Open Access   Article Go Back

A Comprehensive Study of Various Challenges and Constraints in Wireless Sensor Networks (WSNs)

Sucheta Panda1 , Sushree Bibhuprada B. Priyadarshini2

Section:Research Paper, Product Type: Journal Paper
Volume-11 , Issue-01 , Page no. 243-248, Nov-2023

Online published on Nov 30, 2023

Copyright © Sucheta Panda, Sushree Bibhuprada B. Priyadarshini . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sucheta Panda, Sushree Bibhuprada B. Priyadarshini, “A Comprehensive Study of Various Challenges and Constraints in Wireless Sensor Networks (WSNs),” International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.243-248, 2023.

MLA Style Citation: Sucheta Panda, Sushree Bibhuprada B. Priyadarshini "A Comprehensive Study of Various Challenges and Constraints in Wireless Sensor Networks (WSNs)." International Journal of Computer Sciences and Engineering 11.01 (2023): 243-248.

APA Style Citation: Sucheta Panda, Sushree Bibhuprada B. Priyadarshini, (2023). A Comprehensive Study of Various Challenges and Constraints in Wireless Sensor Networks (WSNs). International Journal of Computer Sciences and Engineering, 11(01), 243-248.

BibTex Style Citation:
@article{Panda_2023,
author = {Sucheta Panda, Sushree Bibhuprada B. Priyadarshini},
title = {A Comprehensive Study of Various Challenges and Constraints in Wireless Sensor Networks (WSNs)},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2023},
volume = {11},
Issue = {01},
month = {11},
year = {2023},
issn = {2347-2693},
pages = {243-248},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1440},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1440
TI - A Comprehensive Study of Various Challenges and Constraints in Wireless Sensor Networks (WSNs)
T2 - International Journal of Computer Sciences and Engineering
AU - Sucheta Panda, Sushree Bibhuprada B. Priyadarshini
PY - 2023
DA - 2023/11/30
PB - IJCSE, Indore, INDIA
SP - 243-248
IS - 01
VL - 11
SN - 2347-2693
ER -

           

Abstract

Numerous applications are possible for Wireless Sensor Networks (WSNs). However, there are a number of implementations where the sensor data is useless and may lead to an false analysis of the provided information, especially if the coordinates information is unknown. Because of this, localization is crucial to many WSN operations. The problems and difficulties preventing the position of the sensor nodes in WSNs are thoroughly examined in this research. The fundamental concept behind a sensor network is to disperse tiny sensing devices which is capable of detecting changes in incidents or parameters and interacting with other devices over a defined geographic area for a variety of objectives, such as target tracking, vigilance, and environmental tracking. It is profitable to be utilized in great abundance in the future by integrating sensor technologies with computing power and wireless connectivity. A variety of security risks are also brought on by the use of wireless communication technology. In this essay, issues and difficulties with wireless sensor networks are surveyed.

Key-Words / Index Term

Wireless Sensor Network, Localization, Sensor node, Network, Sensing devices, Environment monitoring

