scholarly journals MAC Layer Protocols for Internet of Things: A Survey

2019 ◽  
Vol 11 (1) ◽  
pp. 16 ◽  
Author(s):  
Luiz Oliveira ◽  
Joel Rodrigues ◽  
Sergei Kozlov ◽  
Ricardo Rabêlo ◽  
Victor Albuquerque

Due to the wide variety of uses and the diversity of features required to meet an application, Internet of Things (IoT) technologies are moving forward at a strong pace to meet this demand while at the same time trying to meet the time-to-market of these applications. The characteristics required by applications, such as coverage area, scalability, transmission data rate, and applicability, refer to the Physical and Medium Access Control (MAC) layer designs of protocols. This paper presents a deep study of medium access control (MAC) layer protocols that are used in IoT with a detailed description of such protocols grouped (by short and long distance coverage). For short range coverage protocols, the following are considered: Radio Frequency Identification (RFID), Near Field Communication (NFC), Bluetooth IEEE 802.15.1, Bluetooth Low Energy, IEEE 802.15.4, Wireless Highway Addressable Remote Transducer Protocol (Wireless-HART), Z-Wave, Weightless, and IEEE 802.11 a/b/g/n/ah. For the long range group, Narrow Band IoT (NB-IoT), Long Term Evolution (LTE) CAT-0, LTE CAT-M, LTE CAT-N, Long Range Protocol (LoRa), and SigFox protocols are studied. A comparative study is performed for each group of protocols in order to provide insights and a reference study for IoT applications, considering their characteristics, limitations, and behavior. Open research issues on the topic are also identified.

Electronics ◽  
2020 ◽  
Vol 9 (8) ◽  
pp. 1273
Author(s):  
Yang Liu ◽  
Lei Liu ◽  
Jiacheng Liang ◽  
Jin Chai ◽  
Xuemei Lei ◽  
...  

Long Range (LoRa) has become one of the most promising physical layer technologies for the Internet of Things (IoT) ecosystem. Although it manifests low-power consumption and long-distance communication, LoRa encounters a large number of collisions in the IoT environment, which severely affects the system’s throughput and delay performance. In this paper, a code division carrier sense multiple access (CD/CSMA) protocol that resolves the traditional channel collision problem and implements multi-channel transmission is proposed for the LoRa medium access control (MAC) layer. To reduce data transmission delay and maximize the throughput of the system, the adaptive p-persistent CSMA protocol divides the channel load into four states and dynamically adjusts the data transmission probability. Then, to reduce channel collisions significantly, the code division multiple access (CDMA) protocol is performed on different channel states. Moreover, the combination of the proposed adaptive p-persistent CSMA protocol and the CDMA successfully reduces the number of data retransmissions and makes LoRa more stable. The simulation results demonstrate that the proposed adaptive p-persistent CD/CSMA protocol can achieve near-optimal and occasionally even better performance than some conventional MAC protocols, especially in a heavy load channel.


10.5772/9476 ◽  
2010 ◽  
Author(s):  
Jesus Alonso-Zarate ◽  
Elli Kartsakli ◽  
Luis Alonso ◽  
Christos Verikoukis

A set of wireless sensor nodes comprises to form a sensor field called Wireless Sensor Networks (WSN).The main purpose of using the sensor node is to collect information from the ambience process it and send to a common gateway interface called Base Station(BS). The major problems that we face while using WSN are limited battery power, bandwidth, security issues and transmission delay etc. Many algorithms and protocols were developed in order to solve the above issues. Therefore, better solutions are required to face the improvements and challenges in the current technologies. In WSN, the sensor node highly loses its energy during communication period. One of the major issues of Medium Access Control (MAC) layer is collision. Collision increases the energy consumption and delay of the sensor node. So we have to conserve the energy of the sensor node in order to extend the lifetime of the network. At the same time it is also important to transmit the data through secure path and identify the malicious node. In this paper, we propose a novelty approach called Secure Routing with Improved Medium Access control (SRI –MAC) Protocol to solve the issues. SRIMAC identifies packet precedence sets using Fuzzy Implication System (FIS) to avoid packet collision in MAC layer and also it detects wormhole attacks and selects secure path among k-paths using Particle Swarm Optimization (PSO) algorithm. By simulation results, we show that the proposed approach is efficient in terms of energy consumption and secure routing.


Sensors ◽  
2020 ◽  
Vol 20 (19) ◽  
pp. 5586
Author(s):  
Shreya Khisa ◽  
Sangman Moh

The Internet of Things (IoT), which consists of a large number of small low-cost devices, has become a leading solution for smart cities, smart agriculture, smart buildings, smart grids, e-healthcare, etc. Integrating unmanned aerial vehicles (UAVs) with IoT can result in an airborne UAV-based IoT (UIoT) system and facilitate various value-added services from sky to ground. In addition to wireless sensors, various kinds of IoT devices are connected in UIoT, making the network more heterogeneous. In a UIoT system, for achieving high throughput in an energy-efficient manner, it is crucial to design an efficient medium access control (MAC) protocol because the MAC layer is responsible for coordinating access among the IoT devices in the shared wireless medium. Thus, various MAC protocols with different objectives have been reported for UIoT. However, to the best of the authors’ knowledge, no survey had been performed so far that dedicatedly covers MAC protocols for UIoT. Hence, in this study, state-of-the-art MAC protocols for UIoT are investigated. First, the communication architecture and important design considerations of MAC protocols for UIoT are examined. Subsequently, different MAC protocols for UIoT are classified, reviewed, and discussed with regard to the main ideas, innovative features, advantages, limitations, application domains, and potential future improvements. The reviewed MAC protocols are qualitatively compared with regard to various operational characteristics and system parameters. Additionally, important open research issues and challenges with recommended solutions are summarized and discussed.


Sign in / Sign up

Export Citation Format

Share Document