SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
DOI : 10.5121/ijans.2015.5102 15
SOME ASPECTS OF WIRELESS SENSOR NETWORKS
Yogesh Kumar Fulara
Department of Electronics and Communication Engineering,
PEC University of Technology, Chandigarh, India
ABSTRACT
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
KEYWORDS
Communication capability, Routing Protocols,Sensor node, WSNs.
1. INTRODUCTION
WSNs were primarily introduced for the defense application and the objective here is to monitor
activity of enemy without any human interference. A low-flying airplane, ground vehicle or a
powerful laptop acted as a base station to collect information from all sensor nodes.
WSNs can be presume as a special case of Ad Hoc networks. WSN are generally assumed to be
energy restrained because of tiny size sensor node. Even though sensor networks are a subset of
Ad Hoc Network, the protocol designed for the Ad Hoc networks cannot be used as it due to the
following reason:
a. The number of sensor nodes in a sensor network is very large compared to the Ad Hoc
network. Thus sensor networks require distinct and more adaptable solutions.
b. As compared to Ad Hoc network, Wireless sensor nodes have restricted power supply. And
in impractical environment condition they cannot be recharged because the large number of
sensor nodes are deployed in different locations.
International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
16
Figure: 1 Wireless Sensor Networks (WSNs)
Thus wireless sensor networks can be defined as “A WSNs consists of spatially distributed
autonomous sensor to monitor physical or environmental conditions (i.e. temperature,
humidity, pollution, sound, pressure, etc.) and to cooperatively pass their data through the
network to user location”. The WSNs is built of few to several thousands of sensors of nodes,
where each and every node is connected to one or many sensor nodes. Source node is connected
to a central gateway, also called as base station. Central gateway provides a connection to world
through different communication channels (internet, Wi-Fi, WI-Max, wired LAN etc.). Figure: 1
shows data collection from different nodes which further processed and analyzed.
2. COMPONENTS OF WSNS
2.1. Sensor Node
Sensor nodes are generally consist of few sensors and processing unit/mote as shown in figure: 2.
a sensor is device which senses the information and pass it on to mote. Sensor are typically used
to measure the change in physical environmental parameters like temperature, pressure, humidity,
sound and change in the health parameter of person e.g. heartbeat and blood pressure.
Figure: 2 Block diagram sensor networks
International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
17
2.2. Base Station
Different wireless sensor network are connected with base station. It consists of a micro-
processor, antenna, radio board and USB interface board. For communication with wireless
sensor nodes, Base station is preprogramed with low-power mesh networking software. As all the
sensor nodes handover their data to base station so it is very important to deploy base station in
wireless sensor network. Further this data is analysed at base station for processing and decision
making. During deployment of base station in sensor network coverage of sensor nodes, Energy
conservation and reliability issues are taken care of. Generally base stations are assumed static in
nature but in some scenarios, they are assumed to be mobile to collect data from sensor nodes.
3.WSNS REQUIREMENTS AND CHARACTERISTICS
Tiny size, limited power supply, specific application and other various constraints make Wireless
sensor networks different from general wireless networks. The system performance
characteristics varies in WSNs even though the same basic principles of wireless communication
network like size, power, cost and their fundamental constraints in WSNs. Considering the basic
difference with the wireless system, major points which affect the performances and design of
WSNs are the following:
3.1 Deployment
The deployment strategy depends mainly on the type of sensor and the application.
3.2 Localization Scheme
Localization is the method to find the accurate physical position of sensor nodes.
3.3 Scalability
It is the ability of the network to grow without excessive overhead.
3.4 Reliability
The ability of network for authentic data transmission while continuous change of network
structure.
3.5 Responsiveness
It is the ability of the network to quickly accommodate itself to change in topology.
3.6 Mobility
It is the ability of the network to maintain mobile nodes and unstable data paths.
3.7 Quality of service implementation
In some applications (e.g. military application) data should be delivered within the certain period
of time from the moment it is sensed, otherwise the data will be useless.
International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
18
3.8 Security
Security is an important issue which implies that both authentication & encryption should be
feasible.
3.9 Characteristics of WSNs
Wireless sensor networks are strongly restricted by energy, capacity and computing power. So it
is essential to design effective network in order to increase the network characteristics. The
important characteristics of WSNs are as follows:
• Minimum Power consumption
• Ability to cope with node failures (resilience)
• Heterogeneity of nodes
• Mobility of nodes
• Communication failure
• Scalability to large scale of deployment
• Ability to withstand in unfavorable environmental conditions
• Cross-layer design
• Ease of use
4 ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS
WSNs is the networks in which the sensor node are limited to various resources itself, so the main
objective is to design an efficient and energy sensible protocol in order to prolong the network
lifetime for specific application. Every sensor node are not defined with the unique ID, there are
lot of redundant data collected at destination nodes. So while designing the routing protocols for
wireless sensor networks we must keep in mind the following parameter like energy efficiency,
scalability, accuracy, fault-tolerance,latency and QOS. Generally most of the routing protocol are
classified as:
4.1 Data-centric Routing protocols
In this routing protocol, the node send queries to surrounding regions and waits for data from the
sensor located in the selected regions. Since data is being requested through queries, attribute
based naming is necessary to specify the properties of data. In this routing protocol data is
frequently transmitted from every senor node within the deployment region.
The following protocols are discussed in this category:
Flooding and Gossiping:
These are the most traditional network routing. They do not require to know the network topology
or any routing algorithms. In flooding mechanism, each and every sensor node receives a data and
then transmits it to all neighboring nodes. Gossiping is somewhat enhanced version of flooding in
which receiving node sends the packet to randomly selected neighbors, which select another
random neighbor to process or forward the packet to and so on [1].
International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
19
Directed Diffusion:
All the nodes in directed diffusion based network are application-aware. This enables diffusion to
achieve energy saving. In directed diffusion, base station and sensor create gradient of
information in their respected neighborhoods. The base station request data by broadcasting query
and interest is diffused through the network hop-by-hop, and is broadcast by each neighbors. As
the interest is propagated everywhere in the network, gradients are setup to draw path satisfying
shortest path from each node towards base station. This process continues until gradients are
setup from each node back to the base station [2].
SPIN:
Joanna Kulik et al. in [1] , [3] proposed a family of adaptive protocol, called SPIN (Sensor
Protocol for Information via Negotiation) that efficiently expand data among sensor nodes in an
energy-constrained WSNs and overcome the problem of implosion and overlap occurred in
classic flooding. Nodes running a SPIN communication protocol name their data using high-level
data descriptors, called metadata. SPIN nodes negotiate with each other before transmitting data.
Negotiation helps to ensure that the transmission of redundant data throughout the network is
eliminated and only useful information will be transferred.
