Wireless Sensor Networks Protocols, Applications, and Network-On-Chip Communications
Wireless Sensor Networks Protocols, Applications, and Network-On-Chip Communications
Corresponding Author:
Adesh Kumar
Department of Electrical and Electronics Engineering, UPES
Dehradun, India
Email: [email protected]
1. INTRODUCTION
The latest developments in microelectromechanical systems, processor technologies, and low-power
radio communication technologies have produced low-power, low-cost, multi-functional small sensor devices
that can track alterations in the physical spectacles of their surroundings and respond accordingly [1]. These
sensing capabilities of such devices can be combined to produce an overall result when connected via
wireless media. An array of radio transceivers or transducers are features of wireless sensors that enable them
to gather data about their environment. These sensors can spontaneously establish themselves into an ad-hoc
multi-hop system to interact with one another and one or additional sink nodes when placed in a sensor field
in large numbers. With the help of the sink, a remote operator can send instructions to the sensor-based
communication network, giving the sensors the responsibility for data processing, collection, and
transmission [2]. The user can also subsequently utilize the sink to access the network-based sensed data.
The sensors connect the physical and digital worlds by catching and disclosing phenomena that
occur in the actual world and converting them into a format that can be managed, saved, and used for
information [3]. Sensors are widely used in machines, settings, and gadgets, and have a significant positive
social impact. They can reduce the likelihood of disastrous infrastructure failures, protect priceless natural
possessions, boost throughput, improve safety, and make possible innovative requests like context-responsive
systems and smart home automation technologies. The spectacular advancements in technologies like
wireless communications, microelectromechanical systems (MEMS), and very large-scale integration (VLSI)
have all contributed to the extensive adoption of disseminated sensor communication environments. For
instance, the remarkable advancements in semiconductor technologies endure in producing microprocessors
with smaller forms and higher processing rates [4]. Small, low-cost, and low-power sensors, actuators, and
controllers may now be created because of the shrinking of computing and sensing technology. Additionally,
embedded computer systems are often interfaced directly with the real-time world and are created to only
accomplish a small set of specific operations that remain to find use in an expanding variety of fields. There
is a growing emphasis on systems to monitor and safeguard pipeline infrastructure, the national power grid,
and civil structures like tunnels, bridges roads even if defense and aerospace systems continue to dominate
the market [5]. Multiple sensor nodes are already governed in networks to monitor the larger geographic
location for exhibiting, forecasting, and modeling environment behavior and parameters in flooding, and
pollution, gathering operational health care data, monitoring the bridges using vibration sensors, and handling
pesticide, water, and fertilize amount to advance the crop quantity and health [6]. The growing number of
sensors transmit the acquired data wirelessly to a centralized dispensation station, even while many sensors
physically connect to controllers and other handling stations in the local area network (LAN). This is crucial
since many complicated requests require thousands and hundreds of sensor nodes, many of which are placed
in difficult-to-reach locations and remote locations. Consequently, a wireless sensor also includes a sensing
module, data processing, communication, and parameter storage capabilities. With these developments, a
sensor node is now frequently responsible for not just collecting data objectively but also for correlating,
analyzing networks, and fusing data from both its sensors and those of other sensor nodes. A WSN is
generated when several sensor nodes cooperate to cooperatively monitor a sizable physical environment [7].
The sensor nodes interact not only with one another but also with the base station (BS), enabling
with the help of their wireless communication radios to transmit their sensor data to distant handling,
analysis, visualization, and storage systems. Figure 1 depicts the data processing in WSN two sensor nodes
used to monitor two different geographical areas and use their BS to access the Internet. The abilities of the
sensor nodes in specific WSNs might vary greatly. For instance, simple sensor nodes might be used to track a
single bodily event, whereas more complex devices could incorporate a variety of sensing modalities such as
acoustic, optical, and magnetic. Additionally, they may have different ways of communicating, such as using
ultrasonic, infrared, or radio frequency technologies, all of which have different data rates and latencies.
Additional controlling devices, which are used with substantial data processing, storage capacity, and energy,
may be used to conduct complex handling and aggregation functions, whereas simple sensors may merely
gather and send statistics about their sensing environment. Such devices frequently take on extra roles in a
WSN, such as forming communication backbones that other sensor devices with limited resources can utilize
to connect to the base station. In addition, this is crucial, some devices may be connected to additional
supporting technologies, including global positioning system (GPS) receivers, allowing them to pinpoint their
location. Additionally, these systems usually consume too much energy to be useful for cheap, low-power
sensor nodes [8].
Simple point elements or multipoint detection arrays can be used as sensors. For the abstraction and
preprocessing operation of physical surroundings data, nodes are often outfitted with one or additional
application-specific sensors and on-node signal communication competencies. Embedded network sensing
Wireless sensor networks protocols, applications, and network-on-chip communications (Ompal)
340 ISSN: 2722-2586
2. MOTIVATION
The motivation for the recent developments in the new domain relating to sensor design,
communication-based information technology (IT), and wireless methods inventions are the consequence of
current communication, engineering, and system-level networking developments. A bridge between the real
and digital worlds can be built using such sophisticated sensors. Sensors are active in an extensive diversity
of products, industries, and equipment to aid in avoiding setup failures, accidents, the conservation of
wildlife and expected resources, the augmentation of production and the provision of security. The
implementation of distributed sensor networks is a result of technological developments in VLSI, MEMS,
and wireless communication. Modern semiconductor technology has made it possible to create powerful
microprocessors that are more compact than those found in previous-generation goods. Due to the shrinking
of computing, processing, and sensing technologies, low-cost sensors, small controllers, and actuators are
now available. It is possible to separate a typical wireless sensor network into two components as follows: a
sensor node in WSN is made up of four fundamental parts: processing unit, sensor, power supply, and
communication system. An ADC converts the analog data that the sensor acquires from the outdoor
environment into digital data. A microprocessor or a microcontroller serves as the primary processing unit
that computes and processes data intelligently. All these components are based on low-power consumption
and electronics. For example, a small battery is applied to power the complete system. The electronic
transmission system comprises a radio receiver and a small-range radio communication system for data
communication and reception. In addition to the sensing element, a sensor node also includes processing,
communication, and storage components. A sensor node is in charge of gathering data from the physical
world, analyzing networks, correlating data, and fusing that data with data from other sensors to all these
characteristics, components, and improvements. Industrial automation and home automation have both made
extensive use of ZigBee [12]. Figure 2 shows the diagram of ZigBee for communication and industrial
automation-related applications. Proportional-integral-derivative (PID) and programmable logic controller
(PLC)-based feedback [13], feedforward, and cascade control mechanisms are the foundation of industrial
automation [14]. These controls are used to regulate various sensing devices, such as level sensors, pressure
sensors, and temperature sensors. Sensor devices can also control these parameters thanks to a variety of
actuators, servomotors, and valves. The full information is gathered for the supervisory control and data
acquisition (SCADA) system deployment [15] during the monitoring at the human machine interface (HMI)
IAES Int J Rob & Autom, Vol. 13, No. 3, September 2024: 338-350
IAES Int J Rob & Autom ISSN: 2722-2586 341
level in the central room. Such automation requires a more complicated wired communication system. One
wireless technology that can operate in such a setting is ZigBee. Two major factors that greatly impact the
functioning of a wireless sensor network are the minimization of energy consumption and the assurance of
safety. Additional security precautions are necessary for wireless sensor networks, such as encryption and
key management.
3. METHOD
The wireless LAN connects multiple devices to utilize an access point to the larger internet and
wireless distribution technology like spread-spectrum radio or orthogonal frequency division multiplexing
(OFDM). Users now have the freedom to move within a limited-service area while outstanding associated
with the communication network. Wi-Fi communication is used to identify most contemporary wireless
LANs, which follow the IEEE 802.11 standards. Wi-Fi LANs have grown in popularity in households and
commercial complexes that offer their clients wireless access often for free due to their ease of installation.
Extensive wireless network deployments are being developed in several of the most important cities. A
representation of successful Wi-Fi transmission with Ethernet, a Wi-Fi dish, a Wi-Fi router, and an internet
service provider. Commonly adopting various radio frequency (RF) methods, widely used wireless
communication devices typically operate in frequency ranges that are shared by numerous users. Bluetooth,
Wi-Fi, and newer ZigBee are specific technology examples used for communication. All three of them work
in the unrestricted working in 2.4 GHz band, also referred to as the ISM band, which has proved essential to
the growth of a vibrant and cutting-edge industry for embedded wireless communication devices. However,
the peaceful coexistence of various technologies is essential for each user of these bands to achieve its
communication goals, just as it is with any shared resource. Communication technologies that transmit, for
occurrence, at extremely different energy intensities may inhibit one another, despite efforts by standards
bodies to assure peaceful coexistence. It has been explicitly observed that Wi-Fi traffic may theoretically
interfere with ZigBee if both protocols interact on the matching channel, but Wi-Fi broadcasts frequently
ensue at significantly advanced energy levels.
devices can communicate with one another directly through a peer-to-peer (P2P) network. Without using
central access points, wireless devices that are close to one another can find and speak with one another
directly. Usually, two computers will employ this technique to join forces to create a system. If the signal
power meter is applicable in this scenario, it may not reliably deliver the intensity and may even be deceptive
because it measures the intensity of the robust signal, which might be the definite signal from the nearest
computer. Carrier sense multiple access/collision avoidance (CSMA/CA) is the foundation upon which IEEE
802.11 outlines the physical (PHY) layer and medium access control (MAC) layers. The 802.11 protocol
incorporates measures intended to reduce collisions since two portable devices may be within range of the
same admission point but not within reach of one another. Ad-hoc mode and infrastructure mode are the two
fundamental modes of the 802.11 protocol. Mobile devices broadcast straight P2P when in an ad-hoc manner.
When operating in infrastructure mode, mobile devices connect to wire network infrastructure via a contact
point that acts as a channel for communication. The 802.11 communication researchers additionally added
encryption methods based on shared-key mechanisms: Wi-Fi protected access (WPA), and wired equivalent
privacy (WEP), to safeguard wireless processor systems because wireless communication uses a more open
standard for transmission than wired LANs. Figure 3 presents an example of peer-to-peer topology.
3.2. Bridge
The bridge associates the different networks, usually of various sorts. The devices on a wired
Ethernet communication system can join a wireless setup using a wireless Ethernet embedded bridge. The
bridge assists as a wireless LAN accessing point. Figure 4 presents the bridge network used to communicate
between two hub networks. A bridge receives every frame or packet from LAN segments. To determine
which LAN or segment a packet is coming from and going to the bridge, create a table of addresses. All data
chunks and packets from LAN are directed to computers on LAN that are delivered by the bridge, which then
discards them all. Conversely, packets from one LAN are sent to a computer on another LAN that is read by
the bridge and then retransmitted to the LAN. Bridges are used to divide large, demanding networks into
several smaller, consistent networks to increase implementation. Bridges also allow the physical scope of a
system to expand. Additionally, bridges are used to establish a disconnected relationship between two LAN
segments using a synchronous modem component. WSN platforms have the feasibility that sensors are
positioned in a number of different locations throughout the bridge in a typical wireless sensor network
platform, which is used for the switching of bridges. In order to gather information about their surroundings,
the sensors that have been deployed and are dispersed throughout the structure conduct data collection.
3.3. Distribution
The wireless linking of contact sockets in an IEEE 802.11 system is made possible by a wireless
distribution system. Instead of a cable backbone connecting them, as is typically necessary, it enables a
wireless communication system to be extended by utilizing many contact points. The MAC addresses of
client packets are preserved by wireless distribution system (WDS) over other solutions across links between
IAES Int J Rob & Autom, Vol. 13, No. 3, September 2024: 338-350
IAES Int J Rob & Autom ISSN: 2722-2586 343
access points, which is a significant advantage. A contact point may be a foremost, relay, or distant base
location. If WPA and WEP keys are fully employed, all base places in the wireless dissemination network
should be aligned to use the identical radio channel or to be shared with them. The scheme could be set up
with various service set identifiers. The individual base station must be set up to advance to other stations in
the network for WDS to function. WDS is also frequently stated as a repeater approach since it performs
bridge and receives wireless consumers simultaneously unlike the customary association of nodes. Moreover,
the throughput in this technique is halved for all wirelessly associated users [18]. Figure 5 depicts the case of
distributed topology when connecting a network’s access points proving difficult repeaters can also be
installed as access points. The following are some features and considerations that are associated with the
implementation of a NoC for WSN.
− Energy efficiency: Energy efficiency is important for WSN sensor nodes, which are generally battery
powered. Communication energy usage should be minimized via the NoC. The use of energy-efficient
routing algorithms and protocols is required to connect nodes without wasting energy.
− Topology: The configuration of NoC is of utmost importance. Various topologies, such as mesh, tree, or
cluster-based topologies, may be appropriate depending on the specific application and deployment
environment. The topology should be engineered to maximize communication efficiency [20] and
minimize total energy usage.
− Scalability: WSNs can exhibit significant variations in terms of their physical dimensions. The NoC
should possess the ability to scale and handle varying quantities of sensor nodes without experiencing
notable declines in performance. Scalability considerations encompass routing algorithms that can adjust
to variations in network size and effective techniques for addressing and managing nodes [21].
− Real-time communication: Certain applications of WSN necessitate instantaneous communication, as
seen in industrial automation or healthcare monitoring. The NoC should be capable of accommodating the
demands of real-time communication. It is required to create communication protocols that can ensure
predictable and consistent performance in terms of both speed and dependability for applications that
require precise timing [22].
− Reliability: Sensor nodes are susceptible to failures or may have limited capabilities. The NoC should be
engineered to effectively manage node failures and guarantee dependable connectivity. To improve the
reliability of the communication infrastructure, it is possible to include redundancy and fault-tolerant
technologies.
− Quality of service (QoS): Communication requirements for distinct sensor nodes may differ depending on
the application. The capability of the NoC to deliver varying levels of QoS should be contingent upon the
requirements of the nodes.
− Security: The deployment of WSNs in sensitive environments raises substantial security concerns
incorporating authentication and encryption mechanisms to safeguard communications. Additionally,
intrusion detection mechanisms and secure routing protocols may be incorporated into the design of the
NoC [23].
− Resource management: WSNs rely heavily on effective resource administration. To maximize the
utilization of resources, the NoC ought to contemplate mechanisms that govern power management, data
aggregation, and dynamic resource allocation.
− Cross-layer optimization: The design of communication protocols may be influenced by cross-layer
optimization strategies, which consider interactions across multiple protocol stack layers. As a result,
WSN solutions may become more streamlined and individualized.
Wireless sensor networks protocols, applications, and network-on-chip communications (Ompal)
344 ISSN: 2722-2586
IAES Int J Rob & Autom, Vol. 13, No. 3, September 2024: 338-350
IAES Int J Rob & Autom ISSN: 2722-2586 345
IEEE 802.15.4
•This standard specifies the physical and MAC (Medium Access Control) layers for low-rate wireless personal
area networks (LR-WPANs). Its low power consumption and appropriateness for short-range communication
make it extensively utilized in WSNs.
Zigbee
•Based on the IEEE 802.15.4 standard, Zigbee is a group of high-level chat systems. Low-cost, low-power, and
low-data-rate apps are what it’s made for. Zigbee is often used for WSNs, home automation, and industrial
control.
5. DISCUSSION
Numerous applications of WSNs are either already in mature use or are still in the infancy phases of
research. Some of the major applications are highlighted here.
− Area monitoring: WSNs are frequently used for area monitoring. The nodes are deployed in WSN across
a region during area monitoring to keep an eye on a certain phenomenon [30]. Geo-fencing of oil
pipelines or gas is an example of a civilian application; using sensors to identify opponent entry is a
military example. One of the base stations receives a signal from the sensors indicating the monitored
event such as heat or pressure, which is then dealt with appropriately such as by directing a message to a
satellite or through the internet. In the same way, WSN may use a range of sensors, from motorcycles to
railway cars, to locate vehicles.
− Environmental/earth monitoring: WSNs have been widely used for environmental parameters such as
pressure, humidity temperature, and pressure. for real-time monitoring of earth data. The concept of
‘Environmental Sensor Networks’ has grown to encompass an extensive variety of WSN submissions in
earth science study and related research. This includes detecting glaciers, oceans, forests, and volcanoes.
These are a few of the key areas.
− Forest fire detection: To determine whether a forest fire has started, a collection of sensor network nodes
can be set up there. The nodes may have sensors that record temperature, humidity, and gases released by
burning wood or other vegetation. The fire contingent will be capable of recognizing when a fire is
happening and how it is increasing owing to WSN, which is essential for the firefighters’ ability to act
successfully.
− Air pollution monitoring: The concentration of dangerous substances is being monitored by WSN in
several major cities, including Stockholm, London, and Brisbane, for the benefit of the local population.
WSNs are used to monitor air pollution in India as well, in places like Delhi, Chennai, Bangalore,
Kolkata, and Mumbai. Instead of using wired installations, these can proceed with the benefits of ad-hoc
wireless communication networks, accessing them additionally transportable for challenging
interpretations in various locations [31]. Many topologies and different kinds of data exploration and
insertion can be employed for these applications.
− Landslide detection: The landslide exposure method makes use of WSN to detect minute soil activities
and changes in a variety of limitations that may occur before or during a landslide. Additionally, utilizing
the collected data, it may be possible to anticipate the likelihood of landslides far before they occur.
− Machine health monitoring: WSNs have been created for condition-based maintenance (CBM) of
machinery because they offer substantial budget reductions and open the door to new functions. Often,
installing enough sensors is impossible due to the value of wiring in wired systems. Wireless sensors can
now access previously inaccessible regions, dangerous or limited areas, whirling machinery, and mobile
resources.
− Data logging: WSNs are also used to collect data for the monitoring of environmental statistics. This might
be as simple as keeping track of a refrigerator’s temperature or a nuclear power plant’s overflow tank’s
water level. After that, the statistical data can be used to demonstrate how well the systems have performed.
The “live” data stream that is possible with WSNs gives them an edge over traditional loggers [32].
− Industrial sense and control applications: Numerous wireless sensor network communication protocols
have been created in recent years of research. While earlier studies mostly concentrated on power
cognizance, more research that is current has started to take an extensive range of factors into account,
such as the dependability of wireless links, real-time competencies, and QoS. These new attributes are
seen as key enablers for forthcoming wireless sense and controller applications in industrial settings as
well as those that are related, and they have the potential to supplement or completely replace traditional
wired networks.
− Water/wastewater monitoring: The water and wastewater sectors offer numerous prospects for the use of
wireless sensor networks. It is feasible to monitor facilities that are not wired for power or data
transmission using manufactured wireless I/O components and sensors powered by battery packs or solar
panels, as well as being used in pollution control boards.
− Agriculture: A growing trend in the agricultural sector is the use of wireless sensor networks, which
relieve farmers of the maintenance-intensive task of maintaining wiring in challenging conditions.
Wireless I/O components can operate pumps, and water applications can be detected and wirelessly
relayed back to the main controlling center for advertising. Pressure transmitters can be used to monitor
water tank levels in gravity-feed water systems. Automation in irrigation provides more effective water
usage and lowers waste.
− Greenhouse monitoring: WSNs also manage the humidity and temperature levels within viable
greenhouses. The greenhouse administrator gets information and related data via email or textual
IAES Int J Rob & Autom, Vol. 13, No. 3, September 2024: 338-350
IAES Int J Rob & Autom ISSN: 2722-2586 347
communication when the temperature and humidity fall below predetermined thresholds for host systems
to avoid activating misting networks, opening vents, turning on fans, or controlling a range of other
system reactions.
− Structural monitoring: WSN can be used to monitor movement inside of buildings and infrastructure,
such as embankments, bridges, flyovers, and tunnels, sparing engineering practice from the expense of
site visits and allowing it to take advantage of daily data, as opposed to the traditional method of
collecting this data, which required physical site visits and, in some cases, required closing roads or rail
lines. It is also far more accurate than a visual inspection. Figure 8 presents the applications of WSN.
− Passive localization and tracking: Utilizing the ubiquitous and affordable behavior of such technology as
well as the characteristics of the wireless associations, which are recognized in mesh interconnected WSN
nodes in communication infrastructure, the submission of WSN to the inactive localization and following
of non-cooperative targets has been utilized in such applications as people who lack identification tags,
mask, or any other identity [33].
− Smart home monitoring: Using wireless sensors included in common objects to build a WSN, monitoring
actions carried out in a smart home is made possible. The wireless sensor network, which enables
activity-support services, records state deviations to objects based on human operation.
Area MonitoringEnvironmental/
Medical Care Earth
Monitoring
Smart Home Air Pollution
Monitoring Monitoring
Structural Landslide
Monitoring Detection
WSN
Passive
Industrial
Localization and
Monitoring
Tracking
Greenhouse
Data Logging
Monitoring
Industrial Sense
Machine Health
and Control
Monitoring
Applications
Waste Water
Agriculture
Monitoring
The infrastructure is very impost for smart communication and a smart city, and the safety lifecycle
for fully autonomous cars is all part of the recommended smart communication solution [37]. It is crucial to
localize sensor nodes because without knowing where they came from, the data they collect may be
worthless. Some of the sensor nodes may run out of battery life too soon and stop performing their intended
purpose because of the network’s unevenly loaded data and the limited battery life [38]. This could cause the
network to become divided, with some parts of the network unable to transmit their sensed data to the sink
node. In this case, we must deploy additional new nodes into the network [39], [40].
6. CONCLUSION
A multidisciplinary approach is required when designing a NoC for WSN considering hardware
design, energy efficiency, communication protocols, and application-specific requirements. Before deploying
a NoC into a real-world environment, simulation, and modeling tools may also be useful for assessing the
efficacy of various NoC designs. The research can concentrate on augmenting the efficiency of NoC by
enhancing data transfer speeds, minimizing latency, and optimizing power consumption by designing
optimized routing algorithms and protocols to enhance communication efficiency among on-chip
components. The integration of WSN IoT and edge computing enables advanced data processing and
decision-making capabilities, enhancing research in the field of Integration with IoT and edge computing.
Exploring the function of WSN facilitating applications such as smart cities, healthcare monitoring, and
environmental sensing. Researchers in both NoC and WSN collaborate to investigate combined solutions that
utilize the advantages of both technologies. This includes developing communication systems that are both
energy-efficient and scalable, specifically designed for emerging applications.
ACKNOWLEDGEMENTS
Thanks to the UPES Communication System Lab for providing the platform for carrying out
the work.
REFERENCES
[1] H. A. H. Alobaidy, J. S. Mandeep, R. Nordin, and N. F. Abdullah, “A review on ZigBee-based WSNs: concepts, infrastructure,
applications, and challenges,” International Journal of Electrical and Electronic Engineering & Telecommunications, pp. 189–
198, 2020, doi: 10.18178/ijeetc.9.3.189-198.
[2] O. B. Akan and I. F. Akyildiz, “Event-to-sink reliable transport in wireless sensor networks,” IEEE/ACM Transactions on
Networking, vol. 13, no. 5, pp. 1003–1016, Oct. 2005, doi: 10.1109/TNET.2005.857076.
[3] I. F. Akyildiz, Weilian Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications
Magazine, vol. 40, no. 8, pp. 102–114, Aug. 2002, doi: 10.1109/MCOM.2002.1024422.
[4] N. Heydarishahreza, S. Ebadollahi, R. Vahidnia, and F. J. Dian, “Wireless sensor networks fundamentals: a review,” in 2020 11th
IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Nov. 2020, pp. 1–7, doi:
10.1109/IEMCON51383.2020.9284873.
[5] N. Bulusu, J. Heidemann, and D. Estrin, “GPS-less low-cost outdoor localization for very small devices,” IEEE Personal
Communications, vol. 7, no. 5, pp. 28–34, 2000, doi: 10.1109/98.878533.
[6] P. Baronti, P. Pillai, V. W. C. Chook, S. Chessa, A. Gotta, and Y. F. Hu, “Wireless sensor networks: a survey on the state of the
art and the 802.15.4 and ZigBee standards,” Computer Communications, vol. 30, no. 7, pp. 1655–1695, May 2007, doi:
10.1016/j.comcom.2006.12.020.
[7] M. S. BenSaleh, R. Saida, Y. H. Kacem, and M. Abid, “Wireless sensor network design methodologies: a survey,” Journal of
Sensors, vol. 2020, pp. 1–13, Jan. 2020, doi: 10.1155/2020/9592836.
[8] R. Challoo, A. Oladeinde, N. Yilmazer, S. Ozcelik, and L. Challoo, “An overview and assessment of wireless technologies and
co-existence of ZigBee, Bluetooth and Wi-Fi devices,” Procedia Computer Science, vol. 12, pp. 386–391, 2012, doi:
10.1016/j.procs.2012.09.091.
[9] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330,
Aug. 2008, doi: 10.1016/j.comnet.2008.04.002.
[10] N. John and A. Jyotsna, “A survey on energy efficient tree-based data aggregation techniques in wireless sensor networks,” in
2018 International Conference on Inventive Research in Computing Applications (ICIRCA), Jul. 2018, pp. 461–465, doi:
10.1109/ICIRCA.2018.8597222.
[11] M. Shafiq, H. Ashraf, A. Ullah, and S. Tahira, “Systematic literature review on energy efficient routing schemes in WSN-A
survey,” Mobile Networks and Applications, vol. 25, no. 3, pp. 882–895, Jun. 2020, doi: 10.1007/s11036-020-01523-5.
[12] M. A. Bin Karnain and Z. Bin Zakaria, “A review on ZigBee security enhancement in smart home environment,” in 2015 2nd
International Conference on Information Science and Security (ICISS), Dec. 2015, pp. 1–4, doi: 10.1109/ICISSEC.2015.7370969.
[13] N. Vamsi, A. Gupta, A. Dutta, and S. G. Singh, “Ultra low power on-chip hybrid start-up for wireless sensor networks,” in 2015
Nordic Circuits and Systems Conference (NORCAS): NORCHIP & International Symposium on System-on-Chip (SoC), Oct.
2015, pp. 1–4, doi: 10.1109/NORCHIP.2015.7364415.
[14] H. Fitriawan, M. Susanto, A. S. Arifin, D. Mausa, and A. Trisanto, “ZigBee based wireless sensor networks and performance
analysis in various environments,” in 2017 15th International Conference on Quality in Research (QiR) : International
Symposium on Electrical and Computer Engineering, Jul. 2017, pp. 272–275, doi: 10.1109/QIR.2017.8168495.
[15] S. Katyara, M. A. Shah, B. S. Chowdhary, F. Akhtar, and G. A. Lashari, “Monitoring, control and energy management of smart
grid system via WSN technology through SCADA applications,” Wireless Personal Communications, vol. 106, no. 4, pp. 1951–
1968, Jun. 2019, doi: 10.1007/s11277-018-5738-x.
[16] A. Shahraki, A. Taherkordi, O. Haugen, and F. Eliassen, “A survey and future directions on clustering: from WSNs to IoT and
modern networking paradigms,” IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 2242–2274, Jun.
2021, doi: 10.1109/TNSM.2020.3035315.
[17] Y. Yu, B. Xue, Z. Chen, and Z. Qian, “Cluster tree topology construction method based on PSO algorithm to prolong the lifetime
of ZigBee wireless sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2019, no. 1, Dec.
2019, doi: 10.1186/s13638-019-1523-0.
[18] T. Kim, S. H. Kim, and D. Kim, “Distributed topology construction in ZigBee wireless networks,” Wireless Personal
Communications, vol. 103, no. 3, pp. 2213–2227, Dec. 2018, doi: 10.1007/s11277-018-5905-0.
[19] J. Kim and I. Lee, “802.11 WLAN: history and new enabling MIMO techniques for next generation standards,” IEEE
Communications Magazine, vol. 53, no. 3, pp. 134–140, Mar. 2015, doi: 10.1109/MCOM.2015.7060495.
IAES Int J Rob & Autom, Vol. 13, No. 3, September 2024: 338-350
IAES Int J Rob & Autom ISSN: 2722-2586 349
[20] A. Jain, A. Kumar, and S. Sharma, “Comparative design and analysis of mesh, torus and ring NoC,” Procedia Computer Science,
vol. 48, pp. 330–337, 2015, doi: 10.1016/j.procs.2015.04.190.
[21] A. Kumar, P. Kuchhal, S. Singhal, and A. Kumar, “Network on chip for DTMF Decoder and TDM switching in
telecommunication network with HDL environment,” in 2013 3rd IEEE International Advance Computing Conference (IACC),
Feb. 2013, pp. 1582–1588, doi: 10.1109/IAdCC.2013.6514464.
[22] A. Kumar, P. Sharma, M. K. Gupta, and R. Kumar, “Machine learning based resource utilization and pre-estimation for network
on chip (NoC) communication,” Wireless Personal Communications, vol. 102, no. 3, pp. 2211–2231, Oct. 2018, doi:
10.1007/s11277-018-5376-3.
[23] A. Kumar, G. Verma, M. K. Gupta, M. Salauddin, B. K. Rehman, and D. Kumar, “3D multilayer mesh NoC communication and
FPGA synthesis,” Wireless Personal Communications, vol. 106, no. 4, pp. 1855–1873, Jun. 2019, doi: 10.1007/s11277-018-5724-
3.
[24] S. Crul, G. Ottoy, and L. De Strycker, “Location awareness enables autonomous commissioning in wireless sensor networks,” in
2016 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Oct. 2016, pp. 1–6, doi:
10.1109/IPIN.2016.7743604.
[25] V. K. Arora, V. Sharma, and M. Sachdeva, “On QoS evaluation for ZigBee incorporated wireless sensor network (IEEE 802.15.4)
using mobile sensor nodes,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 2, pp. 27–35,
Feb. 2022, doi: 10.1016/j.jksuci.2018.10.013.
[26] T. Rajasekaran and S. Anandamurugan, “Challenges and applications of wireless sensor networks in smart farming—a survey,” in
Advances in big data and cloud computing, 2019, pp. 353–361.
[27] D. M. Adat, P. V Mane-Deshmukh, S. K. Tilekar, and B. P. Ladgaonkar, “Smart fusion-based cSoC for wireless sensor network
for agricultural applications,” International Journal of Scientific Research in Science, Engineering and Technology, vol. 3, no. 5,
pp. 161–168, 2017.
[28] J. Liao, B. K. Singh, M. A. S. Khalid, and K. E. Tepe, “FPGA based wireless sensor node with customizable event-driven
architecture,” EURASIP Journal on Embedded Systems, vol. 2013, no. 1, Dec. 2013, doi: 10.1186/1687-3963-2013-5.
[29] Ompal, V. M. Mishra, and A. Kumar, “FPGA integrated IEEE 802.15.4 ZigBee wireless sensor nodes performance for industrial
plant monitoring and automation,” Nuclear Engineering and Technology, vol. 54, no. 7, pp. 2444–2452, Jul. 2022, doi:
10.1016/j.net.2022.01.011.
[30] P. Suresh, J. V. Daniel, V. Parthasarathy, and R. H. Aswathy, “A state of the art review on the internet of things (IoT) history,
technology and fields of deployment,” in 2014 International Conference on Science Engineering and Management Research
(ICSEMR), Nov. 2014, pp. 1–8, doi: 10.1109/ICSEMR.2014.7043637.
[31] D. Kandris, C. Nakas, D. Vomvas, and G. Koulouras, “Applications of wireless sensor networks: an up-to-date survey,” Applied
System Innovation, vol. 3, no. 1, Feb. 2020, doi: 10.3390/asi3010014.
[32] S. M. Mohamed, H. S. Hamza, and I. A. Saroit, “Coverage in mobile wireless sensor networks (M-WSN): a survey,” Computer
Communications, vol. 110, pp. 133–150, Sep. 2017, doi: 10.1016/j.comcom.2017.06.010.
[33] B. Rashid and M. H. Rehmani, “Applications of wireless sensor networks for urban areas: a survey,” Journal of Network and
Computer Applications, vol. 60, pp. 192–219, Jan. 2016, doi: 10.1016/j.jnca.2015.09.008.
[34] S. M. Aziz, D. H. Hoskin, D. M. Pham, and J. Kamruzzaman, “Remote reconfiguration of FPGA-based wireless sensor nodes for
flexible Internet of Things☆,” Computers and Electrical Engineering, vol. 100, May 2022, doi:
10.1016/j.compeleceng.2022.107935.
[35] N. Gupta, A. Jain, K. S. Vaisla, A. Kumar, and R. Kumar, “Performance analysis of DSDV and OLSR wireless sensor network
routing protocols using FPGA hardware and machine learning,” Multimedia Tools and Applications, vol. 80, no. 14, pp. 22301–
22319, Jun. 2021, doi: 10.1007/s11042-021-10820-4.
[36] S. Bhatnagar et al., “Efficient logistics solutions for e-commerce using wireless sensor networks,” IEEE Transactions on
Consumer Electronics, p. 1, 2024, doi: 10.1109/TCE.2024.3375748.
[37] X. Shao and R. Zhang, “Target-mounted intelligent reflecting surface for secure wireless sensing,” IEEE Transactions on
Wireless Communications, p. 1, 2024, doi: 10.1109/TWC.2024.3365215.
[38] Y. Y. Ghadi et al., “Machine learning solutions for the security of wireless sensor networks: a review,” IEEE Access, vol. 12, pp.
12699–12719, 2024, doi: 10.1109/ACCESS.2024.3355312.
[39] M. Y. Arafat, S. Pan, and E. Bak, “Distributed energy-efficient clustering and routing for wearable IoT enabled wireless body area
networks,” IEEE Access, vol. 11, pp. 5047–5061, 2023, doi: 10.1109/ACCESS.2023.3236403.
[40] R. Priyadarshi, “Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: a
comprehensive review,” Wireless Networks, vol. 30, no. 4, pp. 2647–2673, May 2024, doi: 10.1007/s11276-024-03697-2.
BIOGRAPHIES OF AUTHORS
IAES Int J Rob & Autom, Vol. 13, No. 3, September 2024: 338-350