Review Paper on Wireless Sensor Networks using Different Types of Approaches

2019 ◽  
Vol 7 (7) ◽  
pp. 257-261
Author(s):  
Diba Imam ◽  
Rajdeep Shrivastava
Author(s):  
Ibrahiem Mahmoud Mohamed El Emary

This chapter gives a brief background on network management and how it is integrated into sensor network as well as the application of computational intelligence techniques in managing wireless sensor networks. Also discussed how Genetic Algorithms work in common and how they can be applied to sensor networks. Among the major management tasks rely on consumption power management, so there are many challenges associated with sensor networks but the primary challenge is energy consumption. Sensor networks are typically have little human interaction and are installed with limited battery supplies. This makes energy conservation a critical issue in deployed WSNs. All types of networks require monitoring and maintenance. A service that supplies a set of tools and applications that assist a network manager with these tasks is network management. It includes the administration of networks and all associated components. While all networks require some form of network management, different types of networks may stress certain aspects of network management. Some networks may also impose new tasks on network management. There are different types of network management architectures: centralized, hierarchical and distributed. In a centralized approach, one central server performs the role of the network management application. A hierarchical architecture will include multiple platforms, typically one server and several clients, performing network management functions.


2011 ◽  
Vol 162 (4) ◽  
pp. 7-27
Author(s):  
Henryk ŁUKASIEWICZ

The aim of this publication is to introduce the issues connected with the work of sensors for military purposes. It explains the theoretical and practical aspects of the identification capabilities and the use of the different types of sensors in a multi-sensor wireless network. Very up-to-date is the use of technical devices to monitor the areas occupied by the enemy and which are hard to reach. Over the last few years, the possibility of gaining updated information without risking soldiers’ lives has become very important.Numerous telecoms have been influenced by the development of new technologies. They have begun implementing technologies connected with communication and the construction of sensors for industrial and military purposes.


2015 ◽  
Vol 3 (4) ◽  
pp. 330-334
Author(s):  
Qazi Emad-ul-Haq ◽  
◽  
Hatim Aboalsamh ◽  
Wadood Abdul ◽  
Muhammad Hussain ◽  
...  

Author(s):  
Lalitha Bhagavathi Gurajada ◽  
Sai Deepthi Rajaputra ◽  
Indira Gogineni ◽  
Riaz Shaik

In today’s world, Security is the prime concern for each application. Network security and Computer protection are the serious issues. A broad range of Wireless Sensor Networks (WSNs) applications[1][15] are widely used in military, researches etc. The key subject of computing is to provide network security several types of attacks are increasing day by day. The attacks present in different layers are produced due to the susceptibilities present in the layers. The Seven layers in OSI model are formulated to convey the information from highest layer to lowest layer. Broadcast of data gets modified according to the layer in which it lies. Individually every layer is weak to different types of attacks. This paper models about the different attacks present in each layer of OSI.  


2017 ◽  
Vol 10 (3) ◽  
pp. 653-659
Author(s):  
Sacachin Lalar ◽  
Shashi Bhushan ◽  
Surender Surender

Wireless Sensor Networks (WSNs) are developing very fast in the wireless networks. The wireless sensor network has the characteristics of limited memory, small size and limited battery. WSNs are vulnerable to the different types of attacks due to its characteristics. One of the attacks is clone node attack in which attacker capture the nodes from the network and stoles the information from it and replicates it in the network. From the clone nodes, the attacker can easily launch the different type of attacks in the network. To detect the clone node, different methods has been implemented .Each method having advantages and limitations. In the this paper, we explain the different methods to detect the clone nodes in the static wireless sensor network and compare their performance based on the communication cost and memory.


Sign in / Sign up

Export Citation Format

Share Document