You are on page 1of 3

Bonfring International Journal of Networking Technologies and Applications, Vol. 5, No.

2, April 2018 12

Survey on Data Aggregation through Orthogonal


Set Method for Wireless Sensor Network
N.S. Kavitha and Dr.G. Singaravel

Abstract--- Wireless Sensor Networks (WSNs) consist of application based environment and topology construction
small nodes with sensing, computation, and wireless patterns like square, triangle, circle, hexagonal etc., even
communications capabilities. Many routing, power though it needs the basic component to make the network to
management, and data dissemination protocols and energy communicate through the component support and essential
efficient data aggregation have been specially designed for belongings. The sensor node contains on-board sensors,
WSNs. In this paper, orthogonal method is proposed to verify processors, memory unit, transceiver the information and
the path direction between the two nodes and it is always power supply and sensor network consists of an outsized
perpendicular to other points with angle degree and finds the number of sensor nodes and deployed either inside or close to
direction of the data of the nodes sending as well as to find the monitored object/process. The collecting and sensed data
network path of the route travel for Security Data by an aggregation mechanism is called as data aggregation.
Aggregation. The limitations and challenges in many The data sensed by sensor nodes is sent to the base station
communication protocols according to this survey are pointed
[3][5]. As the sensor nodes need the base station, it may be
out, which will help future researches on the design of
located in very far away. In data gathering, the sensed data is
communication protocols for WSNs.
gathered systematically from multiple sensors and it will be
Keywords--- Wireless sensor network, Data Aggregation, sent to the sink for advance processing [4]. The basic concept
path direction of data, Orthogonal Set functions. and introduction part are required for this research work.

III. RELATED WORK ON VARIOUS ORTHOGONAL SET


I. INTRODUCTION
Time Division Multiplexed Orthogonal Stripes Pattern

I N modern years, the extensive research has opened


challenging issues about performance evaluation for
Wireless Sensor Networks (WSNs). The promising
It proposed surface inspection system for detecting small
defects on painted surface. The system used frequency
multiplexed orthogonal stripes, so that we can detect
technologies can be used to achieve a variety of goals and anisotropic defects. But there is a little cross talk that affects
objective from health monitoring to human healthcare
detection rate of tiny defects. In this paper, we propose time
activities, industrial automation, emergency management and
division multiplexed orthogonal stripes pattern projection
environmental monitoring system [1]. A designed process is
under single exposure. It is enabled by correlation image
required to collect data and report to a central unit, connected
sensor.
to the internet or monitored.
A WSN is a network composed of numbers of small Extraction Based on Orthogonal Matching of Fault
Diagnosis
independent sensor nodes and it helps to transmit and receive
the information gathered from location to another location In the proposed method, random orthogonal MP algorithm,
with a wide range of information and communication which is a greedy algorithm to match the atoms with
technology. The earlier development of wireless sensor probability, is utilized repeatedly to generate a group of
networks was originally inspired by military applications like competitive representations for the mechanical vibration
of GPS, surveillance etc. However, WSN are used in many signal. Then the estimated representation vector can be
environments such as habitat monitoring, healthcare obtained to represent the vibration signal and then transients
applications, home appliance automation, and traffic control. can be extracted from the noisy signal. The simulation study
Sensor network is equipped with components for radio and experimental analysis show that transients can be
transmitter and receiver, microchip, battery, topology design extracted effectively from the noisy vibration signal and
and communication devices [1][2]. comparison results between the proposed method and
orthogonal MP show that the proposed algorithm is less
II. BASIC REQUIREMENT OF WSN dependent on iterations and can obtain a better performance
for transients extraction.
Wireless Sensor Network (WSN) are deployed in many
Symmetric Ternary Functions of Orthogonal Transforms
In this proposed type, several systems of functions based
N.S. Kavitha, Assistant Professor, CSE, Erode Sengunthar Engineering
College, Thudupathi, Erode. E-mail:nskavi17@gmail.com
on symmetric ternary functions were developed. All
Dr.G. Singaravel, Professor and Head, IT, K.S.R.College of Engineering, developed systems of functions were tested for possibility of
Tiruchengode, Namakkal. E-mail:singaravelg@gmail.com being applied for representation of information flows using
DOI:10.9756/BIJNTA.8376

ISSN 2320-5377 | © 2018 Bonfring


Bonfring International Journal of Networking Technologies and Applications, Vol. 5, No. 2, April 2018 13

orthogonal transforms. An orthogonal system of functions multipath, and fading[3].


based on symmetric ternary functions was developed and
proved to be applicable in orthogonal transforms.
RFID Antenna of Orthogonal Performance
In this type, the performance of by interacting with shelved
library books is challenging since the RFID inlays are
orthogonal to the plane which is most desirable for RFID
interactions. There are a number of commercial solutions that
operate by inserting a thin RFID antenna between books in
order to achieve the desired coupling. These solutions have a
number of drawbacks including poor reliability and low read
rates. This paper describes the development of a novel antenna
head that is capable of orthogonal credential interaction.
Radio Model – Energy Consumption
IV. COMMUNICATION CHANNEL ET (m,d) = ETC (m)+ ETA (m,d)
Sensor nodes make use of ISM (Industrial, Scientific and Where;
Medical) radio bands which gives free radio, huge spectrum E TC = energy used by the transmitter circuitry ;
allocation and global availability. The various choices of E TA = energy required by the transmitter amplifier
wireless transmission media are Radio Frequency, Optical to achieve an acceptable signal to noise ratio or at the
Communication (Laser) and Infrared. Laser requires less receiver
energy, but needs light of sight for communication. Infrared
like laser, needs no antenna but is limited in its broadcasting ER (m) = meRC
capacity. Radio Frequency (RF) based communication is the ET (m,d) = m(eTC + eTA dα )
most appropriate to most of the WSN applications. WSN’s use
the communication frequencies between about 433 MHz and e TC , e TA , and e RC are hardware dependent parameters.
2.4 GHz. The functionality of both transmitter and receiver are Ultra Wideband (UWB) is a radio technology that can be
combined into a single device know as mentioned before as used at very low energy levels for short-range high-bandwidth
transceiver are used in sensor nodes. The operational states are (>500MHz) and communications by using a large portion of
Transmit, Receive, Idle and Sleep. the radio spectrum. A difference between traditional radio
transmissions and UWB radio transmissions is that traditional
As WSN use the RF communication, it is an easy job to systems transmit information by varying the power level,
use the available wireless technologies such as Zigbee, Wi-Fi frequency, or phase of a sinusoidal wave. UWB transmissions
or 3G. This means that there is no worry about the transmit information by generating radio energy at specific
fundamental aspects of Modulation. A basic technique used in time instants and occupying large bandwidth thus enabling a
wireless communication is phase-shift keying (PSK), where pulse-position or time-modulation.
many different schemes of PSK are used such as Multiple
PSK (M-PSK) or Binary PSK (BPSK). Anyway, in PSK the
V. AVAILABLE WSN PROTOCOLS
frequency and amplitude of the carrying signal are kept
constant, where logic 1 is represented by π-phase shift and As WSN uses the free ISM bands, this may affect the
logic 0 is represented by 0-phase shift [3]. performance of the channel due to the interference that may
occur. For example, microwave ovens using frequency of
There have been studies to reduce the energy dissipation 2.45MHz may overwhelm many WSN in the 2.4MHz.
by selecting the appropriate modulation scheme, for different Anyway, IEEE protocols are broadly used and are mostly
schemes, the bit error rate (BER) is characterized b the ratio of implemented in WSN technology. There are several WSN
the energy per bit to the noise power spectral density as shown protocols; the most widely used are 1) IEEE 802.11 a/b/g/n; 2)
in Fig.5. IEEE 802.15.4 (ZigBee); 3) IEEE 802.15.1 (Bluetooth). The
data rate differs from one protocol to another. [2]
IEEE 802.15.1 (Bluetooth)
Bluetooth is a wireless protocol for short-range RF bands,
designed for small variety of tasks, such as synchronization.
There are two versions of Bluetooth, Bluetooth1.2 with a
maximum data rate of 1Mbps. The newest version is
Bluetooth2.0 and its maximum data rate is 3Mbps.
IEEE 802.11 (WLAN)
Energy consumption minimization is an important when This is a well-known protocol with different versions each
designing the physical layer for WSN in addition to the usual with its own applications.
effects such as scattering, shadowing, reflection, diffraction,

ISSN 2320-5377 | © 2018 Bonfring


Bonfring International Journal of Networking Technologies and Applications, Vol. 5, No. 2, April 2018 14

1) High-bandwidth context (VoIP) uses IEEE example, a cryptographic key.


802.11 g Conflicts
2) Support QoS over wireless uses IEEE 802.11 e
In a high-density sensor network if packets meet in the
3) Secure communications uses IEEE 802.11 i middle of transfer, conflicts will occur and the transfer itself
Different schemes of modulation are used in the IEEE will fail which can be a major problem in providing security.
802.11 family, some use Orthogonal Frequency-Division
Latency
Multiplexing (OFDM), other use Direct Sequence Spread
Spectrum (DSSS). The multi-hop routing, network congestion, and node
processing can lead to the latency of the network, thus make it
IEEE 802.15.4 (ZigBee) difficult to achieve the synchronization among sensor nodes.
ZigBee is the preferred protocol to be deployed in WSN The synchronization issues can be critical to sensor security.
since it meets the requirements of low-cost and low-power
WSNs for remote controlling and monitoring. Because the VIII. CONCLUSION
previes protocols provide high data rate in the expense of high Designing of a topology aware data aggregation tree is
power consumption, application complexity and cost. proposed in which the nodes with more bandwidth and energy
are selected as aggregators. The Orthogonal method finding
VI. OBSTACLES OF SENSOR SECURITY the outcomes which to help the direction of nodes with angle
A wireless sensor network is a special network which has values and to ensure the data aggregate with valid data and
many constraints comparing to the other networks. These sending with security. These three outcome points to making
constraints make difficult to directly employ the existing effective transmission through orthogonal set function
security to the wireless sensor networks. The followings are calculation to verify the angle of direction of among nodes
the brief discussion on these constraints of a sensor network direction.
[5].
Limited Resources: Security approach requires a certain REFERENCES
amount of resources for the implementation, including data [1] D.W. Carman, “New Directions in Sensor Network Key Management”,
International Journal of Distributed Sensor Networks, Vol.2, No.1, Pp.
memory, code space, and energy to power the sensor. 3-15, 2005.
However, currently these resources are very limited in a tiny [2] E. Hariprasad, J.S.V.R.S. Sastry and N. Subhash Chandra, “Vastly
wireless sensor. Efficient Key Pre Distribution and Authentication scheme for Wireless
Sensor Networks”, SSRG International Journal of Computer Science and
Limited Memory and Storage Space: A sensor is a tiny Engineering, Vol.1, No.7, 2014.
device with only a small amount of memory and storage space [3] E.K. Wang, L.C.K. Hui and S.M. Yiu, “A New Key Establishment
for the code. In order to build an effective security Scheme for Wireless Sensor Networks”, International Journal of
Network Security and its Applications, Vol.1, No.2, 2009.
mechanism, it is necessary to limit the code size of the [4] K. Kumar, A.K. Verma and R.B. Patel, “Secure Multipath routing
security algorithm. For example, one common sensor type has scheme using key pre-distribution in wireless sensor network”,
an 8-bit, 4MHz CPU only with only 4.5K available disk space International Journal in Foundations of Computer Science &
(Table I). Due to such limitation, the security related code Technology, Vol.4, No.4, 2014.
[5] K.M. Martin and M.B. Paterson, “Ultra-Lightweight Key redistribution
must also be quite small. in Wireless Sensor Networks for Monitoring Linear Infrastructure”,
Limitation Power Energy: Limited power is the biggest Information Security Group Royal Holloway, University of London
supported by EPSRC grant EP/D053285/1.
constraint of the wireless sensor networks. It is not feasible to [6] A. Manoj Kumar, P. Jaya prakash, M.Giri, D. Bibicu and L. Moraru,
replace or recharge the thousand of high cost of sensors. “Providing efficient measurable key by using unital based key pre-
Therefore, the battery charge taken with them to the field must distribution scheme for wireless sensor networks”, IOSR Journal of
be conserved to extend the life of the individual sensor node as Computer Engineering, Vol.16, No.5, Pp. 121-124, 2014.
[7] J. Jose, J. Jose and F. Jose, “A Survey on Secure Data Aggregation
well as the entire sensor network. The processing of security Protocols in Wireless Sensor Networks”, International Journal of
related functions (e.g., encryption, decryption, signing data, Computer Applications, Vol.55, No.1, 2012.
verifying signatures) consume extra battery power. [8] N.S. Patil and P.R. Patil, “Data Aggregation in Wireless Sensor
Network”, IEEE International Conference on Computational Intelligence
and Computing Research, 2010.
VII. UNRELIABLE COMMUNICATION [9] S. Ozdemir and Y. Xio, “Secure Data Aggregation in Wireless Sensor
Unreliable communication is another key challenge to Networks: A Comprehensive Overview”, Journal of Computer
Networks, Elsevier, Vol.53. No.12, Pp. 2022–2037, 2009.
sensor security. The network security depends on network [10] L. Hu and D. Evans, “Secure Aggregation for Wireless Networks”,
protocol, which in turn depends on communication. Symposium on Applications and the Internet Workshops, Pp. 384-391,
2008.
Unreliable Transfer [11] B. Przydatek, D. Song and A. Perrig, “SIA: Secure Information
The packet-based routing of the sensor network is Aggregation in Sensor Networks”, Proceedings of the 1st International
Conference on Embedded Networked Sensor Systems, Pp. 255-265,
normally connectionless and thus inherently unreliable. 2003.
Packets may get damaged due to channel errors or dropped at [12] V.A. Bohara, “An orthogonal spectrum sharing scheme for wireless
highly congested nodes. The result is lost or missing packets. sensor networks”, Proceeding of EURASIP Journal on Wireless
If the protocol lacks of appropriate error handling, it is Communications and Networking, 2011.
possible to lose critical security packets. This may include, for

ISSN 2320-5377 | © 2018 Bonfring

You might also like