SlideShare a Scribd company logo
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
DOI:10.5121/cseij.2022.12605 35
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR
BIG DATA
Richa Verma and Ravindara Bhatt
Department of Computer Engineering, Jaypee University of Information Technology,
Solan, India
ABSTRACT
Wireless sensor networks are continually developing in the big data world and are widely employed in
many aspects of life. In the monitoring region, the WSN gathers, analyses, and sends information about the
detected item. In recent years, WSN has also made important strides in the management of critical data
protection, traffic monitoring, and climate - change detection. The rich big data contributors known as
wireless sensor networks provide a significant amount of data from numerous sensor nodes in large-scale
networks (WSNs), which are among the numerous potential datasets. However, unlike traditional wireless
networks, suffer from significant constraints in communication and data dependability due to the cluster’s
constraints. This paper gives a detailed assessment of cutting-edge research on using WSN into large data
systems Potential network and effective deployment and scientific problems are presented and discussed in
the context of the study topics and aim. Finally, unresolved issues are addressed in order to discuss
interesting future research possibilities.
KEYWORDS
Big data, Wireless Sensor Networks, Big Data Storage, Protocol Layering, Sensitive Data, Challenges of
Big Data in WSN.
1. INTRODUCTION
The fundamental objectives of sensor-driven networks are to discover and record events,
aggregate and report the acquired data, and oversee tasks. The main WSN participants are known
as wireless sensor nodes. These wireless nodes are made up of the mote and sensor devices. The
sensor detects some event or physical phenomenon and informs the mote about it. The following
components make up Mote: a wireless communication interface, a digitizer, a CPU, some sort of
storage device, and a power supply. Power storage and power harvesting are two feasible
categories into which the nodes' power supply might be segmented [1]. WSN are frequently
installed in isolated locations where post-installation maintenance by humans is not feasible. As a
result, efforts are being undertaken to increase their effectiveness and robustness. Deployment of
WSN is hampered by a number of factors, including power consumption and vast deployment
distances. These obstacles no longer stand in the way of widespread remote deployment due to
automation trends and newly emerging applications. Big data systems benefit from efficient data
aggregation and in-network processing. In order to enhance system performance and address
WSN's limitations, it is crucial to analyse research articles that merge WSN with big data
systems. As an example of a basic system design, consider about a massive data system that is
WSN-based. The data is sent to a temporary store by the sink node once it has been collected
from the sensor nodes for subsequent data aggregation. Following this, a big data framework
employing the primary store may operate with the combined data. Applications and big data
platforms manage the converted data [2].
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
36
Fig. 1 Large-Scale Network System [2].
WSN routing is much more complex than in typical ad hoc networks due to its unique qualities.
For WSN, a variety of routing methods that differ from the standard TCP/IP addressing scheme
have been suggested. These tactics concentrated on network characteristics as well as structural
and functional requirements. Being aware of the factors that are crucial to the sensor applications
is necessary for developing a better WSN strategy. It is possible to put sensor nodes in remote or
dangerous areas. This demands that nodes be able to communicate with one another even in the
absence of a base station or predetermined cluster of motes. Additionally, it might not be able to
replenish the sensor nodes' batteries [1]. This article provides a thorough analysis of recent
research on integrating WSN into large-scale data systems. In light of the study's objectives and
themes, potential network, deployment, and scientific issues are given and explored. In order to
explore exciting future research opportunities, outstanding topics are then discussed.
2. RELATED WORK
Hadoop, MapReduce, and Big Table are three of the most popular technologies and
methodologies for Big Data. Because they rapidly and affordably process massive volumes of
data, these advances have transformed data management along with quickness. Extremely huge
amounts of data with various structures may be processed with Hadoop (or no structure at all).
Among the Hadoop elements that make up their linkages are HBase, H Catalog, Pig, Hive, Oozie,
Zookeeper, and Kafka nevertheless, Hadoop Distributed File System (HDFS) and MapReduce
for Big Data are the most extensively utilized elements and well-known ideas [4]. The
connections between the various parts of the Hadoop ecosystem are shown in Figure 2.
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
37
Fig. 2 Hadoop ecosystem [4].
The components of a wireless sensor network (WSN) are geographically dispersed independent
devices that communicate digitally, acquire data, and identify particular incidents of relevance in
the physical and ecological circumstances. A network of randomly placed sensor nodes is created
and is uniquely recognized by serial numbers that are directly tied to node placements. When
querying events in the WSN, the network is directly alerted of the events of interest without
notifying the nodes beforehand. After gathering information about the requested event, the
network sends a report to the user. WSNs offer more opportunities and ease for the capture,
transmission, and analysis of massive data. For instance, wireless sensors are made smaller and
less expensive, sensor nodes are adaptable in their networking, WSNs place data at the center of
the network, the most valuable data is gathered from various vantage points and stages, and
transmitted collected data is used to process large amounts of data in order to improve the
accuracy of the information. The data gathered and processed do in fact expand exponentially as
the volume and deployment space of WSNs networks increase, needing planning node energy
usage. High-efficiency networking is crucial in the application of WSNs in order to increase the
energy utilization rate of a single node to a higher extent, lower the energy usage of the entire
WSN, and lengthen the life cycle of WSNs [3]. A wireless big data system that manages
enormous amounts of data across wireless networks. Several writers concentrated on network
connectivity, such as information propagation, information network management, and innovative
applications under protocol stack, as compared to detailing the full system. [2].
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
38
Fig. 3 Protocol layering of wireless big data systems [2].
2.1. Finding and Limitations
Table 1. Finding and Limitations
Sr.
No.
Paper
Finding Limitations
1. 1
The advantages, benefits, and
drawbacks of various solutions put
forth in the WSN and IoT arena are
then carefully considered.
Additionally, the research compares
different solutions based on
performance metrics like diversity,
integration, range of motion,
renewability, versatility, energy
efficiency, expandability, latency,
confidentiality, and big data.
Dealing with data structure collected
on a massive scale makes it difficult
to satisfy the stated need. As data
sources continue to increase, new
data processing strategies must
always be developed to accommodate
Bigdata.
2. 2
Outlined the technical research
problems for WSN-based big data
systems as WSN is considered one of
Resultant solution is not being
proposed for open
issues in the research area.
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
39
the key data sources.
3. 11.
In research, analyses of more than 130
papers from 2014 to 2021 have been
presented. The paper discusses a
number of areas of Industry 4.0,
including the designing stage, security
requirements, deployment stage,
network classification, problems, and
obstacles.
The region's current issues and
difficulties are not being adequately
addressed.
When it comes to the application and
deployment of Internet and Wireless
sensor in Sector 4.0, the safe and
reliable communication of the data to
a distant location is not being
prioritized.
4. 4.
Implemented data life cycle that makes
use of the Big Data technologies and
terminologies in order to increase the
effectiveness of data management.
Presents a data life cycle that makes
use of big data technology and
terminology, however future study
directions in this area are not chosen
based on methodology, findings, and
a number of unresolved problems.
5. 5.
The deployment of a large number of
nodes is supposed to highlight the
demanding specifications of WSN.
Ground level effects on WSN signals,
which affect data transmission between
nodes, have been taken into
consideration during experimental
evaluation to identify the various WSN
properties. For real-time Big Data
applications including border
surveillance, environmental
monitoring, and industrial processes,
the BDEG big data gathering method
has been developed.
Research is not focused on shortening
the total data transmission distance,
and additional factors like rate of bit
errors and ratio of signal to noise are
not taken into account in order to
further develop the BDEG algorithm.
6. 6.
By reducing energy consumption,
latency, PDR, throughput, false ratio,
PRR, and network overhead, the
performance metrics of WSN are
evaluated. The demand for routing
algorithms; the various types of routing
