SlideShare a Scribd company logo
Presented by :
Roop Singh Meena
M.E.(Modular) CSE
,Spell-2
Roll no-191408
Wednesday, January 1, 20201
Seminar on
“Wireless Sensor Network”
OUTLINE
Wednesday, January 1, 20202
 Introduction
 Architecture
 Characteristics of WSN
 Types of WSN
 Protocol stack
 Types of topologies
 Applications
 Challenges
 Security issue
 References
Introduction of Wireless Sensor Network
Wednesday, January 1, 20203
 A Sensor network is group of small generally battery-
powered devices and wireless infrastructure that monitor
and record conditions in any number of environments.
 A Wireless Sensor Network(WSN) is a wireless network
that is designed using spatially distributed self –
governing devices that uses sensors for monitoring
physical or environmental conditions.
 Parameters monitor using Wireless Sensor Network are
temperature, pressure , humidity , direction of wind and
speed , illumination , intensity of vibration , intensity of
sound , pollutant level and vital body functions
Architecture of Wireless Sensor
Network
Wednesday, January 1, 20204
 Gateway
 Sensors
 Sensor Node
Architecture of Wireless Sensor Network
Wednesday, January 1, 20205
Reference[2]
Architecture Of Sensor Node
Wednesday, January 1, 20206
Main Components
 Sensing unit
 Power unit
 Communication Unit
 Processing Unit
Application Dependent Components
 Location Finding System
 Mobilizer
 Power Generator
Architecture Of sensor Node
Wednesday, January 1, 20207 Reference[2]
Wireless Sensor Network Characteristics
Wednesday, January 1, 20208
 Power Efficiency
 Fault Tolerance
 Mobility of Nodes
 Heterogeneity of Nodes
 Scalability
 Responsiveness
 Communication failures
Wireless Ad Hoc network and Sensor Network
Wednesday, January 1, 20209
Critria Wireless sensor
network
Wireless ad hoc
network
Sensing of events Use of sensors No sensing Ability
Size Very small Large
Power capacity Limited Larger
Cost Very Low Comparatively High
Density and
Redundancy
High Low
Node failure Unattended Attended Due to
battery Replacement
Memory and
Processing Power
Limited More
Data Movement Many node to
Gateway
One node to many
node
Transmission Range Small(3-30 metre) Large(10-50 metre)
Types of Wireless Sensor Network
Wednesday, January 1, 202010
Terrestrial WSN :
TWSN typically consist of hundreds to thousands of
inexpensive wireless sensor nodes deployed in a given
area, either in a pre-planned or in an ad-hoc manner
Underground WSN : UWSN consists of number of
sensor nodes buried underground or in a cave or mine
that are used to monitor underground conditions
Types of Wireless Sensor Network..
Wednesday, January 1, 202011
Underwater WSN : These consist of a several
sensor nodes and vehicles that are deployed
underwater
Multi-Media WSN : These have been proposed to
enable monitoring and tracking of events in the form
of
multimedia. Multi-media WSNs consist of a several
low cost sensor nodes equipped with cameras and
microphones. These sensor nodes usually
interconnect with each other over a wireless
connection for data
retrieval, process, correlation, and compression
Types of Wireless Sensor Network..
Wednesday, January 1, 202012
 Mobile WSN :MWSN consist of a no. of sensor
nodes that can move on their own and also interact
with the