Gradient-base routing:
This routing algorithm makes an improvement on direct Diffusion, in order to get the total
minimum hop other than the total shortest time and also aims to establish the cost field and
minimum cost [4].
4.2 Hierarchical-Based Routing
Hierarchical routing provides an approach for point to point routing with very small routing state.
Scalability is one of the essential design features of sensor network. Cluster or Hierarchical based
Routing methods are well known techniques with special advantage of efficient communication
and scalability. Hierarchical routing maintain the energy consumption of senor nodes and
performs data aggregation which help in decreasing the number of transmitted message to base
station. Some protocol are discussed here
LEACH:
LEACH stand for Low-Energy Adaptive Clustering Hierarchy and is one of the first hierarchical
protocols. It is self-organizing, adaptive clustering protocol in which sensor nodes will organize
themselves into local cluster and cluster members elect cluster head to avoid excessive energy
consumption and incorporate data aggregation which reduced the amount of message sent to the
base station, to increase the life time of the network [5].
TEEN and APTEEN:
TEEN stands for threshold sensitive Energy Efficient sensor network protocol. In TEEN, sensor
networks sense their environment continuously, thereby making it appropriate for real time
applications. TEEN was the first protocol developed for reactive networks and used in
temperature sensing application which reduces the energy consumption in network [6]. The
Adaptive Periodic TEEN (APTEEN) is an enhancement over TEEN protocol which is able to
combine the best features of proactive and reactive network while minimizing their limitations to
International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
20
create a hybrid network. In this scheme, only periodic data send by the sensor network, they also
acknowledge to sudden changes in attribute values [7].
4.3 Location Based Routing
Most of the routing protocol require location information for sensor nodes in wireless sensor
network to calculate the distance between two particular nodes on the basis of signal strength so
that the energy consumption can be estimate. If we don’t know the addressing scheme for sensor
network then we can also apply the location based routing for sensor data in energy efficient way.
Some of them are discussed here as:
MECN and SMECN:
Minimum energy communication network sets up and maintains a minimum energy network for
wireless networks by utilizing low power GPS. Although, the protocol assumes a mobile network,
it is best applicable to sensor network, which are not mobile [8]. The small minimum energy
Communication network (SMECN) is an improved version of MECN. It assumed that every node
can transmit to every other node, which is not possible every time [9].
GEAR (Geographic and Energy Aware Routing):
The objective of GEAR is to minimize the number of interest in direct diffusion routing and add
geographic data into interest packet by only assuming a certain region rather than sending interest
the whole network. GEAR help in balancing energy consumption in this way and increase the life
time [10].
Fermat Point Based Energy Efficient Geocast Routing:
Within a specified geographical area (called Geocast region) all nodes are delivered by Geocast
routing protocol. Fermat point based protocol are adapted for reducing the energy consumption of
a WSN by reducing the total transmission distance in a multi hop multi sink scenario [11].
5 APPLICATION OF WSNS
5.1 Security and surveillance
Security and detection are the important application of wireless sensor networks. Sensor node
with motion capabilities may be deployed at the borders to detect the intruder crossing the line of
control. Hence surveillance of regions, assets, perimeter, borders and cleared areas can be
efficiently done by deploying wireless sensor networks.
5.2 Environmental monitoring
The term Environmental Sensor Networks have evolved to cover many applications of WSNs to
earth science research including sensing volcanoes, oceans, glaciers, forests etc. Some examples
of major areas listed below.
Air quality/Air pollution monitoring
Wireless sensor network have been deployed in several cities to monitor the concentration of
dangerous or harmful gases for human. For such applications there are distinct architectures and
different kinds of data analysis and data mining.
International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
21
Water quality monitoring
The distribution of wireless sensors enables the creation of a more accurate map of the water
status, and allows the permanent deployment of monitoring stations in locations of difficult
access, without the need of manual data retrieval.
Natural disaster monitoring
It is used to prevent the consequences of natural disasters, like floods.
Forest fire detection
To detect the when fire has started in forest, a network of Sensor Nodes can be installed. With the
help of such type of wireless sensor networks we can take early action to protect forest.
Landslide detection
With the help of wireless sensor network we can forecast earthquake or landslide by detect the
slight movements and various parameter changes of soil that may occur before or during it
happen.
Habitat monitoring
Habitat monitoring is one of the essential parts in environmental monitoring. Habitat means a
place in which an animal or plant naturally grows or lives. Therefore, habitat monitoring is an
important to make sure their species autonomies and prevent any ecological disturbance for
animals and plants. Through WSNs, habitat monitoring can be enhance and protect the life of
animals and plants.
Climate monitoring
The climate change of the world nowadays have brought many effects such as the breaking of sea
ice, increasing in sea water level, heat wave, glacier melting, temperature warming and many
more. Thus using WSNs we can monitor and can try to minimize these harms.
5.3 Building, Bridge and Structural monitoring
Several recent projects have explored the use of sensor network in monitoring the health of
building, bridge and highway. Fiber optic based, Bluetooth, etc. wireless sensor network are used
to monitor stress, vibration, temperature and crack opening due to strain and corrosion of the
reinforcement in concrete bridge decks and structures. The use of sensor network for controlling
civil and mechanical system, has been explored in by having acquisition, monitoring and
recording of data, detecting failure, monitoring state and making control decisions.
5.4 Industrial monitoring system
WSNs have been used for machinery condition-based maintenance as they offer significant cost
saving and enable new functionality. The new aspects are considered as an enabler for future
application in industrial and related wireless sense and control application and partially replacing
or enhancing conventional wire-based network by WSN techniques.
International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
22
5.5 Agriculture
Wireless network frees the farmer from the maintenance of wiring in an unfavorable
environment. Under water system can be monitored using pressure transmitters to detect tank
level and pump can be controlled using wireless devices and water use can be measured and
wirelessly transmitted back to a center for billing.
5.6 Health Care Monitoring
WSNs can enhance the human health monitoring system. In this category include tele monitoring
of human of human health is possible. We can monitored physiological data and we can
monitoring of doctor and patients inside a hospital, drug administrator in hospitals and so on.
5.7 Greenhouse monitoring
Nowadays, we witness more and more electronic application in an average household. Therefore,
great commercial opportunities exist for home automation and smart home/office environment
cooling, heating and humidity control. These parameters can be monitored and controlled by
WSNs.
6 LITERATURE SURVEY
R. Yan [senior Member IEEE], H. sun and Y. Qian, “Energy-Aware Sensor Node Design with
its application in wireless sensor network”. In this paper, they present the design and
implementation of energy-aware sensor node, which can help in constructing energy-efficient
WSNs by calculating distance between nodes, periodic sleep/wake-up scheme for data
transmission. Furthermore they discussed energy saving can be achieved by different network
configuration and choosing the most energy efficient one [12].
