A Security and Application of Wireless Sensor Network: A Comprehensive Study

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

AIP Publishing Logo

A comprehensive review of wireless sensor networks: Applications, challenges, radio technologies, and protocols

  • Article contents
  • Figures & tables
  • Supplementary Data
  • Peer Review
  • Reprints and Permissions
  • Cite Icon Cite
  • Search Site

Fadhil Mohammad Salman; A comprehensive review of wireless sensor networks: Applications, challenges, radio technologies, and protocols. AIP Conf. Proc. 4 December 2023; 2834 (1): 020021. https://doi.org/10.1063/5.0161523

Download citation file:

  • Ris (Zotero)
  • Reference Manager

Recently, significant advances in digital sensing technology and wireless communications have led to the production of small-scale smart sensors that have the ability to sense physical changes in different environments and convert them into digital signals that are collected in one central location. These networks are called wireless sensor networks (WSNs) because they have the ability to wirelessly communicate with each other for the purpose of passing data between them and deliver it to the central station. Wireless sensor networks have great importance in human environments, as they are used to monitor and record physical changes in environments that are not accessible to humans, such as environments with very high temperatures, or in cases of chemical environmental pollution, in forests and seas as well as in deep layers of earth to monitor seismic and volcanic activity. In view of the great importance of wireless sensor networks and their obvious impact on human life, and for the purpose of providing researchers with brief and complete information about these networks, we have presented this paper that briefly reviews what sensor networks are, their specifications, applications and the challenges they face. This paper also included most of the radio communication techniques used in sensor architectures. As well as touching on the most important routing algorithms in "WSNs" and their classifications with a comparison of their performance. Finally, this paper provided an overview of research trends that could lead to significant technological development and beneficial growth to overcome the challenges of wireless sensor networks.

Sign in via your Institution

Citing articles via, publish with us - request a quote.

ieee research paper on sensor network

Sign up for alerts

  • Online ISSN 1551-7616
  • Print ISSN 0094-243X
  • For Researchers
  • For Librarians
  • For Advertisers
  • Our Publishing Partners  
  • Physics Today
  • Conference Proceedings
  • Special Topics

pubs.aip.org

  • Privacy Policy
  • Terms of Use

Connect with AIP Publishing

This feature is available to subscribers only.

Sign In or Create an Account

Wireless Sensor Network Security Research and Challenges: A Backdrop

  • Conference paper
  • Cite this conference paper

Book cover

  • Dimple Juneja 3 ,
  • Atul Sharma 3 &
  • A. K Sharma 4  

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 169))

Included in the following conference series:

  • International Conference on High Performance Architecture and Grid Computing

3196 Accesses

3 Citations

If sensor networks are to attain their potential, security is one of the most important aspects to be taken care of. The need for security in military applications is obvious, but even more benign uses, such as home health monitoring, habitat monitoring and sub-surface exploration require confidentiality. WSNs are perfect for detecting environmental, biological, or chemical threats over large scale areas, but maliciously induced false alarms could completely negate value of the system. The widespread deployment of sensor networks is directly related to their security strength. These stated facts form the basis for this survey paper. This paper present a brief overview of challenges in designing a security mechanism for WSN, classify different types of attacks and lists available protocols, while laying outline for proposed work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Unable to display preview.  Download preview PDF.

Juneja, D., Sharma, A., Kumar, A.: A Novel and Efficient Algorithm for Deploying Mobile Sensors in Subsurface. Computer and Information Science 3(2), 94–105 (2010); ISSN 1913-8989 (Print), ISSN 1913-8997 (Online)

Article   Google Scholar  

Juneja, D., Sharma, A., Kumar, A.: A Query Driven Routing Protocol for Wireless Sensor Nodes in Subsurface. International Journal of Engineering Science and Technology 2(6), 1836–1843; ISSN: 0975-5462

Google Scholar  

Juneja, D., Sharma, A., Kumar, A.: A Novel Application Of Extended Kalman Filter For Efficient Information Processing In Subsurfaces. International Journal of Computer Applications 17(2), 28–32 (2011); Published By FCS (Foundation of Computer Science, USA). ISSN: 0975-8887

Al-Sakib, Pathan, K., Lee, W., Hyung, Hong, S., Choong.: Security in Wireless Sensor Networks: Issues and Challenges. In: ICACT 2006 (2006)

Lu, B., Habetler, T.G., Harley, R.G., Gutiérrez, J.A.: Applying Wireless Sensor Networks in Industrial Plant Energy Management Systems – Part I: A Closed-Loop Scheme. In: Sensors, October 30 -November 3, pp. 145–150. IEEE, Los Alamitos (2005)

Virone, G., Wood, A., Selavo, L., Cao, Q., Fang, L., Doan, T., He, Z., Stankovic, J.A.: An Advanced Wireless Sensor Network for Health Monitoring. In: Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare (D2H2), Arlington, VA, April 2-4 (2006)

Bokareva, T., Hu, W., Kanhere, S., Ristic, B., Gordon, N., Bessell, T., Rutten, M., Jha, S.: Wireless Sensor Networks for Battlefield Surveillance. In: Land Warfare Conference 2006, Brisbane, Australia (October 2006)

Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D., Anderson, J.: Wireless Sensor Networks for Habitat Monitoring. In: ACM WSNA 2002, Atlanta, Georgia, USA, September 28, pp. 88–97 (2002)

Wireless Sensor Networks, http://en.wikipedia.org/wiki/Wireless_Sensor_Networks

Tiny Operating System, http://en.wikipedia.org/wiki/TinyOS

Sastry, N., Wagner, D.: Security considerations for IEEE 802.15.4 networks. In: Proceedings of the 2004 ACM Workshop on Wireless Security. ACM Press, New York (2004)

Malan, D., Welsh, M., Smith, M.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Sensor and Ad Hoc Communications and Networks (2004)

Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the Symposium Security and Privacy (2003)

Du, W., Deng, J., Han, Y., Chen, S., Varshney, P.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM 2004: Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies (2004)

Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM Press, New York (2002)

Wagner, D.: Resilient aggregation in sensor networks. In: SASN 2004: Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (2004)

Du, W., Han, Y.S., Deng, J., Varshney, P.K.: A Pairwise key predistribution scheme for wireless sensor networks. In: Proceedings of the ACM Conference on Computer and Communications Security (2003)

Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in Sensor Networks. In: Proceedings - IEEE INFOCOM (2004)

Hoger, K., Andreas, W.: Protocols and Architecture for Wireless Sensor Networks. John Wiley & Sons Ltd, Chichester (2005); ISBN: 0-470-09510-5

Perrig, R., Szewczyk, V., Wen, D., Culler, J.D.: SPINS: security protocols for sensor networks. In: Proceedings of ACM MobiCom 2001, Rome, Italy, pp. 189–199 (2001)

Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE Transactions on Vehicular Technology 58(1), 367–380 (2009)

Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer 35(10), 48–56 (2002)

Brownfield, M., Gupta, Y., Davis, N.: Wireless sensor network denial of sleep attack. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, IAW 2005, pp. 356–364 (2005)

Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computers, 54–62 (October 2002)

Padmavathi, G., Shanmugapriya, D.: A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. International Journal of Computer Science and Information Security (IJCSIS) 4(1 & 2), 1–9 (2009)

Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)

Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In: Proceedings of the Second International Workshop on Security in Systems and Networks (IPDPS 2006 Workshop), pp. 1–8 (2006)

Krontiris, I., Dimitriou, T.D., Giannetsos, T., Mpasoukos, M.: Intrusion detection of sinkhole attacks in wireless sensor networks. In: Kutyłowski, M., Cichoń, J., Kubiak, P. (eds.) ALGOSENSORS 2007. LNCS, vol. 4837, pp. 150–161. Springer, Heidelberg (2008)

Chapter   Google Scholar  

Newsome, E., Song, S.D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004: Proceedings of the Third International Symposium on Information Processing in Sensor Networks, pp. 259–268. ACM Press, New York (2004)

Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole detection in wireless ad hoc networks. Department of Computer Science, Rice University, Tech. Rep. TR01-384 (June 2002)

Tumrongwittayapak, C., Varakulsiripunth, R.: Detecting Sinkhole Attacks In Wireless Sensor Networks. In: Proceedings of the IEEE ICROS-SICE International Joint Conference, pp. 1966–1971 (2009)

Feng, Z., Leonidas, G.: Wireless Sensor Networks (An Information Processing Approach). Morgan Kaufmann Publisher under Elsevier; ISBN:1-55860-914-8

Deepak, G., Alberto, C., Wei, Y., Yan, Y., Jerry, Z., Deborah, E.: Networking Issues in Wireless Sensor Networks. Elsevier Science, Amsterdam (2003)

CrossBow Technology Inc., www.xbow.com/

Download references

Author information

Authors and affiliations.

MM Institute of Computer Technology & Business Management, MM University, Mullana (Ambala), Haryana, India

Dimple Juneja & Atul Sharma

YMCA University of Science & Technology, Faridabad, Haryana, India

A. K Sharma

You can also search for this author in PubMed   Google Scholar

Editor information

Editors and affiliations.

Chitkara University, 160 009, Chandigarh, India

Archana Mantri , Suman Nandi  & Sandeep Kumar ,  & 

Chitkara University,, 160 009, Chandigarh, India

Gaurav Kumar

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper.

Juneja, D., Sharma, A., Sharma, A.K. (2011). Wireless Sensor Network Security Research and Challenges: A Backdrop. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds) High Performance Architecture and Grid Computing. HPAGC 2011. Communications in Computer and Information Science, vol 169. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22577-2_55

Download citation

DOI : https://doi.org/10.1007/978-3-642-22577-2_55

Publisher Name : Springer, Berlin, Heidelberg

Print ISBN : 978-3-642-22576-5

Online ISBN : 978-3-642-22577-2

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

wireless sensor networks Recently Published Documents

Total documents.

  • Latest Documents
  • Most Cited Documents
  • Contributed Authors
  • Related Sources
  • Related Keywords

Dynamic Key Distribution Method For Wireless Sensor Networks Based On Exponential Algorithm

Development of an organic photovoltaic energy harvesting system for wireless sensor networks; application to autonomous building information management systems and optimisation of opv module sizes for future applications, energy sink-holes avoidance method based on fuzzy system in wireless sensor networks.

The existence of a mobile sink for gathering data significantly extends wireless sensor networks (WSNs) lifetime. In recent years, a variety of efficient rendezvous points-based sink mobility approaches has been proposed for avoiding the energy sink-holes problem nearby the sink, diminishing buffer overflow of sensors, and reducing the data latency. Nevertheless, lots of research has been carried out to sort out the energy holes problem using controllable-based sink mobility methods. However, further developments can be demonstrated and achieved on such type of mobility management system. In this paper, a well-rounded strategy involving an energy-efficient routing protocol along with a controllable-based sink mobility method is proposed to extirpate the energy sink-holes problem. This paper fused the fuzzy A-star as a routing protocol for mitigating the energy consumption during data forwarding along with a novel sink mobility method which adopted a grid partitioning system and fuzzy system that takes account of the average residual energy, sensors density, average traffic load, and sources angles to detect the optimal next location of the mobile sink. By utilizing diverse performance metrics, the empirical analysis of our proposed work showed an outstanding result as compared with fuzzy A-star protocol in the case of a static sink.

Secure Routing using Multi-Objective Trust Aware Hybrid Optimization for Wireless Sensor Networks

Adaptive monitor placement for near real-time node failure localisation in wireless sensor networks.

As sensor-based networks become more prevalent, scaling to unmanageable numbers or deployed in difficult to reach areas, real-time failure localisation is becoming essential for continued operation. Network tomography, a system and application-independent approach, has been successful in localising complex failures (i.e., observable by end-to-end global analysis) in traditional networks. Applying network tomography to wireless sensor networks (WSNs), however, is challenging. First, WSN topology changes due to environmental interactions (e.g., interference). Additionally, the selection of devices for running network monitoring processes (monitors) is an NP-hard problem. Monitors observe end-to-end in-network properties to identify failures, with their placement impacting the number of identifiable failures. Since monitoring consumes more in-node resources, it is essential to minimise their number while maintaining network tomography’s effectiveness. Unfortunately, state-of-the-art solutions solve this optimisation problem using time-consuming greedy heuristics. In this article, we propose two solutions for efficiently applying Network Tomography in WSNs: a graph compression scheme, enabling faster monitor placement by reducing the number of edges in the network, and an adaptive monitor placement algorithm for recovering the monitor placement given topology changes. The experiments show that our solution is at least 1,000× faster than the state-of-the-art approaches and efficiently copes with topology variations in large-scale WSNs.

AHP based relay selection strategy for energy harvesting wireless sensor networks

A hole repair algorithm for wireless sensor networks based on virtual attractive force constraint, layered routing algorithm for wireless sensor networks based on energy balance, solution for intra/inter-cluster event-reporting problem in cluster-based protocols for wireless sensor networks.

<span>In recent years, wireless sensor networks (WSNs) have been considered one of the important topics for researchers due to their wide applications in our life. Several researches have been conducted to improve WSNs performance and solve their issues. One of these issues is the energy limitation in WSNs since the source of energy in most WSNs is the battery. Accordingly, various protocols and techniques have been proposed with the intention of reducing power consumption of WSNs and lengthen their lifetime. Cluster-oriented routing protocols are one of the most effective categories of these protocols. In this article, we consider a major issue affecting the performance of this category of protocols, which we call the intra/inter-cluster event-reporting problem (IICERP). We demonstrate that IICERP severely reduces the performance of a cluster-oriented routing protocol, so we suggest an effective Solution for IICERP (SIICERP). To assess SIICERP’s performance, comprehensive simulations were performed to demonstrate the performance of several cluster-oriented protocols without and with SIICERP. Simulation results revealed that SIICERP substantially increases the performance of cluster-oriented routing protocols.</span>

Efficient organization of nodes in wireless sensor networks (clustering location-based LEACH)

The rapid development of connected devices and wireless communication has enabled several researchers to study wireless sensor networks and propose methods and algorithms to improve their performance. Wireless sensor networks (WSN) are composed of several sensor nodes deployed to collect and transfer data to base station (BS). Sensor node is considered as the main element in this field, characterized by minimal capacities of storage, energy, and computing. In consequence of the important impact of the energy on network lifetime, several researches are interested to propose different mechanisms to minimize energy consumption. In this work, we propose a new enhancement of low-energy adaptive clustering hierarchy (LEACH) protocol, named clustering location-based LEACH (CLOC-LEACH), which represents a continuity of our previous published work location-based LEACH (LOC-LEACH). The proposed protocol organizes sensor nodes into four regions, using clustering mechanism. In addition, an efficient concept is adopted to choose cluster head. CLOC-LEACH considers the energy as the principal metric to choose cluster heads and uses a gateway node to ensure the inter-cluster communication. The simulation with MATLAB shows that our contribution offers better performance than LEACH and LOC-LEACH, in terms of stability, energy consumption and network lifetime.

Export Citation Format

Share document.

edugate

  • IEEE Wireless Sensor Networks Projects

In the domain of Wireless Sensor Networks (WSN), there are several project topics that are progressing in contemporary years. The following are instances of project topics that have been investigated in IEEE publication and conferences and coordinate with current patterns in WSN study. Drop a message to us about your research queries let our experts take care of your work, you can be at ease.These projects act as a motivation for researchers, students, and experts those who explore to dedicate to the research domain:

  • Energy-Efficient WSNs for Environmental Monitoring
  • Description: To track ecological metrics like humidity, temperature, and level of air over wide regions, aim to formulate and apply a WSN framework enhanced for less power usage, by employing energy-harvesting mechanisms and effective data transmission protocols.
  • Secure WSNs Using Blockchain Technology
  • Description: In order to develop a decentralized and safe model for data transmission in WSNs, employ blockchain mechanism, thereby assuring data reliability and morality, which is specifically helpful in significant applications such as calamity management and healthcare tracking.
  • Machine Learning-Based Anomaly Detection in WSNs
  • Description: Intending to detect ecological variations or framework failures at an early stage, construct a machine learning system that works on cloud servers or network gateways in order to identify abnormalities in the data gathered by WSNs.
  • WSN Integration with IoT for Smart Agriculture
  • Description: For accurate farming, develop an incorporated IoT and WSN approach to enhance crop production and improve water usage by including weather data, autonomous irrigation framework and soil dampness sensors.
  • Indoor Localization and Tracking Using WSNs
  • Description: For applications like navigation assistance in wide buildings or asset monitoring in repositories, it is beneficial to deploy a WSN framework for precise indoor localization and monitoring by utilizing mechanisms such as Ultra-Wideband (UWB) or Received Signal Strength Indicator (RSSI).
  • WSNs for Structural Health Monitoring
  • Description: To identify cracks, vibrations, and other signals of architectural damage with actual-time notifying technologies, formulate a WSN model that employs sensors to track the architectural welfare of structure and buildings.
  • Energy-Efficient Routing Protocols in WSNs
  • Description: For solving trade-offs among network lifespan, energy usage, and data transmission consistency, explore and construct novel routing protocols that are enhanced for energy effectiveness in WSNs.
  • Privacy-Preserving Data Aggregation in WSNs
  • Description: Possibly, employing homomorphic encryption or safer multi-party computation algorithms, it is appreciable to investigate approaches for collecting data in WSNs in such a manner that conserves the confidentiality of the data resources.
  • Cross-Layer Optimization Strategies for WSNs
  • Description: By determining communications among various layers of network protocol stack, aim to research and apply cross-layer optimization policies that enhance the entire effectiveness of WSNs.
  • Underwater Wireless Sensor Networks (UWSNs) for Oceanographic Data Collection
  • Description: An underwater WSN model has to be constructed in such a manner for gathering and transmitting oceanographic data, thereby solving limitations that are certain to underwater interaction like signal attenuation and node mobility because of currents.

What kinds of attacks can a wireless IDS detect?

To track wireless networks for doubtful actions and possible assaults, a Wireless Intrusion Detection System (WIDS) is formulated, thereby offering a significant layer of protection through identifying different kinds of assaults that are particularly designed or mainly efficient against wireless networks. Below are few of the types of assaults that a WIDS has the capability to identify:

  • Unauthorized Access
  • Description: To obtain access to wireless networks, approaches that are carried out by illicit users are detected. Generally, assaults against weak authentication technologies or utilizing risks in the network’s safety configuration are encompassed.
  • Rogue Access Points
  • Description: WIDS has the capability to identify illicit access points, possibly to grasp complicated data from wireless clients or to provide a deceptive into the network. Generally, it has been arranged within the scope of the network.
  • Evil Twin Attacks
  • Description: Malevolent access points are detected by WIDS, which deceive users into linking to them to interrupt data by imitating genuine ones with the similar SSID (Service Set Identifier).
  • Denial of Service (DoS) and Distributed DoS (DDoS) Attacks
  • Description: Identification of signal jamming or anomalous congestion trends that specifically intend to complicate the certain devices or network. To genuine users, the network or certain devices are inaccessible.
  • Man-in-the-Middle (MitM) Attacks
  • Description: Interruption approaches have to be recognized where the assaulter privately communicates and potentially modifies the interaction among two parties who trust that they are directly interacting with each other.
  • MAC Spoofing
  • Description: When an assaulter alters the Media Access Control (MAC) address of their device to imitate another device on the network, WIDS has the ability to identify this attack.
  • Deauthentication and Disassociation Attacks
  • Description: Detecting when an assaulter sends disassociation or deauthentication frames regularly to separate a client from an access point. Frequently, this is considered as a beginning to other assaults such as MitM.
  • Eavesdropping/Sniffing
  • Description: Wireless IDS contains the capability to track the passive assaults. In this kind of attack, the assaulters grasp data packets transmitted over the network to obtain complicated data.
  • Network Injection Attacks
  • Description: The illicit injection of packets into the network has to be recognized, that can be employed to interrupt congestion or to carry out spoofing or replay assaults.
  • Description: Detecting approaches by moving around in a vehicle through utilizing mobile device or laptop in order to identify wireless networks to plan networks for upcoming assaults.
  • SSID Cloaking
  • Description: In order to conceal the SSID of an access point as a safety criterion, wireless IDS identifies approaches. At times, this can be utilized by assaulters to develop an evil twin access point.
  • KRACK (Key Reinstallation Attacks)
  • Description: In the WPA2 protocol, tracks the risks that can be implemented to decrypt replay attacks, hijack correlations, and network congestion.

IEEE Wireless Sensor Networks Research Paper Topics

The following are the current popular research topics in IEEE Wireless Sensor Networks. Our team specializes in all types of IEEE research papers and guarantees top-notch results. Contact phdtopic.com to enhance your career with our proficient developers who are well-versed in various simulation tools.

  • Improving quality of service in a wireless sensor network using artificial neural networks
  • EEC-GA: Energy-Efficient Clustering Approach Using Genetic Algorithm for Heterogeneous Wireless Sensor Networks
  • Wireless Sensor Networks and Green Networking for 6G communication- An Overview
  • Realization of Intelligent Greenhouse Visualization System Based on Wireless Sensor Network
  • Wireless Sensor Network as a Mesh: Vision and Challenges
  • Water Pump Health Prediction in Industrial Wireless Sensor Network Using Supervised Learning
  • Bridge Wireless Sensor Network for Disaster Tolerance Technology
  • An Overview of Localization Techniques in Underwater Wireless Sensor Networks
  • Performance Analysis of IOT based Wireless Sensor Network and its Graphical User Interface for Air Quality Monitoring
  • Reinforcement Learning-based MAC for Reconfigurable Intelligent Surface-Assisted Wireless Sensor Networks
  • Energy Efficient Wake-up Receiver MAC Protocol in OMNeT++ for Indoor Wireless Sensor Network Communication
  • An improved clustering algorithm based on K-means++ and Knn method for underwater wireless sensor networks
  • Optimal Deployment of Heterogeneous Wireless Sensor Networks Based on Improved Flower Pollination Algorithm
  • An Optimal Deployment Approach for Transmission Line Wireless Sensor Network Based on NSGA2
  • Sensor Node on A Wireless Sensor Network for Monitoring CO2 Emission
  • Information-Centric Wireless Sensor Networks for Smart-City-as-a Service: Concept Proposal, Testbed Development, and Fundamental Evaluation
  • Recent advancements in Wireless Sensor Networks for Air Pollution Monitoring: A Survey Report of 2021-2022
  • Wormhole Detection using Zonal Security Nodes in Wireless Sensor Networks
  • Data Aggregation in Low-Power Wireless Sensor Networks With Discrete Transmission Ranges: Sensor Signal Aggregation Over Graph
  • Energy Efficient Clustering Based Depth Coordination Routing Protocol For Underwater Wireless Sensor Networks

IMAGES

  1. (PDF) Environmental Wireless Sensor Networks

    ieee research paper on sensor network

  2. (PDF) Wireless Sensor Network Theoretical Findings and Applications

    ieee research paper on sensor network

  3. A wavelet-based multi-sensor data fusion algorithm

    ieee research paper on sensor network

  4. IEEE Sensors Journal template

    ieee research paper on sensor network

  5. IEEE Paper Template

    ieee research paper on sensor network

  6. (PDF) Clustering in Wireless Sensor Networks (WSNs)

    ieee research paper on sensor network

VIDEO

  1. Key Definitions of Wireless Sensor Networks || WSN || Sensor || Sensor Node

  2. HP 107a Paper Sensor Repair.!!! #HP107a #sensor

  3. Intrusion and Fire Detection Method by Wireless Sensor Network

  4. Rock Paper Sensor #rock #mrbeast #reels

  5. How to Download IEEE Research Paper Free By Prof Abhijit Kalbande

  6. Wireless Sensor Network Framework for Early Detection and Warning of Forest Fire

COMMENTS

  1. A Security and Application of Wireless Sensor Network: A ...

    Wireless Sensor Networks (WSN s) have gained prominence in technology for diverse applications, such as environmental monitoring, health care, smart agriculture, and industrial automation. Comprising small, low-power sensor nodes that sense and collect data from the environment, process it locally, and communicate wirelessly with a central sink or gateway, WSN s face challenges related to ...

  2. Sensors

    However, there are still challenges for the IEEE 802.11 technology in such scenarios. For those reasons, this special issue is aimed at collecting high-quality research papers and review articles focusing on the latest trends in the use of IEEE 802.11 in wireless sensor network and IoT scenarios. We seek original papers showing recent advances ...

  3. A comprehensive review of wireless sensor networks: Applications

    As well as touching on the most important routing algorithms in "WSNs" and their classifications with a comparison of their performance. Finally, this paper provided an overview of research trends that could lead to significant technological development and beneficial growth to overcome the challenges of wireless sensor networks.

  4. Machine Learning for Wireless Sensor Networks Security: An Overview of

    Wireless Sensor Network (WSN) is one of the most effective methods for many real-time applications, due to its compactness, cost-effectiveness, and ease of deployment [].The function of the WSN is to monitor the field of interest, collect the data, and transmit it to the base station (Access point) for post-processing analysis [].A large number of sensor nodes are used in some WSN implementations.

  5. Selected Papers from the IEEE International Conference of Cyber ...

    Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. ... In addition to the IEEE CSR ...

  6. A review paper on wireless sensor network techniques in Internet of

    The WSN (Wireless Sensor Network) is a central component of the IoT, which has proliferated into several different applications in real-time. The IoT and WSNs now have various critical and non-critical applications impacting nearly every area of our everyday life. WSN nodes are usually small and battery-driven machines.

  7. PDF IEEE Sensors Council

    CALL FOR PAPERS IEEE Sensors Journal Special issue on Self-powered Sensors: Architectures, Applications and Challenges Some sensors will inevitably be in remote and inaccessible areas, which can include oil and gas pipelines, long-distance transmission lines, remote forests and oceans areas, etc. Meanwhile, a general sensor usually needs to be

  8. Wireless sensor network security: A recent review based on state-of-the

    Wireless sensor networks (WSNs) is an increasingly valuable foundational technology for the Internet of Things (IoT). 1 WSN is considered an increasingly important fundamental component of the IoT. The WSN market was worth the US $46.76 billion in 2020 and is predicted to be worth US $126.93 billion by 2026, growing at a CAGR of 17.64% between 2021 and 2026. 2-5 As a result, the use of WSNs ...

  9. Machine Learning in Wireless Sensor Networks for Smart Cities: A Survey

    The small size IoT nodes based on low power Bluetooth (IEEE 802.15.1) standard and wireless sensor networks (WSN) (IEEE 802.15.4) standard are generally used for transmission of data to a remote location using gateways. ... WSN-IoT technology-wise research papers considered in this survey. Figure 10. WSN-IoT technology-wise research papers ...

  10. (PDF) Bluetooth-Based Smart Sensor Networks

    answers that can works as support and for the motive of research in wireless sensor network agreement ... A CM/IEEE Intl. Conf. on Mobile . Computing and Networking (MobiCom 99), ... In this paper ...

  11. Wireless Sensor Network Security Research and Challenges: A ...

    Abstract. If sensor networks are to attain their potential, security is one of the most important aspects to be taken care of. The need for security in military applications is obvious, but even more benign uses, such as home health monitoring, habitat monitoring and sub-surface exploration require confidentiality.

  12. (PDF) Future Trends of Wireless Sensor Network

    A wireless sensor network (WSN) is a network formed by a large number of sensor nodes, each equipped with sensor (s) to detect physical phenomena such as heat, light, temperature, pressure, motion ...

  13. wireless sensor networks Latest Research Papers

    The existence of a mobile sink for gathering data significantly extends wireless sensor networks (WSNs) lifetime. In recent years, a variety of efficient rendezvous points-based sink mobility approaches has been proposed for avoiding the energy sink-holes problem nearby the sink, diminishing buffer overflow of sensors, and reducing the data ...

  14. IEEE Wireless Sensor Networks Ideas

    IEEE Wireless Sensor Networks Research Paper Topics . The following are the current popular research topics in IEEE Wireless Sensor Networks. Our team specializes in all types of IEEE research papers and guarantees top-notch results. Contact phdtopic.com to enhance your career with our proficient developers who are well-versed in various ...