the Internet through suitable approach by considering this scenario of diversity will be useful for the Internet of Things. Development of IoT substructure around WSN is under development by different corporations [2]. Examples are ‘A Smarter Planet’ project by IBM for utilizing sensors for water management systems and intelligent cities and CeNSE project for deployment of a worldwide sensor network to create a “central nervous system for the Earth” by HP Labs. 3. INTEGRATION APPROACHES Three main approaches are discussed here for Connecting WSNs to the Internet, which is mainly considering the WSN integration degree into the Internet structure. In first approach (Fig. 2) a single gateway is used to connect the independent WSN to the Internet. This approach is accepted for connecting most of the WSNs to access the Internet, and also interaction between networks. Figure 2 Approach of Independent Network From the cumulative integration degree point of view, the second approach (Fig.3) of hybrid network formed which consists of two independent network structures but rare dual sensor nodes can access of the Internet. Figure 3 Approach of Hybrid Network In Fig.4 , the last approach multiple sensor nodes are joining the Internet in one hop. It is similar to the WLAN structure and forms 802.15.4 access point network.
  • 4. Methodologies and Challenges of WSN for IOT http://www.iaeme.com/IJARET/index.asp 213 editor@iaeme.com Figure 4 Approach of Access point Network From the first approach it is obvious that the failure of Gateway functioning leads to the breakdown of connection between Internet and WSN. However due to the several gateways exists in the other two approaches this type of network failure will not be clear. Hence depending on the WSN application scenario, one of these two approached would be favored if network structure is maintained by the required application. As per distance point of view, and for the WSNs organized in Mesh topology the second approach is preferable. As per the WSN application classifications discussed in the previous section, “monitoring space” and the “monitoring interactions between objects and space” prefers this Hybrid network approach. Since using the third and last approach Internet can be accessed in one hop, WSN applications requiring low latency prefers this access point approach. Hence, as per the proposed WSN applications for monitoring of objects and human beings this approach is preferred. It has experiential the static network configuration from the second and third integration approaches. As it is known that gateway reprogramming is required for the new device to join the network. Hence, this requirement cannot be achieved in the existing form from both the approaches. To fulfill this requirement “IP to the Field” paradigm may be proposed. As per this model, sensors nodes are provided with the intelligence apart from the sensing tasks. Protocol translation and forwarding functionalities are only given to the Gateway. From this, dynamic network configuration would be attained and reprogramming of gateway operations are no longer be required. 4. CHALLENGES FOR WSNS IN AN INTERNET OF THINGS In addition to their usual sensing functionality sensor nodes are assigned with the additional tasks with this “IP to the Field” paradigm. Accordingly, new tasks or challenges are to be faced by the sensor nodes with this additional responsibility. Out of these, three potential tasks are discussed here: Security, quality of service (QoS) management, and network configuration. 4.1. Security on the sensitivity of application WSNs has the capability to provide data confidentiality, authentication, integrity and availability without having internet access. To introduce malicious nodes in the existing network or jamming or capturing, the physical presence near the WSN is required by the attacker. However, this opening of WSNs into the internet enables attackers to perform their malicious activities [3] from everywhere. Hence, the issues developed by this internet connection like malware and others should be definitely addressed by the WSNs. To ensure efficient protection by the current WSNs they are provided with central and unique powerful gateway. However, due to the scarce of computational resources, energy and memory constraints it is difficult to reuse the existing security mechanism. In fact, common Mica2 motes offer 7.3 MHz 8-bit microcontrollers with 128 Kbytes of reprogrammable flash memory, 4 Kbytes of RAM and 4 Kbytes of EEPROM. Similar to the other Internet services, sensor nodes are yet to support the cryptography with key lengths like RSA-1024 for better confidentiality.
  • 5. Dr Syeda Gauhar Fatima, Syeda Kausar Fatima , Syed Mohd Ali , Naseer Ahmed Khan and Syed Adil http://www.iaeme.com/IJARET/index.asp 214 editor@iaeme.com Further, to avoid different attacks arising from Internet, it is required to develop better security mechanisms[4] taking into account of the existing resource constraints. 4.2. Quality of Service: Considering the Intelligence provided to the sensor nodes, they are also required to contribute to quality of service by utilization of all mixed devices of the Internet of things. These mixed devices make the possibility of the workload distribution between the nodes with the available resources. Due to dynamic network configurations and link characteristics, it is not adequate to operate the existing approaches of QoS available on the Internet [5]. Hence, better approaches are required to be developed to avoid latency and loss of data, etc. 4.3. Configuration Additional to the security and QoS management, sensor nodes should be able to handle diverse tasks like handling their network configuration for new node joining the in the network [6] and ensuring self-healing competences through detection and elimination of faulty nodes and address administration to ensure scalable network constructions, etc. However, in the Internet it is not a common feature of joining of new node through self-configuration. Hence, for smooth operation of this network configuration, required applications are to be installed by the user and necessary precautions to be taken to avoid the system crashes. 5. CONCLUSION Here, we considered selected expanded application scenarios like monitoring environments and subjects to examine the integration of WSNs into the Internet. Considering their main features, three different integration approaches are examined [7]. However, it is practical that these approaches are not supporting the requirement of dynamic network configuration of Internet of Things for new node joining the network in the existing form. Hence, as a solution to this, we considered IP to the Field pattern through providing intellect to the sensor nodes. Further, three different challenges to be addressed are highlighted from this pattern option: Security, QoS, and configuration management. By analyzing these challenges, it is observed that the existing solutions in the Internet are not suitable for these sensor networks having dynamic network configurations [8]. Hence, better mechanisms are to be developed and adapted considering the constraints of WSNs. REFERENCES [1] J. A. Stankovic, “Research directions for the Internet of Things,” IEEE Internet Things J., vol. 1, no. 1, pp. 3–9, Feb. 2014. [2] IBM: A Smarter Planet, http://www.ibm.com/smarterplanet/, Accessed on October 2010. [3] J. Claessens. Trust, Security, Privacy, and Identity perspective. Panel on Future Internet Service Offer, 2008 [4] C.P. Mayer. Security and Privacy Challenges in the Internet of Things. KiVS Workshop on Global Sensor Network, 2009. [5] R. Roman, J. Lopez. Integrating Wireless Sensor Networks and the Internet: a Security Analysis. Internet Research, Vol. 19, no. 2, pp. 246-259, 2009. [6] M. A. Ezechina, K. K. Okwara, C. A. U. Ugboaja. The Internet of Things (Iot): A Scalable Approach to Connecting Everything. The International Journal of Engineering and Science 4(1) (2015) 09-12. [7] Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision, architectural elements, and future directions." Future Generation Computer Systems 29.7 (2013): 1645-1660. [8] A. Menon1, et al. " Implementation of internet of things in bus transport system of singapore"Asian Journal of Engineering Research(2013).