SlideShare a Scribd company logo
International Journal of Computer Applications (0975 – 8887)
Volume 63– No.10, February 2013
25
Wireless Sensor Network – Theoretical Findings
and Applications
Ashish Patel
SVM Institute of Tech.
Bharuch, India
Rutvij Jhaveri
SVM Institute of Tech.
Bharuch, India
Kruti Dangarwala
SVM Institute of Tech.
Bharuch, India
ABSTRACT
Wireless sensor networks (WSN) consist of tiny sensor nodes
scattered on a relatively large geographical area. The nodes
are cooperative in nature, that is, they can communication
with one another or to a central control unit. The work of each
such node is to collect the information from surrounding like
pressure, temperature, humidity, magnetic fields, optical fields
etc [2]. Actually they are ad hoc network with some additional
constraints. The node should be capable enough for power
consumption, collection of data, self healing, mobility, self
configuration to name a few. These features of WSN node
differentiate it from conventional ad hoc networks [14]. This
survey paper aims at reporting wireless sensor network, its
design, networking of nodes, and security in system. In this
paper, fundamentals of wireless sensor network are discussed.
Different component like sensor, microcontroller, battery
require for sensor networks are explained in detail. We have
tried to include all the aspects of WSN. The Protocols,
Operating Systems, tools require for WSN node programming
and some security issues are also discussed.
1. INTRODUCTION
The WSN node typically has a transceiver, a microcontroller,
an electronic circuit for interfacing with the sensors, on board
storage and an energy source. The size and cost of each such
node may vary according to the complexity. Sometimes WSN
nodes also comprise actuators which can act directly to
control different types of objects. For example, actuator can
control the flow of gas in chamber, it can open a value by
sensing the pressure, and it can start or stop the motor. WSN
is active research area because of unlimited potential for
numerous applications like military, environmental, health,
transportation, construction, water/waste water management,
disaster management etc. [15] Though, the limitation of
wireless bandwidth and problems of power consumption,
recently the wireless sensor network has experienced
exponential growth because of the necessity of the application
areas mentioned earlier. [17] The main characteristics of
wireless sensor networks are Ability to cope with node
failures, Mobility of nodes, Communication failures,
Heterogeneity of nodes, Scalability to large scale of
deployment, Ability to withstand harsh environmental
conditions, Ease of use, and Power consumption as shown in
fig.1. [6] The paper describes history, fundamentals of
wireless sensor networking, components used in WSN,
followed by operating systems, tools, protocols and security
measurements require for functioning of wireless sensor
network. The choice of sensor depends on the requirement of
data collection like emperature, pressure, humidity, light etc.
Based on these equirements one can classify the sensors in the
categories like gyroscope, diodes, thermostats, thermocouples,
accelerometer, GPS, capacitive or resistive, magnetometers
etc.
Fig. 1 Typical Wireless Sensor Network
The classification of sensors can also be based on the methods
they apply and the electrical phenomena they utilize to
convert physical properties into electrical signals like
Resistive sensors, Inductive or piezoelectric sensor.
2. HISTORY
The distributed sensor network (DSN) program was initiated
by the Defense Advanced Research Project Agency (DARPA)
around 1980. [4] WSN technology started with the very early
DARPA sponsored military project in 1978. During the 1990s
DARPA was involved in search of the low power wireless
integrated microprocessor (LWIM). In 1993 UCLA started
research in WINS - Wireless Integrated Network Sensors. In
1998 a distributed military sensor system SenseIT was started
with the help of 29 research projects involving 25 institutes
and still working in the direction of new networking
techniques and information processing. [2] The smartdust
concept was introduced, developed, and funded by DARPA
due to the potential military applications of the technology. [7]
The PicoRadio (Berkeley Wireless Research Center) group is
dedicated to advancing the field of Wireless Sensor Networks
in all areas: RF circuit design, networking, positioning, low
voltage digital design, antenna design, and low power analog
design. Some tools are also invented like LEACH (Low-
Energy Protocol Simulator for Wireless Networks) during
these period. The Terminode project was there to develop a
system approach to investigate wide area, large, totally
wireless networks or mobile ad-hoc wide area networks
(MANET). European Union Information Society
Technologies (EU IST) is also working in wireless sensor
networking area from 2003. [4] Technological advances in the
past decade have completely changed the situation. MEMS
technology, more reliable wireless communication, and low-
cost manufacturing have resulted in small, inexpensive, and
powerful sensors with embedded processing and wireless
networking capability. Such wireless sensor networks can be
used in many new applications, ranging from environmental
monitoring to industrial sensing, as well as traditional military
applications. [3] [11] [12] [21] The WSN time line is given
below. [27]
International Journal of Computer Applications (0975 – 8887)
Volume 63– No.10, February 2013
26
1997 SMART DUST
1999 BERKELEY MOTES, TINYOS
2003 ZIGBEE ALLIANCE
2004 IEEE 802.15.4
2006 IEEE 802.15.4-2006
ZIGBEE PRO
2007 WIRELESS HART
IETF RFC4944: IPV6 OVER 15.4
2008 ZIGBEE SMART ENERGY
2009 ZIGBEE GREEN POWER
ANNOUNCED
2011 IEEE 802.15.4E
IETF IPHC, ND, RPL, COAP, …
ZIGBEE SE2.0
3. FUNDAMENTALS OF WIRELESS
SENSOR NETWORKS
Although wireless sensor network shares many similarities
with other distributed systems, it has some unique challenges
and constraints. The advances in technologies such as very
large scale integration (VLSI), microelectromechanical
systems (MEMS), and wireless communications changed the
whole scenario of wireless sensor networks. The desirable
properties of WSN are energy efficiency, distributed sensing,
wireless, multi-hop, distributed processing and low cost.
3.1 Sensor Network Applications
The main purpose of wireless sensor networks was military
application during world war and later during the cold war.
But today they are used in many industrial and consumer
applications, such as industrial process monitoring and
control, machine health monitoring, environment monitoring,
target tracking, pipeline monitoring, structural health
monitoring, precision agriculture, health care, supply chain
management, active volcano monitoring, transportation,
human activity monitoring, and underground mining, to name
a few.
3.2 Sensor Network Design
The main part of sensor network is its node. Node, sometimes
also known as mote is capable of sensing the data, processing
of data and communication with other nodes using its own
power source. Typical node consists of microcontroller,
Transceiver, memory, power source and some sensors as
shown in fig. 2. [10]
3.3 Microcontroller
It is a small integrated device generally used for embedded
systems. Microcontroller provides real-time response in
embedded environment. When certain event occurs, controller
catches the interrupt and servers that interrupt. It is the main
unit controlling the activities of other devices in the figure
shown.
Fig. 2 Architecture of Wireless Sensor Node [10]
