Chapter: Sensor Networks: Index
Chapter: Sensor Networks: Index
Chapter: Sensor Networks: Index
Index
1. Introduction 2
2. Applications 3
3. Characteristics 4
4. challenging issues 5
5. Advantages of WSN 6
6. Design Issues 7
7. Architecture 9
8. Sensor Deployment 11
i. Issues and Challenges 11
ii. Self-Organization 12
iii. Localization 12
9. Conclusion and Future Work 17
1
Zeeshan A. Haq,
1. Introduction to Sensor Networks
A Sensor Network is composed of number of Sensor Nodes (SN) connected together over
a network comprising various topologies which depends upon the type of applications.
An SN typically consist of following components:
Transceiver
2
Zeeshan A. Haq,
(a) (b) (c)
Query from Base Station (BS) to Sensor Node (SN) (or Source Node), indicates
frequency of transmitting sensed data and type of sensed data to be sent.
Data from SNs are sent back to the BS or Sink Node.
So, source of data can be any SN while the destination is always the BS.
Sometime the query may ask for multiple parameters such as temperature, pressure,
humidity, etc, and may be required to sense and transmit the values only once, or over a
period of time, or some past history.
Based on these, the query can be divided into three categories:
o One time Queries; send current value of data
o Persistent Queries; send data every 5 minutes for next 2 hours
o Historical Queries; what was the data 2 days ago.
These networks are ‘data centric’ i.e., unlike traditional networks where data is
requested from a given specific location, here, data is requested based on certain
attributes such as ‘which SN has temperature over 35°C’
WSN could be considered as flat architecture, or clusters of SNs could be formed to
facilitate easiness in control, localization of data communication, and aggregation of data.
Judging by the interest shown by the military, academia, and the media, innumerable
applications exists for WSNs of which some are mentioned below:
Distributed Computing
o Weather Prediction, wild forest fire, Monitoring endangered species
3
Zeeshan A. Haq,
o Machinery, Large bridges and tall structures
3. Characteristics
Static Topology:
If the nodes are not mobile, the network topology may not change at all.
Energy-Constrained Operation:
All SNs in a WSN rely on batteries and other exhaustible means for their energy. For
these nodes, the most important system design optimization criteria may be energy
conservation.
Power-Manageable components:
Several functional states such as sleep, deep-sleep provide different QoS with different
power consumption.
Sensor Design
Single objective sensors or multiple objective sensors
Cooperation
Cooperation among sensors in forwarding data
Data Reduction
Data Aggregation and interpolation
4
Zeeshan A. Haq,
Limited Bandwidth
Wireless links continue to have significantly lower capacity than an infrastructure
network.
Wireless Communication
Realized throughput of wireless communications – after accounting for the effects of
multiple access, fading, noise, and interference conditions, etc., is often much less than a
radio’s maximum transmission rate
Security Threats
Generally more prone to physical security threats than fixed-cable nets. The increased
possibility of eavesdropping, spoofing, and minimization of denial-of-service type attacks
should be carefully considered
4. Challenging Issues
The WSN is plagued with many challenges while designing the network and deploying the
nodes. Some of the challenges are discussed below.
Wireless Communication
o Access Medium
5
Zeeshan A. Haq,
Since the network is wireless in nature, the bandwidth is low. With increase in
number of users, it becomes cumbersome to facilitate all the users at a same time.
In order to make an optimize use of the network; we make use of various wireless
access protocols.
o Ad-Hoc vs Infrastructure
o Self-Organizing topology and routing
As the sensor nodes are deployed, the first mechanism of all these nodes is to
establish the network. As the number of rounds keeps on increasing, nodes starts
to die out, and network life-time keeps on reducing. Thus in order to keep the
optimization of the network at highest, the nodes keep-on organizing themselves
in most optimised manner.
Continuous operation
A node once deployed has to work continuously for a long period of time (defined by
application) and during that time it has to constantly monitor the region and communicate
the data back to BS depending upon the type of queries from the BS
5. Advantages of WSN
Although most of today’s sensors are still wired, however, the wireless sensor offers
significant advantage over the wired sensors. Some of these advantages are mentioned below:
6
Zeeshan A. Haq,
Avoid unsafe or unwise repeated field studies.
Deploy one time and get data for a long term.
Economical method for long term data collection
Appropriate design of sensor nodes.
Multi-objective sensors and single objective sensors.
Cooperation among sensors
Data aggregation and interpretation.
WSNs are made of large number of tiny sensor nodes, which have limited power and less
processing capability. The life time of the individual sensor node is not easily predictable and
also the network needs to be formed autonomously as it is not possible to manually set up the
sensor network for all applications. The sensor network also consists of several different
kinds of nodes hence heterogeneity needs to be supported. The number of sensor nodes in the
network is not constant throughout the life-time of the network. It may vary because of
addition of senor nodes or reduction of nodes due to their death. The major factors that need
to be considered while designing sensor network are listed below:
Fault Tolerance: Possibility of node failure and change of topology of network is quite
high in case of WSN. Hence the designer of network should make the network robust and
reliable even in case of node failures and topology changes. The network should
function smoothly and normally irrespective of node failures and topology changes.
Life Time: WSN are supposed to work for a quite long time with low power
consumption. They are supposed to last at-least for 6 months to 1 year. We need to keep
in mind that every node in WSN may be powered using just a 3 V battery and this should
be sufficient for the entire life time of the node. The design of protocols of WSN should
be such that the node consumes as less energy as possible. This will help in making the
WSN last longer.
Scalability: The design of WSN should support addition of new nodes any time and also
the design should support large number of nodes because some applications in WSN may
require quite a huge number of sensor nodes.
7
Zeeshan A. Haq,
Date Aggregation: The sensor nodes in WSN are located close to each other hence the
possibility of similar data being generated by the nodes next to each other is quite high.
So the data needs to be aggregated and the duplicate data needs to be avoided because the
transmission and reception data is the most costly affair in WSN. The data needs to be
aggregated at different levels in WSN so that only the necessary data is transmitted and
received and the redundant data is not communicated.
Cost: The cost of each sensor node is supposed to be Rs 1000/-, as WSN can have large
number of sensor nodes the total cost of the network can become a quite expensive affair.
So the designer of WSN needs to decide on the optimal number of nodes necessary for
the application.
Medium Access Scheme: Communication is a major source of energy consumption in
WSNs and MAC protocols directly control the radio of the nodes in the network. MAC
protocols should be designed for regulating energy consumption, which in turn influences
the lifetime of the network. The MAC layer provides fine-grained control of the
transceiver and allows on and off switching of the radio. The design of the MAC protocol
should have this switching mechanism to decide when and how frequently the on and off
mechanism should be done. This helps in conserving of energy.
A MAC protocol should have minimum latency and high throughput when the sensor
networks are deployed in critical applications. A MAC protocol should include Message
Passing. Message passing means dividing a long message into small fragments and
transmit them in burst. Thus, a node which has more data gets more time to access the
medium.
Environment: The environment in which the WSN is deployed can be very demanding,
so the design of WSN should be such that WSN should be able to survive regardless of
the conditions in which WSN s deployed. Heterogeneity Support: The protocols designed
for WSN should support different kinds of sensor nodes and also be able to support
variety of applications
Data Aggregation and Data Dissemination: Data gathering is the main objectives of
sensor nodes. The sensors periodically sense the data from the surrounding environment,
process it and transmit it to the base station or sink. The frequency of reporting the data
and the number of sensors which report the data depends on the particular application.
Data gathering involves systematically collecting the sensed data from multiple sensors
and transmitting the data to the base station for further processing. But the data generated
8
Zeeshan A. Haq,
from sensors is often redundant and also the amount of data generated may be very huge
for the base station to process it.
Data dissemination is a process by which data and the queries for the data are routed in
the sensor network. Data dissemination is a two-step process. In the first step, if a node is
interested in some events, like temperature or humidity, then it broadcasts its interests to
its neighbours periodically and then through the whole sensor network. In the second
step, the nodes that have the requested data will send the data back to the source node
after receiving the request
Autonomous Operations: The WSN should be able to organize, reorganize and operate
autonomously because sometimes WSN deployed in places where human habitation is
not possible.
Limited Memory and Processing Capability: The sensor nodes have very limited
memory, power and processing capabilities, so all designs of WSN should not be
demanding in terms of processing requirements or memory requirements
7. Architecture
The most common WSN architecture follows the OSI architecture Model. The architecture of
the WSN includes five layers and three cross layers. Mostly in sensor network we require five
layers, namely application, transport, network, data link & physical layer. The three cross
planes are namely power management, mobility management, and task management. These
layers of the WSN are used to accomplish the network and make the sensors work together in
order to raise the complete efficiency of the network
Application Layer
Transport Layer
Network Layer
Physical Layer 9
Zeeshan A. Haq,
Figure 3: Architecture of Wireless Sensor Network
Application Layer
The application layer is liable for traffic management and offers software for numerous
applications that convert the data in a clear form to find positive information. Sensor
networks arranged in numerous applications in different fields such as agricultural, military,
environment, medical, etc.
