SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
Wireless Sensor Networks: Software Architecture
Muhammad Adeel Javaid
Member Vendor Advisory Council, CompTIA

Abstract
Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected
and worked together to measure quantities such as temperature, humidity, pressure, noise levels
or vibrations. WSNs can measure vehicular movement (velocity, location, etc.) and monitor
conditions such as lightning condition, soil makeup and motion. Nowadays, WSNs are utilized in
many common applications such as vehicle applications. Some of vehicle applications are:
vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle
direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in
major categories such as safety, security, environment and logistics. To implement WSN in an
application and have an efficient system, we need to consider about WSN technology, and its
components. This paper is aimed at providing reliable software architecture of WSN that could
be implemented for better performance and working.
Keywords- Wireless sensor network, Architecture, power unit, WSN design challenges.

I. INTRODUCTION
To provide comprehensive view of WSN hardware, understanding of WSN components'
structure is required. Wireless sensors are small microcontrollers equipped with wireless
communication device and an energy supplier. The architecture of WSNs is illustrated in Figure1.
As Figure-1 shows the components of WSNs are sensing unit, processing unit, power supplier
and communication device. The sensing unit consists of sensors and Analog to Digital
Converters (ADCs). ADCs are responsible for gathering the signals and converting them into
digital signals data and transfer them through each other using network topology to the processor
unit. In the sensing unit, each sensor is called an „end node' and varies in size and cost. The
mission of these multifunction sensor nodes are to sense, process data and collaborate with other
nodes [8]. Wireless sensor network can be positioned in two ways, either using a complex
technique with the large sensors far from the object or using several sensors with an engineered
design on position and topology [5]. In addition, each node provided with a wireless
communication transceiver as a communication component.
In the process unit, the controller and small memory storage are responsible for managing the
collaboration within the sensors to achieve the assigning task. In addition, the communication
device with a transceiver makes the network connection. Above all, the essential component of
WSN is the power unit, which supports the power for all units [5].
One of the unique characteristics of sensor networks is that they are equipped with an on-board
processor. This feature enables them to locally process some simple computations and broadcast
only necessary processed data [5]. Network communication is really complicated and needs
years of study [8], but to be able to implement WSN, we need to know some basic primary
concepts of communication technology such as; network topologies, network protocol and their
standards and specifications.

Figure-1 WSN Architecture

II. TOPOLOGIES IN WSN COMMUNICATION
In network communication, the big issue is how data transfers through nodes and nodes
interconnect with each other. Several basic network topologies may be used for transmitting to
and receiving from a node. The Alliance for Telecommunications Industry Solutions (ATIS) the standards organization of telecommunication industry - explained the network topology as
“The physical, real, logical or virtual arrangement of the nods/elements of a network” [9]. The
topology shows the diameter and the number of nodes between any two nodes. Moreover how a
data process and the data routing complexities are relied on the chosen topology. Consequently,
some characteristics of a sensor networks such as latency, robustness and capacity are changed
by their topology [10].
Despite having the same topology, two networks can differ in transmission rates because of their
physical interaction, signal types and distance between nodes [9]. Table-1 describes the different
types of network topology.

Name

Basic

Point-to-

Types
Permanent

Description

A permanent connection between two endpoints and
topology
types

point

nodes

Switched

A dynamic point-to-point circuit that can be dropped if
needed.

Linear
topology

All nodes are linked to a common transmission medium
(bus) which has exactly two endpoints and all data is able
to transfer through all nodes.
All nodes of the network are linked like a branch to a
main bus which causes more than two endpoints. Data

Bus
topology

Distributed
bus

goes in all directions to all nodes connected on the bus
cable until it finds unique addresse.g. the MAC address or
IP address on the network and transmit the data.
Each node is linked in a ring or loop to the closest node.
The data travels in the ring only in one direction and each
node can transmit only one piece of data at a time. Ring

Ring
topology

topology used control access in the network and if one
node fails entire network will fail.
Each node has exactly two branches linked to it. External
nodes are connected to a central node. The external nodes
are only permitted to communicate with the center node
and a failure of an external node will cause it to be
isolated from the others.

Star
topology

Each node is linked in different tree paths. In each branch,
Tree
topology

each node transfers the data to upper node. So, a node
failure causes the whole connected branch to fail.
Partially
connected

Mesh
topology

At least two nodes linked with two or more node in a
network.

Fully

Direct link between any two nodes. There will be n(n-1)/2
connected

Mix
topology
types

Hybrid
topology

links

An arrangement of any two or more different basic
network topologies.

