0% found this document useful (0 votes)
76 views4 pages

A Review On Wireless Sensor Network

If sensor networks are to attain their potential, security is one of the most important aspects to be taken care of. The need for security in military applications is obvious, but even more benign uses, such as home health monitoring, habitat monitoring and sub-surface exploration require confidentiality. WSNs are perfect for detecting environmental, biological, or chemical threats over large scale areas, but maliciously induced false alarms could completely negate value of the system. , habitat monitoring, and traffic control are presented. Technical challenges in sensor network development include network discovery, control and routing, collaborative signal and information processing, tasking and querying, and security. The paper concludes by presenting some recent research results in sensor network algorithms, including localized algorithms and directed diffusion, distributed tracking in wireless ad hoc networks, and distributed classification using local agents. R. Krithika | S. Nidhi | V. Sandhiya"A Review on Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18244.pdf http://www.ijtsrd.com/computer-science/computer-network/18244/a-review-on-wireless-sensor-network/r-krithika

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views4 pages

A Review On Wireless Sensor Network

If sensor networks are to attain their potential, security is one of the most important aspects to be taken care of. The need for security in military applications is obvious, but even more benign uses, such as home health monitoring, habitat monitoring and sub-surface exploration require confidentiality. WSNs are perfect for detecting environmental, biological, or chemical threats over large scale areas, but maliciously induced false alarms could completely negate value of the system. , habitat monitoring, and traffic control are presented. Technical challenges in sensor network development include network discovery, control and routing, collaborative signal and information processing, tasking and querying, and security. The paper concludes by presenting some recent research results in sensor network algorithms, including localized algorithms and directed diffusion, distributed tracking in wireless ad hoc networks, and distributed classification using local agents. R. Krithika | S. Nidhi | V. Sandhiya"A Review on Wireless Sensor Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18244.pdf http://www.ijtsrd.com/computer-science/computer-network/18244/a-review-on-wireless-sensor-network/r-krithika

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

International Journal of Trend in Scientific

Research and Development (IJTSRD)


International Open Access Journal
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume - 2 | Issue – 5

A Review on Wireless Sensor Network


R. Krithika
Krithika, S. Nidhi, V. Sandhiya
Science, 2nd B.SC Computer Tecnology,
Department of Computer Science Tecnology
Sri Krishna Adhiya College of Arts and Science, Kovaiputhur Pirivu, Coimbatore,, Tamil Nadu, India

ABSTRACT
If sensor networks are to attain their potential, generating new capabilities for reconnaissance and
security is one of the most important aspects to be surveillance as well as other tactical applications.
taken care of. The need for security in military Typical applications of sensors include emergency
applications is obvious, but even more benign uses, response information, energy management, medical
such as home health monitoring, habitat monitoring monitoring, inventory control,
contr and battlefield
and sub-surface
surface exploration require confidentiality. management. If sensor networks are to attain their
WSNs are perfect for detecting environmental, potential, secure communication techniques must be
biological, or chemical threats over large scale areas, developed in order to protect the system and its users.
but maliciously induced false alarms could completely
negate value of the system. , habitat monitoring, and 1. HISTORY OF RESEARCH ABOUT SENSOR
traffic control are presented. Technical chal
challenges in NETWORK:
sensor network ork development include network To understand the tradeoffs in today’s
toda WSNs, it is
discovery, control and routing, collaborative signal helpful to briefly examine their history. Like many
and information processing, tasking and querying, and advanced technologies, the origin of WSNs can be
security. The paper concludes by presenting some seen in military and heavy industrial applications, far
recent research results in sensor network algor
algorithms, removed from the light industrial and consumer WSN
including localized algorithms and directed diffusion, applications that are prevalent today. The first
distributed tracking in wireless ad hoc networks, and wireless network that bore any real resemblance to a
distributed classification using local agents. modern WSN is the Sound Surveillance System
(SOSUS), developed by the United States Military in
Key words: Wireless Sensor Networks, Security the 1950s to detect and track Soviet submarines. This
Protocols, Network Threats, querying and taskitasking, network used submerged acoustic sensors sens –
sensor networks, tracking and classification, wireless hydrophones – distributed in the Atlantic and Pacific
network. oceans. This sensing technology is still in service
today, albeit serving more peaceful functions of
INTRODUCTION monitoring undersea wildlife and volcanic activity.
Networked micro sensors technology is a key Echoing the investments made in the 1960s and
a 1970s
technology for the future. In September 1999, to develop the hardware for today’s Internet, the
Business Week heralded it as one of the 21 most United States Defense Advanced Research Projects
important technologies for the 21st century. Cheap, Agency (DARPA) started the Distributed Sensor
smart devices with multiple onboard sensors, Network (DSN) program in 1980 to formally explore
networked through wireless
eless links and the Internet and the challenges in implementing distributed/wireless
deployed in large numbers, provide unprecedented sensor networks. With the birth of DSN and its
opportunities for instrumenting and controlling progression into academia through partnering
homes, cities, and the environment. In addition, universities such as Carnegie Mellon University and
networked micro sensors provide the technology for a the Massachusetts Institute of Technology Lincoln
broad spectrum of systemss in the defense arena, Labs, WSN technology soon found a home in

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug


Aug 2018 Page: 2169
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
academia and civilian scientific research. B. Underground WSNs
Governments and universities eventually began using Underground WSNs are sequence of few of the sensor
WSNs in applications such as air quality monitoring, nodes located inside the earth crust or in a cave or in a
forest fire detection, natural disaster prevention, mine and they may be utilized to monitor
weather stations and structural monitoring. Then as underground activities together with volcanic
engineering students made their way into the situations and many others. Extra sink or BS nodes
corporate world of technology giants of the day, such are positioned above crust of earth to transmit info
as IBM and Bell Labs, they began promoting the use from the sensor nodes to the BS .These kind of WSN
of WSNs in heavy industrial applications such as are a entire. More high priced than a ground
power distribution, waste-water treatment and (terrestrial) WSN in phases of equipment,
specialized factory automation. While the market maintenance and deployment.
demand for WSNs was strong, moving beyond these
limited applications proved to be a challenge. The Underground sensor nodes are extra high priced
military, science/technology and heavy industrial because vital device parts ought to be decided on to
applications of previous decades were all based on ensure reliable communiqué thru soil, water, rocks,
bulky, expensive sensors and proprietary networking and other contents residing internal crust. The inside
protocols. These WSNs placed a premium on circumstances atmosphere create wirelessly
functionality and performance, while other factors communiqué a challenge because of highest levels of
such as hardware and deployment costs, networking signal losses and attenuation.
standards, power consumption and scalability fell to
the wayside. The combination of high cost and low C. Aquatic (Underwater) WSNs :
volume prevented the widespread adoption and Aquatic WSNs comprise of few of sensor nodes and
deployment of WSNs into a broader range of vehicles diffuse under water. As opposite to ground
applications. WSNs, aquatic sensor nodes are more high-priced and
lesser sensor nodes are diffuse in sensing area. Self-
TYPE OF WSN: directed aquatic vehicles are utilized for collecting or
According to formerly research paintings completed exploration data from sensor nodes. As in evaluation
five forms of WSN are feasible relying upon wherein to a dense diffuse of sensor nodes in a ground WSN, a
and how sensors are installed up to monitor info. sparse diffuse of sensor nodes is located at sea level.
According to these properties of sensor deployment Typical aquatic (underwater) wirelessly
we are able to classify WSNs into five primary sorts communications are implemented through
namely; underground WSN, Ground (terrestrial) transmission of acoustic waves.
WSN, aquatic (underwater) WSN, and mobility
WSNs. D. Multi-media WSNs:
Multi-media WSNs are mixture of a no. of lowest
A. Ground (Terrestrial) WSNs: price sensor nodes well-appointed with microphones
Usually include hundreds to thousands of cheap WSN and cameras. These sensor nodes interconnected with
deployed randomly in a given sensing region. Sensor every different over a wirelessly connection for data
nodes can be dropped from a randomly and plane sensing, records processing, statistics correlation, and
located into the target region in ad hoc diffuse. In a records compression. Multi-media WSNs are utilized
ground (terrestrial) WSN, reliable communiqué in a to allow monitoring of events inside the shape of
dense atmosphere is very vital. Ground sensor nodes multimedia programs.
must be able to efficiently communicate info return to
the BS. While battery power is constrained resource E. Mobile WSNs:
aid and its important constraint on network Mobility WSNs are a no. of transferring sensor with
performance and its able to not be rechargeable or their interplay with sensing atmosphere. Moving
replaceable again, ground sensor nodes however can sensor nodes have the potential to compute, like non-
be well found with a secondary power source e.g. moving nodes. Mobility WSNs are utilized in military
battery or solar cell. So due to this it is always and other industrial applications].
important for sensor nodes to conserve energy.

