Wireless Sensor Networks: Introduction, Advantages, Applications and Research Challenges
Wireless Sensor Networks: Introduction, Advantages, Applications and Research Challenges
net/publication/296802403
Article in HCTL Open International Journal of Technology Innovations and Research (IJTIR) · May 2015
CITATIONS READS
18 15,752
4 authors:
64 PUBLICATIONS 1,629 CITATIONS
Govt. Women Engineering College Ajmer
9 PUBLICATIONS 30 CITATIONS
SEE PROFILE
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Multi-Objective Performance Optimization of Microstrip Patch Antenna for Wide-Band Applications View project
All content following this page was uploaded by Raj Gaurav Mishra on 05 March 2016.
Abstract
Keywords
WSN, Self-Positioning Algorithm, Localization Algorithm
Wireless technologies differ in a number of dimensions, most notably in just how much
bandwidth they provide and how far apart communicating nodes can be. Other important
differences include which perhaps the electromagnetic spectrums they choose (including
whether or not this has a license) and exactly how much power them consume (very
important to mobile nodes). In this section we discuss four prominent wireless
technologies: Bluetooth (802.15.1), Wi-Fi (more formally generally known as 802.11), Wi-
MAX (802.16), and third-generation or 3G cellular wireless. In the following sections we
present them as a way from shortest range to longest range. Table 2.1 gives an
introduction to these technologies and the way they connect with one another [1].
1
M.Tech Scholar, Central University of Jharkhand, India.
2
Assistant Professor, Govt. Women Engineering College, Ajmer, Rajasthan, India.
3
Faculty Member, FST, The ICFAI University, Dehradun, India.
4
Assistant Professor, J.K. Lakshmipati University, Jaipur, Rajasthan, India.
Prashant Tiwari, Varun Prakash Saxena, Raj Gaurav Mishra, Devendra Bhavsar, Page 1
Wireless Sensor Networks: Introduction, Advantages, Applications and Research Challenges.
HCTL Open International Journal of Technology Innovations and Research (IJTIR)
http://ijtir.hctl.org
Volume 14, April 2015
e-ISSN: 2321-1814, ISBN (Print): 978-1-62951-946-3
One of the most traditionally used wireless links today are usually asymmetric, i.e., both
endpoints are usually kinds of nodes. One endpoint, sometimes termed the base-station,
normally has no mobility, but has a wired (or at best high bandwidth) link to the internet or
other networks as shown in Figure 1. The node in the opposite end from the link shown
because a “client node” can often be mobile and utilizes its link to the base station for
those its communication with other nodes [2].
1. Wireless PAN
2. Wireless LAN
3. Wireless MAN
4. Wireless WAN
5. Global Area Network [1]
Ad-hoc Networks
1. Mobility: the truth that nodes can be rapidly repositioned and/or move could be the
raison d ‘etre of random networks. Rapid deployment in areas without the need of
infrastructure often means that a gamers must explore a place along with perhaps
form teams/swarms that in turn coordinate among themselves to generate a
taskforce or a mission. You can have individual random mobility, group mobility,
Prashant Tiwari, Varun Prakash Saxena, Raj Gaurav Mishra, Devendra Bhavsar, Page 2
Wireless Sensor Networks: Introduction, Advantages, Applications and Research Challenges.
HCTL Open International Journal of Technology Innovations and Research (IJTIR)
http://ijtir.hctl.org
Volume 14, April 2015
e-ISSN: 2321-1814, ISBN (Print): 978-1-62951-946-3
motion along preplanned routes, etc. The mobility model might have major effect
on the selection of a routing scheme and can thus influence performance.
2. Multihopping: a multihop network is a network the spot that the path from source
to destination traverses other nodes. Random nets often exhibit multiple hops for
obstacle negotiation, spectrum reuse, and conservation. Battlefield covert
operations also favour a sequence of short hops to scale back detection by the
enemy.