Transport Layer
The function of the transport layer is to deliver congestion avoidance and reliability where a
lot of protocols intended to offer this function are either practical on the upstream. These
protocols use dissimilar mechanisms for loss recognition and loss recovery. The transport
layer is exactly needed when a system is planned to contact other networks. Providing a
reliable loss recovery is more energy efficient and that is one of the main reasons why TCP is
not fit for WSN. In general, Transport layers can be separated into Packet driven, Event
driven. There are some popular protocols in the transport layer namely STCP (Sensor
Transmission Control Protocol), PORT (Price-Oriented Reliable Transport Protocol and
PSFQ (pump slow fetch quick).
Network Layer
The main function of the network layer is routing, it has a lot of tasks based on the
application, but actually, the main tasks are in the power conserving, partial memory, buffers,
and sensor don’t have a universal ID and have to be selforganized. The simple idea of the
routing protocol is to explain a reliable lane and redundant lanes, according to a convinced
scale called metric, which varies from protocol to protocol. There are a lot of existing
protocols for this network layer, they can be separate into; flat routing and hierarchal routing
or can be separated into time driven, query-driven & event driven.
The data link layer is liable for multiplexing data frame detection, data streams, MAC, &
error control, confirm the reliability of point–point (or) point– multipoint.
10
Zeeshan A. Haq,
Physical Layer
The physical layer provides an edge for transferring a stream of bits above physical medium.
This layer is responsible for the selection of frequency, generation of a carrier frequency,
signal detection, Modulation & data encryption. IEEE 802.15.4 is suggested as typical for
low rate particular areas & wireless sensor network with low cost, power consumption,
density, the range of communication to improve the battery life. CSMA/CA is used to support
star & peer to peer topology. There are several versions of IEEE 802.15.4.V.
8. Sensor Deployment
Sensors are deployed in a deterministic manner: nodes are placed manually keeping in mind
the Region of Interest (RoI), Range of Sensing, and Range of Communication. This
deployment is feasible in an accessible region. But, if the region is inaccessible or untested
and unknown, we have to make way for random deployment where large number of sensor
node are dropped from air and they create their own network on being switched on.
The performance of WSNs depends largely on the deployment of the sensor nodes as well as
their life time mainly determined by the energy consumption. The emergence of WSN as one
of the dominant technologies in the coming decade has posed numerous challenges to
researchers. These networks are generally composed of hundreds, and potentially thousands
of tiny sensors nodes, functioning autonomously, and in many cases without access to
renewable energy resources. WSN challenges are proposed in four broad categories such as:
limiting radio operations, data management, geographic routing, and system monitoring
maintenance.
Some of the challenges in while deploying the sensor nodes are discussed here:
When sensor nodes are deployed in real world, Node death due to energy depletion either
caused by normal battery discharge or due to short circuits is a common problem which
may lead to wrong sensor readings. Also sink nodes acts as gateways and they store and
forward the data collected. Hence, problems affecting sink nodes should be detected to
minimize data loss.
11
Zeeshan A. Haq,
Deployment of sensor networks results in network congestion due to many concurrent
transmission attempts made by several sensor nodes. Concurrent transmission attempts
occur due to inappropriate design of the MAC layer or by repeated network floods.
Another issue is the physical length of a link. Two nodes may be very close to each other
but still they may not be able to communicate due to physical interference in the real
world while nodes which are far away may communicate with each other.
Low data yield is another common problem in real world deployment of sensor nodes.
Low data yield means a network delivers insufficient amount of information.
Self-Configuration of sensor networks without human intervention is needed due to
random deployment of sensor nodes.
8.2 Self-Organization
An Ad hoc Sensor Network is a self-organizing multi- hop wireless network, which relies
neither on fixed infrastructure nor on predetermined connectivity. This property enables rapid
deployment without precise prior knowledge of the coverage area of interest; hence serves
well for situations lacking fixed infrastructure or high risk, e.g., in military communications,
disaster management, law enforcement, and etc.
8.3 Localization
12
Zeeshan A. Haq,
3. Trilateration: Location of node is estimated through distance measurement from three
nodes. In this concept, intersection of three circles is calculated, which gives a single
point which is a position of un-localized node.
4. Multilateration: In this concept, more than three nodes are used in location estimation.
5. Triangulation: In this mechanism, at least two angles of an un-localized node from
two localized nodes are measured to estimate its position. Trigonometric laws, law of
sines and cosines are used to estimate node position
Localized schemes are classified as anchor based or anchor free, centralised or distributed,
GPS based or GPS free, fine grained or coarse grained, stationary or mobile sensor nodes and
range based or range free.
1. Anchor based or Anchor free: In anchor based mechanism, the position of few
nodes is known. Un-localized nodes are localised by these known node positions.
Accuracy is highly depending on the number of anchor nodes. Anchor free algorithm
estimate relative positions on nodes instead of computing absolute node position.
