MAC Protocols for Wireless Sensor Networks

Author(s):  
Torsten Braun ◽  
Markus Anwander ◽  
Philipp Hurni ◽  
Markus Wälchli

The chapter describes related work on medium access control protocols for wireless sensor nodes. We focus on scheduled and contention-based protocols that have been proposed by the research community during the last few years. In particular, we evaluate the potential to save energy of several representative protocols, namely LMAC, TEEM, and WiseMAC. This has been done by measurements of implementations in real sensor networks. The measurement results show that by sophisticated MAC protocol design we can significantly improve the energy-efficiency and increase the lifetime of a sensor node. Real-world measurements are important to determine power consumption parameters of sensor nodes.

2021 ◽  
Vol 6 (6) ◽  
pp. 39-53
Author(s):  
Hanan Alahmadi ◽  
Fatma Boabdullah

Wireless Sensor Networks (WSNs) are witnessing a momentum spread especially with the growth of the Internet of Things (IoT) paradigm. Indeed, WSNs are considered as the main enabling infrastructure for IoT networks. Nowadays, the emerging WSNs applications require not only long network lifespan but also considerably high data rate. Consequently, conceiving Multichannel MAC protocols that save the scarceenergy budget of sensor nodes while providing high network throughput is crucial for the emerging WSNs applications. In this paper, a thorough review of recent multichannel MAC protocols is provided along with a classification framework to deeply understand the design aspects for each protocol.


Author(s):  
Pardeep Kumar ◽  
Mesut Gunes

This chapter provides an overall understanding of the design aspects of Medium Access Control (MAC) protocols for Wireless Sensor Networks (WSNs). A WSN MAC protocol shares the wireless broadcast medium among sensor nodes and creates a basic network infrastructure for them to communicate with each other. The MAC protocol also has a direct influence on the network lifetime of WSNs as it controls the activities of the radio, which is the most power-consuming component of resource-scarce sensor nodes. In this chapter, the authors first discuss the basics of MAC design for WSNs and present a set of important MAC attributes. Subsequently, authors discuss the main categories of MAC protocols proposed for WSNs and highlight their strong and weak points. After briefly outlining different MAC protocols falling in each category, the authors provide a substantial comparison of these protocols for several parameters. Lastly, the chapter discusses future research directions on open issues in this field that have mostly been overlooked.


2010 ◽  
Vol 6 (1) ◽  
pp. 163413 ◽  
Author(s):  
Moshaddique Al Ameen ◽  
S. M. Riazul Islam ◽  
Kyungsup Kwak

Energy efficiency is a primary requirement in a wireless sensor network (WSN). This is a major design parameter in medium access control (MAC) protocols for WSN due to limited resources in sensor nodes that include low battery power. Hence a proposed MAC protocol must be energy efficient by reducing the potential energy wastes. Developing such a MAC protocol has been a hot research area in WSN. To avoid wasting the limited energy, various energy saving mechanisms are proposed for MAC protocols. These mechanisms have a common design objective—to save energy to maximize the network lifetime. This paper presents a survey on various energy saving mechanisms that are proposed for MAC protocols in WSN. We present a detailed discussion of these mechanisms and discuss their strengths and weaknesses. We also discuss MAC protocols that use these energy saving mechanisms.


2013 ◽  
pp. 947-974
Author(s):  
Pardeep Kumar ◽  
Mesut Gunes

This chapter provides an overall understanding of the design aspects of Medium Access Control (MAC) protocols for Wireless Sensor Networks (WSNs). A WSN MAC protocol shares the wireless broadcast medium among sensor nodes and creates a basic network infrastructure for them to communicate with each other. The MAC protocol also has a direct influence on the network lifetime of WSNs as it controls the activities of the radio, which is the most power-consuming component of resource-scarce sensor nodes. In this chapter, the authors first discuss the basics of MAC design for WSNs and present a set of important MAC attributes. Subsequently, authors discuss the main categories of MAC protocols proposed for WSNs and highlight their strong and weak points. After briefly outlining different MAC protocols falling in each category, the authors provide a substantial comparison of these protocols for several parameters. Lastly, the chapter discusses future research directions on open issues in this field that have mostly been overlooked.


2018 ◽  
Vol 210 ◽  
pp. 03011
Author(s):  
Masahiro Okuri ◽  
Hiroaki Higaki

In wireless sensor networks, data messages containing sensor data achieved by a sensor module in a wireless sensor node is transmitted to a stationary wireless sink node along a wireless multihop transmission route in which wireless sensor nodes themselves forward the data messages. Each intermediate wireless sensor node broadcast data messages in its wireless transmission range to forward them to its next-hop intermediate wireless sensor node. Hence, eavesdropper wireless nodes within the wireless transmission range easily overhear the data messages. In order to interfere with the eavesdropper wireless nodes illegally overhearing the data messages in transmission, wireless sensor nodes whose wireless transmission ranges overlap and their next-hop intermediate wireless sensor nodes are out of the wireless transmission ranges each other forward data messages in transmission concurrently and cause collisions between these two data messages at any possible eavesdropper wireless nodes intentionally. To enhance regions where concurrently forwarded data messages intentionally collide to prevent their overhearing and to realize concurrent forwarding of data messages, this paper designes an algorithm for TDMA transmission slot assignments for more opportunities to interfere the eavesdropper wireless nodes.


