SlideShare a Scribd company logo
Advances in Computational Sciences and Technology
ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 733-739
© Research India Publications
http://www.ripublication.com
A Brief Research Study of Wireless Sensor Network
Preetkamal Singh1, Dr. OP Gupta2 and Sita Saini3
1
Department of Computer Science and Engineering, LGC Chaukimann,
Ludhiana, Punjab, India.
2
PAU, Ludhiana, Punjab, India.
3
Department of Computer Science and Engineering LGC Chaukimann,
Ludhiana, Punjab, India.
Abstract
Wireless Sensor Networks (WSNs) play a major role in revolutionizing the
world by its sensing technology. WSNs has emerged as that powerful
technology which has multiple applications such as such as military
operations, surveillance system, Intelligent Transport Systems (ITS) etc.
WSNs comprises of various sensor nodes, which captures the data from the
surrounding alongside monitoring the external environment. Much of the
research work is focused on making the sensor network operating with
minimum consumption of energy, so that it can survive for longer duration.
The primary concern in the direction of saving energy has been due to the
discharging of those batteries on which sensor nodes are operated. In addition
to that, WSNs are also exploited for its security aspects so that it can be used
in some confidential sectors like military battlefield. This paper, introduces the
WSN in different aspects like applications, routing and data collection,
security aspects and also briefs about simulation platform that can be used in
WSNs. This paper contributes in a fashion about introducing the WSNs in
different sectors of its operation and reflecting its significance.
Keywords: Introduction to WSN, Routing, Simulation platform in WSN,
security aspects in WSN, applications of WSN.
1. INTRODUCTION TO WSN
Advancement in wireless communication has made possible the development of
wireless sensor networks comprising of devices called sensor nodes. Sensor nodes are
734 Preetkamal Singh, Dr. OP Gupta and Sita Saini
low power, small size & cheap devices, capable of sensing, wireless communication
and computation. As soon as the sensors are deployed in the network they configure
themselves and connect with each other for data collection and thereby forwarding the
data to the Base Station.
Fig.1 Architecture of a typical WSN [1]
WSN can also be defined as a network comprising of possibly low-size and low-
complexity devices termed as nodes which are capable of sensing the environment
and communicating gathered information from the monitored area; the gathered data
can be transmitted directly or through multi –hops to sink, which can then use it
locally or is connected to other networks (e.g. internet) through gateway nodes [1].
The main components of sensor node consist of a sensing unit, a processing unit, a
transceiver and a power unit as shown in the Figure 2. Sensing unit senses the
physical quantity which is then transformed into digital one through ADC i.e. Analog
to Digital converter. Thereafter processor is used for further computations and
transceiver is used to transmit and receive data from the other nodes or from the Base
Station. Power unit is the most prominent unit in any sensor node. Once the battery is
exhausted, it can’t be replaced for unattended applications. Other units are application
dependent unit like Mobilizer, Power Generator and Location Finding System.
Fig. 2 Components of a sensor node
Power Unit
Sensor
ADC
Processor
Storage
Location Finding System
Power
Generator
Transceiver
Mobilizer
A Brief Research Study of Wireless Sensor Network 735
Fig.3 Contribution demonstration
2. CHALLENGES IN WSNs
Oneof the main design goals of WSNs is to carry out data communication while
trying to prolong the lifetime ofthe network and prevent connectivity degradation by
employing aggressive energy management techniques.The topology control in WSNs
is influenced by many challenging factors. These factors must beovercome before
efficient communication can be achieved in WSNs. In the following, we summarize
someof the challenges and design issues that affect the topology construction and
