Role of Wireless Sensor Networks in Emerging Communication Technologies: A Review

Author(s):  
Muhammad Islam ◽  
Syed Jalil ◽  
Mubashir Rehmani
Author(s):  
Deepti Rani ◽  
Anju Sangwan ◽  
Anupma Sangwan ◽  
Tajinder Singh

With the enormous growth of sensor networks, information seeking from such networks has become an invaluable source of knowledge for various organizations to enhance the comprehension of people interests. Not only wireless sensor networks (WSNs) but its various classes also remain the hot topics of research. In this chapter, the primary focus is to understand the concept of sensor network in underwater scenario. Various mechanisms are used to recognize the activities underwater using sensor which examines the real-time events. With these features, a few challenges are also associated with sensor networks, which are addressed here. Machine learning (ML) techniques are the perfect key of success to resolve such issues due to their feasibility and adaption in complex problem environment. Therefore, various ML techniques have been explained to enhance the operational performance of WSNs, especially in underwater WSNs (UWSNs). The main objective of this chapter is to understand the concepts of UWSNs and role of ML to address the performance issues of UWSNs.


Author(s):  
Sanjay Kumar ◽  
Binod Kumar Singh ◽  
Akshita ◽  
Sonika Pundir ◽  
Rashi Joshi ◽  
...  

Abstract: WSN has been exhilarated in many application areas such as military, medical, environment, etc. Due to the rapid increase in applications, it causes proportionality to security threats. Mostly, nodes used, are independent of human reach and dependent on their limited resources, the major challenges can be framed as energy consumption and resource reliability. Introduction: Due to the limitation of resources in the sensor nodes, the traditionally intensive security mechanism is not feasible for WSNs. This limitation brought the concept of Digital watermarking in existence. The intent of this paper is to investigate the security related issues and role of watermarking in wireless sensor networks. Watermarking is an effective way to provide security, integrity, data aggregation and robustness in WSN. Mehtod: Digital watermarking is essential in WSN since it provides security in various forms such as confidentiality, service availability and data freshness. We have briefly discussed the various security requirements in the wireless sensor networks. Several issues and challenges, as well as the various threats of WMSN, is also considered. The related work, suggests that lots of research work are required to improve the security and authentication issues of WMSN by digital watermarking. This survey contribution will be helpful for researcher to accomplish effective watermarking scheme for WSN. Result: WSN is the collection of sensors that are spread in the environment. They measure and monitor physical conditions like temperature, sound, pressure, humidity, etc. and organize the collected data at the main location. The base station then forwards the data to end-users who analyze and make strategic decisions. Nowadays the modern network is bi-directional i.e. we can control the activity of the sensor. The central stations, unlike another sensor network, have infinite power, plenty of memory, powerful processors and a high bandwidth link. Whereas sensors are small in size, have fewer computation abilities, transfer wirelessly and are power-driven by small batteries Conclusion: Watermarking is an effective way to provide security, integrity, data aggregation and robustness in WSN. Digital watermarking is essential in WSN since it provides security in various forms such as confidentiality, data integrity, service availability and data freshness. In this paper, we have briefly discussed the various security requirements in the wireless sensor networks. We have also discussed work done by several authors in WSN with watermarking techniques Discussion: Wireless network faces more challenges as compared to wired network. In WSN, maximum amount of data and information can be stealed and effortlessly accessed during transmission. The nodes in a wireless sensor network (WSN) are resources constrained. Due to which WSNs have certain challenges i.e. processing power, storage and computational capacity and high bandwidth demand. Security schemes are not easy to design since the network tends to be large and ad-hoc. The analysis for privacy and security have been explored by some authors like J. Zhu et al. In recent years, a cryptography-based security designs have been proposed for WSNs. Cryptography is the process of concealing the information into the cipher text by encrypting it.


Author(s):  
Sunita Gupta ◽  
Sakar Gupta

Internet of things (IoT) is a network of connected devices that work together and exchange information. In IoT, things or devices means any object with its own IP address that is able to connect to a network and can send and receive using internet. Examples of IoT devices are computers, laptops, smart phones, and objects that are operational with chips to collect and correspond data over a network. The range of internet of things devices is huge. Consumers use smart phones to correspond with IoT devices.


Author(s):  
Dharm Singh Jat ◽  
Chucknorris Garikayi Madamombe

In recent years, there has been increased use of wireless sensor networks (WSNs) which consists of sensor nodes and the intelligent machine learning algorithms to improve the performance of various applications in smart environments. These smart environments include smart home, smart agriculture, smart office, and smart hospital. In various countries throughout the world, agriculture is regarded as the backbone of the economy. To date, many families in Africa are employed in the agriculture industry. The dawn of information communication technologies (ICT) has changed the conventional way in which farming is conducted. However, quite a large number of farmers in Africa are still stagnant and highly dependent on the traditional ways of farming which started hundreds of years ago. This chapter has presented the current problems in farming and irrigation systems and suggests solutions through proposing the intelligent WSNs in a smart environment.


10.5772/50256 ◽  
2012 ◽  
Vol 9 (1) ◽  
pp. 31 ◽  
Author(s):  
Jongbin Ko ◽  
Jungtaek Seo ◽  
Eui-Jik Kim ◽  
Taeshik Shon

Of the range of wireless communication technologies, wireless sensor networks (WSN) will be one of the most appropriate technologies for the Microgrid and Grid-enabled Vehicles in the Smartgrid. To ensure the security of WSN, the detection of attacks is more efficient than their prevention because of the lack of computing power. Malicious packet drops are the easiest means of attacking WSNs. Thus, the sensors used for constructing a WSN require a packet drop monitoring agent, such as Watchdog. However, Watchdog has a partial drop problem such that an attacker can manipulate the packet dropping rate below the minimum misbehaviour monitoring threshold. Furthermore, Watchdog does not consider real traffic situations, such as congestion and collision, and so it has no way of recognizing whether a packet drop is due to a real attack or network congestion. In this paper, we propose a malicious packet drop monitoring agent, which considers traffic conditions. We used the actual traffic volume on neighbouring nodes and the drop rate while monitoring a sending node for specific period. It is more effective in real network scenarios because unlike Watchdog it considers the actual traffic, which only uses the Pathrater. Moreover, our proposed method does not require authentication, packet encryption or detection packets. Thus, there is a lower likelihood of detection failure due to packet spoofing, Man-In-the Middle attacks or Wormhole attacks. To test the suitability of our proposed concept for a series of network scenarios, we divided the simulations into three types: one attack node, more than one attack nodes and no attack nodes. The results of the simulations meet our expectations.


Sign in / Sign up

Export Citation Format

Share Document