You are on page 1of 4

International Journal of Advance Foundation and Research in Computer (IJAFRC)

Volume 2, Issue 6, June - 2015. ISSN 2348 4853

Monitoring Applications in Wireless Sensor Networks


Dhamdhere Shubhangi T. *1, Dr. S. V.Gumaste2 .
M.E.Student, SPCOE, Dumbarwadi, Otur*1, Professor SPCOE, Dumbarwadi, Otur2.
shubhangi28587@gmail.com*1, svgumaste@gmail.com2.
ABSTRACT
Wireless Sensor Networks (WSNs) is illustrious topic of many researchers. Wireless Sensor
Networks (WSNs) are used for different applications such as military applications, habitat
monitoring, agriculture, automation, and security. Wireless sensor network consists of large
number of sensor nodes. The nodes sense environmental changes and inform them to other nodes
over network architecture. Sensor nodes are under deployment in hostile environments or over
large geographical areas. Sensor networks are emerging as an attractive technology with great
secure for the future. Sensor networks provide endless opportunities, and also consist of difficult
challenges such as the energy is insufficient and nonrenewable resource. However, challenges
are noticed in relating to coverage and deployment, scalability, quality-of-service, size,
computational power, energy efficiency and security. This paper presents various security related
issues in wireless sensor networks and overview of the various applications of the WSN.
Index Terms : Wireless Sensor Networks, Network Security, Sensor node.

I.

INTRODUCTION

Wireless sensor networks have recently come into prominence because they hold the probable to
develop many segments of economy and life from environmental monitoring and maintenance, to
automation in the transportation, to manufacturing and business asset management, and health care
industries [1]. Sensor networks are frequently deployed in resource-constrained environments with
battery operated nodes running untethered. These constraints state that sensor network problems are
best approached in a hostile manner, by jointly considering the physical, networking, and application
layers and making major design tradeoffs across the layers [2]. The increasing attention in wireless
sensor networks can be rapidly understood by a large number of small sensing nodes which assemble
information or identify special events and communicate in a wireless approach, with handing their
processed data to a base station. Applications of Sensor Networks are of interest to the most different
fields. Surveillance, environmental monitoring, child education, warfare, micro-surgery and agriculture
are only a few examples.

Figure-1. Accessing WSNs.

27 | 2015, IJAFRC All Rights Reserved

www.ijafrc.org

International Journal of Advance Foundation and Research in Computer (IJAFRC)


Volume 2, Issue 6, June - 2015. ISSN 2348 4853

The major challenges to be noticed in WSNs are scalability, size, coverage and deployment, energy
efficiency, quality-of- service, computational power and security[3]. Among these challenges, security is a
major concern in wireless sensor networks. Most of the attacks and threats security in wireless
networks are similar to their wired counterparts. In fact, wireless networks are usually more
susceptible to various security threats and also unguided transmission medium is more vulnerable to
security attacks than the guided transmission medium. Due to broadcast nature, the wireless
communication is a simple candidate for eavesdropping. This paper present an overview of the security
issues and applications relating to Wireless Sensor Networks (WSNs).
II. APPLICATIONS OF WIRELESS SENSOR NETWORKS
Military Battlefield:
Military equipment now routinely contains some sort of computer equipment. Ad- hoc networking
would allow the military to take advantage of common place network technology to maintain an
information network between the soldiers, vehicles, and military information headquarters [4]. The
basic techniques of ad hoc network came from this field. WSNs are becoming an important part of
military command, communication, control and intelligence systems. Sensors can be deployed in a
battle field to observe the presence of forces and vehicles, and track their movements, enabling close
surveillance of opposing forces.
Commercial Sector:
Ad hoc can be used in emergency salvage operations for disaster relief efforts, e.g. in flood, fire or
earthquake. Emergency salvage operations must take place where non-existing or damaged
communications infrastructure and rapid deployment of a communication network is needed.
Information is relayed from one rescue team member to another over a small hand held. Other
commercial scenarios include e.g. ship-to-ship ad hoc mobile communication, law enforcement etc.
Video Reception:
To improve the quality of the video reception it propose a cross-layer feedback control mechanism that
allows the application layer to adapt itself to a dynamically changing network topology. Such a
mechanism could be based on a form of cross-layer feedback from the network layer to the application
layer.
Industrial applications:
In corporative, data exchange in adhoc network is used. In industry, WSNs can be used to monitor
manufacturing process or the condition of manufacturing equipment. For example, oil refiners or
chemical plants can use sensors to monitor the condition of their miles of pipelines. These sensors are
used to alert in case of any failures occurred.
Vehicular adhoc networks
Due to large processing delays and line-of-sight limitations VANET research aims to supply drivers with
information regarding obstacles on the road and emergency events. VANETs use ad hoc communications
for performing efficient driver assistance and car safety. The communications include data from the road
side and from other cars. VANET can be used to communicate premonitions, notification of emergencies,
and warnings about traffic conditions.

