Web Hosting Articles

  Home arrow Web Hosting Articles arrow Page 3 - Wireless Sensor Networks, part 2: Limi...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

Wireless Sensor Networks, part 2: Limitations
By: Eliana Stavrou
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 22

    Table of Contents:
  • Wireless Sensor Networks, part 2: Limitations
  • 3. Limited Resources
  • Design challenges

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    Wireless Sensor Networks, part 2: Limitations - Design challenges

    (Page 3 of 3 )

    I already mentioned some challenging areas in the first part of the article (energy saving algorithms, location discovery and security). In this section I’m going to list some more areas that pose a challenge to researchers and developers, who are called to bridge the gap between sensors’ limitations and their efficient functionality.

    • Scalable and flexible architecture. The network should be scalable and flexible to the enlargement of the network’s size. The communication protocols must be designed in such a way that deploying more nodes in the network does not affect routing and clustering. Rather, the protocols must be adapted to the new topology and behave as expected. In other words, the network must preserve its stability. Furthermore, introducing more nodes into the network means that additional communication messages will be exchanged, so that these nodes are integrated into the existing network. This must be done in a way that a minimum number of messages needs to be exchanged among the sensor nodes, and thus battery is not wasted unreasonably.

    • Error-prone wireless medium. Since sensor networks can be deployed in different situations, the requirements of each different application may vary significantly. Researchers must take into consideration that the wireless medium can be greatly affected by noisy environments, and thus the signal attenuates in regard to the noise. Note that an adversary can intentionally interfere and cause enough noise to affect the communication. In an environment such as healthcare, it is vital to ensure that communication is on time to respond to emergencies.

    • Fault tolerance and adaptability. If a sensor node fails due to a technical problem or consumption of its battery, the rest of the network must continue its operation without a problem. Researchers must design adaptable protocols so that new links are established in case of node failure or link congestion. Furthermore, appropriate mechanisms should be designed to update topology information immediately after the environment changes so as to minimize unnecessary power consumption. 


    In this article I covered the major limitations of sensor nodes. The hostile and remote environment at which sensors are often deployed and the limited computational and energy power along the limited storage are the factors that drive the adoption of security solutions. Since the limited resources affect the types of security algorithms and protocols that can be implemented in a WSN, lightweight security solutions should be addressed.

    I also discussed some challenging directions that need special attention. Focus should be placed on designing protocols that are scalable, flexible, fault tolerant and adaptable to dynamic changes. However, the main challenge for researchers is to balance the trade off between resources spent for security and the protection offered. The target is to have a spherical security strategy with solutions that compensate each others' vulnerabilities, and provide an enhanced protection to the network and its information.  

    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.


    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap