Wireless Sensor Networks and Energy Harvesting
VerifiedAdded on 2020/03/28
|6
|1484
|40
AI Summary
This assignment delves into the realm of Wireless Sensor Networks (WSNs), emphasizing the crucial role of energy harvesting in their functionality. It analyzes various energy harvesting methods, discusses their applications within WSNs, and explores the advantages and limitations associated with these techniques. The assignment also highlights ongoing research efforts aimed at improving energy efficiency in WSNs through advanced harvesting strategies and novel sensor designs.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: WIRELESS NETWORKING CONCEPT
Wireless networking Concept
Name of the Student
Name of the University
Author’s Note
Wireless networking Concept
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1WIRELESS NETWORKING CONCEPT
1. Overall Interoperability for Microwave Access (WiMax) is alluded as the
conveyance of the administrations to the long remote broadband access. It gives point-to-
point and additionally multipoint applications (Bernardos et al., 2014). Then again, it is
empowered for upgrading security of the system at the season of transmission to the last mile.
What's more, WiMax uses three sorts of information encryption norms keeping in mind the
end goal to ensure information and also data.
The information encryption standard used by WiMx can be clarified as taken after.
Triple DES
It has proposed to supplant unique Data Encryption Standard calculation that is
figured by the programmers toward the end for making sense of the strategy to vanquish in
easily. Triple DES has recommended the standard and the for the most part utilized
symmetric calculation in the business (Choochaisri et al, 2017). It utilizes three individual
keys with 56 bits each. Furthermore, the total key length is measured as 168 bits. Then again,
experts have battled that there are 112 bits are incorporated into 112 bits in the key quality
that is more like the procedure.
AES
The Advanced Encryption Standard (AES) is perceived as the calculation that is
trusted as the standard by the Government of USA and in addition a few associations.
Regardless of the specific certainty, it is an awesome degree, which is capable in 128 piece
outline arrange. What's more, the Advanced Encryption Standard (AES) utilizes the keys of
192 and also 256 bits for the significant commitment encryption purposes. AES is seen as
making impervious to the ambushes, which is with the exception of influencing savage to
control. It attempts to make unravel messages utilizing each of the single and possible mix in
128, 192 and also 256 piece.
1. Overall Interoperability for Microwave Access (WiMax) is alluded as the
conveyance of the administrations to the long remote broadband access. It gives point-to-
point and additionally multipoint applications (Bernardos et al., 2014). Then again, it is
empowered for upgrading security of the system at the season of transmission to the last mile.
What's more, WiMax uses three sorts of information encryption norms keeping in mind the
end goal to ensure information and also data.
The information encryption standard used by WiMx can be clarified as taken after.
Triple DES
It has proposed to supplant unique Data Encryption Standard calculation that is
figured by the programmers toward the end for making sense of the strategy to vanquish in
easily. Triple DES has recommended the standard and the for the most part utilized
symmetric calculation in the business (Choochaisri et al, 2017). It utilizes three individual
keys with 56 bits each. Furthermore, the total key length is measured as 168 bits. Then again,
experts have battled that there are 112 bits are incorporated into 112 bits in the key quality
that is more like the procedure.
AES
The Advanced Encryption Standard (AES) is perceived as the calculation that is
trusted as the standard by the Government of USA and in addition a few associations.
Regardless of the specific certainty, it is an awesome degree, which is capable in 128 piece
outline arrange. What's more, the Advanced Encryption Standard (AES) utilizes the keys of
192 and also 256 bits for the significant commitment encryption purposes. AES is seen as
making impervious to the ambushes, which is with the exception of influencing savage to
control. It attempts to make unravel messages utilizing each of the single and possible mix in
128, 192 and also 256 piece.
2WIRELESS NETWORKING CONCEPT
RSA
RSA is considered as the open key encryption calculation and the standard to
scramble data that is sent over the web. It by and large happens on various methodologies
that are utilized as the piece of PGP and in addition GPG programs. Then again, it is not at all
like the triple DE and RSA that are seen as lopsided calculation as the utilization of the keys
are incorporated into this.
2. It is imperative to distinguish the most vital WPAN innovations that are Bluetooth
and additionally Zigbee. Likewise, there are a few security challenges in Bluetooth gadgets
and also innovation at display utilizations (Fontes et al., 2017). Then again, it is imperative to
specify that there are a few assaults against the privacy and in addition trustworthiness of
information. In addition, Bluetooth does not give compelling client confirmation. Approval of
the Bluetooth gadgets can't be accomplished, which can cause unequivocal conduct of the
associated gadgets. In this viewpoint, it is vital to say that there is a huge risk for DoS
assaults on the Bluetooth gadgets at the season of transmission of information and in addition
data. It can be malignant section of the outside gatherings at the season of transmission
technique of information. In any case, delicate information may be harmed and in addition
adulterated at the season of remote transmission.
Bluesnarfing is one of the dangers engaged with the innovation that can enable the
aggressors keeping in mind the end goal to build the use of the gadgets that are Bluetooth
empowered. Furthermore, it looks for IMEI number of the Bluetooth gadgets and additionally
getting associated through the strategy.
ZigBee is one of the remote correspondence with low power and additionally low rate
expects to give cryptographic keys for security (Huang et al, 2013). The specific connection
is set up between the gadgets and kept up through security convention of ZigBee. Moreover,
RSA
RSA is considered as the open key encryption calculation and the standard to
scramble data that is sent over the web. It by and large happens on various methodologies
that are utilized as the piece of PGP and in addition GPG programs. Then again, it is not at all
like the triple DE and RSA that are seen as lopsided calculation as the utilization of the keys
are incorporated into this.
2. It is imperative to distinguish the most vital WPAN innovations that are Bluetooth
and additionally Zigbee. Likewise, there are a few security challenges in Bluetooth gadgets
and also innovation at display utilizations (Fontes et al., 2017). Then again, it is imperative to
specify that there are a few assaults against the privacy and in addition trustworthiness of
information. In addition, Bluetooth does not give compelling client confirmation. Approval of
the Bluetooth gadgets can't be accomplished, which can cause unequivocal conduct of the
associated gadgets. In this viewpoint, it is vital to say that there is a huge risk for DoS
assaults on the Bluetooth gadgets at the season of transmission of information and in addition
data. It can be malignant section of the outside gatherings at the season of transmission
technique of information. In any case, delicate information may be harmed and in addition
adulterated at the season of remote transmission.
Bluesnarfing is one of the dangers engaged with the innovation that can enable the
aggressors keeping in mind the end goal to build the use of the gadgets that are Bluetooth
empowered. Furthermore, it looks for IMEI number of the Bluetooth gadgets and additionally
getting associated through the strategy.
ZigBee is one of the remote correspondence with low power and additionally low rate
expects to give cryptographic keys for security (Huang et al, 2013). The specific connection
is set up between the gadgets and kept up through security convention of ZigBee. Moreover,
3WIRELESS NETWORKING CONCEPT
there are odds of physical assaults on ZigBee radio identified with the recurrence rupture.
Along these lines, the information packers are gathered at the season of remote
correspondence, which can be broken in the system.
3. First article: Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in
wireless sensor networks: A comprehensive review." Renewable and Sustainable Energy
Reviews 55 (2016): 1041-1054.
The paper talks about with the way toward utilizing of vitality in Wireless Sensor
Network. The system incorporates an extensive number of static sensor hubs, which aids the
low handling. Furthermore, there are a few wellsprings of vitality incorporating into Wireless
Sensor Network and radio recurrence based vitality engaged with the system. Alongside
these, sun powered based vitality and additionally warm based vitality and stream based
vitality reaping is incorporated into the strategy (Rault, Bouabdallah & Challal, 2014). There
are additionally a few methodologies portrayed in the present paper with the end goal of
utilizing vitality adequately.
Then again, the vitality gathering from unmistakable sources, which can make harms
biological adjust of nature. Then again, reaping from unmistakable sources can cause
exhaustion of the assets in the particular condition. In any case, there are durable gadgets that
can expend more battery and also causes vitality depleting. It is critical to make vitality
proficient solid frameworks, which can give focal points to the specific clients as ultra-
vitality productive sensors. Keeping in mind the end goal to defeat the fundamental
constraints, plan and also improvement of proficient and in addition elite vitality reaping
frameworks for Wireless Sensor Networks.
there are odds of physical assaults on ZigBee radio identified with the recurrence rupture.
Along these lines, the information packers are gathered at the season of remote
correspondence, which can be broken in the system.
3. First article: Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in
wireless sensor networks: A comprehensive review." Renewable and Sustainable Energy
Reviews 55 (2016): 1041-1054.
The paper talks about with the way toward utilizing of vitality in Wireless Sensor
Network. The system incorporates an extensive number of static sensor hubs, which aids the
low handling. Furthermore, there are a few wellsprings of vitality incorporating into Wireless
Sensor Network and radio recurrence based vitality engaged with the system. Alongside
these, sun powered based vitality and additionally warm based vitality and stream based
vitality reaping is incorporated into the strategy (Rault, Bouabdallah & Challal, 2014). There
are additionally a few methodologies portrayed in the present paper with the end goal of
utilizing vitality adequately.
Then again, the vitality gathering from unmistakable sources, which can make harms
biological adjust of nature. Then again, reaping from unmistakable sources can cause
exhaustion of the assets in the particular condition. In any case, there are durable gadgets that
can expend more battery and also causes vitality depleting. It is critical to make vitality
proficient solid frameworks, which can give focal points to the specific clients as ultra-
vitality productive sensors. Keeping in mind the end goal to defeat the fundamental
constraints, plan and also improvement of proficient and in addition elite vitality reaping
frameworks for Wireless Sensor Networks.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4WIRELESS NETWORKING CONCEPT
Second article: Ulukus, Sennur, et al. "Energy harvesting wireless communications: A
review of recent advances." IEEE Journal on Selected Areas in Communications 33.3 (2015):
360-381.
In the specific article, there are dialogs about new advances actualized during the time
spent vitality gathering area. There are new progressions in vitality reaping, which can be
changed for conventional situation of vitality gathering. Notwithstanding, the compelling
usage of the cutting edge strategy in the handling of vitality reaping. It has expanded
beginning expenses of a few vitality sources alongside exhaustion of regular sources (Tunca
et al., 2014). There are a few conditions and in addition hypotheses identified with the
procedure have been talked about in the present paper, which utilizes the standard idea of the
vitality gathering and also changing over it into the cutting edge innovation.
Likewise, giving vitality to the way toward gathering ability to the remote sensor
gadgets to the hubs that can be constantly obtain vitality from the nature and man-made
situation. It swings to give promising future to the remote systems and also self-
manageability of alongside the virtual operation with the system.
Second article: Ulukus, Sennur, et al. "Energy harvesting wireless communications: A
review of recent advances." IEEE Journal on Selected Areas in Communications 33.3 (2015):
360-381.
In the specific article, there are dialogs about new advances actualized during the time
spent vitality gathering area. There are new progressions in vitality reaping, which can be
changed for conventional situation of vitality gathering. Notwithstanding, the compelling
usage of the cutting edge strategy in the handling of vitality reaping. It has expanded
beginning expenses of a few vitality sources alongside exhaustion of regular sources (Tunca
et al., 2014). There are a few conditions and in addition hypotheses identified with the
procedure have been talked about in the present paper, which utilizes the standard idea of the
vitality gathering and also changing over it into the cutting edge innovation.
Likewise, giving vitality to the way toward gathering ability to the remote sensor
gadgets to the hubs that can be constantly obtain vitality from the nature and man-made
situation. It swings to give promising future to the remote systems and also self-
manageability of alongside the virtual operation with the system.
5WIRELESS NETWORKING CONCEPT
References
Bernardos, C. J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., &
Zúñiga, J. C. (2014). An architecture for software defined wireless networking. IEEE
wireless communications, 21(3), 52-61.
Choochaisri, S., Apicharttrisorn, K., & Intanagonwiwat, C. (2017). Stable Desynchronization
for Wireless Sensor Networks:(I) Concepts and Algorithms. arXiv preprint
arXiv:1704.07002.
Fontes, R. D. R., Mahfoudi, M., Dabbous, W., Turletti, T., & Rothenberg, C. (2017). How
Far Can We Go? Towards Realistic Software-Defined Wireless Networking
Experiments. The Computer Journal, 1-14.
Huang, P., Xiao, L., Soltani, S., Mutka, M. W., & Xi, N. (2013). The evolution of MAC
protocols in wireless sensor networks: A survey. IEEE communications surveys &
tutorials, 15(1), 101-120.
Rault, T., Bouabdallah, A., & Challal, Y. (2014). Energy efficiency in wireless sensor
networks: A top-down survey. Computer Networks, 67, 104-122.
Tunca, C., Isik, S., Donmez, M. Y., & Ersoy, C. (2014). Distributed mobile sink routing for
wireless sensor networks: A survey. IEEE communications surveys & tutorials, 16(2),
877-897.
References
Bernardos, C. J., De La Oliva, A., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., &
Zúñiga, J. C. (2014). An architecture for software defined wireless networking. IEEE
wireless communications, 21(3), 52-61.
Choochaisri, S., Apicharttrisorn, K., & Intanagonwiwat, C. (2017). Stable Desynchronization
for Wireless Sensor Networks:(I) Concepts and Algorithms. arXiv preprint
arXiv:1704.07002.
Fontes, R. D. R., Mahfoudi, M., Dabbous, W., Turletti, T., & Rothenberg, C. (2017). How
Far Can We Go? Towards Realistic Software-Defined Wireless Networking
Experiments. The Computer Journal, 1-14.
Huang, P., Xiao, L., Soltani, S., Mutka, M. W., & Xi, N. (2013). The evolution of MAC
protocols in wireless sensor networks: A survey. IEEE communications surveys &
tutorials, 15(1), 101-120.
Rault, T., Bouabdallah, A., & Challal, Y. (2014). Energy efficiency in wireless sensor
networks: A top-down survey. Computer Networks, 67, 104-122.
Tunca, C., Isik, S., Donmez, M. Y., & Ersoy, C. (2014). Distributed mobile sink routing for
wireless sensor networks: A survey. IEEE communications surveys & tutorials, 16(2),
877-897.
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.