Professional Documents
Culture Documents
1
2. Technical complexities in wearable sensors.....................................................................12
2.1. Ergonomics................................................................................................................12
2.2. Sealing.......................................................................................................................13
2.3. Integration..................................................................................................................13
2.4. Safety, Security and Privacy......................................................................................13
Technical complexities and areas of specific interest..........................................................15
1. Sensing..............................................................................................................................15
2. Data Transmission............................................................................................................16
3. Cloud Implementation......................................................................................................16
4. Analytics...........................................................................................................................18
5. Assumptions related to wearable wireless technology.....................................................20
6. Limitations........................................................................................................................20
6.1. Cause distractions......................................................................................................20
6.2. Very Expensive.........................................................................................................20
6.3. Size and technical limitations....................................................................................20
6.4. Privacy Concerns.......................................................................................................20
Data Handling Issues.............................................................................................................21
1. Security and Privacy issues...............................................................................................21
1.1. Energy related Challenges.............................................................................................21
1.1.1. Challenges related to electrical impedance............................................................22
2. Addressing the security and privacy issues......................................................................22
3. Protocols to address the security issues............................................................................23
3.1. Wired Equivalent Privacy WEP................................................................................23
3.2. Wi-Fi Protected Access WPA...................................................................................23
3.3. Wi-Fi Protected Access version 2 WPA2.................................................................23
4. Ensuring security in Wireless Networks...........................................................................24
4.1. Encryption.................................................................................................................24
4.2. Firewall......................................................................................................................24
4.3. Off the network..........................................................................................................24
Meeting Industry Standards.................................................................................................25
1. Bluetooth (IEEE 802.15.1)...............................................................................................25
2. Zigbee (IEEE 802.15.4)....................................................................................................25
2.1. Ad Hoc Development................................................................................................25
3. Wi-Fi (IEEE 802.11a/b/g/n).............................................................................................26
Discussion................................................................................................................................27
2
1. Other approaches in Wearable Wireless sensor networks................................................27
1.1. Centralized Wireless Sensor Networks.....................................................................27
1.1.1. Single Sink.........................................................................................................27
1.1.2. Multi-sink...........................................................................................................27
1.1.3. Multiple Task Devices.......................................................................................27
1.2. Hierarchal wireless sensor networks.........................................................................27
1.3. Static wireless sensor networks.................................................................................27
2. Limitations in Wearable Wireless Sensor Network..........................................................27
2.1. Limitations related to Management...........................................................................27
2.2. Energy limitations.....................................................................................................28
2.3. Design related Limitations........................................................................................28
Conclusion...............................................................................................................................29
References...............................................................................................................................30
List of Figures:
Figure 1: Acquiring and actuation of Data.................................................................................5
Figure 2: Physical properties and examples of sensors..............................................................6
Figure 3: Wireless sensor network checking two diverse geographic areas..............................7
Figure 4: Comparison between single hop and multi-hop in WSN.........................................10
Figure 5: Different modalities of mechanical sensors..............................................................12
Figure 6: Samsung Galaxy Note 7 battery explosion...............................................................14
Figure 7: Sensor sensing the human movement.......................................................................16
Figure 8: Block diagram of intrabody communication system................................................17
Figure 9: Linkage between cloud computing and wearable technology..................................18
Figure 10: Modes of wearable devices.....................................................................................19
Figure 11: wearable data analysis, visualisation and recommendation...................................20
Figure 12: Major issues related to the Wireless sensor networks............................................22
Figure 13: Authorization of Bluetooth device.........................................................................24
3
Background and motivation
Wireless sensor networks are known as self-designed in order to check the environmental
conditions like sound, temperature and other vibrations and movements. There is a station
which is used as a medium interface for different clients and the main hub. There
responsibilities are to get the acquired data by using different queries and then fuse the
outcomes toward the sink. A hub having qualities like remote sensing is attached for
detecting and processing the other gadgets. In remote sensing environment the individual
hubs are used which convey the transmissions compelled. They also get information
regarding handling speed, limit and the transmission capacity. When the sensor hubs are
completely deployed, they get information regarding arrangements suitable for the
organization. Now the locally deployed servers get the data and to respond to the queries sent
from the main hub. They perform several guidelines and tests for the detection of bugs. In
these days, remote sensing organizations are towards initializing new applications by using
the ideal models. This rouses a tremendous exertion in research exercises, normalization
measure, and modern ventures on this field since the most recent decade.
4
information. There are a lot of examples in the real world where seen by a sensor gadget.
Here, an assortment of tasks are utilized in order to get additional utilization from the sensor.
Let us take an example, flags regularly entail enhancement in order to shift the sign size
towards all the more likely match the scope of the accompanying simple to-advanced
transformation. Further, signal moulding regularly applies channels to the sign to eliminate
undesirable commotion inside certain recurrence ranges. And these ranges are like high pass
channels can be utilized to eliminate 50 or 60 Hz clamour got by encompassing electrical
cables. In the wake of moulding, signs are shifted from computerized signal utilizing a
converter like ADC [4]. The sign is presently accessible in an advanced structure and
prepared for additional handling, putting away, or perception.
5
Figure 2: Physical properties and examples of sensors
6
The wireless sensor network capacities can change generally, that may screen the
unpredictable gadgets and then they are used widely in detecting strategies. They can
likewise contrast in their correspondence abilities, for instance, utilizing ultrasound, infrared,
or radio recurrence advancements with changing information rates and information
potentials. On the other hand, some sensors may just gather and impart data about the
watched condition, all the more impressive gadgets (i.e., gadgets with huge preparing,
vitality, and capacity limits) may likewise perform broad handling and conglomeration
capacities. These types of gadgets somehow accept the debts so that, they can be employed
by other resource centre at the base station [7]. At long last, a few gadgets may approach
extra supporting innovations, for instance, GPS recipients, permits so that they precisely
decide their stance. Nonetheless, these frameworks frequently expend an excess of vitality to
be possible for ease and low-power sensor hubs.
3. Literature Review
In this day and age, most of the investigation on WSNs has zeroed in on the arrangement of
essentialness and computationally profitable estimations and shows, and the application
territory has been kept to fundamental data arranged checking and uncovering applications.
The makers in [8] propose a Cable Mode Transition (CMT) count, which chooses the
inconsequential number of dynamic sensors to keep up K-incorporation of a scene similarly
as K-accessibility of the association. Specifically, it assigns seasons of torpidity for connect
sensors without impacting the consideration and accessibility necessities of the association
subject to close by information. In [9], a deferral careful data grouping network structure for
distant sensor networks is proposed. The objective of the proposed network structure is to
restrict delays in the data collection patterns of far off sensor networks which grows the
lifetime of the association. In [10] the authors have considered hand-off center points to
mitigate the association numerical deficiencies and used Particle Swarm Optimization (PSO)
based estimations to locate the ideal sink zone concerning those hand-off centers to overcome
the lifetime challenge. Essentialness profitable correspondence has also been tended to in
[11]. In [12], the makers proposed a numerical response for finding the ideal sink
circumstance for intensifying the association lifetime. Usually, the assessment on far off
sensor networks have contemplated homogeneous sensor centers. However, nowadays
experts have focused in on heterogeneous sensor networks where the sensor centers are not at
all like each other with respect to their imperativeness. In [13], the makers keeps an eye on
the issue of sending move centers to outfit transformation to inside disappointment with
higher association accessibility in heterogeneous far off sensor associations, where sensor
center points have particular transmission radii. New association structures with
heterogeneous contraptions and the progressing progress in this advancement murder the
current limitations and develop the scope of likely applications for WSNs fundamentally and
all these are evolving rapidly.
Motion capture, as the name infers, is "the recreation and re-enactment of the test item's
movement conduct." In logical language, the model can be rehashed to test the development
of an article through procurement of the movement information of the test item and planning
of these information onto the movement catch centres around the connection cycle among
people and PCs. A past report [10] portrayed optical movement catch in detail. Inertial
movement catch includes human movement catch information got from the subject who
7
wears appendage sensor hubs on the objective unit. Subsequently, the movement model
accomplishes movement reproduction. In the current examination, we centre around the issue
of inertial movement catch.
Broad assessment is being done in the area of Wireless Sensor Networks. Researchers have
been zeroing in on understanding a combination of incites going from limited resource
capacities to ensure about correspondence. Composing shows that sensor networks are sent
visible to everyone or gave up zones, over questionable distant channels [14]. It is
subsequently engaging for a harmful device/gatecrasher to tune in or mix messages into the
association. The standard response for this issue has been to take up techniques, for instance,
message approval codes, public key cryptography and symmetric key encryption plans. In
any case, since there are resource deficiencies for bits, the critical test is to devise these
encryption systems in a profitable way without yielding their inadequate resources. One
method for securing any association against outside attacks is to apply an immediate key
system. Regardless, it is understood that overall keys don't give network adaptability and pair
canny keys are not healthy game plan. A more instinctual game plan is required for WSNs.
TinySec [15] familiar security with the association layer of TinyOS suite [16] by joining
programming based symmetric keying with low working cost requirements. Not all
shortcomings present in TinySec could be would in general for example systems to evade
insider attacks. Curiously, Zigbee or the 802.15.4 standard [17] introduced equipment based
symmetric keying with progress. Regardless, in order to give thorough security, use of public
cryptography to make secure keys all through association course of action and backing stages
[18] is also being tested. This thought has opened an unheard locale for discussion of sensor
network cryptographic system. Inevitable assessment is in like manner being done on
focuses, for instance, key amassing and key sharing [19], key security [20] and shared key
pools [21]. By and by, since sensor center points need to bundle planning to fulfill a
particular endeavor, it is needed that the social affair people's contrary ensuring about
between each other, in spite of the truth of overall security in like manner present. Be that as
it may, contrary to this reality secure social occasion has been examined to a low degree
already and only two or three careful courses of action exist. Further, notwithstanding the
way that, data amassing (sensor centers absolute recognized data from condition before
finally conveying it to the base station) is one of the promising methodology to diminish cost
and association traffic yet such data is reliably powerless to attacks by intruders. A challenger
with power over a conglomerating center point can choose to excuse reports or produce fake
reports, affecting relentless nature of the made data and now and again whole association as
well. The essential point here is to use versatile limits, which will have the choice to discover
and report made reports through showing believability of the data by somehow. Wagner [22]
developed a technique in which aggregator uses hash trees to make confirmation of its
neighbors' data, which in this way is used to affirm righteousness of accumulated data to the
base station.
As a group with the Rockwell Science Center, the University of California at Los Angeles
proposed the possibility of Wireless Integrated Network Sensors or WINS [23]. One
consequence of the WINS adventure was the Low Power Wireless Integrated Microsensor
(LWIM), conveyed in 1996 [24]. This splendid distinguishing structure relied upon a CMOS
chip, fusing different sensors, interface circuits, progressed sign getting ready circuits, far off
radio, and microcontroller onto a lone chip. The Smart Dust adventure [25] at the University
8
of California at Berkeley focused in on the arrangement of little sensor centers called bits.
The goal of this endeavor was to display that a complete sensor structure can be fused into
tiny devices, maybe the size of a grain of sand or even a buildup atom. The PicoRadio
adventure [26] by the Berkeley Wireless Research Center (BWRC) bases on the headway of
low-power sensor contraptions, whose power usage is little to the point that they can control
themselves from essentialness wellsprings of the working condition, for instance, daylight
based or vibrational imperativeness. The MIT µAMPS (microAdaptive Multidomain Power-
careful Sensors) adventure also bases on low-power hardware and programming parts for
sensor centers, including the use of microcontrollers prepared for dynamic voltage scaling
and techniques to remake data dealing with counts to decrease power essentials at the item
level [27], [28]. While these previous undertakings are commonly dictated by educational
foundations, throughout the latest decade different business tries have similarly appeared
(numerous reliant on a bit of the insightful undertakings portrayed above), including
associations, for instance, Crossbow (www.xbow.com), Sensoria (www.sensoria.com),
Worldsens (http://worldsens.citi.insa-lyon.fr), Dust Networks
(http://www.dustnetworks.com), and Ember Corporation (http://www.ember.com) [29], [30].
These associations allow to purchase sensor devices arranged for sending in a variety of use
circumstances close by various organization devices for programming, backing, and sensor
data portrayal.
9
Figure 4: Comparison between single hop and multi-hop in WSN
Figure 4 illustrates the two stations and their comparison by sending information. Every
sensor hub discusses legitimately towards the base station utilizing a solitary bounce. While
the sensor networks frequently spread huge environmental territories and the transmission
through radio force ought to monitor vitality; therefore, multi-bounce correspondence is the
more normal case for sensor networks as represented in Figure 4. In this work geography,
sensor hubs must catch and disperse their own information, yet additionally fill in as transfers
to the hubs, in order to team up to spread sensor information towards the main hub. At the
point when a hub fills in as a hand-off for numerous courses, it regularly has the chance to
investigate and pre-measure sensor information in the organization, which can prompt the
disposal of repetitive data or accumulation of information that might be littler than the first
information.
11
In motion sensors the motion reconstruction is focused on the issues generated by the inertial
capture of motion. Mainly the four classes of sensors are discussed which are as follows:
1. Piezoresistive,
2. Capacitive,
3. Iontronic, and
4. Piezoelectric.
4.3.1. Piezoresistive Sensors
The essential standard of the piezoresistive weight sensor is to utilize a strain check produced
using a conductive material that changes its electrical obstruction when it is extended. The
strain check can be joined to a stomach that perceives an adjustment in opposition when the
sensor component is disfigured. The illustration modality is shown in Figure 5.
4.3.2. Capacitive Sensors
Capacitive vicinity sensors are non-contact gadgets that can identify the presence or
nonattendance of practically any item paying little heed to material. They use the electrical
property of capacitance and the difference in capacitance dependent on an adjustment in the
electrical field around the dynamic essence of the sensor. The illustration modality is shown
in Figure 5.
4.3.3. ontronic Sensors
It is an emerging technology which works on ions, and they are used to control the signal
carriers that provide connection to solid state electronics and biological system. In it the
neurons are polarized and depolarized with the help of ions and transport the material towards
the cell membranes. The illustration modality is shown in Figure 5.
4.3.4. Piezoelectric Sensors
It is a device which helps to compute the pressure, acceleration, temperature, strain, or force
by transforming them to electric command [34]. The illustration modality is shown in Figure
5.
12
Problem Formulation
Wireless sensor networks are the self-organized ones and they are distributed by covering a
large area. Their main idea is to distribute the sensing nodes and by the help of these nodes it
is able to communicate with the other networks or devices. By connecting these nodes and
networks a huge network is formed which communicate, send data, receive data including
many other functioning. But along with these there are various types of threats or loopholes
which the network is facing every time.
13
Along with these there are some technical complexities in wearable sensors which are as
follows:
2.1. Ergonomics
Ergonomics and solace are of prime significance, particularly in wearable gadgets that are
intended to be worn for an extensive stretch of time. Preferably, the solace levels ought to be
with the end goal that the client isn't continually helped to remember something extra tied
onto their body. In the long term usage, the devices may heat up which can harm the user.
2.2. Sealing
Waterproofing is another difficult region for wearables and necessities a devoted post, yet
since this is a diagram about wearable gadgets, we'll talk about waterproofing quickly.
Wearable items are presented to water and sweat at a few events during shower, washing
hands, or during brandishing exercises and for fluctuating length. Every one of these
circumstances request various degrees of assurance against water entering the gadget [36].
2.3. Integration
The antennae integration is challenging is mobile devices and with the wearable devices this
challenge become somehow higher. And for the effective integration strong strength is
required which is mainly difficult to achieve in multiple antennae devices. So as to give little
frame factors, makers are pushing the limits with Melded Interconnect Devices which can
implant parts like receiving wire legitimately into the lodging itself.
To counter the overall majority of USB connectors for charging, wearable gadgets are
progressively utilizing pin-type charging or remote charging, which likewise help in
waterproofing.
2.4. Safety, Security and Privacy
The batteries having lithium are considered as very dangerous. If they handle with less care,
then they can be led to loss of life. As all the wearable devices are very close to the body all
the time, so it is a potential threat to the body. For example, the Samsung batteries are
catching fire many times as illustrated in Figure 6, and a woman is also injured by exploding
her wrist. Along with these the wearable device also emit radiations and they are also
dangerous for the humans.
14
Figure 6: Samsung Galaxy Note 7 battery explosion
There are a lot of privacy issues regarding the wearable sensing devices. Like you can say
that the data is hacked and manipulated, sometimes because of the insecure communications
a lot of dangers happens. wearable tech devices are also used for spying, lack of encryption
and other vulnerabilities [37].
15
Technical complexities and areas of
specific interest
1. Sensing
Sensing is the way toward distinguishing and checking the physical attributes of a region by
estimating its reflected and discharged radiation a ways off (regularly from satellite or
airplane) as illustrated in Figure 7. Unique cameras gather distantly detected pictures, which
help scientists "sense" things about the Earth. A few models are:
Cameras on satellites and planes take pictures of enormous zones on the Earth's
surface, permitting us to see considerably more than we can remaining on the ground.
Sonar frameworks on boats can be utilized to make pictures of the sea depths without
expecting to venture out to the base of the sea.
Cameras on satellites can be utilized to make pictures of temperature changes in the
seas.
Some particular employments of distantly detected pictures of the Earth include:
Huge woodland flames can be planned from space, permitting officers to see an a lot
bigger region than from the beginning.
Tracking mists to help foresee the climate or viewing emitting volcanoes, and help
looking for dust storms.
Tracking the development of a city and changes in farmland or woods more than quite
a long while or decades.
Revelation and planning of the rough geography of the sea depths [38].
16
Figure 7: Sensor sensing the human movement
2. Data Transmission
In the wearable devices, a device named as accelerometer is employed in order to control and
monitor the various processes in various mechanisms. The main idea of the accelerometer is
to communicate to the RF signals so that the transmission of the human activities is
monitored. They communicate through the electrical signals and they then start controlling
the electrical appliances. In the initial step the consumer is sited by the PIR sensor and then
based on the data collected the action of this reaction is taken place. There are some sensors
like eZ430 which is used for tracking the fitness of the human being. Mainly accelerometer is
named as the base platform for data collection and retrieval for wearable sensors. The block
diagram of intrabody communication sensors is shown in Figure 8.
The data is acquired by the accelerometer and the values are presented in 3 direction like X,
Y and Z. Some of the main features of accelerometer are:
3 axis (x, y, z) accelerometer sensors are used for data graphs.
Remotely control the environment.
Time and data synchronization.
Check the heat beat rate
Update the software when needed.
The eZ430 which is a fitness sensor, consists of two modes, one is PPT mode and other is
Sync mode. At first the watch is set to ACC mode and then accelerometer transmit the data to
other wireless nodes. And when the access mode began the control centre displays and start
watch either in ACC or sync mode whatever the requirement is [39].
17
Figure 8: Block diagram of intrabody communication system
3. Cloud Implementation
There are a lot of advantages regarding the wearable technology and its popularity is
increasing day by day. But the real thing which is happening is internet of things. Because it
is the IoT which connects and provides linkage to different devices. A lot of new ways are
also provided to the people which help them to interact as illustrated in Figure 9. This all
happens because all the devices are connected through cloud and they are providing a easy
way out for communication. This technology is performing well by establishing high
proficiency. This type of connected devices has a lot of potential and they are very helpful in
making the life easier. Some said wearable innovation caused them to feel cannier, others
said there was improvement in their own effectiveness, while others said wearable tech
helped them with profession advancement.
As this technology is performing very well but on the other side there are a lot of hurdles
which the wearable technology is facing. It is said that wearable technology and cloud
computing is main considerate on data analyzation. But the data acquired through this
technology also needs a huge room of improvement. Like if better devices are used and they
are equipped with better sensors then the data acquisition and data analyzation is up to the
level. But if there is a slow processing unit, then this effect the data and its results efficiency.
So better ways are needed to add more cloud servers in order to maximize their processing
power.
18
Figure 9: Linkage between cloud computing and wearable technology
19
4. Analytics
Data analytics is getting more common inside the IoT, giving organizations noteworthy data
dependent on the information that gadgets and sensors gather. Organizations are
progressively going to wearable gadgets to help representatives with their work, giving them
data and gathering information about the client as shown in Figure 10. Wearable information
investigation is empowering organizations to pick up knowledge into laborer measures,
persistent vitals, and client propensities, permitting educational choices to be made [41]. This
broke down information is more beneficial than the crude information, which can frequently
be overpowering and uninformative.
20
5. They also assist them in monitoring their goals in daily routines.
6. These wearable devices also update the revised goals [42].
21
5. Assumptions related to wearable wireless technology
The wearable devices are very useful for the patients with the personalized data
regarding their health, and they also assist them in the diagnosis of the disease or if
there is change in behavioral involvements.
A lot of concerns are arise regarding the safety, reliability, security and privacy of the
users data.
The researchers are very hopeful that the advances in the technolgy may lead in
various fiels and also help the consumers in various effective ways.
6. Limitations
6.1. Cause distractions
The wearable wireless technology offers many distractions like the wearable watches are like
a fun tool or a gadget and as time passes a lot of updates are installed and it means that every
time there is some new thing to get distracted.
6.2. Very Expensive
As these devices are not that much cheap so they are not available to all the people. It might
be possibel the with the improvement in technology it gets cheap and then may be its
availability also increases.
6.3. Size and technical limitations
There are some devices that are goverened by technical limitations. Some are very huge in
size and somehow they are tricky and unreliable to some extent.
6.4. Privacy Concerns
As these devices aim is to track the people or to identify and check and daily routines. It
means all the data is saved in the servers and if any privacy issue creates then this result in
major consequences.
22
Data Handling Issues
Wireless networks contribute to numerous likenesses having disseminated frameworks, that
are exposed to an assortment of one-of-a-kind difficulties and requirements. These
imperatives sway the plan of a WSN, prompting conventions and calculations that vary from
their partners in other conveyed frameworks. This part depicts the most significant plan
requirements of a WSN.
23
The requirement frequently connected with the network configuration to hubs work with
constricted vitality spending plans. Normally, batteries are used to control them and then they
should be revived like utilizing sunlight-based force when exhausted. For certain hubs,
neither one of the options is fitting, like they are disposed when their vitality exhausted.
Either the battery can be stimulated or not, the process of vitality utilization is to be applied
[44]. On the other hand, for the non-rechargeable batteries, in order to proceed the work
sensor hub is opted to be there so that the main goal is going to be achieved. The research
developments may require sensors that can work for quite a long or sometimes it is used as it
is required like for a couple of hours or days [34].
1.1.1. Challenges related to electrical impedance
Skin-interfaced cathodes in wearable sensors transduce normally happening, time subordinate
ionic streams in the human body to quantifiable electrical signs; then again, as actuators, for
example, nerve incitement, they invigorate changes in these streams. The nature of chronicles
and the proficiency of incitement to a great extent rely upon the electrical impedance of the
cathode skin-body interface. The best interface ordinarily comprises of a 'wet' terminal
contact, commonly accomplished by a hydrogel or electrically conductive glue, both
containing electrolytes. Drawn out utilization of wet cathodes will likewise hydrate the skin,
lessening its electrical impedance. Without a wet contact (for example a dry anode) the
unpleasantness of skin presents pockets of air that can bring about a higher electrical
impedance. The electrical impedance of skin with a dry terminal can accordingly fluctuate
enormously with even slight changes in the weight of anode contact. We will proceed with
our conversation accepting a decent 'wet terminal' contact to the upper surface of the skin.
For this situation, the electrical impedance is restricted to the skin itself and the hidden body
[45].
24
the utilization of Bluetooth innovation, there are likewise a few difficulties [46]. Some of
which incorporate disavowal of-of-administration assaults, listening in, man-in-the-centre
assaults, message change, etc.
25
Both WPA and WPA2 should make sure about remote Internet networks from unapproved
access. On the off chance that you leave your switch with no security, at that point anybody
can take the data transmission, perform illicit activities out of your association and name,
screen your web action, and effectively introduce pernicious applications in your organization
[49].
26
Meeting Industry Standards
There are some standards which are designed in order to support the sending and they are
being adapted in different applications. These ones are as follows:
Personal Area Network (PAN) technologies which include Bluetooth (IEEE 802.15.1)
Wireless Sensors Network (WSN) technologies which includes Zigbee (IEEE
802.15.4)
Wireless Local Area Network (WLAN) technologies, such as Wi-Fi (IEEE
802.11a/b/g/n)
27
3. Wi-Fi (IEEE 802.11a/b/g/n)
This family of standards are very famous because of their fast speed and their availability at
low prices. It is mainly deployed on the medium access control and physical layers.
Categorically it is divided into Infra-red, Direct Sequence Spread Spectrum (DSSS) and
Frequency Hopping Spread Spectrum (FHSS). Their speed is increased by adding a new
standard which is named as 802.11g. the bandwidth is 2.4 GHz in 802.11b and operates on
Direct sequence spread spectrum, while 802.11g operates on both direct sequence spread
spectrum and frequency division multiplexing methods. This technology is considered more
then sufficient as it is facilitating with the need of access points [50].
While IEEE 802.11, oftentimes utilized in the early organizations, whenever the data transfer
capacity requests are high (e.g., for sight and sound sensors). Regardless, the high-
essentialness overheads of IEEE 802.11-based associations makes this standard inadmissible
for low-power sensor associations. Typical data rate essentials in sensor networks are like the
exchange speeds surrendered by dial modems, thusly the data rates gave by IEEE 802.11 are
generally significantly higher than required. This has provoked the progression of a
combination of shows that better satisfy the associations' necessity for low power use and
uninformed rates [51].
28
Discussion
1. Other approaches in Wearable Wireless sensor networks
1.1. Centralized Wireless Sensor Networks
These are the sensor networks which are connected to the devices and take instructions from
them. There is a central node which is mainly responsible for providing services like
detection and routing. Main technology used in this framework is star topology. They are
categorized based on the information processed and are as follows:
1.1.1. Single Sink
In single sink technology the main infrastructure is based on the formation and it works in the
order to reduce the time and forwarded all the info towards a unique sink. Data redundancy is
the main disadvantage of single sink.
1.1.2. Multi-sink
In it the main tasks are distributed to multiple nodes and it is done to cover the network
compactness, exposure area, termination, dissemination, network duration, and possible
energy utilization.
1.1.3. Multiple Task Devices
Ongoing exploration works propose the utilization of assistant organization gadgets; these
gadgets can be answerable for doing a particular action inside the organization, for example,
realizing the total condition to characterize a course, control of hubs developments, and
meaning of an objective hub, to improve the general WSN application execution [52].
1.2. Hierarchal wireless sensor networks
A sensor characterizes needs as per its part in the organization. Traffic sending hubs have a
lower priority than completely useful hubs like sense, arrange, measure, and forward data.
The organization control is acted in a various levelled way and is characterized dependent on
the jobs. This sort of organizations is generally executed utilizing the 802.15.4 convention. A
multi-sink domain engineering depends on the convention 802.15.4. It utilizes a multi-hop
sending methodology and addresses the sensor the limitation issue. They proposed an
incorporated strategy to ensure high portability between sink hubs.
1.3. Static wireless sensor networks
In it the nodes are positioned in different strategies and they are place before the launching of
the mechanism. It is used to maintain best strategies for data collection and processing [53],
[54].
29
2.2. Energy limitations
The necessity habitually associated with the organization design to centre points work with
choked imperativeness spending plans. Regularly, batteries are utilized to control them and
afterward they ought to be resuscitated like using daylight-based power when depleted. For
specific centre points, neither one of the alternatives is fitting, similar to they are arranged
when their imperativeness depleted. Either the battery can be animated or not, the cycle of
imperativeness usage is to be applied [56]. Then again, for the non-battery-powered batteries,
so as to continue the work sensor centre is picked to be there with the goal that the principle
objective will be accomplished. The examination improvements may require sensors that can
work for a serious long or here and there it is utilized as it is required like for two or three
hours or days [57].
2.3. Design related Limitations
While the abilities of customary registering frameworks keep on expanding quickly, the
essential objective of remote sensor configuration is to make littler, less expensive, and other
effective mechanisms [39]. In order to implement devoted applications having vitality
utilization, run of the mill sensor hubs have the handling paces and capacity limits of PC
frameworks from a very long while back. The requirement for little structure factor and low
vitality utilization additionally disallows the mix of numerous attractive segments, for
example, GPS beneficiaries. These limitations and necessities additionally sway the product
plan at different levels, for instance, working frameworks must have little memory
impressions and must be productive in their asset the executive’s errands [40], [58]. Be that
as it may, the absence of cutting-edge equipment highlights (e.g., uphold for equal
executions) encourages the plan of little and effective working frameworks. A sensor's
equipment limitations additionally influence the plan of numerous conventions and
calculations executed in a WSN.
30
Conclusion
In this study the wearable sensor devices and their processing networks are being addressed
and how they are helpful and demanding in the domain of wireless sensor networks. These
wearable sensor nodes are added with an accelerometer and they start recognizing the daily
routines of human beings, or you can say living beings. There is a small spectrum of RF
bands and other hardware and battery resources are used for the development of wearable
devices. Their main aims in communication are essential electrical iterations are minimized,
less time would be taken in decision making, and accelerometer reset time is minimized.
There are a lot of transformations done in the wireless industry and now it is expected that the
wearable devices are available to all consumers. In wireless sensor networks there are many
opportunities related to the productivity of appliances and their cost effectiveness. As it is
developed and deployed worldwide, so it is impossible if we close our eyes regarding the
risks associated about their security and privacy. The technology is developed, and it is
progressing day by day but it not possible still to achieve a reliable and effective
communication channel. Due to the threats, various problems arise but by adopting the safety
protocols, somehow the wireless communication is saved, and the personal sensitive
information is prevented from being trapped.
It isn't preposterous to accept that few clinical assessments, modern force improvement and
cycle stream control requiring an individual to trigger the relating movement will inevitably
be performed by wearable gadgets. Wearable gadgets will turn into the standard for
progression of versatile savvy gadgets which over the long haul will change totally the
advanced lifestyle. Utilizing a wearable gadget sensor, a few other day by day exercises could
be perceived by consolidating pressure sensors and accelerometers and separating
information by means of remote correspondence for additional examination. Wearable gadget
innovation joined with large information examination gives a pathway to another upheaval.
Indeed, even in the huge information milieu through remote correspondence, the wearable
market will have a more noteworthy effect and improvement making enormous capital
alongside making individuals' life more perfect.
The areas of active research in wireless communication network comprises of fourth
generation cellular system and cross layer protocol design. For the development of
enterprises sensor-centric networks are used and for the protocol design and analysis ad hoc
networks and intelligent sensor nodes are utilized freely.
31
References
1. Abdelzaher, T., Blum, B., Cao, Q., Chen, Y., Evans D, George, J., George, S., Gu, L.,
He, T., Krishnamurthy, S., Luo, L., Son, S., Stankovic, J., Stoleru, R., and Wood, A.
(2004) EnviroTrack: Towards an environmental computing paradigm for distributed
sensor networks. Proc. of the 24th IEEE International Conference on Distributed
Computing Systems (ICDCS), Hachioji, Tokyo, Japan.
2. Bagrodia, R., Meyer, R., Takai, M., Chen, Y., Zeng, X., Martin, J., and Song, H.Y.
(1998) PARSEC: A parallel simulation environment for complex systems. IEEE
Computer 31 (10), 77–85.
3. Barr, R., Haas, Z.J., and van Renesse, R. (2004) JiST: Embedding simulation time
into a virtual machine. Proc. of the 5th EuroSim Congress on Modelling and
Simulation, Marne-la-Vall´ee, France.
4. Bhatti, S., Carlson, J., Dai, H., Deng, J., Rose, J., Sheth, A., Shucker, B., Gruenwald,
C., Torgerson, A., and Han, R. (2005) MANTIS OS: An embedded multi-threaded
operating system for wireless micro sensor platforms. ACM/Kluwer Mobile Networks
and Applications (MONET), Special Issue on Wireless Sensor Networks 10 (4), 563–
579.
5. Bonnet, P., Gehrke, J., and Seshadri, P. (2000) Querying the physical world. IEEE
Personal Communications 7 (5), 10–15.
6. Cheong, E., Liebman, J., Liu, J., and Zhao, F. (2003) TinyGALS: A programming
model for event-driven embedded systems. Proc. of the 18th Annual ACM
Symposium on Applied Computing, Melbourne, FL.
7. Downard, I. (2004) Simulating sensor networks in NS2. Technical Report,
NRL/FR/(5522)(0410)073, Naval Research Laboratory, Washington, DC.
8. Dunkels, A., Schmidt, O., and Voigt, T. (2005) Using protothreads for sensor node
programming. Proc. of the REALWSN Workshop on Real-World Wireless Sensor
Networks, Stockholm, Sweden.
9. Gay, D., Levis, P., Behren, R., Welsh, M., Brewer, E., and Culler, D. (2003) The nesC
language: A holistic approach to networked embedded systems. Proc. of the ACM
SIGPLAN Conference on Programming Language Design and Implementation
(PLDI), San Diego, CA.
10. Girod, L., Elson, J., Cerpa, A., Stathopoulos, T., Ramanathan, N., and Estrin, D.
(2004) EmStar: A software environment for developing and deploying wireless sensor
networks. Proc. of the USENIX Annual Technical Conference, Boston, MA.
11. Greenstein, B., Kohler, E., and Estrin, D. (2004) A sensor network application
construction kit (SNACK). Proc. of the 2nd International Conference on Embedded
Networked Sensor Systems (SenSys), Baltimore, MD.
12. Heinzelman, W.B., Murphy, A.L., Carvalho, H.S., and Perillo, M.A. (2004)
Middleware to support sensor network applications. IEEE Network 18 (1), 6–14.
13. Hui, J.W., and Culler, D. (2004) The dynamic behavior of a data dissemination
protocol for network programming at scale. Proc. of the 2nd ACM Conference on
Embedded Networked Sensor Systems (SenSys), Baltimore, MD.
14. Levis, P., and Culler, D. (2002) Mate: A tiny virtual machine for sensor networks. ´
Proc. of the 10th International Conference on Architectural Support for Programming
Languages and Operating Systems (ASPLOS), San Jose, CA.
32
15. Levis, P., Lee, N., Welsh, M., and Culler, D. (2003) TOSSIM: Accurate and scalable
simulation of entire TinyOS applications. Proc. of the 1st ACM Conference on
Embedded Networked Sensor Systems (SenSys), Los Angeles, CA.
16. Levis, P., Patel, N., Culler, D., and Shenker, S. (2004) Trickle: A self-regulating
algorithm for code propagation and maintenance in wireless sensor networks. Proc. of
the 1st Symposium on Networked Systems Design and Implementation, San
Francisco, CA.
17. Madden, S.R., Franklin, M.J., Hellerstein, J.M., and Hong, W. (2005) TinyDB: An
acquisitional query processing system for sensor networks. ACM Transactions on
Database Systems 30 (1), 122–173.
18. McCartney, W.P., and Sridhar, N. (2006) Abstractions for safe concurrent
programming in networked embedded systems. Proc. of the 4th International
Conference on Embedded Networked Sensor Systems (SenSys), Boulder, CO.
19. Miller, C., and Poellabauer, C. (2008) PALER: A reliable transport protocol for code
distribution in large sensor networks. Proc. of the 5th IEEE Communications Society
Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON),
San Francisco, CA.
20. Nitta, C., Pandey, R., and Ramin, Y. (2006) Y-Threads: Supporting concurrency in
wireless sensor networks. Proc. of the 2nd International Conference on Distributed
Computing in Sensor Systems, San Francisco, CA.
21. Srisathapornphat, C., Jaikaeo, C., and Shen, C.C. (2000) Sensor information
networking architecture. Proc. of the 3rd International Workshop on Parallel
Processing, Toronto, Canada.
22. Sugihara, R. and Gupta, R.K. (2008) Programming models for sensor networks: A
survey. ACM Transactions on Sensor Networks 4 (2), 1–29.
23. Titzer, B.L., and Palsberg, J. (2005) Nonintrusive precision instrumentation of
microcontroller software. Proc. of the ACM SIGPLAN/SIGBED Conference on
Languages, Compilers, and Tools for Embedded Systems, Chicago, IL.
24. Varga, A., and Hornig, R. (2008) An overview of the OMNeT++ simulation
environment. Proc. of the 1st International Conference on Simulation Tools and
Techniques for Communications, Networks and Systems, Marseilles, France.
25. Wan, A.K.L., and Campbell, C.Y. (2005) Pump Slowly, Fetch Quickly (PSFQ): A
reliable transport protocol for sensor networks. IEEE Journal on Selected Areas in
Communications 23 (4), 862–872.
26. Welsh, M., and Mainland, G. (2004) Programming sensor networks using abstract
regions. Proc. of the 1st Symposium on Networked Systems Design and
Implementation, San Francisco, CA.
27. Yu, Y., Rittle, L.J., Bhandari, V., and LeBrun, J.B. (2006) Supporting concurrent
applications in wireless sensor networks. Proc. of the 4th International Conference on
Embedded Networked Sensor Systems (SenSys), Boulder, CO.
28. Zeng, X., Bagrodia, R., and Gerla, M. (1998) GloMoSim: A library for parallel
simulation of large-scale wireless networks. Proc. of the 12th Workshop on Parallel
and Distributed Simulation, Banff, Alberta, Canada.
29. A. Boukerche. Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks,
John Wiley & Sons, Inc., 2009.
33
30. A. Manjeshwar and D. P. Agarwal, "APTEEN: A hybrid protocol for efficient
routing and comprehensive information retrieval in wireless sensor
networks," Parallel and Distributed Processing Symposium., Proceedings
International, IPDPS 2002, pp. 195-202.
31. A. Manjeshwar and D. P. Agarwal, "TEEN: a routing protocol for enhanced
efficiency in wireless sensor networks," In 1st International Workshop on
Parallel and Distributed Computing Issues in Wireless Networks and Mobile
Computing, April 2001.
32. B. Paul, M. A. Matin,” Optimal Geometrical Sink Location Estimation for Two
Tiered Wireless Sensor Networks” IET Wireless Sensor Systems, vol.1, no.2,
pp.74-84, June 2011,doi: 10.1049/iet-wss.2010.0073, IET UK.
33. C. Intanagonwiwat, R. Govindan, D. Estrin, ‘‘Directed Diffusion: A Scalable
and Robust Communication Paradigm for Sensor Networks,’’ Proceedings of
the 6th ACM 226 ROUTING PROTOCOLS FOR WIRELESS SENSOR
NETWORKS International Conference on Mobile Computing and Networking
(MobiCom’00), Boston, MA, Aug. 2000, pp. 56–67.
34. C. karlof, N. Shastry and D. Wagner, TinySec: A link layer security architecture for
wireless sensor networks, SenSys’04, November 3-5 2004, Baltimore, Maryland,
USA
35. S. Vaidyanathan and M. Vaidyanathan, "Wireless Sensor Networks-Issues &
Challenges", SSRN Electronic Journal, 2011. Available: 10.2139/ssrn.1972636.
34
44. D. Braginsky, D. Estrin, ‘‘Rumor Routing Algorithm for Sensor Networks,’’
Proceedings of the 1st Workshop on Sensor Networks and Applications
(WSNA’02), Atlanta, GA, Oct. 2002.
45. D. Wagner, Resilient aggregation in sensor networks, In Proceedings of the
2nd ACM workshop on Security of ad hoc and sensor networks. ACM Press, 2004,
pp. 78-87.
46. “A Survey on Security Challenges in Wireless Sensor Networks,” University of Thi-
Qar Journal, 2019.
47. Google Search. [Online]. Available: https://www.google.com/search?
q=wired+equivalent+privacy+definition. [Accessed: 24-Sep-2020].
48. Google Search. [Online]. Available: https://www.google.com/search?q=Wi-
Fi+Protected+Access. [Accessed: 24-Sep-2020].
49. Google Search. [Online]. Available: https://www.google.com/search?q=wi-
fi+protected+access+version+2+%28wpa2%29. [Accessed: 24-Sep-2020].
50. “Wearable Wireless Sensor Networks: Applications, Standards, and Research
Trends,” Emerging Communication Technologies Based on Wireless Sensor
Networks, pp. 86–115, 2016.
51. D.R. Raymond, R.C. Marchany, M.I. Brownfield, and S.F. Midkiff. Effects of Denial-
of-Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE
Transactions on Vehicular Technology, vol. 58, no. 1, pp. 367-380, 2009.
52. J.N. Al-Karaki, A.E. Kamal, Routing techniques in wireless sensor networks: a
survey, IEEE Wireless Communications (2004).
53. K. Akkaya, M. Younis, A survey on routing protocols for wireless sensor networks,
Elsevier Journal of Ad Hoc Networks 3 (3) (2005) 325–349.
54. L.V. Hoesel and P. Havinga, A Lightweight Medium Access Protocol (LMAC)
for wireless sensor networks: reducing preamble transmissions and transceiver state
switches, in the proceedings of INSS, June 2004.
55. M A Matin, and Md. Nafees Rahman, “Lifetime improvement of Wireless Sensor
Networks” 3rd IEEE International conference on Communication Software and
Networks (ICCSN) 2011, Xi'an, China, May 27-29, 2011, pp.475-479.
56. Wilson, J. Sensor Technology Handbook; Elsevier/Newnes: Burlington, MA, USA,
2005.
57. X. Chen and N. Rowe, "An Energy-Efficient Communication Scheme in
Wireless Cable Sensor Networks", Proc. of IEEE International Conference on
Communications (IEEE ICC), June 2011
58. X. Han, X. Cao, E. L. Lloyd and C. Shen, “Fault-Tolerant Relay Node
Placement in Heterogeneous Wireless Sensor Networks”, IEEE Transaction on
Mobile Computing, Vol. 9, No. 5, May 2010
35