physical environment. Mobile nodes have the ability to
sense, compute, and communicate like static nodes.
Mobile nodes also have the ability to reposition and
organize itself in the network
Protocol Stack for WSN
Wednesday, January 1, 202013
 Five layer of OSI
 Application Layer
 Transport layer
 Network layer
 Data Link layer
 Physical layer
 Cross Layer Plane
 Power Management Plane
 Mobility Management Plane
 Task management Plane
Protocol Stack for WSN
Wednesday, January 1, 202014
Types of topologies in Wireless Sensor
Network
Wednesday, January 1, 202015
 Star topology
 Mesh topology
 Tree topology
Wednesday, January 1, 202016 Reference[4]
Application Of Wireless Sensor Network
Wednesday, January 1, 202017
 Military Application
Battlefield Surveillance
Attach detection
Guiding intelligent missile
 Environment Application
Forest Fire Detection
Flood Detection
Air Pollution
Water Quality
Application Of Wireless Sensor Network
Wednesday, January 1, 202018
 Medical Application
Physiological Data Monitoring
Identifying allergies
Preventing Wrong Diagnosis
Monitoring patient Movement
 Industrial Application
Controlling industrial Plants
Dealing with data center issues
Application Of Wireless Sensor Network
Wednesday, January 1, 202019
 Home Application
Smart Home
Remote management
 Agricultural Application
Monitoring water tank level
Water pump control
Irrigation Automation
Wednesday, January 1, 202020
Reference[5]
Application of Wireless Sensor
Network
Wednesday, January 1, 202021
Reference[5]
Application of Wireless Sensor
Network
Challenges in WSN
Wednesday, January 1, 202022
 Real Time data processing
 Power management
 Network scale and time varying characteristics of
WSN
 Management at Distance
Wireless Sensor Network Security Issue
Wednesday, January 1, 202023
 In Wireless sensor network attack can be two types:
 Passive attack: These attacks are mainly against
data confidentiality. An attacker monitors unencrypted
traffic and looks for sensitive information that can be
used in other types of attacks. Passive attacks include
traffic analysis, monitoring communications,
decrypting weakly encrypted traffic, and capturing
authentication information.
 Active attack : active attacks are DoS, modification
of data, black hole, replay, sinkhole, spoofing,
flooding, jamming, overwhelm, wormhole, fabrication,
Hello flood, node subversion, lack of cooperation,
modification, node subversion, man-in-middle attack,
selective forwarding and false node.
References
Wednesday, January 1, 202024
1. Indu, S. D. (2014). Wireless sensor networks: Issues &
challenges. International Journal of Computer Science and Mobile
Computing, 3(6), 681-685.
2. Online tutorial [https://youtu.be/7h5Wwk_mheg][Accessed on
:26/12/2019]
3. Bavarva, Arjav & Patel, Nidhi & Kathiriya, Hiren. (2013). WIRELESS
SENSOR NETWORK USING ZIGBEE. International Journal of Research
in Engineering and Technology. 2. 1038-1042.
10.15623/ijret.2013.0206021.
4. Zafeiropoulos, Anastasios & Spanos, Dimitrios-Emmanuel & Arkoulis,
Stamatios & Konstantinou, Nikolaos & Mitrou, Nikolas. (2011). Data
Management in Sensor Networks Using Semantic Web Technologies.
5.https://www.researchgate.net/publication/256936126_Analysis_and_Desig
n_of_IEEE_80215_4_Networked_Control_Systems
Wednesday, January 1, 202025