3. Self-organization: the ad hoc network must autonomously determine its very own
configuration parameters including: addressing, routing, clustering, position
identification, power control, etc. Sometimes, special nodes (e.g., mobile
backbone nodes) can coordinate their motion and dynamically distribute from the
geographic area to supply coverage of disconnected islands.
4. Energy conservation: most ad hoc nodes (e.g., laptops, PDAs, sensors, etc.) have
limited power supply no power to generate their particular power (e.g., solar
power systems). High efficiency protocol design (e.g., MAC, routing, resource
discovery, etc) is important for longevity with the mission.
Vehicular Ad Hoc Networks (VANETs) have cultivated out of the have to support the
growing quantity of wireless items that very easily employed in the vehicles. These
products include remote keyless entry devices, personal digital assistants (PDAs), laptops
and mobile telephones. As mobile wireless devices and networks become increasingly
important, the need for Vehicle-to-Vehicle (V2V) and Vehicle to-Roadside (VRC) or
Vehicle-to-Infrastructure (V2I) Communication will continue to develop. VANETs can be
utilized to get a broad range of safety and non-safety applications, leave useful services
like vehicle safety, automated toll payment, traffic management, enhanced navigation,
location-based services for example choosing the closest fuel station, restaurant or travel
lodge and infotainment applications including providing access to the online world [6].
Prashant Tiwari, Varun Prakash Saxena, Raj Gaurav Mishra, Devendra Bhavsar, Page 3
Wireless Sensor Networks: Introduction, Advantages, Applications and Research Challenges.
HCTL Open International Journal of Technology Innovations and Research (IJTIR)
http://ijtir.hctl.org
Volume 14, April 2015
e-ISSN: 2321-1814, ISBN (Print): 978-1-62951-946-3
The idea-to-point signal transmissions occur throughout the air over the terrestrial
microwave platform rather than through copper or optical fiber therefore, fixed wireless
does not require satellite feeds or local phone service. Some great benefits of fixed
wireless add the ability to connect with users in remote areas with the necessity for laying
new cables and also the capacity for broad bandwidth that isn't impeded by fiber or cable
capacities. Fixed wireless devices usually derives their electrical energy from the public-
service corporation mains, unlike mobile wireless or portable wireless devices which are
generally battery powered [7].
With all the advances inside the miniaturization and integration of sensing and
communication Technologies, large-scale wireless sensor networks using a large number
of low-cost and low-power sensors are already developed. Within a wireless sensor
network, lots of money of tiny, battery-powered sensor nodes are scattered throughout a
physical area. Each sensor in the sensor network collects data, as an example, sensing
vibration, temperature, radiation along with other environmental factors [5].
Prashant Tiwari, Varun Prakash Saxena, Raj Gaurav Mishra, Devendra Bhavsar, Page 4
Wireless Sensor Networks: Introduction, Advantages, Applications and Research Challenges.
HCTL Open International Journal of Technology Innovations and Research (IJTIR)
http://ijtir.hctl.org
Volume 14, April 2015
e-ISSN: 2321-1814, ISBN (Print): 978-1-62951-946-3
Should the sensor network is used for monitoring the temperature within a building, it's
quite possible that we can are aware of the exact position of node. However, in the event
the sensor network is utilized for monitoring the temperature inside a remote forest, nodes
can be deployed from an airplane as well as the precise location coming from all sensor
might be unknown. An effective localization algorithm may then make use of all the
disposable information through the motes to compute each of the positions [8].
1. Less secure because hackers can enter the access point and obtain all the
information.
2. Lower speed as compared to a wired network.
3. More complicated to configure compared to a wired network.
4. Easily troubled by surroundings (walls, microwave, large distances due to signal
attenuation, etc).
5. It is easy for hackers to hack it we couldn’t control propagation of waves.
6. Comparatively low speed of communication.
7. Gets distracted by various elements like Blue-tooth.
8. Still Costly (most importantly).
Prashant Tiwari, Varun Prakash Saxena, Raj Gaurav Mishra, Devendra Bhavsar, Page 5
Wireless Sensor Networks: Introduction, Advantages, Applications and Research Challenges.