HE Bin, ZHANG Hongtao, “An energy optimization method for wireless sensor Network”. In
this paper research was done, how the energy optimized in the WSNs. They used the Dijkstra
shortage path algorithm to calculate the optimal sequence of transmission distance from source
node and sink node. There q-switch algorithm was used to keep balance of network by choosing
one with maximum energy within each q type of nodes. [13].
Sukun Kim, Rodrigo Fonseca and David Culler, “Reliable transfer on wireless sensor
network.” In this paper, different types of routing are proposed. Link level transmission, erasable
code and route fix were used and calculated. Erasable code introduces static overhead. Route fix
reduces consecutive losses, increasing usefulness of erasable [14]
Stephan H. Chagas, Joao B. Martins. “An Approach to localization Scheme of wireless sensor
network based on artificial Neural Network and Genetic Algorithms.” This paper presented an
approach to localization scheme for WSNs using artificial neural network as the machine learning
algorithm and genetic algorithms to select the best ANN structure [15].
N. Javaid, T.N. Khan, A. Iqbal, A. Akhtar, M. Ishfaq, “Enhanced Developed Distributed
Energy-Efficient Clustering for Heterogeneous Wireless Sensor Networks.” In this paper, they
proposed a novel clustering based routing technique for heterogeneous WSNs. The technique was
based on changing dynamically and with more efficiency cluster Head election probability [16].
Hongyang Chen, Kaoru Swzaki, Ping Deng and Hing Cheung so, “An improved DV-Hop
localization Algorithm for Wireless Sensor Networks” In this paper they develop new method,
International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
23
Improved DV-Hop algorithm significantly. The simulation result showed that the suggested
algorithm can improve accurate location and coverage than DV-Hop algorithm. This approach is
effective and surely has good application foreground [17]
Quazi Mamum, Mohammed Kaosar, “What is the first step in designing an Application
Protocol for wireless sensor Networks.” This paper present a novel paradigm in designing
application protocol for WSNs. In this paper they determined how a well-designed logical
topology effect the performances of protocols developed in WSNs. By this, the logical structure
and the communication abstraction of the logical topology are used to design a number of
application protocols and their performance can evaluated [18].
V. M. Priyadarshini, N. Muthukumar and M. Natarajan, “Cellular Architecture Sensors for
Wireless Sensor Networks.” In this paper, they have worked on WSNs nodes and arrange nodes
to improve coverage area, reliability in getting information from the nodes.They also worked on
minimizing loss of information. This architecture arrangement provides recent solution to security
and military applications [19].
Md. Abdul Alim, Yucheng Wu, Wei Wang,” A Fuzzy Base Clustering Protocol for Energy-
Efficient Wireless Sensor Networks.” In this paper, a fuzzy logic based energy-aware dynamic
clustering technique is proposed, which increases the network life time in terms of last node dies.
Through this protocol they optimized the number of cluster formed in every round, which is not
possible in LEACH. They demonstrates that this approach is better than LEACH in terms of
energy saving as well as network life time [20].
7 CONCLUSION AND FUTURE DIRECTIONS
WSN is one of the fastest growing areas in the broad wireless Ad Hoc networking field. The
research in WSNs is thriving at a rapid pace and is being studied as the revolutionary concept of
current era. But, still there are many challenges that need to be explain such as, how to reduce the
power source and self-power generating technology to provide indefinite power
sources.Researcher’s need to work on to provide secured communication with limited resource
requirements. We have fractional answers and or roadmap to some above question, there is still
much to be done in wireless sensor networks.
REFERENCES
[1] Joanna Kulik, HariBalakrishnan and W. R. Heinzelman, (1999) “Adaptive protocols for Information
Dissemination in Wireless sensor networks”, proceeding on 5th annual ACM/IEEE International
conference on mobile Computing and networking, pp. 174-185.
[2] ChalermekIntanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann and Fabio Silva,
“Directed Diffusion for Wireless Sensor Networking”, IEEE/ACM Transactions on networking
(TON), vol. 11, pp. 2-16, February 2003.
[3] Joanna Kulik, HariBalakrishnan and W. R. Heinzelman, “Negotiation-Based Protocols for
Disseminating Information in Wireless Sensor Network,” Wireless Network, vol. 8, pp. 169-185,
2002.
[4] Li Xi Chen and Xiaohong Guan, (2004) “A New Gradient-Based Routing Protocol in Wireless Sensor
Networks”, proceedings of the First International Conference on Embedded Software and Systems,
pp. 318-325.
[5] Ankita joshi and Lakshmi Priya.m, “A survey of Hierarchical Routing Protocols in Wireless Sensor
Network”, MES Journal of technology and Management, pp.67-71
[6] Arati Manjeshwar and Dharma P. Agrawal, “TEEN: A Routing Protocol for Enhanced efficiency in
Wireless Sensor Networks”, Parallel and Distributed Processing Symposium, Proceedings, 15th
International, pp 2009-2015, April. 2009.
International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015
24
[7] Arati Manjeshwar and Dharma P. Agrawal, “APTEEN: A Hybrid Protocol for Efficient Routing and
Comprehensive Information Retrieval in wireless Sensor Networks” Parallel and Distributed
Processing Symposium, proceeding International, IPDPS 2002, Abstracts and CD-ROM, pp. 195-202.
[8] V. Rodoplu, T.H. Ming, “Minimum Energy Mobile Wireless Networks”, IEEE journal of selected
areas in communications Aug 17, 1999, pp. 1333-1344.
[9] L. Li, J. Y Halpern, “Minimum Energy Mobile wireless Network Revisited”, Proceedings of IEEE
International Conference on Communications (ICC_01), Helsinki, Finland, June 2001.
[10] Yan Yu and Ramesh Govinda, “Geographical and Energy Aware Routing Recursive Data
Dissemination Protocol for Wireless Sensor Networks”, 2001
[11] Kaushik Ghosh, Partha Pratim Bhattacharya and P.K.Das, Effect of Multipath Fading and
PropogationEnvironment on the Performances of a Fermat Point Based Energy Efficient Geocast
Routing Protocol”, International Journal of Wireless & mobile Networks, Vol. 4, No. 1, Feb 2012
[12] Ruqiang Yan(Senior Member IEEE), Hanghang Sun and Yuning, “Energy-Aware Sensor Node
Design With Its Application in Wireless Sensor Networks” proceeding IEEE transactions on
Instrumentation and Measurement, Vol. 62, No. 5, pp. 1183-1191, 5 May 2013.
[13] HE Bin, ZHANG Hongtao, “An energy optimization method for wireless sensor Network” IEEE,
Published in Automatic Control and Artificial Intelligence (ACAI 2012), 3-5 March 2012, pp. 402-
406.
[14] Sukun Kim, Rodrigo Fonseca, and David Culler, “ Reliable Transfer in Wireless Sensor Networks”
The First IEEE International Conference on Sensor and Ad hoc Communications and Networks, Oct
2004.
[15] Stephan H. Chagas, Joao B. Martins. “An Approach to localization Scheme of wireless sensor
network based on artificial Neural Network and Genetic Algorithms” published in: New Circuits and
Systems Conference (NEWCAS), 2012 IEEE 10th Conference, 17-20 June 2012, pp. 137-140
[16] N. Javaid, T.N. Khan, A. Iqbal, A. Akhtar, M. Ishfaq, “Enhanced Developed Distributed Energy-
Efficient Clustering for Heterogeneous Wireless Sensor Networks.” Published by Elsevir B.V., on
International Workshop on Body Area Networks (BASNet-2013), Procedia Computer Science 19
(2013), pp.914-919.
[17] Hongyang Chen, Kaoru Sezaki, Ping Deng, Hing Cheung So, “An Improved DV-Hop Localization
Algorithm for Wireless Sensor Networks” IEEE, Vol.8, 2008.
[18] Quazi Mamum, Mohammed Kaosar, “What is the first step in designing an Application Protocol for
wireless sensor Networks.”, Published in: Sensors Application Symposium (SAS, 2014 IEEE, Date of
Conference: 18-20 Feb. 2014, pp. 333-338
[19] V.M.Priyadharshini, N.Muthukumar, M.Natarajan, “Cellular Architecture Sensors for Wireless
Sensor Networks” IJRRSE, Vol.01 No.02, pp 47-51 June 2011.
[20] Md. Abdul Alim, Yucheng Wu, Wei Wang,” A Fuzzy Base Clustering Protocol for Energy-Efficient
Wireless Sensor Networks.” Proceeding of the 2nd International Conference on Computer Science
and Electronics Engineering (ICCSEE 2013), pp. 2874-2878.
Authors
Yogesh Kumar Fulara
PEC University of Technology, Chandigarh.
.

