What Is Wireless Sensor Network, And Types Of WSN?
VerifiedAdded on  2022/09/07
|20
|5479
|28
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
Name of the Student
Name of the University
Author Note
WIRELESS SENSOR NETWORKS
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1WIRELESS SENSOR NETWORKS
Table of Contents
Introduction:...............................................................................................................................2
Discussions.................................................................................................................................3
Logical Design.......................................................................................................................3
IPV6 Subnetting.....................................................................................................................4
Logical Diagram.....................................................................................................................4
Description for the Protocols.................................................................................................4
Enhanced Security Solution...................................................................................................9
Conclusion................................................................................................................................15
References................................................................................................................................16
Table of Contents
Introduction:...............................................................................................................................2
Discussions.................................................................................................................................3
Logical Design.......................................................................................................................3
IPV6 Subnetting.....................................................................................................................4
Logical Diagram.....................................................................................................................4
Description for the Protocols.................................................................................................4
Enhanced Security Solution...................................................................................................9
Conclusion................................................................................................................................15
References................................................................................................................................16
2WIRELESS SENSOR NETWORKS
Introduction:
A wireless sensor network is a category of dispersed and dedicated sensors in order to
record and track the physical conditions of the environment and then organize the data that is
collected at the main location. The wireless network includes number of nodes and base
stations. These networks are utilized in order to observe environmental or physical conditions
like pressure, sound, temperature and many more and then pass data co-operatively through
the network to the central location. There are various types of protocols in the WSNs. The
protocols of the WSNs include the MAC protocols, routing protocols and the physical layer
protocols.
The report deals with an organization AMY Networks, which are a consultancy
business and the operations of the organization, is to installs, designs and operates various
types of wired and the wireless networks for the research businesses and research. The report
focuses on the network solution that will be provided by the AMY Networks. As the AMY
Networks is one of the leaders of project, the company is asked in order to answer to an
request to Tender for the network design.
Introduction:
A wireless sensor network is a category of dispersed and dedicated sensors in order to
record and track the physical conditions of the environment and then organize the data that is
collected at the main location. The wireless network includes number of nodes and base
stations. These networks are utilized in order to observe environmental or physical conditions
like pressure, sound, temperature and many more and then pass data co-operatively through
the network to the central location. There are various types of protocols in the WSNs. The
protocols of the WSNs include the MAC protocols, routing protocols and the physical layer
protocols.
The report deals with an organization AMY Networks, which are a consultancy
business and the operations of the organization, is to installs, designs and operates various
types of wired and the wireless networks for the research businesses and research. The report
focuses on the network solution that will be provided by the AMY Networks. As the AMY
Networks is one of the leaders of project, the company is asked in order to answer to an
request to Tender for the network design.
3WIRELESS SENSOR NETWORKS
Discussions
Logical Design
Figure 1: Logical Design of the WSN
(Source: Created By Author)
The logical diagram is created based on the requirement of California forestry
department and multiple sensor nodes are installed for the development of wireless sensor
network. Bluetooth connection is used for connecting the sensor nodes and it uses multilink
connection for communicating with the sensors and transmitting data to the sink station. The
wireless access point is used as the base station for sending and receiving data to the sensor
nodes and monitor or control their operation. Temperature sensor are used for sensing the
temperature and if goes beyond the threshold data is sent to the nearby connected sensor node
for transmitting the data and trigger the alarm.
IPV6 Subnetting
Subnet ID Subnet Address Host Address Range Notation
Discussions
Logical Design
Figure 1: Logical Design of the WSN
(Source: Created By Author)
The logical diagram is created based on the requirement of California forestry
department and multiple sensor nodes are installed for the development of wireless sensor
network. Bluetooth connection is used for connecting the sensor nodes and it uses multilink
connection for communicating with the sensors and transmitting data to the sink station. The
wireless access point is used as the base station for sending and receiving data to the sensor
nodes and monitor or control their operation. Temperature sensor are used for sensing the
temperature and if goes beyond the threshold data is sent to the nearby connected sensor node
for transmitting the data and trigger the alarm.
IPV6 Subnetting
Subnet ID Subnet Address Host Address Range Notation
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4WIRELESS SENSOR NETWORKS
1 2001:0ab8::
2001:ab8:: -
2001:ab8:3fff:ffff::
2001:ab8::/34
2 2001:0ab8:4000::
2001:ab8:4000:: -
2001:ab8:7fff:ffff::
2001:ab8:4000::/34
3 2001:0ab8:8000::
2001:ab8:8000:: -
2001:ab8:bfff:ffff::
2001:ab8:8000::/34
4 2001:0ab8:c000::
2001:ab8:c000:: -
2001:ab8:ffff:ffff::
2001:ab8:c000::/34
Table 1: IPV6 Subnetting
1 2001:0ab8::
2001:ab8:: -
2001:ab8:3fff:ffff::
2001:ab8::/34
2 2001:0ab8:4000::
2001:ab8:4000:: -
2001:ab8:7fff:ffff::
2001:ab8:4000::/34
3 2001:0ab8:8000::
2001:ab8:8000:: -
2001:ab8:bfff:ffff::
2001:ab8:8000::/34
4 2001:0ab8:c000::
2001:ab8:c000:: -
2001:ab8:ffff:ffff::
2001:ab8:c000::/34
Table 1: IPV6 Subnetting
5WIRELESS SENSOR NETWORKS
Logical Diagram
Figure 2: Logical Diagram
(Source: Created By Author)
Description for the Protocols
The WSNs is considered essential technology in this century. A WSNs includes large
number of low cost, low-power and multifunctional sensor nodes that are wireless. The WSN
has computational abilities and sensing, wireless communications. The sensor nodes liaise
with each other through a medium that is wireless in order to achieve a task that is common
(Bouaziz and Rachedi 2016). There are various kinds of protocols in WSNs that can be used
in designing the WSNs. The protocols include the routing protocols, MAC protocols and
many more protocols.
Logical Diagram
Figure 2: Logical Diagram
(Source: Created By Author)
Description for the Protocols
The WSNs is considered essential technology in this century. A WSNs includes large
number of low cost, low-power and multifunctional sensor nodes that are wireless. The WSN
has computational abilities and sensing, wireless communications. The sensor nodes liaise
with each other through a medium that is wireless in order to achieve a task that is common
(Bouaziz and Rachedi 2016). There are various kinds of protocols in WSNs that can be used
in designing the WSNs. The protocols include the routing protocols, MAC protocols and
many more protocols.
