Dive into our curated list of top research papers on Wireless Sensor Networks. Whether you're a student, researcher, or industry professional, this resource offers valuable insights and updates on the latest trends, theories, and practical applications in WSN. Stay ahead in your field with these must-read papers.
Looking for research-backed answers?Try AI Search
Yasaroglu Pinar, A. Zuhair, Alotaibi Hamad + 3 more
2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT)
The main purpose of this paper is to detail the issues of network security threats, network architecture, data collection, deployment and network coverage, and elaborate on possible solutions.
This work explores the WSN architecture according to the OSI model with some protocols in order to achieve good background on the wireless sensor network.
N. Onuekwusi, Chinedu Okpara
journal unavailable
A review of this intelligent technology is undertaken and concludes with a clear conviction that a sound knowledge of the basics of this technology is a sine qua non to research and development of the technology.
The types of potential threats to network are continuously evolving and must be at least theoretical known in order to fight them back, as the rise of wireless networks implies that the security solution become seamlessly integrated, more flexible.
This review is focusing on the the quality and performance of theWSNS workshop, which represents a good source to recapitulate recent research topics related to security in wireless ad hoc and sensor networks.
H. Rashvand, Weidong Yi, Li Cui
journal unavailable
9 papers from the IET Conference on Wireless Sensor Networks, combined with many from the open call for papers which entered the long queue of the journal's editorial process, have resulted in 9 papers presented in this prestigious Special Issue.
Aiman J. Albarakati
International Journal of Computer Applications
The research issues/defies in Wireless sensor networks is scrutinized, which is an innovative computing standard that appeared or evolved from the blend of the Ad-hoc and “Supervisory Control and Data Acquisition “ systems (SCADA) network technologies.
J. Singh
International Journal in IT & Engineering
The focus should not only be on how to secure sensor networks, but also on how this can be done through generic and independent solutions.
With the WSN wireless sensor network experimental box, parameters and outputs of a plurality of sensors can be simulated and networking methods of the sensor network can be expanded and better learning and operation can be promoted for students.
M. Khan, G. Shah, M. Sher
World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering
This paper will help to identify different obstacles and requirements for security of wireless sensor networks as well as highlight weaknesses of existing techniques.
X. Ang
Microcomputer Information
The paper mainly analyses specific attack of security threats specific to sensor networks, advises suitable solve mechanisms, and assures security of network.
D. Sridharraja, B.Kalaiselvi, T.Vijayan
International Journal of Engineering and Advanced Technology
Some of the recent and future trends of Wireless sensor network are discussed.
Suneela Kallakunta, Alluri Sreenivas
Oriental journal of computer science and technology
AWireless Sensor Network consists of a set of connected tiny sensor nodes, which communicate with each other the authors can also interchange information and data.
Guo Hui
Microcomputer applications
A taxonomy and survey of both the security threats and related researches about WSN is presented and key distribution schemes are classified and emphatically random key distribution algorithms are analyzed.
Proyecto realizado en Empresa TriaGnoSys Wessling (Alemania) para la realizacion de un prototipo de Aircraft Wireless Sensor Network.
Noman Shabbir, S. R. Hassan
journal unavailable
A performance analysis of different routing protocols is made using a WLAN and a ZigBee based Wireless Sensor Network for quick data transfer including minimum possible interruption.
F. Dressler, Y. Guan, Zhen Jiang
2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems
This review is focusing on the the quality and performance of theWSNS workshop, which represents a good source to recapitulate recent research topics related to security in wireless ad hoc and sensor networks.
Xu Hong-bing
Application Research of Computers
According to realizing the development of security in WSN, the main problems have been found and the solving schemes are exploring and schemes are made for the further researches.
Safiuddin Safiuddin, Fauzan Prasetyo Eka Putra
INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics
Abstrak: Wireless Sensor Network adalah teknologi yang berkembang pesat yang menawarkan potensi luar biasa untuk merevolusi banyak industri dan bidang. Wireless Sensor Network menjadi semakin populer karena keserbagunaannya, biaya yang rendah serta kemudahan dalam penerapannya. Terlepas dari keunggulan tersebut, masih ada beberapa tantangan yang perlu diatasi untuk mencapai kinerja tinggi dalam WSN yang terdistribusi secara total. Tujuan dari penelitian ini adalah menyajikan strategi ataupun solusi kepada user dalam kaitannya mencapai atau meningkatkan kinerja WSN yang berdampak pada keberhasi...
M. E. Martínez-Rosas
journal unavailable
In the 1950’s, computers were so bulky that a person could literally walk inside of them, but the big difference is that the modern ones are actually clusters composed by millions of processors interconnected to work collaboratively, achieving a processing power unimaginable for most people.
The proposed Square code has improved area-overhead more than 50% compared with SEC-DED(Single Error Correcting – Double Error Detecting) conventional codes and has a small size packet.
D. Benhaddou, Xiaojing Yuan, M. Balakrishnan
journal unavailable
Challenges and opportunities of wireless sensor network in space applications, and the investigation of Quality of Service (QoS) capabilities to meet the stringent requirements of space applications are presented.
The method has the beneficial effects that the relation between the distance from the beacon node to the unknown node and the average distance fromThe beacon nodes to the area in which theunknown node is located is established by fully utilizing the hop information of the neighbor nodes of the nodes, which greatly improves the locating accuracy without increasing a hardware device.
A. Carranza, Heesang Kim, Xiao Lin Chen
journal unavailable
Security mechanisms such as Cryptography, Firewalls, Secure Routing Protocol and Secure Data Aggregation of WSN are explored and reported using the Raspberry Pi 3 model B, and tools embedded into Kali Linux are reported.
Urmila Sharma
journal unavailable
A fuzzy rule is built with the enter parameters such as node degree, hyperlink pleasant and residual energy and reliance upon the outcome of the fuzzy good judgment, the nodes are classified into right, normal and terrible.
A. Basnet, S. Shakya, Mandira Thapa
2017 International Conference on Computing, Communication and Automation (ICCCA)
Al Altera FPGA for communication with FIR band pass filter has been analyzed and implemented in hardware and maximum allowable total power that interferes below than limit is adaptively calculated.
Mohsen Nasri, A. Helali, H. Sghaier + 1 more
5th International Conference on Design & Technology of Integrated Systems in Nanoscale Era
This paper describes an approach of image transmission in WSNs, taking advantage of JPEG2000 still image compression standard and using MATLAB and C from Jasper, and shows that the proposed scheme optimizes network lifetime and reduces significantly the amount of required memory.
Bilal Khan, M. Sharif, M. Raza + 3 more
journal unavailable
A new surveillance system for an organization using wireless sensor networks and RFID authenticates the authorized person of the organization using RFID (Radio Frequency Identifier) tags embedded cards and also detects the unknown person using Motion sensors.
Nie Mysuru India PG Student
journal unavailable
The different congestion control protocols used for congestion occurance in the wireless sensor network are told.
Tang Zheng
Journal of Chongqing University
This paper puts forward the implementation of each module on the wireless gas meter data-transmitting system for ZigBee by combining senor technology, ZigBee, IEEE 1451.2 and route protocol.
Ashok Kishtwal, J. Singh, Rohika Bhatt
International journal of engineering research and technology
This review paper works on general description about the sensor nodes and networks with its routing and security issues.
Syed Nakhshab Hussain
Transylvanian Review
The features of ideal mac protocol for wireless sensor networks have been provided and some energy efficient protocols which are very effective regarding energy conservation are represented.
P. R. Biradar, Chitrashree Kurtkoti, Yashashree Bendale + 1 more
International journal of engineering research and technology
First deploy the sensors in network and then compute the traffic load and energy consumption in different regions of the network andthen propose a energy consumption model for accurate energy hole avoidance, which ensures a guaranteed FDT and ADT of thenetwork with minimum number of sensors.
Kofi Sarpong Adu-Manu, Nadir H. Adam, C. Tapparello + 2 more
ACM Transactions on Sensor Networks (TOSN)
The state-of-the-art in energy-harvesting WSNs for environmental monitoring applications, including Animal Tracking, Air Quality Monitoring, Water quality Monitoring, and Disaster Monitoring, are reviewed to improve the ecosystem and human life.
Amala Chirayil, Rajendra Maharjan, Ching-seh Wu
2019 20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
The different types of anomalies that exist in WSNs are examined, specifically focusing on data anomalies, and two specific anomaly detection methods are explored, statistical-based and cluster-based, by examining two different implementations.
N. Wang, Z. Li
journal unavailable
This chapter begins by introducing wireless sensor network (WSN) technology and its current development and extensively reviews the applications of WSNs in the areas of environment monitoring, precision agriculture, precision livestock farming, greenhouse management, and food traceability systems.
P. R. Gundalwar, V. Chavan
International journal of engineering research and technology
This paper highlights a few number of routing issues in WSNs related with data, network, hardware/operating system, fault-tolerance, security, Quality-of-Service etc.
N. Ambika, G. Raju
2012 World Congress on Information and Communication Technologies
This paper ensures that the network is secure to a larger extent by eliminating the compromised nodes by ensuring the intensity of the transmission is scrutinized to discover the compromised node in the network.
S. Panda, S. Priyadarshini
International Journal of Smart Sensor and Adhoc Network.
A technique has been proposed to find out the problem while simultaneously offering a safe trust based localization system, which focuses on the algorithm for assessing trust and the creation of blockchains.
Zheng Yihui
Computer Programming Skills & Maintenance
This paper discuss the concept and characters of Wireless Sensor Networks firstly, and deeply analyze major threatens about it, then analyze some kinds of code technology about it in order to improve it’s safety.
Suganti A P Senivasan
journal unavailable
In this project, solar harvesting using low-powered Maximum Power Point Tracker (MPPT) is designed to ensure better efficiency from solar panel to extend the battery life of Wireless Sensor Networks.
Zhang Jin
Computer Knowledge and Technology
This paper analyses and describes the common compose of hardware and software for WSN, to establish a integraded idea of micro WSN.
M. A. Siddiqi, Abdul Aziz Mugheri, Mohammad Khoso
journal unavailable
After performing the analysis, it is quite clear that most of the algorithm being purposed by researchers for WSN need to be designed keeping in view resources constraints of WSN.
Ariz Muhammad Brohi, Y. A. Malkani, M. S. Chandio
2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)
The focus of this paper is to provide a detailed review of the state-of-the-art data provenance schemes for wireless sensor networks (WSNs) and could serve as a beginning guide for the researchers who just started to explore the domain of dataprovenance for WSNs.
Devi Kala Rathinam D, S. D, Shilpa A + 2 more
2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)
In this paper wireless sensor nodes are used to monitor the crops and the human effort is reduced by automatic process and it encourage the farmer to develop the farm land.
Yusuf Ali Okhamila
journal unavailable
It is shown that increasing the transmit power of nodes from -6dBm to 0dBm in WMSNs leads to improved packets delivery ratio and throughput improvement and the optimal power was -2dBm for the studied topology.
Fang Pei, Jie Zhang
Applied Mechanics and Materials
The bottleneck network problem which is caused by the wireless sensor networks due to the presence of physical obstructions or uneven energy consumption in a real environment is studied, and a solution to optimal routing protocols based on load balancing is proposed.
D. Singh, Dr. Vikash Kumar Garg, Er. Abhinash Singla + 1 more
Middle East Research Journal of Engineering and Technology
Various data aggregation techniques in wireless sensor network and a novel Data Routing for In-network aggregation called DRINA are presented.
V. Sharanya, S. Sri, Divya Takkellapati + 1 more
journal unavailable
The paper highlights the strengths and performance issues of each routing technique and concludes the paper by bringing to your notice the possible future research areas.
Erhan Sesli, Gokce Hacioglu
journal unavailable
Contiki Operating System is proposed as a convenient solution for developers and engineers to simulate WSN to ensure developed applications work successfully and to analyze effects of various configurations of wireless nodes.