More Related Content

What's hot

Wireless border security system
Wireless border security systemWireless border security system
Wireless border security system
Bllu
 
Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1
Sayeed Shawon
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
Saurabh Giratkar
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET-  	  Identification of Vampire Assault in Wireless Sensor NetworksIRJET-  	  Identification of Vampire Assault in Wireless Sensor Networks
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET Journal
 
Wireless sensor network applications environment monitoring
Wireless sensor network applications environment monitoringWireless sensor network applications environment monitoring
Wireless sensor network applications environment monitoring
Cliff Cooper, MS, CIH
 
Environmental wireless sensors networks
Environmental wireless sensors networksEnvironmental wireless sensors networks
Environmental wireless sensors networks
Achref Ben helel
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
Nishant Bhardwaj
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
Pradipta Ghosh
 
Jsan 07-00011-v2 (1)
Jsan 07-00011-v2 (1)Jsan 07-00011-v2 (1)
Jsan 07-00011-v2 (1)
Bharath Kumar
 
A4WSN
A4WSNA4WSN
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
AneeshGKumar
 
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor network
Vrince Vimal
 
Wsn big data
Wsn big dataWsn big data
Wsn big data
Vishwesh Nagamalla
 
wsn networks
wsn networkswsn networks
wsn networks
snagendrareddy
 
wins ABHIppt - Copy
wins ABHIppt - Copywins ABHIppt - Copy
wins ABHIppt - Copy
Abhishek Nandawdekar
 
Introduction to wsn by robin abraham
Introduction to wsn by robin abrahamIntroduction to wsn by robin abraham
Introduction to wsn by robin abraham
robymec
 
Applications of WSN
Applications of WSNApplications of WSN
Applications of WSN
ADEEBANADEEM
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
Roma Vyas
 
Wireless sensor network using zigbee
Wireless sensor network using zigbeeWireless sensor network using zigbee
Wireless sensor network using zigbee
eSAT Publishing House
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
PREMKUMAR
 

What's hot (20)

Wireless border security system
Wireless border security systemWireless border security system
Wireless border security system
 
Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET-  	  Identification of Vampire Assault in Wireless Sensor NetworksIRJET-  	  Identification of Vampire Assault in Wireless Sensor Networks
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
 
Wireless sensor network applications environment monitoring
Wireless sensor network applications environment monitoringWireless sensor network applications environment monitoring
Wireless sensor network applications environment monitoring
 
Environmental wireless sensors networks
Environmental wireless sensors networksEnvironmental wireless sensors networks
Environmental wireless sensors networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Jsan 07-00011-v2 (1)
Jsan 07-00011-v2 (1)Jsan 07-00011-v2 (1)
Jsan 07-00011-v2 (1)
 
A4WSN
A4WSNA4WSN
A4WSN
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor network
 
Wsn big data
Wsn big dataWsn big data
Wsn big data
 
wsn networks
wsn networkswsn networks
wsn networks
 
wins ABHIppt - Copy
wins ABHIppt - Copywins ABHIppt - Copy
wins ABHIppt - Copy
 
Introduction to wsn by robin abraham
Introduction to wsn by robin abrahamIntroduction to wsn by robin abraham
Introduction to wsn by robin abraham
 
Applications of WSN
Applications of WSNApplications of WSN
Applications of WSN
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Wireless sensor network using zigbee
Wireless sensor network using zigbeeWireless sensor network using zigbee
Wireless sensor network using zigbee
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 

Similar to Wireless senor network introduction and application by Roop Singh Meena

SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
IJCSES Journal
 
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
IJCSES Journal
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
Editor IJCTER
 
533 450-457
533 450-457533 450-457
533 450-457
idescitation
 
survey
surveysurvey
574 501-507
574 501-507574 501-507
574 501-507
idescitation
 
O4101101103
O4101101103O4101101103
O4101101103
IJERA Editor
 
Wireless Sensor Network Introduction, Applications
Wireless Sensor Network Introduction, ApplicationsWireless Sensor Network Introduction, Applications
Wireless Sensor Network Introduction, Applications
AparnaT17
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
BRNSSPublicationHubI
 
wireless sensor networks & application :forest fire detection
 wireless sensor networks  & application :forest fire detection wireless sensor networks  & application :forest fire detection
wireless sensor networks & application :forest fire detection
Mueenudheen Shafaquath V P
 
Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...
Amy Alexander
 
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYSECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
ijcsit
 
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
AIRCC Publishing Corporation
 
Wireless Sensor Network Applications A Survey
Wireless Sensor Network Applications A SurveyWireless Sensor Network Applications A Survey
Wireless Sensor Network Applications A Survey
ijtsrd
 
Introduction_wsn.pptx
Introduction_wsn.pptxIntroduction_wsn.pptx
Introduction_wsn.pptx
Saba651353
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
 
Improving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errorsImproving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errors
ijctet
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
Easy n Inspire L
 
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSSURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
ijasuc
 

Similar to Wireless senor network introduction and application by Roop Singh Meena (20)

SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
 
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
533 450-457
533 450-457533 450-457
533 450-457
 
survey
surveysurvey
survey
 
574 501-507
574 501-507574 501-507
574 501-507
 
O4101101103
O4101101103O4101101103
O4101101103
 
Wireless Sensor Network Introduction, Applications
Wireless Sensor Network Introduction, ApplicationsWireless Sensor Network Introduction, Applications
Wireless Sensor Network Introduction, Applications
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
wireless sensor networks & application :forest fire detection
 wireless sensor networks  & application :forest fire detection wireless sensor networks  & application :forest fire detection
wireless sensor networks & application :forest fire detection
 
Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...
 
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYSECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
 
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
 
Wireless Sensor Network Applications A Survey
Wireless Sensor Network Applications A SurveyWireless Sensor Network Applications A Survey
Wireless Sensor Network Applications A Survey
 
Introduction_wsn.pptx
Introduction_wsn.pptxIntroduction_wsn.pptx
Introduction_wsn.pptx
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Improving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errorsImproving reliability & performance of wsn via routing errors
Improving reliability & performance of wsn via routing errors
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSSURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
 

Recently uploaded

Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
shivani5543
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 

Recently uploaded (20)

Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 

Wireless senor network introduction and application by Roop Singh Meena

  • 1. Presented by : Roop Singh Meena M.E.(Modular) CSE ,Spell-2 Roll no-191408 Wednesday, January 1, 20201 Seminar on “Wireless Sensor Network”
  • 2. OUTLINE Wednesday, January 1, 20202  Introduction  Architecture  Characteristics of WSN  Types of WSN  Protocol stack  Types of topologies  Applications  Challenges  Security issue  References
  • 3. Introduction of Wireless Sensor Network Wednesday, January 1, 20203  A Sensor network is group of small generally battery- powered devices and wireless infrastructure that monitor and record conditions in any number of environments.  A Wireless Sensor Network(WSN) is a wireless network that is designed using spatially distributed self – governing devices that uses sensors for monitoring physical or environmental conditions.  Parameters monitor using Wireless Sensor Network are temperature, pressure , humidity , direction of wind and speed , illumination , intensity of vibration , intensity of sound , pollutant level and vital body functions
  • 4. Architecture of Wireless Sensor Network Wednesday, January 1, 20204  Gateway  Sensors  Sensor Node
  • 5. Architecture of Wireless Sensor Network Wednesday, January 1, 20205 Reference[2]
  • 6. Architecture Of Sensor Node Wednesday, January 1, 20206 Main Components  Sensing unit  Power unit  Communication Unit  Processing Unit Application Dependent Components  Location Finding System  Mobilizer  Power Generator
  • 7. Architecture Of sensor Node Wednesday, January 1, 20207 Reference[2]
  • 8. Wireless Sensor Network Characteristics Wednesday, January 1, 20208  Power Efficiency  Fault Tolerance  Mobility of Nodes  Heterogeneity of Nodes  Scalability  Responsiveness  Communication failures
  • 9. Wireless Ad Hoc network and Sensor Network Wednesday, January 1, 20209 Critria Wireless sensor network Wireless ad hoc network Sensing of events Use of sensors No sensing Ability Size Very small Large Power capacity Limited Larger Cost Very Low Comparatively High Density and Redundancy High Low Node failure Unattended Attended Due to battery Replacement Memory and Processing Power Limited More Data Movement Many node to Gateway One node to many node Transmission Range Small(3-30 metre) Large(10-50 metre)
