Web Hosting Articles

  Home arrow Web Hosting Articles arrow Page 3 - Wireless Sensor Networks pt 1: Introdu...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

Wireless Sensor Networks pt 1: Introduction
By: Eliana Stavrou
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 4 stars4 stars4 stars4 stars4 stars / 40

    Table of Contents:
  • Wireless Sensor Networks pt 1: Introduction
  • Sensor Node Features
  • Sensor Research Challenges

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    Wireless Sensor Networks pt 1: Introduction - Sensor Research Challenges

    (Page 3 of 3 )

    Due to sensors’ limited capabilities, there are a lot of design issues that must be addressed to achieve an effective and efficient operation of wireless sensor networks.

    • Energy saving algorithms. Since sensor nodes use batteries for power that are difficult to replace when consumed (remember that often sensor nodes are deployed in remote and hostile environments), it is critical to design algorithms and protocols in such a way to utilize minimal energy. To do so, implementers must reduce communication between sensor nodes, simplify computations and apply lightweight security solutions.
    • Location discovery. Many applications can tracking an object require knowing the exact or approximate physical location of a sensor node in order to link sensed data with the object under investigation. Furthermore, many geographical routing protocols need the location of sensor nodes to forward data among the network. Location discovery protocols must be designed in such a way that minimum information is needed to be exchanged among nodes to discover their location. Since sensor nodes are energy constrained, solutions like GPS are not recommended. After all, cost is another factor that influences design; manufacturers try to keep the cost at minimum levels since most sensor nodes are usually needed for many applications. If the cost is high, the adoption and spread of sensor technology will be prohibited.
    • Security. Is it possible to introduce a new technology without addressing security? Of course not! However, as all other technologies, security is not the top priority when designing something new. This approach is acknowledged by almost everyone, and it is erroneous but they keep doing it anyway. Security solutions are constrained when applying them to sensor networks. For example, cryptography requires complex processing to provide encryption to the transmitted data. Secure routing, secure discovery and verification of location, key establishment and trust setup, attacks against sensor nodes, secure group management and secure data aggregation are some of the many issues that need to be addressed in a security context. Future articles will analyze some of these issues to give you a good understanding of security related issues in wireless sensor networks.     


    This article was to familiarize you with fundamental issues of sensor networks so that I can later discuss security issues. In the next article, I plan to analyze in limitations of sensor networks and their security requirements. Sensor area is growing very fast, attracting more and more people to its use. Of course, to my knowledge, research on sensor security is very recent and a lot of work needs to be done in many areas that are not addressed so far. The effort made so far is recognizable by the community since this is a new area with a lot of open issues.

    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.


    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap