You are on page 1of 9

Crafting a literature review on Wireless Sensor Networks is no easy task.

It demands meticulous
research, critical analysis, and concise synthesis of existing literature. The complexity lies in
navigating through a vast array of scholarly articles, journals, conference papers, and books, while
also ensuring that the review is cohesive and relevant to the chosen topic.

One of the biggest challenges is sifting through the abundance of information available. With the
rapid advancements in the field of Wireless Sensor Networks, staying updated with the latest
research findings and integrating them into the review can be daunting. Additionally, discerning
which sources are credible and which are not requires careful scrutiny and evaluation.

Moreover, organizing the gathered information in a logical and coherent manner poses another
hurdle. A literature review should not only summarize existing research but also identify gaps,
controversies, and emerging trends in the field. This requires synthesizing diverse perspectives and
presenting them in a way that adds value to the reader's understanding.

Given the complexities involved, seeking assistance from professional writing services like ⇒
StudyHub.vip ⇔ can be immensely beneficial. Their team of experienced writers specializes in
crafting literature reviews tailored to specific research topics. By entrusting your literature review to
experts, you can ensure that it meets the highest standards of quality and comprehensiveness.

In conclusion, writing a literature review on Wireless Sensor Networks requires extensive research,
critical analysis, and effective synthesis of information. To alleviate the challenges associated with
this task, consider outsourcing it to professionals who can deliver a well-structured and insightful
review. Order your literature review from ⇒ StudyHub.vip ⇔ today and ensure the success of your
research project.
Report this Document Download now Save Save sensors-15-24735.pdf For Later 0 ratings 0%
found this document useful (0 votes) 22 views 36 pages Sensors 15 24735 PDF Uploaded by. These
virtual sinks act as intermediates between the actual nodes and the base stations and they are d
istributed rando mly inside the network. Market demands and the advancements in new technologies
are transforming manufacturing firms’ business operations into smart factories and warehouses. The
taxonomy of existing studies and the contribution of IoT in IR 4.0 is shown in Figure 8. 4.3. RQ3:
Type of WSN Coverage Area for IR 4.0 WSN coverage is an important factor in sensor quality. As
Sympa- thy is a fully automated system, we will be aiming to provide some kind of automatic
mechanisms in our mid- dleware for the above design criteria without thou gh this to be our first
priority. They are usually experts in their domains by employing a single piece of code as equipment,
such as viruses, worms, and sniffers to misuse frameworks. Educational institutes are now using
pedagogical tools to provide a better experience. They stated that the detection algorithm performed
much better for IoT (70%) than WSN (20%). The functionalities of wireless sensor networks in
different categories. Figure 2. The BOSS architecture, song et al 2005. A worm, such as a Trojan
horse, can infect one’s computer when one downloads a file or receives an update. DT is the
simulation tool that can gather and synchronize data for the real world to a real-time environment.
The wormhole appears to other nodes as a fictitious neighbor. It has monitor through environment by
using sensing device that means of physical properties. Malware is malicious content that can
interfere with a computer’s operation and slow its performance. LEACH, dictates that once other
sensors of the network receive a message they will join a cluster with the stronger signal cluster head.
The invaders forward the data from one malicious node to another node at the end of the network
through the tunnel. Our survey presents the funda- mentals of wireless sensor network, thus
providing the necessary background required for understanding the organization, functionality and
limitations of those networks. A novel low-rate denial of service attack detection approach in ZigBee
wireless sensor network by combining Hilbert-Huang transformation and trust evaluation H. Chen,
C. Meng, Z. Shan, Z. Fu, and B. K. Bhargava 2019 53. Analysis of quantities influencing the
performance of time synchronization based on linear regression in low-cost WSN D. Existing review
articles lack, in many aspects, research challenges, issues, limitations, and future directions of IoT
and WSN, but the systematic literature review (SLR) given in this work is precise enough to deal
with the aspects of IoT and WSN area. This means that all nodes will turn their radio on and
exchange dis- covery messages in order to identify neighbor nodes in the same grid. LEACH is a
routing protocol for users that want re- motely to monitor an environment. The main purpose of the
fourth industrial revolution with WSN and IoT explicitly shows that the evolutionary transition
needs to be intensified and extended to include emerging research areas and intimidating
technological challenges. Unique security objectives and challenges of IIoT have been introduced to
overcome industrial-level issues. Connectivity shows how well different nodes communicate with
each other. This systematic literature review offers a wide range of information on Industry 4.0,
finds research gaps, and recommends future directions. There are many advantages, but security
problems have arisen as these devices generate considerable amounts of data daily. They discussed
technologies, various challenges, future directions, and various Internet of Things (IoT) applications.
Radel 2017 29. Organizational culture as an indication of readiness to implement Industry 4.0 Z.
Nafchi and M.Mohelska 2020 30. Smart production planning and control: concept, use-cases, and
sustainability implications O.E, Oluyisola 2020 31. These entities are described in detail below. 4.4.1.
Solo Entities Solo entities are those that work alone with minimal safety. The stored data is
represented as a virtual relationship between the sensors that participate in the network and the
physical characteristics.
Based on these attributes, Agilla allows network re- programming thereby eliminating the power
consum n cost of flooding the network. WSN is a network that can transmit and receive through the
wireless medium by using the sensor devices for various nodes. Attacks on the DNS cache could
affect the overall performance of the network. Then, we evaluated the quality of the papers, and then
extracted the relevant features. 3.1. Planning Review The planning of the review was based on the
research questions and their objectives. Data collection and transmission are other problems in IoT
and WSN because data is exposed and modified during transmission. The developers having identi-
wireless sens fied the predominant limitations of wireless sensor net- works such as energy
consumption and limited band- width propose a new programming paradigm that is based on a tiny
centric virtual machine that will allow complex programs to be very short. Initially the network nodes
will advertise their sensed data (topic). In this approach, the communication cost is less than the
centralized one and more energy efficient since all the workload will be distributed evenly across the
network. Studies with a score greater than or equal to 80 were selected according to the grading
criteria shown in Figure 7. 3.7. Data Extraction and Synthesis Process After collecting articles
relevant to the research questions and objectives, we performed a SLR according to various
characteristics, such as year of publication, limitations, and future work. Comparative analyses of
these review papers are given in Table 2. This paper covers several aspects of Industry 4.0, from the
designing phase to security needs, from the deployment stage to the classification of the network,
the difficulties, challenges, and future directions. It has monitor through environment by using
sensing device that means of physical properties. But opting out of some of these cookies may affect
your browsing experience. However, the lack of a hierarchical communication m odel for the agent
society and the absence of precise real location information of every node in the network can lead to
deadlocks and memory management problems. What is known as a database middleware will visual-
ize the whole network as a virtu iddleware in this case will provide the user with an interface for
sending queries to the sensor nodes of the system to extract the desired data. While active, the node
periodically re-broadcasts its discovery message at time intervals, Td. In order to do that, it combines
four different components: service manager, control manager, service table and a sensor network
management service, under the same framework. Journal of Otorhinolaryngology, Hearing and
Balance Medicine (JOHBM). These data objects will remain in the node regardless of the agen t
status. Mires send only messages referring to subscribed topics thus reduc- ing like that the numbers
of the transmitted packets and therefore saving energy. In a Sybil attack, a malicious node penetrates
each cluster head of the network and affects the operation of the routing protocol. Wireless Sensor
Multimedia Networks: Architectures, Protocols, and Applications explores the many benefits of
WSMNs and the variety of applications in which they can be used-surveillance, traffic monitoring,
advanced healthcare (blood pressure and heart rate monitoring), habitat monitoring, and localization
services (finding missing children or wanted criminals). However, the ef- fectiveness of this
technique is tightly bound on finding reliable data for every decision station inside the wireless
sensor network that from its nature can provide inaccurate data during its lifetime due to
connectivity and radio problems. Table 1 presents a tabular evaluation of the currently available sy
nality. 5. The R M in any researchers have work for bridging the gap between applications and low
levels constructs such as the physical layer of the sensor nodes. Intruders can steal the data during
transmission if it is not encrypted or transmitted over a secure channel. WSN is also used to control
and automate industrial processes known as actuators. Unique security objectives and challenges of
IIoT have been introduced to overcome industrial-level issues. In every DSN there are a number of
decision stations whose role is to act as data managers in a hierarchical format. In the future, they
will enhance this work by using a multi-hop path strategy to the base station. They analyzed the full
coverage issues by considering node type, deployment type, communication and sensing range, and
positioning-based independent algorithms. They also discussed the research challenges of WSN.
Toward dynamic resources management for IoT-based manufacturing J. Wan et al. 2018 83. SENET:
A novel architecture for IoT-based body sensor networks Z. They traced the location of sensor nodes
deployed underwater in the ocean using localization algorithms. They reviewed many applications of
UASN, their advantages and their disadvantages.
They discussed the integration of WSN with IoT via the Internet and how the inter-connected
devices have guarded networks against external attacks, keeping the router in a secure and protected
environment. We also use third-party cookies that help us analyze and understand how you use this
website. The bottom block consists of the hardware components of the node which are directly
interfaced and controlled by the operating system. Feature papers represent the most advanced
research with significant potential for high impact in the field. A Feature. In this version, robots can
be programmed to work alongside humans. The absence of experimentation and optimization in
predicting future locations or results are other essential aspects of DT. The middleware is placed on
top of the operating system to implement its publish-subscribe communication model. Therefore, it is
important to make a systematic review article in this realm, especially related to IoT and WSN, to
show future directions. IoT devices and applications are used to process extracted data from WSN
devices and transmit them to remote locations. By continuing to use the website, you consent to our
use of cookies. Using a cross-platform distributed approach, they analyzed the IDS system, their
platform differences, and current research trends in IDS. In general, WSN follows a star topology to
decrease the network failure probability by connecting all systems to a central node. This is the
reason why soft computing techniques are used to obtain useful features. Jahankhani 2020 7. Internet
of things (IoT) embedded future supply chains for Industry 4.0: An assessment from ERP-based
fashion apparel and footwear industry M. A. A. Majeed and T. D. Rupasinghe 2017 8. Towards
Industry 4.0 utilizing data-mining techniques: a case study on quality improvement H. This node
redundancy is achieved by switching off unnecessary sensor nodes in the network without any effect
on the level of routing fidelity. Figure 3. The GAF nodes state transitions, xu et al 2001. They also
discussed the security issues in detail and identified the unsolved challenges encountered during
designing standard protocols. Data acquisition is usually done by product information in smart
factories. WSN is a network that can transmit and receive through the wireless medium by using the
sensor devices for various nodes. The number of articles was initially limited to 120, after which they
were stored in the citation manager software for information synthesis. However, due to the
scalability and complexity of wire- less sensor networks it is proven quite difficult to man- age and
quite expensive in terms of memory cost. In order to maximize the system lifetime and coverage,
LEACH is using a set of methods such as distributed cluster formation with randomized selection of
cluster heads and local processing. The system architecture is based on four layers; data access
abstrac- tion, node abstraction, conversion abstraction and visu- alization abstraction layer. For more
information on the journal statistics, click here. Transmission between devices and access to the entire
network span a wide range in IoT and WSN. Gehrke and S. Madden (2002). Figure 6 shows a block
diagram that can explain the Cougar architecture for querying processing. The distributed
architecture focuses on the deployment of multiple manager stations across the network usually in a
web based format. These entities are described in detail below. 4.4.1. Solo Entities Solo entities are
those that work alone with minimal safety. Explainable artificial intelligence (XAI): can be used for
interpretability of the decision made by the classification model. Landaluce, L. Arjona, A. Perallos, F.
Falcone, I. Angulo, and F. Muralter 2020 3. Enhancement of relay nodes communication approach in
WSN-IoT for underground coal mine R. This paper is to distinguish the deficiencies in Wireless
Sensor Networks the hubs have transmitted starting with one place then onto the next by utilizing the
particle swarm enhancement.
Cyber attacks have become a serious challenge for the IIoT. Initially the network nodes will advertise
their sensed data (topic). This classification presents mid- dlewares as virtual machines based on
modular pro- gramming, virtual database systems and adaptive mes- sage oriented s ystems. The use
of a virtual machine inside a middleware is a flexible approach since it can allow a programmer to
partition a large application into smaller modules. Thus, inspired from the GAF protocol that was
described in the previous section, we are aim devhaving node redundancy in mind, telop a protocol
rgulate in an ee enods of our wireless sensor network will be active and which ones will be in a sleep
mode. WSN e sy s Table 2. Wireless sensor network middlewar Project Main feature stems
evaluation based on designed criteria. O’Dea 2021 15. The Future of Industrial Communication:
Automation Networks in the Era of the Internet of Things and Industry 4.0 M. Wollschlaeger and T.
However, Mate middleware om the overhead that every new message introduces and also all the
messages are transmitted by flooding the network in order to minimize asynchronous events noti-
fications, raising issues with the energy consumption of every node inside the network. While the
IoT has no limitations in terms of processing or energy. The paper mainly focuses on research
challenges, issues, limitations, and the future direction of IoT and WSN frameworks in Industry 4.0.
1.1. Motivation The primary motivation for performing SLR is the ever-increasing trend of
automation in Industry 4.0. Industry 4.0 is made up of both WSN technology and IoT to digitize
work. Each intruder can be involved in numerous illegal activities, working alone, as a group, or
with agencies. The data abstraction layer acts as the database interface where all the data is been
stored. No prior knowledge of the topology of the network is necessary. The paper’s main
contribution involves formulating research questions from filtered data and building a strong work
foundation using SLR methods. Prophess, R. Kumar, and J. B. Gnanadhas 2020 90. An energy-
efficient and secure IoT-based WSN framework: an application to smart agriculture K. Haseeb, I. U.
Din, A. Almogren, and N. Islam 2020 91. Deployment schemes in a wireless sensor network to
achieve blanket coverage in large-scale open area Vikrant Sharmaa, R.B. Patelb, H.S. Bhadauriaa, D.
Prasadc 2016. FL works by training global and local models on the edge device. This article covers
all elements of WSN, from the design phase to the security requirements, from the implementation
phase to the classification of the network, and from the difficulties and challenges of WSN. The
bottom block consists of the hardware components of the node which are directly interfaced and
controlled by the operating system. In order to do so the sending agent must generate a query for that
tuple, matching the exact same sequence of fields. Explainable artificial intelligence (XAI): can be
used for interpretability of the decision made by the classification model. Agilla is based on the Mate
architecture in terms of the virtual machine specifications but unlike Mate, which as we described
above divides an applica- tion into capsules flooding the network, Agilla uses mo- bile agents in
order to deploy an application. A bidirectional long and short term memory network with a multi-
feature layer has been developed to avoid temporal attacks. With the UpnP protocol the user does
not need to self configure the network and devices in the network automatically will be discovered.
Because of their prevalence and use in industry, WSN have given rise to IWSN and IWSAN,
respectively. The contents of such a database are stored data and the sensor data. Majid, Mamoona,
Shaista Habib, Abdul Rehman Javed, Muhammad Rizwan, Gautam Srivastava, Thippa Reddy
Gadekallu, and Jerry Chun-Wei Lin. All the information is gathered and reported back to the
operator whose responsibility is to correct those problems in later stages. This fully connected
manufacturing system—operating without human intervention by generating, transferring, receiving,
and processing necessary data to conduct all required tasks for producing all kinds of goods—is one
of Industry 4.0’s key “constructs”. Data acquisition is an energy-consuming process, so extra care
must be taken during gathering and transmission. A novel low-rate denial of service attack detection
approach in ZigBee wireless sensor network by combining Hilbert-Huang transformation and trust
evaluation H. Chen, C. Meng, Z. Shan, Z. Fu, and B. K. Bhargava 2019 53. Analysis of quantities
influencing the performance of time synchronization based on linear regression in low-cost WSN D.
They stated that the detection algorithm performed much better for IoT (70%) than WSN (20%).
Studies selected for screening are described in Table 7. Again, security is the main problem, because
the security measurement expenses require more resources to maintain the speed of the network,
which is not affordable. In this architec- ture we have the existence of substations in the network but
this time no communication is allowed between them. Each node is designed in an interconnected
web that will grow upon the deploy- ment in mind. Based on that, all redundant nodes are placed
inside a cluster with only one node awake for a period of time per cluster while the others are in a
sleep mode for con- serving energy. Their scheme had high performance, low communication, and
computational costs, low energy consumption, and provided effective authentication of the user in
IoT. The types of wireless sensor network coverage are as follows. 4.3.1. Area Coverage Sensors
usually perform well in area coverage and monitors the field of interest (FoI). The authors also
discussed the obstacles and challenges, such as energy consumption, fault-tolerant, communication
interference, and cost feasibility, along with detailed surveys. In IoT frameworks, the client gains
access to the information and system management in an unintended environment due to issues such
as the use of sensor nodes. These cookies help provide information on metrics the number of visitors,
bounce rate, traffic source, etc. AI-enhanced title Full description Save Save sensors-15-24735.pdf
For Later 0% 0% found this document useful, Mark this document as useful 0% 0% found this
document not useful, Mark this document as not useful Embed Share Print Download now Jump to
Page You are on page 1 of 36 Search inside document. Out of these, the cookies that are categorized
as necessary are stored on your browser as they are essential for the working of basic functionalities
of the website. They also proposed a topology-based maintenance system to analyze network
architecture. The goal was to find research gaps in this area to help other researchers. Journal of
Pharmaceutical and BioTech Industry (JPBI). Majid M, Habib S, Javed AR, Rizwan M, Srivastava
G, Gadekallu TR, Lin JC-W. Classification models make decisions in a black box where the user
does not know how the decision is made. The node abstraction layer collects and stores all the nodes
metadata which will create relatio nal links with the database. IoT also has many application areas
such as agribusiness, climate, clinical care, education, transportation, and finance, as shown in Figure
2. O’Dea 2021 15. The Future of Industrial Communication: Automation Networks in the Era of the
Internet of Things and Industry 4.0 M. Wollschlaeger and T. A fully implemented middle- ware
should provide to the end user a flexible interface through which actions of coordination and support
will take place for multiple applications preferably in real time. A distributed denial of service
(DDoS) attack is a type of DoS attack that uses multiple users or infected systems to attack a
victim’s system or to attack a website so that it becomes unresponsive. Although technology has
increased, it has become prone to external attacks. Every node is assigned with a specific role inside
the network such as data acquisition and processing. Planning process of systematic literature review
(SLR). In this systematic literature review, WSN and IoT network threats were analyzed and a
descriptive comparative study was conducted. The sensor nodes are primarily distributed throughout
the network and are deployed in chains to detect interruptions. 4.3.3. Point Coverage Point coverage
aims to find a target within range using nearby nodes. In this study also explained the issues
involved in developing DT with the help of IoT manufacturing devices. Ashibani and Q. H.
Mahmoud 2017 2. A Review of IoT sensing applications and challenges using RFID and wireless
sensor networks H. These cookies track visitors across websites and collect information to provide
customized ads.
The Cougar middleware adopts the above approach by considering the extracted sensor da nal
database. They usually gain access to the organization’s framework through hardware damage and
web loopholes. Only a few targets are covered by individual nodes, while other targets can be
detected under other sensor scopes. Table 2 presents a tabular evaluation of the currently available
middleware systems in terms of their organiza- tion and func tionality. Blockchain is used for data
security and confidentiality, while SDN-IoT incorporates sensor networks and IoT devices to
improve the security services in Industry 4.0. Limitations of this study are that the developed model
SDN-IoT was still in the initial stage, so it was not able to detect different types of risks, such as
service denial (DoS) and flood attack and packet filtering. Journal of Functional Morphology and
Kinesiology (JFMK). They analyzed how WSN deployment in urban areas demanded much more
care and attention due to harsh weather and perverse channel conditions. IoT devices and
applications are used to process extracted data from WSN devices and transmit them to remote
locations. In order to develop a system architecture with the above characteristics, we focus
explicitly on the functions and the roles of wireless network management systems. Additionally, we
present th e middleware concept as a novel solution to the limitations that wireless sensor net- works
inhabit. Comparative analysis of the existing review papers. The second com- ponent is a transition
table and the final component is a call back library. Multiple 2021 14. Wide-area and short-range IoT
devices S. This paper also provides the limitations and future directions for IoT and WSN in
Industry 4.0. 3. Research Methodology The SLR followed in this work is based on the template of
IEEE SLR; all research steps and guidelines were followed using the same template. Also, the
intruder may destroy the node or collect important or unusual information that could be used against
the system. International Journal of Turbomachinery, Propulsion and Power (IJTPP). Wireless sensor
networks facilitate monitoring and controlling of physical environments from remote locations with
better accuracy. To achieve that most middlewares will adapt a publish-subscribe mechanism, an
asynchronous commu- nication paradigm which allows a loose coupling be- tween the sender and
the receiver saving precious power resources. They also discussed the security challenges and attacks
on IoT and WSN communication devices. Usually, and as we have already men- tioned, they can be
deployed in hundreds and typically physical harsh in the deployment a physical contact for
replacement or maintenance is highly unlikely. Hence, one of the basic design principles for our mid-
dleware is the ability to manage limited power and resources. Cookie Settings Accept All Reject All
Privacy Policy Manage consent. Paper should be a substantial original Article that involves several
techniques or approaches, provides an outlook for. This paper focuses more on the contributions of
IoT and WSN in Industry 4.0 and presents an in-depth review and analysis of IoT and WSN.
Editors select a small number of articles recently published in the journal that they believe will be
particularly. Attackers are used to attack routers by sending many false requests to prevent legitimate
routers from forwarding packets. The information about the contribution of WSN and IoT in IR 4.0,
network security attacks and intruders in WSN and IoT, WSN coverage, issues in IoT and WSN
framework, and limitations of existing reviews are explained in this section. The proposed paper is
more oriented towards the applications and contributions of IoT and WSN in Industry 4.0, along
with the security attacks, their challenges, and open issues in each domain. Inspired both form the
work of the Mate and Agilla middlewares we will introduce a mechanism that will allow mobile
code to be transmitted inside our network and will be able to allow changes in network parameters
such as the bandwidth of each node as well as applica- tion parameters such as switching between
available sensors of each node. They enhanced network throughput, low latency rate, energy
consumption, and packet drop ratio. The protocol is build upon two foundational assumptions.
The contents of such a database are stored data and the sensor data. Data and communication
technologies are increasing every day. WSN is a network that can transmit and receive through the
wireless medium by using the sensor devices for various nodes. GAF, which stands for geographic
adaptive fidelity, focuses its architecture on the extension of the lifetime of the network by
exploiting node redundancy. Therefore, it is important to make a systematic review article in this
realm, especially related to IoT and WSN, to show future directions. This attack also prevents the
website from functioning properly and disrupts regular traffic. A network management system can be
defined as a system with the ability to monitor and control a network from a central location. These
cookies ensure basic functionalities and security features of the website, anonymously. The nodes
have limited resources because battery capacity, correspondence capacity, and computing power are
low. IoT has gained much importance due to the abundant usage of these tiny networked devices.
They have applications in a variety of fields such as environ- mental monitoring; military purposes
and gathering sensing information in inhospitable locations. This leads to mis-routing and incorrect
displays of the routing protocol. 4.5.6. Wormhole Attacks A wormhole attack is a network layer
attack in which an invader attacks the WSN through two or more compromised nodes. Agilla
applications consist of mobile agents that can clone or migrate across the network. The use and
application of WSN and IoT in Industry 4.0 involves the processing of extracted data and the
efficient and secure transmission of this data to a remote location. WSN are used to sense structural
damages and identify their pinpoint location. In this version, robots can be programmed to work
alongside humans. The main objective of using the QAC was to ensure that the primary studies
selected were appropriate to address the concerns of previous studies. By adopting this essential
technology, companies have become smarter, more competitive, automated, and sustainable in the
global supply chain. Unlike traditional networks, sensor networks and their applications are real-time
phenomena with dy- namic resources. They discussed how RFIDs are used to trace devices while
WSN gathers information about them from interconnected devices. With the fourth industrial
revolution, it is observed that communication, computation, and storage costs have remarkably
decreased, which make integration of IoT and WSN possible and cost-effective globally. Next
Article in Special Issue A Novel Privacy Preserving Scheme for Smart Grid-Based Home Area
Networks. The authors also discussed the obstacles and challenges, such as energy consumption,
fault-tolerant, communication interference, and cost feasibility, along with detailed surveys. They
discussed the attacks and their detection mechanisms over the Internet. A bidirectional long and short
term memory network with a multi-feature layer has been developed to avoid temporal attacks.
Haseeb K, Islam N, Saba T, Rehman A, Mehmood Z. 2020 48. SEPTIC: Detecting injection attacks
and vulnerabilities inside the DBMS. Medeiros, M. Beatriz, N. Neves, and M. Correia 2019 49. An
efficient ECC-based provably secure three-factor user authentication and key agreement protocol for
wireless healthcare sensor networks. Journal of Cardiovascular Development and Disease (JCDD).
This means that all nodes will turn their radio on and exchange dis- covery messages in order to
identify neighbor nodes in the same grid. As Sympa- thy is a fully automated system, we will be
aiming to provide some kind of automatic mechanisms in our mid- dleware for the above design
criteria without thou gh this to be our first priority. In order to develop a system architecture with the
above characteristics, we focus explicitly on the functions and the roles of wireless network
management systems. Additionally, we present th e middleware concept as a novel solution to the
limitations that wireless sensor net- works inhabit.

You might also like