IoT Based Wireless Sensor Networks – A Survey

International Journal of Computer Trends and Technology (IJCTT)          
© 2018 by IJCTT Journal
Volume-65 Number-1
Year of Publication : 2018
Authors : A.Anandhavalli, Dr.A.Bhuvaneswari
DOI :  10.14445/22312803/IJCTT-V65P104


MLA Style: A.Anandhavalli, Dr.A.Bhuvaneswari "IoT Based Wireless Sensor Networks – A Survey" International Journal of Computer Trends and Technology 65.1 (2018): 21-28.

APA Style:A.Anandhavalli, Dr.A.Bhuvaneswari (2018). IoT Based Wireless Sensor Networks – A Survey. International Journal of Computer Trends and Technology, 65(1), 21-28.

Wireless Sensor Networks (WSN) are used to monitor and control various domestic and industrial automations. Emerging Internet-of-Things (IoT) devices makes it possible to develop cost effective wireless sensor nodes with internet connectivity. The combination of IoT and WSN are moving towards edge technology. There are a number of aspects like throughput, communication delay, communication cost, power consumption and security are to be considered in IoT based Wireless sensor networks. In this work a detailed analysis of various IoT-WSN architectures and protocols are analysed for their performance.

[1] Yanru Wang, KokKeong Chai, Yue Chen, John Schormans, Jonathan Loo, "Energy-aware Restricted Access Window Controlwith Retransmission Scheme for IEEE 802.11ah (Wi-Fi HaLow) based Networks", Wireless On-demand Network Systems and Services (WONS), IEEE 2017
[2] Stefan Reis, Dirk Pesch, Bernd-Ludwig Wenning, Michael Kuhn, "Empirical path loss model for 2.4 GHz IEEE 802.15.4 wireless networks in compact cars", Wireless Communications and Networking Conference (WCNC), IEEE 2018
[3] Carles Gomez, JosepParadells, Carsten Bormann, Jon Crowcroft, "From 6LoWPAN to 6Lo: Expanding the Universe of IPv6-Supported Technologies for the Internet of Things", IEEE Communications Magazine Volume: 55, IEEE 2017
[4] Nils GentschenFelde, Tobias Guggemos, Tobias Heider, Dieter Kranzlmüller, "Secure group key distribution in constrained environments with IKEv2", IEEE Conference on Dependable and Secure Computing, IEEE 2017
[5] Tianhan Gao, Xinyang Deng, Yingbo Wang, Xiangjie Kong, "PAAS: PMIPv6 Access Authentication Scheme based on Identity-based Signature in VANETs", IEEE Access, IEEE 2018
[6] Huansheng Ning, Hong Liu, Laurence T. Yang, "Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Thing", IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, IEEE 2015
[7] YuvarajSahni, Jiannong Cao, Shigeng Zhang, Lei Yang, "Edge Mesh: A New Paradigm to Enable Distributed Intelligence in Internet of Things", SPECIAL SECTION ON MOBILE EDGE COMPUTING FOR WIRELESS NETWORKS, IEEE 2017
[8] Jonathan Webb, Fernando Docemmilli, Mikhail Bonin, "Graph Theory Applications in Network Security", Central Queensland University
[9] Daemin Shin, Vishal Sharma, Jiyoon Kim, Soonhyun Kwon, Ilsun You, "Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks", IEEE Access Volume 5, IEEE 2017
[10] Syed Hashim Raza Bukhari, Sajid Siraj, Mubashir Husain Rehmani, "NS-2 based simulation framework for cognitive radio sensor networks", Wireless Networks, Springer 2018
[11] Jiajia Chen, Zhaojun Qian, Tan Wang, Xi Li, "Modeling and simulation of IMT-2020(5G) systems and satellite communication systems based on OPNET network simulation technology", International Conference on Computer and Communications (ICCC), IEEE 2017

Internet-of-Things (IoT), Wireless Sensor Networks (WSN), IoT-WSN architecture, Network Protocol Performance