3.4 Transceiver
It is a unit containing both transmitter and receiver.
Transceivers are called Medium Attachment Units (MAUs) in
IEEE 802.3 documents and were widely used in 10BASE2
and 10BASE5 Ethernet networks.
3.5 Memory
The Sensor node must have onboard memory to store the data
collected by different sensors. It can be on-chip or flash
memory depending on the application requirements. Some
portion of this memory is used to store system data and other
portion is used for user data.
3.6 Power Source
The sensor node consumes power for sensing, communicating
and data processing. Power can be stored in batteries or in
capacitors. Life of sensor node depends mostly on the power
source it is using. So power saving policies like Dynamic
Power Management (DPM) or Dynamic Voltage Scaling
(DVS) is used in sensor networks.
Sensor
Typical sensor converts the physical quantity such as
temperature, humidity, pressure into a signal which can be
further processed by some electronic device like
microcontroller. Below is the list of some sensors by sensor
type.
 Chemical
 Electric current, electric potential, magnetic, radio
 Environment, weather, moisture, humidity
 Automotive, transportation
 Acoustic, sound, vibration
 Flow, fluid velocity
 Ionizing radiation, subatomic particles
 Navigation instruments
 Position, angle, displacement, distance, speed,
acceleration
 Optical, light, imaging, photon
 Pressure
 Force, density, level
 Thermal, heat, temperature
 Proximity, presence
Depending on the type of the sensor, it can sense different
physical properties.
3.7 Sensor Network Topologies
Common sensor network topologies are Peer to Peer (also
called Point to Point), Star, Tree and Mesh. There are many
International Journal of Computer Applications (0975 – 8887)
Volume 63– No.10, February 2013
27
more network topologies that have not been discussed in this
article.
3.8 Sensor Network Protocols
Network protocols decide, by which route on the network,
node has to send packets for communications. [16] In wireless
environment node announces its present by broadcasting the
message and waits for the response from its neighbours.
Routing protocols for wireless sensor networks are
responsible for maintaining the routes in the network and have
to ensure reliable multi-hop communication under the
constraints like limited transmission range and low power
consumption. [13] Table 1 shows some common routing
protocols for WSN. [22]
There are other protocols like IMEP, TORA and W2LAN
useful for routing in WSN.
Table 1 - LIST OF WIRELESS SENSOR PROTOCOLS
PROTOCOL EXAMPLE
TABLE-DRIVEN (PRO-
ACTIVE) ROUTING
HSR, DSDV, IARP, HSLS
REACTIVE (ON-DEMAND)
ROUTING
AODV, ACOR, AORP,
DYMO
FLOW-ORIENTED ROUTING
IERP, LUNAR, RDMAR,
SSR
HYBRID ROUTING
HRPLS, HWMP, OON,
ZRP
HIERARCHICAL ROUTING
PROTOCOLS
CBRP, CEDAR, FSR
BACKPRESSURE ROUTING DIVBAR
HOST SPECIFIC ROUTING
PROTOCOLS
LANMAR
MULTICAST ROUTING
MRMP, ERAMOBILE,
PUMA, AMRIS, LAM,
TSMP
GEOGRAPHICAL
MULTICAST PROTOCOLS
(GEOCASTING)
MOBICAST, ABIDING
GEOCAST
ON-DEMAND DATA
DELIVERY ROUTING
MAODDP
OTHER PROTOCOLS IMEP, TORA, W2LAN
3.9 Communication between nodes and BS
In other wireless domain network role is of data transport,
compete for resources, high data rates, maximize network
throughput. While in Wireless Sensor Network, network role
is information collection, resource allocation, low data rates
and maximizes network life time. Sensor nodes always require
active connection for communicating with neighbour nodes as
well as base station. Communication plays important role in
designing wireless sensor network. Primarily, there are three
types of communication techniques, Optical Communication,
Infrared Communication and Radio-Frequency
Communication. Optical communication can be disturbed by
atmospheric conditions and requires line of sight. Infrared is
having very limited range and RF communication is having a
problem with antenna size, a good trade-off require for choice
of communication technique. Ease of use, availability in
market and integrity among the nodes makes RF
communication a good candidate for testing in sensor nodes.
[23]
4. OPERATING SYSTEM
Operating system in WSN enables the applications to interact
with hardware resources to accomplish particular task.
Moreover, Operating system is responsible for memory
management, power management, file management and
networking. Operating systems are of two types, single task
and multi task. Multitasking operating system require large
amount of memory. The choice of operating system for WSN
depends on the factors like data types, scheduling, memory,
multithreading, interrupt and so on.
TinyOS is the most widely used runtime environment in
WSN. It is Event-Based operating system and uses static
memory management system. Mate is design to work on top
of TinyOS as one of its component. Other operating systems
are SOS, Contiki and LiteOS and they are using dynamic
memory management system. TinyOS and SOS not allow us
to use system calls but Contiki and LiteOS supports system
calls. [26] Generally, the field of wireless sensor networks is
relatively young. The operation environments as well as the
application requirements are likely to evolve and to be made
more compact and refined. Subsequently, the tradeoff is
between dynamic reprogramming and code replacement on
the one hand, and code execution efficiency on the other. [2]
Other useful environments are MagnetOS, MANTIS, OSPM,
EYESOS, SENOS, EMERALDS and PicOS.
5. SENSOR NETWORK TOOLS
It is generally not feasible to develop a model to test the
behaviour of a sensor node because of complexity of the
networks. So simulation tools are necessary to study the
behaviour of a node or to do research in this area. One can
classify sensor network tools in two categories, General
simulation packages and Specific WSN Framework. [5] NS-2
(Network Simulator), OMNET++ (Objective Modular
Network Testbed), J-Sim, NCTUns2.0, JiST/SWANS,
GloMoSim, SSFNet, Ptolemy II are some examples of general
tools available for simulation. TOSSIM [25], EmStar /EmSim
/EmTOS [24], ATEMU, SENS, Prowler/JProwler, SNAP are
some examples of specific WSN tools.
6. WSN PROGRAMMING
In WSN constant communication requires with the nodes due
to failure of node or changes in network topologies. So WSN
programming differs in many ways with the traditional
distributed programming. Sensor network programming
approaches can be classified as either node-centric or
application-centric. Node-centric approach generally deals
with programming a single node, the entire network sensing
application can be defined by considering the logic of all
nodes of the system. nesC, TinyGALS (globally asynchronous
and locally synchronous), SNACK (Sensor Network
Application Construction Kit) and different thread based
models are used for programming a WSN node. [18] The
main advantage of the thread-based approach is that multiple
tasks can make progress in their execution without blocking
other tasks.
7. SECURITY IN WIRELESS SENSOR
NETWORKS
The characteristics of wireless sensor networks, such as
Resource constraints, Lack of central control, limited battery
International Journal of Computer Applications (0975 – 8887)
Volume 63– No.10, February 2013
28
power and lack of infrastructure, make them more vulnerable
to attack than conventional ad hoc networks. The security
schemes for WSN should require less computational power
and memory because sensor nodes are tiny and have more
limited capacity. [9] WSN node is prone to active or passive
attack. Some of the well known attacks on WSN are Denial of
service (DoS) attack, Sybil attack, Hello Flood, Wormhole
