SlideShare a Scribd company logo
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
DOI:10.5121/cseij.2022.12605 35
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR
BIG DATA
Richa Verma and Ravindara Bhatt
Department of Computer Engineering, Jaypee University of Information Technology,
Solan, India
ABSTRACT
Wireless sensor networks are continually developing in the big data world and are widely employed in
many aspects of life. In the monitoring region, the WSN gathers, analyses, and sends information about the
detected item. In recent years, WSN has also made important strides in the management of critical data
protection, traffic monitoring, and climate - change detection. The rich big data contributors known as
wireless sensor networks provide a significant amount of data from numerous sensor nodes in large-scale
networks (WSNs), which are among the numerous potential datasets. However, unlike traditional wireless
networks, suffer from significant constraints in communication and data dependability due to the cluster’s
constraints. This paper gives a detailed assessment of cutting-edge research on using WSN into large data
systems Potential network and effective deployment and scientific problems are presented and discussed in
the context of the study topics and aim. Finally, unresolved issues are addressed in order to discuss
interesting future research possibilities.
KEYWORDS
Big data, Wireless Sensor Networks, Big Data Storage, Protocol Layering, Sensitive Data, Challenges of
Big Data in WSN.
1. INTRODUCTION
The fundamental objectives of sensor-driven networks are to discover and record events,
aggregate and report the acquired data, and oversee tasks. The main WSN participants are known
as wireless sensor nodes. These wireless nodes are made up of the mote and sensor devices. The
sensor detects some event or physical phenomenon and informs the mote about it. The following
components make up Mote: a wireless communication interface, a digitizer, a CPU, some sort of
storage device, and a power supply. Power storage and power harvesting are two feasible
categories into which the nodes' power supply might be segmented [1]. WSN are frequently
installed in isolated locations where post-installation maintenance by humans is not feasible. As a
result, efforts are being undertaken to increase their effectiveness and robustness. Deployment of
WSN is hampered by a number of factors, including power consumption and vast deployment
distances. These obstacles no longer stand in the way of widespread remote deployment due to
automation trends and newly emerging applications. Big data systems benefit from efficient data
aggregation and in-network processing. In order to enhance system performance and address
WSN's limitations, it is crucial to analyse research articles that merge WSN with big data
systems. As an example of a basic system design, consider about a massive data system that is
WSN-based. The data is sent to a temporary store by the sink node once it has been collected
from the sensor nodes for subsequent data aggregation. Following this, a big data framework
employing the primary store may operate with the combined data. Applications and big data
platforms manage the converted data [2].
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
36
Fig. 1 Large-Scale Network System [2].
WSN routing is much more complex than in typical ad hoc networks due to its unique qualities.
For WSN, a variety of routing methods that differ from the standard TCP/IP addressing scheme
have been suggested. These tactics concentrated on network characteristics as well as structural
and functional requirements. Being aware of the factors that are crucial to the sensor applications
is necessary for developing a better WSN strategy. It is possible to put sensor nodes in remote or
dangerous areas. This demands that nodes be able to communicate with one another even in the
absence of a base station or predetermined cluster of motes. Additionally, it might not be able to
replenish the sensor nodes' batteries [1]. This article provides a thorough analysis of recent
research on integrating WSN into large-scale data systems. In light of the study's objectives and
themes, potential network, deployment, and scientific issues are given and explored. In order to
explore exciting future research opportunities, outstanding topics are then discussed.
2. RELATED WORK
Hadoop, MapReduce, and Big Table are three of the most popular technologies and
methodologies for Big Data. Because they rapidly and affordably process massive volumes of
data, these advances have transformed data management along with quickness. Extremely huge
amounts of data with various structures may be processed with Hadoop (or no structure at all).
Among the Hadoop elements that make up their linkages are HBase, H Catalog, Pig, Hive, Oozie,
Zookeeper, and Kafka nevertheless, Hadoop Distributed File System (HDFS) and MapReduce
for Big Data are the most extensively utilized elements and well-known ideas [4]. The
connections between the various parts of the Hadoop ecosystem are shown in Figure 2.
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
37
Fig. 2 Hadoop ecosystem [4].
The components of a wireless sensor network (WSN) are geographically dispersed independent
devices that communicate digitally, acquire data, and identify particular incidents of relevance in
the physical and ecological circumstances. A network of randomly placed sensor nodes is created
and is uniquely recognized by serial numbers that are directly tied to node placements. When
querying events in the WSN, the network is directly alerted of the events of interest without
notifying the nodes beforehand. After gathering information about the requested event, the
network sends a report to the user. WSNs offer more opportunities and ease for the capture,
transmission, and analysis of massive data. For instance, wireless sensors are made smaller and
less expensive, sensor nodes are adaptable in their networking, WSNs place data at the center of
the network, the most valuable data is gathered from various vantage points and stages, and
transmitted collected data is used to process large amounts of data in order to improve the
accuracy of the information. The data gathered and processed do in fact expand exponentially as
the volume and deployment space of WSNs networks increase, needing planning node energy
usage. High-efficiency networking is crucial in the application of WSNs in order to increase the
energy utilization rate of a single node to a higher extent, lower the energy usage of the entire
WSN, and lengthen the life cycle of WSNs [3]. A wireless big data system that manages
enormous amounts of data across wireless networks. Several writers concentrated on network
connectivity, such as information propagation, information network management, and innovative
applications under protocol stack, as compared to detailing the full system. [2].
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
38
Fig. 3 Protocol layering of wireless big data systems [2].
2.1. Finding and Limitations
Table 1. Finding and Limitations
Sr.
No.
Paper
Finding Limitations
1. 1
The advantages, benefits, and
drawbacks of various solutions put
forth in the WSN and IoT arena are
then carefully considered.
Additionally, the research compares
different solutions based on
performance metrics like diversity,
integration, range of motion,
renewability, versatility, energy
efficiency, expandability, latency,
confidentiality, and big data.
Dealing with data structure collected
on a massive scale makes it difficult
to satisfy the stated need. As data
sources continue to increase, new
data processing strategies must
always be developed to accommodate
Bigdata.
2. 2
Outlined the technical research
problems for WSN-based big data
systems as WSN is considered one of
Resultant solution is not being
proposed for open
issues in the research area.
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
39
the key data sources.
3. 11.
In research, analyses of more than 130
papers from 2014 to 2021 have been
presented. The paper discusses a
number of areas of Industry 4.0,
including the designing stage, security
requirements, deployment stage,
network classification, problems, and
obstacles.
The region's current issues and
difficulties are not being adequately
addressed.
When it comes to the application and
deployment of Internet and Wireless
sensor in Sector 4.0, the safe and
reliable communication of the data to
a distant location is not being
prioritized.
4. 4.
Implemented data life cycle that makes
use of the Big Data technologies and
terminologies in order to increase the
effectiveness of data management.
Presents a data life cycle that makes
use of big data technology and
terminology, however future study
directions in this area are not chosen
based on methodology, findings, and
a number of unresolved problems.
5. 5.
The deployment of a large number of
nodes is supposed to highlight the
demanding specifications of WSN.
Ground level effects on WSN signals,
which affect data transmission between
nodes, have been taken into
consideration during experimental
evaluation to identify the various WSN
properties. For real-time Big Data
applications including border
surveillance, environmental
monitoring, and industrial processes,
the BDEG big data gathering method
has been developed.
Research is not focused on shortening
the total data transmission distance,
and additional factors like rate of bit
errors and ratio of signal to noise are
not taken into account in order to
further develop the BDEG algorithm.
6. 6.
By reducing energy consumption,
latency, PDR, throughput, false ratio,
PRR, and network overhead, the
performance metrics of WSN are
evaluated. The demand for routing
algorithms; the various types of routing
algorithms used to improve
performance; The most crucial element
in a wireless sensor network (WSN) is
QoS, while other factors should be
focused on enhancing security issues.
Networks are distant and exposed to a
variety of security risks that might
have a severe impact on performance.
When the network is used in
operation applications, such strategic
warfare, a solution to the issue is not
being addressed.
7. 7.
It is being evaluated the network
properties as well as the clustering
objectives of 37 cluster-based
methodologies while reviewing the
numerous network characteristics
supported by clustering (heterogeneity,
mobility, and so on). Unsurprisingly,
the data show that the main goal of
using such strategies is to decrease
energy use.
There are no further attempts being
made to address the issues of
mobility and heterogeneity through
clustering.
8. 8.
Explains the needs for managing
sensitive data’s security in the WSN
using big data technology. In response
to these issues, it applies the
application of WSN in the security
management of sensitive data and
Data security is the most often
utilized area, accounting for 38.41%
of all uses, followed by network
security (33.74%), and system
security (27.5%). The application
needs more enhancements overall
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
40
offers some assistance in problem
solving. It analyses the issues in the
security management of sensitive data
from many angles.
because it is not very thorough.
9. 9.
Explains how WSN and Big Data are
used in a collaborative firefighting
system in detail. The experiment was
carried out in a barren space. There
was equipment for WSN, Big Data,
and other subsystems. The experiment
employed just one FDU. Using a
microcontroller that was
preprogramed, it operated
independently. The HARMS (Human
Agent Robot Machine Sensor) protocol
was crucial to all of these
communications.
It would be preferable to utilize a
different microcontroller that can
support the JAVA programming
language in place of the one used in
WSN. WSN was unable to fully
utilize the HARMS model's benefits.
10. 10.