3. GPS Based and GPS Free: GPS based schemes are very costly because GPS
receiver has to be put on every node. Localization accuracy is very high as well. GPS-
free algorithms do not use GPS, and they calculate the distance between the nodes
relative to local network and are less costly as compared with GPS-based schemes.
Some nodes need to be localised through GPS which are called anchor beacon nodes
that initiate the localization process.
13
Zeeshan A. Haq,
4. Coarse Grained or Fine Grained: Fine grained localization schemes result when
localization methods use features of received signal strength, while coarse grained
localization schemes result without using received signal strength.
HOP Terrain: hop terrain is similar to DV hop method in finding the distance
between anchor node and un-localized node. There are two parts in the method.
In the first part, un-localized node estimates its position from anchor node by
using average hop distance formula which is distance between two nodes/total
number of hops. This is initial position estimation. After initial position
estimation the second part executes, in which initial estimated position is
broadcast to neighbour nodes. Neighbour nodes receive this information with
distance information. A node refines its position until final position is met by
using least square method.
14
Zeeshan A. Haq,
Centroid System: centroid system uses proximity based grained localisation
algorithm that uses multiple anchor node, which broadcast their locations with
(Xi, Yi) coordinates. After receiving information, un-localised nodes estimate
their position. Anchor nodes are randomly deployed in the network area, and they
localize themselves through GPS receiver. Node localizes itself after receiving
anchor node beacon signals using the following relation:
X i ,+… … …+ X n Y i ,+… … … …+ ,Y n
( X est ,Y est ) =( , )
N N
Where Xest nad Yest are the estimated locations of un-localised node.
15
Zeeshan A. Haq,
multi-lateration. It also uses hop count values which is initially set to zero and is
incremented when it propagates to other neighbouring nodes. Every sensor nodes
takes information of the shortest path from anchor nodes. Gradient algorithm
follows step given below:
Anchor nodes broadcasts beacon message containing its coordinate and hop
count value.
Un-localised node calculates shortest path between itself and the anchor node
from which it receives beacon signals. To calculate estimated distance
between anchor node and un-localised node, the following mathematical
equation is used: D ji=h j , Ai d hop where dhop is the estimated distance covered
by one hop.
Error equation is used to get minimum error which node calculates its
coordinate by using multi-lateration.
16
Zeeshan A. Haq,
Time Difference of Arrival (TDOA): in this technique the time difference of
arrival radio and ultrasound signal is used. Each node is equipped with
microphone and speaker. Anchor node sends signals and waits for some fixed
amount of time which is tdelay, and then it generates “chirps” with the help of
speaker. These signals are received by un-localised node at tradio time. When un-
localised node receives anchor’s radio signals, it turns on microphone. When
microphone detects chirps sent by anchor node, un-localised nodes saves the time
tsound. Un-localised node uses this time information for calculating the distance
between anchor and itself using the following relation
Time of Arrival (TOA): in TOA, speed of wavelength and time of radio signals
travelling between anchor node and un-localised node is measured to estimate the
location of un-localised node. GPS uses TOA, and it is a highly accurate
technique; however, it requires high processing capability.
Out of these localization techniques, it is observed that GPS and TOA based systems are
more expensive as compared with DV hop and RSSI. It is also observed that localisation
mechanism equipped with GPS systems is highly accurate. GPS-based localization
mechanisms are less energy efficient while RSSI based mechanism are highly energy
efficient.
Sensor networks are perhaps one of the fastest growing areas in the broad wireless ad hoc
networking field. Research in sensor networks is flourishing at a rapid pace and still there are
many challenges to be addressed such as:
Energy Conservation - Nodes are battery powered with limited resources while still
having to perform basic functions such as sensing, transmission and routing
Sensing - Many new sensor transducers are being developed to convert physical quantity
to equivalent electrical signal and many new development is anticipated
17
Zeeshan A. Haq,
Communication - Sensor networks are very bandwidth-limited and how to optimize the
use of the scarce resources and how can sensor nodes minimize the amount of
communication
Computation - Here, there are many open issues in what regards signal processing
algorithms and network protocols
Applications - Many new applications are being developed and people are using their
imagination to explore potential use
18
Zeeshan A. Haq,
19
Zeeshan A. Haq,
Yusuf anjum
Shivang
6th april
20
Zeeshan A. Haq,
21
Zeeshan A. Haq,
22
Zeeshan A. Haq,
12th april
23
Zeeshan A. Haq,
24
Zeeshan A. Haq,
Yusuf anjum
Not responding
25
Zeeshan A. Haq,
13th april
26
Zeeshan A. Haq,
27
Zeeshan A. Haq,
28
Zeeshan A. Haq,
22nd April
29
Zeeshan A. Haq,
30
Zeeshan A. Haq,
31
Zeeshan A. Haq,
32
Zeeshan A. Haq,