scholarly journals Energy-Efficient MAC Protocol for Wireless Sensor Networks - A Review

Author(s):  
Smriti Joshi ◽  
Anant Kr. Jayswal

Energy efficiency is the kernel issue in the designing of wireless sensor network(WSN) MAC protocols. Energy efficiency is a major consideration while designing wireless sensor network nodes. Most sensor network applications require energy autonomy for the complete lifetime of the node, which may span up to several years. These energy constraints require that the system be built such that Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. Each component consumes minimum possible power, ensure the average successful transmission rate, decrease the data packet average waiting time, and reduce the average energy consumption. Influencing by the design principles of traditional layered protocol stack, current MAC protocol designing for wireless sensor networks (WSN) seldom takes load balance into consideration, which greatly restricts WSN lifetime. As a novel Forwarding Election-based MAC protocol, is presented to prolong WSN lifetime by means of improving energy efficiency and enhancing load balance.

Author(s):  
Ghazaleh Kia ◽  
Alireza Hassanzadeh

Background & Objective: In this paper, a new energy efficient LEACH-based protocol for wireless sensor network is presented. One of the main issues in Wireless Sensor Networks (WSNs) is the battery consumption. In fact, changing batteries is a time consuming task and expensive. It is even impossible in many remote WSNs. Methods: The main goal of the presented protocol is to decrease the energy consumption of each node and increase the network lifetime. Lower power consumption results in longer battery lifetime. This protocol takes the advantage of sub-threshold technique and bee colony algorithm in order to optimize the energy consumption of a WSN. Simulation results show that the energy consumption of the wireless sensor network reduces by 25 percent using STBCP in comparison with recent LEACHbased protocols. It has been shown that the average energy of the network remains balanced and the distribution of residual energy in each round is equitable. Conclusion: In addition, the lifetime of a network using STBCP protocol has been increased by 23 percent regarding recently presented routing protocols.


2014 ◽  
Vol 8 (1) ◽  
pp. 658-663
Author(s):  
Jianjun Lang ◽  
Qigang Jiang

Wireless sensor network (WSN) consists of massive small sensor nodes which are located in monitoring region, the target of which is to cooperatively sense, collect and process the information of objects in the coverage area, then send the information to the observer through wireless communication. It can be widely used in military applications, medical treatment, traffic, environment monitoring and so on. Medium Access Control (MAC) Protocol, which decides how to share the wireless channel, allocates the limited communication resource among nodes and a good MAC protocol can save lots of energy and reduce collision. Firstly the thesis analyzed the research background and the current situation at home and abroad, and then discussed the structural characteristics of wireless sensor networks and other content, in which indicating the energy consumption of the wireless sensor network; Then, the thesis compared and analyzed the MAC protocols of the wireless sensor Network, focusing on competition-based MAC protocol S-MAC protocol in detail. From the shortcomings of the thesis proposed a new study of the improved protocol basing on the random work sleep scheduling mechanism; Finally, the thesis simulated the improving the MAC protocol, showing that the performances of the improved protocol are better than the original in improving energy efficiency, delay, throughput and so on from the analysis of simulation results.


2018 ◽  
Vol 7 (2.26) ◽  
pp. 25
Author(s):  
E Ramya ◽  
R Gobinath

Data mining plays an important role in analysis of data in modern sensor networks. A sensor network is greatly constrained by the various challenges facing a modern Wireless Sensor Network. This survey paper focuses on basic idea about the algorithms and measurements taken by the Researchers in the area of Wireless Sensor Network with Health Care. This survey also catego-ries various constraints in Wireless Body Area Sensor Networks data and finds the best suitable techniques for analysing the Sensor Data. Due to resource constraints and dynamic topology, the quality of service is facing a challenging issue in Wireless Sensor Networks. In this paper, we review the quality of service parameters with respect to protocols, algorithms and Simulations. 


2017 ◽  
Vol 13 (07) ◽  
pp. 36
Author(s):  
Yuxia Shen

<p><span style="font-size: medium;"><span style="font-family: 宋体;">In wireless sensor networks, for improving the time synchronization perfromance of online monitoring and application of ZigBee protocol, a scheme is designed. For this objective, first of all, the ZigBee protocol specification is summarized, a profound analysis of the hardware abstraction architecture of TinyOS operating system is made; the advantages of the ZigBee protocol compared with the traditional radio technology are comparatively analyzed. At the same time, the node design block diagram based on CC2430 and related development system is provided. In the TinyOS2.x operating system, we analyze CC2430 application program abstract architecture, and on this basis, give the realization process of program design. The research results showed that we achieve an on-line monitoring system based on ZigBee protocol, which has realistic significance of applying ZigBee protocol in wireless sensor network of electrical equipment online monitoring. Based on the above research, it is concluded that the online monitoring system can collect the temperature parameters of the monitored object in real time that it can be widely applied in wireless sensor networks.</span></span></p>


Author(s):  
Audrey NANGUE ◽  
◽  
Elie FUTE TAGNE ◽  
Emmanuel TONYE

The success of the mission assigned to a Wireless Sensor Network (WSN) depends heavily on the cooperation between the nodes of this network. Indeed, given the vulnerability of wireless sensor networks to attack, some entities may engage in malicious behavior aimed at undermining the proper functioning of the network. As a result, the selection of reliable nodes for task execution becomes a necessity for the network. To improve the cooperation and security of wireless sensor networks, the use of Trust Management Systems (TMS) is increasingly recommended due to their low resource consumption. The various existing trust management systems differ in their methods of estimating trust value. The existing ones are very rigid and not very accurate. In this paper, we propose a robust and accurate method (RATES) to compute direct and indirect trust between the network nodes. In RATES model, to compute the direct trust, we improve the Bayesian formula by applying the chaining of trust values, a local reward, a local penalty and a flexible global penalty based on the variation of successful interactions, failures and misbehaviors frequency. RATES thus manages to obtain a direct trust value that is accurate and representative of the node behavior in the network. In addition, we introduce the establishment of a simple confidence interval to filter out biased recommendations sent by malicious nodes to disrupt the estimation of a node's indirect trust. Mathematical theoretical analysis and evaluation of the simulation results show the best performance of our approach for detecting on-off attacks, bad-mouthing attacks and persistent attacks compared to the other existing approaches.


2014 ◽  
Vol 573 ◽  
pp. 407-411
Author(s):  
Chelliah Pandeeswaran ◽  
Natrajan Papa ◽  
Sundar G. Jayesh

MAC protocol design in Wireless sensor networks becomes vibrant research field for the past several years. In this paper an EE-Hybrid MAC protocol (Energy efficient hybrid Medium Access Control) has been proposed, which is energy efficient and low latency MAC protocol, which uses interrupt method to assign priority for certain wireless sensor nodes assumed to be present in critical loops of industrial process control domain. EE-Hybrid MAC overcomes some of the limitations in the existing approaches. Industrial wireless sensor network require a suitable MAC protocol which offers energy efficiency and capable of handling emergency situations in industrial automation domain. Time critical and mission critical applications demands not only energy efficiency but strict timeliness and reliability. Harsh environmental condition and dynamic network topologies may cause industrial sensor to malfunction, so the developed protocol must adapt to changing topology and harsh environment. Most of the existing MAC protocols have number of limitations for industrial application domain In industrial automation scenario, certain sensor loops are found to be time critical, where data’s have to be transferred without any further delay. The proposed EE-Hybrid MAC protocol is simulated in NS2 environment, from the result it is observed that proposed protocol provides better performance compared to the conventional MAC protocols.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4281
Author(s):  
Ngoc-Thanh Dinh ◽  
Younghan Kim

Wireless sensor network (WSN) studies have been carried out for multiple years. At this stage, many real WSNs have been deployed. Therefore, configuration and updating are critical issues. In this paper, we discuss the issues of configuring and updating a wireless sensor network (WSN). Due to a large number of sensor nodes, in addition to the limited resources of each node, manual configuring turns out to be impossible. Therefore, various auto-configuration approaches have been proposed to address the above challenges. In this survey, we present a comprehensive review of auto-configuration mechanisms with the taxonomy of classifications of the existing studies. For each category, we discuss and compare the advantages and disadvantages of related schemes. Lastly, future works are discussed for the remaining issues in this topic.


Author(s):  
Saloni Dhiman ◽  
Deepti Kakkar ◽  
Gurjot Kaur

Wireless sensor networks (WSNs) consist of several sensor nodes (SNs) that are powered by battery, so their lifetime is limited, which ultimately affects the lifespan and hence performance of the overall networks. Till now many techniques have been developed to solve this problem of WSN. Clustering is among the effective technique used for increasing the network lifespan. In this chapter, analysis of multi-hop routing protocol based on grid clustering with different selection criteria is presented. For analysis, the network is divided into equal-sized grids where each grid corresponds to a cluster and is assigned with a grid head (GH) responsible for collecting data from each SN belonging to respective grid and transferring it to the base station (BS) using multi-hop routing. The performance of the network has been analyzed for different position of BS, different number of grids, and different number of SNs.


Sensors ◽  
2019 ◽  
Vol 19 (10) ◽  
pp. 2378 ◽  
Author(s):  
Dennis Lisiecki ◽  
Peilin Zhang ◽  
Oliver Theel

Wireless sensor networks (WSNs) play a significant role in a large number of applications, e.g., healthcare and industry. A WSN typically consists of a large number of sensor nodes which rely on limited power sources in many applications. Therefore, improving the energy efficiency of WSNs becomes a crucial topic in the research community. As a fundamental service in WSNs, network flooding offers the advantages that information can be distributed fast and reliably throughout an entire network. However, network flooding suffers from low energy efficiency due to the large number of redundant transmissions in the network. In this work, we exploit connected dominating sets (CDS) to enhance the energy efficiency of network flooding by reducing the number of transmissions. For this purpose, we propose a connected dominating set-based flooding protocol (CONE). CONE inhibits nodes that are not in the CDS from rebroadcasting packets during the flooding process. Furthermore, we evaluate the performance of CONE in both simulations and a real-world testbed, and then we compare CONE to a baseline protocol. Experimental results show that CONE improves the end-to-end reliability and reduces the duty cycle of network flooding in the simulations. Additionally, CONE reduces the average energy consumption in the FlockLab testbed by 15%.


Sign in / Sign up

Export Citation Format

Share Document