HCTL Open International Journal of Technology Innovations and Research (IJTIR)
http://ijtir.hctl.org
Volume 14, April 2015
e-ISSN: 2321-1814, ISBN (Print): 978-1-62951-946-3
being monitored (heat, pressure, sound, light, electro-magnetic flux, vibration, etc.), the
big event needs to be reported to at least one in the base stations, which often can than
take some appropriate action (e.g., send some text online or even a satellite). Wireless
sensor networks are utilized extensively within the water/wastewater industries. Facilities
not wired for power or data transmission can be monitored using industrial wireless I/O
devices and sensor nodes powered by solar panels or battery packs. Wireless sensor
networks are able to use numerous sensors to detect the existence of vehicles for
vehicles detection. Wireless sensor networks may also be employed to control the
temperature and humidity levels inside commercial greenhouses. If the temperature and
humidity drops below specific levels, the greenhouse manager might be notified via e-mail
or a cellular telephone text, or host systems can trigger misting systems, open vents, first
turn on fans, or control a multitude of system responses. Because some wireless sensor
networks are super easy to install, they've also been simple move if the needs with the
application change [2].
Prashant Tiwari, Varun Prakash Saxena, Raj Gaurav Mishra, Devendra Bhavsar, Page 6
Wireless Sensor Networks: Introduction, Advantages, Applications and Research Challenges.
HCTL Open International Journal of Technology Innovations and Research (IJTIR)
http://ijtir.hctl.org
Volume 14, April 2015
e-ISSN: 2321-1814, ISBN (Print): 978-1-62951-946-3
7. Water quality monitoring: Water quality monitoring involves analyzing water
properties in dams, rivers, lakes & oceans, and also underground water reserves.
The application of many wireless distributed sensors enables the creation of a
accurate map on the water status, and allows the permanent deployment of
monitoring stations in locations of difficult access, while not manual data retrieval.
8. Natural disaster prevention: Wireless sensor networks can effectively act to avoid
the results of disasters, like floods .Wireless nodes have successfully been
deployed in rivers where changes in the water levels have to be monitored in real
time [8].
9. Industrial monitoring:
Prashant Tiwari, Varun Prakash Saxena, Raj Gaurav Mishra, Devendra Bhavsar, Page 7
Wireless Sensor Networks: Introduction, Advantages, Applications and Research Challenges.
HCTL Open International Journal of Technology Innovations and Research (IJTIR)
http://ijtir.hctl.org
Volume 14, April 2015
e-ISSN: 2321-1814, ISBN (Print): 978-1-62951-946-3
networks, several cryptographic, steganography and other techniques are utilized
that happen to be renowned. In this section, we discuss the network security
fundamentals you bet the techniques are meant for wireless sensor networks [11].
4. Physical Layer Secure Access: Physical layer secure access in wireless sensor
networks may very well be offered by using frequency hopping. A dynamic
mixture of the parameters like hopping set (available frequencies for hopping),
dwell time (interval per hop) and hopping pattern (the sequence in which the
frequencies in the available hopping set is used) could be combined with a little
expense of memory, processing and resources. Important points in physical layer
secure access will be the efficient design in order that the hopping sequence is
modified in less time than is required to discover it and for employing this both
sender and receiver should maintain a synchronized clock. A scheme as
proposed in may be utilized which introduces secure physical layer access
employing the singular vectors while using channel synthesized modulation.
Attacks against wireless sensor networks may very well be broadly considered
from two different levels of views. One is the attack from the security mechanisms
and this band are brilliant from the basic mechanisms (like routing mechanisms).
Ideas signalize the most important attacks in wireless sensor networks [11].
Prashant Tiwari, Varun Prakash Saxena, Raj Gaurav Mishra, Devendra Bhavsar, Page 8
Wireless Sensor Networks: Introduction, Advantages, Applications and Research Challenges.