Table-1 Topology TYPES

III. IEEE 1451 AND SMART SENSORS
IEEE 1451 is a family of standards that links sensors to users, similar to the way that IEEE 802
(Ethernet) provides connectivity for information systems. Currently, all working groups under
the IEEE 1451 umbrella provide standard interfaces for sensors on tethered networks. But the
demand for a wireless physical layer is growing. A wireless IEEE 1451 standard should provide
seamless connectivity among sensors and users, no matter what distance separates them. And it
must do this without requiring the installation of new wires and with reasonable cost and size
additions at each sensor node. Wireless sensor networks should satisfy many requirements.
Desirable functions for sensor nodes include: ease of installation, self-identification, selfdiagnosis, reliability, time awareness for coordination with other nodes, some software functions
and DSP, and standard control protocols and network interfaces [IEEE 1451 Expo, 2001].
There are many sensor manufacturers and many networks on the market today. It is too costly for
manufacturers to make special transducers for every network on the market. Different
components made by different manufacturers should be compatible. Therefore, in 1993 the IEEE
and the National Institute of Standards and Technology (NIST) began work on a standard for
Smart Sensor Networks. IEEE 1451, the Standard for Smart Sensor Networks was the result. The
objective of this standard is to make it easier for different manufacturers to develop smart
sensors and to interface those devices to networks.
Figure-2 IEEE 1451 Standard for Smart Sensor Network

IV. SOFTWARE ARCHITECTURE COMPONENTS
Figure 3 shows an example of a simple service architecture applicable to a sensor network. In
this special case, the client wants to acquire information about the surface conditions in the area
of interest. First, the client requests the surrogate proxy via standardized protocols for the surface
profile of a part of the observed area. The proxy communicates with the distributed nodes using a
proprietary protocol. The nodes located in the target area try to determine the surface profile
using cooperative algorithms and send it to the proxy. The proxy translates the information into
standardized protocols and sends them back to the client.

Figure-3: Example of Surrogate Architecture in Sensor Networks
The different requirements and objectives for sensor networks can be achieved only by using a
flexible architecture of the node software. Therefore, a node software is divided into three parts
according to the main tasks (Figure 4). The Operating System handles the device-specific tasks.
This contains bootup, initialization of the hardware, scheduling, and memory management as
well as the process management. The OS consists of special tailored parts only needed by the
specific application of the node. The second part is the Sensor Driver. It initalizes the sensor
hardware and performs the measurements in the sensor. It encapsulates sensor hardware and
provides an optimized Application Programming Interface (API) to the middleware.

Figure 4: Structure of a Node Application
The Host Middleware is the superior software layer. Its main task is to organize the co- operation
of the distributed nodes in the network. The Middleware Management handles four optional
components, which can be implemented and exchanged according to the node‟s task. Modules
are additional components that increase the functionality of the middleware. Typical modules are
routing modules or security modules. Algorithms describe the behavior of modules. For
example, the behavior of a security module can vary if the encryption algorithm changes. The
services component contains the required software to perform local and cooperative services.
This component usually cooperates with other nodes to fulfill its task. Virtual Machines (VM)
enable an execution of platform independent programs.
The software components in a node can be linked together statically or dynamically. Statical
linking facilitates an optimization of interfaces between several components within a node. This
optimization is called software scaling. It performs in faster and smaller programs. The dynamic
link process is used for components exchanged during runtime, e.g. algorithms downloaded from
other nodes. This procedure results in system-wide interfaces with significant overhead.
Figure 5: Structure of a Sensor Network
Figure 5 shows the logical view on a sensor network application. The nodes can be contacted
only through services of the middleware layers. They do not perform any individual tasks. The
Distributed Middleware coordinates the cooperation of the services within the network. It is
logically located in the network layer but it exists physically in the nodes. All layers together in
conjuction with their configuration compose the sensor network application. The AdministrationTerminal is an external entity to configure the network and evaluate the results. It can be
connected to the network at any location.

V. CHARACTERISTICS OF A MIDDLEWARE FOR SENSOR NETWORKS
The term middleware refers to the software layer between operating system and sensor
application (As shown in Figure 4 and 5 above) on the one hand and the distributed application
which interacts over the network on the other hand. The primary objective of the middleware
layer is to hide the complexity of the network environment by isolating the application from
protocol handling, memory management, network functionality and parallelism [14]. A
middleware for sensor networks has to be:





scalable
generic
adaptive
reflective

The resource constraints (memory, processing speed, bandwidth) of available node hardware
requires the optimization of every node application. The optimization is performed at compile
time. Thereby, the application is reduced to all essential components and datatypes as well as
interfaces are customized (scalable middleware).
The components of the middleware require a generic interface in order to minimize the
customization effort for other applications or nodes. The use of identical middleware
components in different applications leads to a higher number of complex interfaces. Reducing
this overhead is the objective of a generic middleware. It is important to customize the interfaces
to the application in contrast to customize the application to common interfaces. As example, a
middleware function SetBaudrate( int transmitter, long baudrate) identifies the network interface
with the first parameter. However, a node that has only one interface, does not need this
parameter. Consequently, the knowledge of this information at compile time can be used for
optimization.
Another possibility is to change the semantics of data types. A potential use case is the definition
of accuracy of addresses that results in a change of data type‟s width. The width of a data type
has vital influence on the network traffic. Besides hardware-oriented optimization, an application
specific data type optimization exists.
The mobility of nodes and changes in the infrastructure requires adaptations of the middleware at
runtime depending on the sensor network application. The middleware must be able to
dynamically exchange and run components (adaptive middleware).
Reflection covers the ability of a system to understand and influence itself. A reflective system is
able to present its own behaviour. Thereby, two essential mechanisms are distinguished – the
inspection and the adaptation of the own behaviour [1][4]. Inspection covers ways to analyze the
behavior, e.g., with debugging or logging. The adaptation allows modifying the internal layers to
change the behaviour presented to the application. In contrast to an adaptive middleware, a
reflective middleware does not exchange components but changes the behaviour of some
components. An example of reflective behavior is the modification of the routing strategy
depending on mobility. The interface between the software layers remains constant.

