Prioritised and Adaptive Preamble Sampling MAC Protocols for Wireless Sensor Networks

Prioritised and Adaptive Preamble Sampling MAC Protocols for Wireless Sensor Networks
Author: Sabrieh Choobkar
Publisher:
Total Pages:
Release: 2014
Genre:
ISBN:

We study the effects of multiple receiver nodes, size of preamble and variable duty-cycle on number of data retransmissions in both single-hop and multi-hop data forwarding. The analytical and numerical results demonstrate the applicability of the derived protocols in addition to energy efficiency, while maintaining comparable reliability in data delivery.

Adaptive Receiver-based Preamble-sampling MAC Protocol for Low Power and Lossy Wireless Sensor Networks

Adaptive Receiver-based Preamble-sampling MAC Protocol for Low Power and Lossy Wireless Sensor Networks
Author: Mohammad Reza Akhavan
Publisher:
Total Pages: 256
Release: 2014
Genre: Wireless communication systems
ISBN:

We demonstrate through analytical and simulation that the proposed extensions improve the end-to-end energy efficiency and delay while maintaining comparable reliability of data delivery. • We apply RB-MAC to IETF ROLL'S RPL routing protocol [RFC6550] to study the multi- hop performance of RB-MAC. The analytical and simulation-based results show significant improvement in energy-efficiency, delay and reliability against sender-based MAC.

Adaptive MAC Protocols for Data-intensive Wireless Sensor Networks

Adaptive MAC Protocols for Data-intensive Wireless Sensor Networks
Author: Alvaro Enrique Monsalve Ballester
Publisher:
Total Pages:
Release: 2016
Genre:
ISBN:

This thesis presents PRIMAC, which is a medium access control protocol that provides quality of service for data-intensive wireless sensor networks through service differentiation. Data-intensive wireless sensor networks comprise nodes that generate high volumes of data during an event, for instance, images, audio, video or seismic monitoring. Data-intensive applications introduce new research challenges due to the high volume of data to be transmitted over unreliable channels, and the bursty nature of their transmission profiles. PRIMAC is based on a channel contention CSMA mechanism with non-uniform contention window. It achieves higher access priority for selected data-intensive nodes without deteriorating the network channel utilization. Experimental results demonstrate that PRIMAC provides better network performance than the widely adopted IEEE 802.15.4 standard, in terms of normalised channel throughput and packet delivery ratio.We also introduce wireless sensor network designs that could achieve optimal throughput for nodes with homogeneous data-intensive traffic conditions. The sensor nodes operate using the contention access method of IEEE 802.15.4 MAC protocol with optimised setting of the standard protocol parameters. An analytical model of the carrier sense multiple access with collision avoidance (CSMA-CA) algorithm is proposed and equations are derived to obtain the appropriate CSMA-CA parameters. We present PRIMAC-Uniform for homogeneous data-intensive WSNs, which is an enhanced carrier sense multiple access with collision avoidance scheme of IEEE 802.15.4 with uniform contention window for that guarantees near optimal normalised channel throughput. We evaluate the performance of our protocol and compare it with the standard CSMA-CA algorithm of IEEE 802.15.4 by using an experimental testbed in an indoor environment. We find that PRIMAC-Uniform doubles the packet delivery ratio for any network size whilst keeping high levels of throughput. In summary, this thesis focuses on the design of medium access protocols and optimal network architecture for a newer generation of wireless sensor networks that have high data transmission requirements. The results demonstrate that data intensive WSNs could be realised through the implementation of optimal strategies in the nodes in order to successfully contend for a shared medium.

Position Location Techniques and Applications

Position Location Techniques and Applications
Author: David Munoz
Publisher: Academic Press
Total Pages: 297
Release: 2009-05-15
Genre: Technology & Engineering
ISBN: 0080921930