Networked models are used to show
how information outcome across
robotic wireless sensor networks may
maximize output while also
maximizing the amount of data
available.
Big data collection, sensing,
processing, storing, analysis, and
integration are still challenges for
intelligent industrial systems. More
visual monitoring systems need to be
studied and used.
3. UNRESOLVED BIG DATA CHALLENGES IN WSN
(1) Individuality and Cooperation: - Because IoT devices differ from one another,
compatibility is a problem. In the WSN or IoT environment, the different distributed
devices producing various types of data must connect [1]. As IoT applications and
connected devices become more diverse, ongoing work is needed in this area.
(2) Mobility: - Facilitating communication among fast moving objects, such as cars, and
exploiting mobility to improve communication effectiveness are difficult given the
impending advancement of IoT systems. It is obvious to address the issue of mobility for
things with some improved methods given the ubiquitous or widespread distribution of
things and the natural demand to facilitate their movement in IoT scenarios. Unlike a
traditional WSN, the mobility patterns in the networks may not always guarantee
connectivity between the source and the destination. As a result, feasible clustering and
mobility prediction algorithms should be created in accordance with the additional
restrictions of each network. In the network context, clustering algorithms also need to
be updated to take connectivity and mobility into account [1,2].
(3) Fog Computing and Real-Time Communications: - Big data systems strongly favor real-
time communication and processing because to the delay-sensitive nature of sensed data
in WSN. Supporting real-time communications is challenging with WSNs due to
significant node restrictions. Moreover, real-time tasks cannot be carried out by a big
data system built on a cloud computing architecture. Fog computing, which aims to
improve low latency, mobility, network bandwidth, security, and privacy, was recently
proposed to extend cloud services to the edge of the network by bringing computation,
communication, and storage closer to the edge devices and end users in order to support
real-time tasks. As a result, real-time processing can be supported by a big data system
based on fog computing. However, there isn't yet a standout WSN solution for real-time
communication [2].
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
41
(4) Delay: - Due to the enormous number of devices communicating with sensors and
producing various forms of data, numerous applications have experienced delays.
Particularly in WSN, IoT objects have typically been delay-sensitive objects. Numerous
factors, including topology, radio interference, mobility, etc., could be the cause of the
problem. With the IoT's ever-growing data sources, it is necessary to move in this path [
1].
(5) Model-based Simulation: - In research work, performance assessment and comparison
are crucial. Although numerous platforms have been proposed for big data and WSN,
there isn't a testing ground or simulator that integrates both of these technologies. It
seems feasible to integrate a WSN simulation into a big data simulator or platform for
broad tests as a temporary fix. On the other hand, creating an interface between two
systems to share data in a way that eliminates dependency is necessary for a long-term
solution. A modular and extensible assessment platform that can accommodate various
WSN types is also needed. Additionally, as evaluation is mostly dependent on
modelling, more accurate traffic and risk analysis is important for improving the
reliability of the experiment [2].
(6) Security: - Security for conventional WSNs is constrained to the relevant area. However,
because IoT systems enable communication between highly scattered objects over the
internet, people's perceptions of security are altered and improved. Despite the fact that
many researchers have included security and privacy in their suggested solutions, such as
blockchain technology, the fight against various forms of intimidation put forth by
attackers is constantly fascinating and thrilling. To link a blockchain, cryptography
processing and public key decryption are needed. Additionally, in order to transmit data
when constructing a new blockchain, the link's earlier and later sequences must be
confirmed. Therefore, various problems must be resolved in order to accomplish
immediate data updating and storage. Therefore, it is clear that improving security and
privacy is a problem that needs to be addressed [1,12].
4. CONCLUSIONS
In the circumstances where WSN was considered one of the key data sources, we examined
technological research concerns for WSN-based large data systems. Before describing the
potential applications for large data systems in WSN, we first discussed the key contributions of
each work. We concentrate particularly on wireless big data systems' protocol layering and large
data in WSN. The remaining unanswered questions in this field of study are then discussed.
REFERENCES
[1] S. Sharma, & V. K. Verma, (2022) “An integrated exploration on internet of things and wireless
sensor networks,” Wireless Personal Communications, 124(3), 2735-2770.
[2] B.S. Kim, K. I. Kim, B Shah, F. Chow, and K. H. Kim, (2019) “Wireless sensor networks for big
data systems,” Sensors, 19(7), 1565.
[3] Y Chen, X Zhu, K. Fang, X. Chen, T. Guo, C. Li and Z. Zou, (2022) “An improved method for sink
node deployment in wireless sensor network to big data,” Neural Computing and
Applications, 34(12), 9499-9510.
[4] N. Khan, I. Hashem, I. A. T. Yaqoob, Z. Inayat, W. K Mahmoud Ali, M. Alam and A. Gani, (2014)
“Big data: survey, technologies, opportunities, and challenges,” The scientific world journal.