VI. SERVICES IN SENSOR NETWORKS
Besides the native network functions, such as routing and packet forwarding, future service
architectures are required enabling location and utilization of services. A service is a program
which can be accessed about standardized functions over a network. Services allow a cascading
without previous knowledge of each other, and thus enables the solution of complex tasks.
A typical service used during the initialization of a node is the localization of a data sink for
sensor data. Gateways or neighboring nodes can provide this service. To find this service, the
node uses a service discovery protocol.
JINI is an emerging technology for desktop applications, but for sensor networks unsuitable due
to resource requirements. Sun Microsystems suggests the surrogate host architecture for
embedded systems [9]. This is primarily suitable for systems that are controlled by an IP based
network. The client can access non-standardized services in a sensor network by inquiring a
proxy server. The surrogate host translates the standardized protocol to the proprietary protcol
and vice versa. It acts as the service provider to the IP based network. Service architectures for
sensor networks are part of the sensor application and operate in contrast to the event-driven
node application on the client-server principle.
VII.

CONCLUSION

Based on the requirements of sensor networks, this article describes aspects of software
engineering. The main objective is the simplification of development of service applications in
sensor networks. A key issue is to separate the software from the underlying hardware. The
presented service-oriented software concept facilitates the programming on high abstraction
layers. Our current research activities concentrate on the realization of the proposed architecture
embedded in a framework. It simplifies the development of sensor-, node-, and sensor network
applications. Besides that, it provides functionalities to configure and manage the whole
network, whereby the scalability and portability of applications increases.

VIII.

RESEARCH CHALLENGES:

The severe constraints and demanding deployment environments of wireless sensor networks
make computer security for these systems more challenging than for conventional networks.
However, several properties of sensor networks may help address the challenge of building
secure networks. First, we have the opportunity to architect security solutions into these systems
from the outset, since they are still in their early design and research stages. Second, many
applications are likely to involve the deployment of sensor networks under a single
administrative domain, simplifying the threat model. Third, it may be possible to exploit
redundancy, scale, and the physical characteristics of the environment in the solutions. If we
build sensor networks so they continue operating even if some fraction of their sensors is
compromised, we have an opportunity to use redundant sensors to resist further attack.
Ultimately, the unique aspects of sensor networks may allow novel defenses not available in
conventional networks. Many other problems also need further research. One is how to secure
wireless communication links against eavesdropping, tampering, traffic analysis, and denial of
service. Others involve resource constraints. Ongoing directions include asymmetric protocols
where most of the computational burden falls on the base station and on public-key
cryptosystems efficient on low- end devices. Finally, finding ways to tolerate the lack of physical
security, perhaps through redundancy or knowledge about the physical environment, will remain
a continuing overall challenge. We are optimistic that much progress will be made on all of
them.
REFERENCES
[1] Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. SPINS: Security protocols for
sensor networks. J. Wireless Nets. 8, 5 (Sept. 2002), 521–534.
[2] Przydatek, B., Song, D., and Perrig, A. SIA: Secure information aggregation in sensor
networks. In Proceedings of the 1st ACM International Conference on Embedded Networked
Sensor Systems (SenSys 2003) (Los Angeles, Nov. 5–7). ACM Press, New York, 2003, 255–
265.
[3] Wood, A., Stankovic, J., and Son, S. JAM: A mapping service for jammed regions in sensor
networks. In Proceedings of the IEEE Real-Time Systems Symposium (Cancun, Mexico, Dec.
3–5, 2003).
[4] Wood, A. and Stankovic, J. Denial of service in sensor networks. IEEE Comput. (Oct. 2002),
54–62.
[5] E. Altman, T. Basar, T. Jimenez, and N. Shimkin, “Competitive routing in networks with
polynomial costs,” IEEE Trans. Automat. Control , vol. 47, no. 1, pp. 92-96, 2002.
[6] R. Bronson and G. Naadimuthu, Operations Research , 2 ed., Schaum‟s Outlines, McGraw
Hill, New York, 1997.
[7] N. Bulusu, J. Heidemann, D. Estrin, and T. Tran, “Self- configuring localization systems:
design and experimental evaluation,” pp. 1-31, ACM TECS special Issue on Networked
Embedded Computing, Aug. 2002.
[8] J. Cao and F. Zhang, “Optimal configuration in hierarchical network routing,” Proc.
Canadian Conf. Elect. and Comp. Eng., pp. 249-254, Canada 1999.
[9] T.-S. Chen, C.-Y. Chang, and J.-P. Sheu, “Efficient path- based multicast in wormhole-routed
mesh networks,” J. Sys. Architecture, vol. 46, pp. 919-930, 2000.
[10] J. Choi, C. Conrad, C. Malakowsky, J. Talent, C.S. Yuan, and R.W. Gracy, “Flavones from
Scutellaria baicalensis Georgi attenuate apoptosis and protein oxidation in neuronal cell lines,”
Biochemica et Biophysica Acta , 1571: 201-210 (2002).
[11] C.W. de Silva, Control Sensors and Actuators, Prentice- Hall, New Jersey, 1989.
[12]J. Duato, “A necessary and sufficient condition for deadlock-free routing in cut-through and
store-and-forward networks,” IEEE Trans Parallel and Distrib. Systems , vol. 7, no. 8, pp. 841854, Aug. 1996.
[13] R. Frank, Understanding Smart Sensors, 2nd Ed., Artech House, Norwood, MA, 2000.
[14] M.R. Garey, and D.S. Johnson, Computers and Intractability: a Guide to the Theory of NPcompleteness. Freeman, San Francisco, CA, 1979.
[15] F. Giulietti, L. Pollini, and M. Innocenti, “Autonomous formation flight,” IEEE Control
Systems Mag., pp. 34-44, Dec. 2000
[16] Hu, Y.-C., Perrig, A., and Johnson, D. Packet leashes: A defense against wormhole attacks
in wireless ad hoc networks. In Proceedings of IEEE Infocom 2003 (San Francisco, Apr. 1–3,
2003).
[17] Karlof, C. and Wagner, D. Secure routing in wireless sensor networks: Attacks and
countermeasures. In Proceedings of the 1st IEEE International Workshop on Sensor Network
Protocols and Applications (Anchorage, AK, May 11, 2003).

Contenu connexe

Tendances

Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkShubhamTakkar
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksManoj BN
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Yogesh Fulara
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksZaahir Salam
 
Architecture 4 Wireless Sensor Networks
Architecture 4 Wireless Sensor NetworksArchitecture 4 Wireless Sensor Networks
Architecture 4 Wireless Sensor NetworksIvano Malavolta
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a surveywsnapple
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkNeha Kulkarni
 
wireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifiwireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifisunil raj kumar
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkdakshata26
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokejbyun77
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey915086731
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksjuno susi
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 

Tendances (20)

Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Architecture 4 Wireless Sensor Networks
Architecture 4 Wireless Sensor NetworksArchitecture 4 Wireless Sensor Networks
Architecture 4 Wireless Sensor Networks
 
Sensor Network
Sensor NetworkSensor Network
Sensor Network
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
wireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifiwireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifi
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 

En vedette

A4WSN: an Architecting environment 4 Wireless Sensor Networks
A4WSN: an Architecting environment 4 Wireless Sensor NetworksA4WSN: an Architecting environment 4 Wireless Sensor Networks
A4WSN: an Architecting environment 4 Wireless Sensor NetworksIvano Malavolta
 
A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...redpel dot com
 
Wireless Sensor Networks ,Middleware and Programming abstractions
Wireless Sensor Networks ,Middleware and Programming abstractionsWireless Sensor Networks ,Middleware and Programming abstractions
Wireless Sensor Networks ,Middleware and Programming abstractionsBudwell Masaiti
 
Sensors and actuators
Sensors and actuatorsSensors and actuators
Sensors and actuatorsnazibhmd
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksPradipta Ghosh
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 

En vedette (8)

A4WSN: an Architecting environment 4 Wireless Sensor Networks
A4WSN: an Architecting environment 4 Wireless Sensor NetworksA4WSN: an Architecting environment 4 Wireless Sensor Networks
A4WSN: an Architecting environment 4 Wireless Sensor Networks
 
A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...A hierarchical security framework for defending against sophisticated attacks...
A hierarchical security framework for defending against sophisticated attacks...
 
Wireless Sensor Networks ,Middleware and Programming abstractions
Wireless Sensor Networks ,Middleware and Programming abstractionsWireless Sensor Networks ,Middleware and Programming abstractions
Wireless Sensor Networks ,Middleware and Programming abstractions
 
Chapter
ChapterChapter
Chapter
 
Sensors and actuators
Sensors and actuatorsSensors and actuators
Sensors and actuators
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 

Similaire à Wireless sensor networks software architecture

Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Surveytheijes
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...IRJET Journal
 
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...IJNSA Journal
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Publishing House
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Journals
 
Mobility_Research_paper
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paperPiyush Jalan
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
Design of optimal system level for embedded wireless sensor unit
Design of optimal system  level for embedded wireless sensor unitDesign of optimal system  level for embedded wireless sensor unit
Design of optimal system level for embedded wireless sensor unitIAEME Publication
 
Design of a Wireless Sensor Network from an Energy Management Perspective
Design of a Wireless Sensor Network from an Energy Management PerspectiveDesign of a Wireless Sensor Network from an Energy Management Perspective
Design of a Wireless Sensor Network from an Energy Management Perspective?? ?
 

