Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Wireless Sensor Network–A Study


Affiliations
1 Bharathiar University, Coimbatore, India
2 Chikkena Government Arts College, Tiruppur, India
     

   Subscribe/Renew Journal


The security of wireless sensor networks is a topic that has been studied extensively in the literature. The intrusion detection system is used to detect various attacks occurring on sensor nodes of Wireless Sensor Networks that are placed in various hostile environments.such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. Wireless Sensor Networks (WSN) consist of tiny devices. These tiny devices have limited energy, computational power, transmission range and memory. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. Wireless Sensor Networks (WSNs) are the collection of self – organizing sensor nodes deployed in various physical environments statically or dynamically depend upon the application.WSN has been used in many applications such habitat monitoring, building monitoring, smart grid and pipeline monitoring. Our intrusion detection model takes advantage of cluster-based architecture to reduce energy consumption. The WSN is built of "nodes" – from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radiotransceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. The topology of the WSNs can vary from a simple star network to an advanced multi-hopwireless mesh network. The propagation technique between the hops of the network can be routing or flooding.


User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 202

PDF Views: 4




  • Wireless Sensor Network–A Study

Abstract Views: 202  |  PDF Views: 4

Authors

L. Sheeba
Bharathiar University, Coimbatore, India
V. S. Meenakshi
Chikkena Government Arts College, Tiruppur, India

Abstract


The security of wireless sensor networks is a topic that has been studied extensively in the literature. The intrusion detection system is used to detect various attacks occurring on sensor nodes of Wireless Sensor Networks that are placed in various hostile environments.such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. Wireless Sensor Networks (WSN) consist of tiny devices. These tiny devices have limited energy, computational power, transmission range and memory. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. Wireless Sensor Networks (WSNs) are the collection of self – organizing sensor nodes deployed in various physical environments statically or dynamically depend upon the application.WSN has been used in many applications such habitat monitoring, building monitoring, smart grid and pipeline monitoring. Our intrusion detection model takes advantage of cluster-based architecture to reduce energy consumption. The WSN is built of "nodes" – from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radiotransceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. The topology of the WSNs can vary from a simple star network to an advanced multi-hopwireless mesh network. The propagation technique between the hops of the network can be routing or flooding.