SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2096
AN INTRODUCTION TO WIRELESS SENSOR NETWORKS, ITS
CHALLENGES AND SECURITY
Neha Barthwal1, Shashank Barthwal2
1Dept. of Computer Science, GBPIET, Pauri, Uttarakhand, India
2Dept. of Computer Science, GEHU, Dehradun, Uttarakhand, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract -The popularity of WSN hasbeenenormouslyon
a peak just because of its sensing technology. WSNs are in
great demand now a days due to increasing growth in
wireless devices. WSN is composed of small size, battery
powered sensor nodes which collect, process, store and
transfer the sensed data from one sensor to another. This
efficiency makes sensor network to be used for many
applications like military application, health application,
environmental application, home application, commercial
application etc. and many more. Node mobility, stability,
throughput of network and its node, clustering, Energy
efficiency, lifetime of sensor node are challenging issues of
WSN and due to this WSN has gained worldwide attentionof
researchers. Basically the researchers intention is to form
sensor network performs with maximum stability and
minimum consumption of energy, so that they can work for
long time. Batteries used in WSN can neither be changed nor
recharged so it is necessary to improve the lifetime of the
network for better performanceof WSN. Forresearchersitis
a dare to design energy efficient routing protocol for WSN.
Key Words: Sensor Node, Cluster Head, Base Station, WSN,
Clustering
1. INTRODUCTION
A wide range of sensor nodes (SN) shapes a Wireless sensor
network. Sensor nodes are low price, battery operated,
multi-functional and deployed to form a sensor field. Each
node have sensing unit, a processing unit, communication
unit and power unit. Each and every node is able to perform
smart sensing, neighbornodediscovery,data gathering,data
processing, data storage and communication with other
nodes. The sensing unit senses the surrounding, the
processing unit calculates the confined permutations of the
sensed data, and the communication unit performs
interchange of processed data among adjoining sensor
nodes.
Figure 1.1- Building block of Sensor Node
Wireless Sensor Networks is group of sensors which are
associated by wireless media. Sensors are deployed in
network and communicate with each other for data
collection. Then they forward the collected data to the Base
Station. Clustering is a process of merging sensor nodes to
form clusters and selecting cluster heads for each clusters.
Sensor node gathers the data and send it to cluster head
which is then forwarded to base station (BS). Clustering
raises the stability of network and lowers the energy
consumption of sensor nodes.
Figure 1.2- Architecture of a typical WSN
Attributes like size of the cluster, distance of sensor nodes
from CH, distance of the BS from the cluster head influence
the energy consumption in sensor nodes. More the distance
of sensor nodes from the cluster head greater the energy
dissipation for the data transmission.
Clustering process has three phases. Cluster head selection
phase, cluster’s setup phase and steady phase. The given
Sensing Unit
Power Unit
Processing
Unit
Communicati
on Unit
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2097
figure illustrate the formation of distant clusters in WSNs.
These clusters have dissimilartypeofsensornodesand each
node pass on the sensed information to the desired CH
which is responsible for forwarding the sensed data to the
sink node. Homogeneous and Heterogeneous are two forms
of clustering in WSN.
Figure 1.3- WSNs Cluster Formation
Homogenous Clustering
In homogeneous clustering, all nodes have equivalent
energy. The life of Wireless sensors node depends on life
time of the battery. There are many energy saving
methodologies which are mainly introduced to lessen the
energy consumption and thereby resulting in a mechanism
for enhanced stability of the nodes. There are many
protocols for homogeneous WSNs like LEACH, PEGASIS and
HEED protocol. Thesealgorithmswill givepoorperformance
in the heterogeneous type of network.
Heterogeneous Clustering
In heterogeneous WSNs, sensor nodes have distinct initial
energies. SN have relatively excessive energy develop into
cluster head. Stable Election Protocol, Distributed Energy
Efficient Clustering, Threshold Sensitive Stable Election
Protocol, Enhance threshold sensitive stable election
protocol, Dual Cluster Head Routing Protocol and “DCHRP
with level four Heterogeneity are various protocols of
heterogeneous WSNs. Heterogeneous sensor networks are
considered significant in WSNs because they are related to
real life situation.
2. CHARACTERISTICS
WSN include various topologies like star, tree, mesh etc. for
communication. Characteristics of good WSN include
mobility, reliability, power efficiency, stability. WSNinclude
these feature proves beneficial forhumanwelfarethat’swhy
it has variety of application in different field like medical,
military, traffic control etc. Some other characteristics of
WSNs are-
 Simple to use
 Network is flexible
 Utilization of power is limited because of battery
 It handles node failure effectively
 It deals with mobility and heterogeneity of Sensor
Node.