  • 10. Types of Wireless Sensor Network Wednesday, January 1, 202010 Terrestrial WSN : TWSN typically consist of hundreds to thousands of inexpensive wireless sensor nodes deployed in a given area, either in a pre-planned or in an ad-hoc manner Underground WSN : UWSN consists of number of sensor nodes buried underground or in a cave or mine that are used to monitor underground conditions
  • 11. Types of Wireless Sensor Network.. Wednesday, January 1, 202011 Underwater WSN : These consist of a several sensor nodes and vehicles that are deployed underwater Multi-Media WSN : These have been proposed to enable monitoring and tracking of events in the form of multimedia. Multi-media WSNs consist of a several low cost sensor nodes equipped with cameras and microphones. These sensor nodes usually interconnect with each other over a wireless connection for data retrieval, process, correlation, and compression
  • 12. Types of Wireless Sensor Network.. Wednesday, January 1, 202012  Mobile WSN :MWSN consist of a no. of sensor nodes that can move on their own and also interact with the physical environment. Mobile nodes have the ability to sense, compute, and communicate like static nodes. Mobile nodes also have the ability to reposition and organize itself in the network
  • 13. Protocol Stack for WSN Wednesday, January 1, 202013  Five layer of OSI  Application Layer  Transport layer  Network layer  Data Link layer  Physical layer  Cross Layer Plane  Power Management Plane  Mobility Management Plane  Task management Plane
  • 14. Protocol Stack for WSN Wednesday, January 1, 202014
  • 15. Types of topologies in Wireless Sensor Network Wednesday, January 1, 202015  Star topology  Mesh topology  Tree topology
  • 16. Wednesday, January 1, 202016 Reference[4]
  • 17. Application Of Wireless Sensor Network Wednesday, January 1, 202017  Military Application Battlefield Surveillance Attach detection Guiding intelligent missile  Environment Application Forest Fire Detection Flood Detection Air Pollution Water Quality
  • 18. Application Of Wireless Sensor Network Wednesday, January 1, 202018  Medical Application Physiological Data Monitoring Identifying allergies Preventing Wrong Diagnosis Monitoring patient Movement  Industrial Application Controlling industrial Plants Dealing with data center issues
  • 19. Application Of Wireless Sensor Network Wednesday, January 1, 202019  Home Application Smart Home Remote management  Agricultural Application Monitoring water tank level Water pump control Irrigation Automation
  • 20. Wednesday, January 1, 202020 Reference[5] Application of Wireless Sensor Network
  • 21. Wednesday, January 1, 202021 Reference[5] Application of Wireless Sensor Network
  • 22. Challenges in WSN Wednesday, January 1, 202022  Real Time data processing  Power management  Network scale and time varying characteristics of WSN  Management at Distance
  • 23. Wireless Sensor Network Security Issue Wednesday, January 1, 202023  In Wireless sensor network attack can be two types:  Passive attack: These attacks are mainly against data confidentiality. An attacker monitors unencrypted traffic and looks for sensitive information that can be used in other types of attacks. Passive attacks include traffic analysis, monitoring communications, decrypting weakly encrypted traffic, and capturing authentication information.  Active attack : active attacks are DoS, modification of data, black hole, replay, sinkhole, spoofing, flooding, jamming, overwhelm, wormhole, fabrication, Hello flood, node subversion, lack of cooperation, modification, node subversion, man-in-middle attack, selective forwarding and false node.
  • 24. References Wednesday, January 1, 202024 1. Indu, S. D. (2014). Wireless sensor networks: Issues & challenges. International Journal of Computer Science and Mobile Computing, 3(6), 681-685. 2. Online tutorial [https://youtu.be/7h5Wwk_mheg][Accessed on :26/12/2019] 3. Bavarva, Arjav & Patel, Nidhi & Kathiriya, Hiren. (2013). WIRELESS SENSOR NETWORK USING ZIGBEE. International Journal of Research in Engineering and Technology. 2. 1038-1042. 10.15623/ijret.2013.0206021. 4. Zafeiropoulos, Anastasios & Spanos, Dimitrios-Emmanuel & Arkoulis, Stamatios & Konstantinou, Nikolaos & Mitrou, Nikolas. (2011). Data Management in Sensor Networks Using Semantic Web Technologies. 5.https://www.researchgate.net/publication/256936126_Analysis_and_Desig n_of_IEEE_80215_4_Networked_Control_Systems