maintenance in WSNs [2].
a. Node deployment: Node deployment in WSNs is application dependent and
affects the performance of topology control algorithms. The deployment can
be either deterministic or randomized. In deterministic deployment, the
sensors are manually placed and data is routed through pre-determined paths.
However, in random node deployment, the sensor nodes are scattered
randomly creating an infrastructure in an ad hoc manner.
b. Energy consumption without losing accuracy: Sensor nodes can use up
their limited supply of energy performing computations and transmitting
information in a wireless environment. As such, energy-conserving forms of
communication and computation are essential. Sensor node lifetime shows a
strong dependence on the battery lifetime.
c. Data Reporting Model: Data sensing and reporting in WSNs is dependent on
the application and the time criticality of the data reporting. Data reporting can
Our Contribution
(Brief Study about)
Applications of WSNs
Introduction to WSN
Challenges in WSNs
Security aspects in WSN
Simulation platform in WSN
736 Preetkamal Singh, Dr. OP Gupta and Sita Saini
be categorized as either time-driven (continuous), event-driven, query-driven,
and hybrid. The time-driven delivery model is suitable for applications that
require periodic data monitoring. As such, sensor nodes will periodically
switch on their sensors and transmitters, sense the environment and transmit
the data of interest at constant periodic time intervals.
d. Node/Link Heterogeneity: In many studies, all sensor nodes were assumed to
be homogeneous, i.e., having equal capacity in terms of computation,
communication, and power. However, depending on the application a sensor
node can have different role or capability.
e. Fault Tolerance: Some sensor nodes may fail or be blocked due to lack of
power, physical damage, or environmental interference. The failure of sensor
nodes should not affect the overall task of the sensor network. If many nodes
fail, MAC and topology control algorithms must accommodate formation of
new links and routes to the data collection base stations.
f. Scalability: The number of sensor nodes deployed in the sensing area may be
in the order of hundreds or thousands, or more. Any topology control scheme
must be able to work with this huge number of sensor nodes. In addition,
sensor network routing control algorithms should be scalable enough to
respond to events in the environment. Until an event occurs, most of the
sensors can remain in the sleep state, with data from the few remaining sensors
providing a coarse quality.
g. Security: In some applications, the communication among nodes is required
to be secured enough so as to maintain the confidentiality. It is mostly required
while dealing with the military applications like battlefield surveillance,
military operations etc.
3. APPLICATIONS OF WSN
Wireless Sensor Networks may consist of many different types of sensors such as
seismic, low sampling rate magnetic, thermal, visual, infrared, acoustic and
radar. They are able to monitor a wide variety of ambient conditions that include
temperature, humidity, vehicular movement, lightning condition, pressure, soil
makeup, noise levels, the presence or absence of certain kinds of objects,
mechanical stress levels on attached objects, and the current characteristics such
as speed, direction and size of an object. WSN application can be classified into
following categories:
a. Military applications:
b. Environmental applications:
c. Healthcare applications:
d. Home applications:
e. Traffic control:
A Brief Research Study of Wireless Sensor Network 737
Fig. 4 Applications of WSN [3]
4. SECURITY ASPECTS OF WSN
The popularity of WSN has been tremendously on a peak with respect to different
applications like climate change, environmental monitoring, traffic monitoring and
home automation. Therefore keeping the WSN has always been a challenging task.
Cryptography provides security through symmetric key techniques, asymmetric key
techniques and hash function. Since WSN are very constrained in terms of computing,
communication and battery power, it requires a light weight cryptographic algorithm.
Due to constraints of sensor nodes, the selection of cryptographic technique is vital in
WSN. Cryptography in WSN can be explained in the following three aspects:
symmetric, asymmetric and hash function [4].
738 Preetkamal Singh, Dr. OP Gupta and Sita Saini
Fig.5 Security in WSN [4]
5. SIMULATION PLATFORM IN WSN
In WSNs, simulation is one of the most predominant evaluation methodologies for the
development of new communication architectures, and network protocols as well as to
test and validate the existing one in various scenarios. Simulation helps researchers to
get significant information on feasibility and practicability crucial to the
implementation of the system prior to investing significant time and money. In WSNs,
simulation based testing and validation has many advantages, such as: ease of
implementation, lower cost, flexibility and possibility of testing large-scale networks.
The availability of a large number of simulation tools and specific requirement (e.g.
energy-constraints, large-scale deployment) of WSNs makes it difficult for a user to
choose a nearly perfect tool for his evaluation. To address this issue, survey is
presented [] some of the most widely-used and state-of-the-art simulation tools for
WSNs. The aim is to help researchers in the selection of an appropriate simulation
tool to evaluate their work, and to acquire reliable results for large-scale WSNs [5].
Table 1: Comparison table of the reviewed simulation tools
Tools
Features
Interface Accessibility & User
Support
Availability of
WSNs
Modules
Scalability
NS-2 C++/OTcl with limited
visual support
Open source with
Good user
support
Excellent Limited
OMNeT++ C++/NED with good
GUI and debugging
support
Free for academic use,
licence for
commercial use with
Good user
support
Excellent Large-scale
GloMoSim Parsec (C-Based) with
limited visual support
Open source with
Poor user support
Good Large-scale
A Brief Research Study of Wireless Sensor Network 739
OPNET C or C++/Java with
Excellent GUI and
debugging support
Free for academic use,
licence for
commercial use with
Excellent
user support
Excellent Moderate
SENSE C++ with good GUI
support
Open source with Poor
user
support
Excellent Large-scale
TOSSIM C++/Python with good
GUI support
Open source (BSD)
with Excellent
user support
Good Large-scale
GTSNetS C++ with good user
interface & visual
support
Open source with good
user
support
Excellent Very Large-
scale
6. CONCLUSION
WSNs have been profoundly used in various sectors of human life. The sensing
technology has made it possible for any sensor node to communicate and respond to
the different attributes. This paper has briefed about various aspects in WSN. With the
brief introduction to the WSN, the special issues have been discussed. Applications
have been highlighted along with the security aspects in WSN. Thereafter the tabular
comparison of different simulation software’s has been given. It can be concluded
from the study done in this paper, that WSN has revolutionized almost every sector of
modern era. It has huge scope of research in handling different aspects of human life.
REFERENCES
[1] I.F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, E.Cayirci, “A survey on
sensor networks”, IEEE Communications Magazine, Vol. 40, Issue (8), pp.
102-114, 2002.
[2] Samira Kalantary, Sara Taghipour, “ A Survey on architectures, protocols,
applications and management in wireless Sensor Networks”, Journal of
Advanced Computer Science & Technoloy, pp. 1-11, 2014.
[3] KazemSohraby, Daniel Minoli, TaiebZnati, “Wireless Sensor Networks”,
Wiley Publications, Second Edition.
[4] Gaurav Sharma, SumanBala, Anil K. Verma, “Security Frameworks for
Wireless Sensor Networks-Review,” 2nd International Conference on
Communication, Computing & Security [ICCCS-2012] , No. 6, pp. 978 – 987,
2012.
[5] Muhammad Zahid Khan et al. , “Limitations of Simulation Tools for Large-
Scale Wireless Sensor Networks,” Workshops of International Conference on
Advanced Information Networking and Applications, pp. 820-825, 2011.
740 Preetkamal Singh, Dr. OP Gupta and Sita Saini

More Related Content

PDF
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
 
PDF
Some Aspects of Wireless Sensor Networks
pijans
 
PDF
Some aspects of wireless sensor networks
pijans
 
PDF
Design Issues and Applications of Wireless Sensor Network
ijtsrd
 
DOCX
wireless sensor network
Pramod Kuruvatti
 
PDF
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET Journal
 
PDF
Comprehensive Review on Base Energy Efficient Routing Protocol
IJRES Journal
 
PDF
Concepts and evolution of research in the field of wireless sensor networks
IJCNCJournal
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
 
Some Aspects of Wireless Sensor Networks
pijans
 
Some aspects of wireless sensor networks
pijans
 
Design Issues and Applications of Wireless Sensor Network
ijtsrd
 
wireless sensor network
Pramod Kuruvatti
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET Journal
 
Comprehensive Review on Base Energy Efficient Routing Protocol
IJRES Journal
 
Concepts and evolution of research in the field of wireless sensor networks
IJCNCJournal
 

Similar to A Brief Research Study Of Wireless Sensor Network (20)

PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
Wireless Sensor Network – Theoretical Findings and Applications
AshishDPatel1
 
PDF
Survey of Wireless Sensor Network Application
ijsrd.com
 
PDF
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET Journal
 
PDF
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
ijasuc
 
PDF
Computational Analysis of Routing Algorithm for Wireless Sensor Network
IRJET Journal
 
PDF
A Paired Key Mechanism for Wirelesslink Security for WSNS
IRJET Journal
 
PDF
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
IAEME Publication
 
PDF
file4.pdf
RajShah860705
 
PDF
Ijarcet vol-2-issue-3-916-919
Editor IJARCET
 
PDF
Oj3425062509
IJERA Editor
 
PDF
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
IJMER
 
PDF
A Survey Paper On Wireless Sensor Network
Crystal Sanchez
 
PDF
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
IJEEE
 
DOCX
Challenges for routing in wireless sensor networks
Auwal Amshi
 
PDF
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal
 
PDF
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
IRJET Journal
 
PDF
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
INFOGAIN PUBLICATION
 
PDF
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
International Journal of Computer and Communication System Engineering
 
PDF
Wireless Sensor Networks UNIT-1
Easy n Inspire L
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Wireless Sensor Network – Theoretical Findings and Applications
AshishDPatel1
 
Survey of Wireless Sensor Network Application
ijsrd.com
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET Journal
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
ijasuc
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
IRJET Journal
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
IRJET Journal
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
IAEME Publication
 
file4.pdf
RajShah860705
 
Ijarcet vol-2-issue-3-916-919
Editor IJARCET
 
Oj3425062509
IJERA Editor
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
IJMER
 
A Survey Paper On Wireless Sensor Network
Crystal Sanchez
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
IJEEE
 
Challenges for routing in wireless sensor networks
Auwal Amshi
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
IRJET Journal
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
INFOGAIN PUBLICATION
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
International Journal of Computer and Communication System Engineering
 
Wireless Sensor Networks UNIT-1
Easy n Inspire L
 
Ad

More from Cassie Romero (20)

PDF
(10 SheetsSet) European Pastoral Style Retro Love Le
Cassie Romero
 
PDF
Columbia College Chicago, Chicago Admission, Criteria Application
Cassie Romero
 
PDF
The Writers Work Guide To Beating Writers Blo
Cassie Romero
 
PDF
009 Essay Example 10191 Thumb Marathi On Thats
Cassie Romero
 
PDF
Motivationessay - 10 Steps In Writing A Motivation Essay
Cassie Romero
 
PDF
London Poem Analysis- GCSE Study Flashcards,
Cassie Romero
 
PDF
Personal Narrative Examples 7Th Grade E. Online assignment writing service.
Cassie Romero
 
PDF
Common App Word Limit. Tough To Keep Your Essay
Cassie Romero
 
PDF
DragonS Den Curriculum Hook Y. Online assignment writing service.
Cassie Romero
 
PDF
Writing Learn To Write Better Academic Essays Pdf Sitedoct.Org
Cassie Romero
 
PDF
St Joseph Hospital Apa Paper. Online assignment writing service.
Cassie Romero
 
PDF
Community Medical Windshield Survey Horizo
Cassie Romero
 
PDF
An Academic Essay The Op. Online assignment writing service.
Cassie Romero
 
PDF
Paper The Word Is Pretty Paper. True Stories. And Sc
Cassie Romero
 
PDF
Info Terpopuler Structure Introduction. Online assignment writing service.
Cassie Romero
 
PDF
Foolscap Paper A4 Size 100 Sheets 70Gm Shopee Mala
Cassie Romero
 
PDF
How To Write Grad Essay - Abigaile Words
Cassie Romero
 
PDF
Winter Writing Paper - Have Fun Teaching
Cassie Romero
 
PDF
This Is How You Write A College Essay In 2020 Co
Cassie Romero
 
PDF
Printable Polar Bear Journal Page Wild Bear Stationery
Cassie Romero
 
(10 SheetsSet) European Pastoral Style Retro Love Le
Cassie Romero
 
Columbia College Chicago, Chicago Admission, Criteria Application
Cassie Romero
 
The Writers Work Guide To Beating Writers Blo
Cassie Romero
 
009 Essay Example 10191 Thumb Marathi On Thats
Cassie Romero
 
Motivationessay - 10 Steps In Writing A Motivation Essay
Cassie Romero
 
London Poem Analysis- GCSE Study Flashcards,
Cassie Romero
 
Personal Narrative Examples 7Th Grade E. Online assignment writing service.
Cassie Romero
 
Common App Word Limit. Tough To Keep Your Essay
Cassie Romero
 
DragonS Den Curriculum Hook Y. Online assignment writing service.
Cassie Romero
 
Writing Learn To Write Better Academic Essays Pdf Sitedoct.Org
Cassie Romero
 
St Joseph Hospital Apa Paper. Online assignment writing service.
Cassie Romero
 
Community Medical Windshield Survey Horizo
Cassie Romero
 
An Academic Essay The Op. Online assignment writing service.
Cassie Romero
 
Paper The Word Is Pretty Paper. True Stories. And Sc
Cassie Romero
 
Info Terpopuler Structure Introduction. Online assignment writing service.
Cassie Romero
 
Foolscap Paper A4 Size 100 Sheets 70Gm Shopee Mala
Cassie Romero
 
How To Write Grad Essay - Abigaile Words
Cassie Romero
 
Winter Writing Paper - Have Fun Teaching
Cassie Romero
 
This Is How You Write A College Essay In 2020 Co
Cassie Romero
 
Printable Polar Bear Journal Page Wild Bear Stationery
Cassie Romero
 
Ad

Recently uploaded (20)

PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
Virus sequence retrieval from NCBI database
yamunaK13
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PDF
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PPTX
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
Virus sequence retrieval from NCBI database
yamunaK13
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 

