The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we provide a general framework of distributed medium access control (DMAC) and synchronization for ad-hoc sensor networks with omni-directional antennas. Compared to existing works that focus on minimizing the energy consumption, our design objectives aim to increase the throughput, to lower the latency, and to solve hidden and exposed nodes problem in a traffic-heavy and dynamic environment...
Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and a challenge to conceal the activity patterns of the legitimate communication protocol from the jammer. In the context of energy-constrained wireless sensor networks, nodes are scheduled to maximize the common sleep duration...
Energy efficiency is a primordial issue in the wireless sensor networks. This is achieved by deactivating nodes when possible. In this paper we describe the MAC protocol MaCARI that synchronizes nodes in order to schedule active and inactive periods. MaCARI divides time into three periods: a synchronization period, a scheduled activities period where communications are constrained by a tree and an...
In the wireless sensor networks (WSNs), Synchronous approaches share the schedule information that specifies the cycle of active and sleep period by the control packets. On the other hand, asynchronous approaches do not exchange the synchronization information to send or receive data. Instead, they employ preamble sampling to do that. In this paper, we compare and analyze synchronous and asynchronous...
As wireless motes are battery powered, many listen-sleep Medium Access Control (MAC) protocols have been proposed to reduce energy consumption. Security issues related to the design of these protocols have, however, largely been ignored. In this paper, we present a novel attack (the synchronization attack) on listen-sleep MAC protocols. This attack can cause 100% message loss and approximately 30%...
In this paper we have proposed and implemented a joint medium access control (MAC) -cum- routing scheme for environment data gathering sensor networks. The design principle uses node dasiabattery lifetimepsila maximization to be traded against a network that is capable of tolerating: (a) A known percentage of combined packet losses due to packet collisions, network synchronization mismatch and channel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.