SlideShare a Scribd company logo
By-
Kratika Nigam
COMPUTATIONAL
INTELLIGENCE IN
WIRELESS
SENSOR
NETWORKS
Wireless Sensor Networks
1-What is Wireless Sensor Network?
2-Why Wireless Sensor Network?
3-Types of Wireless Sensor Network
4-Applications of WSN.
5-Challanges in WSN
6-Computing Intelligence
7-Fuzzy sets
8- Reinforcement Learning
9- Neural Networks
10- CI based solutions for WSN challenges
Content
Content
• A Wireless sensor network is a network of distributed autonomous devices that can sense or
monitor physical or environmental conditions cooperatively.
• WSNs consist of a large number of small, inexpensive, disposable and autonomous sensor nodes
that are generally deployed in an ad hoc (without any fixed infrastructures) manner in vast
geographical areas for remote operations.
• Typically, sensor nodes are grouped in clusters, and each cluster has a node that acts as the
cluster head.
• All nodes forward their sensor data to the cluster head, which in turn routes it to a specialized node
called sink node (or base station) through a multi-hop wireless communication
What is WSN?
Computational intelligence in wireless sensor network
Why Wireless Sensor
Network?
It is helpful in many industries
like parks, caravans, hospitals,
restaurants and some other
places.
01
This methodology
leads to a remote
sensing technique.
02
This is capable of
monitoring to security
cameras and controlling
loose waves.
03
Terrestrial
WSNs
Underground
WSNs
Multimedia
WSNs
Underwater
WSNs
Mobile
WSNs
Types of Wireless Sensor Networks
A
P
P
L
I
C
A
T
I
O
N
S
Disaster Relief Operation Military Application
Environment Application Home Application
Network Design Deployment of sensors Security
Challenges of WSN
How to
overcome these
challenges?
Computational Intelligence (CI) can be
defining as a analyzing of adaptive
mechanisms to enable or facilitate intelligent
behavior in complex and changing
environment.
It is a sub-branch of Artificial
Intelligence (AI) which mainly
emphases on those AI paradigms
that exhibit an ability to learn and
adapt to new situations, to
generalize, abstract, and discover
Computational
Intelligence
Classical set theory allows elements to
be either included in a set or not.
This is in contrast with human reasoning,
which includes a measure of imprecision
or uncertainty, which is marked by the
use of linguistic variables such as most,
many, frequently, seldom etc.
Fuzzy sets differ from classical sets in
that they allow an object to be a partial
member of a set.
1-Fuzzy sets
• Reinforcement Learning is a feedback-based Machine learning
technique in which an agent learns to behave in an environment by
performing the actions and seeing the results of actions. For each
good action, the agent gets positive feedback, and for each bad
action, the agent gets negative feedback or penalty.
• In Reinforcement Learning, the agent learns automatically using
feedbacks without any labeled data, unlike supervised learning.
• Since there is no labeled data, so the agent is bound to learn by its
experience only.
• RL solves a specific type of problem where decision making is
sequential, and the goal is long-term, such as game-playing, robotics,
etc.
2- Reinforcement Learning
Approaches To
Implement
Reinforcement
Learning
• Value Based
• Policy Based
• Model-based
There are mainly three ways to
implement reinforcement-learning in
ML, which are:
HOW DOES
REINFORCEMENT
LEARNING WORK?
The agent continues doing these three
things (take action, change
state/remain in the same state, and get
feedback), and by doing these actions,
he learns and explores the
environment.
Suppose there is an AI agent present within a
maze environment, and his goal is to find the
diamond. The agent interacts with the
environment by performing some actions, and
based on those actions, the state of the agent
gets changed, and it also receives a reward or
penalty as feedback.
Example-
Computational intelligence in wireless sensor network
The key-elements used in Bellman equations are:
• Action performed by the agent is referred to as "a"
• State occurred by performing the action is "s."
• The reward/feedback obtained for each good and bad
action is "R."
• A discount factor is Gamma "γ."
The Bellman equation can be written as:
• V(s) = max [R(s,a) + γV(s`)]
Where,
V(s)= value calculated at a particular point.
R(s,a) = Reward at a particular state s by performing an action.
γ = Discount factor
V(s`) = The value at the previous state.
Bellman equation
Types of Reinforcement Learning
Positive Reinforcement
The positive reinforcement learning
means adding something to increase the
tendency that expected behavior would
occur again. It impacts positively on the
behavior of the agent and increases the
strength of the behavior.
Negative Reinforcement
The negative reinforcement learning is
opposite to the positive reinforcement
as it increases the tendency that the
specific behavior will occur again by
avoiding the negative condition.
Let's recognize this image
Before moving to the
next CI method ,
• Neural networks, also known as artificial neural
networks (ANNs) or simulated neural networks
(SNNs).
• Artificial neural networks (ANNs) are comprised of a
node layers, containing an input layer, one or more
hidden layers, and an output layer.
• Each node, or artificial neuron, connects to another
and has an associated weight and threshold.
• If the output of any individual node is above the
specified threshold value, that node is activated,
sending data to the next layer of the network.
Otherwise, no data is passed along to the next layer
of the network.
4-Neural Networks
Activation Functions
Linear Activation
Function
Heviside Step
Function
Sigmoid
Function
f(v)=a+v
= a + ∑wi xi
a->bias
CI techniques can be very helpful in the process of designing and planning the
deployments of sensor networks
CI BASED SOLUTIONS FOR
WSN CHALLENGES
• The proposed technique uses fuzzy logic
to determine the number of sensors n(i)
necessary to be scattered in a subarea i.
• The system computes an output weight
(i), from which the number of sensors is
determined as
FUZZY LOGIC FOR
DEPLOYMENT
• Based on the simulations, we can
conclude that using fuzzy logic to find the
optimal number of nodes in each sub area
is very beneficial because the path loss
observed at worst points are reduced.
Multilayered perceptron and generalized neuron-
based (GN) distributed secure MAC protocols
are proposed in which NNs onboard WSN nodes
monitor traffic variations, and compute a
suspicion that an attack is underway.
• When the suspicion grows beyond a preset threshold,
the WSN node is switched off temporarily.
• A node detects an attack by monitoring abnormally
large variations in sensitive parameters: collision rate
Rc (number of collisions observed by a node per
second), average waiting time Tw (waiting time of a
packet in MAC buffer before transmission), and arrival
rate (RRTS), rate of RTS packets received by a node
successfully per second.
• These distributed methods ensure that only the part of
the WSN under attack is shut down, which is an
advantage. Besides, these methods have been reported
to be quite effective against DoS attacks, but the
effectiveness depends on the value of the threshold
suspicion.
NEURAL
NETWORKS
FOR SECURITY
Many types of DoS attacks on
WSNs have been devised.
References
• https://microcontrollerslab.com/wireless-sensor-
networks-wsn-applications/
• https://www.javatpoint.com/reinforcement-learning
• https://www.techopedia.com/definition/32751/evolutio
nary-algorithm
• https://in.mathworks.com/help/gads/what-is-the-
genetic-algorithm.html
• https://www.sciencedirect.com/topics/computer-
science/evolutionary-programming
• https://www.youtube.com/watch?v=EYeF2e2IKEo&t=46
s
• https://www.youtube.com/watch?v=L--IxUH4fac
Computational intelligence in wireless sensor network