 Can work with large scale distribution that is have
high scalability
 Has ability to maintain strict environmental
condition for execution
 Has unique cross layer design
3. WSN ORGANIZATION
Wireless sensor network shadows the OSI model. The
architecture of WSN composed of five layers (physical, data
link, transport, network and application) and three cross
layers (power management, mobility management and task
management). These layers collectivelyareusedtocomplete
the network and make the sensors work in an organized
way, in order to raise the efficiency of the network.
 Physical layer is accountable for frequency
selection, modulation and data encryption and
signal detection.
 Function of Data link layer is to provide a pathway
for multiplexing the data streams, data frame
detection, error control, MAC.
 For data supply network layer is used. It is
accountable for routing the information received
from transport layer i.e. finding the optimal path
for data packet to travel from sourcetodestination.
 The flow of data is needed whenthesensornetwork
make use of internet which is maintained by the
transport layer.
 Application layer is present at last and forms
software and hardware transparent to the end
user. It is responsible for presenting collected
information and traffic management
Figure 1.4- WSN organization
4. SECURITY IN WSN
Security plays a significant role in WSN. Sensitive data is
carried by sensor nodes which may be targetedbyattackers.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2098
Attacks are occurred in any system just because of lack of
security features
 Wireless communication is used in WSN,eavesdrop
is possible.
 Injecting malicious node in WSN is a cake walk for
the attacker.
 Vast number of nodes in WSN enforces security
complexity at all levels.
 Resource constraints of sensor nodes pose another
threat to security of the network in terms of
memory, energy, processing power etc. Hence
Symmetric cryptography or symmetric encryption
is used because asymmetric cryptography becomes
too expensive.
Conventional security techniques used earlier cannot be
directly or indirectly applied on WSN. Security becomes
extremely importantwhensensornetworksaredeployed,as
they are susceptible to various malicious attacks because of
its transmissionnature,resourcerestrictionanddeployment
in harsh environment. So existing security mechanisms are
not enough for WSN, and new ideas are needed.
Symmetric key techniques, asymmetric key techniques and
hash functions are crypto mechanisms used for achieving
security in wireless sensor networks, it is extremely
important to authenticate and encrypt messages sent
between sensor nodes. WSN areveryconstrainedintermsof
battery power, node lifetime, stability, throughput,
computing, and communication. WSN needs a light weight
cryptographic algorithm.
WSN’s main security aims are confidentiality, integrity,
authentication, availability, survivability, along with
efficiency, freshness and scalability.
5. ISSUES AND CHALLENGES IN DESIGNING WSN
 Resource limitation (Limited memory,computation
and power)
 Maintenance of WSN is difficult.
 Sensor node depend only on battery and the
batteries can neither be recharged nor replaced.
Hence the hardware design consideration is must.
 While deploying, the sensor nodes are scattered so
they can’t fit into any regular topology.
 Reliability of communication is another issue that
should be considered (Unreliable data transfer,
Conflicts and latency are some if the challenges of
WSN’s)
 Topology changes, Node failure, addition and
deletion of nodes is among other challenging issue
in WSNs.
 Transmission nature, hostile environment of WSN
and security are some of the challenging issue.
 Attaining synchronization between nodes is also
another issue.
6. APPLICATIONS OF WSN
Wireless Sensor Networks comprise of numerous types of
sensors such as seismic, thermal, low sampling rate
magnetic, infrared, visual, acoustic and radar. These
sensors are able to monitor a wide variety of ambient
conditions like humidity, temperature, lightning, vehicular
movement, pressure, soil makeup, noise levels and so on.
WSN application can be classified into following categories:
 Military applications (enemy tracking, security
detection, surveillance)
 Environmental applications ( air pollution detection,
landslide detection, forest fire detection, animal
tracking, water quality monitoring, natural disaster
prevention, flood detection, weather prediction,)
 Healthcare applications (implanted, wearable and
surroundingembeddedmedical devices,monitoringand
tracking of doctors and patients,
 Home applications (smart lighting, cooling and heating
devices)
 Industrial applications (data logging, wine production,
structural and machine health monitoring etc.)
 Transportation application (monitoring of traffic,
dynamic routing management
7. ADVANTAGES
 Flexible infrastructure
 Easily implemented
 Fruitful for society
 Can deal with numerous nodes at a time
 Made up of three distant topologies(mesh, tree, star)
 It can be deployed on vast scale
 Can be monitored and accessed with remote locations
 Support embedded systems
 Increasing the number of sensor nodes is easy.
