Modified Adaptive Mechanism For Optimising IEEE 802.15.4 WPANs For Wireless Sensor Networks

Author(s):  
Sukhvinder Singh Bamber ◽  
Naveen Dogra ◽  
Mohit Angurala

Abstract Different applications of Wireless Sensor Networks (WSNs) have different expectations from the working of Medium Access Control (MAC) protocols. Some value reliability more than delay incurred while some demand a fair trade-off for the factors like: Throughput, Bit Error Rate (BER) etc. This paper evaluates the performance of Wireless Personal Area Networks (WPANs) from 802.15.4 group for WSNs with modified algorithm which helps in reducing the Medium Access Delay and Delay in reaching of the packet from one end to another end. In this paper certain modifications to existing algorithm have been proposed for reducing the Medium Access Delay and to reduce the number of packets dropped. The result comparisons on the performance parameters like: network output load, generated acknowledged traffic, media access delay, battery consumed and delay in packet transmission from one end to another end that the back-off number & exponent values used for transmission play vital role for improving the performance of WSNs as they directly affect the number of packets dropped, successfully acknowledged and Medium Access Delay.

2013 ◽  
Vol 10 (9) ◽  
pp. 1963-1968
Author(s):  
Samundiswary P. ◽  
Surender R

IEEE 802.15.4 standard based wireless sensor networks (WSNs) emerges as the next generation wireless standard for low-rate wireless personal area networks. IEEE 802.15.4 standard offers low power, low data rate and short range networking for wireless battery powered devices. It has also started to demand much attention towards research. The performance of the network can be analysed by using different types of routing protocols. In this paper, the performance analysis of IEEE 802.15.4 based Wireless Sensor Networks is done by using  Location Aided Routing (LAR) protocols for the traffic applications such as Constant Bit Rate (CBR) and Zigbee traffic application. The LAR protocol enables the routing of data between the source and destination by using directional flooding technique. The performance metrics such as throughput, delay, jitter and packets dropped of LAR for  CBR and Zigbee traffic application is evaluated and analysed. The simulation is modelled by using QualNet.


2014 ◽  
Vol 989-994 ◽  
pp. 4737-4741
Author(s):  
Heng Wang ◽  
Bao Guo Wang ◽  
Shi Qiang Zhao ◽  
Xia Fu Lv

With the rapid development of Internet of things, IPv6 has been introduced into wireless sensor networks and widely used in many areas. It is significant to develop routing devices to connect wireless sensor networks and the Internet based on IPv6 technology. In this paper, we present a 6LoWPAN (IPv6 over Low power Wireless Personal Area Networks) border router scheme. The hardware design and software design are discussed and the experimental results demonstrate the feasibility of the router scheme. By using the proposed border router, the network can achieve end-to-end communications between 6LoWPAN nodes and IPv6 hosts in a universal method.


Author(s):  
M. Nanthini ◽  
◽  
Rabin kanisha K. R ◽  
V. Vakula ◽  
T. Vinothini ◽  
...  

Wireless Sensor Networks are appropriate for many applications such as agriculture, smart phones, automation and disaster reduction. In general, medium access control protocol (MAC) plays a vital role in WSN by informing the network when and how to access a medium and as a result it reduces the energy consumption. In wireless sensor networks in the star topology consistent 802.15.4k standard in which sensors could neglect to report detecting data to the get to point because of impermanent checks that disorder the connection with the access point. In this paper we discuss the connectivity and information loss of wireless environments. We categorize the work First; we study general connectivity requirements in relay networks. Second, to avoid information loss and to restore the proper connectivity. It can be performed by firefly algorithm with localizability aided localization protocol (F-LSL). It depends on the device of stochastic geometry and specifically, on Poisson direct procedures toward look for the tradeoff, which emerges from the determination of a subset of transfer hubs and the vital transmitted power that transfers need to use to reestablish arrange network.


2013 ◽  
Vol 284-287 ◽  
pp. 2015-2020 ◽  
Author(s):  
Rong Shue Hsiao ◽  
Ding Bing Lin ◽  
Hsin Piao Lin ◽  
Shu Chun Cheng ◽  
Chen Hua Chung

Wireless Sensor Networks are based on the ZigBee standard. ZigBee uses the IEEE 802.15.4 physical and MAC (medium access control) layers to provide standards-based reliable wireless data transfer. Also, ZigBee provides low-power wireless connectivity features. The features allow ZigBee-based products to be installed easily and cost-effectively. Thus, this technology has been attracting extensive research and development efforts to replace the traditional wired solutions for Building Automation Systems. However, wireless communications in indoor building environments are prone to be influenced by multiple concurrent factors, such as multi-path fading, channel contention, other radio interference, human activity and limited battery energy. Also, sensor detection is not fully reliable. Thus, system robustness is very concerning in these applications. In this paper, we propose a reliable wireless sensor network and an accurate occupancy detection mechanism. We implemented this system in an indoor building for the lighting control of public areas, including corridors, a coffee room and a washroom. The system framework was shown to be effective in terms of network communication reliability and sensor detection accuracy.


2020 ◽  
Vol 16 (10) ◽  
pp. 155014772095167
Author(s):  
Walter Tiberti ◽  
Federica Caruso ◽  
Luigi Pomante ◽  
Marco Pugliese ◽  
Marco Santic ◽  
...  

Among the classes of wireless personal area networks, a wireless sensor network typically refers to a versatile and densely distributed sensing platform that enables the support of a wide variety of application domains. Among the various technical challenges addressed by more than one decade of research in wireless sensor networks, security across wireless links is by far one of the most critical ones and relates to the need of guaranteeing reliability and trustiness of the collected data. This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms of confidentiality and authentication. In particular, moving from some results previously achieved in our research activity, this article extends a cryptography scheme in order to better comply with the security requirements that arise from real-world wireless sensor network installations. The proposed scheme, called topology-authenticated key scheme 2, takes advantage of hybrid cryptography to provide security in the presence of resource-constrained sensor nodes using topology-authenticated keys to provide increased robustness to the scheme itself. The proposed extensions provide full practical support to star-topology wireless sensor networks and the article presents also some experimental results obtained by implementing the scheme on two different wireless sensor network platforms available for protocol stacks compliant with the IEEE 802.15.4 standard.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3569 ◽  
Author(s):  
Majid Alshammari ◽  
Khaled Elleithy

Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the first two layers, the physical and medium access control layers; determines the radio wave used for communication; and defines the 128-bit advanced encryption standard (AES-128) for encrypting and validating the transmitted data. However, the standard does not specify how to manage, store, or distribute the encryption keys. Many solutions have been proposed to address this problem, but the majority are impractical in resource-constrained devices such as wireless sensor nodes or cause degradation of other metrics. Therefore, we propose an efficient and secure key distribution protocol that is simple, practical, and feasible to implement on resource-constrained wireless sensor nodes. We conduct simulations and hardware implementations to analyze our work and compare it to existing solutions based on different metrics such as energy consumption, storage overhead, key connectivity, replay attack, man-in-the-middle attack, and resiliency to node capture attack. Our findings show that the proposed protocol is secure and more efficient than other solutions.


Sign in / Sign up

Export Citation Format

Share Document