Similaire à Wireless sensor networks software architecture (20)

Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
L010527175
L010527175L010527175
L010527175
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
 
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
 
Mobility_Research_paper
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paper
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Design of optimal system level for embedded wireless sensor unit
Design of optimal system  level for embedded wireless sensor unitDesign of optimal system  level for embedded wireless sensor unit
Design of optimal system level for embedded wireless sensor unit
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
574 501-507
574 501-507574 501-507
574 501-507
 
40120140503011
4012014050301140120140503011
40120140503011
 
F0361026033
F0361026033F0361026033
F0361026033
 
Design of a Wireless Sensor Network from an Energy Management Perspective
Design of a Wireless Sensor Network from an Energy Management PerspectiveDesign of a Wireless Sensor Network from an Energy Management Perspective
Design of a Wireless Sensor Network from an Energy Management Perspective
 

Plus de Adeel Javaid

Cybersecurity threat assessment manual
Cybersecurity threat assessment manualCybersecurity threat assessment manual
Cybersecurity threat assessment manualAdeel Javaid
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applicationsAdeel Javaid
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system securityAdeel Javaid
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacyAdeel Javaid
 
Proposed pricing model for cloud computing
Proposed pricing model for cloud computingProposed pricing model for cloud computing
Proposed pricing model for cloud computingAdeel Javaid
 
How hackers attack networks
How hackers attack networksHow hackers attack networks
How hackers attack networksAdeel Javaid
 
How To Get a Good Job in Academia
How To Get a Good Job in AcademiaHow To Get a Good Job in Academia
How To Get a Good Job in AcademiaAdeel Javaid
 
Secrets of success
Secrets of successSecrets of success
Secrets of successAdeel Javaid
 
Smartphone healthcare
Smartphone healthcareSmartphone healthcare
Smartphone healthcareAdeel Javaid
 
Share point presentation
Share point presentationShare point presentation
Share point presentationAdeel Javaid
 
Project management
Project managementProject management
Project managementAdeel Javaid
 
Business continuity and disaster recovery
Business continuity and disaster recoveryBusiness continuity and disaster recovery
Business continuity and disaster recoveryAdeel Javaid
 
Inside the entreprenurial mind
Inside the entreprenurial mindInside the entreprenurial mind
Inside the entreprenurial mindAdeel Javaid
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architectureAdeel Javaid
 
Template for marketing strategy
Template for marketing strategyTemplate for marketing strategy
Template for marketing strategyAdeel Javaid
 
The toyota production system
The toyota production systemThe toyota production system
The toyota production systemAdeel Javaid
 
Tps and lean manufacturing
Tps and lean manufacturingTps and lean manufacturing
Tps and lean manufacturingAdeel Javaid
 

Plus de Adeel Javaid (20)

Cybersecurity threat assessment manual
Cybersecurity threat assessment manualCybersecurity threat assessment manual
Cybersecurity threat assessment manual
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Proposed pricing model for cloud computing
Proposed pricing model for cloud computingProposed pricing model for cloud computing
Proposed pricing model for cloud computing
 
How hackers attack networks
How hackers attack networksHow hackers attack networks
How hackers attack networks
 
What is ph d
What is ph dWhat is ph d
What is ph d
 
How To Get a Good Job in Academia
How To Get a Good Job in AcademiaHow To Get a Good Job in Academia
How To Get a Good Job in Academia
 
Secrets of success
Secrets of successSecrets of success
Secrets of success
 
Smartphone healthcare
Smartphone healthcareSmartphone healthcare
Smartphone healthcare
 
Share point presentation
Share point presentationShare point presentation
Share point presentation
 
Project management
Project managementProject management
Project management
 
Business continuity and disaster recovery
Business continuity and disaster recoveryBusiness continuity and disaster recovery
Business continuity and disaster recovery
 
Inside the entreprenurial mind
Inside the entreprenurial mindInside the entreprenurial mind
Inside the entreprenurial mind
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Template for marketing strategy
Template for marketing strategyTemplate for marketing strategy
Template for marketing strategy
 
The toyota production system
The toyota production systemThe toyota production system
The toyota production system
 
Channel marketing
Channel marketingChannel marketing
Channel marketing
 
Tps and lean manufacturing
Tps and lean manufacturingTps and lean manufacturing
Tps and lean manufacturing
 
Cloud security
Cloud securityCloud security
Cloud security
 

Dernier

Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveIES VE
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxKaustubhBhavsar6
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Libraryshyamraj55
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIVijayananda Mohire
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kitJamie (Taka) Wang
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applicationsnooralam814309
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)codyslingerland1
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and businessFrancesco Corti
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNeo4j
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptxHansamali Gamage
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosErol GIRAUDY
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameKapil Thakar
 
LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0DanBrown980551
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Muhammad Tiham Siddiqui
 
Technical SEO for Improved Accessibility WTS FEST
Technical SEO for Improved Accessibility  WTS FESTTechnical SEO for Improved Accessibility  WTS FEST
Technical SEO for Improved Accessibility WTS FESTBillieHyde
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 

Dernier (20)

Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptx
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Library
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile Brochure
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kit
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applications
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and business
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4j
 
.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx.NET 8 ChatBot with Azure OpenAI Services.pptx
.NET 8 ChatBot with Azure OpenAI Services.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenarios
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First Frame
 
LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0LF Energy Webinar - Unveiling OpenEEMeter 4.0
LF Energy Webinar - Unveiling OpenEEMeter 4.0
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)
 
Technical SEO for Improved Accessibility WTS FEST
Technical SEO for Improved Accessibility  WTS FESTTechnical SEO for Improved Accessibility  WTS FEST
Technical SEO for Improved Accessibility WTS FEST
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Wireless sensor networks software architecture