Contenu connexe

Tendances

WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technologyKapil Dev
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networkssourabhshivtiwari
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor networkChinmoy Jena
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Building Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology ModelBuilding Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology ModelIJAAS Team
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksMshari Alabdulkarim
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless networkTeced Ce
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksZaahir Salam
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey915086731
 

Tendances (20)

WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
9345.pdf
9345.pdf9345.pdf
9345.pdf
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Building Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology ModelBuilding Fault Tolerance Within Wsn-A Topology Model
Building Fault Tolerance Within Wsn-A Topology Model
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 
I018135565
I018135565I018135565
I018135565
 
Wsn
WsnWsn
Wsn
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 

En vedette

Presentation apchoo art style eng 12.05.13
Presentation apchoo art style  eng 12.05.13Presentation apchoo art style  eng 12.05.13
Presentation apchoo art style eng 12.05.13Uzak Jarkimbayev
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocolspijans
 
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACHAS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACHpijans
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
 
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...pijans
 
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...pijans
 
Project proposal for BRIT
Project proposal for BRITProject proposal for BRIT
Project proposal for BRITSyadur Rahaman
 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...pijans
 
Μακεδονικός Αγώνας
Μακεδονικός ΑγώναςΜακεδονικός Αγώνας
Μακεδονικός Αγώνας2lykeio
 
By Nature Franchise Concept - Global Presentation
By Nature Franchise Concept - Global PresentationBy Nature Franchise Concept - Global Presentation
By Nature Franchise Concept - Global PresentationBill Dimtsas
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet pijans
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveypijans
 
DRR Component Incorporate With 7FYP Bangladesh Govt.
DRR Component Incorporate With 7FYP Bangladesh Govt.DRR Component Incorporate With 7FYP Bangladesh Govt.
DRR Component Incorporate With 7FYP Bangladesh Govt.Syadur Rahaman
 
Θρησκευτική Μεταρρύθμιση
Θρησκευτική Μεταρρύθμιση Θρησκευτική Μεταρρύθμιση
Θρησκευτική Μεταρρύθμιση 2lykeio
 
Ο Κόσμος στον Μεσαίωνα
Ο Κόσμος στον ΜεσαίωναΟ Κόσμος στον Μεσαίωνα
Ο Κόσμος στον Μεσαίωνα2lykeio
 
Earth sciences field work along jointiapur tamabil-jaflong section; sylhet
Earth sciences field work along jointiapur tamabil-jaflong section; sylhetEarth sciences field work along jointiapur tamabil-jaflong section; sylhet
Earth sciences field work along jointiapur tamabil-jaflong section; sylhetSyadur Rahaman
 
