scholarly journals A Novel Channel Access Mechanism for IEEE 802.15.4e to Promote Internet of Things

IEEE 802.15.4e defines the specification of PHY layer and MAC layer. Although distinguished by its popularity and strength for Wireless Sensor Networks (WSNs), it still suffers from several limitations that deteriorates its performance. One such restriction is a high collision probability that degrades the performance of a dense network. In this article, we develop a Slotted Access Window (SAW) mechanism, a medium access technique to mitigate high collision probability and energy consumption in dense and battery constrained networks. An accurate analytical model is presented to assess the effectiveness of SAW mechanism and validated using the ns-3 simulator. Finally, results show that the SAW mechanism significantly improves the throughput, energy efficiency, and delay in contrast to the default medium access mechanism.

2012 ◽  
Vol 8 (1) ◽  
pp. 834784 ◽  
Author(s):  
Joseph Kabara ◽  
Maria Calle

Many researchers employ IEEE802.15.4 as communication technology for wireless sensor networks (WSNs). However, medium access control (MAC) layer requirements for communications in wireless sensor networks (WSNs) vary because the network is usually optimized for specific applications. Thus, one particular standard will hardly be suitable for every possible application. Two general categories of MAC techniques exist: contention based and schedule based. This paper explains these two main approaches and includes examples of each one. The paper concludes with a unique performance analysis and comparison of benefits and limitations of each protocol with respect to WSNs.


Author(s):  
Vijendra Babu D. ◽  
K. Nagi Reddy ◽  
K. Butchi Raju ◽  
A. Ratna Raju

A modern wireless sensor and its development majorly depend on distributed condition maintenance protocol. The medium access and its computing have been handled by multi hope sensor mechanism. In this investigation, WSN networks maintenance is balanced through condition-based access (CBA) protocol. The CBA is most useful for real-time 4G and 5G communication to handle internet assistance devices. The following CBA mechanism is energy efficient to increase the battery lifetime. Due to sleep mode and backup mode mechanism, this protocol maintains its energy efficiency as well as network throughput. Finally, 76% of the energy consumption and 42.8% of the speed of operation have been attained using CBI WSN protocol.


Electronics ◽  
2019 ◽  
Vol 8 (5) ◽  
pp. 534 ◽  
Author(s):  
Mahendra Ram ◽  
Sushil Kumar ◽  
Vinod Kumar ◽  
Ajay Sikandar ◽  
Rupak Kharel

Due to the rapidly growing sensor-enabled connected world around us, with the continuously decreasing size of sensors from smaller to tiny, energy efficiency in wireless sensor networks has drawn ample consideration in both academia as well as in industries’ R&D. The literature of energy efficiency in wireless sensor networks (WSNs) is focused on the three layers of wireless communication, namely the physical, Medium Access Control (MAC) and network layers. Physical layer-centric energy efficiency techniques have limited capabilities due to hardware designs and size considerations. Network layer-centric energy efficiency approaches have been constrained, in view of network dynamics and available network infrastructures. However, energy efficiency at the MAC layer requires a traffic cooperative transmission control. In this context, this paper presents a one-dimensional discrete-time Markov chain analytical model of the Timeout Medium Access Control (T-MAC) protocol. Specifically, an analytical model is derived for T-MAC focusing on an analysis of service delay, throughput, energy consumption and power efficiency under unsaturated traffic conditions. The service delay model calculates the average service delay using the adaptive sleep wakeup schedules. The component models include a queuing theory-based throughput analysis model, a cycle probability-based analytical model for computing the probabilities of a successful transmission, collision, and the idle state of a sensor, as well as an energy consumption model for the sensor’s life cycle. A fair performance assessment of the proposed T-MAC analytical model attests to the energy efficiency of the model when compared to that of state-of-the-art techniques, in terms of better power saving, a higher throughput and a lower energy consumption under various traffic loads.


Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4112
Author(s):  
Ayesha Akter Lata ◽  
Moonsoo Kang

Wireless sensor networks (WSNs) have been used for environmental monitoring and reporting for many decades. Energy consumption is a significant research topic because wireless sensor nodes are battery-operated to be highly energy-constrained. Several strategies have been introduced in routing and MAC (Medium Access Control) layer protocols to facilitate energy saving. At the routing layer, an energy-efficient routing protocol, known as opportunistic routing (OR), has been designed to improve efficiency. OR achieves energy efficiency via load-balancing, which forwards packets along multiple routes over WSNs. At the MAC layer, an energy-efficient MAC protocol known as the asynchronous duty-cycled MAC (ADCM) protocol achieves energy saving by turning on and off a sensor node’s transmitter and receiver to eliminate unnecessary energy wastage. These protocols each have their own advantages and disadvantages. OR achieves energy efficiency at the routing layer but it raises an issue at the MAC layer. ADCM achieves energy efficiency at the MAC layer, but it hinders the packet forwarding efficiency of the OR. To attain better energy efficiency, a combination of these two ideas led to the development of OR with asynchronous duty-cycled MAC (OR-ADCM). However, even with better energy efficiency, limitations still exist in combining load-balancing and duty-cycling due to conflicts in the inherent properties of OR and ADCM. In this paper, we present a survey of the evolution of OR-ADCM over WSNs to help the reader better understand and appreciate the details of this tradeoff, which we hope will lead to the development of better protocol designs.


Author(s):  
Pranav M. Pawar ◽  
Rasmus H. Nielsen ◽  
Neeli R. Prasad ◽  
Shingo Ohmori ◽  
Ramjee Prasad

Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, medium access control (MAC) layer attacks are considered the most harmful as they directly affect the available resources and thus the nodes’ energy consumption.The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it. The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of a WSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure mechanisms to reduce the degradation of the performance in WSNs due to an attack. Lastly, the paper proposes some solutions to reduce the effects of an attack.


Sign in / Sign up

Export Citation Format

Share Document