 Execution is cheap
 Saves cost as it avoids plenty of wiring.
 Suitable for unreachable areas such as over the seas,
mountains
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2099
8. DISADVANTAGES
 WSN possess lower storage capacity (approx. few
hundred kilobytes)
 Comparatively less secure than wired network
 Hackers can easily hack sensor network and acquire all
data.
 Slow Communication and transmission speed
 SN are more prone to failure
 Easily distracted by its surrounding
 Slow processing power
 Works for short communication range
 Require minimal energy efficient protocol
 Have batteries with limited lifetime
 Need of extra equipment for setup like computer
9. CONCLUSIONS
Over the last few years hyper efficient design of WSN has
become a leading platform for research and development.
WSN started a revolution in technical field and attracts
researchers toward it. Its sensing technology enhance its
popularity worldwide. Researchers in WSN mainly focuses
on hike in lifetime and stability of sensor nodes. Major
research areas of WSN are distributed signal processing,
data fusion, energy efficient routing algorithms, and
security of WSN. WSN has highly influenced our life in all
aspects. It has wide range of applications. With the short
introduction of WSN, its organization, characteristics and
challenges have been discussed as well the application of
WSN have been highlighted along with the advantage and
disadvantages of WSN.
REFERENCES
[1] I.F. Akyildiz, S. Weilian, Y. Sankarasubramaniam,
E.Cayirci, “A survey on sensor networks”, IEEE
Communications Magazine, Vol. 40, Issue (8), pp.
102-114, 2002.
[2] Samira Kalantary, Sara Taghipour, “ A Survey on
architectures, protocols, applications and
management in wireless Sensor Networks”,Journal
of Advanced Computer Science & Technoloy, pp. 1-
11, 2014.
[3] KazemSohraby, Daniel Minoli,TaiebZnati,“Wireless
Sensor Networks”, Wiley Publications, Second
Edition.
[4] Gaurav Sharma, SumanBala, Anil K. Verma,
“Security Frameworks for Wireless Sensor
Networks-Review,” 2nd International Conference
on Communication, Computing & Security [ICCCS-
2012], No. 6, pp. 978 – 987, 2012.
[5] Muhammad Zahid Khan et al., “Limitations of
Simulation Tools for Large-Scale Wireless Sensor
Networks,” Workshops of International Conference
on Advanced Information Networking and
Applications, pp. 820-825, 2011.
[6] M. Ben Salah, A. Boulouz. "Energy Efficient
Clustering Based OnLEACH." IEEE,2016IEEE,2016
[7] H. Mohammad, M. AfsarandN.Tayarani,“Clustering
in sensor network: A literature survey”, Journal of
Network & Computer Appl., 2014.

More Related Content

PDF
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
PDF
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
PDF
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
PDF
file4.pdf
PDF
9345.pdf
PPTX
wireless sensor network
PDF
Some aspects of wireless sensor networks
PDF
A modified clustered based routing protocol to secure wireless sensor network...
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
file4.pdf
9345.pdf
wireless sensor network
Some aspects of wireless sensor networks
A modified clustered based routing protocol to secure wireless sensor network...

What's hot (18)

PDF
An active technique for power saving in WSN under additive white gaussian noi...
PDF
De3211001104
PDF
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
DOC
Basic Architecture of Wireless Sensor Network
PDF
G0933443
PDF
Comprehensive Review on Base Energy Efficient Routing Protocol
PDF
SURVEY ON MOBILE AD HOC NETWORK
PDF
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
PDF
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
PDF
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
PDF
Secured node detection technique based on artificial neural network for wirel...
PDF
A review of Hierarchical energy Protocols in Wireless Sensor Network
PDF
Survey of Wireless Sensor Network Application
PDF
Sensors 19-03789-v2
PDF
Energy Consumption in chain based routing protocol in wireless sensor network
PDF
International journal of computer science and innovation vol 2015-n1-paper5
PDF
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
PDF
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
An active technique for power saving in WSN under additive white gaussian noi...
De3211001104
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Basic Architecture of Wireless Sensor Network
G0933443
Comprehensive Review on Base Energy Efficient Routing Protocol
SURVEY ON MOBILE AD HOC NETWORK
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
Secured node detection technique based on artificial neural network for wirel...
A review of Hierarchical energy Protocols in Wireless Sensor Network
Survey of Wireless Sensor Network Application
Sensors 19-03789-v2
Energy Consumption in chain based routing protocol in wireless sensor network
International journal of computer science and innovation vol 2015-n1-paper5
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
Ad

Similar to IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security (20)

PDF
IRJET- A Comprehensive Study of Energy Efficient Algorithms in WSN
PPTX
slideshow123456789tyufxfmnvczsdadsgvnbnvgchj
PDF
wireless sensor network a survey
PPTX
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
PDF
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
PDF
Wireless Sensor Networks: An Overview on Security Issues and Challenges
PDF
Ijarcet vol-2-issue-2-756-760
PDF
A Brief Research Study Of Wireless Sensor Network
PDF
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
PDF
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
PDF
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
PDF
Wireless Sensor Networks: An Overview on Security Issues and Challenges
PDF
Analysis of wireless sensor networks security, attacks and challenges
PDF
Analysis of wireless sensor networks
PPTX
Wireless-Sensor-Networks. has simple introduction
PPTX
Wireless-Sensor-Networks in advance wireless mobile network
PDF
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
PDF
IRJET- Energy Efficient Protocol in Wireless Sensor Network
PDF
Energy Consumption Minimization in WSN using BFO
PPTX
Aps 10june2020
IRJET- A Comprehensive Study of Energy Efficient Algorithms in WSN
slideshow123456789tyufxfmnvczsdadsgvnbnvgchj
wireless sensor network a survey
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Ijarcet vol-2-issue-2-756-760
A Brief Research Study Of Wireless Sensor Network
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
ENERGY EFFICIENT HIERARCHICAL CLUSTER HEAD ELECTION USING EXPONENTIAL DECAY F...
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks
Wireless-Sensor-Networks. has simple introduction
Wireless-Sensor-Networks in advance wireless mobile network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
Energy Consumption Minimization in WSN using BFO
Aps 10june2020
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
composite construction of structures.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
OOP with Java - Java Introduction (Basics)
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Well-logging-methods_new................
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
composite construction of structures.pdf
Lecture Notes Electrical Wiring System Components
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
OOP with Java - Java Introduction (Basics)
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Digital Logic Computer Design lecture notes
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Mechanical Engineering MATERIALS Selection
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Internet of Things (IOT) - A guide to understanding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Well-logging-methods_new................
R24 SURVEYING LAB MANUAL for civil enggi
Embodied AI: Ushering in the Next Era of Intelligent Systems
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx

IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2096 AN INTRODUCTION TO WIRELESS SENSOR NETWORKS, ITS CHALLENGES AND SECURITY Neha Barthwal1, Shashank Barthwal2 1Dept. of Computer Science, GBPIET, Pauri, Uttarakhand, India 2Dept. of Computer Science, GEHU, Dehradun, Uttarakhand, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract -The popularity of WSN hasbeenenormouslyon a peak just because of its sensing technology. WSNs are in great demand now a days due to increasing growth in wireless devices. WSN is composed of small size, battery powered sensor nodes which collect, process, store and transfer the sensed data from one sensor to another. This efficiency makes sensor network to be used for many applications like military application, health application, environmental application, home application, commercial application etc. and many more. Node mobility, stability, throughput of network and its node, clustering, Energy efficiency, lifetime of sensor node are challenging issues of WSN and due to this WSN has gained worldwide attentionof researchers. Basically the researchers intention is to form sensor network performs with maximum stability and minimum consumption of energy, so that they can work for long time. Batteries used in WSN can neither be changed nor recharged so it is necessary to improve the lifetime of the network for better performanceof WSN. Forresearchersitis a dare to design energy efficient routing protocol for WSN. Key Words: Sensor Node, Cluster Head, Base Station, WSN, Clustering 1. INTRODUCTION A wide range of sensor nodes (SN) shapes a Wireless sensor network. Sensor nodes are low price, battery operated, multi-functional and deployed to form a sensor field. Each node have sensing unit, a processing unit, communication unit and power unit. Each and every node is able to perform smart sensing, neighbornodediscovery,data gathering,data processing, data storage and communication with other nodes. The sensing unit senses the surrounding, the processing unit calculates the confined permutations of the sensed data, and the communication unit performs interchange of processed data among adjoining sensor nodes. Figure 1.1- Building block of Sensor Node Wireless Sensor Networks is group of sensors which are associated by wireless media. Sensors are deployed in network and communicate with each other for data collection. Then they forward the collected data to the Base Station. Clustering is a process of merging sensor nodes to form clusters and selecting cluster heads for each clusters. Sensor node gathers the data and send it to cluster head which is then forwarded to base station (BS). Clustering raises the stability of network and lowers the energy consumption of sensor nodes. Figure 1.2- Architecture of a typical WSN Attributes like size of the cluster, distance of sensor nodes from CH, distance of the BS from the cluster head influence the energy consumption in sensor nodes. More the distance of sensor nodes from the cluster head greater the energy dissipation for the data transmission. Clustering process has three phases. Cluster head selection phase, cluster’s setup phase and steady phase. The given Sensing Unit Power Unit Processing Unit Communicati on Unit
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2097 figure illustrate the formation of distant clusters in WSNs. These clusters have dissimilartypeofsensornodesand each node pass on the sensed information to the desired CH which is responsible for forwarding the sensed data to the sink node. Homogeneous and Heterogeneous are two forms of clustering in WSN. Figure 1.3- WSNs Cluster Formation Homogenous Clustering In homogeneous clustering, all nodes have equivalent energy. The life of Wireless sensors node depends on life time of the battery. There are many energy saving methodologies which are mainly introduced to lessen the energy consumption and thereby resulting in a mechanism for enhanced stability of the nodes. There are many protocols for homogeneous WSNs like LEACH, PEGASIS and HEED protocol. Thesealgorithmswill givepoorperformance in the heterogeneous type of network. Heterogeneous Clustering In heterogeneous WSNs, sensor nodes have distinct initial energies. SN have relatively excessive energy develop into cluster head. Stable Election Protocol, Distributed Energy Efficient Clustering, Threshold Sensitive Stable Election Protocol, Enhance threshold sensitive stable election protocol, Dual Cluster Head Routing Protocol and “DCHRP with level four Heterogeneity are various protocols of heterogeneous WSNs. Heterogeneous sensor networks are considered significant in WSNs because they are related to real life situation. 2. CHARACTERISTICS WSN include various topologies like star, tree, mesh etc. for communication. Characteristics of good WSN include mobility, reliability, power efficiency, stability. WSNinclude these feature proves beneficial forhumanwelfarethat’swhy it has variety of application in different field like medical, military, traffic control etc. Some other characteristics of WSNs are-  Simple to use  Network is flexible  Utilization of power is limited because of battery  It handles node failure effectively  It deals with mobility and heterogeneity of Sensor Node.  Can work with large scale distribution that is have high scalability  Has ability to maintain strict environmental condition for execution  Has unique cross layer design 3. WSN ORGANIZATION Wireless sensor network shadows the OSI model. The architecture of WSN composed of five layers (physical, data link, transport, network and application) and three cross layers (power management, mobility management and task management). These layers collectivelyareusedtocomplete the network and make the sensors work in an organized way, in order to raise the efficiency of the network.  Physical layer is accountable for frequency selection, modulation and data encryption and signal detection.  Function of Data link layer is to provide a pathway for multiplexing the data streams, data frame detection, error control, MAC.  For data supply network layer is used. It is accountable for routing the information received from transport layer i.e. finding the optimal path for data packet to travel from sourcetodestination.  The flow of data is needed whenthesensornetwork make use of internet which is maintained by the transport layer.  Application layer is present at last and forms software and hardware transparent to the end user. It is responsible for presenting collected information and traffic management Figure 1.4- WSN organization 4. SECURITY IN WSN Security plays a significant role in WSN. Sensitive data is carried by sensor nodes which may be targetedbyattackers.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2098 Attacks are occurred in any system just because of lack of security features  Wireless communication is used in WSN,eavesdrop is possible.  Injecting malicious node in WSN is a cake walk for the attacker.  Vast number of nodes in WSN enforces security complexity at all levels.  Resource constraints of sensor nodes pose another threat to security of the network in terms of memory, energy, processing power etc. Hence Symmetric cryptography or symmetric encryption is used because asymmetric cryptography becomes too expensive. Conventional security techniques used earlier cannot be directly or indirectly applied on WSN. Security becomes extremely importantwhensensornetworksaredeployed,as they are susceptible to various malicious attacks because of its transmissionnature,resourcerestrictionanddeployment in harsh environment. So existing security mechanisms are not enough for WSN, and new ideas are needed. Symmetric key techniques, asymmetric key techniques and hash functions are crypto mechanisms used for achieving security in wireless sensor networks, it is extremely important to authenticate and encrypt messages sent between sensor nodes. WSN areveryconstrainedintermsof battery power, node lifetime, stability, throughput, computing, and communication. WSN needs a light weight cryptographic algorithm. WSN’s main security aims are confidentiality, integrity, authentication, availability, survivability, along with efficiency, freshness and scalability. 5. ISSUES AND CHALLENGES IN DESIGNING WSN  Resource limitation (Limited memory,computation and power)  Maintenance of WSN is difficult.  Sensor node depend only on battery and the batteries can neither be recharged nor replaced. Hence the hardware design consideration is must.  While deploying, the sensor nodes are scattered so they can’t fit into any regular topology.  Reliability of communication is another issue that should be considered (Unreliable data transfer, Conflicts and latency are some if the challenges of WSN’s)  Topology changes, Node failure, addition and deletion of nodes is among other challenging issue in WSNs.  Transmission nature, hostile environment of WSN and security are some of the challenging issue.  Attaining synchronization between nodes is also another issue. 6. APPLICATIONS OF WSN Wireless Sensor Networks comprise of numerous types of sensors such as seismic, thermal, low sampling rate magnetic, infrared, visual, acoustic and radar. These sensors are able to monitor a wide variety of ambient conditions like humidity, temperature, lightning, vehicular movement, pressure, soil makeup, noise levels and so on. WSN application can be classified into following categories:  Military applications (enemy tracking, security detection, surveillance)  Environmental applications ( air pollution detection, landslide detection, forest fire detection, animal tracking, water quality monitoring, natural disaster prevention, flood detection, weather prediction,)  Healthcare applications (implanted, wearable and surroundingembeddedmedical devices,monitoringand tracking of doctors and patients,  Home applications (smart lighting, cooling and heating devices)  Industrial applications (data logging, wine production, structural and machine health monitoring etc.)  Transportation application (monitoring of traffic, dynamic routing management 7. ADVANTAGES  Flexible infrastructure  Easily implemented  Fruitful for society  Can deal with numerous nodes at a time  Made up of three distant topologies(mesh, tree, star)  It can be deployed on vast scale  Can be monitored and accessed with remote locations  Support embedded systems  Increasing the number of sensor nodes is easy.  Execution is cheap  Saves cost as it avoids plenty of wiring.  Suitable for unreachable areas such as over the seas, mountains
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2099 8. DISADVANTAGES  WSN possess lower storage capacity (approx. few hundred kilobytes)  Comparatively less secure than wired network  Hackers can easily hack sensor network and acquire all data.  Slow Communication and transmission speed  SN are more prone to failure  Easily distracted by its surrounding  Slow processing power  Works for short communication range  Require minimal energy efficient protocol  Have batteries with limited lifetime  Need of extra equipment for setup like computer 9. CONCLUSIONS Over the last few years hyper efficient design of WSN has become a leading platform for research and development. WSN started a revolution in technical field and attracts researchers toward it. Its sensing technology enhance its popularity worldwide. Researchers in WSN mainly focuses on hike in lifetime and stability of sensor nodes. Major research areas of WSN are distributed signal processing, data fusion, energy efficient routing algorithms, and security of WSN. WSN has highly influenced our life in all aspects. It has wide range of applications. With the short introduction of WSN, its organization, characteristics and challenges have been discussed as well the application of WSN have been highlighted along with the advantage and disadvantages of WSN. REFERENCES [1] I.F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, E.Cayirci, “A survey on sensor networks”, IEEE Communications Magazine, Vol. 40, Issue (8), pp. 102-114, 2002. [2] Samira Kalantary, Sara Taghipour, “ A Survey on architectures, protocols, applications and management in wireless Sensor Networks”,Journal of Advanced Computer Science & Technoloy, pp. 1- 11, 2014. [3] KazemSohraby, Daniel Minoli,TaiebZnati,“Wireless Sensor Networks”, Wiley Publications, Second Edition. [4] Gaurav Sharma, SumanBala, Anil K. Verma, “Security Frameworks for Wireless Sensor Networks-Review,” 2nd International Conference on Communication, Computing & Security [ICCCS- 2012], No. 6, pp. 978 – 987, 2012. [5] Muhammad Zahid Khan et al., “Limitations of Simulation Tools for Large-Scale Wireless Sensor Networks,” Workshops of International Conference on Advanced Information Networking and Applications, pp. 820-825, 2011. [6] M. Ben Salah, A. Boulouz. "Energy Efficient Clustering Based OnLEACH." IEEE,2016IEEE,2016 [7] H. Mohammad, M. AfsarandN.Tayarani,“Clustering in sensor network: A literature survey”, Journal of Network & Computer Appl., 2014.