DEPLOYMENT OF NODES IN WSNs

Authors

DOI:

https://doi.org/10.18623/rvd.v22.n3.3445

Keywords:

WSN Technology, System Monitoring, Sensor Node, Advanced Sensing Functionalities, Routing Protocol, Path Selection

Abstract

The Internet of Things (IoT) facilitates widespread automation, simplifying human life by deploying sensors in interconnected environments. Recent developments in Micro Electro Mechanical Systems (MEMS) with technical advancements in terms of performance and miniaturization, wireless communications, and digital electronics have made it possible to produce small, inexpensive, and "smart" devices, including smartphones, PDAs, RFID systems, Wireless Sensor Networks (WSNs), and many other technologies to offer economically viable solutions for remote monitoring and data processing in complex and distributed environments. Strategy of communication and architecture of node, the model within the operation of the system monitoring assisted by sensor nodes in WSNs, their basic concepts, and manner of communication, also the way in which data is transmitted over a wireless link will be presented in this chapter to unite the necessities of a specific application.

References

Akyildiz, I. F. (2002). Wireless sensor networks: a survey. Computer Networks (Elsevier) google schola, 2, 6-14.

ATHMANI, Samir. Protocole de sécurité Pour les Réseaux de capteurs Sans Fil. 2010. Thèse de doctorat. Université de Batna 2.

EDDINE, Boubiche Djallel. Protocole de routage pour les réseaux de Capteurs Sans fil» mémoire de Magistère en Informatique. Université de l’Hadj Lakhdar-Batna Faculté des sciences de l’ingénieur, 2008.

KAMEL, Beydoun. Conception d’un protocole de routage hiérarchique pour les réseaux de capteurs. 2009. Thèse de doctorat. Thèse de Doctorat, Universite de franche-comte.

BELUCH, Thomas. High precision synchronized mac-phy cross-layer designed wireless sensor networks. 2013. Thèse de doctorat. Toulouse, INSA.

Boujaada, S., Qaraai, Y., Agoujil, S., & Hajar, M. (2016). Protector Control PC-AODV-BH in The Ad Hoc Networks. arXiv preprint arXiv:1606.02534.

Belfkih, A., Sadeg, B., Duvallet, C., & Amanton, L. (2014). Les bases de données dans les réseaux de capteurs sans fil. Tech. Sci. Informatiques, 33(9-10), 739-776.

Shebli, F. (2008). Réseaux de capteurs sans fil : minimisation de la consommation d'énergie et application à la localisation de cibles (Doctoral dissertation, Valenciennes).

Jingjing, Z., Tongyu, Y., Jilin, Z., Guohao, Z., Xuefeng, L., & Xiang, P. (2022). Intrusion Detection Model for Wireless Sensor Networks Based on MC‐GRU. Wireless Communications and Mobile Computing, 2022(1), 2448010.

Boubiche, D. E. (2013). Une approche Inter-Couches (cross-layer) pour la Sécurité dans les RCSF (Doctoral dissertation, Université de Batna 2).

Hanane, F., & Sabrina, C. (2011). Le routage dans les réseaux de capteurs sans fil (Doctoral dissertation, Université Mouloud Mammeri).

Uzougbo, O. I., Ajibade, S. S. M., & Taiwo, F. (2020). An overview of wireless sensor network security attacks: mode of operation, severity and mitigation techniques. arXiv preprint arXiv:2011.06779.

Akourmis, S., Fakhri, Y., & Rahmani, M. D. (2020). Design Model and Deployment Fashion of Wireless Sensor Networks. In Wireless Sensor Networks-Design, Deployment and Applications. IntechOpen.

FELLAH, K. S., & BEHIH, M. (2021). Analyse les performances d’un routage aléatoire sur les réseaux de capteurs sans fil (Doctoral dissertation, Université Ibn Khaldoun-Tiaret-).

Dâmaso, A., Rosa, N., & Maciel, P. (2014). Reliability of wireless sensor networks. Sensors, 14(9), 15760-15785.

Makhoul, A. (2008). Réseaux de capteurs : localisation, couverture et fusion de données (Doctoral dissertation, Besançon).

Challal, Y. (2008). Réseaux de capteurs sans fils. Cours, Systèmes Intelligents pour le Transport, Université de Technologie de Compiègne, France, 17.

Abdulwahhab, A. R., Salleh, M. F. M., Akb, M. F., & Abdullah, M. N. (2025). Intelligent Intrusion Detection in Clustered Wireless Sensor Networks: A Dynamic Clustering and Machine Learning-Based Approach. Iraqi Journal for Computer Science and Mathematics, 6(2), 30.

Zadeh, M. V., Fadayie, F., & Mirzaei, A. A comprehensive analysis of security in wireless sensor networks, including an examination of lightweight cryptography, artificial intelligence-based cryptography, and machine learning solutions.

Yaras, S., & Dener, M. (2024). IoT-based intrusion detection system using new hybrid deep learning algorithm. Electronics, 13(6), 1053.

Downloads

Published

2025-10-29

How to Cite

AKOURMIS, S., & Fakhri, Y. (2025). DEPLOYMENT OF NODES IN WSNs. Veredas Do Direito, 22, 223445. https://doi.org/10.18623/rvd.v22.n3.3445