attack, Blackhole or Sinkhole attack etc. [20] However,
developing solution to these attacks and making it efficient
represents a great research challenge. Again, ensuring security
in wireless sensor network is a major research issue. Many of
today’s proposed security schemes are based on specific
network models. As there is a lack of combined effort to take
a common model to ensure security for each layer, combining
all the mechanisms together for making them work in
collaboration with each other will incur a hard research
challenge. [19] In a secure wireless ad hoc sensor network, a
node is authorized by the network and only authorized nodes
are allowed to access the network resources. The generic
process to establish such a network consists of bootstrapping,
pre-authentication, network security association
establishment, authentication, and behaviour monitoring and
security association revocation. Among these, authentication
is of the utmost importance and is an essential service in
network security. Other basic security services like
confidentiality, integrity and nonrepudiation depend on
authentication. Secret information is exchanged only after
nodes are able to verify and validate one another [9].
8. CONCLUSION
Objective of WSN was stand-alone systems for monitoring
and surveillance in military applications; they are becoming
key component of next generation networks. Today, most of
the sensor network solutions are under testing and
implementation for better results. Networks of hundreds of
sensor nodes are already being used to monitor large
geographic areas for modelling and analyzing data. Still,
Sensor networks are only a semi-functional prototype model
for many applications. [8] The area requires great involvement
from researchers, students, and practitioners for understanding
the challenges of this exciting field. Despite their popularity,
wireless sensor network systems are difficult to code.
Developers of these systems need to deal with high-level
application logics and low-level input/output operations
simultaneously. The survey paper throws the light on most of
the basic fundamental aspects of wireless sensor networks.
While these topics are some of the key issues regarding WSN,
there are many important topics not discussed in this paper.
The author has tried to explain the WSN system for further
study.
9. REFERENCES
[1] S. Kumar and D. Shepherd, “SensIT: Sensor information
technology for the warfighter,” in Proc. 4th Int. Conf. on
Information Fusion, 2001, pp. TuC1-3–TuC1-9.
[2] Waltenegus Dargie, Christian Poellabauer,
“Fundamentals of Wireless Sensor Networks, Theory and
Practice”, Wiley Series on Wireless Communication and
Mobile Computing.
[3] Chee-Yee Chong, and S.P. Kumar, “Sensor Networks:
Evolution, Opportunities, and Challenges,” Proceedings
of the IEEE, Vol. 91, No.8, August 2003.
[4] I. Khemapech, I. Duncan, and A. Miller, “A Survey of
Wireless Sensor Networks Technology, in PGNET”,
Proceedings of the 6th Annual PostGraduate Symposium
on the Convergence of Telecommunications, Networking
& Broadcasting, EPSRC, June 2005.
[5] E. Egea-López, J. Vales-Alonso, A. S. Martínez-Sala, P.
Pavón-Mariño, J. García-Haro, “Simulation Tools for
Wireless Sensor Networks”, Summer Simulation
Multiconference – SPECTS, 2005
[6] M.A.M. Vieira, C.N. Coelho. Jr., D.C. da Silva Jr., and
J.M. da Mata, “Survey on Wireless Sensor Network
Devices,” IEEE, 2003.
[7] J. M. Kahn, R. H. Katz, and K. S. J. Pister, “Mobile
networking for smart dust,” in Proc. ACM/IEEE Int.
Conf. Mobile Computing and Networking (MobiCom),
1999, pp. 271–278.
[8] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar,
“Next century challenges: Scalable coordination in
sensor networks,” in Proc. Int. Conf. Mobile Computing
and Networking (MOBICOM), 1999, pp. 263–270.
[9] Erdal Çayırcı, Chunming Rong, “ Security in Wireless
Ad hoc and Sensor Networks, A John Wiley and sons ltd,
publication, 2009.
[10] J. Hill, R. Szewczyk, A, Woo, S. Hollar, D. Culler, and
K. Pister, “System Architecture Directions for
Networked Sensors”, ASPLOS, November 2000
[11] J Rabaey, J Ammer, J Silva Jr., and D Pater. “Picoradio:
Adhoc wireless networking of ubiquitous low-energy
sensor/monitor nodes”, In WVLSI, Orlando, Florida,
USA, April 2000.
[12] D. Kotz, C. Newport, B. Gray, J. Liu, Y. Yuan, C.Elliot.
"Experimental Evaluation of Wireless Simulation
Assumptions.” In Proc. of the 7th ACM/IEEE Int.
Symposium on Modeling, Analysis and Simulation of
Wireless and Mobile Systems (MSWiM’04), Venice,
Italy, pp. 78–82, October 2004.
[13] Luis Javier García Villalba, Ana Lucila Sandoval
Orozco, Alicia Triviño Cabrera, and Cláudia Jacy
Barenco Abbas, “Routing Protocol in Wireless Sensor
Networks”, vol. 9, Sensors 2009, pp. 8399-8421.
[14] S. Misra, “Guide to Wireless Sensor Networks”,
Computer Communications and Networks, DOI:
10.1007/978-1-84882-218-4 4, Springer-Verlag London
Limited 2009.
[15] Akyildiz, I. F., Su, W., Sankarasubramaniam, Y, and
Cayirci, E., “Wireless Sensor Networks: A Survey”,
Computer Networks, 38, 2002, pp. 393-422
[16] Dai S, Jing X, and Li L, “Research and analysis on
routing protocols for wireless sensor networks”, Proc.
International Conference on Communications, Circuits
and Systems, Volume 1, 27-30 May, 2005, pp. 407-411.
[17] Paolo Baronti, Prashant Pillai, Vince Chook, Stefano
Chessa, Alberto Gotta, Y. Fun Hu,“Wireless Sensor
Networks: a Survey on the State of the Art and the
802.15.4 and ZigBee Standards”, PhD Seminar.
[18] David Gay, Philip Levis, Robert von Behren, MattWelsh,
Eric Brewer, and David Culler, “The nesC Language: A
Holistic Approach to Networked Embedded Systems”,
Proc. ACM SIGPLAN Conference on Programming
International Journal of Computer Applications (0975 – 8887)
Volume 63– No.10, February 2013
29
Language Design and Implementation (PLDI 2003), pp.
1-11, San Diego, CA, USA, June 2003.
[19] Chris Karlof, David Wagner, “Secure routing in wireless
sensor networks: attacks and countermeasures” Ad Hoc
Networks, 1: 293–315, 2003.
[20] John P. Walthers, Zhengqiang Liang, Weisong Shi, and
Vipin Chaudhary, “Wireless Sensor Networks Security:
A Survey”, Technical Report MIST-TR-2005-007, July
2005.
[21] J. Zheng and M.J. Lee, “Will IEEE 802.15.4 Make
Ubiquitous Networking a Reality?” IEEE
Communication Mag., Jun 2004.
[22] Shio Kumar Singh, M P Singh, and D K Singh, “Routing
Protocols in Wireless Sensor Networks – A Survey”,
International Journal of Computer Science &
Engineering Survey (IJCSES) Vol.1, No.2, November
2010.
[23] Marcos Augusto M. Vieira, Claudionor N. Coelho. Jr.,
Diógenes Cecílio da Silva Junior, José M. da Mata,
"Survey on Wireless Sensor Network Devices", Federal
University of Minas Gerais, Brazil.
[24] Girod, L., Elson, J., Cerpa, A., Stathopoulos, T.,
Ramanathan, N., and Estrin, D., “EmStar: A software
environment for developing and deploying wireless
sensor networks”, Proc. of the USENIX Annual
Technical Conference, Boston, MA, 2004.
[25] Levis, P., Lee, N., Welsh, M., and Culler, D., “TOSSIM:
Accurate and scalable simulation of entire TinyOS
applications”, Proc. of the 1st ACM Conference on
Embedded Networked Sensor Systems (SenSys), Los
Angeles, CA, 2003.
[26] Abdelzaher, T., Stankovic, J., and He, T. “The LiteOS
operating system: Towards Unix-like abstractions for
wireless sensor networks”, IPSN ’08: Proceedings of the
7th International Conference on Information Processing
in Sensor Networks (pp. 233–244). IEEE Computer
Society, Washington, DC, USA, 2006.
[27] Kris Pister, “Wireless Sensor Network Standards”,
Founder & Chief Technologist, Dust Networks, EECS,
UC Berkeley, 2011.