algorithms used to improve
performance; The most crucial element
in a wireless sensor network (WSN) is
QoS, while other factors should be
focused on enhancing security issues.
Networks are distant and exposed to a
variety of security risks that might
have a severe impact on performance.
When the network is used in
operation applications, such strategic
warfare, a solution to the issue is not
being addressed.
7. 7.
It is being evaluated the network
properties as well as the clustering
objectives of 37 cluster-based
methodologies while reviewing the
numerous network characteristics
supported by clustering (heterogeneity,
mobility, and so on). Unsurprisingly,
the data show that the main goal of
using such strategies is to decrease
energy use.
There are no further attempts being
made to address the issues of
mobility and heterogeneity through
clustering.
8. 8.
Explains the needs for managing
sensitive data’s security in the WSN
using big data technology. In response
to these issues, it applies the
application of WSN in the security
management of sensitive data and
Data security is the most often
utilized area, accounting for 38.41%
of all uses, followed by network
security (33.74%), and system
security (27.5%). The application
needs more enhancements overall
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
40
offers some assistance in problem
solving. It analyses the issues in the
security management of sensitive data
from many angles.
because it is not very thorough.
9. 9.
Explains how WSN and Big Data are
used in a collaborative firefighting
system in detail. The experiment was
carried out in a barren space. There
was equipment for WSN, Big Data,
and other subsystems. The experiment
employed just one FDU. Using a
microcontroller that was
preprogramed, it operated
independently. The HARMS (Human
Agent Robot Machine Sensor) protocol
was crucial to all of these
communications.
It would be preferable to utilize a
different microcontroller that can
support the JAVA programming
language in place of the one used in
WSN. WSN was unable to fully
utilize the HARMS model's benefits.
10. 10.
Networked models are used to show
how information outcome across
robotic wireless sensor networks may
maximize output while also
maximizing the amount of data
available.
Big data collection, sensing,
processing, storing, analysis, and
integration are still challenges for
intelligent industrial systems. More
visual monitoring systems need to be
studied and used.
3. UNRESOLVED BIG DATA CHALLENGES IN WSN
(1) Individuality and Cooperation: - Because IoT devices differ from one another,
compatibility is a problem. In the WSN or IoT environment, the different distributed
devices producing various types of data must connect [1]. As IoT applications and
connected devices become more diverse, ongoing work is needed in this area.
(2) Mobility: - Facilitating communication among fast moving objects, such as cars, and
exploiting mobility to improve communication effectiveness are difficult given the
impending advancement of IoT systems. It is obvious to address the issue of mobility for
things with some improved methods given the ubiquitous or widespread distribution of
things and the natural demand to facilitate their movement in IoT scenarios. Unlike a
traditional WSN, the mobility patterns in the networks may not always guarantee
connectivity between the source and the destination. As a result, feasible clustering and
mobility prediction algorithms should be created in accordance with the additional
restrictions of each network. In the network context, clustering algorithms also need to
be updated to take connectivity and mobility into account [1,2].
(3) Fog Computing and Real-Time Communications: - Big data systems strongly favor real-
time communication and processing because to the delay-sensitive nature of sensed data
in WSN. Supporting real-time communications is challenging with WSNs due to
significant node restrictions. Moreover, real-time tasks cannot be carried out by a big
data system built on a cloud computing architecture. Fog computing, which aims to
improve low latency, mobility, network bandwidth, security, and privacy, was recently
proposed to extend cloud services to the edge of the network by bringing computation,
communication, and storage closer to the edge devices and end users in order to support
real-time tasks. As a result, real-time processing can be supported by a big data system
based on fog computing. However, there isn't yet a standout WSN solution for real-time
communication [2].
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
41
(4) Delay: - Due to the enormous number of devices communicating with sensors and
producing various forms of data, numerous applications have experienced delays.
Particularly in WSN, IoT objects have typically been delay-sensitive objects. Numerous
factors, including topology, radio interference, mobility, etc., could be the cause of the
problem. With the IoT's ever-growing data sources, it is necessary to move in this path [
1].
(5) Model-based Simulation: - In research work, performance assessment and comparison
are crucial. Although numerous platforms have been proposed for big data and WSN,
there isn't a testing ground or simulator that integrates both of these technologies. It
seems feasible to integrate a WSN simulation into a big data simulator or platform for
broad tests as a temporary fix. On the other hand, creating an interface between two
systems to share data in a way that eliminates dependency is necessary for a long-term
solution. A modular and extensible assessment platform that can accommodate various
WSN types is also needed. Additionally, as evaluation is mostly dependent on
modelling, more accurate traffic and risk analysis is important for improving the
reliability of the experiment [2].
(6) Security: - Security for conventional WSNs is constrained to the relevant area. However,
because IoT systems enable communication between highly scattered objects over the
internet, people's perceptions of security are altered and improved. Despite the fact that
many researchers have included security and privacy in their suggested solutions, such as
blockchain technology, the fight against various forms of intimidation put forth by
attackers is constantly fascinating and thrilling. To link a blockchain, cryptography
processing and public key decryption are needed. Additionally, in order to transmit data
when constructing a new blockchain, the link's earlier and later sequences must be
confirmed. Therefore, various problems must be resolved in order to accomplish
immediate data updating and storage. Therefore, it is clear that improving security and
privacy is a problem that needs to be addressed [1,12].
4. CONCLUSIONS
In the circumstances where WSN was considered one of the key data sources, we examined
technological research concerns for WSN-based large data systems. Before describing the
potential applications for large data systems in WSN, we first discussed the key contributions of
each work. We concentrate particularly on wireless big data systems' protocol layering and large
data in WSN. The remaining unanswered questions in this field of study are then discussed.
REFERENCES
[1] S. Sharma, & V. K. Verma, (2022) “An integrated exploration on internet of things and wireless
sensor networks,” Wireless Personal Communications, 124(3), 2735-2770.
[2] B.S. Kim, K. I. Kim, B Shah, F. Chow, and K. H. Kim, (2019) “Wireless sensor networks for big
data systems,” Sensors, 19(7), 1565.
[3] Y Chen, X Zhu, K. Fang, X. Chen, T. Guo, C. Li and Z. Zou, (2022) “An improved method for sink
node deployment in wireless sensor network to big data,” Neural Computing and
Applications, 34(12), 9499-9510.
[4] N. Khan, I. Hashem, I. A. T. Yaqoob, Z. Inayat, W. K Mahmoud Ali, M. Alam and A. Gani, (2014)
“Big data: survey, technologies, opportunities, and challenges,” The scientific world journal.
[5] S. Rani, S. H. Ahmed, R. Talwar and J. Malhotra, (2017) “Can sensors collect big data? An energy-
efficient big data gathering algorithm for a WSN,”IEEE Transactions on Industrial
Informatics, 13(4), 1961-1968.
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
42
[6] A. Raja Basha, (2022) “A review on wireless sensor networks: routing,” Wireless Personal
Communications, 1-41.
[7] S. El Khediri, (2022)“Wireless sensor networks: a survey, categorization, main issues, and future
orientations for clustering protocols,” Computing, 1-63.
[8] H. Lin, B. Weng, J. Pan, C. Lin and Q. Yang, (2021) ”Application of Wireless Sensor Networks in
the Sensitive Data Security of Intelligent Data Center under the Big Data Environment,” In Journal
of Physics: Conference Series (Vol. 1982, No. 1, p. 012017). IOP Publishing.
[9] B. Khaday, E. T. Matson, J. Springer, Y. K. Kwon, H. Kim, S. Kim and H. S. Woo, (2015)
“Wireless sensor network and big data in cooperative fire security system using harms,” In 2015 6th
International Conference on Automation, Robotics and Applications (ICARA) (pp. 405-410). IEEE.
[10] G. Lazaroiu, M. Andronie, M. Iatagan, M. Geamanu, R. Ștefanescu, and I. Dijmarescu, (2022)
“Deep Learning-Assisted Smart Process Planning, Robotic Wireless Sensor Networks, and
Geospatial Big Data Management Algorithms in the Internet of Manufacturing Things,” ISPRS
International Journal of Geo-Information, 11(5), 277.
[11] M. Majid, S. Habib, A. R. Javed, M. Rizwan, G. Srivastava, T. R. Gadekallu and J. C. W. Lin,
(2022) “Applications of wireless sensor networks and internet of things frameworks in the industry
revolution 4.0: A systematic literature review,”Sensors, 22(6), 2087.
[12] S. J. Hsiao and W. T. Sung, (2021) “Employing blockchain technology to strengthen security of
wireless sensor networks,” IEEE Access, 9, 72326-72341.
Ad