A Brief Research Study Of Wireless Sensor Network

  • 1. Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 733-739 © Research India Publications http://www.ripublication.com A Brief Research Study of Wireless Sensor Network Preetkamal Singh1, Dr. OP Gupta2 and Sita Saini3 1 Department of Computer Science and Engineering, LGC Chaukimann, Ludhiana, Punjab, India. 2 PAU, Ludhiana, Punjab, India. 3 Department of Computer Science and Engineering LGC Chaukimann, Ludhiana, Punjab, India. Abstract Wireless Sensor Networks (WSNs) play a major role in revolutionizing the world by its sensing technology. WSNs has emerged as that powerful technology which has multiple applications such as such as military operations, surveillance system, Intelligent Transport Systems (ITS) etc. WSNs comprises of various sensor nodes, which captures the data from the surrounding alongside monitoring the external environment. Much of the research work is focused on making the sensor network operating with minimum consumption of energy, so that it can survive for longer duration. The primary concern in the direction of saving energy has been due to the discharging of those batteries on which sensor nodes are operated. In addition to that, WSNs are also exploited for its security aspects so that it can be used in some confidential sectors like military battlefield. This paper, introduces the WSN in different aspects like applications, routing and data collection, security aspects and also briefs about simulation platform that can be used in WSNs. This paper contributes in a fashion about introducing the WSNs in different sectors of its operation and reflecting its significance. Keywords: Introduction to WSN, Routing, Simulation platform in WSN, security aspects in WSN, applications of WSN. 1. INTRODUCTION TO WSN Advancement in wireless communication has made possible the development of wireless sensor networks comprising of devices called sensor nodes. Sensor nodes are
  • 2. 734 Preetkamal Singh, Dr. OP Gupta and Sita Saini low power, small size & cheap devices, capable of sensing, wireless communication and computation. As soon as the sensors are deployed in the network they configure themselves and connect with each other for data collection and thereby forwarding the data to the Base Station. Fig.1 Architecture of a typical WSN [1] WSN can also be defined as a network comprising of possibly low-size and low- complexity devices termed as nodes which are capable of sensing the environment and communicating gathered information from the monitored area; the gathered data can be transmitted directly or through multi –hops to sink, which can then use it locally or is connected to other networks (e.g. internet) through gateway nodes [1]. The main components of sensor node consist of a sensing unit, a processing unit, a transceiver and a power unit as shown in the Figure 2. Sensing unit senses the physical quantity which is then transformed into digital one through ADC i.e. Analog to Digital converter. Thereafter processor is used for further computations and transceiver is used to transmit and receive data from the other nodes or from the Base Station. Power unit is the most prominent unit in any sensor node. Once the battery is exhausted, it can’t be replaced for unattended applications. Other units are application dependent unit like Mobilizer, Power Generator and Location Finding System. Fig. 2 Components of a sensor node Power Unit Sensor ADC Processor Storage Location Finding System Power Generator Transceiver Mobilizer
  • 3. A Brief Research Study of Wireless Sensor Network 735 Fig.3 Contribution demonstration 2. CHALLENGES IN WSNs Oneof the main design goals of WSNs is to carry out data communication while trying to prolong the lifetime ofthe network and prevent connectivity degradation by employing aggressive energy management techniques.The topology control in WSNs is influenced by many challenging factors. These factors must beovercome before efficient communication can be achieved in WSNs. In the following, we summarize someof the challenges and design issues that affect the topology construction and maintenance in WSNs [2]. a. Node deployment: Node deployment in WSNs is application dependent and affects the performance of topology control algorithms. The deployment can be either deterministic or randomized. In deterministic deployment, the sensors are manually placed and data is routed through pre-determined paths. However, in random node deployment, the sensor nodes are scattered randomly creating an infrastructure in an ad hoc manner. b. Energy consumption without losing accuracy: Sensor nodes can use up their limited supply of energy performing computations and transmitting information in a wireless environment. As such, energy-conserving forms of communication and computation are essential. Sensor node lifetime shows a strong dependence on the battery lifetime. c. Data Reporting Model: Data sensing and reporting in WSNs is dependent on the application and the time criticality of the data reporting. Data reporting can Our Contribution (Brief Study about) Applications of WSNs Introduction to WSN Challenges in WSNs Security aspects in WSN Simulation platform in WSN
  • 4. 736 Preetkamal Singh, Dr. OP Gupta and Sita Saini be categorized as either time-driven (continuous), event-driven, query-driven, and hybrid. The time-driven delivery model is suitable for applications that require periodic data monitoring. As such, sensor nodes will periodically switch on their sensors and transmitters, sense the environment and transmit the data of interest at constant periodic time intervals. d. Node/Link Heterogeneity: In many studies, all sensor nodes were assumed to be homogeneous, i.e., having equal capacity in terms of computation, communication, and power. However, depending on the application a sensor node can have different role or capability. e. Fault Tolerance: Some sensor nodes may fail or be blocked due to lack of power, physical damage, or environmental interference. The failure of sensor nodes should not affect the overall task of the sensor network. If many nodes fail, MAC and topology control algorithms must accommodate formation of new links