Η Τέχνη τον 19ο και 20ο αιώνα
Η Τέχνη τον 19ο και 20ο αιώναΗ Τέχνη τον 19ο και 20ο αιώνα
Η Τέχνη τον 19ο και 20ο αιώνα2lykeio
 

En vedette (20)

Presentation apchoo art style eng 12.05.13
Presentation apchoo art style  eng 12.05.13Presentation apchoo art style  eng 12.05.13
Presentation apchoo art style eng 12.05.13
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
 
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACHAS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
 
Task 6
Task 6Task 6
Task 6
 
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
 
Project proposal for BRIT
Project proposal for BRITProject proposal for BRIT
Project proposal for BRIT
 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
 
Μακεδονικός Αγώνας
Μακεδονικός ΑγώναςΜακεδονικός Αγώνας
Μακεδονικός Αγώνας
 
By Nature Franchise Concept - Global Presentation
By Nature Franchise Concept - Global PresentationBy Nature Franchise Concept - Global Presentation
By Nature Franchise Concept - Global Presentation
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a survey
 
DRR Component Incorporate With 7FYP Bangladesh Govt.
DRR Component Incorporate With 7FYP Bangladesh Govt.DRR Component Incorporate With 7FYP Bangladesh Govt.
DRR Component Incorporate With 7FYP Bangladesh Govt.
 
Θρησκευτική Μεταρρύθμιση
Θρησκευτική Μεταρρύθμιση Θρησκευτική Μεταρρύθμιση
Θρησκευτική Μεταρρύθμιση
 
Ο Κόσμος στον Μεσαίωνα
Ο Κόσμος στον ΜεσαίωναΟ Κόσμος στον Μεσαίωνα
Ο Κόσμος στον Μεσαίωνα
 
Earth sciences field work along jointiapur tamabil-jaflong section; sylhet
Earth sciences field work along jointiapur tamabil-jaflong section; sylhetEarth sciences field work along jointiapur tamabil-jaflong section; sylhet
Earth sciences field work along jointiapur tamabil-jaflong section; sylhet
 
Η Τέχνη τον 19ο και 20ο αιώνα
Η Τέχνη τον 19ο και 20ο αιώναΗ Τέχνη τον 19ο και 20ο αιώνα
Η Τέχνη τον 19ο και 20ο αιώνα
 

Similaire à Some aspects of wireless sensor networks

EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5sophiabelthome
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksAuwal Amshi
 

Similaire à Some aspects of wireless sensor networks (20)

EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
G017344246
G017344246G017344246
G017344246
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Chapter
ChapterChapter
Chapter
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
 

Plus de pijans

Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...pijans
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Networkpijans
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Networkpijans
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -pijans
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETpijans
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platformpijans
 
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...pijans
 
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXpijans
 

Plus de pijans (20)

Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Network
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networks
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routing
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANET
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platform
 
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
 
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
 

Dernier

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Some aspects of wireless sensor networks

