Skip to main content Accessibility help
Hostname: page-component-8bbf57454-47mcc Total loading time: 0.368 Render date: 2022-01-22T01:03:46.134Z Has data issue: true Feature Flags: { "shouldUseShareProductTool": true, "shouldUseHypothesis": true, "isUnsiloEnabled": true, "metricsAbstractViews": false, "figures": true, "newCiteModal": false, "newCitedByModal": true, "newEcommerce": true, "newUsageEvents": true }

9 - Performance evaluation of wireless sensor networks

Published online by Cambridge University Press:  05 December 2014

Mohammad S. Obaidat
Monmouth University, New Jersey
Sudip Misra
Indian Institute of Technology
Get access


Performance evaluation of Wireless Sensor Networks (WSNs), like any communications network system, can be conducted by using simulation analysis, analytic modeling, and measurement/testing techniques. Evaluation of WSN systems is needed at every stage in their life. There is no point in designing and implementing a new system that does not have competitive performance, and does not meet the objectives and performance evaluation and quality of service requirements. Performance evaluation of an existing system is also important since it helps to determine how well it is performing and whether any improvements are needed in order to enhance the performance [1].

After a system has been built and is running, its performance can be assessed by using the measurement technique. In order to evaluate the performance of a component or subsystem that cannot be measured, for example, during the design and development phases, it is necessary to use analytic and/or simulation modeling so as to predict the performance [1–46].

The objective of this chapter is to provide an up-to-date treatment of the techniques that can be used to evaluate the performance of WSN systems.

Background information

Wireless sensor networks (WSNs) are unique in certain aspects that make them different from other wireless networks. These aspects include:

Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)


Obaidat, M. S., Fundamentals of Performance Evaluation of Computer and Telecommunication Systems, Wiley, 2010.CrossRefGoogle Scholar
Obaidat, M. S. and Papadimitriou, G. I., Eds., Applied System Simulation: Methodologies and Applications, Springer, 2003.CrossRef
Jain, R., The Art of Computer Systems Performance Analysis, New York: Wiley, 1991.Google Scholar
Kant, K., Introduction to Computer System Performance Evaluation, New York: McGraw-Hill, 1992.Google Scholar
Lilja, D. J., Measuring Computer Performance, Cambridge: Cambridge University Press, 2000.CrossRefGoogle Scholar
Obaidat, M. S., “Advances in performance evaluation of computer and telecommunications networking,” Computer Communication Journal, Elsevier, Vol. 25, Nos. 11–12, pp. 993–996, 2002.CrossRefGoogle Scholar
Obaidat, M. S., “ATM systems and networks: basics issues, and performance modeling and simulation,” Simulation: Transactions of the Society for Modeling and Simulation International, SCS, Vol. 78, No. 3, pp. 127–138, 2003.CrossRefGoogle Scholar
Obaidat, M. S., “Performance evaluation of telecommunication systems: models issues and applications,” Computer Communications Journal, Elsevier, Vol. 34, No. 9, pp. 753–756, 2003.Google Scholar
Ghanbari, M. C., Hughes, J., Sinclair, M. C. and Eade, J. P., Principles of Performance Engineering for Telecommunication and Information Systems, Hertfordshire, United Kingdom: IEE, 1997.CrossRefGoogle Scholar
Bao, F., Hu, R., Li, R. and Cheng, L., “Principles and implementation challenges of cooperative transmission for realistic WSNs,” Proceedings of the Second International Conference on Signal Processing Systems (ICSPS), Vol. 2, pp.V2-334–V2-338, 5–7 July 2010.Google Scholar
Altman, E., Basar, T., Jimenez, T. and Shimkin, N., “Competitive routing in networks with polynomial costs,” IEEE Transactions on Automatic Control, Vol. 47, No. 1, pp. 92–96, 2002.CrossRefGoogle Scholar
Seah, W. K., Eu, Z. A. and Tan, H-P., “Wireless sensor networks powered by ambient energy harvesting (WSN-HEAP) – survey and challenges,” in Proceedings of the 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronics Systems Technology, Wireless VITAE 2009, pp. 1–5, May 2009.
Enz, C., Scolari, N. and Yodprasit, U., “Ultra low-power radio design for wireless sensor networks,” in Proceedings of the 2005 IEEE International Workshop on Radio-Frequency Integration Technology: Integrated Circuits for Wideband Communication and Wireless Sensor Networks, pp. 1–17, 30 Nov./Dec. 2005.
Wang, Q. and Yang, W., “Energy consumption model for power management in wireless sensor networks,” in Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON ‘2007, pp. 142–151, June 2007.
Wielens, S., Galetzka, M. and Schneider, P., “Design support for wireless sensor networks based on the IEEE 802.15.4 standard,” in Proceedings of the 2008 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, pp. 1–5, Sept. 2008.
Conti, M., Di Pietro, R., Mancini, L. V. and Mei, A., “Requirements and open issues in distributed detection of node identity replicas in WSN,” in Proceedings of the 2006 IEEE International Conference on Systems, Man and Cybernetics, pp. 1468–1473, Oct. 2006.
Gupta, M., Obaidat, M. S. and Dhurandher, S., “Energy-efficient wireless sensor networks,” in Green Information and Communication Systems, Obaidat, M. S., Alagan, A. and Woungang, I., Eds. Elsevier, 2013.Google Scholar
Ramachandran, C., Obaidat, M. S., Misra, S. and Pena-Mora, F., “A secure, and energy-efficient scheme for group-based routing in heterogeneous ad-hoc sensor networks and its simulation analysis,” Simulation: Transactions of the Society for Modeling and Simulation International, Vol. 84, No. 2–3, pp. 131–146, Feb./March 2008.CrossRefGoogle Scholar
Dhurandher, S., Misra, S., Obaidat, M. S. and Khairwal, S., “UWSim: a simulator for underwater wireless sensor networks,” Simulation: Transactions of the Society for Modeling and Simulation International, SCS, Vol. 84, No. 7, pp. 327–338, July 2008.CrossRefGoogle Scholar
Misra, S., Tiwari, V. and Obaidat, M. S., “LACAS: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks,” IEEE Journal on Selected Area on Communications (JSAC), Vol. 27, No. 4, pp. 466–479, May 2009.CrossRefGoogle Scholar
Dhurandher, S. K., Obaidat, M. S. and Gupta, M., “An efficient technique for geocast region holes in underwater sensor networks and its performance evaluation,” Simulation: Modeling Practice and Theory, Elsevier, Vol. 19, No. 9, pp. 2102–2116, Sep. 2011.Google Scholar
Misra, S. and Obaidat, M. S., “Fire monitoring and alarm system for underground coal mines bord-and-pillar panel using wireless sensor networks,” Journal of Systems and Software, Vol. 85, No. 3, pp. 571–581, 2012.Google Scholar
Dhurandher, S., Obaidat, M. S., Misra, S. and Khairwal, S., “Efficient data acquisition in underwater wireless sensor ad-hoc networks,” IEEE Wireless Communications, Vol. 16, No. 6, pp. 70–78, Dec. 2009.CrossRefGoogle Scholar
Li, Z., Dehaene, W. and Gielen, G., “A 3-tier UWB-based indoor localization system for ultra-low-power sensor networks,” IEEE Transactions on Wireless Communications, Vol. 8, No. 6, pp. 2813–2818, June 2009.Google Scholar
Frank, R., Understanding Smart Sensors, 2nd ed. Norwood, MA: Artech House, 2000.Google Scholar
Obaidat, M. S. and Boudriga, N., Security of e-Systems and Computer Networks, Cambridge University Press, 2007.CrossRefGoogle Scholar
Obaidat, M. S. and Boudriga, N., Fundamentals of Performance Evaluation of Computer and Telecommunication Systems, Wiley, 2010.CrossRefGoogle Scholar
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. and Cayirci, E., “A survey on sensor networks,” IEEE Communications Magazine, Vol. 40, No. 8, pp. 102–114, Aug. 2002.CrossRefGoogle Scholar
Rentala, P., Musunuri, R., Gandham, S. and Saxena, U., “Survey on sensor networks,” in Proceedings of International Conference on Mobile Computing and Networking, 2001.
Zhou, L. and Haas, Z. J., “Securing ad hoc networks,” IEEE Network Magazine, Vol. 13, No. 6, pp. 24–30, Nov./Dec. 1999.CrossRefGoogle Scholar
Sundresh, S., Wooyoung, K. and Agha, G., “SENS: a sensor environment and network simulator”, in Proceedings of 37th Annual Simulation Symposium, pp. 221–228, Apr. 2004.
Wang, W., “Traffic analysis, modeling and their applications in energy-constrained wireless sensor networks – on network optimization and anomaly detection,” PhD Thesis, No. 78, Dept of Information Technology and Media, Mid Sweden University, Sundsvall, Sweden, 2010.
Krishnamurthi, N. and Yang, S. J., “Feasibility and performance analysis of sensor modeling in OPNET,” in Online Proceedings of OPNETWORK 2007, Washington, DC, Aug. 2007.Google Scholar
Timm-Giel, A., Murray, K., Becker, M., et al., “Comparative simulations of WSN,” ICT-MobileSummit, 2008.Google Scholar
Leung, S., Gomez, W. and Kim, J. J., “Zigbee mesh network simulation using Opnet and study of routing selection,” ENSC 427: Communication Networks, final project, 2009.
Marghescu, C., Pantazica, M., Brodeala, A. and Svasta, P., “Simulation of a wireless sensor network using OPNET,” in Proceedings of the 2011 IEEE International Symposium for Design and Technology in Electronic Packaging (SIITME 2011), pp. 249–252, 2011.
Chang, X., “Network simulations with OPNET,” in Proceedings of the 1999 Winter Simulation Conference, pp. 307–314, 1999.
Sundani, H., Li, H., Devabhaktuni, V., Alam, M. and Bhattacharya, P., “A survey and comparisons on wireless sensor network simulators,” International Journal of Computer Networks (IJCN), Vol. 2, No. 5, pp. 249–261, 2010.Google Scholar
, 29 Feb. 2012.
Ikeda, M., Kulla, E., Barolli, L. and Takizawa, M., “Wireless ad-hoc networks performance evaluation using NS-2 and NS-3 network simulators,” in Proceedings of the IEEE 2011 International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 40–45, 2011.
Yang, T., Mino, G., Spaho, E., et al., “A simulation system for multi mobile events in wireless sensor networks,” in Proceedings of the IEEE 2011 International Conference on Advanced Information Networking and Applications, pp. 411–418, 2011.
Kalita, H. K. and Kar, A., “Simulator based performance analysis of wireless sensor network – a new approach,” in First IEEE International Workshop on Wireless Communication and Networking Technologies for Rural Enrichment, pp. 461–465, 2011.
Al-Dhalaan, A. and Lambadaris, I., “Semidefinite programming for wireless sensor localization with lognormal shadowing,” in Proceedings of the 2009 IEEE International Conference on Sensor Technologies and Applications, pp. 187–193, 2009.
Sah, N., Prakash, N., Kumar, A., Da Kumar, and De Kumar, , “Optimizing the path loss of wireless indoor propagation models using CSP algorithms,” in Second International Conference on Computer and Network Technology, pp. 324–328, 2010.
Awad, M., Wong, K. and Li, Z., “An integrated overview of the open literature’s empirical data on the indoor radiowave channel’s delay properties,” Proceedings of the IEEE Transactions on Antennas and Propagation, Vol. 56, No. 5, May 2008.Google Scholar
Obaidat, M. S., Alagan, A. and Woungang, I., Eds., Handbook of Green Information and Communications Systems, Elsevier, 2013.

Send book to Kindle

To send this book to your Kindle, first ensure is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about sending to your Kindle.

Note you can select to send to either the or variations. ‘’ emails are free but can only be sent to your device when it is connected to wi-fi. ‘’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats

Send book to Dropbox

To send content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about sending content to Dropbox.

Available formats

Send book to Google Drive

To send content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about sending content to Google Drive.

Available formats