More Related Content

What's hot

Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
Nishant Bhardwaj
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET Journal
 
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSSURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
ijasuc
 
A survey on bandwidth allocation schemes in wsns using tdma based mac protocol
A survey on bandwidth allocation schemes in wsns using tdma based mac protocolA survey on bandwidth allocation schemes in wsns using tdma based mac protocol
A survey on bandwidth allocation schemes in wsns using tdma based mac protocol
eSAT Journals
 
736 ijar 14994
736 ijar 14994736 ijar 14994
736 ijar 14994
mrewaabd
 
IJSRED-V1I1P3
IJSRED-V1I1P3IJSRED-V1I1P3
IJSRED-V1I1P3
IJSRED
 
SPIE Defense,Security &Sensing2010
SPIE Defense,Security &Sensing2010SPIE Defense,Security &Sensing2010
SPIE Defense,Security &Sensing2010
Falascoj
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
chokrio
 
Architecture 4 Wireless Sensor Networks
Architecture 4 Wireless Sensor NetworksArchitecture 4 Wireless Sensor Networks
Architecture 4 Wireless Sensor Networks
Ivano Malavolta
 
O4101101103
O4101101103O4101101103
O4101101103
IJERA Editor
 
Mobility_Research_paper
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paper
Piyush Jalan
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET Journal
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
Chinmoy Jena
 
WSN nodes power consumption using multihop routing protocol for illegal cutti...
WSN nodes power consumption using multihop routing protocol for illegal cutti...WSN nodes power consumption using multihop routing protocol for illegal cutti...
WSN nodes power consumption using multihop routing protocol for illegal cutti...
TELKOMNIKA JOURNAL
 
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
chokrio
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
IRJET Journal
 
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
IJAAS Team
 
Insect Mointoring
Insect MointoringInsect Mointoring
Insect Mointoring
nehasharma12345
 

What's hot (18)

Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
 
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSSURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
 
A survey on bandwidth allocation schemes in wsns using tdma based mac protocol
A survey on bandwidth allocation schemes in wsns using tdma based mac protocolA survey on bandwidth allocation schemes in wsns using tdma based mac protocol
A survey on bandwidth allocation schemes in wsns using tdma based mac protocol
 
736 ijar 14994
736 ijar 14994736 ijar 14994
736 ijar 14994
 
IJSRED-V1I1P3
IJSRED-V1I1P3IJSRED-V1I1P3
IJSRED-V1I1P3
 
SPIE Defense,Security &Sensing2010
SPIE Defense,Security &Sensing2010SPIE Defense,Security &Sensing2010
SPIE Defense,Security &Sensing2010
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
 
Architecture 4 Wireless Sensor Networks
Architecture 4 Wireless Sensor NetworksArchitecture 4 Wireless Sensor Networks
Architecture 4 Wireless Sensor Networks
 
O4101101103
O4101101103O4101101103
O4101101103
 
Mobility_Research_paper
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paper
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
WSN nodes power consumption using multihop routing protocol for illegal cutti...
WSN nodes power consumption using multihop routing protocol for illegal cutti...WSN nodes power consumption using multihop routing protocol for illegal cutti...
WSN nodes power consumption using multihop routing protocol for illegal cutti...
 
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
 
Insect Mointoring
Insect MointoringInsect Mointoring
Insect Mointoring
 

Similar to Wireless Sensor Network – Theoretical Findings and Applications

A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
Cassie Romero
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
Pramod Kuruvatti
 
A Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor NetworkA Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor Network
Crystal Sanchez
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
ijtsrd
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
IJERA Editor
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
IJET - International Journal of Engineering and Techniques
 
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
IJCSES Journal
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
IAEME Publication
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
rahulkumargiri
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor Networks
Bria Davis
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
ijtsrd
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
Neha Kulkarni
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
Editor IJARCET
 
Chapter
ChapterChapter
Chapter
Rajat Soni
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
INFOGAIN PUBLICATION
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
Jawhar Ali
 
Wireless Sensor Networks in Chemical Industry
Wireless Sensor Networks in Chemical IndustryWireless Sensor Networks in Chemical Industry
Wireless Sensor Networks in Chemical Industry
journal ijrtem
 

Similar to Wireless Sensor Network – Theoretical Findings and Applications (20)

A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
A Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor NetworkA Survey Paper On Wireless Sensor Network
A Survey Paper On Wireless Sensor Network
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY)
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor Networks
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
 
Chapter
ChapterChapter
Chapter
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
Wireless Sensor Networks in Chemical Industry
Wireless Sensor Networks in Chemical IndustryWireless Sensor Networks in Chemical Industry
Wireless Sensor Networks in Chemical Industry
 

Recently uploaded

Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
riddhimaagrawal986
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 

Recently uploaded (20)

Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 

Wireless Sensor Network – Theoretical Findings and Applications

  • 1. International Journal of Computer Applications (0975 – 8887) Volume 63– No.10, February 2013 25 Wireless Sensor Network – Theoretical Findings and Applications Ashish Patel SVM Institute of Tech. Bharuch, India Rutvij Jhaveri SVM Institute of Tech. Bharuch, India Kruti Dangarwala SVM Institute of Tech. Bharuch, India ABSTRACT Wireless sensor networks (WSN) consist of tiny sensor nodes scattered on a relatively large geographical area. The nodes are cooperative in nature, that is, they can communication with one another or to a central control unit. The work of each such node is to collect the information from surrounding like pressure, temperature, humidity, magnetic fields, optical fields etc [2]. Actually they are ad hoc network with some additional constraints. The node should be capable enough for power consumption, collection of data, self healing, mobility, self configuration to name a few. These features of WSN node differentiate it from conventional ad hoc networks [14]. This survey paper aims at reporting wireless sensor network, its design, networking of nodes, and security in system. In this paper, fundamentals of wireless sensor network are discussed. Different component like sensor, microcontroller, battery require for sensor networks are explained in detail. We have tried to include all the aspects of WSN. The Protocols, Operating Systems, tools require for WSN node programming and some security issues are also discussed. 1. INTRODUCTION The WSN node typically has a transceiver, a microcontroller, an electronic circuit for interfacing with the sensors, on board storage and an energy source. The size and cost of each such node may vary according to the complexity. Sometimes WSN nodes also comprise actuators which can act directly to control different types of objects. For example, actuator can control the flow of gas in chamber, it can open a value by sensing the pressure, and it can start or stop the motor. WSN is active research area because of unlimited potential for numerous applications like military, environmental, health, transportation, construction, water/waste water management, disaster management etc. [15] Though, the limitation of wireless bandwidth and problems of power consumption, recently the wireless sensor network has experienced exponential growth because of the necessity of the application areas mentioned earlier. [17] The main characteristics of wireless sensor networks are Ability to cope with node failures, Mobility of nodes, Communication failures, Heterogeneity of nodes, Scalability to large scale of deployment, Ability to withstand harsh environmental conditions, Ease of use, and Power consumption as shown in fig.1. [6] The paper describes history, fundamentals of wireless sensor networking, components used in WSN, followed by operating systems, tools, protocols and security measurements require for functioning of wireless sensor network. The choice of sensor depends on the requirement of data collection like emperature, pressure, humidity, light etc. Based on these equirements one can classify the sensors in the categories like gyroscope, diodes, thermostats, thermocouples, accelerometer, GPS, capacitive or resistive, magnetometers etc. Fig. 1 Typical Wireless Sensor Network The classification of sensors can also be based on the methods they apply and the electrical phenomena they utilize to convert physical properties into electrical signals like Resistive sensors, Inductive or piezoelectric sensor. 2. HISTORY The distributed sensor network (DSN) program was initiated by the Defense Advanced Research Project Agency (DARPA) around 1980. [4] WSN technology started with the very early DARPA sponsored military project in 1978. During the 1990s DARPA was involved in search of the low power wireless integrated microprocessor (LWIM). In 1993 UCLA started research in WINS - Wireless Integrated Network Sensors. In 1998 a distributed military sensor system SenseIT was started with the help of 29 research projects involving 25 institutes and still working in the direction of new networking techniques and information processing. [2] The smartdust concept was introduced, developed, and funded by DARPA due to the potential military applications of the technology. [7] The PicoRadio (Berkeley Wireless Research Center) group is dedicated to advancing the field of Wireless Sensor Networks in all areas: RF circuit design, networking, positioning, low voltage digital design, antenna design, and low power analog design. Some tools are also invented like LEACH (Low- Energy Protocol Simulator for Wireless Networks) during these period. The Terminode project was there to develop a system approach to investigate wide area, large, totally wireless networks or mobile ad-hoc wide area networks (MANET). European Union Information Society Technologies (EU IST) is also working in wireless sensor networking area from 2003. [4] Technological advances in the past decade have completely changed the situation. MEMS technology, more reliable wireless communication, and low- cost manufacturing have resulted in small, inexpensive, and powerful sensors with embedded processing and wireless networking capability. Such wireless sensor networks can be used in many new applications, ranging from environmental monitoring to industrial sensing, as well as traditional military applications. [3] [11] [12] [21] The WSN time line is given below. [27]
  • 2. International Journal of Computer Applications (0975 – 8887) Volume 63– No.10, February 2013 26 1997 SMART DUST 1999 BERKELEY MOTES, TINYOS 2003 ZIGBEE ALLIANCE 2004 IEEE 802.15.4 2006 IEEE 802.15.4-2006 ZIGBEE PRO 2007 WIRELESS HART IETF RFC4944: IPV6 OVER 15.4 2008 ZIGBEE SMART ENERGY 2009 ZIGBEE GREEN POWER ANNOUNCED 2011 IEEE 802.15.4E IETF IPHC, ND, RPL, COAP, … ZIGBEE SE2.0 3. FUNDAMENTALS OF WIRELESS SENSOR NETWORKS Although wireless sensor network shares many similarities with other distributed systems, it has some unique challenges and constraints. The advances in technologies such as very large scale integration (VLSI), microelectromechanical systems (MEMS), and wireless communications changed the whole scenario of wireless sensor networks. The desirable properties of WSN are energy efficiency, distributed sensing, wireless, multi-hop, distributed processing and low cost. 3.1 Sensor Network Applications The main purpose of wireless sensor networks was military application during world war and later during the cold war. But today they are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, environment monitoring, target tracking, pipeline monitoring, structural health monitoring, precision agriculture, health care, supply chain management, active volcano monitoring, transportation, human activity monitoring, and underground mining, to name a few. 3.2 Sensor Network Design The main part of sensor network is its node. Node, sometimes also known as mote is capable of sensing the data, processing of data and communication with other nodes using its own power source. Typical node consists of microcontroller, Transceiver, memory, power source and some sensors as shown in fig. 2. [10] 3.3 Microcontroller It is a small integrated device generally used for embedded systems. Microcontroller provides real-time response in embedded environment. When certain event occurs, controller catches the interrupt and servers that interrupt. It is the main unit controlling the activities of other devices in the figure shown. Fig. 2 Architecture of Wireless Sensor Node [10] 3.4 Transceiver It is a unit containing both transmitter and receiver. Transceivers are called Medium Attachment Units (MAUs) in IEEE 802.3 documents and were widely used in 10BASE2 and 10BASE5 Ethernet networks. 3.5 Memory The Sensor node must have onboard memory to store the data collected by different sensors. It can be on-chip or flash memory depending on the application requirements. Some portion of this memory is used to store system data and other portion is used for user data. 3.6 Power Source The sensor node consumes power for sensing, communicating and data processing. Power can be stored in batteries or in capacitors. Life of sensor node depends mostly on the power source it is using. So power saving policies like Dynamic Power Management (DPM) or Dynamic Voltage Scaling (DVS) is used in sensor networks. Sensor Typical sensor converts the physical quantity such as temperature, humidity, pressure into a signal which can be further processed by some electronic device like microcontroller. Below is the list of some sensors by sensor type.  Chemical  Electric current, electric potential, magnetic, radio  Environment, weather, moisture, humidity  Automotive, transportation  Acoustic, sound, vibration  Flow, fluid velocity  Ionizing radiation, subatomic particles  Navigation instruments  Position, angle, displacement, distance, speed, acceleration  Optical, light, imaging, photon  Pressure  Force, density, level  Thermal, heat, temperature  Proximity, presence Depending on the type of the sensor, it can sense different physical properties. 3.7 Sensor Network Topologies Common sensor network topologies are Peer to Peer (also called Point to Point), Star, Tree and Mesh. There are many
  • 3. International Journal of Computer Applications (0975 – 8887) Volume 63– No.10, February 2013 27 more network topologies that have not been discussed in this article. 3.8 Sensor Network Protocols Network protocols decide, by which route on the network, node has to send packets for communications. [16] In wireless environment node announces its present by broadcasting the message and waits for the response from its neighbours. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under the constraints like limited transmission range and low power consumption. [13] Table 1 shows some common routing protocols for WSN. [22] There are other protocols like IMEP, TORA and W2LAN useful for routing in WSN. Table 1 - LIST OF WIRELESS SENSOR PROTOCOLS PROTOCOL EXAMPLE TABLE-DRIVEN (PRO- ACTIVE) ROUTING HSR, DSDV, IARP, HSLS REACTIVE (ON-DEMAND) ROUTING AODV, ACOR, AORP, DYMO FLOW-ORIENTED ROUTING IERP, LUNAR, RDMAR, SSR HYBRID ROUTING HRPLS, HWMP, OON, ZRP HIERARCHICAL ROUTING PROTOCOLS CBRP, CEDAR, FSR BACKPRESSURE ROUTING DIVBAR HOST SPECIFIC ROUTING PROTOCOLS LANMAR MULTICAST ROUTING MRMP, ERAMOBILE, PUMA, AMRIS, LAM, TSMP GEOGRAPHICAL MULTICAST PROTOCOLS (GEOCASTING) MOBICAST, ABIDING GEOCAST ON-DEMAND DATA DELIVERY ROUTING MAODDP OTHER PROTOCOLS IMEP, TORA, W2LAN 3.9 Communication between nodes and BS In other wireless domain network role is of data transport, compete for resources, high data rates, maximize network throughput. While in Wireless Sensor Network, network role is information collection, resource allocation, low data rates and maximizes network life time. Sensor nodes always require active connection for communicating with neighbour nodes as well as base station. Communication plays important role in designing wireless sensor network. Primarily, there are three types of communication techniques, Optical Communication, Infrared Communication and Radio-Frequency Communication. Optical communication can be disturbed by atmospheric conditions and requires line of sight. Infrared is having very limited range and RF communication is having a problem with antenna size, a good trade-off require for choice of communication technique. Ease of use, availability in market and integrity among the nodes makes RF communication a good candidate for testing in sensor nodes. [23] 4. OPERATING SYSTEM Operating system in WSN enables the applications to interact with hardware resources to accomplish particular task. Moreover, Operating system is responsible for memory management, power management, file management and networking. Operating systems are of two types, single task and multi task. Multitasking operating system require large amount of memory. The choice of operating system for WSN depends on the factors like data types, scheduling, memory, multithreading, interrupt and so on. TinyOS is the most widely used runtime environment in WSN. It is Event-Based operating system and uses static memory management system. Mate is design to work on top of TinyOS as one of its component. Other operating systems are SOS, Contiki and LiteOS and they are using dynamic memory management system. TinyOS and SOS not allow us to use system calls but Contiki and LiteOS supports system calls. [26] Generally, the field of wireless sensor networks is relatively young. The operation environments as well as the application requirements are likely to evolve and to be made more compact and refined. Subsequently, the tradeoff is between dynamic reprogramming and code replacement on the one hand, and code execution efficiency on the other. [2] Other useful environments are MagnetOS, MANTIS, OSPM, EYESOS, SENOS, EMERALDS and PicOS. 5. SENSOR NETWORK TOOLS It is generally not feasible to develop a model to test the behaviour of a sensor node because of complexity of the networks. So simulation tools are necessary to study the behaviour of a node or to do research in this area. One can classify sensor network tools in two categories, General simulation packages and Specific WSN Framework. [5] NS-2 (Network Simulator), OMNET++ (Objective Modular Network Testbed), J-Sim, NCTUns2.0, JiST/SWANS, GloMoSim, SSFNet, Ptolemy II are some examples of general tools available for simulation. TOSSIM [25], EmStar /EmSim /EmTOS [24], ATEMU, SENS, Prowler/JProwler, SNAP are some examples of specific WSN tools. 6. WSN PROGRAMMING In WSN constant communication requires with the nodes due to failure of node or changes in network topologies. So WSN programming differs in many ways with the traditional distributed programming. Sensor network programming approaches can be classified as either node-centric or application-centric. Node-centric approach generally deals with programming a single node, the entire network sensing application can be defined by considering the logic of all nodes of the system. nesC, TinyGALS (globally asynchronous and locally synchronous), SNACK (Sensor Network Application Construction Kit) and different thread based models are used for programming a WSN node. [18] The main advantage of the thread-based approach is that multiple tasks can make progress in their execution without blocking other tasks. 7. SECURITY IN WIRELESS SENSOR NETWORKS The characteristics of wireless sensor networks, such as Resource constraints, Lack of central control, limited battery
