preview

Wireless Sensor Networks ( Wsn )

Better Essays

1. INTRODUCTION
Wireless Sensor Networks (WSN) consists of large number of sensor nodes distributed across a geographical area in highly dense manner. These nodes are of low cost and use less energy to perform various functions. These sensors have the ability to communicate with each other and route the data to next node or back to the Base Station (BS). Sensor nodes in a sensor network communicate with other nodes and collect the information.

1.1 ARCHITECTURE OF WSN
Sensor node is made up of four basic components: a sensing unit, a processing unit, a transmission unit and a power unit. Sensing unit collects information using sensor and analog to digital converters (ADC). ADC converts the analog signals produced by the sensor to the …show more content…

iii) Dynamic network topologies
Sensor nodes are deployed without any prior planning so the topology of network may change due to many reasons like change in node position, failure of node due to physical damage, and limited available power. iv) Adaptability
Movements of nodes cause the communication failure and the re-construction of route should be fast and adaptable.
v) Data aggregation
Data aggregation reduces the amount of energy during transmission of data between nodes, hence increasing the lifetime of node. vi) Quality of Service
WSNs have been used for various different applications. Some applications such as military fields are very critical and needs the reliable service timely. vii) Security
A secure communication between nodes is very important. There should be data confidentiality and integrity.

2.2 LOW ENERGY AWARE CLUSTER HIERARCHY (LEACH)
Low Energy Aware Cluster Hierarchy (LEACH) is one of the hierarchical routing protocols that uses very limited amount of energy and increases the lifetime of the network. Transfer of Data through Wireless Sensor Network is a challenging task today particularly with the existence of Denial of Service (DoS) attacks, Flooding attack, Black hole attach and Gray hole attack. All attacks mentioned above are implemented and their impacts on the performance of the LEACH in terms of different metrics including packet

Get Access