6WIRELESS SENSOR NETWORKS
The routing protocols that can be utilised in the design of the WSNs include AODV
(Ad-hoc on-demand distance vector routing system), Dynamic source routing and Optimized
link state routing (OLSR) (Arora, Sharma and Sachdeva 2016).
The AODV is a protocol that is reactive on solicitation. The AODV is developed for
the networks that are infrastructure-less Mobile. The AODV engage the methodology of on-
demand routing for the formation of route in the middle of the nodes of network. The path is
created solitary when the node of the source want packs of data that are direct and the route
that is pre-set is maintained as long as the node of the source requires (Yan, Zhou and Ding
2016). That is why the protocol of routing is known as on-demand. The AODV routing
satisfies the broadcast, unicast and the multicast routing. The routing protocols of AODV
directs the packets that are among the nodes of mobile of the ad-hoc network that is wireless
(Kumar et al 2017). The AODV allows the nodes of mobile in order to pass packets of data to
the required destination node through neighbour nodes that are not able to openly connect the
link. The material of tables of routing is switched fitfully among the nodes of neighbour and
prepared for the updates that are sudden.
The AODV protocol selects round-free and shortest path from the table of routing in
order to move the packets.
The Dynamic Source Routing is protocol of routing that is utilized in the WSN. The
Dynamic source routing can be on demand or reactive. This protocol utilizes source routing
in place of tables of routing. The routing in the protocol of DSR is split into two parts, route
maintenance and route discovery (Kafi, Othman and Badache 2017).
The node of the source will initiate a phase of route discovery and this is the stage that
consists of messages of route reply and route request. In the DSR routing, only the node of
destination will reply to the messages of route reply to the source node unlike in the AODV
The routing protocols that can be utilised in the design of the WSNs include AODV
(Ad-hoc on-demand distance vector routing system), Dynamic source routing and Optimized
link state routing (OLSR) (Arora, Sharma and Sachdeva 2016).
The AODV is a protocol that is reactive on solicitation. The AODV is developed for
the networks that are infrastructure-less Mobile. The AODV engage the methodology of on-
demand routing for the formation of route in the middle of the nodes of network. The path is
created solitary when the node of the source want packs of data that are direct and the route
that is pre-set is maintained as long as the node of the source requires (Yan, Zhou and Ding
2016). That is why the protocol of routing is known as on-demand. The AODV routing
satisfies the broadcast, unicast and the multicast routing. The routing protocols of AODV
directs the packets that are among the nodes of mobile of the ad-hoc network that is wireless
(Kumar et al 2017). The AODV allows the nodes of mobile in order to pass packets of data to
the required destination node through neighbour nodes that are not able to openly connect the
link. The material of tables of routing is switched fitfully among the nodes of neighbour and
prepared for the updates that are sudden.
The AODV protocol selects round-free and shortest path from the table of routing in
order to move the packets.
The Dynamic Source Routing is protocol of routing that is utilized in the WSN. The
Dynamic source routing can be on demand or reactive. This protocol utilizes source routing
in place of tables of routing. The routing in the protocol of DSR is split into two parts, route
maintenance and route discovery (Kafi, Othman and Badache 2017).
The node of the source will initiate a phase of route discovery and this is the stage that
consists of messages of route reply and route request. In the DSR routing, only the node of
destination will reply to the messages of route reply to the source node unlike in the AODV
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7WIRELESS SENSOR NETWORKS
protocol where each intermediate node would reply with the messages or route reply. The
aim of the next stage route maintenance is to keep away from flooding messages and it is
utilized for the nodes shortening between the destination and the source (Reddy and Devi
2018).
The full form of OLSR is optimized link state routing belongs to the classification of
routing protocols that are proactive and it utilizes practice that are focused on table. The main
disadvantage of OLSR is that is has a large overhead. In order to compensate this delay, the
multipoint relays are utilized in order to overcome the massive overhead. For the
transmission of data, three nodes that are adjacent are utilized as multipoint relay by each
node. No control node that is consistent is needed as every node sends it alternating (Sarkar
and Murugan 2016).
The design of the protocols of routing for the WSNs is challenging due to the
constraints of several networks. The WSNs suffer the disadvantage of several resources of
network, for example, bandwidth, energy, storage and central processing unit (Press 2016).
The communication in the WSN is alienated into quite a few layers. The medium
access control protocol tries to keep away from the collisions by disallowing two nodes that
are interfering in order to transmit at the similar time. This enables an operation of the
network that is successful. The main goals of design of the MAC protocols are to give quality
of service and high throughput. The protocols of MAC of the WSN give more priority to the
energy consumption than the requirement of quality of services (Ait Aoudia et al 2017). a
variety of protocols of MAC are created for the WSNs. The typical MAC protocols include B
MAC, X MAC, T MAC and many more such protocols. In order to increase the life of
battery, the MAC protocols execute the mechanism of active/sleep. The main object of the
WSNs is to increase the lifetime of the networks. There are two main classifications of the
protocol where each intermediate node would reply with the messages or route reply. The
aim of the next stage route maintenance is to keep away from flooding messages and it is
utilized for the nodes shortening between the destination and the source (Reddy and Devi
2018).
The full form of OLSR is optimized link state routing belongs to the classification of
routing protocols that are proactive and it utilizes practice that are focused on table. The main
disadvantage of OLSR is that is has a large overhead. In order to compensate this delay, the
multipoint relays are utilized in order to overcome the massive overhead. For the
transmission of data, three nodes that are adjacent are utilized as multipoint relay by each
node. No control node that is consistent is needed as every node sends it alternating (Sarkar
and Murugan 2016).
The design of the protocols of routing for the WSNs is challenging due to the
constraints of several networks. The WSNs suffer the disadvantage of several resources of
network, for example, bandwidth, energy, storage and central processing unit (Press 2016).