[5] S. Rani, S. H. Ahmed, R. Talwar and J. Malhotra, (2017) “Can sensors collect big data? An energy-
efficient big data gathering algorithm for a WSN,”IEEE Transactions on Industrial
Informatics, 13(4), 1961-1968.
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
42
[6] A. Raja Basha, (2022) “A review on wireless sensor networks: routing,” Wireless Personal
Communications, 1-41.
[7] S. El Khediri, (2022)“Wireless sensor networks: a survey, categorization, main issues, and future
orientations for clustering protocols,” Computing, 1-63.
[8] H. Lin, B. Weng, J. Pan, C. Lin and Q. Yang, (2021) ”Application of Wireless Sensor Networks in
the Sensitive Data Security of Intelligent Data Center under the Big Data Environment,” In Journal
of Physics: Conference Series (Vol. 1982, No. 1, p. 012017). IOP Publishing.
[9] B. Khaday, E. T. Matson, J. Springer, Y. K. Kwon, H. Kim, S. Kim and H. S. Woo, (2015)
“Wireless sensor network and big data in cooperative fire security system using harms,” In 2015 6th
International Conference on Automation, Robotics and Applications (ICARA) (pp. 405-410). IEEE.
[10] G. Lazaroiu, M. Andronie, M. Iatagan, M. Geamanu, R. Ștefanescu, and I. Dijmarescu, (2022)
“Deep Learning-Assisted Smart Process Planning, Robotic Wireless Sensor Networks, and
Geospatial Big Data Management Algorithms in the Internet of Manufacturing Things,” ISPRS
International Journal of Geo-Information, 11(5), 277.
[11] M. Majid, S. Habib, A. R. Javed, M. Rizwan, G. Srivastava, T. R. Gadekallu and J. C. W. Lin,
(2022) “Applications of wireless sensor networks and internet of things frameworks in the industry
revolution 4.0: A systematic literature review,”Sensors, 22(6), 2087.
[12] S. J. Hsiao and W. T. Sung, (2021) “Employing blockchain technology to strengthen security of
wireless sensor networks,” IEEE Access, 9, 72326-72341.

More Related Content

DOCX
CAN SENSORS COLLECT BIG DATA? AN ENERGY EFFICIENT BIG DATA GATHERING ALGORIT...
PDF
Concepts and evolution of research in the field of wireless sensor networks
DOCX
Towards energy efficient big data gathering
PDF
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
PDF
Review of Wireless Sensor Networks
PDF
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
PDF
IRJET- A Comprehensive Study of Energy Efficient Algorithms in WSN
DOCX
Insect Mointoring
CAN SENSORS COLLECT BIG DATA? AN ENERGY EFFICIENT BIG DATA GATHERING ALGORIT...
Concepts and evolution of research in the field of wireless sensor networks
Towards energy efficient big data gathering
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
Review of Wireless Sensor Networks
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
IRJET- A Comprehensive Study of Energy Efficient Algorithms in WSN
Insect Mointoring

Similar to SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA (20)

DOCX
Chapter 1 of insect monitoring using wsn sensor
DOCX
insect monitoring through wsn
PDF
Novel holistic architecture for analytical operation on sensory data relayed...
PDF
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
PDF
H017133442
PDF
Issues and Challenges in Distributed Sensor Networks- A Review
PDF
Survey of Wireless Sensor Network Application
PDF
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
PDF
F33022028
PDF
F33022028
PDF
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSN
PPTX
Real time data management on wsn
PDF
A condition-based distributed approach for secured privacy preservation of no...
PDF
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
PDF
Design Issues and Applications of Wireless Sensor Network
PDF
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
PDF
Data Visualization and Communication by Big Data
PDF
Oj3425062509
PDF
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
PDF
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
Chapter 1 of insect monitoring using wsn sensor
insect monitoring through wsn
Novel holistic architecture for analytical operation on sensory data relayed...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
H017133442
Issues and Challenges in Distributed Sensor Networks- A Review
Survey of Wireless Sensor Network Application
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
F33022028
F33022028
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSN
Real time data management on wsn
A condition-based distributed approach for secured privacy preservation of no...
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
Design Issues and Applications of Wireless Sensor Network
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
Data Visualization and Communication by Big Data
Oj3425062509
COMPRESSIVE DATA GATHERING TECHNIQUE BY AVOIDING CORRELATED DATA IN WSN
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
Ad

More from CSEIJJournal (20)

PDF
Soil Analysis, Disease Detection and Pesticide Recommendation for Farmers usi...
PDF
Sentiment Patterns in YouTube Comments: A Comprehensive Analysis
PDF
AI-Enabled Fruit Decay Detection - CSEIJ
PDF
Mind-Balance: AI-Powered Mental Health Assistant
PDF
CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...
