Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Study of Wireless Sensor Network For IoT Application

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Study of Wireless Sensor Network for IoT

Application
Snehal R. Thakur, Nidhi Solanki, Dr. P. H. Zope
PG Students,Assistant Professor
Dept. of E&TC, SSBTs College of Engineering and Technology, Jalgaon, MS, India
snehalthakur.2013@rediffmail.com , phzope@gmail.com

Abstract: node is connected to one or sometimes several sensors


if required. A sensor node typically consists of several
Wireless Sensor Networks (WSNs) have been widely
parts i.e. radio transceiver with an internal antenna, a
considered as one of the most important technologies for the
microcontroller used to interface with the sensors and
twenty - first century. Enabled by recent advances in
microelectronic mechanical systems (MEMS) and wireless an energy source usually a battery. The size of a sensor
communication technologies, tiny, cheap, and smart sensors node can be either small or large. The cost of sensor
deployed in a physical area and networked through wireless nodes can also range from hundreds to thousands
links and the Internet provide unprecedented opportunities dollars. WSN consists of a base station also called sink
for a variety of civilian and military applications, for example, that communicates with sensor nodes.
environmental monitoring, battle field surveillance, and
industry process control. Distinguished from traditional
wireless communication networks, for example, cellular
systems and mobile ad hoc networks (MANET), WSNs have
unique characteristics, for example, denser level of node
deployment, higher unreliability of sensor nodes, and severe
energy, computation, and storage constraints, which present
many new challenges in the development and IoT application
of WSNs. The common vision of such systems is usually
associated with one single concept, the internet of things (IoT),
where through the use of sensors, the entire physical
infrastructure is closely coupled with information and
communication technologies; where intelligent monitoring
and management can be achieved via the usage of networked
embedded devices. In the past decade, WSNs have received Fig. 1: DOT Wireless sensor network device designed to be the
tremendous attention from both academia and industry all approximate size of a quarter. Future devices will continue to be smaller,
over the world. A large amount of research activities have cheaper and longer lasting.
been carried out to explore and solve various design and
The most straightforward application of wireless sensor
application issues, and significant advances have been made in
the development and deployment of WSNs. It is envisioned network technology is to monitor remote environments for
that in the near future WSNs will be widely used in various low frequency data trends. For example, a chemical plant
civilian and military fields, and revolutionize the way we live, could be easily monitored for leaks by hundreds of sensors
work, and interact with the physical world. that automatically form a wireless interconnection network
and immediately report the detection of any chemical leaks.
Keyword: WSNs, Sensor Networks, LEACH (Low Energy Unlike traditional wired systems, deployment costs would
Adaptive Clustering Hierarchy), Design Issues, Routing be minimal. Instead of having to deploy thousands of feet
Protocols, Applications. of wire routed through protective conduit, installers simply
have to place quarter-sized device, such as the one pictured
I. Introduction
in Fig 1, at each sensing point. The network could be
Wireless sensor network is a wireless network incrementally extended by simply adding more devices
comprises of spatially independent distributed devices no rework or complex configuration. With the devices
using sensors in attempt to monitor physical and presented in this thesis, the system would be capable of
environmental conditions. WSN is built of several monitoring for anomalies for several years on a single set
nodes from few to hundreds or even thousands and of batteries.
These large number of nodes wirelessly communicate with the deployment density is also variable. For collecting high
each other and to the base station directly or indirectly, and resolution data, the node density might reach the level
have capabilities to sense the data from their surroundings, where a node has several thousand neighbors in their
store the data , pass their sensed data to their neighbour transmission range. The protocols deployed in sensor
sensor nodes or to the base station and perform some networks need to be scalable to these levels and be able to
computations on the sensed data. There are wide maintain adequate performance.
applications of WSN include: physical security, air traffic
control, environment monitoring, healthcare monitoring, Production Costs: Because many deployment models
military and so on. Sensor networks may be quite different consider the sensor nodes to be disposable devices, sensor
for various applications. With the rapid technological networks can compete with traditional information
development of sensors, WSNs will become the key gathering approaches only if the individual sensor nodes
technology for IoT. can be produced very cheaply. The target price envisioned
for a sensor node should ideally be less than $1.
II. Design issues of a wireless sensor network
Hardware Constraints: At minimum, every sensor node
There are a lot of challenges placed by the deployment of needs to have a sensing unit, a processing unit, a
sensor networks which are a superset of those found in transmission unit, and a power supply. Optionally, the
wireless ad hoc networks. Sensor nodes communicate over nodes may have several built-in sensors or additional
wireless, lossy lines with no infrastructure. An additional devices such as a localization system to enable location-
challenge is related to the limited, usually non-renewable aware routing. However, every additional functionality
energy supply of the sensor nodes. In order to maximize the comes with additional cost and increases the power
lifetime of the network, the protocols need to be designed consumption and physical size of the node. Thus,
from the beginning with the objective of efficient additional functionality needs to be always balanced
management of the energy resources (Akyildiz et al., against cost and low-power requirements.
2002). Wireless Sensor Network Design issues are
mentioned in (Akkaya et al., 2005), (Akyildizet al., 2002), Sensor Network Topology: Although WSNs have evolved
(SensorSim; Tossim, Younis et al., 2004), (Pan et al., 2003) in many aspects, they continue to be networks with
and different possible platforms for simulation and testing constrained resources in terms of energy, computing power,
of routing protocols for WSNs are discussed in ( NS-2, memory, and communications capabilities. Of these
Zeng et al., 1998, SensorSim, Tossiim ). constraints, energy consumption is of paramount
importance, which is demonstrated by the large number of
Let us now discuss the individual design issues in greater algorithms, techniques, and protocols that have been
detail. developed to save energy, and thereby extend the lifetime
of the network. Topology Maintenance is one of the most
Fault Tolerance: Sensor nodes are vulnerable and important issues researched to reduce energy consumption
frequently deployed in dangerous environment. Nodes can in wireless sensor networks.
fail due to hardware problems or physical damage or by
exhausting their energy supply. We expect the node failures Transmission Media: The communication between the
to be much higher than the one normally considered in nodes is normally implemented using radio communication
wired or infrastructure-based wireless networks. The over the popular ISM bands. However, some sensor
protocols deployed in a sensor network should be able to networks use optical or infrared communication, with the
detect these failures as soon as possible and be robust latter having the advantage of being robust and virtually
enough to handle a relatively large number of failures while interference free.
maintaining the overall functionality of the network. This is
especially relevant to the routing protocol design, which Power Consumption: As we have already seen, many of the
has to ensure that alternate paths are available for rerouting challenges of sensor networks revolve around the limited
of the packets. Different deployment environments pose power resources. The size of the nodes limits the size of the
different fault tolerance requirements. battery. The software and hardware design needs to
carefully consider the issues of efficient energy use. For
Scalability: Sensor networks vary in scale from several instance, data compression might reduce the amount of
nodes to potentially several hundred thousand. In addition, energy used for radio transmission, but uses additional
energy for computation and/or filtering. The energy policy
also depends on the application; in some applications, it
might be acceptable to turn off a subset of nodes in order to
conserve energy while other applications require all nodes
operating simultaneously.

III. Structure of a wireless sensor node

A sensor node is made up of four basic components such as


sensing unit, processing unit, transceiver unit and a power
unit which is shown in Fig. 2. It also has application
dependent additional components such as a location finding
system, a power generator and a mobilizer. Sensing units
are usually composed of two subunits: sensors and
analogue to digital converters (ADCs) (Akyildiz et al., Figure 2. The components of a sensor node
2002). The analogue signals produced by the sensors are
converted to digital signals by the ADC, and then fed into Using flash memory, the remote nodes acquire data on
the processing unit. command from a base station, or by an event sensed by one
or more inputs to the node. Moreover, the embedded
The processing unit is generally associated with a small firmware can be upgraded through the wireless network in
storage unit and it can manage the procedures that make the the field.
sensor node collaborate with the other nodes to carry out
the assigned sensing tasks. A transceiver unit connects the
node to the network. One of the most important
components of a sensor node is the power unit. Power units
can be supported by a power scavenging unit such as solar
cells. The other subunits, of the node are application
dependent.

A functional block diagram of a versatile wireless sensing


node is provided in Fig. 3.

Modular design approach provides a flexible and versatile


platform to address the needs of a wide variety of
applications. For example, depending on the sensors to be
deployed, the signal conditioning block can be re- Figure 3. Functional block diagram of a sensor node
programmed or replaced. This allows for a wide variety 10
The microprocessor has a number of functions including:
Wireless Sensor Networks Technology and Protocols
Managing data collection from the sensors
of different sensors to be used with the wireless sensing
performing power management functions
node. Similarly, the radio link may be swapped out as
interfacing the sensor data to the physical radio layer
required for a given applications wireless range
managing the radio network protocol
requirement and the need for bidirectional communications.
A key aspect of any wireless sensing node is to minimize
the power consumed by the system. Usually, the radio
subsystem requires the largest amount of power. Therefore,
data is sent over the radio network only when it is required.
An algorithm is to be loaded into the node to determine
when to send data based on the sensed event. Furthermore,
it is important to minimize the power consumed by the
sensor itself. Therefore, the hardware should be designed to
allow the microprocessor to judiciously control power to B. Network layer:
the radio, sensor, and sensor signal conditioner (Akyildiz et
al., 2002). The major function of this layer is routing. This layer has a
lot of challenges depending on the application but
III. Sensor Network Architecture apparently, the major challenges are in the power saving,
limited memory and buffers, and sensor does not have a
Most common architecture for WSN follows the OSI global ID and have to be self-organized. This is unlike
Model. Basically in sensor network we need five layers: computer networks with IP address and central device for
application layer, transport layer, network layer, data link controlling. The basic idea of the routing protocol is to
layer and physical layer. Added to the five layers are the define a reliable path and redundant paths according to a
three cross layers planes as shown in Fig.4 certain scale called metric, which differs from protocol to
protocol. There is a lot of routing protocols available for
this layer, they can be divide into; flat routing (for
example, direct diffusion) and hierarchal routing (for
example, LEACH) or can be divided into time driven,
query driven and event driven. In continuous time driven
protocol, the data is sent periodically and time driven for
applications that need a periodic monitoring. In event
driven and query driven protocols, the sensor responds
according to action or user query.

C.Data link layer:

Responsible for multiplexing data streams, data frame


Fig 4: WSN Architecture
detection, MAC, and error control, ensure reliability of
pointpoint or point multipoint. Errors or unreliability
A. Transport layer: comes from:

The function of this layer is to provide reliability and Co- channel interference at the MAC layer and this
congestion avoidance where a lot of protocols designed to problem is solved by MAC protocols.
provide this function are either applied on the upstream
(user to sink, ex: ESRT, STCP and DSTN), or downstream Multipath fading and shadowing at the physical layer and
(sink to user, ex: PSFQ and GARUDA). These protocols this problem is solved by forward error correction (FEC)
use different mechanisms for loss detection ((ACK, NACK, and automatic repeat request (ARQ).
and Sequence number)) and loss recovery ((End to End or
1) ARQ: It is not popular in WSN because of additional re-
Hop by Hop)). This layer is specifically needed when a
transmission cost and overhead. ARQ is not efficient to
system is organised to access other networks. Providing a
frame error detection so all the frame has to retransmit if
reliable hop by hop is more energy efficient than end to end
there is a single bit error.
and that is one of the reason why TCP is not suitable for
WSN. Usually the link from sink to node is considered as 2) FEC: It decreases the number of retransmission by
downstream link for multicast transmission and UDP traffic adding redundant data on each message so the receiver can
because of the limited memory and overhead avoiding. On detect and correct errors. By that we can avoid re-
the other hand from User to sink is considered as upstream transmission and wait for ACK.
link for mono-cast transmission and TCP or UDP traffic. In
general, Transport protocols can be divided into: D. Physical Layer:

1) Packet driven: all packets sent by source must reach It can provide an interface to transmit a stream of bits over
destination. physical medium. Responsible for frequency selection,
carrier frequency generation, signal detection, Modulation
2) Event driven: the event must be detected, but it is and data encryption. IEEE 802.15.4: proposed as standard
enough that one notification message reaches the sink. for low rate personal area and WSN with low: cost,
complexity, power consumption, range of communication randomization. Although, gossiping can solve the
to maximize battery life. Use CSMA/CA, support star and implosion problem, it cannot avoid the overlapping
peer to peer topology. problem. On the other hand; gossiping distribute
information slowly, this means it consumes energy at a
E. Application layer: slow rate, but the cost is long-time propagation is needed to
send messages to all sensor nodes.
Responsible for traffic management and provide software
for different applications that translate the data in an C. Spin:
understandable form or send queries to obtain certain
information. Sensor networks deployed in various SPIN (Sensor Protocols for Information via Negotiation)
applications in different fields, for example; military, isa family ofadaptiveprotocolsforWSNs. Theirdesigngoal is
medical, environment, agriculture fields. to avoid the drawbacks of ooding protocols mentioned
above by utilizing data negotiation and resource-adaptive
III. Routing Protocols for WSNs algorithms. SPINisdesigned based on two basic ideas; to
operate eciently and to conserve energy by sending
In this context, we introduce the most well-known routing
metadata (i.e., sending data about sensor data instead of
protocols for wireless sensor networks.
sending the whole data that sensor nodes already have or
A. Flooding: need to obtain), and nodesinanetworkmustbewareofchanges
in their own energy resources and adapt to these changes to
Flooding is an old routing mechanism that may also be extend the operating lifetime of the system. SPIN has three
used in sensor networks. In ooding, a node sends out the types of messages, namely, ADV, REQ, and DATA
received data or the management packets to its neighbours respectively:
by broadcasting, unless a maximum number of hops for
that packet are reached or the destination of the packets is 1) ADV: when a node has data to send, it advertises via
arrived. However; there are some deciencies for this broadcasting this message containing meta-data (i.e.,
routing technique: descriptor) to all nodes in the network.

1) Implosion: is the case where a duplicated data or 2) REQ: an interested node sends this message when it
packets are sent to the same node. Flooding is a function of wishes to receive some data.
the network topology.
3) DATA: Data message contains the actual sensor data
2) Overlap: if two sensor nodes cover an overlapping along with meta-data header. SPIN is based on data-centric
measuring region, both of them will sense/detect the same routingwherethe ADV messageviabroadcasting for the data
data. As a result, their neighbour nodes will receive they have and wait for REQ messages from interested sinks
duplicated data or messages. Overlapping is a function of or nodes.
both the network topology and the mapping of sensed data
to sensor nodes.

3) Resource blindness: In ooding, nodes do not take into


account the amount of energy resource available to them at
a given time. A WSN protocol must be energy resource-
aware and adapts its sensing, communication and D. Leach:
computation to the state of its energy.
LEACH (Low Energy Adaptive Clustering Hierarchy) is a
B. Gossiping: self-organizing, adaptive clustering-based protocol that
uses randomized rotation of cluster-heads to evenly
Gossiping protocol is an alternative to ooding mechanism. distribute the energy load among the sensor nodes in the
In Gossiping, nodescanforwardtheincomingdata/packets to network. LEACH based on two basic assumptions:
randomlyselected neighbour node. Once a gossiping node
receives the messages, it can forward the data back to that 1) Base station is xed and located far away from the
neighbour or to another one randomly selected neighbour sensors, and
node. This technique assists in energy conservation by
2) All nodes in the network are homogeneous and energy-
constrained. The idea behind LEACH is to form clusters of
the sensor nodes depending on the received signal strength
and use local cluster heads as routers to route data to the
base station. The key features of LEACH are:

Localized coordination and control for cluster set-up and


operation.

Randomized rotation of the cluster base stations or


cluster heads and the corresponding clusters.

Local compression to reduce global communication. Fig 5: Applications of WSNs for IoT

In LEACH, the operation is separated in to xed-length Sensor networks are applied in a wide range of areas, such
rounds, where each round starts with a setup phase as military applications, public safety, medical,
followed by a steady-state phase. The duration of a round is surveillances, environmental monitoring, commercial
determined by priority: applications, habitat and tracking. In general, sensor
networks will be ubiquitous in the near future, since they
1. Advertisement phase
support new opportunities for the interaction between
2. Cluster set-up phase humans and their physical world. In addition, sensor
networks are expected to contribute signicantly to
3. Schedule Creation phase pervasive computing and space exploration in the next
decade. Deploying sensor nodes in an unattended
4. Data Transmission phase. environment will give much more possibilities for the
exploration of new applications in the real world as shown
Although, LEACH has shown good features to sensor
in fig.5:
networks, it suers from the following drawbacks:
V. Conclusion
It cannot be applied to time-constrained application as it
results in a long latency. Wireless Sensor Network (WSN) has very specific
characteristics and requirement that are unique. A system
The nodes on the route a hot spot to the sink could drain
for aiding in the development of sensing agents is often
their power fast. This problem known as hotspot
required. The systems are characterized by their power
problem.
consumption, memory consumption, bandwidth
The number of clusters may not be xed every round. consumption, fault tolerance, adaptability, and scalability.
Furthermore, most of the existing systems incorporate
It cannot be applied to large sensor networks. management functions within application protocols. The
development of general purpose network management
layer protocols is a challenging problem and remains a
largely unexplored area for WSNs. Another significant
open problem is the development of management policies
and expressive languages or metadata for representing
management policies and for representing the information
exchanged between sensor nodes(SNs), managers, and end
users. This dissertation considers the above challenges and
suggests the following solutions.

IV. Applications of WSNs for IoT In this paper, various applications of WSN along with the
knowledge of security issues & attacks of WSN are
discussed. This paper can be helpful for research scholars
who are working in this field. Security is an important
requirement and complicates enough to set up in different [9] VivekKatiyar, Narottam Chand, Naveen Chauhan, Recent advances
and future trends in Wireless Sensor Networks, International Journal of
domains of WSN. Applied Engineering Research, Dindigul, Volume 1, No 3, 2010.
[10] Ajay Jangra, Swati, Richa, Priyanka, Wireless Sensor Network
Adding security in a resource constrained wireless sensor (WSN): Architectural Design issues and Challenges, Ajay Jangra et al. /
(IJCSE) InternationalJournal on Computer Science and Engineering, Vol.
network with minimum overhead provides significant 02, No. 09, 2010, 3089-3094.
challenges, and is an on-going area of research. There is [11] JaykumarShantilal Patel, Dr. Vijay kumar M. Chavda, Sensor
Network Security Issues In Each Layer, International Journal of
currently enormous research potential in the field of WSN. Computer Science Engineering (IJCSE), ISSN: 2319-7323 Vol. 2 No.05
Sep 2013.
References [12] David Kohanbash*, AbhinavValada, George Kantor, Base Station
Design and Architecture for Wireless Sensor Networks, Carnegie Mellon
[1]. Le, K., Bui, T., Quan, T., Petrucci, L.: COCA: Congestion-oriented University Robotics Institute, 5000 Forbes Ave, Pittsburgh, PA, 15213
clustering algorithm for wireless sensor networks. In: ICCSN, Beijing, USA.
China (Jun 2016) [13] Miguel Angel Erazo Villegas Seok Yee TangYiQian, Wireless Sensor
[2]. Le, K., Bui, T., Quan, T., Petrucci, L., Andre, E.: Component-based Network Communication Architecture for Wide-Area Large Scale Soil
abstraction of Petri net models: An application for congestion Moisture Estimation and Wetlands Monitoring.
verification of wireless sensor networks. In: SoICT, Hue, Vietnam. pp. [14] Neharang ,Anujgupta , Wireless Sensor Networks : A Overview,
342349 (Dec 2015), http://doi.acm. org/10.1145/2833258.2833298 IJMCS, Vol.1,iss.2, 2013.
[3]. Le, K., Bui, T., Quan, T., Petrucci, L., Andre, E.: Congestion [15] C. Karlof , D. Wagner , Secure routing in wireless sensor
verification on abstracted wireless sensor networks with the WSN-PN networks : attacks And countermeasures, In proc. Of the 1st IEEE Int.
tool. Advances in Computer Networks 4(1), 3340 (2016) workshop on sensor network Protocols and applications (SNPA03) , pp.
[4] Ahmad Abed AlhameedAlkhatib, Gurvinder Singh Baicher, Wireless 113-127, May 2003.
Sensor Network Architecture, IPCSIT vol.35(2012),University of Wales [16] Aashimasingla ,Ritikasachdeva , Review on security issues and
Newport, City Campus, Usk Way, NP20 2BP, Newport, U.K. attacks in Wireless sensor networks, IJARCSSE, vol. 3, iss. 4, 2013.
[5] Yazeed Al-Obaisat, Robin Braun, On Wireless Sensor Networks: [17] Kriti Jain, UpasanaBahuguna, Survey on Wireless Sensor
Architectures, Protocols, Applications, and management, Institute of Network, IJSTM, Vol. 3, Issue 2, pp. 83-90, Sept 2012.
Information and Communication Technologies,University of [18] Dr. Manoj Kumar Jain, Wireless Sensor Networks: Security Issues
Technology,Sydney, Australia. and Challenges, IJCIT, vol. 2, issue 1, pp. 62- 67, 2011
[6] Edwin Prem Kumar Gilbert, BaskaranKaliaperumal, and Elijah [19] Tin win maw,Myohein jaw, A secure for mitigation of DoS attack in
Blessing Rajsingh, Research Issues in Wireless Sensor Network cluster Based wireless sensor networks, IJCCER , vol. 1,Issue 3,2013
Applications: A Survey, International Journal of Information and [20] Prajeet Sharma, Niresh Sharma, Rajdeep Singh, "A Secure Intrusion
Electronics Engineering, Vol. 2, No. 5, September 2012. detection System against DDOS attack in Wireless Mobile Ad-hoc
[7] Giuseppe Anastasi, Marco Conti, Mario Di Francesco, Andrea Network",IJCA, Vol. 41 No.21, March 2012.
Passarella, Energy Conservation in Wireless Sensor Networks: a [21] SnehlataYadav, Kamlesh Gupta, Sanjay Silakari, Security issues in
Survey. wireless Sensor network,Journal of information system and
[8] Cayirci, Wireless sensor networks: a survey, Broadband and communications,vol.1, issue 2, 2010, pp-01-06
Wireless Networking Laboratory, School of Electrical and Computer
Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA.

You might also like