More Related Content

Similar to SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA (20)

Enhancing the Energy Efficiency of Wireless Sensor Networks in IoT
Enhancing the Energy Efficiency of Wireless Sensor Networks in IoTEnhancing the Energy Efficiency of Wireless Sensor Networks in IoT
Enhancing the Energy Efficiency of Wireless Sensor Networks in IoT
IJAEMSJORNAL
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
IJERA Editor
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
ijtsrd
 
IJSRED-V1I2P12
IJSRED-V1I2P12IJSRED-V1I2P12
IJSRED-V1I2P12
IJSRED
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
Er_Loveleen
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networks
IJCNCJournal
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksA Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
IJERA Editor
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
INFOGAIN PUBLICATION
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
ijassn
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal
 
Wireless personal communication
Wireless personal communicationWireless personal communication
Wireless personal communication
Venu Madhav
 
Wireless Personal Communications
Wireless Personal CommunicationsWireless Personal Communications
Wireless Personal Communications
Venu Madhav
 
Some Aspects of Wireless Sensor Networks
Some Aspects of Wireless Sensor NetworksSome Aspects of Wireless Sensor Networks
Some Aspects of Wireless Sensor Networks
pijans
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
 
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor NetworksA Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
ijtsrd
 
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
IJERA Editor
 
Towards energy efficient big data gathering
Towards energy efficient big data gatheringTowards energy efficient big data gathering
Towards energy efficient big data gathering
Finalyear Projects
 
Enhancing the Energy Efficiency of Wireless Sensor Networks in IoT
Enhancing the Energy Efficiency of Wireless Sensor Networks in IoTEnhancing the Energy Efficiency of Wireless Sensor Networks in IoT
Enhancing the Energy Efficiency of Wireless Sensor Networks in IoT
IJAEMSJORNAL
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
IJERA Editor
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
ijtsrd
 
IJSRED-V1I2P12
IJSRED-V1I2P12IJSRED-V1I2P12
IJSRED-V1I2P12
IJSRED
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networks
IJCNCJournal
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksA Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
IJERA Editor
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
INFOGAIN PUBLICATION
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
ijassn
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal
 
Wireless personal communication
Wireless personal communicationWireless personal communication
Wireless personal communication
Venu Madhav
 
Wireless Personal Communications
Wireless Personal CommunicationsWireless Personal Communications
Wireless Personal Communications
Venu Madhav
 
Some Aspects of Wireless Sensor Networks
Some Aspects of Wireless Sensor NetworksSome Aspects of Wireless Sensor Networks
Some Aspects of Wireless Sensor Networks
pijans
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
 
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor NetworksA Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
A Research on Cluster Based Routing Methodologies for Wireless Sensor Networks
ijtsrd
 
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
IJERA Editor
 
Towards energy efficient big data gathering
Towards energy efficient big data gatheringTowards energy efficient big data gathering
Towards energy efficient big data gathering
Finalyear Projects
 

More from CSEIJJournal (20)

Smart Agriculture Irrigation System using IoT
Smart Agriculture Irrigation System using IoTSmart Agriculture Irrigation System using IoT
Smart Agriculture Irrigation System using IoT
CSEIJJournal
 
Theoretical and Conceptual Fundamentals of System Computing – Quantum Oscilla...
Theoretical and Conceptual Fundamentals of System Computing – Quantum Oscilla...Theoretical and Conceptual Fundamentals of System Computing – Quantum Oscilla...
Theoretical and Conceptual Fundamentals of System Computing – Quantum Oscilla...
CSEIJJournal
 
Contrastive Learning in Image Style Transfer: A Thorough Examination using CA...
Contrastive Learning in Image Style Transfer: A Thorough Examination using CA...Contrastive Learning in Image Style Transfer: A Thorough Examination using CA...
Contrastive Learning in Image Style Transfer: A Thorough Examination using CA...
CSEIJJournal
 
CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...
CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...
CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...
CSEIJJournal
 
Plant Leaf Diseases Detection using Deep Learning and Novel CNN
Plant Leaf Diseases Detection using Deep Learning and Novel CNNPlant Leaf Diseases Detection using Deep Learning and Novel CNN
Plant Leaf Diseases Detection using Deep Learning and Novel CNN
CSEIJJournal
 
Fire and Smoke Detection for Wildfire using YOLOV5 Algorithm
Fire and Smoke Detection for Wildfire using YOLOV5 AlgorithmFire and Smoke Detection for Wildfire using YOLOV5 Algorithm
Fire and Smoke Detection for Wildfire using YOLOV5 Algorithm
CSEIJJournal
 
call for Papers - 6th International Conference on Natural Language Computing ...
call for Papers - 6th International Conference on Natural Language Computing ...call for Papers - 6th International Conference on Natural Language Computing ...
call for Papers - 6th International Conference on Natural Language Computing ...
CSEIJJournal
 
CFP : 5th International Conference on Advances in Computing & Information Tec...
CFP : 5th International Conference on Advances in Computing & Information Tec...CFP : 5th International Conference on Advances in Computing & Information Tec...
CFP : 5th International Conference on Advances in Computing & Information Tec...
CSEIJJournal
 
CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...
CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...
CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...
CSEIJJournal
 
Comprehensive Privacy Prеsеrvation for Imagеs and Vidеos using Machinе Learni...
Comprehensive Privacy Prеsеrvation for Imagеs and Vidеos using Machinе Learni...Comprehensive Privacy Prеsеrvation for Imagеs and Vidеos using Machinе Learni...
Comprehensive Privacy Prеsеrvation for Imagеs and Vidеos using Machinе Learni...
CSEIJJournal
 
A SURVEY ON A MODEL FOR PESTICIDE RECOMMENDATION USING MACHINE LEARNING
A SURVEY ON A MODEL FOR PESTICIDE RECOMMENDATION USING MACHINE LEARNINGA SURVEY ON A MODEL FOR PESTICIDE RECOMMENDATION USING MACHINE LEARNING
A SURVEY ON A MODEL FOR PESTICIDE RECOMMENDATION USING MACHINE LEARNING
CSEIJJournal
 
Call for Papers - 13th International Conference on Information Technology in ...
Call for Papers - 13th International Conference on Information Technology in ...Call for Papers - 13th International Conference on Information Technology in ...
Call for Papers - 13th International Conference on Information Technology in ...
CSEIJJournal
 
Detection of Dyslexia and Dyscalculia in Children
Detection of Dyslexia and Dyscalculia in ChildrenDetection of Dyslexia and Dyscalculia in Children
Detection of Dyslexia and Dyscalculia in Children
CSEIJJournal
 
Call for Papers - 5th International Conference on Advances in Computing & Inf...
Call for Papers - 5th International Conference on Advances in Computing & Inf...Call for Papers - 5th International Conference on Advances in Computing & Inf...
Call for Papers - 5th International Conference on Advances in Computing & Inf...
CSEIJJournal
 
Call for Papers - 6th International Conference on Machine Learning & Trends (...
Call for Papers - 6th International Conference on Machine Learning & Trends (...Call for Papers - 6th International Conference on Machine Learning & Trends (...
Call for Papers - 6th International Conference on Machine Learning & Trends (...
CSEIJJournal
 
Call for Papers - 6th International Conference on Big Data, Machine Learning ...
Call for Papers - 6th International Conference on Big Data, Machine Learning ...Call for Papers - 6th International Conference on Big Data, Machine Learning ...
Call for Papers - 6th International Conference on Big Data, Machine Learning ...
CSEIJJournal
 
Machine Learning-based Classification of Indian Caste Certificates using GLCM...
Machine Learning-based Classification of Indian Caste Certificates using GLCM...Machine Learning-based Classification of Indian Caste Certificates using GLCM...
Machine Learning-based Classification of Indian Caste Certificates using GLCM...
CSEIJJournal
 
Devops for Optimizing Database Management: Practice Implementation, Challenge...
Devops for Optimizing Database Management: Practice Implementation, Challenge...Devops for Optimizing Database Management: Practice Implementation, Challenge...
Devops for Optimizing Database Management: Practice Implementation, Challenge...
CSEIJJournal
 
Design and Implementation of the Morehead-azalea Compiler (MAC)
Design and Implementation of the Morehead-azalea Compiler (MAC)Design and Implementation of the Morehead-azalea Compiler (MAC)
Design and Implementation of the Morehead-azalea Compiler (MAC)
CSEIJJournal
 
Call for Papers - 6th International Conference on Big Data, Machine Learning ...
Call for Papers - 6th International Conference on Big Data, Machine Learning ...Call for Papers - 6th International Conference on Big Data, Machine Learning ...
Call for Papers - 6th International Conference on Big Data, Machine Learning ...
CSEIJJournal
 
Smart Agriculture Irrigation System using IoT
Smart Agriculture Irrigation System using IoTSmart Agriculture Irrigation System using IoT
Smart Agriculture Irrigation System using IoT
CSEIJJournal
 
Theoretical and Conceptual Fundamentals of System Computing – Quantum Oscilla...
Theoretical and Conceptual Fundamentals of System Computing – Quantum Oscilla...Theoretical and Conceptual Fundamentals of System Computing – Quantum Oscilla...
Theoretical and Conceptual Fundamentals of System Computing – Quantum Oscilla...
CSEIJJournal
 
Contrastive Learning in Image Style Transfer: A Thorough Examination using CA...
Contrastive Learning in Image Style Transfer: A Thorough Examination using CA...Contrastive Learning in Image Style Transfer: A Thorough Examination using CA...
Contrastive Learning in Image Style Transfer: A Thorough Examination using CA...
CSEIJJournal
 
CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...
CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...
CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...
CSEIJJournal
 
Plant Leaf Diseases Detection using Deep Learning and Novel CNN
Plant Leaf Diseases Detection using Deep Learning and Novel CNNPlant Leaf Diseases Detection using Deep Learning and Novel CNN
Plant Leaf Diseases Detection using Deep Learning and Novel CNN
CSEIJJournal
 
Fire and Smoke Detection for Wildfire using YOLOV5 Algorithm
Fire and Smoke Detection for Wildfire using YOLOV5 AlgorithmFire and Smoke Detection for Wildfire using YOLOV5 Algorithm
Fire and Smoke Detection for Wildfire using YOLOV5 Algorithm
CSEIJJournal
 
call for Papers - 6th International Conference on Natural Language Computing ...
call for Papers - 6th International Conference on Natural Language Computing ...call for Papers - 6th International Conference on Natural Language Computing ...
call for Papers - 6th International Conference on Natural Language Computing ...
CSEIJJournal
 
CFP : 5th International Conference on Advances in Computing & Information Tec...
CFP : 5th International Conference on Advances in Computing & Information Tec...CFP : 5th International Conference on Advances in Computing & Information Tec...
CFP : 5th International Conference on Advances in Computing & Information Tec...
CSEIJJournal
 
CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...
CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...
CFP : 4th International Conference on NLP and Machine Learning Trends (NLMLT ...
CSEIJJournal
 
Comprehensive Privacy Prеsеrvation for Imagеs and Vidеos using Machinе Learni...
Comprehensive Privacy Prеsеrvation for Imagеs and Vidеos using Machinе Learni...Comprehensive Privacy Prеsеrvation for Imagеs and Vidеos using Machinе Learni...
Comprehensive Privacy Prеsеrvation for Imagеs and Vidеos using Machinе Learni...
CSEIJJournal
 
A SURVEY ON A MODEL FOR PESTICIDE RECOMMENDATION USING MACHINE LEARNING
A SURVEY ON A MODEL FOR PESTICIDE RECOMMENDATION USING MACHINE LEARNINGA SURVEY ON A MODEL FOR PESTICIDE RECOMMENDATION USING MACHINE LEARNING
A SURVEY ON A MODEL FOR PESTICIDE RECOMMENDATION USING MACHINE LEARNING
CSEIJJournal
 
Call for Papers - 13th International Conference on Information Technology in ...
Call for Papers - 13th International Conference on Information Technology in ...Call for Papers - 13th International Conference on Information Technology in ...
Call for Papers - 13th International Conference on Information Technology in ...
CSEIJJournal
 
Detection of Dyslexia and Dyscalculia in Children
Detection of Dyslexia and Dyscalculia in ChildrenDetection of Dyslexia and Dyscalculia in Children
Detection of Dyslexia and Dyscalculia in Children
CSEIJJournal
 
Call for Papers - 5th International Conference on Advances in Computing & Inf...
Call for Papers - 5th International Conference on Advances in Computing & Inf...Call for Papers - 5th International Conference on Advances in Computing & Inf...
Call for Papers - 5th International Conference on Advances in Computing & Inf...
CSEIJJournal
 
Call for Papers - 6th International Conference on Machine Learning & Trends (...
Call for Papers - 6th International Conference on Machine Learning & Trends (...Call for Papers - 6th International Conference on Machine Learning & Trends (...
Call for Papers - 6th International Conference on Machine Learning & Trends (...
CSEIJJournal
 
Call for Papers - 6th International Conference on Big Data, Machine Learning ...
Call for Papers - 6th International Conference on Big Data, Machine Learning ...Call for Papers - 6th International Conference on Big Data, Machine Learning ...
Call for Papers - 6th International Conference on Big Data, Machine Learning ...
CSEIJJournal
 
Machine Learning-based Classification of Indian Caste Certificates using GLCM...
Machine Learning-based Classification of Indian Caste Certificates using GLCM...Machine Learning-based Classification of Indian Caste Certificates using GLCM...
Machine Learning-based Classification of Indian Caste Certificates using GLCM...
CSEIJJournal
 
Devops for Optimizing Database Management: Practice Implementation, Challenge...
Devops for Optimizing Database Management: Practice Implementation, Challenge...Devops for Optimizing Database Management: Practice Implementation, Challenge...
Devops for Optimizing Database Management: Practice Implementation, Challenge...
CSEIJJournal
 
Design and Implementation of the Morehead-azalea Compiler (MAC)
Design and Implementation of the Morehead-azalea Compiler (MAC)Design and Implementation of the Morehead-azalea Compiler (MAC)
Design and Implementation of the Morehead-azalea Compiler (MAC)
CSEIJJournal
 
Call for Papers - 6th International Conference on Big Data, Machine Learning ...
Call for Papers - 6th International Conference on Big Data, Machine Learning ...Call for Papers - 6th International Conference on Big Data, Machine Learning ...
Call for Papers - 6th International Conference on Big Data, Machine Learning ...
CSEIJJournal
 
Ad

Recently uploaded (20)

Lecture - 7 Canals of the topic of the civil engineering
Lecture - 7  Canals of the topic of the civil engineeringLecture - 7  Canals of the topic of the civil engineering
Lecture - 7 Canals of the topic of the civil engineering
MJawadkhan1
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Working with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to ImplementationWorking with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to Implementation
Alabama Transportation Assistance Program
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
AI Publications
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Lecture - 7 Canals of the topic of the civil engineering
Lecture - 7  Canals of the topic of the civil engineeringLecture - 7  Canals of the topic of the civil engineering
Lecture - 7 Canals of the topic of the civil engineering
MJawadkhan1
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
AI Publications
 
Agents chapter of Artificial intelligence
Agents chapter of Artificial intelligenceAgents chapter of Artificial intelligence
Agents chapter of Artificial intelligence
DebdeepMukherjee9
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Ad

SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA

  • 1. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 DOI:10.5121/cseij.2022.12605 35 SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA Richa Verma and Ravindara Bhatt Department of Computer Engineering, Jaypee University of Information Technology, Solan, India ABSTRACT Wireless sensor networks are continually developing in the big data world and are widely employed in many aspects of life. In the monitoring region, the WSN gathers, analyses, and sends information about the detected item. In recent years, WSN has also made important strides in the management of critical data protection, traffic monitoring, and climate - change detection. The rich big data contributors known as wireless sensor networks provide a significant amount of data from numerous sensor nodes in large-scale networks (WSNs), which are among the numerous potential datasets. However, unlike traditional wireless networks, suffer from significant constraints in communication and data dependability due to the cluster’s constraints. This paper gives a detailed assessment of cutting-edge research on using WSN into large data systems Potential network and effective deployment and scientific problems are presented and discussed in the context of the study topics and aim. Finally, unresolved issues are addressed in order to discuss interesting future research possibilities. KEYWORDS Big data, Wireless Sensor Networks, Big Data Storage, Protocol Layering, Sensitive Data, Challenges of Big Data in WSN. 1. INTRODUCTION The fundamental objectives of sensor-driven networks are to discover and record events, aggregate and report the acquired data, and oversee tasks. The main WSN participants are known as wireless sensor nodes. These wireless nodes are made up of the mote and sensor devices. The sensor detects some event or physical phenomenon and informs the mote about it. The following components make up Mote: a wireless communication interface, a digitizer, a CPU, some sort of storage device, and a power supply. Power storage and power harvesting are two feasible categories into which the nodes' power supply might be segmented [1]. WSN are frequently installed in isolated locations where post-installation maintenance by humans is not feasible. As a result, efforts are being undertaken to increase their effectiveness and robustness. Deployment of WSN is hampered by a number of factors, including power consumption and vast deployment distances. These obstacles no longer stand in the way of widespread remote deployment due to automation trends and newly emerging applications. Big data systems benefit from efficient data aggregation and in-network processing. In order to enhance system performance and address WSN's limitations, it is crucial to analyse research articles that merge WSN with big data systems. As an example of a basic system design, consider about a massive data system that is WSN-based. The data is sent to a temporary store by the sink node once it has been collected from the sensor nodes for subsequent data aggregation. Following this, a big data framework employing the primary store may operate with the combined data. Applications and big data platforms manage the converted data [2].
  • 2. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 36 Fig. 1 Large-Scale Network System [2]. WSN routing is much more complex than in typical ad hoc networks due to its unique qualities. For WSN, a variety of routing methods that differ from the standard TCP/IP addressing scheme have been suggested. These tactics concentrated on network characteristics as well as structural and functional requirements. Being aware of the factors that are crucial to the sensor applications is necessary for developing a better WSN strategy. It is possible to put sensor nodes in remote or dangerous areas. This demands that nodes be able to communicate with one another even in the absence of a base station or predetermined cluster of motes. Additionally, it might not be able to replenish the sensor nodes' batteries [1]. This article provides a thorough analysis of recent research on integrating WSN into large-scale data systems. In light of the study's objectives and themes, potential network, deployment, and scientific issues are given and explored. In order to explore exciting future research opportunities, outstanding topics are then discussed. 2. RELATED WORK Hadoop, MapReduce, and Big Table are three of the most popular technologies and methodologies for Big Data. Because they rapidly and affordably process massive volumes of data, these advances have transformed data management along with quickness. Extremely huge amounts of data with various structures may be processed with Hadoop (or no structure at all). Among the Hadoop elements that make up their linkages are HBase, H Catalog, Pig, Hive, Oozie, Zookeeper, and Kafka nevertheless, Hadoop Distributed File System (HDFS) and MapReduce for Big Data are the most extensively utilized elements and well-known ideas [4]. The connections between the various parts of the Hadoop ecosystem are shown in Figure 2.
  • 3. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 37 Fig. 2 Hadoop ecosystem [4]. The components of a wireless sensor network (WSN) are geographically dispersed independent devices that communicate digitally, acquire data, and identify particular incidents of relevance in the physical and ecological circumstances. A network of randomly placed sensor nodes is created and is uniquely recognized by serial numbers that are directly tied to node placements. When querying events in the WSN, the network is directly alerted of the events of interest without notifying the nodes beforehand. After gathering information about the requested event, the network sends a report to the user. WSNs offer more opportunities and ease for the capture, transmission, and analysis of massive data. For instance, wireless sensors are made smaller and less expensive, sensor nodes are adaptable in their networking, WSNs place data at the center of the network, the most valuable data is gathered from various vantage points and stages, and transmitted collected data is used to process large amounts of data in order to improve the accuracy of the information. The data gathered and processed do in fact expand exponentially as the volume and deployment space of WSNs networks increase, needing planning node energy usage. High-efficiency networking is crucial in the application of WSNs in order to increase the energy utilization rate of a single node to a higher extent, lower the energy usage of the entire WSN, and lengthen the life cycle of WSNs [3]. A wireless big data system that manages enormous amounts of data across wireless networks. Several writers concentrated on network connectivity, such as information propagation, information network management, and innovative applications under protocol stack, as compared to detailing the full system. [2].
  • 4. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 38 Fig. 3 Protocol layering of wireless big data systems [2]. 2.1. Finding and Limitations Table 1. Finding and Limitations Sr. No. Paper Finding Limitations 1. 1 The advantages, benefits, and drawbacks of various solutions put forth in the WSN and IoT arena are then carefully considered. Additionally, the research compares different solutions based on performance metrics like diversity, integration, range of motion, renewability, versatility, energy efficiency, expandability, latency, confidentiality, and big data. Dealing with data structure collected on a massive scale makes it difficult to satisfy the stated need. As data sources continue to increase, new data processing strategies must always be developed to accommodate Bigdata. 2. 2 Outlined the technical research problems for WSN-based big data systems as WSN is considered one of Resultant solution is not being proposed for open issues in the research area.
  • 5. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 39 the key data sources. 3. 11. In research, analyses of more than 130 papers from 2014 to 2021 have been presented. The paper discusses a number of areas of Industry 4.0, including the designing stage, security requirements, deployment stage, network classification, problems, and obstacles. The region's current issues and difficulties are not being adequately addressed. When it comes to the application and deployment of Internet and Wireless sensor in Sector 4.0, the safe and reliable communication of the data to a distant location is not being prioritized. 4. 4. Implemented data life cycle that makes use of the Big Data technologies and terminologies in order to increase the effectiveness of data management. Presents a data life cycle that makes use of big data technology and terminology, however future study directions in this area are not chosen based on methodology, findings, and a number of unresolved problems. 5. 5. The deployment of a large number of nodes is supposed to highlight the demanding specifications of WSN. Ground level effects on WSN signals, which affect data transmission between nodes, have been taken into consideration during experimental evaluation to identify the various WSN properties. For real-time Big Data applications including border surveillance, environmental monitoring, and industrial processes, the BDEG big data gathering method has been developed. Research is not focused on shortening the total data transmission distance, and additional factors like rate of bit errors and ratio of signal to noise are not taken into account in order to further develop the BDEG algorithm. 6. 6. By reducing energy consumption, latency, PDR, throughput, false ratio, PRR, and network overhead, the performance metrics of WSN are evaluated. The demand for routing algorithms; the various types of routing algorithms used to improve performance; The most crucial element in a wireless sensor network (WSN) is QoS, while other factors should be focused on enhancing security issues. Networks are distant and exposed to a variety of security risks that might have a severe impact on performance. When the network is used in operation applications, such strategic warfare, a solution to the issue is not being addressed. 7. 7. It is being evaluated the network properties as well as the clustering objectives of 37 cluster-based methodologies while reviewing the numerous network characteristics supported by clustering (heterogeneity, mobility, and so on). Unsurprisingly, the data show that the main goal of using such strategies is to decrease energy use. There are no further attempts being made to address the issues of mobility and heterogeneity through clustering. 8. 8. Explains the needs for managing sensitive data’s security in the WSN using big data technology. In response to these issues, it applies the application of WSN in the security management of sensitive data and Data security is the most often utilized area, accounting for 38.41% of all uses, followed by network security (33.74%), and system security (27.5%). The application needs more enhancements overall
