Review of Wireless Sensor Networks

This article presents a study of the state of the art of sensor networks wireless systems, which continue to develop and present a wide variety of Applications. These networks constitute a current and emerging field of study where combines the development of computers, wireless communications and devices mobile phones and integration with other disciplines such as agriculture, biology, medicine, etc. I know presents the main concept, components, topologies, standards, applications, problems and challenges, then delves into security solutions and concludes with basic simulation tools.

International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-5 (October 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.5.7
57 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Review of Wireless Sensor Networks
Khairi Salem Ahmed
Faculty of Science, Department of Information Technology, Bani Waleed University, LIBYA
Corresponding Author: loronjem@gmail.com
ABSTRACT
This article presents a study of the state of the art
of sensor networks wireless systems, which continue to
develop and present a wide variety of Applications. These
networks constitute a current and emerging field of study
where combines the development of computers, wireless
communications and devices mobile phones and integration
with other disciplines such as agriculture, biology,
medicine, etc. I know presents the main concept,
components, topologies, standards, applications, problems
and challenges, then delves into security solutions and
concludes with basic simulation tools.
Keywords-- Sensor Nodes, Security, Applications,
Wireless
I. INTRODUCTION
Sensors have traditionally been elements
indispensable in industrial processes due to the ability
they provided to monitor and manipulate the physical
quantities involved in the different production processes.
The connectivity between the sensors was performed
through the use of traditional wired networks. Currently
the continuous technological advances have encouraged
the development of devices with wireless
communication capabilities, arranged in any location,
more and more small, autonomous, more powerful and
with a more efficient battery consumption; from there
arises the wireless sensor networks (WSN, Wireless
Sensor Network), which are composed of a series of
thousands, even millions of sensors, called nodes, which
have the capacity to storage, processing and energy
limited.
The continuous development of these particular
networks has caused its incorporation and use in areas
very disparate. From environmental monitoring
(humidity, temperature, light, etc.) essential for the
development of home automation, going through
military, industrial, medical or commercial [1].
In this article, we present a study of the
fundamental concepts of sensor networks wireless,
applications, standards main, challenges, basic problems,
latest solutions raised on the subject of security,
simulation tools, and others Research topics.
II. BASICS OF SENSOR NETWORKS
2.1 Definition
A wireless sensor network is a network of small
embedded computer systems placed in the physical
world, and capable of interact with this [2]. Gómez, [3],
presents another definition as a set of autonomous
elements (nodes) interconnected wirelessly, measuring
variables such as movement, pressure, temperature and
humidity, etc.
If the sensors used are of a size that measured in
millimetres or micrometres, the technology necessary is
already of the nanotechnology type. Instead of sensor
networks, the name dust is often used smart (smart dust).
If they are robots, they talk about fog utility (utility fog).
The sensor networks are distributed in a specific area
and nodes can be stationary or mobile. A network of
mobile nodes, form an ad hoc network capable of routing
between them. His training is by auto-configuration on a
physical topology arbitrary, under frequent modification
by node movements, departures, arrivals and failures
participants.
Sensor networks have the following tasks
typical [4]:
 Determine an environmental parameter: heat,
pressure, light, radiation, presence of smoke,
humidity, noise, friction
 Detect events: presence, arrival, movement,
vibration, flow
 Estimate parameters: speed, direction
 Classify detected objects
 Follow the path of a detected object the network
itself has no value, but the outputs.
2.2 Characteristics
Among the characteristics of the networks of
sensors are the following [1], [3], [5]:
Topology and Maintenance: In general, the nodes that
form the sensor networks are characterized for being
randomly distributed without following no regular
topology. Because of this recommends that maintenance
and configuration is completely autonomous (does not
require the human intervention) by using distributed
algorithms.
Energy Limitations: One of the main bottlenecks that
we find in the operations performed by the sensors is, the
energy availability of nodes. The sensors in most cases
have batteries that are characterized by not being able to
be recharged, which makes this problem the main
restriction when developing new protocols. Increase the
lifetime of a sensor will therefore involve reducing the
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-5 (October 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.5.7
58 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
levels of tolerance or limiting the precision of results
obtained.
Hardware and Software Specific: The microcontroller,
operating system, and applications developed for WSN's
must consider energy limitations previously exposed.
The operating system more used as a basis for the
construction of applications in wireless sensor networks,
is TinyOS [6], developed at the University of Berkeley
[7].
Synchronization of Devices: So that the treatment of
information that is spread by a network of sensors is
carried out correctly, nodes must be synchronized.
Therefore, in the WSN's must impose processes of
access to the mean by multiple division in time (Time
Division Multiple Access, TDMA) and sorting
temporary so that the detection of the events is produce
unambiguous.
Dynamic Routing: Sensor Networks must be able to
adapt to changes in node connectivity. Therefore, the
protocols routing used must be prepared to include or
exclude nodes from your routes.
Temporal Restrictions: Although the WSN’s must
support real-time communications between the different
nodes, this should not harm to delay characteristics,
bandwidth u other quality of service parameters of
networks (Quality of Service, QoS).
Safety: Considering the end use for which the sensor
network is developed, the security in communications
can be a very important when determining protocols that
will develop in the different layers of the nodes. This is
the clear example of the networks of sensors used in the
military field.
2.3 Elements
Figure 1: Components of a Sensor Network wireless
Sensors: Of different nature and technology take the
information from the medium and convert it in electrical
signals.
Motes: Or radio processors, take the sensor data through
your gates data, and send the information to the station
base.
Node: It is a sensor / mote
Gateway: Elements for interconnection between the
sensor network and a TCP / IP network
Base Station: Data collector based on a common
computer or embedded system.
Wireless Network: Typically based on the 802.15.4
standard, ZigBee.
2.4 Topology
Wireless sensor networks have the following
types of devices [8], as shown in figure 2:
Full-Function Devices (FFD):
 Any topology
 Able to act as a network coordinator (in
personal area network, PAN)
 Talk to any other device
 Reduced function device (RFD):
 Only in star topology
 Cannot be a network coordinator
 Only speak to network coordinators
 Very simple implementation.
Personal Area Network Coordinator (PAN): the main
coordinator node of the network.
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-5 (October 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.5.7
59 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Figure 2: Device types
The topology can be mesh, star, cluster of stars,
illustrated in figure 3 respectively.
Figure 3: Mesh topologies (left), star (centre) and star cluster (right).
In topologies then, there is a coordinator or
direct communication between nodes (peer-topeer) [1].
2.5 Standards
The network is based on some of the standards
wireless, indicated in table 1, where there will be to
reach a compromise between [2]:
 Transmission speed
 Coverage
 Energy cost per package sent.
Currently the standard chosen for this type of
networks, it is IEEE 802.15.4, which is supported and
promoted by ZigBee [9]:
 20-250 Kbs
 1-100 Meters
 Up to 2 years of battery
Zigbee: Technology addressed to the needs of low-cost
wireless network market based on the IEEE 802.15.4
standard, [3]. Was initiated as a non-profit industrial
consortium to define global specifications of reliable,
economical and affordable wireless applications low
power based on the IEEE 802.15.4 standard.
2.6 Routing
Conventional distribution protocols for data or
routing is not efficient in this type networks with such
high restrictions on the energy consumption [8]. Instead
they have developed other more specific protocols that
they partly solve that problem. In a very simple,
protocols based on negotiation using descriptors before
transmit the information, thus avoiding part of the
redundancy; direct broadcast based on reactive routing
originated at destination; the one of energy saving also
of the reactive type but based exclusively on
probabilities of energy consumption; the multipath based
on increase network availability when the optimal path is
not available; and finally Control of access to the
medium but specific to sensor networks and called: S-
MAC . [5]
Routing on Networking Ad hoc Wireless: [10]
A Wireless Ad Hoc network is understood as a set of
distributed nodes randomly in a D-dimensional space.
On the same, communication can be generated by any
node of the network, which therefore acts as source, to
any other node, which assumes the target paper. This
communication occurs using a multi-hop scheme in
which the data are relayed by a series of nodes
intermediate until reaching the latter. The protocols from
routing plus representative, classified according to
whether it is uniform or non-uniform.
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-5 (October 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.5.7
60 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Uniform or planar structure classification,
figure 5, indicates that all nodes in the network perform
the same functions and possess the same characteristics.
In this case, no at no cost of structure maintenance of the
network; however, they adapt very little measure to
extensions while preserving their same benefits.
Non-uniform classification, figure 6, is typical
of hierarchical structures in which some nodes develop
special roles and can even be endowed with particular
capacities in terms of computing, energy or storage
among others. This allows them to support more
algorithms complex, reduce the overload due to
communication and offer the possibility of balancing
load while maintaining their characteristics even with
increases in the number of nodes in network; on the
contrary, they generate a certain cost of many cases the
availability of nodes heterogeneous.
Figure 5: Uniform and Non-uniform routing protocols
In each of the classifications, in uniform and
non-uniform, protocols present a new peculiarity
regarding the procedure adopted for the discovery of the
path to establish and its maintenance. From this point of
view, you can differentiate between:
Proactive: its operation is based on tables, created from
an original phase of route discovery, which house the
information referring to the roads in the network based
on different criteria. This information is scoped global
and therefore all nodes retain possible paths to the rest.
For the dissemination of the same, the nodes exchange
these data either periodically or before the appearance of
a change in her. Protocols assets make sending data to
occur with a negligible delay due to the fact that the
information about the route to follow is available
previously; however, they consume resources from the
network, energy, computing, storage, etc., Regardless of
the degree of use of the route.
Reagent: also called "on demand". Routes are only built
in the moment where a node needs to establish a
communication. It is at that precise moment when a
discovery phase of route that ends once the source
receives the fate response including the chosen path for
sending data. Maintenance cost routes decreases greatly,
at the cost of introduce a latency produced by the
generation initial road and a possible problem of
saturation of the network as a result of the flooding of
the same with route request messages
Hybrid: generally used for protocols not uniforms.
Includes both procedures above at different levels of
routing. Thus, it is possible to reduce the overhead of the
network with control messages presented by protocols
active, while the latency of search operations displayed
between reagents.
In the case of uniform protocols, whether it is
reactive or active, there is a classification that obeys the
type of network status information that they drive the
nodes for proceed to the routing. According to this
criterion, a protocol uniform is based on:
Topology: nodes maintain information referred to the
global set of the network. A group important of these
protocols are those based on the link status, in which the
information on the connections established by each node
with its neighbours is disseminated throughout the
network in such a way that any node knows the link
scheme of the same. This approach is not optimally
adapted to the dynamic nature of this type of network;
without However, information of such calibre affects
very positively in the selection of the best route, the load
balancing or quality management service.
Destination: knowledge in this case is restricted at the
local level. The largest group among this class of
protocols are called "Distance-vector" since, instead of
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-5 (October 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.5.7
61 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
paths complete, maintain a certain measure of distance to
different destinations (usually the number jumps) and the
direction vector towards them (the identifier of the next
hop node).
Position: knowledge of each node is based on the
geographic coordinates of himself and the rest. The
principle of routing consists of the sequential approach
to the destination by implementing jumps to the
neighbour that is closer to it. In topology networks
homogeneous is a very efficient technique; without
However, in the presence of discontinuities u obstacles
must be supported by algorithms specific to improve
your performance; the same time, this approach requires
a system of absolute or relative positioning, which limits
considerably its application.
For their part, non-uniform protocols can be
classified according to the type of organization present,
differentiating them according to their basis in:
Zone: nodes are grouped according to zone geographical
area they occupy. Thus, the path to scope maintenance
overhead local of the same. Once again, you need the
knowledge of the position of the nodes and the
consequent system that provides it.
Group: the association of nodes is carried out around
one of them (cluster head) who acts as leader of the
group, taking responsibility for the high and low nodes
in the group and of certain functions routing hierarchies.
This hierarchy reduces network control overhead from
nodes that, in most cases, require capabilities wider than
the rest.
Spinal Column: a set of nodes are dynamically selected
to form a backbone of the network. To said nodes are
assigned special functions such as construction of roads
and the spread of control and data packages. The rest of
the nodes are supports them to carry out their
establishment of path for desired communication. One
more time, a high capacity to adapt to network
extensions and control of the routing at a lower cost;
Conversely, a certain expense of structure maintenance.
III. SECURITY PROBLEMS AND
SOLUTIONS
Below is a study of the main problems and
latest solutions raised on the issue of security in network
wireless sensors, key management and encryption,
analysis of handling mechanisms of keys, authentication
and discovery.
a. Key Management and Encryption
Much of the security implementations in
WSNs, they use encryption and handling schemes of
keys. The main problem to solve is make the
management scheme efficient enough so that if a
intruder manages to capture a node, it is not possible
access all the keys of the network and therefore the
confidential system information. The different authors
investigating solutions for WSN security, they perform
assumptions regarding the capacity of different nodes.
As stated above, the sensors possess capabilities from
processing, storage and a source of limited energy,
however, it is possible to find a small group of nodes,
whose resources are not are so limited, called superior or
cluster head (cell). For these cases, the network it is
heterogeneous [19], [20].
Unlike [13] where only one is used Key pool, in
[17], two pools are managed, one transmission and one
return. Before the deployment, each node is given,
randomly, two rings of m / 2 keys of each pool (where m
is the total number of keys per node). The pools are
updated through a Hash function [11], after a period of
time or generation. Each pool has P / 2 keys, where P is
the total number of keys in the system. The Return keys
are generated using string Lamport based on Hash [12],
starting with the keys that correspond to the latest
generation. After deployment, each node starts the
recognition of your neighbours by sending a message
with your ID and the generation number in the which
was deployed. If a neighbour finds keys common, send a
reply message with your ID and his generation.
Following the line, in [13] two schemes where
they use different pools. The first scheme is called
ABAB, due to the use of two pools of keys, A and B,
and a third set (S) that is composed of the keys shared by
A and B. m keys are chosen of A and are stored in a
node and m keys of B and they are stored in another
node. It continues the same process until all the sensors
of the net.
Figure 13: ABAB diagram
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-5 (October 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.5.7
62 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The ABCD scheme, for its part, uses 2r pools,
where r is the number of rows of nodes to display. In this
case, the set S, comprises the keys shared by the 2nd
pools. The deployment is shown in figure 14. Once the
deployment, the protocols of [13], [14] to establish even
keys between nodes.
Figure 14: ABCD scheme
For encryption, in [18] it is assumed that the
nodes share a symmetric key with the base station and
they know the public key of the BS, in addition they
have key pairs symmetric with the neighbours. Another
simple consideration is found in the scheme of [19],
where before deployment, select a master key and decide
the maximum size of each cell. Each sensor is assigned a
key, encrypted in the master key. The BS gives the nodes
a group key and compute a polynomial function f (x) of
a field finite or Galois GF [20], which are obtained
through of m + 1 points (x, y) random (the points
correspond to node locations). The functions f (1), f (2)
and f (m), together with the time value current t,
encrypted in the group key and without encrypt, they are
sent as broadcast to the nodes. Each sensor, according to
the Shamir scheme [21], determine the key with the
functions received. Then check if the found key is
authentic, decrypting the current time t and comparing it
with the received. If it is necessary to send or renew the
keys, they are encrypted with the old key. Whether finds
a corrupted node, recalculates the polynomial function
excluding the locations of the affected nodes.
b. Analysis of Management Mechanisms of Keys
The key handling mechanisms they use the key
pool concept, they must have nodes with big capabilities
from storage, which is impossible in the Insofar as the
sensors have limitations in the memory. However, when
the keys are renewing every certain period and the nodes
that die are replaced, the number of nodes compromised
decreases considerably, as in [17]. If, in addition, as in
[13], work with more than one pool, which can be reused
in different areas, the rings of keys of each node can
increase achieving greater security and better
connectivity. The mechanisms that need nodes have
prior knowledge of their location, they can only be used
in applications where the network is deployed in a
manual and premeditated. However, they have a
advantage over other mechanisms when used master
keys that the attacker does not know and therefore both
encryption keys cannot be generated and decryption
[15].
The algorithm [19], can force the exit of a node
compromised, by isolating it from the system when
generates damage to the network, but its effectiveness it
depends on the resources of the node. Some schemes,
although they are novel, possess great computational
complexity [22] or compromise chip size and increase
node power consumption, decreasing its life time [23]
The mechanisms that have heterogeneous networks,
enjoy the advantage over systems homogeneous, the
possibility of downloading the security to nodes that
have greater resources processing and storage, achieving
ease the functioning of common nodes and in general of
the network.
Within the open topics for future work, the
following aspects are found:
Improve the ability to add and remove nodes in
the network without compromising system security.
Reduce energy consumption, decrease header or
overhead of messages generated by the different
algorithms. Check the effectiveness of mechanisms in
various networks and topologies. Improve policies to
renew passwords that allow to reduce the time of
operation.
IV. SIMULATION TOOLS
In most cases the devices used for the
implementation of sensor networks wireless are
characterized by being small, autonomous, very
numerous and with important energy limitations. All
these factors cause the analytical studies to be carried out
to be very complex and experimental studies very
expensive. Therefore, we see the need that exists by
researchers and developers of carry out previous
simulations [1] before the physical implementation of
these networks.
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962
Volume-11, Issue-5 (October 2021)
www.ijemr.net https://doi.org/10.31033/ijemr.11.5.7
63 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Preliminary simulations are essential before the
implementation of the WSN's, especially if this entails
new protocols and functionalities network. This fact has
caused a boom in simulation tools available. Without
However, obtaining reliable results and representative
through simulations is not a simple task.
V. CONCLUSION
With this work, an approach to the Wireless
Sensor Networks (WSN) topic, that find a multitude of
applications in the current society and in them converge
a good number of information technologies and
communications. Safety is deepened as one of the most
important study topics in the networks of wireless
sensors, due to the inability to use conventional
mechanisms against attacks, since the sensors have
resources limited processing and storage. To obtain a
good degree of security in the WSN, it is necessary to
jointly execute the authentication mechanisms, key
management and network intrusion detection.
It is a field that is growing and evolving and
where there is ample material, both for the research, such
as for product development and applications. How future
work will be studied more about optimization, design,
deployment, distributed solutions and security in
networks wireless sensors, and perform tests
experiments of a model in a tool simulation.
REFERENCES
[1] Corral I. & Ana Belén. (2005). Design and
implementation of a simulation environment for sensor
networks wireless [Engineering from
Telecommunication]. Polytechnic University of
Cartagena.
[2] RAAP. (2020). Wireless sensor networks.
[3] Gomez M., Francisco. (2021). Sensor networks
wireless.
[4] Schaeffer Elisa. (2015). A look at the basics of
optimization of sensor networks.
[5] Franco B., Carlos. (2021). Trends: Wireless sensor
networks.
[6] TOSSIM. Available at: http://www.tinyos.net/.
[7] http://www.cs.berkeley.edu/.
[8] Ruiz M., Pedro. (2020). Introduction to sensor
networks. Available at: http://ants.dif.um.es/rm/.
[9] Zigbee Alliance. Available on:
http://www.zigbee.org/.
[10] Vinagre D. & Juan José. (2007). Routing theory in
wireless ad hoc networks. Doctoral Thesis, Carlos III
University of Madrid.
[11] I. Mironov. (2005). Hash functions: Theory, attacks,
and applications. Microsoft Research, Silicon Valley
Campus.
[12] L. Lamport. (1981). Password authentication with
insecure communication. Commun. ACM, 24(11).
[13] S. Emre Taşçı, E. Bayramoğlu, & A. Levi. (2008).
Simple and flexible random key predistribution schemes
for wireless sensor networks using deployment
knowledge. In: International Conference on Information
Security and Assurance.
[14] W. Du, J. Deng, YS Han, S. Chen, & PK Varshney.
(2004). A key management scheme for wireless sensor
networks using deployment knowledge. IEEE Infocom.
[15] Y. Ho Kim, H. Lee, & D. Hoon Lee. (2007). A
secure and efficient key management scheme for
wireless sensor networks. In: Security and Privacy in
Communications Networks and the Workshops, Secure
Comm 2007. Third International Conference, pp. 17-21.
[16] J. Young Chun, Y. Ho Kim, J. Lim, & D. Hoon Lee.
(2007). Location-aware random pair-wise keys scheme
for wireless sensor networks. In: Third International
Workshop on Security Privacy and Trust in Pervasive
and Ubiquitous Computing.
[17] J. Luo, P. Papadimitratos, & JP. Hubaux. (2008).
GossiCrypt: Wireless sensor network data confidentiality
against parasitic adversaries. In: 5th Annual IEEE
Communications Society Conference on Sensor, Mesh
and Ad Hoc Communications and Networks.
[18] X. Yi, M. Faulkner, & E. Okamoto. (2008).
Securing wireless sensor networks. In: Third
International Conference on Availability, Reliability and
Security.
[19] MIT open Course Aware, Chapter 7: Introduction to
finite fields. Electrical Engineering and Science
Computing.
[20] A. Shamir. (1979 Nov). How to share a secret.
Communications of the ACM, 22(11), 656-715.
[21] A. Hamid, M. Mahbub Alam, & C. Seon Hong.
(2007 Feb). Developing a security protocol based on
LCG and orthogonal matrices for wireless sensor
networks. The 9th
International Conference on Advanced
Communication Technology.
[22] DE Knuth. (1985). Deciphering a linear
congruential encryption. IEEE Transactions on
Information Theory, IT-X(1), 49-52.

Recomendados

Modeling self-adaptative IoT architectures por
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesIván Alfonso
1.1K visualizações35 slides
Fog Computing Projects por
Fog Computing ProjectsFog Computing Projects
Fog Computing ProjectsPhdtopiccom
173 visualizações5 slides
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce... por
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Nexgen Technology
116 visualizações7 slides
Fog ppt por
Fog ppt Fog ppt
Fog ppt sheenataneja1
453 visualizações34 slides
Domain specific IoT por
Domain specific IoTDomain specific IoT
Domain specific IoTLippo Group Digital
66.2K visualizações41 slides
Industrial Pioneers Days - Machine Learning por
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningVEDLIoT Project
112 visualizações20 slides

Mais conteúdo relacionado

Mais procurados

Assisting IoT Projects and Developers in Designing Interoperable Semantic Web... por
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Amélie Gyrard
1K visualizações17 slides
Why IoT needs Fog Computing ? por
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Ahmed Banafa
3.5K visualizações38 slides
Walking through the fog (computing) - Keynote talk at Italian Networking Work... por
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...FBK CREATE-NET
373 visualizações35 slides
Fog computing por
Fog computingFog computing
Fog computingAbdul Qadir
2.1K visualizações29 slides
VEDLIoT Project overview por
VEDLIoT Project overviewVEDLIoT Project overview
VEDLIoT Project overviewVEDLIoT Project
149 visualizações12 slides
Fog computing por
Fog computingFog computing
Fog computingRishabh Kumar ☁️
499 visualizações25 slides

Mais procurados(20)

Assisting IoT Projects and Developers in Designing Interoperable Semantic Web... por Amélie Gyrard
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Amélie Gyrard1K visualizações
Why IoT needs Fog Computing ? por Ahmed Banafa
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?
Ahmed Banafa3.5K visualizações
Walking through the fog (computing) - Keynote talk at Italian Networking Work... por FBK CREATE-NET
Walking through the fog (computing) - Keynote talk at Italian Networking Work...Walking through the fog (computing) - Keynote talk at Italian Networking Work...
Walking through the fog (computing) - Keynote talk at Italian Networking Work...
FBK CREATE-NET373 visualizações
Fog computing por Abdul Qadir
Fog computingFog computing
Fog computing
Abdul Qadir2.1K visualizações
VEDLIoT Project overview por VEDLIoT Project
VEDLIoT Project overviewVEDLIoT Project overview
VEDLIoT Project overview
VEDLIoT Project149 visualizações
Piet Demeester - Future Internet por imec.archive
Piet Demeester - Future InternetPiet Demeester - Future Internet
Piet Demeester - Future Internet
imec.archive334 visualizações
Dynamic module deployment in a fog computing platform por 霈萱 蔡
Dynamic module deployment in a fog computing platformDynamic module deployment in a fog computing platform
Dynamic module deployment in a fog computing platform
霈萱 蔡2.6K visualizações
IoT Analytics from Edge to Cloud - using IBM Informix por Pradeep Muthalpuredathe
IoT Analytics from Edge to Cloud - using IBM InformixIoT Analytics from Edge to Cloud - using IBM Informix
IoT Analytics from Edge to Cloud - using IBM Informix
Pradeep Muthalpuredathe1.7K visualizações
Fog computing por Hadi Fadlallah
Fog computingFog computing
Fog computing
Hadi Fadlallah1.6K visualizações
Attack graph generation for micro services architecture por Abdul Qadir
Attack graph generation for micro services architectureAttack graph generation for micro services architecture
Attack graph generation for micro services architecture
Abdul Qadir119 visualizações
Fog Computing and the Internet of Things por S.Mostafa Sayyedi
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
S.Mostafa Sayyedi788 visualizações
Introduction to Fog Computing por Er. Ajay Sirsat
Introduction to Fog ComputingIntroduction to Fog Computing
Introduction to Fog Computing
Er. Ajay Sirsat658 visualizações
Fog computing por Ayush Chaurasia
Fog computingFog computing
Fog computing
Ayush Chaurasia1.2K visualizações
Components of IOT Implementation por Aashiq Ahamed N
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT Implementation
Aashiq Ahamed N3K visualizações
PhD Projects in Fog Computing Research Ideas por PhD Services
PhD Projects in Fog Computing Research IdeasPhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research Ideas
PhD Services17 visualizações
Fog Computing por Manoj Mandava
Fog ComputingFog Computing
Fog Computing
Manoj Mandava738 visualizações

Similar a Review of Wireless Sensor Networks

Paper On Wireless Sensor Networking por
Paper On Wireless Sensor NetworkingPaper On Wireless Sensor Networking
Paper On Wireless Sensor NetworkingGerri Dominguez
2 visualizações43 slides
L010527175 por
L010527175L010527175
L010527175IOSR Journals
188 visualizações5 slides
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola por
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha YeolaIJET - International Journal of Engineering and Techniques
242 visualizações5 slides
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS por
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
9 visualizações8 slides
A Review of Physical, Data and Network Layer Specification and its Protocols ... por
A Review of Physical, Data and Network Layer Specification and its Protocols ...A Review of Physical, Data and Network Layer Specification and its Protocols ...
A Review of Physical, Data and Network Layer Specification and its Protocols ...Editor IJMTER
589 visualizações12 slides
A Review on Wireless Sensor Network Security por
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
31 visualizações6 slides

Similar a Review of Wireless Sensor Networks(20)

Paper On Wireless Sensor Networking por Gerri Dominguez
Paper On Wireless Sensor NetworkingPaper On Wireless Sensor Networking
Paper On Wireless Sensor Networking
Gerri Dominguez2 visualizações
L010527175 por IOSR Journals
L010527175L010527175
L010527175
IOSR Journals188 visualizações
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS por ijwmn
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
ijwmn9 visualizações
A Review of Physical, Data and Network Layer Specification and its Protocols ... por Editor IJMTER
A Review of Physical, Data and Network Layer Specification and its Protocols ...A Review of Physical, Data and Network Layer Specification and its Protocols ...
A Review of Physical, Data and Network Layer Specification and its Protocols ...
Editor IJMTER589 visualizações
A Review on Wireless Sensor Network Security por ijtsrd
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
ijtsrd31 visualizações
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou... por journalBEEI
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI16 visualizações
Mobile Wireless Network Essay por Susan Myers
Mobile Wireless Network EssayMobile Wireless Network Essay
Mobile Wireless Network Essay
Susan Myers2 visualizações
gcettb presentation on sensor network por rahulkumargiri
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
rahulkumargiri349 visualizações
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ... por chokrio
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
chokrio1.2K visualizações
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE... por IJNSA Journal
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
IJNSA Journal12 visualizações
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN por IAEME Publication
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
IAEME Publication276 visualizações
Identifying Security Vulnerabilities Survey por Clayton Hatathlie
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
Clayton Hatathlie237 visualizações
Wireless Micro-Sensor Network Models por IOSR Journals
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
IOSR Journals582 visualizações
Remote temperature and humidity monitoring system using wireless sensor networks por eSAT Journals
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networks
eSAT Journals333 visualizações
International Journal of Computational Engineering Research(IJCER) por ijceronline
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline455 visualizações
Report on WIRELESS SENSOR NETWORK por Nishant Bhardwaj
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
Nishant Bhardwaj4.6K visualizações
Efficient Data Aggregation in Wireless Sensor Networks por IJAEMSJORNAL
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
IJAEMSJORNAL50 visualizações
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey por theijes
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
theijes541 visualizações
A Review Paper on Energy Capable Routing in Wireless Sensor Network por ijtsrd
A Review Paper on Energy Capable Routing in Wireless Sensor NetworkA Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor Network
ijtsrd5 visualizações

Mais de Dr. Amarjeet Singh

Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh... por
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Dr. Amarjeet Singh
10 visualizações4 slides
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad por
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladA Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladDr. Amarjeet Singh
24 visualizações5 slides
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ... por
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Dr. Amarjeet Singh
8 visualizações6 slides
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti... por
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Dr. Amarjeet Singh
7 visualizações8 slides
Factors Influencing Ownership Pattern and its Impact on Corporate Performance... por
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Dr. Amarjeet Singh
9 visualizações5 slides
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au... por
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...Dr. Amarjeet Singh
50 visualizações6 slides

Mais de Dr. Amarjeet Singh(20)

Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh... por Dr. Amarjeet Singh
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Dr. Amarjeet Singh10 visualizações
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad por Dr. Amarjeet Singh
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladA Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
Dr. Amarjeet Singh24 visualizações
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ... por Dr. Amarjeet Singh
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Dr. Amarjeet Singh8 visualizações
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti... por Dr. Amarjeet Singh
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Dr. Amarjeet Singh7 visualizações
Factors Influencing Ownership Pattern and its Impact on Corporate Performance... por Dr. Amarjeet Singh
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Dr. Amarjeet Singh9 visualizações
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au... por Dr. Amarjeet Singh
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
Dr. Amarjeet Singh50 visualizações
A Study on Factors Influencing the Financial Performance Analysis Selected Pr... por Dr. Amarjeet Singh
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
Dr. Amarjeet Singh59 visualizações
An Empirical Analysis of Financial Performance of Selected Oil Exploration an... por Dr. Amarjeet Singh
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
Dr. Amarjeet Singh48 visualizações
A Study on Derivative Market in India por Dr. Amarjeet Singh
A Study on Derivative Market in IndiaA Study on Derivative Market in India
A Study on Derivative Market in India
Dr. Amarjeet Singh72 visualizações
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet... por Dr. Amarjeet Singh
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Dr. Amarjeet Singh56 visualizações
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid por Dr. Amarjeet Singh
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidAnalytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Dr. Amarjeet Singh61 visualizações
Crypto-Currencies: Can Investors Rely on them as Investment Avenue? por Dr. Amarjeet Singh
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Dr. Amarjeet Singh86 visualizações
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S... por Dr. Amarjeet Singh
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Dr. Amarjeet Singh142 visualizações
Surrogacy Ethical and Legal Implication in India por Dr. Amarjeet Singh
Surrogacy Ethical and Legal Implication in IndiaSurrogacy Ethical and Legal Implication in India
Surrogacy Ethical and Legal Implication in India
Dr. Amarjeet Singh122 visualizações
Haryana's Honour Killings: A Social and Legal Point of View por Dr. Amarjeet Singh
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of View
Dr. Amarjeet Singh116 visualizações
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i... por Dr. Amarjeet Singh
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Dr. Amarjeet Singh127 visualizações
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle... por Dr. Amarjeet Singh
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Dr. Amarjeet Singh50 visualizações
Capacity Expansion Banes in Indian Steel Industry por Dr. Amarjeet Singh
Capacity Expansion Banes in Indian Steel IndustryCapacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel Industry
Dr. Amarjeet Singh99 visualizações
Metamorphosing Indian Blockchain Ecosystem por Dr. Amarjeet Singh
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain Ecosystem
Dr. Amarjeet Singh66 visualizações
Data Analysis study based on Consumer Behavior on Soft Drinks Produced by Coc... por Dr. Amarjeet Singh
Data Analysis study based on Consumer Behavior on Soft Drinks Produced by Coc...Data Analysis study based on Consumer Behavior on Soft Drinks Produced by Coc...
Data Analysis study based on Consumer Behavior on Soft Drinks Produced by Coc...
Dr. Amarjeet Singh101 visualizações

Último

Future of Indian ConsumerTech por
Future of Indian ConsumerTechFuture of Indian ConsumerTech
Future of Indian ConsumerTechKapil Khandelwal (KK)
24 visualizações68 slides
"Node.js Development in 2024: trends and tools", Nikita Galkin por
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin Fwdays
17 visualizações38 slides
Future of AR - Facebook Presentation por
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentationssuserb54b561
22 visualizações27 slides
"Running students' code in isolation. The hard way", Yurii Holiuk por
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk Fwdays
24 visualizações34 slides
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
317 visualizações86 slides
Piloting & Scaling Successfully With Microsoft Viva por
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaRichard Harbridge
13 visualizações160 slides

Último(20)

"Node.js Development in 2024: trends and tools", Nikita Galkin por Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays17 visualizações
Future of AR - Facebook Presentation por ssuserb54b561
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
ssuserb54b56122 visualizações
"Running students' code in isolation. The hard way", Yurii Holiuk por Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays24 visualizações
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software317 visualizações
Piloting & Scaling Successfully With Microsoft Viva por Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Richard Harbridge13 visualizações
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 por IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
IttrainingIttraining69 visualizações
Democratising digital commerce in India-Report por Kapil Khandelwal (KK)
Democratising digital commerce in India-ReportDemocratising digital commerce in India-Report
Democratising digital commerce in India-Report
Kapil Khandelwal (KK)20 visualizações
Kyo - Functional Scala 2023.pdf por Flavio W. Brasil
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdf
Flavio W. Brasil418 visualizações
PRODUCT PRESENTATION.pptx por angelicacueva6
PRODUCT PRESENTATION.pptxPRODUCT PRESENTATION.pptx
PRODUCT PRESENTATION.pptx
angelicacueva618 visualizações
Network Source of Truth and Infrastructure as Code revisited por Network Automation Forum
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisited
Network Automation Forum32 visualizações
SAP Automation Using Bar Code and FIORI.pdf por Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Virendra Rai, PMP25 visualizações
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... por James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson126 visualizações
Five Things You SHOULD Know About Postman por Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman38 visualizações
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp66 visualizações
PRODUCT LISTING.pptx por angelicacueva6
PRODUCT LISTING.pptxPRODUCT LISTING.pptx
PRODUCT LISTING.pptx
angelicacueva618 visualizações
Unit 1_Lecture 2_Physical Design of IoT.pdf por StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec15 visualizações
virtual reality.pptx por G036GaikwadSnehal
virtual reality.pptxvirtual reality.pptx
virtual reality.pptx
G036GaikwadSnehal18 visualizações
SUPPLIER SOURCING.pptx por angelicacueva6
SUPPLIER SOURCING.pptxSUPPLIER SOURCING.pptx
SUPPLIER SOURCING.pptx
angelicacueva620 visualizações

Review of Wireless Sensor Networks

  • 1. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-11, Issue-5 (October 2021) www.ijemr.net https://doi.org/10.31033/ijemr.11.5.7 57 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. Review of Wireless Sensor Networks Khairi Salem Ahmed Faculty of Science, Department of Information Technology, Bani Waleed University, LIBYA Corresponding Author: loronjem@gmail.com ABSTRACT This article presents a study of the state of the art of sensor networks wireless systems, which continue to develop and present a wide variety of Applications. These networks constitute a current and emerging field of study where combines the development of computers, wireless communications and devices mobile phones and integration with other disciplines such as agriculture, biology, medicine, etc. I know presents the main concept, components, topologies, standards, applications, problems and challenges, then delves into security solutions and concludes with basic simulation tools. Keywords-- Sensor Nodes, Security, Applications, Wireless I. INTRODUCTION Sensors have traditionally been elements indispensable in industrial processes due to the ability they provided to monitor and manipulate the physical quantities involved in the different production processes. The connectivity between the sensors was performed through the use of traditional wired networks. Currently the continuous technological advances have encouraged the development of devices with wireless communication capabilities, arranged in any location, more and more small, autonomous, more powerful and with a more efficient battery consumption; from there arises the wireless sensor networks (WSN, Wireless Sensor Network), which are composed of a series of thousands, even millions of sensors, called nodes, which have the capacity to storage, processing and energy limited. The continuous development of these particular networks has caused its incorporation and use in areas very disparate. From environmental monitoring (humidity, temperature, light, etc.) essential for the development of home automation, going through military, industrial, medical or commercial [1]. In this article, we present a study of the fundamental concepts of sensor networks wireless, applications, standards main, challenges, basic problems, latest solutions raised on the subject of security, simulation tools, and others Research topics. II. BASICS OF SENSOR NETWORKS 2.1 Definition A wireless sensor network is a network of small embedded computer systems placed in the physical world, and capable of interact with this [2]. Gómez, [3], presents another definition as a set of autonomous elements (nodes) interconnected wirelessly, measuring variables such as movement, pressure, temperature and humidity, etc. If the sensors used are of a size that measured in millimetres or micrometres, the technology necessary is already of the nanotechnology type. Instead of sensor networks, the name dust is often used smart (smart dust). If they are robots, they talk about fog utility (utility fog). The sensor networks are distributed in a specific area and nodes can be stationary or mobile. A network of mobile nodes, form an ad hoc network capable of routing between them. His training is by auto-configuration on a physical topology arbitrary, under frequent modification by node movements, departures, arrivals and failures participants. Sensor networks have the following tasks typical [4]:  Determine an environmental parameter: heat, pressure, light, radiation, presence of smoke, humidity, noise, friction  Detect events: presence, arrival, movement, vibration, flow  Estimate parameters: speed, direction  Classify detected objects  Follow the path of a detected object the network itself has no value, but the outputs. 2.2 Characteristics Among the characteristics of the networks of sensors are the following [1], [3], [5]: Topology and Maintenance: In general, the nodes that form the sensor networks are characterized for being randomly distributed without following no regular topology. Because of this recommends that maintenance and configuration is completely autonomous (does not require the human intervention) by using distributed algorithms. Energy Limitations: One of the main bottlenecks that we find in the operations performed by the sensors is, the energy availability of nodes. The sensors in most cases have batteries that are characterized by not being able to be recharged, which makes this problem the main restriction when developing new protocols. Increase the lifetime of a sensor will therefore involve reducing the
  • 2. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-11, Issue-5 (October 2021) www.ijemr.net https://doi.org/10.31033/ijemr.11.5.7 58 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. levels of tolerance or limiting the precision of results obtained. Hardware and Software Specific: The microcontroller, operating system, and applications developed for WSN's must consider energy limitations previously exposed. The operating system more used as a basis for the construction of applications in wireless sensor networks, is TinyOS [6], developed at the University of Berkeley [7]. Synchronization of Devices: So that the treatment of information that is spread by a network of sensors is carried out correctly, nodes must be synchronized. Therefore, in the WSN's must impose processes of access to the mean by multiple division in time (Time Division Multiple Access, TDMA) and sorting temporary so that the detection of the events is produce unambiguous. Dynamic Routing: Sensor Networks must be able to adapt to changes in node connectivity. Therefore, the protocols routing used must be prepared to include or exclude nodes from your routes. Temporal Restrictions: Although the WSN’s must support real-time communications between the different nodes, this should not harm to delay characteristics, bandwidth u other quality of service parameters of networks (Quality of Service, QoS). Safety: Considering the end use for which the sensor network is developed, the security in communications can be a very important when determining protocols that will develop in the different layers of the nodes. This is the clear example of the networks of sensors used in the military field. 2.3 Elements Figure 1: Components of a Sensor Network wireless Sensors: Of different nature and technology take the information from the medium and convert it in electrical signals. Motes: Or radio processors, take the sensor data through your gates data, and send the information to the station base. Node: It is a sensor / mote Gateway: Elements for interconnection between the sensor network and a TCP / IP network Base Station: Data collector based on a common computer or embedded system. Wireless Network: Typically based on the 802.15.4 standard, ZigBee. 2.4 Topology Wireless sensor networks have the following types of devices [8], as shown in figure 2: Full-Function Devices (FFD):  Any topology  Able to act as a network coordinator (in personal area network, PAN)  Talk to any other device  Reduced function device (RFD):  Only in star topology  Cannot be a network coordinator  Only speak to network coordinators  Very simple implementation. Personal Area Network Coordinator (PAN): the main coordinator node of the network.
  • 3. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-11, Issue-5 (October 2021) www.ijemr.net https://doi.org/10.31033/ijemr.11.5.7 59 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. Figure 2: Device types The topology can be mesh, star, cluster of stars, illustrated in figure 3 respectively. Figure 3: Mesh topologies (left), star (centre) and star cluster (right). In topologies then, there is a coordinator or direct communication between nodes (peer-topeer) [1]. 2.5 Standards The network is based on some of the standards wireless, indicated in table 1, where there will be to reach a compromise between [2]:  Transmission speed  Coverage  Energy cost per package sent. Currently the standard chosen for this type of networks, it is IEEE 802.15.4, which is supported and promoted by ZigBee [9]:  20-250 Kbs  1-100 Meters  Up to 2 years of battery Zigbee: Technology addressed to the needs of low-cost wireless network market based on the IEEE 802.15.4 standard, [3]. Was initiated as a non-profit industrial consortium to define global specifications of reliable, economical and affordable wireless applications low power based on the IEEE 802.15.4 standard. 2.6 Routing Conventional distribution protocols for data or routing is not efficient in this type networks with such high restrictions on the energy consumption [8]. Instead they have developed other more specific protocols that they partly solve that problem. In a very simple, protocols based on negotiation using descriptors before transmit the information, thus avoiding part of the redundancy; direct broadcast based on reactive routing originated at destination; the one of energy saving also of the reactive type but based exclusively on probabilities of energy consumption; the multipath based on increase network availability when the optimal path is not available; and finally Control of access to the medium but specific to sensor networks and called: S- MAC . [5] Routing on Networking Ad hoc Wireless: [10] A Wireless Ad Hoc network is understood as a set of distributed nodes randomly in a D-dimensional space. On the same, communication can be generated by any node of the network, which therefore acts as source, to any other node, which assumes the target paper. This communication occurs using a multi-hop scheme in which the data are relayed by a series of nodes intermediate until reaching the latter. The protocols from routing plus representative, classified according to whether it is uniform or non-uniform.
  • 4. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-11, Issue-5 (October 2021) www.ijemr.net https://doi.org/10.31033/ijemr.11.5.7 60 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. Uniform or planar structure classification, figure 5, indicates that all nodes in the network perform the same functions and possess the same characteristics. In this case, no at no cost of structure maintenance of the network; however, they adapt very little measure to extensions while preserving their same benefits. Non-uniform classification, figure 6, is typical of hierarchical structures in which some nodes develop special roles and can even be endowed with particular capacities in terms of computing, energy or storage among others. This allows them to support more algorithms complex, reduce the overload due to communication and offer the possibility of balancing load while maintaining their characteristics even with increases in the number of nodes in network; on the contrary, they generate a certain cost of many cases the availability of nodes heterogeneous. Figure 5: Uniform and Non-uniform routing protocols In each of the classifications, in uniform and non-uniform, protocols present a new peculiarity regarding the procedure adopted for the discovery of the path to establish and its maintenance. From this point of view, you can differentiate between: Proactive: its operation is based on tables, created from an original phase of route discovery, which house the information referring to the roads in the network based on different criteria. This information is scoped global and therefore all nodes retain possible paths to the rest. For the dissemination of the same, the nodes exchange these data either periodically or before the appearance of a change in her. Protocols assets make sending data to occur with a negligible delay due to the fact that the information about the route to follow is available previously; however, they consume resources from the network, energy, computing, storage, etc., Regardless of the degree of use of the route. Reagent: also called "on demand". Routes are only built in the moment where a node needs to establish a communication. It is at that precise moment when a discovery phase of route that ends once the source receives the fate response including the chosen path for sending data. Maintenance cost routes decreases greatly, at the cost of introduce a latency produced by the generation initial road and a possible problem of saturation of the network as a result of the flooding of the same with route request messages Hybrid: generally used for protocols not uniforms. Includes both procedures above at different levels of routing. Thus, it is possible to reduce the overhead of the network with control messages presented by protocols active, while the latency of search operations displayed between reagents. In the case of uniform protocols, whether it is reactive or active, there is a classification that obeys the type of network status information that they drive the nodes for proceed to the routing. According to this criterion, a protocol uniform is based on: Topology: nodes maintain information referred to the global set of the network. A group important of these protocols are those based on the link status, in which the information on the connections established by each node with its neighbours is disseminated throughout the network in such a way that any node knows the link scheme of the same. This approach is not optimally adapted to the dynamic nature of this type of network; without However, information of such calibre affects very positively in the selection of the best route, the load balancing or quality management service. Destination: knowledge in this case is restricted at the local level. The largest group among this class of protocols are called "Distance-vector" since, instead of
  • 5. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-11, Issue-5 (October 2021) www.ijemr.net https://doi.org/10.31033/ijemr.11.5.7 61 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. paths complete, maintain a certain measure of distance to different destinations (usually the number jumps) and the direction vector towards them (the identifier of the next hop node). Position: knowledge of each node is based on the geographic coordinates of himself and the rest. The principle of routing consists of the sequential approach to the destination by implementing jumps to the neighbour that is closer to it. In topology networks homogeneous is a very efficient technique; without However, in the presence of discontinuities u obstacles must be supported by algorithms specific to improve your performance; the same time, this approach requires a system of absolute or relative positioning, which limits considerably its application. For their part, non-uniform protocols can be classified according to the type of organization present, differentiating them according to their basis in: Zone: nodes are grouped according to zone geographical area they occupy. Thus, the path to scope maintenance overhead local of the same. Once again, you need the knowledge of the position of the nodes and the consequent system that provides it. Group: the association of nodes is carried out around one of them (cluster head) who acts as leader of the group, taking responsibility for the high and low nodes in the group and of certain functions routing hierarchies. This hierarchy reduces network control overhead from nodes that, in most cases, require capabilities wider than the rest. Spinal Column: a set of nodes are dynamically selected to form a backbone of the network. To said nodes are assigned special functions such as construction of roads and the spread of control and data packages. The rest of the nodes are supports them to carry out their establishment of path for desired communication. One more time, a high capacity to adapt to network extensions and control of the routing at a lower cost; Conversely, a certain expense of structure maintenance. III. SECURITY PROBLEMS AND SOLUTIONS Below is a study of the main problems and latest solutions raised on the issue of security in network wireless sensors, key management and encryption, analysis of handling mechanisms of keys, authentication and discovery. a. Key Management and Encryption Much of the security implementations in WSNs, they use encryption and handling schemes of keys. The main problem to solve is make the management scheme efficient enough so that if a intruder manages to capture a node, it is not possible access all the keys of the network and therefore the confidential system information. The different authors investigating solutions for WSN security, they perform assumptions regarding the capacity of different nodes. As stated above, the sensors possess capabilities from processing, storage and a source of limited energy, however, it is possible to find a small group of nodes, whose resources are not are so limited, called superior or cluster head (cell). For these cases, the network it is heterogeneous [19], [20]. Unlike [13] where only one is used Key pool, in [17], two pools are managed, one transmission and one return. Before the deployment, each node is given, randomly, two rings of m / 2 keys of each pool (where m is the total number of keys per node). The pools are updated through a Hash function [11], after a period of time or generation. Each pool has P / 2 keys, where P is the total number of keys in the system. The Return keys are generated using string Lamport based on Hash [12], starting with the keys that correspond to the latest generation. After deployment, each node starts the recognition of your neighbours by sending a message with your ID and the generation number in the which was deployed. If a neighbour finds keys common, send a reply message with your ID and his generation. Following the line, in [13] two schemes where they use different pools. The first scheme is called ABAB, due to the use of two pools of keys, A and B, and a third set (S) that is composed of the keys shared by A and B. m keys are chosen of A and are stored in a node and m keys of B and they are stored in another node. It continues the same process until all the sensors of the net. Figure 13: ABAB diagram