  • 1. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015 DOI : 10.5121/ijans.2015.5102 15 SOME ASPECTS OF WIRELESS SENSOR NETWORKS Yogesh Kumar Fulara Department of Electronics and Communication Engineering, PEC University of Technology, Chandigarh, India ABSTRACT The development of the wireless sensor networks (WSNs) in various applications like Defense, Health, Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless radio transmitter-receiver and limited energy, restricted computational processing capacity and communication band width. These sensor node sense some physical phenomenon using different transduces. The current improvement in sensor technology has made possible WSNs that have wide and varied applications. While selecting the right sensor for application a number of characteristics are important. This paper provides the basics of WSNs including the node characteristics. It also throws light on the different routing protocols. KEYWORDS Communication capability, Routing Protocols,Sensor node, WSNs. 1. INTRODUCTION WSNs were primarily introduced for the defense application and the objective here is to monitor activity of enemy without any human interference. A low-flying airplane, ground vehicle or a powerful laptop acted as a base station to collect information from all sensor nodes. WSNs can be presume as a special case of Ad Hoc networks. WSN are generally assumed to be energy restrained because of tiny size sensor node. Even though sensor networks are a subset of Ad Hoc Network, the protocol designed for the Ad Hoc networks cannot be used as it due to the following reason: a. The number of sensor nodes in a sensor network is very large compared to the Ad Hoc network. Thus sensor networks require distinct and more adaptable solutions. b. As compared to Ad Hoc network, Wireless sensor nodes have restricted power supply. And in impractical environment condition they cannot be recharged because the large number of sensor nodes are deployed in different locations.
  • 2. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015 16 Figure: 1 Wireless Sensor Networks (WSNs) Thus wireless sensor networks can be defined as “A WSNs consists of spatially distributed autonomous sensor to monitor physical or environmental conditions (i.e. temperature, humidity, pollution, sound, pressure, etc.) and to cooperatively pass their data through the network to user location”. The WSNs is built of few to several thousands of sensors of nodes, where each and every node is connected to one or many sensor nodes. Source node is connected to a central gateway, also called as base station. Central gateway provides a connection to world through different communication channels (internet, Wi-Fi, WI-Max, wired LAN etc.). Figure: 1 shows data collection from different nodes which further processed and analyzed. 2. COMPONENTS OF WSNS 2.1. Sensor Node Sensor nodes are generally consist of few sensors and processing unit/mote as shown in figure: 2. a sensor is device which senses the information and pass it on to mote. Sensor are typically used to measure the change in physical environmental parameters like temperature, pressure, humidity, sound and change in the health parameter of person e.g. heartbeat and blood pressure. Figure: 2 Block diagram sensor networks
  • 3. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015 17 2.2. Base Station Different wireless sensor network are connected with base station. It consists of a micro- processor, antenna, radio board and USB interface board. For communication with wireless sensor nodes, Base station is preprogramed with low-power mesh networking software. As all the sensor nodes handover their data to base station so it is very important to deploy base station in wireless sensor network. Further this data is analysed at base station for processing and decision making. During deployment of base station in sensor network coverage of sensor nodes, Energy conservation and reliability issues are taken care of. Generally base stations are assumed static in nature but in some scenarios, they are assumed to be mobile to collect data from sensor nodes. 3.WSNS REQUIREMENTS AND CHARACTERISTICS Tiny size, limited power supply, specific application and other various constraints make Wireless sensor networks different from general wireless networks. The system performance characteristics varies in WSNs even though the same basic principles of wireless communication network like size, power, cost and their fundamental constraints in WSNs. Considering the basic difference with the wireless system, major points which affect the performances and design of WSNs are the following: 3.1 Deployment The deployment strategy depends mainly on the type of sensor and the application. 3.2 Localization Scheme Localization is the method to find the accurate physical position of sensor nodes. 3.3 Scalability It is the ability of the network to grow without excessive overhead. 3.4 Reliability The ability of network for authentic data transmission while continuous change of network structure. 3.5 Responsiveness It is the ability of the network to quickly accommodate itself to change in topology. 3.6 Mobility It is the ability of the network to maintain mobile nodes and unstable data paths. 3.7 Quality of service implementation In some applications (e.g. military application) data should be delivered within the certain period of time from the moment it is sensed, otherwise the data will be useless.
  • 4. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015 18 3.8 Security Security is an important issue which implies that both authentication & encryption should be feasible. 3.9 Characteristics of WSNs Wireless sensor networks are strongly restricted by energy, capacity and computing power. So it is essential to design effective network in order to increase the network characteristics. The important characteristics of WSNs are as follows: • Minimum Power consumption • Ability to cope with node failures (resilience) • Heterogeneity of nodes • Mobility of nodes • Communication failure • Scalability to large scale of deployment • Ability to withstand in unfavorable environmental conditions • Cross-layer design • Ease of use 4 ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS WSNs is the networks in which the sensor node are limited to various resources itself, so the main objective is to design an efficient and energy sensible protocol in order to prolong the network lifetime for specific application. Every sensor node are not defined with the unique ID, there are lot of redundant data collected at destination nodes. So while designing the routing protocols for wireless sensor networks we must keep in mind the following parameter like energy efficiency, scalability, accuracy, fault-tolerance,latency and QOS. Generally most of the routing protocol are classified as: 4.1 Data-centric Routing protocols In this routing protocol, the node send queries to surrounding regions and waits for data from the sensor located in the selected regions. Since data is being requested through queries, attribute based naming is necessary to specify the properties of data. In this routing protocol data is frequently transmitted from every senor node within the deployment region. The following protocols are discussed in this category: Flooding and Gossiping: These are the most traditional network routing. They do not require to know the network topology or any routing algorithms. In flooding mechanism, each and every sensor node receives a data and then transmits it to all neighboring nodes. Gossiping is somewhat enhanced version of flooding in which receiving node sends the packet to randomly selected neighbors, which select another random neighbor to process or forward the packet to and so on [1].
  • 5. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015 19 Directed Diffusion: All the nodes in directed diffusion based network are application-aware. This enables diffusion to achieve energy saving. In directed diffusion, base station and sensor create gradient of information in their respected neighborhoods. The base station request data by broadcasting query and interest is diffused through the network hop-by-hop, and is broadcast by each neighbors. As the interest is propagated everywhere in the network, gradients are setup to draw path satisfying shortest path from each node towards base station. This process continues until gradients are setup from each node back to the base station [2]. SPIN: Joanna Kulik et al. in [1] , [3] proposed a family of adaptive protocol, called SPIN (Sensor Protocol for Information via Negotiation) that efficiently expand data among sensor nodes in an energy-constrained WSNs and overcome the problem of implosion and overlap occurred in classic flooding. Nodes running a SPIN communication protocol name their data using high-level data descriptors, called metadata. SPIN nodes negotiate with each other before transmitting data. Negotiation helps to ensure that the transmission of redundant data throughout the network is eliminated and only useful information will be transferred. Gradient-base routing: This routing algorithm makes an improvement on direct Diffusion, in order to get the total minimum hop other than the total shortest time and also aims to establish the cost field and minimum cost [4]. 4.2 Hierarchical-Based Routing Hierarchical routing provides an approach for point to point routing with very small routing state. Scalability is one of the essential design features of sensor network. Cluster or Hierarchical based Routing methods are well known techniques with special advantage of efficient communication and scalability. Hierarchical routing maintain the energy consumption of senor nodes and performs data aggregation which help in decreasing the number of transmitted message to base station. Some protocol are discussed here LEACH: LEACH stand for Low-Energy Adaptive Clustering Hierarchy and is one of the first hierarchical protocols. It is self-organizing, adaptive clustering protocol in which sensor nodes will organize themselves into local cluster and cluster members elect cluster head to avoid excessive energy consumption and incorporate data aggregation which reduced the amount of message sent to the base station, to increase the life time of the network [5]. TEEN and APTEEN: TEEN stands for threshold sensitive Energy Efficient sensor network protocol. In TEEN, sensor networks sense their environment continuously, thereby making it appropriate for real time applications. TEEN was the first protocol developed for reactive networks and used in temperature sensing application which reduces the energy consumption in network [6]. The Adaptive Periodic TEEN (APTEEN) is an enhancement over TEEN protocol which is able to combine the best features of proactive and reactive network while minimizing their limitations to
  • 6. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015 20 create a hybrid network. In this scheme, only periodic data send by the sensor network, they also acknowledge to sudden changes in attribute values [7]. 4.3 Location Based Routing Most of the routing protocol require location information for sensor nodes in wireless sensor network to calculate the distance between two particular nodes on the basis of signal strength so that the energy consumption can be estimate. If we don’t know the addressing scheme for sensor network then we can also apply the location based routing for sensor data in energy efficient way. Some of them are discussed here as: MECN and SMECN: Minimum energy communication network sets up and maintains a minimum energy network for wireless networks by utilizing low power GPS. Although, the protocol assumes a mobile network, it is best applicable to sensor network, which are not mobile [8]. The small minimum energy Communication network (SMECN) is an improved version of MECN. It assumed that every node can transmit to every other node, which is not possible every time [9]. GEAR (Geographic and Energy Aware Routing): The objective of GEAR is to minimize the number of interest in direct diffusion routing and add geographic data into interest packet by only assuming a certain region rather than sending interest the whole network. GEAR help in balancing energy consumption in this way and increase the life time [10]. Fermat Point Based Energy Efficient Geocast Routing: Within a specified geographical area (called Geocast region) all nodes are delivered by Geocast routing protocol. Fermat point based protocol are adapted for reducing the energy consumption of a WSN by reducing the total transmission distance in a multi hop multi sink scenario [11]. 5 APPLICATION OF WSNS 5.1 Security and surveillance Security and detection are the important application of wireless sensor networks. Sensor node with motion capabilities may be deployed at the borders to detect the intruder crossing the line of control. Hence surveillance of regions, assets, perimeter, borders and cleared areas can be efficiently done by deploying wireless sensor networks. 5.2 Environmental monitoring The term Environmental Sensor Networks have evolved to cover many applications of WSNs to earth science research including sensing volcanoes, oceans, glaciers, forests etc. Some examples of major areas listed below. Air quality/Air pollution monitoring Wireless sensor network have been deployed in several cities to monitor the concentration of dangerous or harmful gases for human. For such applications there are distinct architectures and different kinds of data analysis and data mining.
  • 7. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015 21 Water quality monitoring The distribution of wireless sensors enables the creation of a more accurate map of the water status, and allows the permanent deployment of monitoring stations in locations of difficult access, without the need of manual data retrieval. Natural disaster monitoring It is used to prevent the consequences of natural disasters, like floods. Forest fire detection To detect the when fire has started in forest, a network of Sensor Nodes can be installed. With the help of such type of wireless sensor networks we can take early action to protect forest. Landslide detection With the help of wireless sensor network we can forecast earthquake or landslide by detect the slight movements and various parameter changes of soil that may occur before or during it happen. Habitat monitoring Habitat monitoring is one of the essential parts in environmental monitoring. Habitat means a place in which an animal or plant naturally grows or lives. Therefore, habitat monitoring is an important to make sure their species autonomies and prevent any ecological disturbance for animals and plants. Through WSNs, habitat monitoring can be enhance and protect the life of animals and plants. Climate monitoring The climate change of the world nowadays have brought many effects such as the breaking of sea ice, increasing in sea water level, heat wave, glacier melting, temperature warming and many more. Thus using WSNs we can monitor and can try to minimize these harms. 5.3 Building, Bridge and Structural monitoring Several recent projects have explored the use of sensor network in monitoring the health of building, bridge and highway. Fiber optic based, Bluetooth, etc. wireless sensor network are used to monitor stress, vibration, temperature and crack opening due to strain and corrosion of the reinforcement in concrete bridge decks and structures. The use of sensor network for controlling civil and mechanical system, has been explored in by having acquisition, monitoring and recording of data, detecting failure, monitoring state and making control decisions. 5.4 Industrial monitoring system WSNs have been used for machinery condition-based maintenance as they offer significant cost saving and enable new functionality. The new aspects are considered as an enabler for future application in industrial and related wireless sense and control application and partially replacing or enhancing conventional wire-based network by WSN techniques.