The communication in the WSN is alienated into quite a few layers. The medium
access control protocol tries to keep away from the collisions by disallowing two nodes that
are interfering in order to transmit at the similar time. This enables an operation of the
network that is successful. The main goals of design of the MAC protocols are to give quality
of service and high throughput. The protocols of MAC of the WSN give more priority to the
energy consumption than the requirement of quality of services (Ait Aoudia et al 2017). a
variety of protocols of MAC are created for the WSNs. The typical MAC protocols include B
MAC, X MAC, T MAC and many more such protocols. In order to increase the life of
battery, the MAC protocols execute the mechanism of active/sleep. The main object of the
WSNs is to increase the lifetime of the networks. There are two main classifications of the
8WIRELESS SENSOR NETWORKS
MAC protocols. These include the TDMA based protocol and the CSMA based protocol. The
MAC protocol that will be utilised in the WSN delivered by the company will be B MAC and
L MAC.
The full form of B MAC is Berkeley MAC, this protocol is used widely, and it is a
part of TinyOS. This MAC protocol employs listening that is low power in order to reduce
consumption of power because of inactive listening. The nodes have a period of sleep and
after the nodes wake up, they sense the medium for the preambles. If no preamble is detected,
then again the nodes go back to doze. If a preamble is disovered, the nodes stay awake and
then receive the packets of data after the preamble. If the nodes want to send a data, it first
sends a preamble so that the nodes detect it (Yadav and Yadav 2016). After the preamble, it
then sends the packets of data. There are acknowledgments that are optional as well. After the
exchange of the data packet, the nodes then go back to sleep. The preamble does not have any
information of the address. The packets of data contains the address of the recipients so all
the nodes receive the packets of data and the preamble in the communication range of the
sender and not the recipient of the packets of data that are intended. This MAC protocol will
increase the adaptability and the stability of the WSN. Therefore, the B-MAC protocol will
help the WSN of the organization in its scalability and adaptability (Han et al 2016).
The LMAC is a Mac protocol that is based on TDMA. There are transfer timeframes
of data and that are split into time slot. The number of time slot that are present in the
timeframe can be configurable according to the quantity of odes nodes that are present in the
network. Each of the nodes has its time slot and only that specific node can transmit. This
functionality saves the consumption of power, as there are no retransmissions and collisions.
A transmission is composed of a data unit and a control message. The control message
consists of some important components. These include data destination, length of the unit of
data, and the information of the occupation of the time slots. All the nodes that are present
MAC protocols. These include the TDMA based protocol and the CSMA based protocol. The
MAC protocol that will be utilised in the WSN delivered by the company will be B MAC and
L MAC.
The full form of B MAC is Berkeley MAC, this protocol is used widely, and it is a
part of TinyOS. This MAC protocol employs listening that is low power in order to reduce
consumption of power because of inactive listening. The nodes have a period of sleep and
after the nodes wake up, they sense the medium for the preambles. If no preamble is detected,
then again the nodes go back to doze. If a preamble is disovered, the nodes stay awake and
then receive the packets of data after the preamble. If the nodes want to send a data, it first
sends a preamble so that the nodes detect it (Yadav and Yadav 2016). After the preamble, it
then sends the packets of data. There are acknowledgments that are optional as well. After the
exchange of the data packet, the nodes then go back to sleep. The preamble does not have any
information of the address. The packets of data contains the address of the recipients so all
the nodes receive the packets of data and the preamble in the communication range of the
sender and not the recipient of the packets of data that are intended. This MAC protocol will
increase the adaptability and the stability of the WSN. Therefore, the B-MAC protocol will
help the WSN of the organization in its scalability and adaptability (Han et al 2016).
The LMAC is a Mac protocol that is based on TDMA. There are transfer timeframes
of data and that are split into time slot. The number of time slot that are present in the
timeframe can be configurable according to the quantity of odes nodes that are present in the
network. Each of the nodes has its time slot and only that specific node can transmit. This
functionality saves the consumption of power, as there are no retransmissions and collisions.
A transmission is composed of a data unit and a control message. The control message
consists of some important components. These include data destination, length of the unit of
data, and the information of the occupation of the time slots. All the nodes that are present
9WIRELESS SENSOR NETWORKS
wake up at the start of each of the time slots. If no transmission takes place then the time slots
are assumed to be empty and the nodes again then go back to sleep (Azizi 2016). If
transmission takes place, after getting the message of control, the nodes that are not the
recipient of the messages again go back to sleep. The sender and the recipient node go to
sleep after they have sent or received the transmission. One and only one message can be
sending in each of the time slots. In the first five of the periods, the networks are set up and
no packets of data are sent. The nodes set up the networks and they claim a time slot. Then
they send a message of control to the time slot that they want to reserve. If no collisions
happen, the nodes that are present note that the time slot is asserted. If there is more than one
node and they all claim the similar time slot then collision takes place and they randomly
select another time slot that is not claimed. The advantage of this MAC protocol is that it
increases the use of the battery that implements the schedules of sleep. This protocol can be
executed very easily and the messages that are long can be shifted very efficiently utilising
the method of message passing (Kumar and Singh 2017). This MAC protocol should be
deployed in the WSN that the AMY Networks will deliver.
The primary concern for physical layer in the WSN id demodulation and modulation
of the digital data that is the reception and the transmission of the data. This task is generally
carried out by the transceivers in the nodes of the sensor. The major functionality of physical
layer is choosing of the carrier frequency, modulation and demodulation, decryption and
encryption of data and reception and communication of data. The WSNs generally work in
the bands of ISM. The most essential parameters that are to be considered in order to design
the physical layer in the WSN are:
ď‚· Low power consumption
ď‚· Low range of reception and transmission
ď‚· Low complexity
wake up at the start of each of the time slots. If no transmission takes place then the time slots
are assumed to be empty and the nodes again then go back to sleep (Azizi 2016). If
transmission takes place, after getting the message of control, the nodes that are not the
recipient of the messages again go back to sleep. The sender and the recipient node go to
sleep after they have sent or received the transmission. One and only one message can be
sending in each of the time slots. In the first five of the periods, the networks are set up and
no packets of data are sent. The nodes set up the networks and they claim a time slot. Then
they send a message of control to the time slot that they want to reserve. If no collisions
happen, the nodes that are present note that the time slot is asserted. If there is more than one
node and they all claim the similar time slot then collision takes place and they randomly
select another time slot that is not claimed. The advantage of this MAC protocol is that it
increases the use of the battery that implements the schedules of sleep. This protocol can be
executed very easily and the messages that are long can be shifted very efficiently utilising
the method of message passing (Kumar and Singh 2017). This MAC protocol should be
deployed in the WSN that the AMY Networks will deliver.