PDF
CFP : 6th International Conference on Machine Learning Techniques and NLP (ML...
PDF
Enhancing Surveillance System through EdgeComputing: A Framework For Real-Tim...
PDF
Ranjan.G, S. Akshatha, Sandeep.N and Vasanth.A, Acharya Institute of Technolo...
PDF
CAN WE TRUST MACHINES? A CRITICAL LOOK AT SOME MACHINE TRANSLATION EVALUATION...
PDF
CFP : 4th International Conference on Computer Science and Information Techno...
PDF
Artificial Intelligence and Machine Learning Based Plant Monitoring
PDF
RNN-GAN Integration for Enhanced Voice-Based Email Accessibility: A Comparati...
PDF
CFP : 6 th International Conference on Big Data and Applications (BDAP 2025)
PDF
CFP : 12th International Conference on Computer Science and Information Techn...
PDF
Can We Trust Machines? A Critical Look at Some Machine Translation Evaluation...
PDF
RNN-GAN Integration for Enhanced Voice-Based Email Accessibility: A Comparati...
PDF
CFP : 6 th International Conference on Data Mining and Software Engineering (...
DOCX
CFP : 6th International Conference on Machine Learning Techniques and NLP (ML...
PDF
Enhancing Student Engagement and Personalized Learning through AI Tools: A Co...
PDF
CFP : 6th International Conference on Big Data, Machine Learning and IoT (BML...
Soil Analysis, Disease Detection and Pesticide Recommendation for Farmers usi...
Sentiment Patterns in YouTube Comments: A Comprehensive Analysis
AI-Enabled Fruit Decay Detection - CSEIJ
Mind-Balance: AI-Powered Mental Health Assistant
CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...
CFP : 6th International Conference on Machine Learning Techniques and NLP (ML...
Enhancing Surveillance System through EdgeComputing: A Framework For Real-Tim...
Ranjan.G, S. Akshatha, Sandeep.N and Vasanth.A, Acharya Institute of Technolo...
CAN WE TRUST MACHINES? A CRITICAL LOOK AT SOME MACHINE TRANSLATION EVALUATION...
CFP : 4th International Conference on Computer Science and Information Techno...
Artificial Intelligence and Machine Learning Based Plant Monitoring
RNN-GAN Integration for Enhanced Voice-Based Email Accessibility: A Comparati...
CFP : 6 th International Conference on Big Data and Applications (BDAP 2025)
CFP : 12th International Conference on Computer Science and Information Techn...
Can We Trust Machines? A Critical Look at Some Machine Translation Evaluation...
RNN-GAN Integration for Enhanced Voice-Based Email Accessibility: A Comparati...
CFP : 6 th International Conference on Data Mining and Software Engineering (...
CFP : 6th International Conference on Machine Learning Techniques and NLP (ML...
Enhancing Student Engagement and Personalized Learning through AI Tools: A Co...
CFP : 6th International Conference on Big Data, Machine Learning and IoT (BML...
Ad

Recently uploaded (20)

PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT
Project quality management in manufacturing
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Geodesy 1.pptx...............................................
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Digital Logic Computer Design lecture notes
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
bas. eng. economics group 4 presentation 1.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Project quality management in manufacturing
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Geodesy 1.pptx...............................................
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Digital Logic Computer Design lecture notes
CYBER-CRIMES AND SECURITY A guide to understanding
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
bas. eng. economics group 4 presentation 1.pptx

SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA

  • 1. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 DOI:10.5121/cseij.2022.12605 35 SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA Richa Verma and Ravindara Bhatt Department of Computer Engineering, Jaypee University of Information Technology, Solan, India ABSTRACT Wireless sensor networks are continually developing in the big data world and are widely employed in many aspects of life. In the monitoring region, the WSN gathers, analyses, and sends information about the detected item. In recent years, WSN has also made important strides in the management of critical data protection, traffic monitoring, and climate - change detection. The rich big data contributors known as wireless sensor networks provide a significant amount of data from numerous sensor nodes in large-scale networks (WSNs), which are among the numerous potential datasets. However, unlike traditional wireless networks, suffer from significant constraints in communication and data dependability due to the cluster’s constraints. This paper gives a detailed assessment of cutting-edge research on using WSN into large data systems Potential network and effective deployment and scientific problems are presented and discussed in the context of the study topics and aim. Finally, unresolved issues are addressed in order to discuss interesting future research possibilities. KEYWORDS Big data, Wireless Sensor Networks, Big Data Storage, Protocol Layering, Sensitive Data, Challenges of Big Data in WSN. 1. INTRODUCTION The fundamental objectives of sensor-driven networks are to discover and record events, aggregate and report the acquired data, and oversee tasks. The main WSN participants are known as wireless sensor nodes. These wireless nodes are made up of the mote and sensor devices. The sensor detects some event or physical phenomenon and informs the mote about it. The following components make up Mote: a wireless communication interface, a digitizer, a CPU, some sort of storage device, and a power supply. Power storage and power harvesting are two feasible categories into which the nodes' power supply might be segmented [1]. WSN are frequently installed in isolated locations where post-installation maintenance by humans is not feasible. As a result, efforts are being undertaken to increase their effectiveness and robustness. Deployment of WSN is hampered by a number of factors, including power consumption and vast deployment distances. These obstacles no longer stand in the way of widespread remote deployment due to automation trends and newly emerging applications. Big data systems benefit from efficient data aggregation and in-network processing. In order to enhance system performance and address WSN's limitations, it is crucial to analyse research articles that merge WSN with big data systems. As an example of a basic system design, consider about a massive data system that is WSN-based. The data is sent to a temporary store by the sink node once it has been collected from the sensor nodes for subsequent data aggregation. Following this, a big data framework employing the primary store may operate with the combined data. Applications and big data platforms manage the converted data [2].