28 | 2015, IJAFRC All Rights Reserved

www.ijafrc.org

International Journal of Advance Foundation and Research in Computer (IJAFRC)


Volume 2, Issue 6, June - 2015. ISSN 2348 4853

Environmental Application
Environmental applications include patterns of insects, birds or small animals and tracking the
movements.
Health Care Applications:
Wireless sensor networks can be used to observe and track patients and elders for health care purposes.
It can reduce the severe shortage of health care and relieve the health care expenditures in the current
health care systems. For example sensors can be deployed in a patients home to survey the behaviors
of the patient. It can alert doctors when the patient falls and requires immediate medical awareness.
Agriculture
Using wireless sensor networks within the agricultural industry is increasingly frequent. Using a
wireless network, gravity feed water systems can be monitored using pressure transmitters to monitor
water tank levels, pumps and water use can be measured and wirelessly transmitted back to a central
control center for billing. Irrigation automation enables more efficient water use and reduces waste.
Environmental Conditions Monitoring:
In this area, WSN applications include monitoring temperature, humidity, monitoring the environmental
conditions affecting crops or livestock, and lighting in office, buildings and so on. These monitoring
modules are combined with actuator modules which can control. For example, the amount of fertilizer
in the soil or the amount of cooling or heating in a building, based on distributed sensor measurements.
Home Intelligence:
Wireless sensor networks can be used to provide more convenient and intelligent living environments
for human beings. For example, wireless sensors can be used to remotely read utility meters in a home
like water, gas, electricity and then send the readings to a remote centre through wireless
communication.
Structural Monitoring:
Wireless sensors can be used to monitor the movement within buildings and infrastructure such as
flyovers, bridges, tunnels etc. enabling Engineering practices to monitor assets remotely without the
need for costly site visits, as well as having the advantage of daily data, whereas traditionally this data
was collected weekly or monthly, using physical site visits, involving either road or rail closure in some
cases. It is also accurate than any visual assessment that would be carried out including sybil attack,
selective forwarding, wormhole attack, impersonation attack. T his paper represent an overview of the
applications of WSNs.
III. CONCLUSION
Wireless Sensor Network (WSN) is an promising technology that shows great secure for various
revolutionary applications both for mass public and military. The sensing technology combined with
wireless communication and processing power. Many applications of WSNs include heath, military,
environmental, industries, home, agriculture and so on. Besides these applications, security is the main
issue in WSNs.
VI. FUTURE SCOPE
29 | 2015, IJAFRC All Rights Reserved

www.ijafrc.org

International Journal of Advance Foundation and Research in Computer (IJAFRC)


Volume 2, Issue 6, June - 2015. ISSN 2348 4853

Scalability can still be increased by introducing the Clustering concept in order to reduce the traffic and
overhead to the Base Station. Two future research topics are: (1) Exploit the availability of private key
operations on sensor nodes: recent studies on public key cryptography have shown that public key
operations may be practical in sensor nodes. (2) QoS and security: performance is generally degraded
with the addition of security services in WSNs. Current studies on security in WSNs focus on individual
topics such as key management, secure routing, secure data aggregation, and intrusion detection. QoS
and security services need to be evaluated together in WSNs. By more carefully considering the threats
posed to sensor networks, applications with intrinsic security considerations become immediately
realizable.
V. REFERENCES
[1]

Mike Horton, John Suh, A Vision for Wireless Sensor Networks, IEEE 2005.

[2]

J. Hill, R. Szewczyk, A, Woo, S. Hollar, D. Culler, and K. Pister, System Architecture Directions for Networked
Sensors, ASPLOS, November 2000.
Undercoffer, J., Avancha, S., Joshi, A., and Pinkston, J., Security for Sensor Networks, CADIP Research
Symposium, 2002, available at, http://www.cs.sfu.ca/~angiez/personal/paper/sensor-ids.pdf

[3]

[4]

D. Braginsky, D. Estrin, Rumor routing algorithm for sensor networks, In Proceeding of the 1st ACM
International Workshop on Wireless Sensor Networks and Applications, New York, USA, 2002.

AUTHORS PROFILE

Ms. Dhamdhere Shubhangi T., ME student, Department of Computer


Engineering, SPCOE-Dumberwadi, Otur.

Dr. S. V. Gumaste, currently working as Professor and Head, Department of Computer Engineering,
SPCOE-Dumberwadi, Otur. Graduated from BLDE Association's College of Engineering, Bijapur,Karnataka
University, Dharwar in 1992 and completed Post-graduation in CSE from SGBAU, Amravati in 2007.
Completed Ph.D (CSE) in Engineerng & Faculty at SGBAU, Amravati. Has around 22 years of Teaching
Experience.

30 | 2015, IJAFRC All Rights Reserved

www.ijafrc.org

You might also like