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 2170
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
SENSOR LOCATION AWARE SERVICES: automatic traffic data collection must be employed for
1. Smart Home/Smart Office : efficient management of rush hour traffic. Research
Smart home environments can provide custom on this topic is considered as part of the Intelligent
behaviors for a given individual. Considerable amount Transport System (ITS) research community.
of research has been devoted to this topic. The Chinrungrueng (2006) explained ITS to be the
research on smart homes is now starting to make its application of the computers, communications, and
way into the market. It takes a considerable amount of sensor technology to surface transportation. The
work and planning to create a smart home. There are vehicle tracking application is to locate a specific
many examples of products currently on the market vehicle or moving object and monitor its movement.
which can perform individual functions that are This work also describes design of WSN for vehicular
considered to be part of a smart home. Several useful monitoring. As the power source (battery) is limited,
applications which take advantage of information it is important that a design of sensor node is power
collected by WSN are presented by Hussain et al. efficient.
(2009). 5. Structural Healthcare:
2. Lilitary: Structures are inspected at regular time intervals, and
New and emerging technologies, such as networks, repairing or replacing based on the time of use, rather
support military operations by delivering critical than on their working conditions. Tiwari et al. (2004)
information rapidly and dependably to the right has explained that sensors embedded into structures
individual or organization at the right time. This enable condition based maintenance of these assets.
improves the efficiency of combat operations. The Wireless sensing will allow assets to be inspected
new technologies must be integrated quickly into a when the sensors indicate that there may be a
comprehensive architecture to meet the requirements problem. This will reduce the cost of maintenance and
of present time. Improvement in situation awareness preventing harmful failure. These applications include
(Chien Chung Shen, 2001) is must requirement. sensors mounted on heavy duty bridges, within
Doumit and Agrawal (2002) described some other concrete and composite materials (Arms et al. 2001),
important application is detection of enemy units’ and big buildings.
movements on land/sea, sensing intruders on bases, 6. Agriculture:
chemical/biological threats and offering logistics in Wang and Wang (2006) stated that agriculture can
urban warfare. Command, control, communications, also be benefited by the deployment of WSN to get
computing, intelligence, surveillance, reconnaissance, the information regarding soil degradation and water
and targeting systems are well described by Akyildiz scarcity. With help of WSNs we can check the clean
(2002). water consumed in irrigation and manage it.
3. Industrial & Commercial:
Since the long time wireless transmission of data is 1.2. Topology and Coverage Control:
being done in industrial applications, but recently it Topology control is one of the fundamental problems
has gained importance. Successful use of wireless in WSNs. It has great importance for prolong lifetime,
sensors in systems such as supervisory control and reducing radio interference, increasing the efficiency
data acquisition has proved that these devices could of media access control protocols and routing
effectively address the needs of industrial protocols. It also ensures the quality of connectivity &
applications. The critical process applications of coverage and increase in the network service as well.
WSNs in industry are monitoring temperature, flow A significant progress in research can be seen in
level, and pressure parameters. With the rapidly WSNs topology control. Many topology control
increasing technological advances in wireless algorithms have been developed till date, but
technology and its subsequently decreasing prices, problems such as lack of definite and practical
numerous wireless applications are being developed algorithm, lack of efficient measurement of network
in industry. WSN in manufacturing industries can performance and idealness of mathematical model
monitor and optimize quality control. still exist. Several graph models used in topology
4. Traffic Management and Monitoring: control, the present hot spots and the future trends on
Every big city is suffering from traffic congestion the research of topology control are presented by
around the world. A sincere effort is being made to Jardosh and Ranjan (2008).
solve the traffic congestion. Congestion can be
alleviated by planning managing traffic. A real time