  • 2. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 36 Fig. 1 Large-Scale Network System [2]. WSN routing is much more complex than in typical ad hoc networks due to its unique qualities. For WSN, a variety of routing methods that differ from the standard TCP/IP addressing scheme have been suggested. These tactics concentrated on network characteristics as well as structural and functional requirements. Being aware of the factors that are crucial to the sensor applications is necessary for developing a better WSN strategy. It is possible to put sensor nodes in remote or dangerous areas. This demands that nodes be able to communicate with one another even in the absence of a base station or predetermined cluster of motes. Additionally, it might not be able to replenish the sensor nodes' batteries [1]. This article provides a thorough analysis of recent research on integrating WSN into large-scale data systems. In light of the study's objectives and themes, potential network, deployment, and scientific issues are given and explored. In order to explore exciting future research opportunities, outstanding topics are then discussed. 2. RELATED WORK Hadoop, MapReduce, and Big Table are three of the most popular technologies and methodologies for Big Data. Because they rapidly and affordably process massive volumes of data, these advances have transformed data management along with quickness. Extremely huge amounts of data with various structures may be processed with Hadoop (or no structure at all). Among the Hadoop elements that make up their linkages are HBase, H Catalog, Pig, Hive, Oozie, Zookeeper, and Kafka nevertheless, Hadoop Distributed File System (HDFS) and MapReduce for Big Data are the most extensively utilized elements and well-known ideas [4]. The connections between the various parts of the Hadoop ecosystem are shown in Figure 2.
  • 3. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 37 Fig. 2 Hadoop ecosystem [4]. The components of a wireless sensor network (WSN) are geographically dispersed independent devices that communicate digitally, acquire data, and identify particular incidents of relevance in the physical and ecological circumstances. A network of randomly placed sensor nodes is created and is uniquely recognized by serial numbers that are directly tied to node placements. When querying events in the WSN, the network is directly alerted of the events of interest without notifying the nodes beforehand. After gathering information about the requested event, the network sends a report to the user. WSNs offer more opportunities and ease for the capture, transmission, and analysis of massive data. For instance, wireless sensors are made smaller and less expensive, sensor nodes are adaptable in their networking, WSNs place data at the center of the network, the most valuable data is gathered from various vantage points and stages, and transmitted collected data is used to process large amounts of data in order to improve the accuracy of the information. The data gathered and processed do in fact expand exponentially as the volume and deployment space of WSNs networks increase, needing planning node energy usage. High-efficiency networking is crucial in the application of WSNs in order to increase the energy utilization rate of a single node to a higher extent, lower the energy usage of the entire WSN, and lengthen the life cycle of WSNs [3]. A wireless big data system that manages enormous amounts of data across wireless networks. Several writers concentrated on network connectivity, such as information propagation, information network management, and innovative applications under protocol stack, as compared to detailing the full system. [2].
  • 4. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 38 Fig. 3 Protocol layering of wireless big data systems [2]. 2.1. Finding and Limitations Table 1. Finding and Limitations Sr. No. Paper Finding Limitations 1. 1 The advantages, benefits, and drawbacks of various solutions put forth in the WSN and IoT arena are then carefully considered. Additionally, the research compares different solutions based on performance metrics like diversity, integration, range of motion, renewability, versatility, energy efficiency, expandability, latency, confidentiality, and big data. Dealing with data structure collected on a massive scale makes it difficult to satisfy the stated need. As data sources continue to increase, new data processing strategies must always be developed to accommodate Bigdata. 2. 2 Outlined the technical research problems for WSN-based big data systems as WSN is considered one of Resultant solution is not being proposed for open issues in the research area.
