A Cluster-based priority Scheduling Algorithm for MAC Layer in Wireless Sensor Networks

2011 ◽  
Vol 6 (10) ◽  
Author(s):  
Liyong Bao ◽  
Dongfeng Zhao ◽  
Yifan Zhao
2010 ◽  
Vol 2 (4) ◽  
pp. 469-504 ◽  
Author(s):  
Saoucene Mahfoudh ◽  
Gerard Chalhoub ◽  
Pascale Minet ◽  
Michel Misson ◽  
Ichrak Amdouni

In wireless sensor networks, energy efficiency is mainly achieved by making nodes sleep. In this paper, we present the combination of SERENA, a new node activity scheduling algorithm based on node coloring, with TDMA/CA, a collision avoidance MAC protocol. We show that the combination of these two protocols enables substantial bandwidth and energy benefits for both general and data gathering applications. As a first contribution, we prove that the three-hop node coloring problem is NP-complete. As a second contribution, the overhead induced by SERENA during network coloring is reduced, making possible the use of these protocols even in dense networks with limited bandwidth. The third contribution of this paper is to show that applying any slot assignment algorithmwith spatial reuse based on node neighborhood without taking into account link quality can lead to poor performances because of collisions. The use of good quality links will prevent this phenomenon. The fourth contribution consists of optimizing end-to-end delays for data gathering applications, by means of cross-layering with the application. However, color conflicts resulting from topology changes, mobility and late node arrivals can give rise to collisions. As a fifth contribution, we show how the MAC layer can detect color conflicts, and cope with them at the cost of a slightly reduced throughput. Then, we discuss the tradeoffbetween requesting SERENA to solve the color conflicts and dealing with them at the MAC layer, our third contribution. The combination of SERENA and TDMA/CA is evaluated through simulations on realistic topologies.


2012 ◽  
Vol 35 (3) ◽  
pp. 529-539 ◽  
Author(s):  
Yun-Lu LIU ◽  
Ju-Hua PU ◽  
Wei-Wei FANG ◽  
Zhang XIONG

2012 ◽  
Vol 8 (1) ◽  
pp. 834784 ◽  
Author(s):  
Joseph Kabara ◽  
Maria Calle

Many researchers employ IEEE802.15.4 as communication technology for wireless sensor networks (WSNs). However, medium access control (MAC) layer requirements for communications in wireless sensor networks (WSNs) vary because the network is usually optimized for specific applications. Thus, one particular standard will hardly be suitable for every possible application. Two general categories of MAC techniques exist: contention based and schedule based. This paper explains these two main approaches and includes examples of each one. The paper concludes with a unique performance analysis and comparison of benefits and limitations of each protocol with respect to WSNs.


In the context of Wireless Sensor Networks (WSNs), the ability to detect an intrusion event is the most desired characteristic. Due to the randomness in nodes scheduling algorithm and sensor deployment, probabilistic techniques are used to analyze the detection properties of WSNs. However, traditional probabilistic analysis techniques, such as simulation and model checking, do not ensure accurate results, which is a severe limitation considering the mission-critical nature of most of the WSNs. In this chapter, the authors overcome these limitations by using higher-order-logic theorem proving to formally analyze the detection properties of randomly deployed WSNs using the randomized scheduling of nodes. Based on the probability theory, described in Chapters 5, they first formally reason about the intrusion period of any occurring event. This characteristic is then built upon to develop the fundamental formalizations of the key detection metrics: the detection probability and the detection delay. For illustration purposes, the authors formally analyze the detection performance of a WSN deployed for border security monitoring.


Sign in / Sign up

Export Citation Format

Share Document