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 2171
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
1.3. Quality of Service (QoS) Provision: centralized data processing server. The location of a
QoS support is challenging due to severe energy and sensor initiating data communication, and other such
computational resource constrains of wireless sensors. context information, may also be the focus of privacy
Various service properties such as the delay, concerns. In real world applications of WSNs,
reliability, network lifetime, and quality of data may effective countermeasures against the disclosure of
conflict; for example, multipath routing can improve both data and context oriented private information are
the reliability; however it can increase the energy indispensable prerequisites. Privacy protection in
consumption and delay due to duplicate various fields related to WSNs, such as wired and
transmissions. Modeling such relationships, wireless networking, databases and data mining, has
measuring the provided quality, and providing means been extensively studied by Li and Das (2009).
to control the balance is essential for QoS support. Effective privacy preserving techniques are needed
There are various research opportunities in enhancing for the unique challenges of WSN security.
the QoS of WSNs. One of the researches is the project
described by Abidin (2009) that analyzes and 1.6. Biomedical/Medical:
enhances the performance of a WSN by deploying a The uses of WSNs in biomedical and medical are in
simple max min fairness bandwidth allocation growing phase. Biomedical wireless sensor networks
technique. (BWSNs) show the future opportunities for
supporting mobility while monitoring vital body
1.4. Mobility management: functions in hospital and home care.
Mobility is one of the most important issues in next
generation networks. As WSNs are becoming the next REFERENCE:
elements of the future Internet, it is crucial to study 1. N. M. Nair, J. S. Terence, "Survey On Distributed
new models that also support mobility of these nodes. Data Storage Schemes In Wireless Sensor
WSNs are applicable in variety of cases that make it Networks", Indian Journal of Computer Science
difficult to produce a standard mobility scenario. and Engineering (IJCSE), Vol.4, No.6, pp.1-6,
Following are some cases where the mobile support is 2014.
necessary presented in Camilo (2008). Intra WSN 2. Communication Engineering, Vol.4, Issue.4,
device movement is probably the most common pp.289-295, 2015.
scenario in WSNs architectures, where each sensor
3. Jaydip Sen, “A Survey on Wireless Sensor
node has the ability to change from its local position
Network Security”, International Journal of
at run time without losing the connectivity with the Communication Networks and Information
sensor router (SR). In the case of inter WSN device Security, Vol.1, No.2, pp.1-16, 2009.
movement, sensor nodes move between different
sensor networks, each one with its SR responsible to 4. Xiaoliang Menga, Xiaochuan Shia, Zi Wangb,
configure and manage all the aggregated devices. A Shuang Wua, Chenglin Lia, “A grid-based reliable
research project of IETF working group NEMO, an routing protocol for wireless sensor networks with
example of WSN movement is described in RFC3963 randomly distributed clusters”, Elsevier, Vol.51,
by Devarapalli (2005). Sensor network deployed in a NO.11, pp.47–61, 2016.
moving bus is a real scenario of this type. It is 5. Hacene fouchal, javier biesa, elena romero, alvaro
possible to have a scenario where a sensor network araujo, octavio nieto taladrez, “a security scheme
can use another sensor network in order to be for wireless sensor networks”, 2016 IEEE Global
connected through Internet. MANEMO (Wakikawa et Communications Conference (GLOBECOM),
al., 2007) project is also an example. Washington, pp.1-5,2016.
6. Gagandeep Kaur, Deepali, Rekha Kalra,
1.5. Security and Privacy Concern:
The field that paid less attention is the privacy “Improvement and analys security of WSN from
concern on information being collected, transmitted, passive attack”, 2016 5th International Conference
and analyzed in a WSN. Such private information of on Reliability, Infocom Technologies and
concern may include payload data collected by Optimization (Trends and Future Directions)
sensors and transmitted through the network to a (ICRITO), Noida, pp.420-425, 2016.

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 2172

You might also like