  • 4. International Journal of Computer Applications (0975 – 8887) Volume 63– No.10, February 2013 28 power and lack of infrastructure, make them more vulnerable to attack than conventional ad hoc networks. The security schemes for WSN should require less computational power and memory because sensor nodes are tiny and have more limited capacity. [9] WSN node is prone to active or passive attack. Some of the well known attacks on WSN are Denial of service (DoS) attack, Sybil attack, Hello Flood, Wormhole attack, Blackhole or Sinkhole attack etc. [20] However, developing solution to these attacks and making it efficient represents a great research challenge. Again, ensuring security in wireless sensor network is a major research issue. Many of today’s proposed security schemes are based on specific network models. As there is a lack of combined effort to take a common model to ensure security for each layer, combining all the mechanisms together for making them work in collaboration with each other will incur a hard research challenge. [19] In a secure wireless ad hoc sensor network, a node is authorized by the network and only authorized nodes are allowed to access the network resources. The generic process to establish such a network consists of bootstrapping, pre-authentication, network security association establishment, authentication, and behaviour monitoring and security association revocation. Among these, authentication is of the utmost importance and is an essential service in network security. Other basic security services like confidentiality, integrity and nonrepudiation depend on authentication. Secret information is exchanged only after nodes are able to verify and validate one another [9]. 8. CONCLUSION Objective of WSN was stand-alone systems for monitoring and surveillance in military applications; they are becoming key component of next generation networks. Today, most of the sensor network solutions are under testing and implementation for better results. Networks of hundreds of sensor nodes are already being used to monitor large geographic areas for modelling and analyzing data. Still, Sensor networks are only a semi-functional prototype model for many applications. [8] The area requires great involvement from researchers, students, and practitioners for understanding the challenges of this exciting field. Despite their popularity, wireless sensor network systems are difficult to code. Developers of these systems need to deal with high-level application logics and low-level input/output operations simultaneously. The survey paper throws the light on most of the basic fundamental aspects of wireless sensor networks. While these topics are some of the key issues regarding WSN, there are many important topics not discussed in this paper. The author has tried to explain the WSN system for further study. 9. REFERENCES [1] S. Kumar and D. Shepherd, “SensIT: Sensor information technology for the warfighter,” in Proc. 4th Int. Conf. on Information Fusion, 2001, pp. TuC1-3–TuC1-9. [2] Waltenegus Dargie, Christian Poellabauer, “Fundamentals of Wireless Sensor Networks, Theory and Practice”, Wiley Series on Wireless Communication and Mobile Computing. [3] Chee-Yee Chong, and S.P. Kumar, “Sensor Networks: Evolution, Opportunities, and Challenges,” Proceedings of the IEEE, Vol. 91, No.8, August 2003. [4] I. Khemapech, I. Duncan, and A. Miller, “A Survey of Wireless Sensor Networks Technology, in PGNET”, Proceedings of the 6th Annual PostGraduate Symposium on the Convergence of Telecommunications, Networking & Broadcasting, EPSRC, June 2005. [5] E. Egea-López, J. Vales-Alonso, A. S. Martínez-Sala, P. Pavón-Mariño, J. García-Haro, “Simulation Tools for Wireless Sensor Networks”, Summer Simulation Multiconference – SPECTS, 2005 [6] M.A.M. Vieira, C.N. Coelho. Jr., D.C. da Silva Jr., and J.M. da Mata, “Survey on Wireless Sensor Network Devices,” IEEE, 2003. [7] J. M. Kahn, R. H. Katz, and K. S. J. Pister, “Mobile networking for smart dust,” in Proc. ACM/IEEE Int. Conf. Mobile Computing and Networking (MobiCom), 1999, pp. 271–278. [8] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, “Next century challenges: Scalable coordination in sensor networks,” in Proc. Int. Conf. Mobile Computing and Networking (MOBICOM), 1999, pp. 263–270. [9] Erdal Çayırcı, Chunming Rong, “ Security in Wireless Ad hoc and Sensor Networks, A John Wiley and sons ltd, publication, 2009. [10] J. Hill, R. Szewczyk, A, Woo, S. Hollar, D. Culler, and K. Pister, “System Architecture Directions for Networked Sensors”, ASPLOS, November 2000 [11] J Rabaey, J Ammer, J Silva Jr., and D Pater. “Picoradio: Adhoc wireless networking of ubiquitous low-energy sensor/monitor nodes”, In WVLSI, Orlando, Florida, USA, April 2000. [12] D. Kotz, C. Newport, B. Gray, J. Liu, Y. Yuan, C.Elliot. "Experimental Evaluation of Wireless Simulation Assumptions.” In Proc. of the 7th ACM/IEEE Int. Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM’04), Venice, Italy, pp. 78–82, October 2004. [13] Luis Javier García Villalba, Ana Lucila Sandoval Orozco, Alicia Triviño Cabrera, and Cláudia Jacy Barenco Abbas, “Routing Protocol in Wireless Sensor Networks”, vol. 9, Sensors 2009, pp. 8399-8421. [14] S. Misra, “Guide to Wireless Sensor Networks”, Computer Communications and Networks, DOI: 10.1007/978-1-84882-218-4 4, Springer-Verlag London Limited 2009. [15] Akyildiz, I. F., Su, W., Sankarasubramaniam, Y, and Cayirci, E., “Wireless Sensor Networks: A Survey”, Computer Networks, 38, 2002, pp. 393-422 [16] Dai S, Jing X, and Li L, “Research and analysis on routing protocols for wireless sensor networks”, Proc. International Conference on Communications, Circuits and Systems, Volume 1, 27-30 May, 2005, pp. 407-411. [17] Paolo Baronti, Prashant Pillai, Vince Chook, Stefano Chessa, Alberto Gotta, Y. Fun Hu,“Wireless Sensor Networks: a Survey on the State of the Art and the 802.15.4 and ZigBee Standards”, PhD Seminar. [18] David Gay, Philip Levis, Robert von Behren, MattWelsh, Eric Brewer, and David Culler, “The nesC Language: A Holistic Approach to Networked Embedded Systems”, Proc. ACM SIGPLAN Conference on Programming
  • 5. International Journal of Computer Applications (0975 – 8887) Volume 63– No.10, February 2013 29 Language Design and Implementation (PLDI 2003), pp. 1-11, San Diego, CA, USA, June 2003. [19] Chris Karlof, David Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures” Ad Hoc Networks, 1: 293–315, 2003. [20] John P. Walthers, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary, “Wireless Sensor Networks Security: A Survey”, Technical Report MIST-TR-2005-007, July 2005. [21] J. Zheng and M.J. Lee, “Will IEEE 802.15.4 Make Ubiquitous Networking a Reality?” IEEE Communication Mag., Jun 2004. [22] Shio Kumar Singh, M P Singh, and D K Singh, “Routing Protocols in Wireless Sensor Networks – A Survey”, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.1, No.2, November 2010. [23] Marcos Augusto M. Vieira, Claudionor N. Coelho. Jr., Diógenes Cecílio da Silva Junior, José M. da Mata, "Survey on Wireless Sensor Network Devices", Federal University of Minas Gerais, Brazil. [24] Girod, L., Elson, J., Cerpa, A., Stathopoulos, T., Ramanathan, N., and Estrin, D., “EmStar: A software environment for developing and deploying wireless sensor networks”, Proc. of the USENIX Annual Technical Conference, Boston, MA, 2004. [25] Levis, P., Lee, N., Welsh, M., and Culler, D., “TOSSIM: Accurate and scalable simulation of entire TinyOS applications”, Proc. of the 1st ACM Conference on Embedded Networked Sensor Systems (SenSys), Los Angeles, CA, 2003. [26] Abdelzaher, T., Stankovic, J., and He, T. “The LiteOS operating system: Towards Unix-like abstractions for wireless sensor networks”, IPSN ’08: Proceedings of the 7th International Conference on Information Processing in Sensor Networks (pp. 233–244). IEEE Computer Society, Washington, DC, USA, 2006. [27] Kris Pister, “Wireless Sensor Network Standards”, Founder & Chief Technologist, Dust Networks, EECS, UC Berkeley, 2011.