scholarly journals A Bidirectional Polling MAC Mechanism for IoT

Electronics ◽  
2019 ◽  
Vol 8 (6) ◽  
pp. 715 ◽  
Author(s):  
Zheng Guan ◽  
Yao Jia ◽  
Min He

The Point Coordination Function (PCF)-based access control mechanism in IEEE 802.11 allows an access point to schedule stations in order to avoid hidden nodes and collisions. However, nearly all existing performance analysis models focus on the single-directional communication scenario, and these polling mechanisms consume a significant amount of energy resources. This study proposes a hybrid service bidirectional polling access control mechanism for transmission between an AP and N stations. To improve energy efficiency, the downlink data queue is assigned after all the uplink station queues, which allows the uplink station to sleep after it completes the data transmission, and it can remain in the sleep state until the downlink begins to broadcast. Then, a classical two-queue asymmetrical polling model is employed to analyze the performance of the PCF-based bidirectional access control system, and a Markov chain and generating function are used to derive a closed-form expression of the mean access delay for the uplink and downlink data. Simulations confirm that the proposed MAC mechanism could provide a maximum energy consumption reduction to 70% for 80 stations with respect to the limited-1 service mechanism in IEEE 802.11a PCF and the two-level polling model. Our analytical results are highly accurate for both homogeneous and heterogeneous traffic.




2013 ◽  
Vol 385-386 ◽  
pp. 1705-1707
Author(s):  
Tzer Long Chen ◽  
Yu Fang Chung ◽  
Jian Mao Hong ◽  
Jeng Hong Jhong ◽  
Chin Sheng Chen ◽  
...  

It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.







Sign in / Sign up

Export Citation Format

Share Document