You are on page 1of 35

MOTION CAPTURE WEARABLE SENSORS COLLECTING

HUMAN MOVEMENTS AND THE DATA PROCESSED BY


RELEVANT ALGORITHMS IMPLEMENTED IN THE
CLOUD FOR EXTRACTING SPECIFIC MOTION PATTERNS
OF INTEREST
Table of Contents
Background and motivation....................................................................................................3
1. Linking of sensor network..................................................................................................3
1.1. Sensing Strategy..........................................................................................................4
1.2. Sensor Classifications..................................................................................................4
2. Wireless Sensor Networks..................................................................................................5
3. Literature Review...............................................................................................................6
4. Communication through wireless sensor network..............................................................8
4.1. Challenges in Wireless Sensor Network.........................................................................9
4.1.1. Challenges related to Management......................................................................9
4.1.2. Design related Challenges....................................................................................9
4.2. Types of wireless sensor networks............................................................................10
4.2.1. Terrestrial Wireless Sensor Networks................................................................10
4.2.2. Underground Wireless Sensor Networks...........................................................10
4.2.3. Underwater Wireless Sensor Networks.............................................................10
4.2.4. Multi-media Wireless Sensor Networks............................................................10
4.2.5. Mobile Wireless Sensor Networks.....................................................................10
4.3. Wearable mechanical sensors....................................................................................11
4.3.1. Piezoresistive Sensors........................................................................................11
4.3.2. Capacitive Sensors.............................................................................................11
4.3.3. ontronic Sensors.................................................................................................11
4.3.4. Piezoelectric Sensors..........................................................................................11
Problem Formulation.............................................................................................................12
1. Technical Problems Regarding Wearable sensors............................................................12
1.1. Fault –tolerant Communication.................................................................................12
1.2. Low latency...............................................................................................................12
1.3. Scalability..................................................................................................................12
1.4. Transmission Media..................................................................................................12
1.5. Coverage Problems....................................................................................................12

1
2. Technical complexities in wearable sensors.....................................................................12
2.1. Ergonomics................................................................................................................12
2.2. Sealing.......................................................................................................................13
2.3. Integration..................................................................................................................13
2.4. Safety, Security and Privacy......................................................................................13
Technical complexities and areas of specific interest..........................................................15
1. Sensing..............................................................................................................................15
2. Data Transmission............................................................................................................16
3. Cloud Implementation......................................................................................................16
4. Analytics...........................................................................................................................18
5. Assumptions related to wearable wireless technology.....................................................20
6. Limitations........................................................................................................................20
6.1. Cause distractions......................................................................................................20
6.2. Very Expensive.........................................................................................................20
6.3. Size and technical limitations....................................................................................20
6.4. Privacy Concerns.......................................................................................................20
Data Handling Issues.............................................................................................................21
1. Security and Privacy issues...............................................................................................21
1.1. Energy related Challenges.............................................................................................21
1.1.1. Challenges related to electrical impedance............................................................22
2. Addressing the security and privacy issues......................................................................22
3. Protocols to address the security issues............................................................................23
3.1. Wired Equivalent Privacy WEP................................................................................23
3.2. Wi-Fi Protected Access WPA...................................................................................23
3.3. Wi-Fi Protected Access version 2 WPA2.................................................................23
4. Ensuring security in Wireless Networks...........................................................................24
4.1. Encryption.................................................................................................................24
4.2. Firewall......................................................................................................................24
4.3. Off the network..........................................................................................................24
Meeting Industry Standards.................................................................................................25
1. Bluetooth (IEEE 802.15.1)...............................................................................................25
2. Zigbee (IEEE 802.15.4)....................................................................................................25
2.1. Ad Hoc Development................................................................................................25
3. Wi-Fi (IEEE 802.11a/b/g/n).............................................................................................26
Discussion................................................................................................................................27

2
1. Other approaches in Wearable Wireless sensor networks................................................27
1.1. Centralized Wireless Sensor Networks.....................................................................27
1.1.1. Single Sink.........................................................................................................27
1.1.2. Multi-sink...........................................................................................................27
1.1.3. Multiple Task Devices.......................................................................................27
1.2. Hierarchal wireless sensor networks.........................................................................27
1.3. Static wireless sensor networks.................................................................................27
2. Limitations in Wearable Wireless Sensor Network..........................................................27
2.1. Limitations related to Management...........................................................................27
2.2. Energy limitations.....................................................................................................28
2.3. Design related Limitations........................................................................................28
Conclusion...............................................................................................................................29
References...............................................................................................................................30

List of Figures:
Figure 1: Acquiring and actuation of Data.................................................................................5
Figure 2: Physical properties and examples of sensors..............................................................6
Figure 3: Wireless sensor network checking two diverse geographic areas..............................7
Figure 4: Comparison between single hop and multi-hop in WSN.........................................10
Figure 5: Different modalities of mechanical sensors..............................................................12
Figure 6: Samsung Galaxy Note 7 battery explosion...............................................................14
Figure 7: Sensor sensing the human movement.......................................................................16
Figure 8: Block diagram of intrabody communication system................................................17
Figure 9: Linkage between cloud computing and wearable technology..................................18
Figure 10: Modes of wearable devices.....................................................................................19
Figure 11: wearable data analysis, visualisation and recommendation...................................20
Figure 12: Major issues related to the Wireless sensor networks............................................22
Figure 13: Authorization of Bluetooth device.........................................................................24

3
Background and motivation
Wireless sensor networks are known as self-designed in order to check the environmental
conditions like sound, temperature and other vibrations and movements. There is a station
which is used as a medium interface for different clients and the main hub. There
responsibilities are to get the acquired data by using different queries and then fuse the
outcomes toward the sink. A hub having qualities like remote sensing is attached for
detecting and processing the other gadgets. In remote sensing environment the individual
hubs are used which convey the transmissions compelled. They also get information
regarding handling speed, limit and the transmission capacity. When the sensor hubs are
completely deployed, they get information regarding arrangements suitable for the
organization. Now the locally deployed servers get the data and to respond to the queries sent
from the main hub. They perform several guidelines and tests for the detection of bugs. In
these days, remote sensing organizations are towards initializing new applications by using
the ideal models. This rouses a tremendous exertion in research exercises, normalization
measure, and modern ventures on this field since the most recent decade.

1. Linking of sensor network


Sensors are the computerized world interfaces which are using for which are used for
revealing and converting the phenomena from the fact that the information can be processed
and stored. Synchronized into different appliances, machines, and conditions, sensors give a
enormous cultural gain. They can assist with evading cataclysmic foundation
disappointments, preserve valuable characteristic assets, increment profitability, improve
security, and empower new applications, for example, setting mindful frameworks and
brilliant home innovations. The marvellous advances in advances, for example, enormous
scope incorporation, microelectromechanical frameworks, and remote interchanges further
add to the inescapable utilization of conveyed sensor frameworks. For instance, the amazing
advancements in semiconductor innovations keep on delivering chip with expanding
preparing limits, while simultaneously shrivelling [2]. The scaling down of registering and
detecting advancements empowers the improvement of small, low-power, and reasonable
sensors, actuators, and regulators. Apart from it, inserted registering frameworks keep on
discovering application in an expanding number of territories. While safeguard and aviation
frameworks actually overwhelm the market, there is an expanding centre around frameworks
to screen and secure common foundation, the public force matrix, and pipeline foundation
[3]. Organizations of many sensor hubs are now being utilized to screen enormous
geographic regions for demonstrating and anticipating ecological contamination and flooding,
gathering basic wellbeing data on spans employing vibration, and monitoring utilization of
water, and to expand crop wellbeing and amount.
1.1. Sensing Strategy
The strategy used to accumulate the data about an object is called Sensing. While the object
who is utilized in the sensing phenomena is known as sensor. Like if the human body is used
and different sensors like sound, scent are installed over there, then the body is configured as
sending and the devices used to get the information required is considered as sensors. There
is a type of sensor in it the sensor don’t need to connect to the body or the thing form where
we are opted to get the information. In these scenarios, sensors are placed out there and they
are getting the information at distant places. A sensor, is considered as a sort of transducer
that get the information from the outside world and then make changes internally according
to the information received. Figure 1 illustrates the means for detecting or obtaining the

4
information. There are a lot of examples in the real world where seen by a sensor gadget.
Here, an assortment of tasks are utilized in order to get additional utilization from the sensor.
Let us take an example, flags regularly entail enhancement in order to shift the sign size
towards all the more likely match the scope of the accompanying simple to-advanced
transformation. Further, signal moulding regularly applies channels to the sign to eliminate
undesirable commotion inside certain recurrence ranges. And these ranges are like high pass
channels can be utilized to eliminate 50 or 60 Hz clamour got by encompassing electrical
cables. In the wake of moulding, signs are shifted from computerized signal utilizing a
converter like ADC [4]. The sign is presently accessible in an advanced structure and
prepared for additional handling, putting away, or perception.

Figure 1: Acquiring and actuation of Data

1.2. Sensor Classifications


Which sensors ought to be picked for the utilization in an application, mainly the physical
estate of the sensor is to be checked? Like these properties are monitored because they are
going to incorporate different sensing capabilities like temperature, sound etc. Figure 2
incorporates some of the physical properties and some examples related to those properties.
Other than these assets, the characterization of sensors is founded by an assortment of
different techniques. The sensors may also require some outer force and in this case the
sensors are categorized as dynamic sensors. In this regard they are transmitting some sort of
vitality and then the reaction as a outcome is triggered so that the adjustment should be done
in the vitality of the input given. In some other case the sensors are inactive, and they receive
the vitality input and produce the capacity which collects infrared light transmitting from
objects in the locality [5].

5
Figure 2: Physical properties and examples of sensors

2. Wireless Sensor Networks


As various sensors communicate with controllers and taking care of bases genuinely, a
growing number of sensors grant the assembled data distantly to a consolidated planning
station. This is critical since numerous association applications require hundreds or thousands
of sensor center points, consistently sent in distant and closed off domains. Thusly, a distant
sensor has a recognizing part, yet also prepared taking care of, correspondence, and limit
capacities. With these updates, a sensor center is normally liable for data grouping, yet also
for in-network assessment, relationship, and blend of its own sensor data and data from other
sensor centers. Exactly when various sensors accommodatingly screen colossal physical
circumstances, they structure a distant sensor association (WSN). Sensor centers give with
each other just as with a base station (BS) using their distant radios, allowing them to scatter
their sensor data to far away getting ready, portrayal, assessment, and limit systems [6]. For
example, Figure 3 shows two sensor fields checking two differing geographic zones and
connecting with the Internet using their base stations.

Figure 3: Wireless sensor network checking two diverse geographic areas

6
The wireless sensor network capacities can change generally, that may screen the
unpredictable gadgets and then they are used widely in detecting strategies. They can
likewise contrast in their correspondence abilities, for instance, utilizing ultrasound, infrared,
or radio recurrence advancements with changing information rates and information
potentials. On the other hand, some sensors may just gather and impart data about the
watched condition, all the more impressive gadgets (i.e., gadgets with huge preparing,
vitality, and capacity limits) may likewise perform broad handling and conglomeration
capacities. These types of gadgets somehow accept the debts so that, they can be employed
by other resource centre at the base station [7]. At long last, a few gadgets may approach
extra supporting innovations, for instance, GPS recipients, permits so that they precisely
decide their stance. Nonetheless, these frameworks frequently expend an excess of vitality to
be possible for ease and low-power sensor hubs.

3. Literature Review
In this day and age, most of the investigation on WSNs has zeroed in on the arrangement of
essentialness and computationally profitable estimations and shows, and the application
territory has been kept to fundamental data arranged checking and uncovering applications.
The makers in [8] propose a Cable Mode Transition (CMT) count, which chooses the
inconsequential number of dynamic sensors to keep up K-incorporation of a scene similarly
as K-accessibility of the association. Specifically, it assigns seasons of torpidity for connect
sensors without impacting the consideration and accessibility necessities of the association
subject to close by information. In [9], a deferral careful data grouping network structure for
distant sensor networks is proposed. The objective of the proposed network structure is to
restrict delays in the data collection patterns of far off sensor networks which grows the
lifetime of the association. In [10] the authors have considered hand-off center points to
mitigate the association numerical deficiencies and used Particle Swarm Optimization (PSO)
based estimations to locate the ideal sink zone concerning those hand-off centers to overcome
the lifetime challenge. Essentialness profitable correspondence has also been tended to in
[11]. In [12], the makers proposed a numerical response for finding the ideal sink
circumstance for intensifying the association lifetime. Usually, the assessment on far off
sensor networks have contemplated homogeneous sensor centers. However, nowadays
experts have focused in on heterogeneous sensor networks where the sensor centers are not at
all like each other with respect to their imperativeness. In [13], the makers keeps an eye on
the issue of sending move centers to outfit transformation to inside disappointment with
higher association accessibility in heterogeneous far off sensor associations, where sensor
center points have particular transmission radii. New association structures with
heterogeneous contraptions and the progressing progress in this advancement murder the
current limitations and develop the scope of likely applications for WSNs fundamentally and
all these are evolving rapidly.
Motion capture, as the name infers, is "the recreation and re-enactment of the test item's
movement conduct." In logical language, the model can be rehashed to test the development
of an article through procurement of the movement information of the test item and planning
of these information onto the movement catch centres around the connection cycle among
people and PCs. A past report [10] portrayed optical movement catch in detail. Inertial
movement catch includes human movement catch information got from the subject who

7
wears appendage sensor hubs on the objective unit. Subsequently, the movement model
accomplishes movement reproduction. In the current examination, we centre around the issue
of inertial movement catch.
Broad assessment is being done in the area of Wireless Sensor Networks. Researchers have
been zeroing in on understanding a combination of incites going from limited resource
capacities to ensure about correspondence. Composing shows that sensor networks are sent
visible to everyone or gave up zones, over questionable distant channels [14]. It is
subsequently engaging for a harmful device/gatecrasher to tune in or mix messages into the
association. The standard response for this issue has been to take up techniques, for instance,
message approval codes, public key cryptography and symmetric key encryption plans. In
any case, since there are resource deficiencies for bits, the critical test is to devise these
encryption systems in a profitable way without yielding their inadequate resources. One
method for securing any association against outside attacks is to apply an immediate key
system. Regardless, it is understood that overall keys don't give network adaptability and pair
canny keys are not healthy game plan. A more instinctual game plan is required for WSNs.
TinySec [15] familiar security with the association layer of TinyOS suite [16] by joining
programming based symmetric keying with low working cost requirements. Not all
shortcomings present in TinySec could be would in general for example systems to evade
insider attacks. Curiously, Zigbee or the 802.15.4 standard [17] introduced equipment based
symmetric keying with progress. Regardless, in order to give thorough security, use of public
cryptography to make secure keys all through association course of action and backing stages
[18] is also being tested. This thought has opened an unheard locale for discussion of sensor
network cryptographic system. Inevitable assessment is in like manner being done on
focuses, for instance, key amassing and key sharing [19], key security [20] and shared key
pools [21]. By and by, since sensor center points need to bundle planning to fulfill a
particular endeavor, it is needed that the social affair people's contrary ensuring about
between each other, in spite of the truth of overall security in like manner present. Be that as
it may, contrary to this reality secure social occasion has been examined to a low degree
already and only two or three careful courses of action exist. Further, notwithstanding the
way that, data amassing (sensor centers absolute recognized data from condition before
finally conveying it to the base station) is one of the promising methodology to diminish cost
and association traffic yet such data is reliably powerless to attacks by intruders. A challenger
with power over a conglomerating center point can choose to excuse reports or produce fake
reports, affecting relentless nature of the made data and now and again whole association as
well. The essential point here is to use versatile limits, which will have the choice to discover
and report made reports through showing believability of the data by somehow. Wagner [22]
developed a technique in which aggregator uses hash trees to make confirmation of its
neighbors' data, which in this way is used to affirm righteousness of accumulated data to the
base station.
As a group with the Rockwell Science Center, the University of California at Los Angeles
proposed the possibility of Wireless Integrated Network Sensors or WINS [23]. One
consequence of the WINS adventure was the Low Power Wireless Integrated Microsensor
(LWIM), conveyed in 1996 [24]. This splendid distinguishing structure relied upon a CMOS
chip, fusing different sensors, interface circuits, progressed sign getting ready circuits, far off
radio, and microcontroller onto a lone chip. The Smart Dust adventure [25] at the University

8
of California at Berkeley focused in on the arrangement of little sensor centers called bits.
The goal of this endeavor was to display that a complete sensor structure can be fused into
tiny devices, maybe the size of a grain of sand or even a buildup atom. The PicoRadio
adventure [26] by the Berkeley Wireless Research Center (BWRC) bases on the headway of
low-power sensor contraptions, whose power usage is little to the point that they can control
themselves from essentialness wellsprings of the working condition, for instance, daylight
based or vibrational imperativeness. The MIT µAMPS (microAdaptive Multidomain Power-
careful Sensors) adventure also bases on low-power hardware and programming parts for
sensor centers, including the use of microcontrollers prepared for dynamic voltage scaling
and techniques to remake data dealing with counts to decrease power essentials at the item
level [27], [28]. While these previous undertakings are commonly dictated by educational
foundations, throughout the latest decade different business tries have similarly appeared
(numerous reliant on a bit of the insightful undertakings portrayed above), including
associations, for instance, Crossbow (www.xbow.com), Sensoria (www.sensoria.com),
Worldsens (http://worldsens.citi.insa-lyon.fr), Dust Networks
(http://www.dustnetworks.com), and Ember Corporation (http://www.ember.com) [29], [30].
These associations allow to purchase sensor devices arranged for sending in a variety of use
circumstances close by various organization devices for programming, backing, and sensor
data portrayal.

4. Communication through wireless sensor network


The notable IEEE 802.11 group of norms was presented in 1997 and is the most widely
recognized remote systems administration innovation for portable frameworks. It utilizes
diverse recurrence groups. While IEEE 802.11, oftentimes utilized in the early organizations,
whenever the data transfer capacity requests are high (e.g., for sight and sound sensors) [31].
Regardless, the high-essentialness overheads of IEEE 802.11-based associations makes this
standard inadmissible for low-power sensor associations. Typical data rate essentials in
sensor networks are like the exchange speeds surrendered by dial modems, thusly the data
rates gave by IEEE 802.11 are generally significantly higher than required. This has
provoked the progression of a combination of shows that better satisfy the associations'
necessity for low power use and uninformed rates. For example, the IEEE 802.15.4 show [32]
has been arranged unequivocally for shortrange exchanges in low-power sensor associations
and is maintained by commonly academic and business sensor centres.

9
Figure 4: Comparison between single hop and multi-hop in WSN
Figure 4 illustrates the two stations and their comparison by sending information. Every
sensor hub discusses legitimately towards the base station utilizing a solitary bounce. While
the sensor networks frequently spread huge environmental territories and the transmission
through radio force ought to monitor vitality; therefore, multi-bounce correspondence is the
more normal case for sensor networks as represented in Figure 4. In this work geography,
sensor hubs must catch and disperse their own information, yet additionally fill in as transfers
to the hubs, in order to team up to spread sensor information towards the main hub. At the
point when a hub fills in as a hand-off for numerous courses, it regularly has the chance to
investigate and pre-measure sensor information in the organization, which can prompt the
disposal of repetitive data or accumulation of information that might be littler than the first
information.

4.1. Challenges in Wireless Sensor Network


4.1.1. Challenges related to Management
The idea behind various sensor applications is to work in distant zones also, unforgiving
situations, without framework uphold or the opportunities for support also, fix. Hence, sensor
hubs must act naturally overseeing in that they design themselves, work and team up with
different hubs, and adjust to disappointments, alterations in the earth surface, furthermore,
fluctuations in the natural boosts devoid of manly mediation [36].
4.1.2. Design related Challenges
While the abilities of customary registering frameworks keep on expanding quickly, the
essential objective of remote sensor configuration is to make littler, less expensive, and other
effective mechanisms [39]. In order to implement devoted applications having vitality
utilization, run of the mill sensor hubs have the handling paces and capacity limits of PC
frameworks from a very long while back. The requirement for little structure factor and low
vitality utilization additionally disallows the mix of numerous attractive segments, for
example, GPS beneficiaries. These limitations and necessities additionally sway the product
plan at different levels, for instance, working frameworks must have little memory
impressions and must be productive in their asset the executive’s errands [40], [41]. Be that
as it may, the absence of cutting-edge equipment highlights (e.g., uphold for equal
executions) encourages the plan of little and effective working frameworks. A sensor's
10
equipment limitations additionally influence the plan of numerous conventions and
calculations executed in a WSN.
4.2. Types of wireless sensor networks
There are mainly five types of wireless sensor networks which are as follows:
1. Terrestrial Wireless Sensor Networks
2. Underground Wireless Sensor Networks
3. Underwater Wireless Sensor Networks
4. Multi-media Wireless Sensor Networks
5. Mobile Wireless Sensor Networks
4.2.1. Terrestrial Wireless Sensor Networks
It mainly consists of thousand of nodes network in a specific area. The node network can be
in pre-planned manner in which the models are deployed in either in grid or in optimal form.
And it can be in ad-hoc manner in which nodes are placed in random order without any
specific manner.
4.2.2. Underground Wireless Sensor Networks
Underground wireless sensor network is mainly used to monitor the underground conditions.
Like you can say they are placed in the caves or mines or other underground areas. Mainly
the primary nodes are installed underground but some sink nodes are there which are
deployed above the ground. Their main function is to connect the base station to the primary
nodes and transmit the information between them. It is more expensive because more
equipment is required in deployment and maintenance.
4.2.3. Underwater Wireless Sensor Networks
As the name suggests it is placed underwater and its main function is to get the information,
or you can say they are deployed to monitor the life or the circumstances inside the water.
Mainly the primary nodes are installed underground but some sink nodes are there which are
deployed above the ground. Their main function is to connect the base station to the primary
nodes and transmit the information between them. They are mainly developed by the help of
acoustic waves.
4.2.4. Multi-media Wireless Sensor Networks
These networks use multimedia for the monitoring and tracking of events. In wireless sensor
networks there are a lot of nodes having cameras as microphones. These nodes are used to
interconnect and for the retrieval of data. They are mainly deployed in pre-planned manner,
but they have named for high energy consumption and high bandwidth.
4.2.5. Mobile Wireless Sensor Networks
It consists of many sensor nodes that have the ability to move and interact with each other
without any type of guide. They have many abilities including sensing, computing,
communicating etc. They organize their self in the network and spread out to gather
information. Then after collecting the information, the nodes communicate with each other
using fixed routing or flooding. They have challenges like deployment, localization, and data
processing [33].
4.3. Wearable mechanical sensors

11
In motion sensors the motion reconstruction is focused on the issues generated by the inertial
capture of motion. Mainly the four classes of sensors are discussed which are as follows:
1. Piezoresistive,
2. Capacitive,
3. Iontronic, and
4. Piezoelectric. 
4.3.1. Piezoresistive Sensors
The essential standard of the piezoresistive weight sensor is to utilize a strain check produced
using a conductive material that changes its electrical obstruction when it is extended. The
strain check can be joined to a stomach that perceives an adjustment in opposition when the
sensor component is disfigured. The illustration modality is shown in Figure 5.
4.3.2. Capacitive Sensors
Capacitive vicinity sensors are non-contact gadgets that can identify the presence or
nonattendance of practically any item paying little heed to material. They use the electrical
property of capacitance and the difference in capacitance dependent on an adjustment in the
electrical field around the dynamic essence of the sensor. The illustration modality is shown
in Figure 5.
4.3.3. ontronic Sensors
It is an emerging technology which works on ions, and they are used to control the signal
carriers that provide connection to solid state electronics and biological system. In it the
neurons are polarized and depolarized with the help of ions and transport the material towards
the cell membranes. The illustration modality is shown in Figure 5.
4.3.4. Piezoelectric Sensors
It is a device which helps to compute the pressure, acceleration, temperature, strain, or force
by transforming them to electric command [34]. The illustration modality is shown in Figure
5.

Figure 5: Different modalities of mechanical sensors

12
Problem Formulation
Wireless sensor networks are the self-organized ones and they are distributed by covering a
large area. Their main idea is to distribute the sensing nodes and by the help of these nodes it
is able to communicate with the other networks or devices. By connecting these nodes and
networks a huge network is formed which communicate, send data, receive data including
many other functioning. But along with these there are various types of threats or loopholes
which the network is facing every time.

1. Technical Problems Regarding Wearable sensors


There are issues and challenges, which are as follows:
1.1. Fault –tolerant Communication
In the uncontrolled and harsh environment, sometimes the nodes become faulty and
unreliable.
1.2. Low latency
The occasions which the structure manages are earnest which ought to be perceived quickly
by the administrator. Subsequently, the structure needs to identify and tell the occasions
rapidly as quickly as time permits.
1.3. Scalability
A framework, whose exhibition improves in the wake of including equipment, relatively to
the limit included, is supposed to be a versatile framework. The quantity of sensor hubs
conveyed in the detecting territory might be in the request for hundreds or, at least thousands.
1.4. Transmission Media
In a multi-bounce sensor organization, conveying hubs are connected by a remote medium.
The customary issues related with a remote channel (e.g., blurring, high mistake rate) may
likewise influence the activity of the sensor organization.
1.5. Coverage Problems
One essential issue in remote sensor networks is the inclusion issue, which mirrors the nature
of administration that can be given by a specific sensor organization. The inclusion issue is
characterized from a few perspectives because of an assortment of sensor organizations and a
wide scope of their applications [35].

2. Technical complexities in wearable sensors

13
Along with these there are some technical complexities in wearable sensors which are as
follows:
2.1. Ergonomics
Ergonomics and solace are of prime significance, particularly in wearable gadgets that are
intended to be worn for an extensive stretch of time. Preferably, the solace levels ought to be
with the end goal that the client isn't continually helped to remember something extra tied
onto their body. In the long term usage, the devices may heat up which can harm the user.
2.2. Sealing
Waterproofing is another difficult region for wearables and necessities a devoted post, yet
since this is a diagram about wearable gadgets, we'll talk about waterproofing quickly.
Wearable items are presented to water and sweat at a few events during shower, washing
hands, or during brandishing exercises and for fluctuating length. Every one of these
circumstances request various degrees of assurance against water entering the gadget [36].
2.3. Integration
The antennae integration is challenging is mobile devices and with the wearable devices this
challenge become somehow higher. And for the effective integration strong strength is
required which is mainly difficult to achieve in multiple antennae devices. So as to give little
frame factors, makers are pushing the limits with Melded Interconnect Devices which can
implant parts like receiving wire legitimately into the lodging itself.
To counter the overall majority of USB connectors for charging, wearable gadgets are
progressively utilizing pin-type charging or remote charging, which likewise help in
waterproofing.
2.4. Safety, Security and Privacy
The batteries having lithium are considered as very dangerous. If they handle with less care,
then they can be led to loss of life. As all the wearable devices are very close to the body all
the time, so it is a potential threat to the body. For example, the Samsung batteries are
catching fire many times as illustrated in Figure 6, and a woman is also injured by exploding
her wrist. Along with these the wearable device also emit radiations and they are also
dangerous for the humans.

14
Figure 6: Samsung Galaxy Note 7 battery explosion
There are a lot of privacy issues regarding the wearable sensing devices. Like you can say
that the data is hacked and manipulated, sometimes because of the insecure communications
a lot of dangers happens. wearable tech devices are also used for spying, lack of encryption
and other vulnerabilities [37].

15
Technical complexities and areas of
specific interest
1. Sensing
Sensing is the way toward distinguishing and checking the physical attributes of a region by
estimating its reflected and discharged radiation a ways off (regularly from satellite or
airplane) as illustrated in Figure 7. Unique cameras gather distantly detected pictures, which
help scientists "sense" things about the Earth. A few models are:
 Cameras on satellites and planes take pictures of enormous zones on the Earth's
surface, permitting us to see considerably more than we can remaining on the ground.
 Sonar frameworks on boats can be utilized to make pictures of the sea depths without
expecting to venture out to the base of the sea.
 Cameras on satellites can be utilized to make pictures of temperature changes in the
seas.
Some particular employments of distantly detected pictures of the Earth include:
 Huge woodland flames can be planned from space, permitting officers to see an a lot
bigger region than from the beginning.
 Tracking mists to help foresee the climate or viewing emitting volcanoes, and help
looking for dust storms.
 Tracking the development of a city and changes in farmland or woods more than quite
a long while or decades.
 Revelation and planning of the rough geography of the sea depths [38].

16
Figure 7: Sensor sensing the human movement

2. Data Transmission
In the wearable devices, a device named as accelerometer is employed in order to control and
monitor the various processes in various mechanisms. The main idea of the accelerometer is
to communicate to the RF signals so that the transmission of the human activities is
monitored. They communicate through the electrical signals and they then start controlling
the electrical appliances. In the initial step the consumer is sited by the PIR sensor and then
based on the data collected the action of this reaction is taken place. There are some sensors
like eZ430 which is used for tracking the fitness of the human being. Mainly accelerometer is
named as the base platform for data collection and retrieval for wearable sensors. The block
diagram of intrabody communication sensors is shown in Figure 8.
The data is acquired by the accelerometer and the values are presented in 3 direction like X,
Y and Z. Some of the main features of accelerometer are:
 3 axis (x, y, z) accelerometer sensors are used for data graphs.
 Remotely control the environment.
 Time and data synchronization.
 Check the heat beat rate
 Update the software when needed.
The eZ430 which is a fitness sensor, consists of two modes, one is PPT mode and other is
Sync mode. At first the watch is set to ACC mode and then accelerometer transmit the data to
other wireless nodes. And when the access mode began the control centre displays and start
watch either in ACC or sync mode whatever the requirement is [39].

17
Figure 8: Block diagram of intrabody communication system

3. Cloud Implementation
There are a lot of advantages regarding the wearable technology and its popularity is
increasing day by day. But the real thing which is happening is internet of things. Because it
is the IoT which connects and provides linkage to different devices. A lot of new ways are
also provided to the people which help them to interact as illustrated in Figure 9. This all
happens because all the devices are connected through cloud and they are providing a easy
way out for communication. This technology is performing well by establishing high
proficiency. This type of connected devices has a lot of potential and they are very helpful in
making the life easier. Some said wearable innovation caused them to feel cannier, others
said there was improvement in their own effectiveness, while others said wearable tech
helped them with profession advancement.

As this technology is performing very well but on the other side there are a lot of hurdles
which the wearable technology is facing. It is said that wearable technology and cloud
computing is main considerate on data analyzation. But the data acquired through this
technology also needs a huge room of improvement. Like if better devices are used and they
are equipped with better sensors then the data acquisition and data analyzation is up to the
level. But if there is a slow processing unit, then this effect the data and its results efficiency.
So better ways are needed to add more cloud servers in order to maximize their processing
power.

18
Figure 9: Linkage between cloud computing and wearable technology

Distributed computing and wearable innovation go inseparably. Without distributed


computing, it's probable wearable innovation wouldn't be conceivable. There are different
ways wearable tech will get coordinated into our day by day lives in the coming years. As we
become used to the thought, we'll likewise realize that distributed computing is the
innovation fuelling it. We can anticipate that completely associated lives should a degree past
what we have even today [40].

19
4. Analytics
Data analytics is getting more common inside the IoT, giving organizations noteworthy data
dependent on the information that gadgets and sensors gather. Organizations are
progressively going to wearable gadgets to help representatives with their work, giving them
data and gathering information about the client as shown in Figure 10. Wearable information
investigation is empowering organizations to pick up knowledge into laborer measures,
persistent vitals, and client propensities, permitting educational choices to be made [41]. This
broke down information is more beneficial than the crude information, which can frequently
be overpowering and uninformative.

Figure 10: Modes of wearable devices


As illustrated in Figure 11, there is a flowchart which give us the use of wearable devices,
their visualization and analysis. A person is wearing a wearable device and then it starts
getting the data of the wearer by the help of machine learning mechanisms. And these devices
also help the wearer in fulfilling their needs and doing of daily chores. There are some of the
activities which the devices are doing in daily routines which are as follows:
1. They are getting the wearer information and tracking their activities.
2. The data is synchronized with the smart devices.
3. The data is transmitted between the smart phones and wearable sensors.
4. The results of the sensing devices are forwarded to the smart phones.

20
5. They also assist them in monitoring their goals in daily routines.
6. These wearable devices also update the revised goals [42].

Figure 11: wearable data analysis, visualisation and recommendation

21
5. Assumptions related to wearable wireless technology
 The wearable devices are very useful for the patients with the personalized data
regarding their health, and they also assist them in the diagnosis of the disease or if
there is change in behavioral involvements.
 A lot of concerns are arise regarding the safety, reliability, security and privacy of the
users data.
 The researchers are very hopeful that the advances in the technolgy may lead in
various fiels and also help the consumers in various effective ways.

6. Limitations
6.1. Cause distractions
The wearable wireless technology offers many distractions like the wearable watches are like
a fun tool or a gadget and as time passes a lot of updates are installed and it means that every
time there is some new thing to get distracted.
6.2. Very Expensive
As these devices are not that much cheap so they are not available to all the people. It might
be possibel the with the improvement in technology it gets cheap and then may be its
availability also increases.
6.3. Size and technical limitations
There are some devices that are goverened by technical limitations. Some are very huge in
size and somehow they are tricky and unreliable to some extent.
6.4. Privacy Concerns
As these devices aim is to track the people or to identify and check and daily routines. It
means all the data is saved in the servers and if any privacy issue creates then this result in
major consequences.

22
Data Handling Issues
Wireless networks contribute to numerous likenesses having disseminated frameworks, that
are exposed to an assortment of one-of-a-kind difficulties and requirements. These
imperatives sway the plan of a WSN, prompting conventions and calculations that vary from
their partners in other conveyed frameworks. This part depicts the most significant plan
requirements of a WSN.

Figure 12: Major issues related to the Wireless sensor networks

1. Security and Privacy issues


Numerous remote sensor networks gather delicate data. The distant and unattended activity of
sensor hubs expands their introduction to malevolent interruptions and assaults. Further,
remote correspondences make the other connections in order to sneak in other transmissions
and get data through this. For instance, main security dangers regarding the administration is
to refuse the guidelines and resulted into administration assault, which is used to disturb the
right activity of a device group. It is accomplished utilizing an assortment of assaults,
including a sticking assault, where powerful remote signs are utilized to forestall effective
sensor correspondences. The outcomes can be serious and rely upon the sensor network. As
multiple procedures and answers are conveyed regarding the frameworks for forestall assaults
or related to the degree furthermore, harm of these assaults, a considerable lot of these cause
critical computational, correspondence, furthermore, capacity necessities, which regularly
can't be fulfilled by asset obliged sensor hubs. As an outcome, senso-nets are in search of
new solutions for the foundation and circulation, hub verification, and mystery [43].

1.1. Energy related Challenges

23
The requirement frequently connected with the network configuration to hubs work with
constricted vitality spending plans. Normally, batteries are used to control them and then they
should be revived like utilizing sunlight-based force when exhausted. For certain hubs,
neither one of the options is fitting, like they are disposed when their vitality exhausted.
Either the battery can be stimulated or not, the process of vitality utilization is to be applied
[44]. On the other hand, for the non-rechargeable batteries, in order to proceed the work
sensor hub is opted to be there so that the main goal is going to be achieved. The research
developments may require sensors that can work for quite a long or sometimes it is used as it
is required like for a couple of hours or days [34].
1.1.1. Challenges related to electrical impedance
Skin-interfaced cathodes in wearable sensors transduce normally happening, time subordinate
ionic streams in the human body to quantifiable electrical signs; then again, as actuators, for
example, nerve incitement, they invigorate changes in these streams. The nature of chronicles
and the proficiency of incitement to a great extent rely upon the electrical impedance of the
cathode skin-body interface. The best interface ordinarily comprises of a 'wet' terminal
contact, commonly accomplished by a hydrogel or electrically conductive glue, both
containing electrolytes. Drawn out utilization of wet cathodes will likewise hydrate the skin,
lessening its electrical impedance. Without a wet contact (for example a dry anode) the
unpleasantness of skin presents pockets of air that can bring about a higher electrical
impedance. The electrical impedance of skin with a dry terminal can accordingly fluctuate
enormously with even slight changes in the weight of anode contact. We will proceed with
our conversation accepting a decent 'wet terminal' contact to the upper surface of the skin.
For this situation, the electrical impedance is restricted to the skin itself and the hidden body
[45].

2. Addressing the security and privacy issues


Comprehensively, the security prerequisites for wearable remote organizations can be
ordered into four kinds as appeared in Table VIII. Each remote organization is needed to
meet these necessities to ensure its security against noxious assaults. Truth be told, all data
security controls mean to address at any rate the three significant security prerequisites,
which incorporates ensuring the privacy of data, safeguarding the respectability of data, and
advancing the accessibility of data to approved clients. Table VIII sums up the significant
security prerequisites for remote organizations. It is exceptionally enlightening to take note of
that while these safety efforts are effortlessly actualized in wired organizations, they have all
the earmarks of being somewhat troublesome with remote organizations. For example, to
ensure against sticking assaults, a remote hub utilizes extra DSSS procedures.
Presently, consider the usage of one of the security prerequisites, for example, approval in a
Bluetooth innovation. A Bluetooth security engineering has a security supervisor as the key
segment answerable for validation, approval and encryption. Actualized on Bluetooth
innovation are classification, verification and key inference. The key is produced dependent
on a Bluetooth PIN, which must be gone into the two gadgets. During matching, an
introduction key or ace key is created, utilizing the E22 calculation. The approval cycle is
utilized to empower a Bluetooth gadget approach another gadget. Figure 13 illustrates the
authorization of the Bluetooth approval measure. While much advantages can be said about

24
the utilization of Bluetooth innovation, there are likewise a few difficulties [46]. Some of
which incorporate disavowal of-of-administration assaults, listening in, man-in-the-centre
assaults, message change, etc.

Figure 13: Authorization of Bluetooth device

3. Protocols to address the security issues


3.1. Wired Equivalent Privacy WEP
This is mainly a WIFI protocol. As data is transmitted over radio waves, it become easy for
the attackers to eavesdrop and interpret the data. So for this wired equivalent privacy is used
and it allows encryption and adds security and fulfils privacy in the wireless network [47].
3.2. Wi-Fi Protected Access WPA
WPA is a protocol used for security and its main aim is to create secure networks of WIFI.
As in WEP the system is provided with an authorized key but the key is same and in WPA
uses the protocol named as temporal key integrity. In this protocol the system continuously
changes the key [48].
3.3. Wi-Fi Protected Access version 2 WPA2
It is mainly a security method which is added in WIFI protected access. And it provides
somehow stronger data protection across the network access control. It provides the user
higher assurance level and the users access the network freely at any time.

25
Both WPA and WPA2 should make sure about remote Internet networks from unapproved
access. On the off chance that you leave your switch with no security, at that point anybody
can take the data transmission, perform illicit activities out of your association and name,
screen your web action, and effectively introduce pernicious applications in your organization
[49].

4. Ensuring security in Wireless Networks


4.1. Encryption
Encryption is considered as the efficient way to make the network more secure and privacy is
maintained to high extent. The threats like eavesdropping is minimized and the scrambling of
data is maintained for the transmission over the network. The message is encrypted by a
ciphertext and it maintain the data in the form so that it is difficult to intrude.
4.2. Firewall
Firewall is named as an anti-virus and anti-spyware software, and it helps in maintaining the
security of wireless communication networks. It mainly prevents unlicensed user to gain
access in a private network. It is a set of programs are installed and they serve as a network
gateway. Its main function is to protect the private network from other networks.
4.3. Off the network
As it is said that the network cannot be scammed when it is shut down. So, when the work is
down keeping the router turns off. In this way the threat can be limited, and the time of a
susceptible hack is also calculated.

26
Meeting Industry Standards
There are some standards which are designed in order to support the sending and they are
being adapted in different applications. These ones are as follows:
 Personal Area Network (PAN) technologies which include Bluetooth (IEEE 802.15.1)
 Wireless Sensors Network (WSN) technologies which includes Zigbee (IEEE
802.15.4)
 Wireless Local Area Network (WLAN) technologies, such as Wi-Fi (IEEE
802.11a/b/g/n)

1. Bluetooth (IEEE 802.15.1)


As it is known that the Bluetooth technology is designed and developed for the short ranges.
This standard in wireless communication is mainly connecting the personal carrying devices.
This wireless technology works on 2.4 GHz and it means that 2 to 8 devices in a short range
can be connected. They are hoping in the same physical channel and with the help of
synchronization their connected time and resources are synchronized. Its main feature is
robustness and its mainly takes low power and it is considered as low-cost devices. The
Bluetooth network mainly works on the star topology, and fewer channels are created in
order to pair up the devices. The synchronization is fast enough, and it supports Bluetooth LE
and it is improving day by day and getting attentions in various applications.

2. Zigbee (IEEE 802.15.4)


It is a standard which is used in wireless commination and sensing networks. Zigbee is
mainly considered as low-power and short distance standard. It is a alliance based and it
words on low rate WPAN standard. The license free bands are used named as ISM bands
they have bandwidth of 2.4 GHz. It is a broad network which mainly allows unicast,
multicast and broad cast networking in ad hoc networks. The topologies used in this standard
are mesh, cluster tree and star network topologies. There are different roles of nodes like
some are working as a coordinator and some are routers while some are the end devices. The
main role of coordinator is to give network information and provides linking. While the main
role of router is to transmit the data from one device to another device. And the main role of
end devices is to communicate when needed.
2.1. Ad Hoc Development
Numerous remote sensor network applications don't need foreordained and designed areas
related to the particular sensor hubs. Most of the times, it is especially significant for systems
being conveyed in distant or difficult to reach regions [37]. For instance, sensors serving the
evaluation of front line or hazardous situations could be tossed from planes over the zones of
intrigue, however numerous sensor hubs may not endure such a drop and may always be
unable to start their detecting exercises. Notwithstanding, the enduring hubs should self-
ruling play out an assortment of arrangement furthermore, the foundation corresponding with
neighbouring hubs, deciding their locations, and the establishment regarding the detecting
obligations [38]. The activity related to the sensor hubs vary dependent on data, for instance,
a hub's area and quantity connections of neighbours. This process gets the information and
decides what kind of beneficial data is created.

27
3. Wi-Fi (IEEE 802.11a/b/g/n)
This family of standards are very famous because of their fast speed and their availability at
low prices. It is mainly deployed on the medium access control and physical layers.
Categorically it is divided into Infra-red, Direct Sequence Spread Spectrum (DSSS) and
Frequency Hopping Spread Spectrum (FHSS). Their speed is increased by adding a new
standard which is named as 802.11g. the bandwidth is 2.4 GHz in 802.11b and operates on
Direct sequence spread spectrum, while 802.11g operates on both direct sequence spread
spectrum and frequency division multiplexing methods. This technology is considered more
then sufficient as it is facilitating with the need of access points [50].
While IEEE 802.11, oftentimes utilized in the early organizations, whenever the data transfer
capacity requests are high (e.g., for sight and sound sensors). Regardless, the high-
essentialness overheads of IEEE 802.11-based associations makes this standard inadmissible
for low-power sensor associations. Typical data rate essentials in sensor networks are like the
exchange speeds surrendered by dial modems, thusly the data rates gave by IEEE 802.11 are
generally significantly higher than required. This has provoked the progression of a
combination of shows that better satisfy the associations' necessity for low power use and
uninformed rates [51].

28
Discussion
1. Other approaches in Wearable Wireless sensor networks
1.1. Centralized Wireless Sensor Networks
These are the sensor networks which are connected to the devices and take instructions from
them. There is a central node which is mainly responsible for providing services like
detection and routing. Main technology used in this framework is star topology. They are
categorized based on the information processed and are as follows:
1.1.1. Single Sink
In single sink technology the main infrastructure is based on the formation and it works in the
order to reduce the time and forwarded all the info towards a unique sink. Data redundancy is
the main disadvantage of single sink.
1.1.2. Multi-sink
In it the main tasks are distributed to multiple nodes and it is done to cover the network
compactness, exposure area, termination, dissemination, network duration, and possible
energy utilization.
1.1.3. Multiple Task Devices
Ongoing exploration works propose the utilization of assistant organization gadgets; these
gadgets can be answerable for doing a particular action inside the organization, for example,
realizing the total condition to characterize a course, control of hubs developments, and
meaning of an objective hub, to improve the general WSN application execution [52].
1.2. Hierarchal wireless sensor networks
A sensor characterizes needs as per its part in the organization. Traffic sending hubs have a
lower priority than completely useful hubs like sense, arrange, measure, and forward data.
The organization control is acted in a various levelled way and is characterized dependent on
the jobs. This sort of organizations is generally executed utilizing the 802.15.4 convention. A
multi-sink domain engineering depends on the convention 802.15.4. It utilizes a multi-hop
sending methodology and addresses the sensor the limitation issue. They proposed an
incorporated strategy to ensure high portability between sink hubs.
1.3. Static wireless sensor networks
In it the nodes are positioned in different strategies and they are place before the launching of
the mechanism. It is used to maintain best strategies for data collection and processing [53],
[54].

2. Limitations in Wearable Wireless Sensor Network


2.1. Limitations related to Management
The idea behind various sensor applications is to work in distant zones also, unforgiving
situations, without framework uphold or the opportunities for support also, fix. Hence, sensor
hubs must act naturally overseeing in that they design themselves, work and team up with
different hubs, and adjust to disappointments, alterations in the earth surface, furthermore,
fluctuations in the natural boosts devoid of manly mediation [55].

29
2.2. Energy limitations
The necessity habitually associated with the organization design to centre points work with
choked imperativeness spending plans. Regularly, batteries are utilized to control them and
afterward they ought to be resuscitated like using daylight-based power when depleted. For
specific centre points, neither one of the alternatives is fitting, similar to they are arranged
when their imperativeness depleted. Either the battery can be animated or not, the cycle of
imperativeness usage is to be applied [56]. Then again, for the non-battery-powered batteries,
so as to continue the work sensor centre is picked to be there with the goal that the principle
objective will be accomplished. The examination improvements may require sensors that can
work for a serious long or here and there it is utilized as it is required like for two or three
hours or days [57].
2.3. Design related Limitations
While the abilities of customary registering frameworks keep on expanding quickly, the
essential objective of remote sensor configuration is to make littler, less expensive, and other
effective mechanisms [39]. In order to implement devoted applications having vitality
utilization, run of the mill sensor hubs have the handling paces and capacity limits of PC
frameworks from a very long while back. The requirement for little structure factor and low
vitality utilization additionally disallows the mix of numerous attractive segments, for
example, GPS beneficiaries. These limitations and necessities additionally sway the product
plan at different levels, for instance, working frameworks must have little memory
impressions and must be productive in their asset the executive’s errands [40], [58]. Be that
as it may, the absence of cutting-edge equipment highlights (e.g., uphold for equal
executions) encourages the plan of little and effective working frameworks. A sensor's
equipment limitations additionally influence the plan of numerous conventions and
calculations executed in a WSN.

30
Conclusion
In this study the wearable sensor devices and their processing networks are being addressed
and how they are helpful and demanding in the domain of wireless sensor networks. These
wearable sensor nodes are added with an accelerometer and they start recognizing the daily
routines of human beings, or you can say living beings. There is a small spectrum of RF
bands and other hardware and battery resources are used for the development of wearable
devices. Their main aims in communication are essential electrical iterations are minimized,
less time would be taken in decision making, and accelerometer reset time is minimized.
There are a lot of transformations done in the wireless industry and now it is expected that the
wearable devices are available to all consumers. In wireless sensor networks there are many
opportunities related to the productivity of appliances and their cost effectiveness. As it is
developed and deployed worldwide, so it is impossible if we close our eyes regarding the
risks associated about their security and privacy. The technology is developed, and it is
progressing day by day but it not possible still to achieve a reliable and effective
communication channel. Due to the threats, various problems arise but by adopting the safety
protocols, somehow the wireless communication is saved, and the personal sensitive
information is prevented from being trapped.
It isn't preposterous to accept that few clinical assessments, modern force improvement and
cycle stream control requiring an individual to trigger the relating movement will inevitably
be performed by wearable gadgets. Wearable gadgets will turn into the standard for
progression of versatile savvy gadgets which over the long haul will change totally the
advanced lifestyle. Utilizing a wearable gadget sensor, a few other day by day exercises could
be perceived by consolidating pressure sensors and accelerometers and separating
information by means of remote correspondence for additional examination. Wearable gadget
innovation joined with large information examination gives a pathway to another upheaval.
Indeed, even in the huge information milieu through remote correspondence, the wearable
market will have a more noteworthy effect and improvement making enormous capital
alongside making individuals' life more perfect.
The areas of active research in wireless communication network comprises of fourth
generation cellular system and cross layer protocol design. For the development of
enterprises sensor-centric networks are used and for the protocol design and analysis ad hoc
networks and intelligent sensor nodes are utilized freely.

31
References
1. Abdelzaher, T., Blum, B., Cao, Q., Chen, Y., Evans D, George, J., George, S., Gu, L.,
He, T., Krishnamurthy, S., Luo, L., Son, S., Stankovic, J., Stoleru, R., and Wood, A.
(2004) EnviroTrack: Towards an environmental computing paradigm for distributed
sensor networks. Proc. of the 24th IEEE International Conference on Distributed
Computing Systems (ICDCS), Hachioji, Tokyo, Japan.
2. Bagrodia, R., Meyer, R., Takai, M., Chen, Y., Zeng, X., Martin, J., and Song, H.Y.
(1998) PARSEC: A parallel simulation environment for complex systems. IEEE
Computer 31 (10), 77–85.
3. Barr, R., Haas, Z.J., and van Renesse, R. (2004) JiST: Embedding simulation time
into a virtual machine. Proc. of the 5th EuroSim Congress on Modelling and
Simulation, Marne-la-Vall´ee, France.
4. Bhatti, S., Carlson, J., Dai, H., Deng, J., Rose, J., Sheth, A., Shucker, B., Gruenwald,
C., Torgerson, A., and Han, R. (2005) MANTIS OS: An embedded multi-threaded
operating system for wireless micro sensor platforms. ACM/Kluwer Mobile Networks
and Applications (MONET), Special Issue on Wireless Sensor Networks 10 (4), 563–
579.
5. Bonnet, P., Gehrke, J., and Seshadri, P. (2000) Querying the physical world. IEEE
Personal Communications 7 (5), 10–15.
6. Cheong, E., Liebman, J., Liu, J., and Zhao, F. (2003) TinyGALS: A programming
model for event-driven embedded systems. Proc. of the 18th Annual ACM
Symposium on Applied Computing, Melbourne, FL.
7. Downard, I. (2004) Simulating sensor networks in NS2. Technical Report,
NRL/FR/(5522)(0410)073, Naval Research Laboratory, Washington, DC.
8. Dunkels, A., Schmidt, O., and Voigt, T. (2005) Using protothreads for sensor node
programming. Proc. of the REALWSN Workshop on Real-World Wireless Sensor
Networks, Stockholm, Sweden.
9. Gay, D., Levis, P., Behren, R., Welsh, M., Brewer, E., and Culler, D. (2003) The nesC
language: A holistic approach to networked embedded systems. Proc. of the ACM
SIGPLAN Conference on Programming Language Design and Implementation
(PLDI), San Diego, CA.
10. Girod, L., Elson, J., Cerpa, A., Stathopoulos, T., Ramanathan, N., and Estrin, D.
(2004) EmStar: A software environment for developing and deploying wireless sensor
networks. Proc. of the USENIX Annual Technical Conference, Boston, MA.
11. Greenstein, B., Kohler, E., and Estrin, D. (2004) A sensor network application
construction kit (SNACK). Proc. of the 2nd International Conference on Embedded
Networked Sensor Systems (SenSys), Baltimore, MD.
12. Heinzelman, W.B., Murphy, A.L., Carvalho, H.S., and Perillo, M.A. (2004)
Middleware to support sensor network applications. IEEE Network 18 (1), 6–14.
13. Hui, J.W., and Culler, D. (2004) The dynamic behavior of a data dissemination
protocol for network programming at scale. Proc. of the 2nd ACM Conference on
Embedded Networked Sensor Systems (SenSys), Baltimore, MD.
14. Levis, P., and Culler, D. (2002) Mate: A tiny virtual machine for sensor networks. ´
Proc. of the 10th International Conference on Architectural Support for Programming
Languages and Operating Systems (ASPLOS), San Jose, CA.
32
15. Levis, P., Lee, N., Welsh, M., and Culler, D. (2003) TOSSIM: Accurate and scalable
simulation of entire TinyOS applications. Proc. of the 1st ACM Conference on
Embedded Networked Sensor Systems (SenSys), Los Angeles, CA.
16. Levis, P., Patel, N., Culler, D., and Shenker, S. (2004) Trickle: A self-regulating
algorithm for code propagation and maintenance in wireless sensor networks. Proc. of
the 1st Symposium on Networked Systems Design and Implementation, San
Francisco, CA.
17. Madden, S.R., Franklin, M.J., Hellerstein, J.M., and Hong, W. (2005) TinyDB: An
acquisitional query processing system for sensor networks. ACM Transactions on
Database Systems 30 (1), 122–173.
18. McCartney, W.P., and Sridhar, N. (2006) Abstractions for safe concurrent
programming in networked embedded systems. Proc. of the 4th International
Conference on Embedded Networked Sensor Systems (SenSys), Boulder, CO.
19. Miller, C., and Poellabauer, C. (2008) PALER: A reliable transport protocol for code
distribution in large sensor networks. Proc. of the 5th IEEE Communications Society
Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON),
San Francisco, CA.
20. Nitta, C., Pandey, R., and Ramin, Y. (2006) Y-Threads: Supporting concurrency in
wireless sensor networks. Proc. of the 2nd International Conference on Distributed
Computing in Sensor Systems, San Francisco, CA.
21. Srisathapornphat, C., Jaikaeo, C., and Shen, C.C. (2000) Sensor information
networking architecture. Proc. of the 3rd International Workshop on Parallel
Processing, Toronto, Canada.
22. Sugihara, R. and Gupta, R.K. (2008) Programming models for sensor networks: A
survey. ACM Transactions on Sensor Networks 4 (2), 1–29.
23. Titzer, B.L., and Palsberg, J. (2005) Nonintrusive precision instrumentation of
microcontroller software. Proc. of the ACM SIGPLAN/SIGBED Conference on
Languages, Compilers, and Tools for Embedded Systems, Chicago, IL.
24. Varga, A., and Hornig, R. (2008) An overview of the OMNeT++ simulation
environment. Proc. of the 1st International Conference on Simulation Tools and
Techniques for Communications, Networks and Systems, Marseilles, France.
25. Wan, A.K.L., and Campbell, C.Y. (2005) Pump Slowly, Fetch Quickly (PSFQ): A
reliable transport protocol for sensor networks. IEEE Journal on Selected Areas in
Communications 23 (4), 862–872.
26. Welsh, M., and Mainland, G. (2004) Programming sensor networks using abstract
regions. Proc. of the 1st Symposium on Networked Systems Design and
Implementation, San Francisco, CA.
27. Yu, Y., Rittle, L.J., Bhandari, V., and LeBrun, J.B. (2006) Supporting concurrent
applications in wireless sensor networks. Proc. of the 4th International Conference on
Embedded Networked Sensor Systems (SenSys), Boulder, CO.
28. Zeng, X., Bagrodia, R., and Gerla, M. (1998) GloMoSim: A library for parallel
simulation of large-scale wireless networks. Proc. of the 12th Workshop on Parallel
and Distributed Simulation, Banff, Alberta, Canada.
29. A. Boukerche. Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks,
John Wiley & Sons, Inc., 2009.

33
30. A. Manjeshwar and D. P. Agarwal, "APTEEN: A hybrid protocol for efficient
routing and comprehensive information retrieval in wireless sensor
networks," Parallel and Distributed Processing Symposium., Proceedings
International, IPDPS 2002, pp. 195-202.
31. A. Manjeshwar and D. P. Agarwal, "TEEN: a routing protocol for enhanced
efficiency in wireless sensor networks," In 1st International Workshop on
Parallel and Distributed Computing Issues in Wireless Networks and Mobile
Computing, April 2001.
32. B. Paul, M. A. Matin,” Optimal Geometrical Sink Location Estimation for Two
Tiered Wireless Sensor Networks” IET Wireless Sensor Systems, vol.1, no.2,
pp.74-84, June 2011,doi: 10.1049/iet-wss.2010.0073, IET UK.
33. C. Intanagonwiwat, R. Govindan, D. Estrin, ‘‘Directed Diffusion: A Scalable
and Robust Communication Paradigm for Sensor Networks,’’ Proceedings of
the 6th ACM 226 ROUTING PROTOCOLS FOR WIRELESS SENSOR
NETWORKS International Conference on Mobile Computing and Networking
(MobiCom’00), Boston, MA, Aug. 2000, pp. 56–67.
34. C. karlof, N. Shastry and D. Wagner, TinySec: A link layer security architecture for
wireless sensor networks, SenSys’04, November 3-5 2004, Baltimore, Maryland,
USA
35. S. Vaidyanathan and M. Vaidyanathan, "Wireless Sensor Networks-Issues &
Challenges", SSRN Electronic Journal, 2011. Available: 10.2139/ssrn.1972636.

36. 6 Key Challenges of Wearable Product Development", Medium, 2020. [Online].


Available: https://medium.com/@outdesign/6-key-challenges-of-wearable-product-
development-49717d88c684. [Accessed: 24- Sep- 2020].
37. Chiara, B.; Andrea, C.; Davide, D.; Roberto, V. An Overview on Wireless
Sensor Networks Technology and Evolution. Sensors 2009, 9, 6869-6896.
38. "What is remote sensing and what is it used for?", Usgs.gov, 2020. [Online].
Available: https://www.usgs.gov/faqs/what-remote-sensing-and-what-it-used?qt-
news_science_products=0#qt-news_science_products. [Accessed: 24- Sep- 2020].
39. S. Tabibu, “Communications for Wearable Devices”, May 2017.
40. [14]"The link between the cloud and wearable technology - Compare the
Cloud", Compare the Cloud, 2020. [Online]. Available:
https://www.comparethecloud.net/articles/cloud-and-wearable-
technology/#:~:text=becomes%20more%20mainstream.-,Wearable%20technology
%20and%20cloud%20computing%20is%20all%20about%20collecting
%20and,activities%20over%20a%20wider%20spectrum. [Accessed: 24- Sep- 2020].
41. M. Angelides, L. Wilson and P. Echeverría, "Wearable data analysis, visualisation
and recommendations on the go using android middleware", Multimedia Tools and
Applications, vol. 77, no. 20, pp. 26397-26448, 2018. Available: 10.1007/s11042-
018-5867-y [Accessed 24 September 2020].
42. M. Uddin and S. Syed-Abdul, “Data Analytics and Applications of the Wearable
Sensors in Healthcare: An Overview,” Sensors, vol. 20, no. 5, p. 1379, 2020.
43. Chi-Tsun Cheng, Chi K. Tse, and Francis C. M. Lau, “A Delay-Aware Data
Collection Network Structure for Wireless Sensor Networks”, IEEE Sensors Journal,
Vol. 11, No. 3, pp. 699-710, March 2011.

34
44. D. Braginsky, D. Estrin, ‘‘Rumor Routing Algorithm for Sensor Networks,’’
Proceedings of the 1st Workshop on Sensor Networks and Applications
(WSNA’02), Atlanta, GA, Oct. 2002.
45. D. Wagner, Resilient aggregation in sensor networks, In Proceedings of the
2nd ACM workshop on Security of ad hoc and sensor networks. ACM Press, 2004,
pp. 78-87.
46. “A Survey on Security Challenges in Wireless Sensor Networks,” University of Thi-
Qar Journal, 2019.
47. Google Search. [Online]. Available: https://www.google.com/search?
q=wired+equivalent+privacy+definition. [Accessed: 24-Sep-2020].
48. Google Search. [Online]. Available: https://www.google.com/search?q=Wi-
Fi+Protected+Access. [Accessed: 24-Sep-2020].
49. Google Search. [Online]. Available: https://www.google.com/search?q=wi-
fi+protected+access+version+2+%28wpa2%29. [Accessed: 24-Sep-2020].
50. “Wearable Wireless Sensor Networks: Applications, Standards, and Research
Trends,” Emerging Communication Technologies Based on Wireless Sensor
Networks, pp. 86–115, 2016.
51. D.R. Raymond, R.C. Marchany, M.I. Brownfield, and S.F. Midkiff. Effects of Denial-
of-Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE
Transactions on Vehicular Technology, vol. 58, no. 1, pp. 367-380, 2009.
52. J.N. Al-Karaki, A.E. Kamal, Routing techniques in wireless sensor networks: a
survey, IEEE Wireless Communications (2004).
53. K. Akkaya, M. Younis, A survey on routing protocols for wireless sensor networks,
Elsevier Journal of Ad Hoc Networks 3 (3) (2005) 325–349.
54. L.V. Hoesel and P. Havinga, A Lightweight Medium Access Protocol (LMAC)
for wireless sensor networks: reducing preamble transmissions and transceiver state
switches, in the proceedings of INSS, June 2004.
55. M A Matin, and Md. Nafees Rahman, “Lifetime improvement of Wireless Sensor
Networks” 3rd IEEE International conference on Communication Software and
Networks (ICCSN) 2011, Xi'an, China, May 27-29, 2011, pp.475-479.
56. Wilson, J. Sensor Technology Handbook; Elsevier/Newnes: Burlington, MA, USA,
2005.
57. X. Chen and N. Rowe, "An Energy-Efficient Communication Scheme in
Wireless Cable Sensor Networks", Proc. of IEEE International Conference on
Communications (IEEE ICC), June 2011
58. X. Han, X. Cao, E. L. Lloyd and C. Shen, “Fault-Tolerant Relay Node
Placement in Heterogeneous Wireless Sensor Networks”, IEEE Transaction on
Mobile Computing, Vol. 9, No. 5, May 2010

35

You might also like