The primary concern for physical layer in the WSN id demodulation and modulation
of the digital data that is the reception and the transmission of the data. This task is generally
carried out by the transceivers in the nodes of the sensor. The major functionality of physical
layer is choosing of the carrier frequency, modulation and demodulation, decryption and
encryption of data and reception and communication of data. The WSNs generally work in
the bands of ISM. The most essential parameters that are to be considered in order to design
the physical layer in the WSN are:
ď‚· Low power consumption
ď‚· Low range of reception and transmission
ď‚· Low complexity
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10WIRELESS SENSOR NETWORKS
ď‚· Interference from the other systems that are present and that work in the similar band
ď‚· High rate of data only for short duration of time and low rates of data for long duration of
time
ď‚· Low cycle of duty that is most of the time the nodes of the sensor are switched off
The most challenging thing in the design of physical layer of the WSNs in to find out the
transceivers that are low cost and that will consume very less power. The schemes of
modulation that are simple and are robust in order to provide the services that are required
(Zhu, Zou and Zheng 2017).
The protocols of the WSNs have various advantages and it will help the WSNs that
the company to extend the life span of the network will supply it. The protocol of routing will
extend the lifetime of the network and maintain a good connectedness between the nodes in
the sensor networks. The replacement of battery in the sensors is feasible. This is because
most of the sensors are placed randomly in the network. The MAC protocols will also help
the WSN to amplify the lifetime of the networks by reducing the energy that is wasted by
reducing the inactive listening by making periods of listen and sleep constant and predefined.
There is also a disadvantage of this protocol. He disadvantage is that when a node lies in
between the two cluster that are awake, the nodes has to follows two various schedule and it
will consume more power (Radhappa et al 2018). The physical layer or the protocol of
physical layer of the wireless sensor network has the advantage of low cost, low consumption
of power and a good range of communication in order to upgrade the life of battery. Thus,
these protocols will help the WSNs to have a prolong lifetime of the networks.
Enhanced Security Solution
There are various layers in the WSNs that will provide enhanced security solutions to the
organization. The project is to implement 1500 specially made battery operated wireless
ď‚· Interference from the other systems that are present and that work in the similar band
ď‚· High rate of data only for short duration of time and low rates of data for long duration of
time
ď‚· Low cycle of duty that is most of the time the nodes of the sensor are switched off
The most challenging thing in the design of physical layer of the WSNs in to find out the
transceivers that are low cost and that will consume very less power. The schemes of
modulation that are simple and are robust in order to provide the services that are required
(Zhu, Zou and Zheng 2017).
The protocols of the WSNs have various advantages and it will help the WSNs that
the company to extend the life span of the network will supply it. The protocol of routing will
extend the lifetime of the network and maintain a good connectedness between the nodes in
the sensor networks. The replacement of battery in the sensors is feasible. This is because
most of the sensors are placed randomly in the network. The MAC protocols will also help
the WSN to amplify the lifetime of the networks by reducing the energy that is wasted by
reducing the inactive listening by making periods of listen and sleep constant and predefined.
There is also a disadvantage of this protocol. He disadvantage is that when a node lies in
between the two cluster that are awake, the nodes has to follows two various schedule and it
will consume more power (Radhappa et al 2018). The physical layer or the protocol of
physical layer of the wireless sensor network has the advantage of low cost, low consumption
of power and a good range of communication in order to upgrade the life of battery. Thus,
these protocols will help the WSNs to have a prolong lifetime of the networks.
Enhanced Security Solution
There are various layers in the WSNs that will provide enhanced security solutions to the
organization. The project is to implement 1500 specially made battery operated wireless
11WIRELESS SENSOR NETWORKS
sensors. The sensors must function on a globally companionable ISM band with series spread
spectrum that is direct. The various layers in the WSNs include the Network Layer, Mac
Layer, Physical layer and security.
ď‚· Network Layer
The Network layer in the WSNs is one of the most researched topics in the WSNs. Many
algorithms and protocols of routing have been proposed through the Wireless Sensor
Network’s development. The major aim of the protocols of routing is well-organized delivery
of information between the sink and the sensors. The consumption of energy is one of the
primary concerns in the creation of any protocols of routing for the WSNs (Kocakulak and
Butun 2017). Due to the incomplete assets of energy of the nodes of sensors, the data those
are present required to be delivered in a manner that is energy-efficient. Hence, there are
many routing metrics that are conventional should be enquired conventionally and new
routing metrics that are enery-efficient for the WSNs.
The WSNs includes many numbers of nodes. The requirement to watch the physical
phenomena in detail can also need a high-density implementation of these nodes. The great
numbers of nodes that are present prevent the information that is global of the topology of
network from being acquired at each of the nodes. Therefore, the protocols that are fully
distributed that operate with very less knowledge of the topology of the network. The local
information exchange should be limited in order to upgrade the efficiency of energy of the
network (Pritchard, Hancke and Abu-Mahfouz 2017).
The large number of nodes of sensor in a network prevents the addresses that are unique
from getting assigned to each of the nodes. While the schemes of local addressing can be
used in order to facilitate communication between the neighbours. The routing protocols that
are based on address are not feasible due to large overhead needed to utilise the distinct
sensors. The sensors must function on a globally companionable ISM band with series spread
spectrum that is direct. The various layers in the WSNs include the Network Layer, Mac
Layer, Physical layer and security.
ď‚· Network Layer
The Network layer in the WSNs is one of the most researched topics in the WSNs. Many
algorithms and protocols of routing have been proposed through the Wireless Sensor
Network’s development. The major aim of the protocols of routing is well-organized delivery
of information between the sink and the sensors. The consumption of energy is one of the
primary concerns in the creation of any protocols of routing for the WSNs (Kocakulak and
Butun 2017). Due to the incomplete assets of energy of the nodes of sensors, the data those
are present required to be delivered in a manner that is energy-efficient. Hence, there are
many routing metrics that are conventional should be enquired conventionally and new
routing metrics that are enery-efficient for the WSNs.
The WSNs includes many numbers of nodes. The requirement to watch the physical
phenomena in detail can also need a high-density implementation of these nodes. The great
numbers of nodes that are present prevent the information that is global of the topology of
network from being acquired at each of the nodes. Therefore, the protocols that are fully
distributed that operate with very less knowledge of the topology of the network. The local
information exchange should be limited in order to upgrade the efficiency of energy of the
network (Pritchard, Hancke and Abu-Mahfouz 2017).
The large number of nodes of sensor in a network prevents the addresses that are unique
from getting assigned to each of the nodes. While the schemes of local addressing can be
used in order to facilitate communication between the neighbours. The routing protocols that
are based on address are not feasible due to large overhead needed to utilise the distinct
12WIRELESS SENSOR NETWORKS
address for each of the communication. The majority of the protocols of ad hoc cannot be
adopted for the WSNs because these solutions need distinct address for each of the nodes that
are present in the network (Kokkinis et al 2018).
The WSNs depend on the nodes inside the network in order to deliver data in a manner
that is multi-hop. Therefore, the protocols of routing operate on these nodes of sensor instead
of the routers that are dedicated such as in the internet. The components that are low cost are
used in the nodes of the sensors; nevertheless, it may result in some failures that are
unexpected to an extent such that the node of sensor may be non-operational (Ioannou and
Vassiliou 2016).
ď‚· Mac Layer
The Mac layer is a major reason in order to provide the efficiency and reliability of the
protocols that are used in the network and the consistency of the network. The Mac is mainly
responsible for the scheduling, policies, and error control and buffer management for the
channel access. In the WSNs, a Mac protocol is required in order to consider reliability,
efficiency of energy low access delay as important priorities in order to accommodate with
the limited resources of the sensor and to avoid consumption of redundant power (Xiao
2016).
There are various types of Mac protocol families. The families include protocol that are
based on schedule and contention.
ď‚· Contention based protocol: It generally utilises ALOHA or CSMA and there is no
requirement for the topology or synchronization knowledge because the nodes that are
present compete in order to right of entry the channel and then the winner will accomplish
something.
address for each of the communication. The majority of the protocols of ad hoc cannot be
adopted for the WSNs because these solutions need distinct address for each of the nodes that
are present in the network (Kokkinis et al 2018).
The WSNs depend on the nodes inside the network in order to deliver data in a manner
that is multi-hop. Therefore, the protocols of routing operate on these nodes of sensor instead
of the routers that are dedicated such as in the internet. The components that are low cost are
used in the nodes of the sensors; nevertheless, it may result in some failures that are
unexpected to an extent such that the node of sensor may be non-operational (Ioannou and
Vassiliou 2016).
ď‚· Mac Layer
The Mac layer is a major reason in order to provide the efficiency and reliability of the
protocols that are used in the network and the consistency of the network. The Mac is mainly
responsible for the scheduling, policies, and error control and buffer management for the
channel access. In the WSNs, a Mac protocol is required in order to consider reliability,
efficiency of energy low access delay as important priorities in order to accommodate with
the limited resources of the sensor and to avoid consumption of redundant power (Xiao
2016).
There are various types of Mac protocol families. The families include protocol that are
based on schedule and contention.
ď‚· Contention based protocol: It generally utilises ALOHA or CSMA and there is no
requirement for the topology or synchronization knowledge because the nodes that are
present compete in order to right of entry the channel and then the winner will accomplish
something.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13WIRELESS SENSOR NETWORKS
ď‚· Schedule based protocol: it utilises TDMA. This kind requires previous information of
the topology of network in order to accomplish the schedule. The advantages include no
collision, delay that is predictable and it maximizes the overall throughput.
There are a variety of types of MAC protocols that are required for the WSNs (Iala et al
2017). The a variety of types of MAC protocols include:
ď‚· Sensor Mac: It utilizes a duty cycle that is synchronized and schedule periodic sleep and
wake and it uses SYNC packets that are short in order to exchange periodically schedules
of sleep with the neighbours. It consists of next sleep time and address of transmitter.
ď‚· Time out MAC: It uses active/sleep duty cycle and it ends vigorously. The node that are
in the lively period and it receive of sends data but when there is no action for a time that
is certain the vigorous period ends.
ď‚· S-MACL: This protocol solve the problem of SMAC border node. The S-MAC protocol
considers entire network as one unit and each of the node has a distinct ID. This protocol
has two kinds of nodes, one is followers and the other is synchronizers.
ď‚· When the nodes do not get a SYNC frame after the first period of listening, arbitrarily the
network selects one node in order to utilise its schedule as a reference for the network.
ď‚· When the node gets a schedule that is different from the neighbours, it compares the
present ID with the new one and then it follows the ID that is higher.
ď‚· The pattern MAC is utilised in a dynamic wake/sleep up schedule that is related to the
traffic of node and its neighbours. The node receives the information from its neighbours
before the protocol sends the packets of communication. In other words, it can be said
that the node derives the schedules according to the own pattern and the pattern of the
neighbour.
ď‚· Security
ď‚· Schedule based protocol: it utilises TDMA. This kind requires previous information of
the topology of network in order to accomplish the schedule. The advantages include no
collision, delay that is predictable and it maximizes the overall throughput.
There are a variety of types of MAC protocols that are required for the WSNs (Iala et al
2017). The a variety of types of MAC protocols include:
ď‚· Sensor Mac: It utilizes a duty cycle that is synchronized and schedule periodic sleep and
wake and it uses SYNC packets that are short in order to exchange periodically schedules
of sleep with the neighbours. It consists of next sleep time and address of transmitter.
ď‚· Time out MAC: It uses active/sleep duty cycle and it ends vigorously. The node that are
in the lively period and it receive of sends data but when there is no action for a time that
is certain the vigorous period ends.
ď‚· S-MACL: This protocol solve the problem of SMAC border node. The S-MAC protocol
considers entire network as one unit and each of the node has a distinct ID. This protocol
has two kinds of nodes, one is followers and the other is synchronizers.
ď‚· When the nodes do not get a SYNC frame after the first period of listening, arbitrarily the
network selects one node in order to utilise its schedule as a reference for the network.
ď‚· When the node gets a schedule that is different from the neighbours, it compares the
present ID with the new one and then it follows the ID that is higher.
ď‚· The pattern MAC is utilised in a dynamic wake/sleep up schedule that is related to the
traffic of node and its neighbours. The node receives the information from its neighbours
before the protocol sends the packets of communication. In other words, it can be said
that the node derives the schedules according to the own pattern and the pattern of the
neighbour.
