Reference Hub2
Wireless Sensor Networks: A Technical Survey

Wireless Sensor Networks: A Technical Survey

Sonam, Manju Khari
ISBN13: 9781522541004|ISBN10: 1522541004|EISBN13: 9781522541011
DOI: 10.4018/978-1-5225-4100-4.ch001
Cite Chapter Cite Chapter

MLA

Sonam, and Manju Khari. "Wireless Sensor Networks: A Technical Survey." Handbook of Research on Network Forensics and Analysis Techniques, edited by Gulshan Shrivastava, et al., IGI Global, 2018, pp. 1-18. https://doi.org/10.4018/978-1-5225-4100-4.ch001

APA

Sonam & Khari, M. (2018). Wireless Sensor Networks: A Technical Survey. In G. Shrivastava, P. Kumar, B. Gupta, S. Bala, & N. Dey (Eds.), Handbook of Research on Network Forensics and Analysis Techniques (pp. 1-18). IGI Global. https://doi.org/10.4018/978-1-5225-4100-4.ch001

Chicago

Sonam, and Manju Khari. "Wireless Sensor Networks: A Technical Survey." In Handbook of Research on Network Forensics and Analysis Techniques, edited by Gulshan Shrivastava, et al., 1-18. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-4100-4.ch001

Export Reference

Mendeley
Favorite

Abstract

This chapter describes how as world is switching from wired communication to wireless communication, the need of a wireless sensor network (WSN) is increasing. WSNs became very popular due to its wide applications. A WSN is a network of small-in-size sensor nodes which are densely deployed for monitoring a chosen environment. In WSNs, each sensor node detects data and sends it to the base station. These sensor nodes have four basic duties, consisting of sensing, computation, transmission and power. Due to the small size, these sensor nodes are more constrained in terms of computational energy and storage resources. Energy awareness is also an essential design issue for routing protocols in WSNs. The focus of this chapter is to provide an overview of WSNs. In addition, this chapter describes the components of WSNs, its challenges and the classifications of WSNs. This chapter compares the results of LEACH, SEP and TEEN protocols.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.