  • 1. Wireless Sensor Networks: Software Architecture Muhammad Adeel Javaid Member Vendor Advisory Council, CompTIA Abstract Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, we need to consider about WSN technology, and its components. This paper is aimed at providing reliable software architecture of WSN that could be implemented for better performance and working. Keywords- Wireless sensor network, Architecture, power unit, WSN design challenges. I. INTRODUCTION To provide comprehensive view of WSN hardware, understanding of WSN components' structure is required. Wireless sensors are small microcontrollers equipped with wireless communication device and an energy supplier. The architecture of WSNs is illustrated in Figure1. As Figure-1 shows the components of WSNs are sensing unit, processing unit, power supplier and communication device. The sensing unit consists of sensors and Analog to Digital Converters (ADCs). ADCs are responsible for gathering the signals and converting them into digital signals data and transfer them through each other using network topology to the processor unit. In the sensing unit, each sensor is called an „end node' and varies in size and cost. The mission of these multifunction sensor nodes are to sense, process data and collaborate with other nodes [8]. Wireless sensor network can be positioned in two ways, either using a complex technique with the large sensors far from the object or using several sensors with an engineered design on position and topology [5]. In addition, each node provided with a wireless communication transceiver as a communication component. In the process unit, the controller and small memory storage are responsible for managing the collaboration within the sensors to achieve the assigning task. In addition, the communication device with a transceiver makes the network connection. Above all, the essential component of WSN is the power unit, which supports the power for all units [5].
  • 2. One of the unique characteristics of sensor networks is that they are equipped with an on-board processor. This feature enables them to locally process some simple computations and broadcast only necessary processed data [5]. Network communication is really complicated and needs years of study [8], but to be able to implement WSN, we need to know some basic primary concepts of communication technology such as; network topologies, network protocol and their standards and specifications. Figure-1 WSN Architecture II. TOPOLOGIES IN WSN COMMUNICATION In network communication, the big issue is how data transfers through nodes and nodes interconnect with each other. Several basic network topologies may be used for transmitting to and receiving from a node. The Alliance for Telecommunications Industry Solutions (ATIS) the standards organization of telecommunication industry - explained the network topology as “The physical, real, logical or virtual arrangement of the nods/elements of a network” [9]. The topology shows the diameter and the number of nodes between any two nodes. Moreover how a data process and the data routing complexities are relied on the chosen topology. Consequently, some characteristics of a sensor networks such as latency, robustness and capacity are changed by their topology [10]. Despite having the same topology, two networks can differ in transmission rates because of their physical interaction, signal types and distance between nodes [9]. Table-1 describes the different types of network topology. Name Basic Point-to- Types Permanent Description A permanent connection between two endpoints and
  • 3. topology types point nodes Switched A dynamic point-to-point circuit that can be dropped if needed. Linear topology All nodes are linked to a common transmission medium (bus) which has exactly two endpoints and all data is able to transfer through all nodes. All nodes of the network are linked like a branch to a main bus which causes more than two endpoints. Data Bus topology Distributed bus goes in all directions to all nodes connected on the bus cable until it finds unique addresse.g. the MAC address or IP address on the network and transmit the data. Each node is linked in a ring or loop to the closest node. The data travels in the ring only in one direction and each node can transmit only one piece of data at a time. Ring Ring topology topology used control access in the network and if one node fails entire network will fail. Each node has exactly two branches linked to it. External nodes are connected to a central node. The external nodes are only permitted to communicate with the center node and a failure of an external node will cause it to be isolated from the others. Star topology Each node is linked in different tree paths. In each branch, Tree topology each node transfers the data to upper node. So, a node failure causes the whole connected branch to fail. Partially connected Mesh topology At least two nodes linked with two or more node in a network. Fully Direct link between any two nodes. There will be n(n-1)/2
  • 4. connected Mix topology types Hybrid topology links An arrangement of any two or more different basic network topologies. Table-1 Topology TYPES III. IEEE 1451 AND SMART SENSORS IEEE 1451 is a family of standards that links sensors to users, similar to the way that IEEE 802 (Ethernet) provides connectivity for information systems. Currently, all working groups under the IEEE 1451 umbrella provide standard interfaces for sensors on tethered networks. But the demand for a wireless physical layer is growing. A wireless IEEE 1451 standard should provide seamless connectivity among sensors and users, no matter what distance separates them. And it must do this without requiring the installation of new wires and with reasonable cost and size additions at each sensor node. Wireless sensor networks should satisfy many requirements. Desirable functions for sensor nodes include: ease of installation, self-identification, selfdiagnosis, reliability, time awareness for coordination with other nodes, some software functions and DSP, and standard control protocols and network interfaces [IEEE 1451 Expo, 2001]. There are many sensor manufacturers and many networks on the market today. It is too costly for manufacturers to make special transducers for every network on the market. Different components made by different manufacturers should be compatible. Therefore, in 1993 the IEEE and the National Institute of Standards and Technology (NIST) began work on a standard for Smart Sensor Networks. IEEE 1451, the Standard for Smart Sensor Networks was the result. The objective of this standard is to make it easier for different manufacturers to develop smart sensors and to interface those devices to networks.
  • 5. Figure-2 IEEE 1451 Standard for Smart Sensor Network IV. SOFTWARE ARCHITECTURE COMPONENTS Figure 3 shows an example of a simple service architecture applicable to a sensor network. In this special case, the client wants to acquire information about the surface conditions in the area of interest. First, the client requests the surrogate proxy via standardized protocols for the surface profile of a part of the observed area. The proxy communicates with the distributed nodes using a proprietary protocol. The nodes located in the target area try to determine the surface profile using cooperative algorithms and send it to the proxy. The proxy translates the information into standardized protocols and sends them back to the client. Figure-3: Example of Surrogate Architecture in Sensor Networks
  • 6. The different requirements and objectives for sensor networks can be achieved only by using a flexible architecture of the node software. Therefore, a node software is divided into three parts according to the main tasks (Figure 4). The Operating System handles the device-specific tasks. This contains bootup, initialization of the hardware, scheduling, and memory management as well as the process management. The OS consists of special tailored parts only needed by the specific application of the node. The second part is the Sensor Driver. It initalizes the sensor hardware and performs the measurements in the sensor. It encapsulates sensor hardware and provides an optimized Application Programming Interface (API) to the middleware. Figure 4: Structure of a Node Application The Host Middleware is the superior software layer. Its main task is to organize the co- operation of the distributed nodes in the network. The Middleware Management handles four optional components, which can be implemented and exchanged according to the node‟s task. Modules are additional components that increase the functionality of the middleware. Typical modules are routing modules or security modules. Algorithms describe the behavior of modules. For example, the behavior of a security module can vary if the encryption algorithm changes. The services component contains the required software to perform local and cooperative services. This component usually cooperates with other nodes to fulfill its task. Virtual Machines (VM) enable an execution of platform independent programs. The software components in a node can be linked together statically or dynamically. Statical linking facilitates an optimization of interfaces between several components within a node. This optimization is called software scaling. It performs in faster and smaller programs. The dynamic link process is used for components exchanged during runtime, e.g. algorithms downloaded from other nodes. This procedure results in system-wide interfaces with significant overhead.
  • 7. Figure 5: Structure of a Sensor Network Figure 5 shows the logical view on a sensor network application. The nodes can be contacted only through services of the middleware layers. They do not perform any individual tasks. The Distributed Middleware coordinates the cooperation of the services within the network. It is logically located in the network layer but it exists physically in the nodes. All layers together in conjuction with their configuration compose the sensor network application. The AdministrationTerminal is an external entity to configure the network and evaluate the results. It can be connected to the network at any location. V. CHARACTERISTICS OF A MIDDLEWARE FOR SENSOR NETWORKS The term middleware refers to the software layer between operating system and sensor application (As shown in Figure 4 and 5 above) on the one hand and the distributed application which interacts over the network on the other hand. The primary objective of the middleware layer is to hide the complexity of the network environment by isolating the application from protocol handling, memory management, network functionality and parallelism [14]. A middleware for sensor networks has to be:     scalable generic adaptive reflective The resource constraints (memory, processing speed, bandwidth) of available node hardware requires the optimization of every node application. The optimization is performed at compile time. Thereby, the application is reduced to all essential components and datatypes as well as interfaces are customized (scalable middleware). The components of the middleware require a generic interface in order to minimize the customization effort for other applications or nodes. The use of identical middleware components in different applications leads to a higher number of complex interfaces. Reducing
  • 8. this overhead is the objective of a generic middleware. It is important to customize the interfaces to the application in contrast to customize the application to common interfaces. As example, a middleware function SetBaudrate( int transmitter, long baudrate) identifies the network interface with the first parameter. However, a node that has only one interface, does not need this parameter. Consequently, the knowledge of this information at compile time can be used for optimization. Another possibility is to change the semantics of data types. A potential use case is the definition of accuracy of addresses that results in a change of data type‟s width. The width of a data type has vital influence on the network traffic. Besides hardware-oriented optimization, an application specific data type optimization exists. The mobility of nodes and changes in the infrastructure requires adaptations of the middleware at runtime depending on the sensor network application. The middleware must be able to dynamically exchange and run components (adaptive middleware). Reflection covers the ability of a system to understand and influence itself. A reflective system is able to present its own behaviour. Thereby, two essential mechanisms are distinguished – the inspection and the adaptation of the own behaviour [1][4]. Inspection covers ways to analyze the behavior, e.g., with debugging or logging. The adaptation allows modifying the internal layers to change the behaviour presented to the application. In contrast to an adaptive middleware, a reflective middleware does not exchange components but changes the behaviour of some components. An example of reflective behavior is the modification of the routing strategy depending on mobility. The interface between the software layers remains constant. VI. SERVICES IN SENSOR NETWORKS Besides the native network functions, such as routing and packet forwarding, future service architectures are required enabling location and utilization of services. A service is a program which can be accessed about standardized functions over a network. Services allow a cascading without previous knowledge of each other, and thus enables the solution of complex tasks. A typical service used during the initialization of a node is the localization of a data sink for sensor data. Gateways or neighboring nodes can provide this service. To find this service, the node uses a service discovery protocol. JINI is an emerging technology for desktop applications, but for sensor networks unsuitable due to resource requirements. Sun Microsystems suggests the surrogate host architecture for embedded systems [9]. This is primarily suitable for systems that are controlled by an IP based network. The client can access non-standardized services in a sensor network by inquiring a proxy server. The surrogate host translates the standardized protocol to the proprietary protcol and vice versa. It acts as the service provider to the IP based network. Service architectures for sensor networks are part of the sensor application and operate in contrast to the event-driven node application on the client-server principle.
  • 9. VII. CONCLUSION Based on the requirements of sensor networks, this article describes aspects of software engineering. The main objective is the simplification of development of service applications in sensor networks. A key issue is to separate the software from the underlying hardware. The presented service-oriented software concept facilitates the programming on high abstraction layers. Our current research activities concentrate on the realization of the proposed architecture embedded in a framework. It simplifies the development of sensor-, node-, and sensor network applications. Besides that, it provides functionalities to configure and manage the whole network, whereby the scalability and portability of applications increases. VIII. RESEARCH CHALLENGES: The severe constraints and demanding deployment environments of wireless sensor networks make computer security for these systems more challenging than for conventional networks. However, several properties of sensor networks may help address the challenge of building secure networks. First, we have the opportunity to architect security solutions into these systems from the outset, since they are still in their early design and research stages. Second, many applications are likely to involve the deployment of sensor networks under a single administrative domain, simplifying the threat model. Third, it may be possible to exploit redundancy, scale, and the physical characteristics of the environment in the solutions. If we build sensor networks so they continue operating even if some fraction of their sensors is compromised, we have an opportunity to use redundant sensors to resist further attack. Ultimately, the unique aspects of sensor networks may allow novel defenses not available in conventional networks. Many other problems also need further research. One is how to secure wireless communication links against eavesdropping, tampering, traffic analysis, and denial of service. Others involve resource constraints. Ongoing directions include asymmetric protocols where most of the computational burden falls on the base station and on public-key cryptosystems efficient on low- end devices. Finally, finding ways to tolerate the lack of physical security, perhaps through redundancy or knowledge about the physical environment, will remain a continuing overall challenge. We are optimistic that much progress will be made on all of them.
  • 10. REFERENCES [1] Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. SPINS: Security protocols for sensor networks. J. Wireless Nets. 8, 5 (Sept. 2002), 521–534. [2] Przydatek, B., Song, D., and Perrig, A. SIA: Secure information aggregation in sensor networks. In Proceedings of the 1st ACM International Conference on Embedded Networked Sensor Systems (SenSys 2003) (Los Angeles, Nov. 5–7). ACM Press, New York, 2003, 255– 265. [3] Wood, A., Stankovic, J., and Son, S. JAM: A mapping service for jammed regions in sensor networks. In Proceedings of the IEEE Real-Time Systems Symposium (Cancun, Mexico, Dec. 3–5, 2003). [4] Wood, A. and Stankovic, J. Denial of service in sensor networks. IEEE Comput. (Oct. 2002), 54–62. [5] E. Altman, T. Basar, T. Jimenez, and N. Shimkin, “Competitive routing in networks with polynomial costs,” IEEE Trans. Automat. Control , vol. 47, no. 1, pp. 92-96, 2002. [6] R. Bronson and G. Naadimuthu, Operations Research , 2 ed., Schaum‟s Outlines, McGraw Hill, New York, 1997. [7] N. Bulusu, J. Heidemann, D. Estrin, and T. Tran, “Self- configuring localization systems: design and experimental evaluation,” pp. 1-31, ACM TECS special Issue on Networked Embedded Computing, Aug. 2002. [8] J. Cao and F. Zhang, “Optimal configuration in hierarchical network routing,” Proc. Canadian Conf. Elect. and Comp. Eng., pp. 249-254, Canada 1999. [9] T.-S. Chen, C.-Y. Chang, and J.-P. Sheu, “Efficient path- based multicast in wormhole-routed mesh networks,” J. Sys. Architecture, vol. 46, pp. 919-930, 2000. [10] J. Choi, C. Conrad, C. Malakowsky, J. Talent, C.S. Yuan, and R.W. Gracy, “Flavones from Scutellaria baicalensis Georgi attenuate apoptosis and protein oxidation in neuronal cell lines,” Biochemica et Biophysica Acta , 1571: 201-210 (2002). [11] C.W. de Silva, Control Sensors and Actuators, Prentice- Hall, New Jersey, 1989. [12]J. Duato, “A necessary and sufficient condition for deadlock-free routing in cut-through and store-and-forward networks,” IEEE Trans Parallel and Distrib. Systems , vol. 7, no. 8, pp. 841854, Aug. 1996. [13] R. Frank, Understanding Smart Sensors, 2nd Ed., Artech House, Norwood, MA, 2000. [14] M.R. Garey, and D.S. Johnson, Computers and Intractability: a Guide to the Theory of NPcompleteness. Freeman, San Francisco, CA, 1979. [15] F. Giulietti, L. Pollini, and M. Innocenti, “Autonomous formation flight,” IEEE Control Systems Mag., pp. 34-44, Dec. 2000 [16] Hu, Y.-C., Perrig, A., and Johnson, D. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of IEEE Infocom 2003 (San Francisco, Apr. 1–3, 2003). [17] Karlof, C. and Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications (Anchorage, AK, May 11, 2003).