Energy Harvesting and Wireless Sensor Networks
VerifiedAdded on  2020/04/07
|7
|1963
|202
AI Summary
This assignment delves into the concept of energy harvesting within the context of wireless sensor networks (WSNs). It examines both traditional and modern energy harvesting techniques, highlighting advancements in technology and their impact on WSNs. The paper explores the potential of energy harvesting to power WSN devices sustainably, enabling continuous operation and minimizing reliance on conventional energy sources. Additionally, it discusses the challenges and opportunities associated with integrating energy harvesting into WSN architectures.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: WIRELESS NETWORKING CONCEPT
Wireless networking Concept
Name of the Student
Name of the University
Author’s Note
Wireless networking Concept
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
WIRELESS NETWORKING CONCEPT
1. Worldwide Interoperability for Microwave Access (WiMax) is referred as the
delivery of the services to the long wireless broadband access. It provides point-to-point as
well as multipoint applications (Yang, 2014). On the other hand, it is enabled for enhancing
security of the network at the time of transmission to the last mile. In addition, WiMax
utilizes three types of data encryption standards in order to protect data as well as
information. WiMax utilizes Counter Mode with the Cipher Block Chaining Message
Authentication Code Protocol (CCMP) in order to encrypt traffic on the particular network.
Moreover, it utilizes Advanced Encryption Standard in order to transmit data securely.
The data encryption standard utilized by WiMx can be explained as followed.
Triple DES
It has intended to supplant original Data Encryption Standard algorithm that is figured
by the hackers at the end for figuring out the procedure to vanquish in effortlessly. Triple
DES has suggested the standard as well as the most generally used symmetric algorithm in
the business. It uses three individual keys with 56 bits each. In addition, the aggregate key
length is measured as 168 bits (Guo et al, 2014). On the other hand, specialists have
contended that there are 112 bits are included in 112 bits in the key quality that is more
similar to the process. Thus, in spite of gradually eliminated, there are triple DES that can
still figure out the procedure to make a tried as well as encryption for true equipment
encryption answer for the administrators along with distinctive projects.
AES
The Advanced Encryption Standard (AES) is recognized as the algorithm that is
trusted as the standard by the Government of USA as well as several organizations. In spite
of the particular fact, it is a great degree, which is proficient in 128 piece frame format. In
addition, the Advanced Encryption Standard (AES) uses the keys of 192 as well as 256 bits
WIRELESS NETWORKING CONCEPT
1. Worldwide Interoperability for Microwave Access (WiMax) is referred as the
delivery of the services to the long wireless broadband access. It provides point-to-point as
well as multipoint applications (Yang, 2014). On the other hand, it is enabled for enhancing
security of the network at the time of transmission to the last mile. In addition, WiMax
utilizes three types of data encryption standards in order to protect data as well as
information. WiMax utilizes Counter Mode with the Cipher Block Chaining Message
Authentication Code Protocol (CCMP) in order to encrypt traffic on the particular network.
Moreover, it utilizes Advanced Encryption Standard in order to transmit data securely.
The data encryption standard utilized by WiMx can be explained as followed.
Triple DES
It has intended to supplant original Data Encryption Standard algorithm that is figured
by the hackers at the end for figuring out the procedure to vanquish in effortlessly. Triple
DES has suggested the standard as well as the most generally used symmetric algorithm in
the business. It uses three individual keys with 56 bits each. In addition, the aggregate key
length is measured as 168 bits (Guo et al, 2014). On the other hand, specialists have
contended that there are 112 bits are included in 112 bits in the key quality that is more
similar to the process. Thus, in spite of gradually eliminated, there are triple DES that can
still figure out the procedure to make a tried as well as encryption for true equipment
encryption answer for the administrators along with distinctive projects.
AES
The Advanced Encryption Standard (AES) is recognized as the algorithm that is
trusted as the standard by the Government of USA as well as several organizations. In spite
of the particular fact, it is a great degree, which is proficient in 128 piece frame format. In
addition, the Advanced Encryption Standard (AES) uses the keys of 192 as well as 256 bits
2
WIRELESS NETWORKING CONCEPT
for the substantial obligation encryption purposes. AES is viewed as making impenetrable to
the assaults, which is except for making savage power. It endeavors to make disentangle
messages using each of the single and conceivable blend in 128, 192 as well as 256 piece
(Huang et al., 2013). On contrary, there are security specialist that is trusted in making the
process single conceivable and in the end to be hailed as the right standard in order to encode
information in the particular private sector.
RSA
RSA is considered as the open key encryption algorithm as well as the standard to
scramble information that is sent over the web. It generally occurs on different strategies that
are used as the part of PGP as well as GPG programs. On the other hand, it is dissimilar to the
triple DE and RSA that are viewed as asymmetric algorithm as the use of the keys are
included in this. In this perspective, the key is generally open and the particular things used in
order to scramble the message as well as private keys for decoding. However, the
consequences of RSA encryption is considered as immense clump, which gets aggressors of
times as well as preparing energy for break.
2. It is important to identify the most important WPAN technologies that are
Bluetooth as well as Zigbee. In addition, there are several security challenges in Bluetooth
devices as well as technology at present usages. On the other hand, it is important to mention
that there are several attacks against the confidentiality as well as integrity of data (Dehwah
et al., 2015). Moreover, Bluetooth does not provide effective customer verification.
Authorization of the Bluetooth devices cannot be achieved, which can cause explicit behavior
of the connected devices. In this perspective, it is important to mention that there is a massive
threat for DoS attacks on the Bluetooth devices at the time of transmission of data as well as
information. It can be malicious entry of the external parties at the time of transmission
WIRELESS NETWORKING CONCEPT
for the substantial obligation encryption purposes. AES is viewed as making impenetrable to
the assaults, which is except for making savage power. It endeavors to make disentangle
messages using each of the single and conceivable blend in 128, 192 as well as 256 piece
(Huang et al., 2013). On contrary, there are security specialist that is trusted in making the
process single conceivable and in the end to be hailed as the right standard in order to encode
information in the particular private sector.
RSA
RSA is considered as the open key encryption algorithm as well as the standard to
scramble information that is sent over the web. It generally occurs on different strategies that
are used as the part of PGP as well as GPG programs. On the other hand, it is dissimilar to the
triple DE and RSA that are viewed as asymmetric algorithm as the use of the keys are
included in this. In this perspective, the key is generally open and the particular things used in
order to scramble the message as well as private keys for decoding. However, the
consequences of RSA encryption is considered as immense clump, which gets aggressors of
times as well as preparing energy for break.
2. It is important to identify the most important WPAN technologies that are
Bluetooth as well as Zigbee. In addition, there are several security challenges in Bluetooth
devices as well as technology at present usages. On the other hand, it is important to mention
that there are several attacks against the confidentiality as well as integrity of data (Dehwah
et al., 2015). Moreover, Bluetooth does not provide effective customer verification.
Authorization of the Bluetooth devices cannot be achieved, which can cause explicit behavior
of the connected devices. In this perspective, it is important to mention that there is a massive
threat for DoS attacks on the Bluetooth devices at the time of transmission of data as well as
information. It can be malicious entry of the external parties at the time of transmission
3
WIRELESS NETWORKING CONCEPT
procedure of data. However, sensitive data might be damaged as well as corrupted at the time
of wireless transmission.
Bluesnarfing is one of the threats involved in the technology that can allow the
attackers in order to increase the utilization of the devices that are Bluetooth enabled. In
addition, it searches for IMEI number of the Bluetooth devices as well as getting connected
through the procedure. In this perspective, it is required to connect with the Bluetooth
enabled mobile devices. It is important for the attackers to have span messages along with
phishing mails that can cause damages to mobile phones.
ZigBee is one of the wireless communication with low power as well as low rate aims
to give cryptographic keys for security. The particular link is established between the devices
and maintained through security protocol of ZigBee (Fadel et al., 2015). In addition, there are
chances of physical attacks on ZigBee radio related to the frequency breach. Thus, the data
packers are collected at the time of wireless communication, which can be breached in the
network.
3. 1st article: Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in
wireless sensor networks: A comprehensive review." Renewable and Sustainable Energy
Reviews 55 (2016): 1041-1054.
The paper discusses with the process of using of energy in Wireless Sensor Network.
The network includes a large number of static sensor nodes, which assists in the low
processing. In addition, there are several sources of energy including in Wireless Sensor
Network and radio frequency based energy involved in the network. Along with these, solar
based energy as well as thermal based energy and flow based energy harvesting is included in
the procedure. There are also several approaches described in the present paper for the
purpose of using energy effectively. On the other hand, the energy harvesting from distinctive
WIRELESS NETWORKING CONCEPT
procedure of data. However, sensitive data might be damaged as well as corrupted at the time
of wireless transmission.
Bluesnarfing is one of the threats involved in the technology that can allow the
attackers in order to increase the utilization of the devices that are Bluetooth enabled. In
addition, it searches for IMEI number of the Bluetooth devices as well as getting connected
through the procedure. In this perspective, it is required to connect with the Bluetooth
enabled mobile devices. It is important for the attackers to have span messages along with
phishing mails that can cause damages to mobile phones.
ZigBee is one of the wireless communication with low power as well as low rate aims
to give cryptographic keys for security. The particular link is established between the devices
and maintained through security protocol of ZigBee (Fadel et al., 2015). In addition, there are
chances of physical attacks on ZigBee radio related to the frequency breach. Thus, the data
packers are collected at the time of wireless communication, which can be breached in the
network.
3. 1st article: Shaikh, Faisal Karim, and Sherali Zeadally. "Energy harvesting in
wireless sensor networks: A comprehensive review." Renewable and Sustainable Energy
Reviews 55 (2016): 1041-1054.
The paper discusses with the process of using of energy in Wireless Sensor Network.
The network includes a large number of static sensor nodes, which assists in the low
processing. In addition, there are several sources of energy including in Wireless Sensor
Network and radio frequency based energy involved in the network. Along with these, solar
based energy as well as thermal based energy and flow based energy harvesting is included in
the procedure. There are also several approaches described in the present paper for the
purpose of using energy effectively. On the other hand, the energy harvesting from distinctive
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
WIRELESS NETWORKING CONCEPT
sources, which can cause damages to ecological balance of nature. On the other hand,
harvesting from distinctive sources can cause depletion of the resources in the specific
environment. However, there are long lasting devices that can consume more battery as well
as causes energy draining. It is important to make energy efficient reliable systems, which
can provide advantages to the particular users in the form of ultra-energy efficient sensors
(Butun, Morgera & Sankar, 2014). In order to overcome the main limitations, design as well
as development of efficient as well as high performance energy harvesting systems for
Wireless Sensor Networks. It is important to consider that the models having potential can be
used in order to maximize energy harvested of wireless sensor networks. It is also important
to detect some of the issues that are still required for addressing the process in order to
develop cost effective, efficient as well as reliable energy harvesting systems for the
environment.
2nd article: Ulukus, Sennur, et al. "Energy harvesting wireless communications: A
review of recent advances." IEEE Journal on Selected Areas in Communications 33.3 (2015):
360-381.
In the particular article, there are discussions about new technologies implemented in
the process of energy harvesting sector. There are new advancements in energy harvesting,
which can be changed for traditional scenario of energy harvesting. However, the effective
utilization of the modern technique in the processing of energy harvesting. It has increased
initial costs of several energy sources along with depletion of natural sources. There are also
several equations as well as theories related to the process have been discussed in the present
paper, which uses the customary concept of the energy harvesting as well as converting it into
the modern technology. There are possibility of enhancement in traditional theory, which
have been upgraded into the modern tactics. In this perspective, the use of VLSI model is
WIRELESS NETWORKING CONCEPT
sources, which can cause damages to ecological balance of nature. On the other hand,
harvesting from distinctive sources can cause depletion of the resources in the specific
environment. However, there are long lasting devices that can consume more battery as well
as causes energy draining. It is important to make energy efficient reliable systems, which
can provide advantages to the particular users in the form of ultra-energy efficient sensors
(Butun, Morgera & Sankar, 2014). In order to overcome the main limitations, design as well
as development of efficient as well as high performance energy harvesting systems for
Wireless Sensor Networks. It is important to consider that the models having potential can be
used in order to maximize energy harvested of wireless sensor networks. It is also important
to detect some of the issues that are still required for addressing the process in order to
develop cost effective, efficient as well as reliable energy harvesting systems for the
environment.
2nd article: Ulukus, Sennur, et al. "Energy harvesting wireless communications: A
review of recent advances." IEEE Journal on Selected Areas in Communications 33.3 (2015):
360-381.
In the particular article, there are discussions about new technologies implemented in
the process of energy harvesting sector. There are new advancements in energy harvesting,
which can be changed for traditional scenario of energy harvesting. However, the effective
utilization of the modern technique in the processing of energy harvesting. It has increased
initial costs of several energy sources along with depletion of natural sources. There are also
several equations as well as theories related to the process have been discussed in the present
paper, which uses the customary concept of the energy harvesting as well as converting it into
the modern technology. There are possibility of enhancement in traditional theory, which
have been upgraded into the modern tactics. In this perspective, the use of VLSI model is
5
WIRELESS NETWORKING CONCEPT
useful in order to comprehend energy as well as complexity of the process of decoding as
well as encoding in the specific system involved in the network.
In addition, providing energy to the process of harvesting capability to the wireless
sensor devices to the nodes that can be continually acquire energy from the nature as well as
man-made scenario. It turns to provide promising future for the wireless networks as well as
self-sustainability of along with the virtual operation with the network (Tunca et al, 2014). It
is important to have proper procedure of energy harvesting with the help of wireless networks
that are usually expected in introducing various transformative changes in the wireless sensor
networking (Rault, Bouabdallah & Challal, 2014). On the other hand, it is important to have
wireless networking with expected advantages of minimizing the utilization of conventional
energy along with accompanying the process.
WIRELESS NETWORKING CONCEPT
useful in order to comprehend energy as well as complexity of the process of decoding as
well as encoding in the specific system involved in the network.
In addition, providing energy to the process of harvesting capability to the wireless
sensor devices to the nodes that can be continually acquire energy from the nature as well as
man-made scenario. It turns to provide promising future for the wireless networks as well as
self-sustainability of along with the virtual operation with the network (Tunca et al, 2014). It
is important to have proper procedure of energy harvesting with the help of wireless networks
that are usually expected in introducing various transformative changes in the wireless sensor
networking (Rault, Bouabdallah & Challal, 2014). On the other hand, it is important to have
wireless networking with expected advantages of minimizing the utilization of conventional
energy along with accompanying the process.
6
WIRELESS NETWORKING CONCEPT
References
Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in
wireless sensor networks. IEEE communications surveys & tutorials, 16(1), 266-282.
Dehwah, A. H., Taieb, S. B., Shamma, J. S., & Claudel, C. G. (2015, June). Decentralized
energy and power estimation in solar-powered wireless sensor networks.
In Distributed Computing in Sensor Systems (DCOSS), 2015 International
Conference on (pp. 199-200). IEEE.
Fadel, E., Gungor, V. C., Nassef, L., Akkari, N., Malik, M. A., Almasri, S., & Akyildiz, I. F.
(2015). A survey on wireless sensor networks for smart grid. Computer
Communications, 71, 22-33.
Guo, S., He, L., Gu, Y., Jiang, B., & He, T. (2014). Opportunistic flooding in low-duty-cycle
wireless sensor networks with unreliable links. IEEE Transactions on
Computers, 63(11), 2787-2802.
Huang, P., Xiao, L., Soltani, S., Mutka, M. W., & Xi, N. (2013). The evolution of MAC
protocols in wireless sensor networks: A survey. IEEE communications surveys &
tutorials, 15(1), 101-120.
Rault, T., Bouabdallah, A., & Challal, Y. (2014). Energy efficiency in wireless sensor
networks: A top-down survey. Computer Networks, 67, 104-122.
Tunca, C., Isik, S., Donmez, M. Y., & Ersoy, C. (2014). Distributed mobile sink routing for
wireless sensor networks: A survey. IEEE communications surveys & tutorials, 16(2),
877-897.
Yang, K. (2014). Wireless sensor networks. Principles, Design and Applications.
WIRELESS NETWORKING CONCEPT
References
Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in
wireless sensor networks. IEEE communications surveys & tutorials, 16(1), 266-282.
Dehwah, A. H., Taieb, S. B., Shamma, J. S., & Claudel, C. G. (2015, June). Decentralized
energy and power estimation in solar-powered wireless sensor networks.
In Distributed Computing in Sensor Systems (DCOSS), 2015 International
Conference on (pp. 199-200). IEEE.
Fadel, E., Gungor, V. C., Nassef, L., Akkari, N., Malik, M. A., Almasri, S., & Akyildiz, I. F.
(2015). A survey on wireless sensor networks for smart grid. Computer
Communications, 71, 22-33.
Guo, S., He, L., Gu, Y., Jiang, B., & He, T. (2014). Opportunistic flooding in low-duty-cycle
wireless sensor networks with unreliable links. IEEE Transactions on
Computers, 63(11), 2787-2802.
Huang, P., Xiao, L., Soltani, S., Mutka, M. W., & Xi, N. (2013). The evolution of MAC
protocols in wireless sensor networks: A survey. IEEE communications surveys &
tutorials, 15(1), 101-120.
Rault, T., Bouabdallah, A., & Challal, Y. (2014). Energy efficiency in wireless sensor
networks: A top-down survey. Computer Networks, 67, 104-122.
Tunca, C., Isik, S., Donmez, M. Y., & Ersoy, C. (2014). Distributed mobile sink routing for
wireless sensor networks: A survey. IEEE communications surveys & tutorials, 16(2),
877-897.
Yang, K. (2014). Wireless sensor networks. Principles, Design and Applications.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.