  • 8. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015 22 5.5 Agriculture Wireless network frees the farmer from the maintenance of wiring in an unfavorable environment. Under water system can be monitored using pressure transmitters to detect tank level and pump can be controlled using wireless devices and water use can be measured and wirelessly transmitted back to a center for billing. 5.6 Health Care Monitoring WSNs can enhance the human health monitoring system. In this category include tele monitoring of human of human health is possible. We can monitored physiological data and we can monitoring of doctor and patients inside a hospital, drug administrator in hospitals and so on. 5.7 Greenhouse monitoring Nowadays, we witness more and more electronic application in an average household. Therefore, great commercial opportunities exist for home automation and smart home/office environment cooling, heating and humidity control. These parameters can be monitored and controlled by WSNs. 6 LITERATURE SURVEY R. Yan [senior Member IEEE], H. sun and Y. Qian, “Energy-Aware Sensor Node Design with its application in wireless sensor network”. In this paper, they present the design and implementation of energy-aware sensor node, which can help in constructing energy-efficient WSNs by calculating distance between nodes, periodic sleep/wake-up scheme for data transmission. Furthermore they discussed energy saving can be achieved by different network configuration and choosing the most energy efficient one [12]. HE Bin, ZHANG Hongtao, “An energy optimization method for wireless sensor Network”. In this paper research was done, how the energy optimized in the WSNs. They used the Dijkstra shortage path algorithm to calculate the optimal sequence of transmission distance from source node and sink node. There q-switch algorithm was used to keep balance of network by choosing one with maximum energy within each q type of nodes. [13]. Sukun Kim, Rodrigo Fonseca and David Culler, “Reliable transfer on wireless sensor network.” In this paper, different types of routing are proposed. Link level transmission, erasable code and route fix were used and calculated. Erasable code introduces static overhead. Route fix reduces consecutive losses, increasing usefulness of erasable [14] Stephan H. Chagas, Joao B. Martins. “An Approach to localization Scheme of wireless sensor network based on artificial Neural Network and Genetic Algorithms.” This paper presented an approach to localization scheme for WSNs using artificial neural network as the machine learning algorithm and genetic algorithms to select the best ANN structure [15]. N. Javaid, T.N. Khan, A. Iqbal, A. Akhtar, M. Ishfaq, “Enhanced Developed Distributed Energy-Efficient Clustering for Heterogeneous Wireless Sensor Networks.” In this paper, they proposed a novel clustering based routing technique for heterogeneous WSNs. The technique was based on changing dynamically and with more efficiency cluster Head election probability [16]. Hongyang Chen, Kaoru Swzaki, Ping Deng and Hing Cheung so, “An improved DV-Hop localization Algorithm for Wireless Sensor Networks” In this paper they develop new method,
  • 9. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015 23 Improved DV-Hop algorithm significantly. The simulation result showed that the suggested algorithm can improve accurate location and coverage than DV-Hop algorithm. This approach is effective and surely has good application foreground [17] Quazi Mamum, Mohammed Kaosar, “What is the first step in designing an Application Protocol for wireless sensor Networks.” This paper present a novel paradigm in designing application protocol for WSNs. In this paper they determined how a well-designed logical topology effect the performances of protocols developed in WSNs. By this, the logical structure and the communication abstraction of the logical topology are used to design a number of application protocols and their performance can evaluated [18]. V. M. Priyadarshini, N. Muthukumar and M. Natarajan, “Cellular Architecture Sensors for Wireless Sensor Networks.” In this paper, they have worked on WSNs nodes and arrange nodes to improve coverage area, reliability in getting information from the nodes.They also worked on minimizing loss of information. This architecture arrangement provides recent solution to security and military applications [19]. Md. Abdul Alim, Yucheng Wu, Wei Wang,” A Fuzzy Base Clustering Protocol for Energy- Efficient Wireless Sensor Networks.” In this paper, a fuzzy logic based energy-aware dynamic clustering technique is proposed, which increases the network life time in terms of last node dies. Through this protocol they optimized the number of cluster formed in every round, which is not possible in LEACH. They demonstrates that this approach is better than LEACH in terms of energy saving as well as network life time [20]. 7 CONCLUSION AND FUTURE DIRECTIONS WSN is one of the fastest growing areas in the broad wireless Ad Hoc networking field. The research in WSNs is thriving at a rapid pace and is being studied as the revolutionary concept of current era. But, still there are many challenges that need to be explain such as, how to reduce the power source and self-power generating technology to provide indefinite power sources.Researcher’s need to work on to provide secured communication with limited resource requirements. We have fractional answers and or roadmap to some above question, there is still much to be done in wireless sensor networks. REFERENCES [1] Joanna Kulik, HariBalakrishnan and W. R. Heinzelman, (1999) “Adaptive protocols for Information Dissemination in Wireless sensor networks”, proceeding on 5th annual ACM/IEEE International conference on mobile Computing and networking, pp. 174-185. [2] ChalermekIntanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann and Fabio Silva, “Directed Diffusion for Wireless Sensor Networking”, IEEE/ACM Transactions on networking (TON), vol. 11, pp. 2-16, February 2003. [3] Joanna Kulik, HariBalakrishnan and W. R. Heinzelman, “Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Network,” Wireless Network, vol. 8, pp. 169-185, 2002. [4] Li Xi Chen and Xiaohong Guan, (2004) “A New Gradient-Based Routing Protocol in Wireless Sensor Networks”, proceedings of the First International Conference on Embedded Software and Systems, pp. 318-325. [5] Ankita joshi and Lakshmi Priya.m, “A survey of Hierarchical Routing Protocols in Wireless Sensor Network”, MES Journal of technology and Management, pp.67-71 [6] Arati Manjeshwar and Dharma P. Agrawal, “TEEN: A Routing Protocol for Enhanced efficiency in Wireless Sensor Networks”, Parallel and Distributed Processing Symposium, Proceedings, 15th International, pp 2009-2015, April. 2009.
  • 10. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015 24 [7] Arati Manjeshwar and Dharma P. Agrawal, “APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in wireless Sensor Networks” Parallel and Distributed Processing Symposium, proceeding International, IPDPS 2002, Abstracts and CD-ROM, pp. 195-202. [8] V. Rodoplu, T.H. Ming, “Minimum Energy Mobile Wireless Networks”, IEEE journal of selected areas in communications Aug 17, 1999, pp. 1333-1344. [9] L. Li, J. Y Halpern, “Minimum Energy Mobile wireless Network Revisited”, Proceedings of IEEE International Conference on Communications (ICC_01), Helsinki, Finland, June 2001. [10] Yan Yu and Ramesh Govinda, “Geographical and Energy Aware Routing Recursive Data Dissemination Protocol for Wireless Sensor Networks”, 2001 [11] Kaushik Ghosh, Partha Pratim Bhattacharya and P.K.Das, Effect of Multipath Fading and PropogationEnvironment on the Performances of a Fermat Point Based Energy Efficient Geocast Routing Protocol”, International Journal of Wireless & mobile Networks, Vol. 4, No. 1, Feb 2012 [12] Ruqiang Yan(Senior Member IEEE), Hanghang Sun and Yuning, “Energy-Aware Sensor Node Design With Its Application in Wireless Sensor Networks” proceeding IEEE transactions on Instrumentation and Measurement, Vol. 62, No. 5, pp. 1183-1191, 5 May 2013. [13] HE Bin, ZHANG Hongtao, “An energy optimization method for wireless sensor Network” IEEE, Published in Automatic Control and Artificial Intelligence (ACAI 2012), 3-5 March 2012, pp. 402- 406. [14] Sukun Kim, Rodrigo Fonseca, and David Culler, “ Reliable Transfer in Wireless Sensor Networks” The First IEEE International Conference on Sensor and Ad hoc Communications and Networks, Oct 2004. [15] Stephan H. Chagas, Joao B. Martins. “An Approach to localization Scheme of wireless sensor network based on artificial Neural Network and Genetic Algorithms” published in: New Circuits and Systems Conference (NEWCAS), 2012 IEEE 10th Conference, 17-20 June 2012, pp. 137-140 [16] N. Javaid, T.N. Khan, A. Iqbal, A. Akhtar, M. Ishfaq, “Enhanced Developed Distributed Energy- Efficient Clustering for Heterogeneous Wireless Sensor Networks.” Published by Elsevir B.V., on International Workshop on Body Area Networks (BASNet-2013), Procedia Computer Science 19 (2013), pp.914-919. [17] Hongyang Chen, Kaoru Sezaki, Ping Deng, Hing Cheung So, “An Improved DV-Hop Localization Algorithm for Wireless Sensor Networks” IEEE, Vol.8, 2008. [18] Quazi Mamum, Mohammed Kaosar, “What is the first step in designing an Application Protocol for wireless sensor Networks.”, Published in: Sensors Application Symposium (SAS, 2014 IEEE, Date of Conference: 18-20 Feb. 2014, pp. 333-338 [19] V.M.Priyadharshini, N.Muthukumar, M.Natarajan, “Cellular Architecture Sensors for Wireless Sensor Networks” IJRRSE, Vol.01 No.02, pp 47-51 June 2011. [20] Md. Abdul Alim, Yucheng Wu, Wei Wang,” A Fuzzy Base Clustering Protocol for Energy-Efficient Wireless Sensor Networks.” Proceeding of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013), pp. 2874-2878. Authors Yogesh Kumar Fulara PEC University of Technology, Chandigarh. .