References

[1]. Marcelloni, F., & Vecchio, M. “Exploiting Multi–Objective Evolutionary Algorithms for Designing Energy–Efficient Solutions to Data Compression and Node Localization in Wireless Sensor Networks”. In Evolutionary Based Solutions for Green Computing, Springer, Berlin Heidelberg, pp. 227-255,2013.
[2]. Tiwari P, Saxena VP, Mishra RG, Bhavsar D, “Wireless sensor networks: Introduction, advantages, applications and research challenges”, HCTL Open International Journal of Technology Innovations and Research.,vol.14, pp.1-11,2015.
[3]. Di, Ma, and ErMeng Joo. "A survey of machine learning in wireless sensor networks from networking and application perspectives." In Information, Communications & Signal Processing, 6th International Conference on. IEEE, pp. 1-5, 2007.
[4]. Akyildiz, Ian F., et al. "A survey on sensor networks." IEEE communications magazine, Vol. 40, Issue 8, pp.102-114,2002.
[5]. B. Charan Patel, G. R Sinha and Naveen Goel, “Introduction to sensors”, Advances in Modern Sensors, IOP publishing, pp. 1-21, 2020.
[6]. S. Manish Kumar; Amin, Syed Intekhab; Imam, Syed Akhtar; Sachan, Vibhav Kumar; Choudhary, Amit “A Survey of Wireless Sensor Network and its types”, International Conference on Advances in Computing, Communication Control and Networking (ICACCCN) ,IEEE, Noida, pp. 326–330,2018.
[7]. A. Abdelhakim , B. Bouhorma, M. B. Mohamed, “New Technique of Wireless Sensor Networks Localization based on Energy Consumption”, International Journal of Computer Applications (0975 – 8887), Volume 9, Issue 12, pp.25-28 , 2010. doi:10.5120/1436-1935.
[8]. R. Ahmad, R. Wajirali, T. Abu-Ain,” Machine Learning For Wireless Sensor Networks Security: An Overview Of Challenges And Issues“, Vol 22, Issue 13, pp.1-35 ,2022, https://doi.org/10.3390/s22134730.
[9]. Bouaziz, M., & Rachedi, A. (2016). A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology. Computer Communications, Vol 74, pp. 3–15. doi:10.1016/j.comcom.2014.10.004
[10]. Wood AD,L.Fang,R.Stoleru,”Context-aware wireless sensor networks for assisted living and residential monitoring”, IEEE Network, Vol 22,Issue 4,pp. 26-33,2008.
[11]. Ahmad Abed ,Alhameed Alkhatib, Gurvinder Singh Baicher,”Wireless Sensor Network Architecture”, International Conference on Computer Networks and Communication Systems(CNCS 2012),IPCSIT IACSIT Press, Singapore, pp. 1-6,2011.
[12]. Buratti C, Conti A, Dardari D, Verdone R. “An overview on wireless sensor networks technology and evolution”. Sensors, Vol. 9, Issue 9, pp. 6869-6896, 2009, https://doi.org/10.3390/s90906869.
[13]. L., Liu, Q., Shao, J., & Cheng, Y. ”Distributed Localization in Wireless Sensor Networks Under Denial-of-Service Attacks”. IEEE Control Systems Letters. Vol. 5, Issue 2, pp. 493-498, 2021, doi: 10.1109/lcsys.2020.3003789.
[14]. K. Sharma, M K Ghose. Wireless Sensor Networks: “An Overview on its Security Threats”. IJCA Special Issue on “Mobile Ad-hoc Networks ,pp. 42-45, 2010, doi:10.5120/1008-44.
[15]. Newsome, J., E. Shi, D. Song, and A. Perrig. “The Sybil Attack in Sensor Networks: Analysis and Defenses.” In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, India, pp. 1259-1268,2004.
[16]. Douceur, J. “The Sybil Attack.” In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’02), Cambridge Massachusetts, USA, Springer LNCS, pp. 251-260,2002.
[17]. Michael Healy, Thomas Newe, Elfed Lewis Optical Fibre Sensors Research Centre, “Security for Wireless Sensor Networks: A Review”, SAS 2009 IEEE Sensors Applications Symposium New Orleans, pp. 1-7 , 2009.
[18]. Hassan Ali, Abdullah Al Mamun, Sultan Anwar, “All Possible Security Concern and Solutions of WSN: A Comprehensive Study”, Vol.6, Issue 4, pp. 64-74, 2015.
[19]. Al-Sakib Khan Pathan , Hyung-Woo Lee, Choong Seon Hong, “Security in Wireless Sensor Networks: Issues and Challenges”, Proc. ICACT 2006, Vol. 1, pp. 1043-1048,2006.
[20]. Anitha S.Sastry, Shazia Sulthana and Dr.S Vagdevi, “Security Threats in Wireless Sensor Networks in Each Layer”, International Journal of Advanced Networking and Applications, Vol. 04 ,Issue 04, pp. 1657-1661, 2013.
[21]. D.L., Nguyen, T.K., Nguyen, T.V., Nguyen, T.N., Massacci, F. and Phung, P.H., “A convolutional transformation network for malware classification”. 6th NAFOSTED conference on information and computer science (NICS) ,IEEE, pp. 234-239,2019.
[22]. Deng, J., R. Han, and S. Mishra. “Counter measures against Traffic Analysis in Wireless Sensor Networks.” Security and Privacy for Emerging Areas in Communications Networks, IEEEExplore,pp.1-13,2005,doi:10.1109/securecomm.2005.16.
[23]. Chris Karlof and David Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks Journal, Vol.1, Issue 2-3, pp. 293-315, 2003, doi:10.1016/s1570-8705(03)00008-8.
[24]. Yan Sun, Zhu Han, and K. J. Ray Liu, “Defense of Trust Management Vulnerabilities in Distributed Networks,” IEEE Communications Magazine, Vol 46, Issue 2, pp.112-119, 2008,doi: 10.1109/mcom.2008.4473092.
[25]. Puccinelli D, Haenggi M. “Wireless sensor networks: Applications and challenges of ubiquitous sensing”, IEEE Circuits and Systems Magazine. Vol 5, Issue 6, pp.19-29,2005.
[26]. V. Thiruppathy Kesavan and S. Radhakrishnan, “Secret Key Cryptography Based Security Approach for Wireless Sensor Networks”, International Conference on Recent Advances in Computing and Software Systems, IEEE, pp. 185-191,2012.
[27]. K. Sharma, M.K. Ghose, D. Kumar, R. P. Kumar Singh, V.K Pandey. “A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks”. In IJAST, Vol. 7, pp. 31-44, 2010.
[28]. Hamid, M. A., Rashid, M-O., and Hong, C. S., “Routing Security in Sensor Network: Hello Flood Attack and Defense”, IEEE ICNEWS ,Vol 2, pp. 2-4,2006.
[29]. Nath MP, Priyadarshini SB, Mishra D, “A comprehensive study on security in IoT and resolving security threats using machine learning (ML)”, In Advances in Intelligent Computing and Communication, Proceedings of ICAC ,pp. 545-553,2021
[30]. Priyadarshini SB, Bagjadab AB, Mishra BK, ”Digital signature and its pivotal role in affording security services”, In Handbook of e-Business Security,1st edition, Auerbach Publications,India,pp.365-384,2018,ISBN:9780429468254.
[31]. Priyadarshini SB, Bagjadab AB, Mishra BK. “Security in distributed operating system: A comprehensive study”, Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies,Wiley-Scrivener publisher, pp. 221-30, 2019, ISBN: 9781119488057.
[32]. Priyadarshini SB.,”A Comprehensive Study of Security in Electronic Commerce Frameworks in the Modern Era of Technology”, In Artificial Intelligence and Cybersecurity,1st edition, CRC press, India, pp. 121-140, 2022, ISBN9781003097518.
[33]. Dasmohapatra S, Priyadarshini SB,” A Comprehensive Study on SQL Injection Attacks, Their Mode, Detection and Prevention”,In Proceedings of Second Doctoral Symposium on Computational Intelligence: DoSCI ,pp. 617-632,2022.