More Related Content

PPTX
Customer Relationship Management
PPTX
Wireless Sensor Networks ppt
PPTX
Presentation on Ethical Hacking ppt
PPTX
APPLICATION OF NANOTECHNOLOGY
PPTX
Nanorobotics ppt
PDF
Cyber physical manufacturing systems
PPTX
semiconductor - description and application
PPTX
Robotic Process Automation (RPA)
Customer Relationship Management
Wireless Sensor Networks ppt
Presentation on Ethical Hacking ppt
APPLICATION OF NANOTECHNOLOGY
Nanorobotics ppt
Cyber physical manufacturing systems
semiconductor - description and application
Robotic Process Automation (RPA)

What's hot (20)

PPTX
Brain Computer Interface ppt
PPTX
Securing Underwater Wireless Communication
DOCX
Electronics seminar topics
PPTX
Rain technology
PPTX
Using prior knowledge to initialize the hypothesis,kbann
PPTX
SMART DUST
PDF
Artificial neural network for machine learning
PDF
Neural Networks: Introducton
PPTX
Brain tumor detection using image segmentation ppt
PPTX
Infrared technology
PPTX
NEUROMORPHIC COMPUTING.pptx
PPTX
eye phone technology
PDF
Deep learning - what is it and why now?
PPTX
PPT.pptx
PPTX
Artificial immune system
PPTX
Object detection
PPTX
Hybrid systems
PPTX
Driver drowsiness detection
PPTX
CHILD SAFETY WEARABLE DEVICE
PDF
Machine Learning: Introduction to Neural Networks
Brain Computer Interface ppt
Securing Underwater Wireless Communication
Electronics seminar topics
Rain technology
Using prior knowledge to initialize the hypothesis,kbann
SMART DUST
Artificial neural network for machine learning
Neural Networks: Introducton
Brain tumor detection using image segmentation ppt
Infrared technology
NEUROMORPHIC COMPUTING.pptx
eye phone technology
Deep learning - what is it and why now?
PPT.pptx
Artificial immune system
Object detection
Hybrid systems
Driver drowsiness detection
CHILD SAFETY WEARABLE DEVICE
Machine Learning: Introduction to Neural Networks
Ad

Similar to Computational intelligence in wireless sensor network (20)

PPTX
ML Module 3 Non Linear Learning.pptx
PPTX
Introduction to Deep Leaning(UNIT 1).pptx
PPTX
smarthome
PDF
International Journal of Computational Engineering Research(IJCER)
PPTX
Deep Learning Interview Questions And Answers | AI & Deep Learning Interview ...
PPTX
AI Class Topic 6: Easy Way to Learn Deep Learning AI Technologies
PPT
security in wireless sensor network
PPT
Lecturasdfasdfasdfadsfasdfasdfasdfasddfsdfasdfasdfasdf14.ppt
PDF
International Journal of Engineering Research and Development
PPT
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
PDF
PNN and inversion-B
DOCX
1 Object tracking using sensor network Orla Sahi
PDF
Deep Learning in Robotics: Robot gains Social Intelligence through Multimodal...
PPTX
Introduction to Neural networks (under graduate course) Lecture 9 of 9
PPTX
Rule based expert system
PDF
project sha enaa an it all en haa ek janiye women nice rukna and woke ala bat...
PDF
C0511318
PDF
Probablistic Inference With Limited Information
PPTX
fuzzy logic-AMkkkkkkkkkkkkkkkkkkkkk.pptx
ML Module 3 Non Linear Learning.pptx
Introduction to Deep Leaning(UNIT 1).pptx
smarthome
International Journal of Computational Engineering Research(IJCER)
Deep Learning Interview Questions And Answers | AI & Deep Learning Interview ...
AI Class Topic 6: Easy Way to Learn Deep Learning AI Technologies
security in wireless sensor network
Lecturasdfasdfasdfadsfasdfasdfasdfasddfsdfasdfasdfasdf14.ppt
International Journal of Engineering Research and Development
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
PNN and inversion-B
1 Object tracking using sensor network Orla Sahi
Deep Learning in Robotics: Robot gains Social Intelligence through Multimodal...
Introduction to Neural networks (under graduate course) Lecture 9 of 9
Rule based expert system
project sha enaa an it all en haa ek janiye women nice rukna and woke ala bat...
C0511318
Probablistic Inference With Limited Information
fuzzy logic-AMkkkkkkkkkkkkkkkkkkkkk.pptx
Ad

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Understanding_Digital_Forensics_Presentation.pptx
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
Programs and apps: productivity, graphics, security and other tools
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Machine learning based COVID-19 study performance prediction
Encapsulation_ Review paper, used for researhc scholars
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Review of recent advances in non-invasive hemoglobin estimation
Diabetes mellitus diagnosis method based random forest with bat algorithm

Computational intelligence in wireless sensor network

  • 2. 1-What is Wireless Sensor Network? 2-Why Wireless Sensor Network? 3-Types of Wireless Sensor Network 4-Applications of WSN. 5-Challanges in WSN 6-Computing Intelligence 7-Fuzzy sets 8- Reinforcement Learning 9- Neural Networks 10- CI based solutions for WSN challenges Content Content
  • 3. • A Wireless sensor network is a network of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. • WSNs consist of a large number of small, inexpensive, disposable and autonomous sensor nodes that are generally deployed in an ad hoc (without any fixed infrastructures) manner in vast geographical areas for remote operations. • Typically, sensor nodes are grouped in clusters, and each cluster has a node that acts as the cluster head. • All nodes forward their sensor data to the cluster head, which in turn routes it to a specialized node called sink node (or base station) through a multi-hop wireless communication What is WSN?
  • 5. Why Wireless Sensor Network? It is helpful in many industries like parks, caravans, hospitals, restaurants and some other places. 01 This methodology leads to a remote sensing technique. 02 This is capable of monitoring to security cameras and controlling loose waves. 03
  • 7. A P P L I C A T I O N S Disaster Relief Operation Military Application Environment Application Home Application
  • 8. Network Design Deployment of sensors Security Challenges of WSN
  • 10. Computational Intelligence (CI) can be defining as a analyzing of adaptive mechanisms to enable or facilitate intelligent behavior in complex and changing environment. It is a sub-branch of Artificial Intelligence (AI) which mainly emphases on those AI paradigms that exhibit an ability to learn and adapt to new situations, to generalize, abstract, and discover Computational Intelligence
  • 11. Classical set theory allows elements to be either included in a set or not. This is in contrast with human reasoning, which includes a measure of imprecision or uncertainty, which is marked by the use of linguistic variables such as most, many, frequently, seldom etc. Fuzzy sets differ from classical sets in that they allow an object to be a partial member of a set. 1-Fuzzy sets
  • 12. • Reinforcement Learning is a feedback-based Machine learning technique in which an agent learns to behave in an environment by performing the actions and seeing the results of actions. For each good action, the agent gets positive feedback, and for each bad action, the agent gets negative feedback or penalty. • In Reinforcement Learning, the agent learns automatically using feedbacks without any labeled data, unlike supervised learning. • Since there is no labeled data, so the agent is bound to learn by its experience only. • RL solves a specific type of problem where decision making is sequential, and the goal is long-term, such as game-playing, robotics, etc. 2- Reinforcement Learning
  • 13. Approaches To Implement Reinforcement Learning • Value Based • Policy Based • Model-based There are mainly three ways to implement reinforcement-learning in ML, which are:
  • 15. The agent continues doing these three things (take action, change state/remain in the same state, and get feedback), and by doing these actions, he learns and explores the environment. Suppose there is an AI agent present within a maze environment, and his goal is to find the diamond. The agent interacts with the environment by performing some actions, and based on those actions, the state of the agent gets changed, and it also receives a reward or penalty as feedback. Example-
  • 17. The key-elements used in Bellman equations are: • Action performed by the agent is referred to as "a" • State occurred by performing the action is "s." • The reward/feedback obtained for each good and bad action is "R." • A discount factor is Gamma "γ." The Bellman equation can be written as: • V(s) = max [R(s,a) + γV(s`)] Where, V(s)= value calculated at a particular point. R(s,a) = Reward at a particular state s by performing an action. γ = Discount factor V(s`) = The value at the previous state. Bellman equation
  • 18. Types of Reinforcement Learning Positive Reinforcement The positive reinforcement learning means adding something to increase the tendency that expected behavior would occur again. It impacts positively on the behavior of the agent and increases the strength of the behavior. Negative Reinforcement The negative reinforcement learning is opposite to the positive reinforcement as it increases the tendency that the specific behavior will occur again by avoiding the negative condition.
  • 19. Let's recognize this image Before moving to the next CI method ,
  • 20. • Neural networks, also known as artificial neural networks (ANNs) or simulated neural networks (SNNs). • Artificial neural networks (ANNs) are comprised of a node layers, containing an input layer, one or more hidden layers, and an output layer. • Each node, or artificial neuron, connects to another and has an associated weight and threshold. • If the output of any individual node is above the specified threshold value, that node is activated, sending data to the next layer of the network. Otherwise, no data is passed along to the next layer of the network. 4-Neural Networks
  • 23. CI techniques can be very helpful in the process of designing and planning the deployments of sensor networks CI BASED SOLUTIONS FOR WSN CHALLENGES
  • 24. • The proposed technique uses fuzzy logic to determine the number of sensors n(i) necessary to be scattered in a subarea i. • The system computes an output weight (i), from which the number of sensors is determined as FUZZY LOGIC FOR DEPLOYMENT • Based on the simulations, we can conclude that using fuzzy logic to find the optimal number of nodes in each sub area is very beneficial because the path loss observed at worst points are reduced.
  • 25. Multilayered perceptron and generalized neuron- based (GN) distributed secure MAC protocols are proposed in which NNs onboard WSN nodes monitor traffic variations, and compute a suspicion that an attack is underway. • When the suspicion grows beyond a preset threshold, the WSN node is switched off temporarily. • A node detects an attack by monitoring abnormally large variations in sensitive parameters: collision rate Rc (number of collisions observed by a node per second), average waiting time Tw (waiting time of a packet in MAC buffer before transmission), and arrival rate (RRTS), rate of RTS packets received by a node successfully per second. • These distributed methods ensure that only the part of the WSN under attack is shut down, which is an advantage. Besides, these methods have been reported to be quite effective against DoS attacks, but the effectiveness depends on the value of the threshold suspicion. NEURAL NETWORKS FOR SECURITY Many types of DoS attacks on WSNs have been devised.
  • 26. References • https://microcontrollerslab.com/wireless-sensor- networks-wsn-applications/ • https://www.javatpoint.com/reinforcement-learning • https://www.techopedia.com/definition/32751/evolutio nary-algorithm • https://in.mathworks.com/help/gads/what-is-the- genetic-algorithm.html • https://www.sciencedirect.com/topics/computer- science/evolutionary-programming • https://www.youtube.com/watch?v=EYeF2e2IKEo&t=46 s • https://www.youtube.com/watch?v=L--IxUH4fac