The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A wide range of applications such as disaster management, military, and security have fueled interest in sensor networks in recent years. Since the employed sensor nodes often are significantly constrained in their onboard energy, most of the research work, including that on medium access control (MAC) protocols, has focused on optimizing energy consumptions and cared less about data delivery latency...
Lifetime extension is a key design issue for wireless sensor networks (WSN) with battery-operated nodes. Compared with direct transmission, transmission power can be significantly reduced by cooperative communication, because it can effectively mitigate multi-path fading by introducing space diversity. In this paper, BER analysis for M-PSK and M-QAM modulation in noncooperative and cooperative situations...
Wireless sensor networks may support heterogeneous applications ranging from classical environmental monitoring, to more demanding integrated surveillance systems based on multimedia traffic. To this extent, we argue that the specific MAC layer solutions must be flexible enough to provide differentiated services based on the context of the specific WSN. In this work, we leverage the SPARE MAC protocol...
The deployment of large-scale wireless sensor networks presents major challenges whose solution requires the design and development of robust and time-efficient protocols. In this work, we focus on the design of an efficient and robust protocol aiming to rapidly configure highly populated networks. Our main effort goes towards the definition of a fast collision resolution protocol for conveying the...
Due to the limited battery in wireless sensor networks (WSNs), energy efficiency is an important factor when designing a MAC protocol. To minimize energy consumption, most of MAC protocols in WSNs exploit low duty cycling. Among those, RMAC allows a node to transmit a data packet for multiple hops in a single duty cycle, which is made possible by exploiting a control frame named Pioneer (PION) for...
We present a new analytical model of MAC layer for wireless ad hoc networks that takes into account channel bit errors and frame retry limits for a two-way handshaking mechanism. This model offers flexibility to address key design issues such as the effects of traffic parameters and possible improvements for wireless ad hoc networks. We illustrate that an important parameter affecting the performance...
This paper presents a MAC layer protocol, called RTMAC, for real-time data streaming in wireless sensor networks. RT-MAC eliminates need to contend for a wireless medium by potential transmitting nodes in a range by introducing feedback control packet, called Clear Channel (CC). RT-MAC maximizes spatial channel reuse by avoiding false blocking problem of RTS/CTS exchange based wireless MAC protocols...
As the wireless sensor network (WSN) technology evolves towards higher transmission rates, it makes sense to start considering sensing and transmission of real-time information, such as audio and video. These applications require quality of service (QoS) guarantees, not offered by current networks. The multi-hop nature of WSN makes QoS a challenging task. In addition, researchers have recently realized...
In this paper analytical models of the energy consumption are presented which uses a real world radio model with two different low power modes. This model is used to compare energy consumption of different MAC protocols. The MAC protocols used for the comparison are chosen with sensor networks is mind. The energy consumption of the nodes in a sensor network needs to be minimized to maximize the lifetime...
Motivated by the highly dynamic topology in wireless sensor networks with asynchronous duty cycle, and its impact on reliable data delivery, we propose a light-weight opportunistic forwarding (LWOF) scheme. Differing from other recently proposed schemes, LWOF neither employs historical network information nor a contention process to select a forwarder prior to data transmission. It takes advantage...
We study the delay performance of a sensor network, whose nodes access the medium by using the unslotted MAC protocol specified by the IEEE 802.15.4 standard. Unlike previous works which focus on the average throughput and delay analysis, we develop a detailed model that allows us to obtain the delivery delay distribution of messages sent by concurrently contending sensors toward a central controller...
In Ad Hoc or sensor networks, communication may be achieved between mobile nodes without a central entity (base station), in a half-duplex manner. The impact of jamming signals on those kinds of networks is studied. The contributions of this paper can be divided into two parts. In the first part, the probability of success, throughput and the maximum throughput are derived for the half-duplex Slotted...
Data theft in wireless sensor networks could prove disastrous and most of the time gets undetected due to no apparent abnormal behavior of malicious nodes. To counter such attacks, we propose an anomaly based distributed data-theft detection protocol. Our approach works at the MAC layer by effectively measuring the MAC control packets. In this paper, we present a novel detection metric, a centralized...
We present a novel approach for Medium Access Control (MAC) protocol design based on protocol engine. Current way of designing MAC protocols for a specific application is based on two steps: First the application specifications (such as network topology and packet generation rate), the requirements for energy consumption, delay and reliability, and the resource constraints from the underlying physical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.