ď‚· Security
14WIRELESS SENSOR NETWORKS
A WSNs is a particular kind of network. It shares some common things with a characteristic
network of computer and it shows certain features that are distinctive to it (Hu, Siddiqui and
Sankar 2016). The services of security in the WSNs should safeguard the information that is
communicated over the assets and the network from the sensor nodes and the misbehaviour
of the nodes. The requirements of safety of the WSNs are as follows:
Data Confidentiality: The mechanism of security should make sure that no message in the
network is unstated by anyone except the receiver that is intended. In a wireless sensor
network, the problem of privacy should address the following needs. The mechanism of
distribution should be robust, public information should be encrypted in order to defend
against the attacks of evaluation of traffic (Grover and Sharma 2016).
Data Integrity: The means should make sure that no message can be changed by an unit as it
travels from the dispatcher to the receiver.
Availability: This requirement makes sure that the services of the WSNs should always be
available in the occurrence of external and internal attacks such as the denial of service
attacks. Various approach have been planned by the investigators in order to accomplish the
goal. Some mechanisms utilise additional communication among various nodes.
Data Freshness: It implies that the data is new and makes sure that no opponent can rerun
the messages that are old. This necessity is essential when the nodes of the WSNs use the
keys that are shared for the communication of messages where an adversary that is potential
can start a replay attack utilising the old key as the key that is new (Rani and Kumar 2017).
Time Synchronization: Many applications in the WSNs need synchronization of time. Any
means of security for WSNs should be coordinated by time. Collaborative WSNs may need
synchronization among a group of sensors. In a sequence of protocols of synchronization that
is secure have been proposed.
A WSNs is a particular kind of network. It shares some common things with a characteristic
network of computer and it shows certain features that are distinctive to it (Hu, Siddiqui and
Sankar 2016). The services of security in the WSNs should safeguard the information that is
communicated over the assets and the network from the sensor nodes and the misbehaviour
of the nodes. The requirements of safety of the WSNs are as follows:
Data Confidentiality: The mechanism of security should make sure that no message in the
network is unstated by anyone except the receiver that is intended. In a wireless sensor
network, the problem of privacy should address the following needs. The mechanism of
distribution should be robust, public information should be encrypted in order to defend
against the attacks of evaluation of traffic (Grover and Sharma 2016).
Data Integrity: The means should make sure that no message can be changed by an unit as it
travels from the dispatcher to the receiver.
Availability: This requirement makes sure that the services of the WSNs should always be
available in the occurrence of external and internal attacks such as the denial of service
attacks. Various approach have been planned by the investigators in order to accomplish the
goal. Some mechanisms utilise additional communication among various nodes.
Data Freshness: It implies that the data is new and makes sure that no opponent can rerun
the messages that are old. This necessity is essential when the nodes of the WSNs use the
keys that are shared for the communication of messages where an adversary that is potential
can start a replay attack utilising the old key as the key that is new (Rani and Kumar 2017).
Time Synchronization: Many applications in the WSNs need synchronization of time. Any
means of security for WSNs should be coordinated by time. Collaborative WSNs may need
synchronization among a group of sensors. In a sequence of protocols of synchronization that
is secure have been proposed.
15WIRELESS SENSOR NETWORKS
Authentication: It makes sure that the node of communication is the one that it asserts to be.
An opponent can alter the packets of data but can alter a stream of packet by injecting the
packets that are fabricated. It is important for a recipient in order to authenticate the packets
that are received have come from the sensor node that is actual. In case of contact between
the two nodes, the verification of data can be accomplished through an authentication of
message code that is computed from the key that is shared and that is secret. A number of
schemes of authentication for the WSNs have been proposed by the investigators and among
them most of them are for routing that is secured (Oreku and Pazynyuk 2016).
The WSNs are vulnerable to different kinds of attacks. The attacks for which the WSNs
are vulnerable are denial of service attacks, physical layer attacks, link layer attacks, network
layer attacks and many more that can hamper the WSNs.
ď‚· Physical Layer
The physical layer is one of the desirable aspects of the WSNs is their capability to
communicate over a link that is wireless, so the applications of mobile can be supported, the
flexible implementations of nodes is possible and the nodes that can be placed in the areas
that are not accessible to the nodes that are wired (Deng et al 2016). Once the implementation
is carried out, it is possible to rearrange the placement of nodes and the rearrangement can be
made without the disrupting the operation that is normal. There are several challenges in the
physical layer such as limited bandwidth, poor performance of packet delivery and limited
range of transmission. The physical layer security has been studied extensively in order to
exploit the fundamental abilities of the physical layer such as randomness in the channels that
are wireless, signal to noise ration gap, jamming that is intended and many more for the
wireless communications that are secured (Zhu, Zou and Zheng 2017).
Authentication: It makes sure that the node of communication is the one that it asserts to be.
An opponent can alter the packets of data but can alter a stream of packet by injecting the
packets that are fabricated. It is important for a recipient in order to authenticate the packets
that are received have come from the sensor node that is actual. In case of contact between
the two nodes, the verification of data can be accomplished through an authentication of
message code that is computed from the key that is shared and that is secret. A number of
schemes of authentication for the WSNs have been proposed by the investigators and among
them most of them are for routing that is secured (Oreku and Pazynyuk 2016).
The WSNs are vulnerable to different kinds of attacks. The attacks for which the WSNs
are vulnerable are denial of service attacks, physical layer attacks, link layer attacks, network
layer attacks and many more that can hamper the WSNs.
ď‚· Physical Layer
The physical layer is one of the desirable aspects of the WSNs is their capability to
communicate over a link that is wireless, so the applications of mobile can be supported, the
flexible implementations of nodes is possible and the nodes that can be placed in the areas
that are not accessible to the nodes that are wired (Deng et al 2016). Once the implementation
is carried out, it is possible to rearrange the placement of nodes and the rearrangement can be
made without the disrupting the operation that is normal. There are several challenges in the
physical layer such as limited bandwidth, poor performance of packet delivery and limited
range of transmission. The physical layer security has been studied extensively in order to
exploit the fundamental abilities of the physical layer such as randomness in the channels that
are wireless, signal to noise ration gap, jamming that is intended and many more for the
wireless communications that are secured (Zhu, Zou and Zheng 2017).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16WIRELESS SENSOR NETWORKS
Conclusion
The report deals with the California Department of forestry and protection of fire is
implementing WSNs on the Park of Lava Spring State. The network will nourish data that is
live to centre of processing control nearby through a distance link that is long and that is
wireless. The development is about implementing 1500 specially made battery that is
working on wireless sensors. The sensors should work on a globally well-matched band of
ISM with a set that is spread spectrum that is spread. The intention of the project is to
contribute to the live data with the neighbourhood that is scientific across the globe.
The report focuses on the description of the protocols that have been chosen for the WSNs
and how they will extend the lifetime of the network. The protocol consists of MAC, physical
and routing layers in the WSNs. The report also focuses on the energy efficient protocols for
the physical, Mac, physical and the security of the WSNs. The protocols must have uniform
and efficient consumption of energy and upgraded security solutions.
Conclusion
The report deals with the California Department of forestry and protection of fire is
implementing WSNs on the Park of Lava Spring State. The network will nourish data that is
live to centre of processing control nearby through a distance link that is long and that is
wireless. The development is about implementing 1500 specially made battery that is
working on wireless sensors. The sensors should work on a globally well-matched band of
ISM with a set that is spread spectrum that is spread. The intention of the project is to
contribute to the live data with the neighbourhood that is scientific across the globe.
The report focuses on the description of the protocols that have been chosen for the WSNs
and how they will extend the lifetime of the network. The protocol consists of MAC, physical
and routing layers in the WSNs. The report also focuses on the energy efficient protocols for
the physical, Mac, physical and the security of the WSNs. The protocols must have uniform
and efficient consumption of energy and upgraded security solutions.
17WIRELESS SENSOR NETWORKS
References
Ait Aoudia, F., Gautier, M., Magno, M., Berder, O. and Benini, L., 2017. A generic
framework for modeling MAC protocols in WSNs. IEEE/ACM Transactions on Networking
(TON), 25(3), pp.1489-1500.
Arora, V.K., Sharma, V. and Sachdeva, M., 2016. A survey on LEACH and other’s routing
protocols in wireless sensor network. Optik, 127(16), pp.6590-6600.
Azizi, R., 2016. Consumption of Energy and Routing Protocols in Wireless Sensor
Network. Network Protocols & Algorithms, 8(3), pp.76-87.
Bouaziz, M. and Rachedi, A., 2016. A survey on mobility management protocols in WSNs
based on 6LoWPAN technology. Computer Communications, 74, pp.3-15.
Deng, Y., Wang, L., Elkashlan, M., Nallanathan, A. and Mallik, R.K., 2016. Physical layer
security in three-tier WSNs: A stochastic geometry approach. IEEE Transactions on
Information Forensics and Security, 11(6), pp.1128-1138.
Grover, J. and Sharma, S., 2016, September. Security issues in wireless sensor network—a
review. In 2016 5th International Conference on Reliability, Infocom Technologies and
Optimization (Trends and Future Directions)(ICRITO) (pp. 397-404). IEEE.
Han, G., Jiang, J., Guizani, M. and Rodrigues, J.J.C., 2016. Green routing protocols for
wireless multimedia sensor networks. IEEE Wireless Communications, 23(6), pp.140-146.
Hu, F., Siddiqui, W. and Sankar, K., 2016. Scalable security in wireless sensor and actuator
networks (WSANs). In Security in Sensor Networks (p. 177). CRC Press.
References
Ait Aoudia, F., Gautier, M., Magno, M., Berder, O. and Benini, L., 2017. A generic
framework for modeling MAC protocols in WSNs. IEEE/ACM Transactions on Networking
(TON), 25(3), pp.1489-1500.
Arora, V.K., Sharma, V. and Sachdeva, M., 2016. A survey on LEACH and other’s routing
protocols in wireless sensor network. Optik, 127(16), pp.6590-6600.
Azizi, R., 2016. Consumption of Energy and Routing Protocols in Wireless Sensor
Network. Network Protocols & Algorithms, 8(3), pp.76-87.
Bouaziz, M. and Rachedi, A., 2016. A survey on mobility management protocols in WSNs
based on 6LoWPAN technology. Computer Communications, 74, pp.3-15.
Deng, Y., Wang, L., Elkashlan, M., Nallanathan, A. and Mallik, R.K., 2016. Physical layer
security in three-tier WSNs: A stochastic geometry approach. IEEE Transactions on
Information Forensics and Security, 11(6), pp.1128-1138.
Grover, J. and Sharma, S., 2016, September. Security issues in wireless sensor network—a
review. In 2016 5th International Conference on Reliability, Infocom Technologies and
Optimization (Trends and Future Directions)(ICRITO) (pp. 397-404). IEEE.
Han, G., Jiang, J., Guizani, M. and Rodrigues, J.J.C., 2016. Green routing protocols for
wireless multimedia sensor networks. IEEE Wireless Communications, 23(6), pp.140-146.
Hu, F., Siddiqui, W. and Sankar, K., 2016. Scalable security in wireless sensor and actuator
networks (WSANs). In Security in Sensor Networks (p. 177). CRC Press.
18WIRELESS SENSOR NETWORKS
Iala, I., Ouadou, M., Aboutajdine, D. and Zytoune, O., 2017, May. Energy based collision
avoidance at the MAC layer for wireless sensor network. In 2017 International Conference
on Advanced Technologies for Signal and Image Processing (ATSIP) (pp. 1-5). IEEE.
Ioannou, C. and Vassiliou, V., 2016, September. The Impact of Network Layer Attacks in
WSNs. In 2016 International Workshop on Secure Internet of Things (SIoT) (pp. 20-28).
IEEE.
Kafi, M.A., Othman, J.B. and Badache, N., 2017. A survey on reliability protocols in
WSNs. ACM Computing Surveys (CSUR), 50(2), p.31.
Kocakulak, M. and Butun, I., 2017, January. An overview of WSNs towards internet of
things. In 2017 IEEE 7th Annual Computing and Communication Workshop and Conference
(CCWC) (pp. 1-6). IEEE.
Kokkinis, A., Paphitis, A., Kanaris, L., Sergiou, C. and Stavrou, S., 2018, February. Physical
and Network Layer Interconnection Module for Realistic Planning of IoT Sensor Networks.
In Proceedings of the 2018 International Conference on Embedded Wireless Systems and
Networks (pp. 201-202). Junction Publishing.
Kumar, A., Shwe, H.Y., Wong, K.J. and Chong, P.H., 2017. Location-based routing
protocols for WSNs: A survey. Wireless Sensor Network, 9(1), pp.25-72.
Kumar, N. and Singh, Y., 2017. Routing protocols in WSNs. In Handbook of Research on
Advanced Wireless Sensor Network Applications, Protocols, and Architectures (pp. 86-128).
IGI Global.
Oreku, G.S. and Pazynyuk, T., 2016. Security in WSNs. Springer International Publishing.
Press, C.R.C., 2016. WSNs: Current status and future trends. CRC press.
Iala, I., Ouadou, M., Aboutajdine, D. and Zytoune, O., 2017, May. Energy based collision
avoidance at the MAC layer for wireless sensor network. In 2017 International Conference
on Advanced Technologies for Signal and Image Processing (ATSIP) (pp. 1-5). IEEE.
Ioannou, C. and Vassiliou, V., 2016, September. The Impact of Network Layer Attacks in
WSNs. In 2016 International Workshop on Secure Internet of Things (SIoT) (pp. 20-28).
IEEE.
Kafi, M.A., Othman, J.B. and Badache, N., 2017. A survey on reliability protocols in
WSNs. ACM Computing Surveys (CSUR), 50(2), p.31.
Kocakulak, M. and Butun, I., 2017, January. An overview of WSNs towards internet of
things. In 2017 IEEE 7th Annual Computing and Communication Workshop and Conference
(CCWC) (pp. 1-6). IEEE.
Kokkinis, A., Paphitis, A., Kanaris, L., Sergiou, C. and Stavrou, S., 2018, February. Physical
and Network Layer Interconnection Module for Realistic Planning of IoT Sensor Networks.
In Proceedings of the 2018 International Conference on Embedded Wireless Systems and
Networks (pp. 201-202). Junction Publishing.
Kumar, A., Shwe, H.Y., Wong, K.J. and Chong, P.H., 2017. Location-based routing
protocols for WSNs: A survey. Wireless Sensor Network, 9(1), pp.25-72.
Kumar, N. and Singh, Y., 2017. Routing protocols in WSNs. In Handbook of Research on
Advanced Wireless Sensor Network Applications, Protocols, and Architectures (pp. 86-128).
IGI Global.
Oreku, G.S. and Pazynyuk, T., 2016. Security in WSNs. Springer International Publishing.
Press, C.R.C., 2016. WSNs: Current status and future trends. CRC press.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
19WIRELESS SENSOR NETWORKS
Pritchard, S.W., Hancke, G.P. and Abu-Mahfouz, A.M., 2017, July. Security in software-
defined WSNs: Threats, challenges and potential solutions. In 2017 IEEE 15th International
Conference on Industrial Informatics (INDIN) (pp. 168-173). IEEE.
Radhappa, H., Pan, L., Xi Zheng, J. and Wen, S., 2018. Practical overview of security issues
in wireless sensor network applications. International journal of computers and
applications, 40(4), pp.202-213.
Rani, A. and Kumar, S., 2017, February. A survey of security in WSNs. In 2017 3rd
International Conference on Computational Intelligence & Communication Technology
(CICT) (pp. 1-5). IEEE.
Reddy, G.K. and Devi, L.N., 2018, February. A Review on Clustering Protocols with Energy
heterogeneity in WSNs. In 2018 International Conference on Communication, Computing
and Internet of Things (IC3IoT) (pp. 243-246). IEEE.
Sarkar, A. and Murugan, T.S., 2016. Routing protocols for WSNs: What the literature
says?. Alexandria Engineering Journal, 55(4), pp.3173-3183.
Xiao, Y. ed., 2016. Security in sensor networks. CRC Press.
Yadav, S. and Yadav, R.S., 2016. A review on energy efficient protocols in WSNs. Wireless
Networks, 22(1), pp.335-350.
Yan, J., Zhou, M. and Ding, Z., 2016. Recent advances in energy-efficient routing protocols
for WSNs: A review. IEEE Access, 4, pp.5673-5686.
Zhu, J., Zou, Y. and Zheng, B., 2017. Physical-layer security and reliability challenges for
industrial WSNs. IEEE Access, 5, pp.5313-5320.
Zhu, J., Zou, Y. and Zheng, B., 2017. Physical-layer security and reliability challenges for
industrial WSNs. IEEE Access, 5, pp.5313-5320.
Pritchard, S.W., Hancke, G.P. and Abu-Mahfouz, A.M., 2017, July. Security in software-
defined WSNs: Threats, challenges and potential solutions. In 2017 IEEE 15th International
Conference on Industrial Informatics (INDIN) (pp. 168-173). IEEE.
Radhappa, H., Pan, L., Xi Zheng, J. and Wen, S., 2018. Practical overview of security issues
in wireless sensor network applications. International journal of computers and
applications, 40(4), pp.202-213.
Rani, A. and Kumar, S., 2017, February. A survey of security in WSNs. In 2017 3rd
International Conference on Computational Intelligence & Communication Technology
(CICT) (pp. 1-5). IEEE.
Reddy, G.K. and Devi, L.N., 2018, February. A Review on Clustering Protocols with Energy
heterogeneity in WSNs. In 2018 International Conference on Communication, Computing
and Internet of Things (IC3IoT) (pp. 243-246). IEEE.
Sarkar, A. and Murugan, T.S., 2016. Routing protocols for WSNs: What the literature
says?. Alexandria Engineering Journal, 55(4), pp.3173-3183.
Xiao, Y. ed., 2016. Security in sensor networks. CRC Press.
Yadav, S. and Yadav, R.S., 2016. A review on energy efficient protocols in WSNs. Wireless
Networks, 22(1), pp.335-350.
Yan, J., Zhou, M. and Ding, Z., 2016. Recent advances in energy-efficient routing protocols
for WSNs: A review. IEEE Access, 4, pp.5673-5686.
Zhu, J., Zou, Y. and Zheng, B., 2017. Physical-layer security and reliability challenges for
industrial WSNs. IEEE Access, 5, pp.5313-5320.
Zhu, J., Zou, Y. and Zheng, B., 2017. Physical-layer security and reliability challenges for
industrial WSNs. IEEE Access, 5, pp.5313-5320.
1 out of 20
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.