  • 5. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 39 the key data sources. 3. 11. In research, analyses of more than 130 papers from 2014 to 2021 have been presented. The paper discusses a number of areas of Industry 4.0, including the designing stage, security requirements, deployment stage, network classification, problems, and obstacles. The region's current issues and difficulties are not being adequately addressed. When it comes to the application and deployment of Internet and Wireless sensor in Sector 4.0, the safe and reliable communication of the data to a distant location is not being prioritized. 4. 4. Implemented data life cycle that makes use of the Big Data technologies and terminologies in order to increase the effectiveness of data management. Presents a data life cycle that makes use of big data technology and terminology, however future study directions in this area are not chosen based on methodology, findings, and a number of unresolved problems. 5. 5. The deployment of a large number of nodes is supposed to highlight the demanding specifications of WSN. Ground level effects on WSN signals, which affect data transmission between nodes, have been taken into consideration during experimental evaluation to identify the various WSN properties. For real-time Big Data applications including border surveillance, environmental monitoring, and industrial processes, the BDEG big data gathering method has been developed. Research is not focused on shortening the total data transmission distance, and additional factors like rate of bit errors and ratio of signal to noise are not taken into account in order to further develop the BDEG algorithm. 6. 6. By reducing energy consumption, latency, PDR, throughput, false ratio, PRR, and network overhead, the performance metrics of WSN are evaluated. The demand for routing algorithms; the various types of routing algorithms used to improve performance; The most crucial element in a wireless sensor network (WSN) is QoS, while other factors should be focused on enhancing security issues. Networks are distant and exposed to a variety of security risks that might have a severe impact on performance. When the network is used in operation applications, such strategic warfare, a solution to the issue is not being addressed. 7. 7. It is being evaluated the network properties as well as the clustering objectives of 37 cluster-based methodologies while reviewing the numerous network characteristics supported by clustering (heterogeneity, mobility, and so on). Unsurprisingly, the data show that the main goal of using such strategies is to decrease energy use. There are no further attempts being made to address the issues of mobility and heterogeneity through clustering. 8. 8. Explains the needs for managing sensitive data’s security in the WSN using big data technology. In response to these issues, it applies the application of WSN in the security management of sensitive data and Data security is the most often utilized area, accounting for 38.41% of all uses, followed by network security (33.74%), and system security (27.5%). The application needs more enhancements overall
  • 6. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 40 offers some assistance in problem solving. It analyses the issues in the security management of sensitive data from many angles. because it is not very thorough. 9. 9. Explains how WSN and Big Data are used in a collaborative firefighting system in detail. The experiment was carried out in a barren space. There was equipment for WSN, Big Data, and other subsystems. The experiment employed just one FDU. Using a microcontroller that was preprogramed, it operated independently. The HARMS (Human Agent Robot Machine Sensor) protocol was crucial to all of these communications. It would be preferable to utilize a different microcontroller that can support the JAVA programming language in place of the one used in WSN. WSN was unable to fully utilize the HARMS model's benefits. 10. 10. Networked models are used to show how information outcome across robotic wireless sensor networks may maximize output while also maximizing the amount of data available. Big data collection, sensing, processing, storing, analysis, and integration are still challenges for intelligent industrial systems. More visual monitoring systems need to be studied and used. 3. UNRESOLVED BIG DATA CHALLENGES IN WSN (1) Individuality and Cooperation: - Because IoT devices differ from one another, compatibility is a problem. In the WSN or IoT environment, the different distributed devices producing various types of data must connect [1]. As IoT applications and connected devices become more diverse, ongoing work is needed in this area. (2) Mobility: - Facilitating communication among fast moving objects, such as cars, and exploiting mobility to improve communication effectiveness are difficult given the impending advancement of IoT systems. It is obvious to address the issue of mobility for things with some improved methods given the ubiquitous or widespread distribution of things and the natural demand to facilitate their movement in IoT scenarios. Unlike a traditional WSN, the mobility patterns in the networks may not always guarantee connectivity between the source and the destination. As a result, feasible clustering and mobility prediction algorithms should be created in accordance with the additional restrictions of each network. In the network context, clustering algorithms also need to be updated to take connectivity and mobility into account [1,2]. (3) Fog Computing and Real-Time Communications: - Big data systems strongly favor real- time communication and processing because to the delay-sensitive nature of sensed data in WSN. Supporting real-time communications is challenging with WSNs due to significant node restrictions. Moreover, real-time tasks cannot be carried out by a big data system built on a cloud computing architecture. Fog computing, which aims to improve low latency, mobility, network bandwidth, security, and privacy, was recently proposed to extend cloud services to the edge of the network by bringing computation, communication, and storage closer to the edge devices and end users in order to support real-time tasks. As a result, real-time processing can be supported by a big data system based on fog computing. However, there isn't yet a standout WSN solution for real-time communication [2].