HCTL Open International Journal of Technology Innovations and Research (IJTIR)
http://ijtir.hctl.org
Volume 14, April 2015
e-ISSN: 2321-1814, ISBN (Print): 978-1-62951-946-3
introduce the evaluation criteria for localization in wireless sensor network. The
entire process of estimating the unknown node position inside the network is
known as node self-localization. And WSN comprises a large number of
inexpensive nodes which are densely deployed in a very region of interests to
measure certain phenomenon. The leading objective would be to determine the
location of the target [12]. Localization is significant travelers have an uncertainty
with the exact location of some fixed or mobile devices. One example has been in
the supervision of humidity and temperature in forests and/or fields, where
thousands of sensors are deployed by way of plane, giving the operator minimal
possible ways to influence may location of node. An efficient localization algorithm
might utilize all the free information from the wireless sensor nodes to infer the
positioning of the individual devices. Another application will be the positioning of
an mobile robot determined by received signal strength from your number of radio
beacons placed at known locations around the factory floor. The primary function
of an location estimation method to calculate the geographic coordinates of
network nodes with unknown position in the deployment area. Localization in
wireless sensor networks is the process of determining the geographical positions
of sensors. Only a number of the sensors (anchors) inside the networks have prior
knowledge about their geographical positions. Localization algorithms utilize
location information of anchors and estimates of distances between neighboring
nodes to discover the positions in the rest of the sensors [13].
Prashant Tiwari, Varun Prakash Saxena, Raj Gaurav Mishra, Devendra Bhavsar, Page 9
Wireless Sensor Networks: Introduction, Advantages, Applications and Research Challenges.
HCTL Open International Journal of Technology Innovations and Research (IJTIR)
http://ijtir.hctl.org
Volume 14, April 2015
e-ISSN: 2321-1814, ISBN (Print): 978-1-62951-946-3
deployment is rare.You can only speculate for the grounds for this. On one side, a
paper which only describes what actually transpired during a deployment seldom
constitutes novel research and could possibly be hard to get published. However,
people might often hide or ignore problems that are not directly related to their
field of research. It is additionally often tough to discriminate desired and non-
desired functional effects for the different layers or levels of detail [15].
References
[1] Wireless Networking Complete The Morgan Kaufmann Series in Networking Series Editor ,
David Clark, M.I.T., Pei Zheng, Feng Zhao, David Tipper, Jinmei Tatuya, Keiichi Shima, Yi
Qian, Larry Peterson, Lionel Ni, D. Manjunath, Qing Li, Joy Kuri, Anurag Kumar, Prashant
Krishnamurthy.
[2] Localization inWireless Sensor Networks, King-Yip Cheng ,The University of Hong Kong
December 2006.
[5] Wireless Sensor Networks1, F. L. LEWIS Associate Director for Research Head, Advanced
Controls, Sensors, and MEMS Group Automation and Robotics Research Institute The
University of Texas at Arlington 7300 Jack Newell Blvd. SFt. Worth, Texas 76118-7115.
[6] Vehicular ad hoc networks (VANETS): status, results, and challenges, Sherali Zeadally ·
Ray Hunt · Yuh-Shyan Chen ,Angela Irwin · Aamir Hassan, © Springer Science+Business
Media, LLC 2010.
[7] http://en.wikipedia.org/wiki/Fixed_wireless.
[8] Wireless Sensor Networks, The Morgan Kaufmann Series in Networking Series Editor,
David Clark, M.I.T., Feng Zhao, Leonidas J. Guibas Morgan Kaufmann Publishers is an
imprint of Elsevier
[9] A Comparative Study of Wireless Sensor Networks and Their Routing Protocols, Debnath
Bhattacharyya , Tai-hoon Kim , and Subhajit Pal, Sensors 2010, 10, 10506-10523;
doi:10.3390/s101210506 www.mdpi.com/journal/sensors.
[10] Challenges in Wireless Sensor Networks, Er. Barjinder Singh Kaler,Er. Manpreet Kaur
Kaler,RIMT-MAEC,Mandigobindgarh.
[11] Security in Wireless Sensor Networks: Issues and Challenges, Al-Sakib Khan Pathan,
Hyung-Woo Lee, Choong Seon Hong, ISBN 89-5519-129-4 Feb. 20-22, 2006 ICACT2006.
Prashant Tiwari, Varun Prakash Saxena, Raj Gaurav Mishra, Devendra Bhavsar, Page 10
Wireless Sensor Networks: Introduction, Advantages, Applications and Research Challenges.
HCTL Open International Journal of Technology Innovations and Research (IJTIR)
http://ijtir.hctl.org
Volume 14, April 2015
e-ISSN: 2321-1814, ISBN (Print): 978-1-62951-946-3
[12] A Survey of Localization inWireless Sensor Network, Long Cheng,ChengdongWu,
Yunzhou Zhang,HaoWu, Mengxin Li, and CarstenMaple, Hindawi Publishing Corporation
International Journal of Distributed Sensor Networks Volume 2012, Article ID 962523, 12
pages doi:10.1155/2012/962523.
[14] Energy Consumption in Wireless Sensor Networks using GSP, María Gabriela Calle
Torres, Electronics Engineer, Universidad Pontificia Bolivariana, Medellín, Colombia, 1995,
Copyright © by María Gabriela Calle Torres 2006
[15] Deployment Techniques for Sensor Networks, Jan Beutel, Kay Romer, Matthias
Ringwald, Matthias Woehrle.
[16] Preetam Suman; Amrit Suman, An Enhanced TCP Corruption Control Mechanism For
Wireless Network, HCTL Open International Journal of Technology Innovations and Research,
Volume 1, January 2013, Pages 27-40, ISSN: 2321-1814, ISBN: 978-1-62776-012-6.
[17] Arpit Gupta; Gaurav Shrivastava, APDA with Data Collective: A Survey to Prevent Attacks
in VANET, Edition on Wired and Wireless Networks: Advances and Applications, Volume 3 -
November 2013 of HCTL Open Science and Technology Letters (STL), ISSN: 2321-6980,
ISBN: 978-1-62951-015-6.
[18] Raj Gaurav Mishra, Distributed Fibre Optic Virtual Fencing System, Edition on Wired and
Wireless Networks: Advances and Applications, Volume 3 - November 2013 of HCTL Open
Science and Technology Letters (STL), ISSN: 2321-6980, ISBN: 978-1-62951-015-6.
[19] Anil Kumar Khurana; Vishal Srivastava, QoS and Energy Efficient Routing Protocols in
WSN, Edition on Wired and Wireless Networks: Advances and Applications, Volume 3 -
November 2013 of HCTL Open Science and Technology Letters (STL), ISSN: 2321-6980,
ISBN: 978-1-62951-015-6.
[20] Yufang Cheng; Jian Zhou, S-CRAHN: A Secure Cognitive-Radio Ad-Hoc Network,
Volume 6, HCTL Open Science and Technology Letters (STL), August 2014, ISSN: 2321-
6980, ISBN: 978-1-62951-779-7.
[21] Prashant Tiwari; Varun Prakash Saxena; Raj Gaurav Mishra; Devendra Bhavsar, A
Survey of Localization Methods and Techniques in Wireless Sensor Networks, HCTL Open
International Journal of Technology Innovations and Research (IJTIR), Volume 14, April 2015,
eISSN: 2321-1814, ISBN (Print): 978-1-62951-946-3.
This article is an open access article distributed under the terms and conditions of the
Creative Commons Attribution 4.0 International License
(https://creativecommons.org/licenses/by/4.0/).
Prashant Tiwari, Varun Prakash Saxena, Raj Gaurav Mishra, Devendra Bhavsar, Page 11
Wireless Sensor Networks: Introduction, Advantages, Applications and Research Challenges.