2021 ◽  
Vol 11 (4) ◽  
pp. 2836-2849
Author(s):  
K. Raghava Rao ◽  
D. Sateesh Kumar ◽  
Mohiddin Shaw ◽  
V. Sitamahalakshmi

Now a days IoT technologies are emerging technology with wide range of applications. Wireless sensor networks (WSNs) are plays vital role in IoT technologies. Construction of wireless sensor node with low-power radio link and high-speed processors is an interesting contribution for wireless sensor networks and IoT applications. Most of WSNs are furnished with battery source that has limited lifetime. The maximum operations of these networks require more power utility. Nevertheless, improving network efficiency and lifetime is a curtail issue in WSNs. Designing a low powered wireless sensor networks is a major challenges in recent years, it is essential to model its efficiency and power consumption for different applications. This paper describes power consumption model based on LoRa and Zigbee protocols, allows wireless sensor nodes to monitor and measure power consumption in a cyclic sleeping scenario. Experiential results reveals that the designed LoRa wireless sensor nodes have the potential for real-world IoT application with due consideration of communicating distance, data packets, transmitting speed, and consumes low power as compared with Zigbee sensor nodes. The measured sleep intervals achieved lower power consumption in LoRa as compared with Zigbee. The uniqueness of this research work lies in the review of wireless sensor node optimization and power consumption of these two wireless sensor networks for IoT applications.


Author(s):  
GEETHANJALI S ◽  
PRAVIN RENOLD A

Wireless Sensor Network (WSN) is a self-organizing and distributed collection of small sensor nodes with limited energy are connected wirelessly to the sink, where the information is needed. The significant trait for any Wireless Sensor Network is power consumption since WSNs finds its most of the applications in unsafe, risky areas like Volcano eruption identification, Warfield monitoring, where human intervention is less or not possible at all. Hence designing a protocol with minimum energy consumption as a concern is an important challenge in increasing the lifetime of the sensor networks. Medium Access Control (MAC) Layer of WSN consumes much of the energy as it contains the radio component. Energy problems in MAC layer include collision, idle listening, and protocol overhead. Our Proposed MAC protocol provides solution for the problem of: collision by providing multiple channels; idle listening by providing sleeping mechanism for the nodes other than the active node; overhead by reducing the number of control messages. Avoiding collision results in the decrease in number of retransmissions which consumes more energy, avoiding idle listening problem will fairly increase the lifetime of the sensor node as well as the network’s lifetime and reducing overhead in turn consumes less energy.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3569 ◽  
Author(s):  
Majid Alshammari ◽  
Khaled Elleithy

Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the first two layers, the physical and medium access control layers; determines the radio wave used for communication; and defines the 128-bit advanced encryption standard (AES-128) for encrypting and validating the transmitted data. However, the standard does not specify how to manage, store, or distribute the encryption keys. Many solutions have been proposed to address this problem, but the majority are impractical in resource-constrained devices such as wireless sensor nodes or cause degradation of other metrics. Therefore, we propose an efficient and secure key distribution protocol that is simple, practical, and feasible to implement on resource-constrained wireless sensor nodes. We conduct simulations and hardware implementations to analyze our work and compare it to existing solutions based on different metrics such as energy consumption, storage overhead, key connectivity, replay attack, man-in-the-middle attack, and resiliency to node capture attack. Our findings show that the proposed protocol is secure and more efficient than other solutions.


2019 ◽  
Vol 11 (21) ◽  
pp. 6171 ◽  
Author(s):  
Jangsik Bae ◽  
Meonghun Lee ◽  
Changsun Shin

With the expansion of smart agriculture, wireless sensor networks are being increasingly applied. These networks collect environmental information, such as temperature, humidity, and CO2 rates. However, if a faulty sensor node operates continuously in the network, unnecessary data transmission adversely impacts the network. Accordingly, a data-based fault-detection algorithm was implemented in this study to analyze data of sensor nodes and determine faults, to prevent the corresponding nodes from transmitting data; thus, minimizing damage to the network. A cloud-based “farm as a service” optimized for smart farms was implemented as an example, and resource management of sensors and actuators was provided using the oneM2M common platform. The effectiveness of the proposed fault-detection model was verified on an integrated management platform based on the Internet of Things by collecting and analyzing data. The results confirm that when a faulty sensor node is not separated from the network, unnecessary data transmission of other sensor nodes occurs due to continuous abnormal data transmission; thus, increasing energy consumption and reducing the network lifetime.


Sign in / Sign up

Export Citation Format

Share Document