  • 6. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-11, Issue-5 (October 2021) www.ijemr.net https://doi.org/10.31033/ijemr.11.5.7 62 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. The ABCD scheme, for its part, uses 2r pools, where r is the number of rows of nodes to display. In this case, the set S, comprises the keys shared by the 2nd pools. The deployment is shown in figure 14. Once the deployment, the protocols of [13], [14] to establish even keys between nodes. Figure 14: ABCD scheme For encryption, in [18] it is assumed that the nodes share a symmetric key with the base station and they know the public key of the BS, in addition they have key pairs symmetric with the neighbours. Another simple consideration is found in the scheme of [19], where before deployment, select a master key and decide the maximum size of each cell. Each sensor is assigned a key, encrypted in the master key. The BS gives the nodes a group key and compute a polynomial function f (x) of a field finite or Galois GF [20], which are obtained through of m + 1 points (x, y) random (the points correspond to node locations). The functions f (1), f (2) and f (m), together with the time value current t, encrypted in the group key and without encrypt, they are sent as broadcast to the nodes. Each sensor, according to the Shamir scheme [21], determine the key with the functions received. Then check if the found key is authentic, decrypting the current time t and comparing it with the received. If it is necessary to send or renew the keys, they are encrypted with the old key. Whether finds a corrupted node, recalculates the polynomial function excluding the locations of the affected nodes. b. Analysis of Management Mechanisms of Keys The key handling mechanisms they use the key pool concept, they must have nodes with big capabilities from storage, which is impossible in the Insofar as the sensors have limitations in the memory. However, when the keys are renewing every certain period and the nodes that die are replaced, the number of nodes compromised decreases considerably, as in [17]. If, in addition, as in [13], work with more than one pool, which can be reused in different areas, the rings of keys of each node can increase achieving greater security and better connectivity. The mechanisms that need nodes have prior knowledge of their location, they can only be used in applications where the network is deployed in a manual and premeditated. However, they have a advantage over other mechanisms when used master keys that the attacker does not know and therefore both encryption keys cannot be generated and decryption [15]. The algorithm [19], can force the exit of a node compromised, by isolating it from the system when generates damage to the network, but its effectiveness it depends on the resources of the node. Some schemes, although they are novel, possess great computational complexity [22] or compromise chip size and increase node power consumption, decreasing its life time [23] The mechanisms that have heterogeneous networks, enjoy the advantage over systems homogeneous, the possibility of downloading the security to nodes that have greater resources processing and storage, achieving ease the functioning of common nodes and in general of the network. Within the open topics for future work, the following aspects are found: Improve the ability to add and remove nodes in the network without compromising system security. Reduce energy consumption, decrease header or overhead of messages generated by the different algorithms. Check the effectiveness of mechanisms in various networks and topologies. Improve policies to renew passwords that allow to reduce the time of operation. IV. SIMULATION TOOLS In most cases the devices used for the implementation of sensor networks wireless are characterized by being small, autonomous, very numerous and with important energy limitations. All these factors cause the analytical studies to be carried out to be very complex and experimental studies very expensive. Therefore, we see the need that exists by researchers and developers of carry out previous simulations [1] before the physical implementation of these networks.
  • 7. International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-11, Issue-5 (October 2021) www.ijemr.net https://doi.org/10.31033/ijemr.11.5.7 63 This Work is under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. Preliminary simulations are essential before the implementation of the WSN's, especially if this entails new protocols and functionalities network. This fact has caused a boom in simulation tools available. Without However, obtaining reliable results and representative through simulations is not a simple task. V. CONCLUSION With this work, an approach to the Wireless Sensor Networks (WSN) topic, that find a multitude of applications in the current society and in them converge a good number of information technologies and communications. Safety is deepened as one of the most important study topics in the networks of wireless sensors, due to the inability to use conventional mechanisms against attacks, since the sensors have resources limited processing and storage. To obtain a good degree of security in the WSN, it is necessary to jointly execute the authentication mechanisms, key management and network intrusion detection. It is a field that is growing and evolving and where there is ample material, both for the research, such as for product development and applications. How future work will be studied more about optimization, design, deployment, distributed solutions and security in networks wireless sensors, and perform tests experiments of a model in a tool simulation. REFERENCES [1] Corral I. & Ana Belén. (2005). Design and implementation of a simulation environment for sensor networks wireless [Engineering from Telecommunication]. Polytechnic University of Cartagena. [2] RAAP. (2020). Wireless sensor networks. [3] Gomez M., Francisco. (2021). Sensor networks wireless. [4] Schaeffer Elisa. (2015). A look at the basics of optimization of sensor networks. [5] Franco B., Carlos. (2021). Trends: Wireless sensor networks. [6] TOSSIM. Available at: http://www.tinyos.net/. [7] http://www.cs.berkeley.edu/. [8] Ruiz M., Pedro. (2020). Introduction to sensor networks. Available at: http://ants.dif.um.es/rm/. [9] Zigbee Alliance. Available on: http://www.zigbee.org/. [10] Vinagre D. & Juan José. (2007). Routing theory in wireless ad hoc networks. Doctoral Thesis, Carlos III University of Madrid. [11] I. Mironov. (2005). Hash functions: Theory, attacks, and applications. Microsoft Research, Silicon Valley Campus. [12] L. Lamport. (1981). Password authentication with insecure communication. Commun. ACM, 24(11). [13] S. Emre Taşçı, E. Bayramoğlu, & A. Levi. (2008). Simple and flexible random key predistribution schemes for wireless sensor networks using deployment knowledge. In: International Conference on Information Security and Assurance. [14] W. Du, J. Deng, YS Han, S. Chen, & PK Varshney. (2004). A key management scheme for wireless sensor networks using deployment knowledge. IEEE Infocom. [15] Y. Ho Kim, H. Lee, & D. Hoon Lee. (2007). A secure and efficient key management scheme for wireless sensor networks. In: Security and Privacy in Communications Networks and the Workshops, Secure Comm 2007. Third International Conference, pp. 17-21. [16] J. Young Chun, Y. Ho Kim, J. Lim, & D. Hoon Lee. (2007). Location-aware random pair-wise keys scheme for wireless sensor networks. In: Third International Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing. [17] J. Luo, P. Papadimitratos, & JP. Hubaux. (2008). GossiCrypt: Wireless sensor network data confidentiality against parasitic adversaries. In: 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. [18] X. Yi, M. Faulkner, & E. Okamoto. (2008). Securing wireless sensor networks. In: Third International Conference on Availability, Reliability and Security. [19] MIT open Course Aware, Chapter 7: Introduction to finite fields. Electrical Engineering and Science Computing. [20] A. Shamir. (1979 Nov). How to share a secret. Communications of the ACM, 22(11), 656-715. [21] A. Hamid, M. Mahbub Alam, & C. Seon Hong. (2007 Feb). Developing a security protocol based on LCG and orthogonal matrices for wireless sensor networks. The 9th International Conference on Advanced Communication Technology. [22] DE Knuth. (1985). Deciphering a linear congruential encryption. IEEE Transactions on Information Theory, IT-X(1), 49-52.