  • 6. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 40 offers some assistance in problem solving. It analyses the issues in the security management of sensitive data from many angles. because it is not very thorough. 9. 9. Explains how WSN and Big Data are used in a collaborative firefighting system in detail. The experiment was carried out in a barren space. There was equipment for WSN, Big Data, and other subsystems. The experiment employed just one FDU. Using a microcontroller that was preprogramed, it operated independently. The HARMS (Human Agent Robot Machine Sensor) protocol was crucial to all of these communications. It would be preferable to utilize a different microcontroller that can support the JAVA programming language in place of the one used in WSN. WSN was unable to fully utilize the HARMS model's benefits. 10. 10. Networked models are used to show how information outcome across robotic wireless sensor networks may maximize output while also maximizing the amount of data available. Big data collection, sensing, processing, storing, analysis, and integration are still challenges for intelligent industrial systems. More visual monitoring systems need to be studied and used. 3. UNRESOLVED BIG DATA CHALLENGES IN WSN (1) Individuality and Cooperation: - Because IoT devices differ from one another, compatibility is a problem. In the WSN or IoT environment, the different distributed devices producing various types of data must connect [1]. As IoT applications and connected devices become more diverse, ongoing work is needed in this area. (2) Mobility: - Facilitating communication among fast moving objects, such as cars, and exploiting mobility to improve communication effectiveness are difficult given the impending advancement of IoT systems. It is obvious to address the issue of mobility for things with some improved methods given the ubiquitous or widespread distribution of things and the natural demand to facilitate their movement in IoT scenarios. Unlike a traditional WSN, the mobility patterns in the networks may not always guarantee connectivity between the source and the destination. As a result, feasible clustering and mobility prediction algorithms should be created in accordance with the additional restrictions of each network. In the network context, clustering algorithms also need to be updated to take connectivity and mobility into account [1,2]. (3) Fog Computing and Real-Time Communications: - Big data systems strongly favor real- time communication and processing because to the delay-sensitive nature of sensed data in WSN. Supporting real-time communications is challenging with WSNs due to significant node restrictions. Moreover, real-time tasks cannot be carried out by a big data system built on a cloud computing architecture. Fog computing, which aims to improve low latency, mobility, network bandwidth, security, and privacy, was recently proposed to extend cloud services to the edge of the network by bringing computation, communication, and storage closer to the edge devices and end users in order to support real-time tasks. As a result, real-time processing can be supported by a big data system based on fog computing. However, there isn't yet a standout WSN solution for real-time communication [2].
  • 7. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 41 (4) Delay: - Due to the enormous number of devices communicating with sensors and producing various forms of data, numerous applications have experienced delays. Particularly in WSN, IoT objects have typically been delay-sensitive objects. Numerous factors, including topology, radio interference, mobility, etc., could be the cause of the problem. With the IoT's ever-growing data sources, it is necessary to move in this path [ 1]. (5) Model-based Simulation: - In research work, performance assessment and comparison are crucial. Although numerous platforms have been proposed for big data and WSN, there isn't a testing ground or simulator that integrates both of these technologies. It seems feasible to integrate a WSN simulation into a big data simulator or platform for broad tests as a temporary fix. On the other hand, creating an interface between two systems to share data in a way that eliminates dependency is necessary for a long-term solution. A modular and extensible assessment platform that can accommodate various WSN types is also needed. Additionally, as evaluation is mostly dependent on modelling, more accurate traffic and risk analysis is important for improving the reliability of the experiment [2]. (6) Security: - Security for conventional WSNs is constrained to the relevant area. However, because IoT systems enable communication between highly scattered objects over the internet, people's perceptions of security are altered and improved. Despite the fact that many researchers have included security and privacy in their suggested solutions, such as blockchain technology, the fight against various forms of intimidation put forth by attackers is constantly fascinating and thrilling. To link a blockchain, cryptography processing and public key decryption are needed. Additionally, in order to transmit data when constructing a new blockchain, the link's earlier and later sequences must be confirmed. Therefore, various problems must be resolved in order to accomplish immediate data updating and storage. Therefore, it is clear that improving security and privacy is a problem that needs to be addressed [1,12]. 4. CONCLUSIONS In the circumstances where WSN was considered one of the key data sources, we examined technological research concerns for WSN-based large data systems. Before describing the potential applications for large data systems in WSN, we first discussed the key contributions of each work. We concentrate particularly on wireless big data systems' protocol layering and large data in WSN. The remaining unanswered questions in this field of study are then discussed. REFERENCES [1] S. Sharma, & V. K. Verma, (2022) “An integrated exploration on internet of things and wireless sensor networks,” Wireless Personal Communications, 124(3), 2735-2770. [2] B.S. Kim, K. I. Kim, B Shah, F. Chow, and K. H. Kim, (2019) “Wireless sensor networks for big data systems,” Sensors, 19(7), 1565. [3] Y Chen, X Zhu, K. Fang, X. Chen, T. Guo, C. Li and Z. Zou, (2022) “An improved method for sink node deployment in wireless sensor network to big data,” Neural Computing and Applications, 34(12), 9499-9510. [4] N. Khan, I. Hashem, I. A. T. Yaqoob, Z. Inayat, W. K Mahmoud Ali, M. Alam and A. Gani, (2014) “Big data: survey, technologies, opportunities, and challenges,” The scientific world journal. [5] S. Rani, S. H. Ahmed, R. Talwar and J. Malhotra, (2017) “Can sensors collect big data? An energy- efficient big data gathering algorithm for a WSN,”IEEE Transactions on Industrial Informatics, 13(4), 1961-1968.
  • 8. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 42 [6] A. Raja Basha, (2022) “A review on wireless sensor networks: routing,” Wireless Personal Communications, 1-41. [7] S. El Khediri, (2022)“Wireless sensor networks: a survey, categorization, main issues, and future orientations for clustering protocols,” Computing, 1-63. [8] H. Lin, B. Weng, J. Pan, C. Lin and Q. Yang, (2021) ”Application of Wireless Sensor Networks in the Sensitive Data Security of Intelligent Data Center under the Big Data Environment,” In Journal of Physics: Conference Series (Vol. 1982, No. 1, p. 012017). IOP Publishing. [9] B. Khaday, E. T. Matson, J. Springer, Y. K. Kwon, H. Kim, S. Kim and H. S. Woo, (2015) “Wireless sensor network and big data in cooperative fire security system using harms,” In 2015 6th International Conference on Automation, Robotics and Applications (ICARA) (pp. 405-410). IEEE. [10] G. Lazaroiu, M. Andronie, M. Iatagan, M. Geamanu, R. Ștefanescu, and I. Dijmarescu, (2022) “Deep Learning-Assisted Smart Process Planning, Robotic Wireless Sensor Networks, and Geospatial Big Data Management Algorithms in the Internet of Manufacturing Things,” ISPRS International Journal of Geo-Information, 11(5), 277. [11] M. Majid, S. Habib, A. R. Javed, M. Rizwan, G. Srivastava, T. R. Gadekallu and J. C. W. Lin, (2022) “Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review,”Sensors, 22(6), 2087. [12] S. J. Hsiao and W. T. Sung, (2021) “Employing blockchain technology to strengthen security of wireless sensor networks,” IEEE Access, 9, 72326-72341.
  翻译: