DEPLOYMENT OF NODES IN WSNs
DOI:
https://doi.org/10.18623/rvd.v22.n3.3445Keywords:
WSN Technology, System Monitoring, Sensor Node, Advanced Sensing Functionalities, Routing Protocol, Path SelectionAbstract
The Internet of Things (IoT) facilitates widespread automation, simplifying human life by deploying sensors in interconnected environments. Recent developments in Micro Electro Mechanical Systems (MEMS) with technical advancements in terms of performance and miniaturization, wireless communications, and digital electronics have made it possible to produce small, inexpensive, and "smart" devices, including smartphones, PDAs, RFID systems, Wireless Sensor Networks (WSNs), and many other technologies to offer economically viable solutions for remote monitoring and data processing in complex and distributed environments. Strategy of communication and architecture of node, the model within the operation of the system monitoring assisted by sensor nodes in WSNs, their basic concepts, and manner of communication, also the way in which data is transmitted over a wireless link will be presented in this chapter to unite the necessities of a specific application.
References
Akyildiz, I. F. (2002). Wireless sensor networks: a survey. Computer Networks (Elsevier) google schola, 2, 6-14.
ATHMANI, Samir. Protocole de sécurité Pour les Réseaux de capteurs Sans Fil. 2010. Thèse de doctorat. Université de Batna 2.
EDDINE, Boubiche Djallel. Protocole de routage pour les réseaux de Capteurs Sans fil» mémoire de Magistère en Informatique. Université de l’Hadj Lakhdar-Batna Faculté des sciences de l’ingénieur, 2008.
KAMEL, Beydoun. Conception d’un protocole de routage hiérarchique pour les réseaux de capteurs. 2009. Thèse de doctorat. Thèse de Doctorat, Universite de franche-comte.
BELUCH, Thomas. High precision synchronized mac-phy cross-layer designed wireless sensor networks. 2013. Thèse de doctorat. Toulouse, INSA.
Boujaada, S., Qaraai, Y., Agoujil, S., & Hajar, M. (2016). Protector Control PC-AODV-BH in The Ad Hoc Networks. arXiv preprint arXiv:1606.02534.
Belfkih, A., Sadeg, B., Duvallet, C., & Amanton, L. (2014). Les bases de données dans les réseaux de capteurs sans fil. Tech. Sci. Informatiques, 33(9-10), 739-776.
Shebli, F. (2008). Réseaux de capteurs sans fil : minimisation de la consommation d'énergie et application à la localisation de cibles (Doctoral dissertation, Valenciennes).
Jingjing, Z., Tongyu, Y., Jilin, Z., Guohao, Z., Xuefeng, L., & Xiang, P. (2022). Intrusion Detection Model for Wireless Sensor Networks Based on MC‐GRU. Wireless Communications and Mobile Computing, 2022(1), 2448010.
Boubiche, D. E. (2013). Une approche Inter-Couches (cross-layer) pour la Sécurité dans les RCSF (Doctoral dissertation, Université de Batna 2).
Hanane, F., & Sabrina, C. (2011). Le routage dans les réseaux de capteurs sans fil (Doctoral dissertation, Université Mouloud Mammeri).
Uzougbo, O. I., Ajibade, S. S. M., & Taiwo, F. (2020). An overview of wireless sensor network security attacks: mode of operation, severity and mitigation techniques. arXiv preprint arXiv:2011.06779.
Akourmis, S., Fakhri, Y., & Rahmani, M. D. (2020). Design Model and Deployment Fashion of Wireless Sensor Networks. In Wireless Sensor Networks-Design, Deployment and Applications. IntechOpen.
FELLAH, K. S., & BEHIH, M. (2021). Analyse les performances d’un routage aléatoire sur les réseaux de capteurs sans fil (Doctoral dissertation, Université Ibn Khaldoun-Tiaret-).
Dâmaso, A., Rosa, N., & Maciel, P. (2014). Reliability of wireless sensor networks. Sensors, 14(9), 15760-15785.
Makhoul, A. (2008). Réseaux de capteurs : localisation, couverture et fusion de données (Doctoral dissertation, Besançon).
Challal, Y. (2008). Réseaux de capteurs sans fils. Cours, Systèmes Intelligents pour le Transport, Université de Technologie de Compiègne, France, 17.
Abdulwahhab, A. R., Salleh, M. F. M., Akb, M. F., & Abdullah, M. N. (2025). Intelligent Intrusion Detection in Clustered Wireless Sensor Networks: A Dynamic Clustering and Machine Learning-Based Approach. Iraqi Journal for Computer Science and Mathematics, 6(2), 30.
Zadeh, M. V., Fadayie, F., & Mirzaei, A. A comprehensive analysis of security in wireless sensor networks, including an examination of lightweight cryptography, artificial intelligence-based cryptography, and machine learning solutions.
Yaras, S., & Dener, M. (2024). IoT-based intrusion detection system using new hybrid deep learning algorithm. Electronics, 13(6), 1053.
Downloads
Published
How to Cite
Issue
Section
License
I (we) submit this article which is original and unpublished, of my (our) own authorship, to the evaluation of the Veredas do Direito Journal, and agree that the related copyrights will become exclusive property of the Journal, being prohibited any partial or total copy in any other part or other printed or online communication vehicle dissociated from the Veredas do Direito Journal, without the necessary and prior authorization that should be requested in writing to Editor in Chief. I (we) also declare that there is no conflict of interest between the articles theme, the author (s) and enterprises, institutions or individuals.
I (we) recognize that the Veredas do Direito Journal is licensed under a CREATIVE COMMONS LICENSE.
Licença Creative Commons Attribution 3.0