  • 7. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 41 (4) Delay: - Due to the enormous number of devices communicating with sensors and producing various forms of data, numerous applications have experienced delays. Particularly in WSN, IoT objects have typically been delay-sensitive objects. Numerous factors, including topology, radio interference, mobility, etc., could be the cause of the problem. With the IoT's ever-growing data sources, it is necessary to move in this path [ 1]. (5) Model-based Simulation: - In research work, performance assessment and comparison are crucial. Although numerous platforms have been proposed for big data and WSN, there isn't a testing ground or simulator that integrates both of these technologies. It seems feasible to integrate a WSN simulation into a big data simulator or platform for broad tests as a temporary fix. On the other hand, creating an interface between two systems to share data in a way that eliminates dependency is necessary for a long-term solution. A modular and extensible assessment platform that can accommodate various WSN types is also needed. Additionally, as evaluation is mostly dependent on modelling, more accurate traffic and risk analysis is important for improving the reliability of the experiment [2]. (6) Security: - Security for conventional WSNs is constrained to the relevant area. However, because IoT systems enable communication between highly scattered objects over the internet, people's perceptions of security are altered and improved. Despite the fact that many researchers have included security and privacy in their suggested solutions, such as blockchain technology, the fight against various forms of intimidation put forth by attackers is constantly fascinating and thrilling. To link a blockchain, cryptography processing and public key decryption are needed. Additionally, in order to transmit data when constructing a new blockchain, the link's earlier and later sequences must be confirmed. Therefore, various problems must be resolved in order to accomplish immediate data updating and storage. Therefore, it is clear that improving security and privacy is a problem that needs to be addressed [1,12]. 4. CONCLUSIONS In the circumstances where WSN was considered one of the key data sources, we examined technological research concerns for WSN-based large data systems. Before describing the potential applications for large data systems in WSN, we first discussed the key contributions of each work. We concentrate particularly on wireless big data systems' protocol layering and large data in WSN. The remaining unanswered questions in this field of study are then discussed. REFERENCES [1] S. Sharma, & V. K. Verma, (2022) “An integrated exploration on internet of things and wireless sensor networks,” Wireless Personal Communications, 124(3), 2735-2770. [2] B.S. Kim, K. I. Kim, B Shah, F. Chow, and K. H. Kim, (2019) “Wireless sensor networks for big data systems,” Sensors, 19(7), 1565. [3] Y Chen, X Zhu, K. Fang, X. Chen, T. Guo, C. Li and Z. Zou, (2022) “An improved method for sink node deployment in wireless sensor network to big data,” Neural Computing and Applications, 34(12), 9499-9510. [4] N. Khan, I. Hashem, I. A. T. Yaqoob, Z. Inayat, W. K Mahmoud Ali, M. Alam and A. Gani, (2014) “Big data: survey, technologies, opportunities, and challenges,” The scientific world journal. [5] S. Rani, S. H. Ahmed, R. Talwar and J. Malhotra, (2017) “Can sensors collect big data? An energy- efficient big data gathering algorithm for a WSN,”IEEE Transactions on Industrial Informatics, 13(4), 1961-1968.
  • 8. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 42 [6] A. Raja Basha, (2022) “A review on wireless sensor networks: routing,” Wireless Personal Communications, 1-41. [7] S. El Khediri, (2022)“Wireless sensor networks: a survey, categorization, main issues, and future orientations for clustering protocols,” Computing, 1-63. [8] H. Lin, B. Weng, J. Pan, C. Lin and Q. Yang, (2021) ”Application of Wireless Sensor Networks in the Sensitive Data Security of Intelligent Data Center under the Big Data Environment,” In Journal of Physics: Conference Series (Vol. 1982, No. 1, p. 012017). IOP Publishing. [9] B. Khaday, E. T. Matson, J. Springer, Y. K. Kwon, H. Kim, S. Kim and H. S. Woo, (2015) “Wireless sensor network and big data in cooperative fire security system using harms,” In 2015 6th International Conference on Automation, Robotics and Applications (ICARA) (pp. 405-410). IEEE. [10] G. Lazaroiu, M. Andronie, M. Iatagan, M. Geamanu, R. Ștefanescu, and I. Dijmarescu, (2022) “Deep Learning-Assisted Smart Process Planning, Robotic Wireless Sensor Networks, and Geospatial Big Data Management Algorithms in the Internet of Manufacturing Things,” ISPRS International Journal of Geo-Information, 11(5), 277. [11] M. Majid, S. Habib, A. R. Javed, M. Rizwan, G. Srivastava, T. R. Gadekallu and J. C. W. Lin, (2022) “Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review,”Sensors, 22(6), 2087. [12] S. J. Hsiao and W. T. Sung, (2021) “Employing blockchain technology to strengthen security of wireless sensor networks,” IEEE Access, 9, 72326-72341.