and routes to the data collection base stations. f. Scalability: The number of sensor nodes deployed in the sensing area may be in the order of hundreds or thousands, or more. Any topology control scheme must be able to work with this huge number of sensor nodes. In addition, sensor network routing control algorithms should be scalable enough to respond to events in the environment. Until an event occurs, most of the sensors can remain in the sleep state, with data from the few remaining sensors providing a coarse quality. g. Security: In some applications, the communication among nodes is required to be secured enough so as to maintain the confidentiality. It is mostly required while dealing with the military applications like battlefield surveillance, military operations etc. 3. APPLICATIONS OF WSN Wireless Sensor Networks may consist of many different types of sensors such as seismic, low sampling rate magnetic, thermal, visual, infrared, acoustic and radar. They are able to monitor a wide variety of ambient conditions that include temperature, humidity, vehicular movement, lightning condition, pressure, soil makeup, noise levels, the presence or absence of certain kinds of objects, mechanical stress levels on attached objects, and the current characteristics such as speed, direction and size of an object. WSN application can be classified into following categories: a. Military applications: b. Environmental applications: c. Healthcare applications: d. Home applications: e. Traffic control:
  • 5. A Brief Research Study of Wireless Sensor Network 737 Fig. 4 Applications of WSN [3] 4. SECURITY ASPECTS OF WSN The popularity of WSN has been tremendously on a peak with respect to different applications like climate change, environmental monitoring, traffic monitoring and home automation. Therefore keeping the WSN has always been a challenging task. Cryptography provides security through symmetric key techniques, asymmetric key techniques and hash function. Since WSN are very constrained in terms of computing, communication and battery power, it requires a light weight cryptographic algorithm. Due to constraints of sensor nodes, the selection of cryptographic technique is vital in WSN. Cryptography in WSN can be explained in the following three aspects: symmetric, asymmetric and hash function [4].
  • 6. 738 Preetkamal Singh, Dr. OP Gupta and Sita Saini Fig.5 Security in WSN [4] 5. SIMULATION PLATFORM IN WSN In WSNs, simulation is one of the most predominant evaluation methodologies for the development of new communication architectures, and network protocols as well as to test and validate the existing one in various scenarios. Simulation helps researchers to get significant information on feasibility and practicability crucial to the implementation of the system prior to investing significant time and money. In WSNs, simulation based testing and validation has many advantages, such as: ease of implementation, lower cost, flexibility and possibility of testing large-scale networks. The availability of a large number of simulation tools and specific requirement (e.g. energy-constraints, large-scale deployment) of WSNs makes it difficult for a user to choose a nearly perfect tool for his evaluation. To address this issue, survey is presented [] some of the most widely-used and state-of-the-art simulation tools for WSNs. The aim is to help researchers in the selection of an appropriate simulation tool to evaluate their work, and to acquire reliable results for large-scale WSNs [5]. Table 1: Comparison table of the reviewed simulation tools Tools Features Interface Accessibility & User Support Availability of WSNs Modules Scalability NS-2 C++/OTcl with limited visual support Open source with Good user support Excellent Limited OMNeT++ C++/NED with good GUI and debugging support Free for academic use, licence for commercial use with Good user support Excellent Large-scale GloMoSim Parsec (C-Based) with limited visual support Open source with Poor user support Good Large-scale
  • 7. A Brief Research Study of Wireless Sensor Network 739 OPNET C or C++/Java with Excellent GUI and debugging support Free for academic use, licence for commercial use with Excellent user support Excellent Moderate SENSE C++ with good GUI support Open source with Poor user support Excellent Large-scale TOSSIM C++/Python with good GUI support Open source (BSD) with Excellent user support Good Large-scale GTSNetS C++ with good user interface & visual support Open source with good user support Excellent Very Large- scale 6. CONCLUSION WSNs have been profoundly used in various sectors of human life. The sensing technology has made it possible for any sensor node to communicate and respond to the different attributes. This paper has briefed about various aspects in WSN. With the brief introduction to the WSN, the special issues have been discussed. Applications have been highlighted along with the security aspects in WSN. Thereafter the tabular comparison of different simulation software’s has been given. It can be concluded from the study done in this paper, that WSN has revolutionized almost every sector of modern era. It has huge scope of research in handling different aspects of human life. REFERENCES [1] I.F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, E.Cayirci, “A survey on sensor networks”, IEEE Communications Magazine, Vol. 40, Issue (8), pp. 102-114, 2002. [2] Samira Kalantary, Sara Taghipour, “ A Survey on architectures, protocols, applications and management in wireless Sensor Networks”, Journal of Advanced Computer Science & Technoloy, pp. 1-11, 2014. [3] KazemSohraby, Daniel Minoli, TaiebZnati, “Wireless Sensor Networks”, Wiley Publications, Second Edition. [4] Gaurav Sharma, SumanBala, Anil K. Verma, “Security Frameworks for Wireless Sensor Networks-Review,” 2nd International Conference on Communication, Computing & Security [ICCCS-2012] , No. 6, pp. 978 – 987, 2012. [5] Muhammad Zahid Khan et al. , “Limitations of Simulation Tools for Large- Scale Wireless Sensor Networks,” Workshops of International Conference on Advanced Information Networking and Applications, pp. 820-825, 2011.
  • 8. 740 Preetkamal Singh, Dr. OP Gupta and Sita Saini