The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present the new energy efficient MAC protocol for WSN, named as medium reservation preamble based MAC (MRPM). Inspired by S-MAC, the proposed MRPM is also a synchronized duty cycle MAC protocol. However, unlike S-MAC, the proposed protocol doesn't have separate time frame for Sync and data traffics. Both traffics are integrated in a short listen period. The listen period is further...
Energy efficiency is a primordial issue in the wireless sensor networks. This is achieved by deactivating nodes when possible. In this paper we describe the MAC protocol MaCARI that synchronizes nodes in order to schedule active and inactive periods. MaCARI divides time into three periods: a synchronization period, a scheduled activities period where communications are constrained by a tree and an...
In the wireless sensor networks (WSNs), Synchronous approaches share the schedule information that specifies the cycle of active and sleep period by the control packets. On the other hand, asynchronous approaches do not exchange the synchronization information to send or receive data. Instead, they employ preamble sampling to do that. In this paper, we compare and analyze synchronous and asynchronous...
As wireless motes are battery powered, many listen-sleep Medium Access Control (MAC) protocols have been proposed to reduce energy consumption. Security issues related to the design of these protocols have, however, largely been ignored. In this paper, we present a novel attack (the synchronization attack) on listen-sleep MAC protocols. This attack can cause 100% message loss and approximately 30%...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.