This book is the definitive guide to the techniques and applications of position location, covering both terrestrial and satellite systems. It gives all the techniques, theoretical models, and algorithms that engineers need to improve their current location schemes and to develop future location algorithms and systems. Comprehensive coverage is given to system design trade-offs, complexity issues, and the design of efficient positioning algorithms to enable the creation of high-performance location positioning systems. Traditional methods are also reexamined in the context of the challenges posed by reconfigurable and multihop networks. Applications discussed include wireless networks (WiFi, ZigBee, UMTS, and DVB networks), cognitive radio, sensor networks and multihop networks. Features Contains a complete guide to models, techniques, and applications of position location Includes applications to wireless networks, demonstrating the relevance of location positioning to these "hot" areas in research and development Covers system design trade-offs and the design of efficient positioning algorithms, enabling the creation of future location positioning systems Provides a theoretical underpinning for understanding current position location algorithms, giving researchers a foundation to develop future algorithms David Muñoz is Director and César Vargas is a member of the Center for Electronics and Telecommunications, Tecnológico de Monterrey, Mexico. Frantz Bouchereau is a senior communications software developer at The MathWorks Inc. in Natick, MA. Rogerio Enríquez-Caldera is at Instituto Nacional de Atrofisica, Optica y Electronica (INAOE), Puebla, Mexico. Contains a complete guide to models, techniques and applications of position location Includes applications to wireless networks (WiFi, ZigBee, DVB networks), cognitive radio, sensor networks and reconfigurable and multi-hop networks, demonstrating the relevance of location positioning to these ‘hot’ areas in research and development Covers system design trade-offs, and the design of efficient positioning algorithms enables the creation of future location positioning systems Provides a theoretical underpinning for understanding current position location algorithms, giving researchers a foundation to develop future algorithms

Traffic Adaptive Schedule-based MAC Protocol for Wireless Sensor Networks

Traffic Adaptive Schedule-based MAC Protocol for Wireless Sensor Networks
Author: Maryam Vahabi
Publisher:
Total Pages: 204
Release: 2008
Genre:
ISBN:

Wireless sensor networking is an emerging technology that has a wide range of potential applications including monitoring, medical systems, real-time, robotic exploration and etc. Energy is a critical resource in battery-powered sensor networks. Medium access control has an important role in minimizing energy consumption while it is responsible for successful data transferring in the network. Periodic data collection is the most comprehensive way of data gathering mechanism in wireless sensor network in which nodes report their samples in specific time intervals. It is possible to have some nodes with different update intervals in the network and therefore, finding a solution to accommodate nodes with different sampling intervals while maintaining the energy efficiency is the primary concern of this thesis. In this work, we propose a schedule-based MAC protocol that supports periodic traffic with different sampling rates in an energy efficient manner while maintaining minimum packet loss and end-to-end delay. The schedule-based MAC design is used for eliminating the idle listening problem which leads to smaller energy consumption. We introduce a traffic adaptive technique that arranges the time schedule of each node with respect to its sampling rate. Route partitioning technique is the next step of our design to provide a collision free data transfer. By this mechanism, each route will be activated in a specific time regarding to the sampling interval of nodes that it involves. Using the enhanced time scheduling and route partitioning techniques with respect to nodes' sampling rate provides the basic design of our traffic adaptive algorithm. In order to represent traffic adaptive capability of the proposed protocol, some nodes are considered to generate data packets with higher data generation rates than other sensor motes in the network. The most relevant existing MAC protocol which support only one generation rate is then compared with our modified version. We then analyzed the estimated energy consumption and defined the maximum number of high sampling rate nodes that can be supported by the proposed protocol. The simulation results show that our adaptive protocol provides a minimum packet delay and the least packet loss rate compared to existing MAC protocol. The energy dissipation of the proposed protocol is much less than the existing MAC protocol when its duty cycle has been adjusted with respect to high traffic node's sampling rate. The proposed traffic adaptive MAC design can achieve around 35% improvement on energy efficiency while maintaining minimum end-to-end delay and packet loss rate.

MAC Protocols for Cooperative Diversity in Wireless Sensor Networks

MAC Protocols for Cooperative Diversity in Wireless Sensor Networks
Author: Rana Azeem M. Khan
Publisher:
Total Pages: 0
Release: 2014
Genre:
ISBN:

Cooperative diversity has emerged as a promising technique to combat fading and improve reliability in a wireless environment. In cooperative diversity protocols, neighboring nodes act as virtual multiple-input-multiple-output (VMIMO) systems, where they cooperate with the transmitter-receiver pair to deliver multiple copies of a packet to the receiver via spatially independent fading channels. These multiple copies of the same packet can be combined at the receiver to recover the original packet. Medium Access Control (MAC) protocols play an important part in realizing this concept by effectively coordinating handshake and transmissions between source, partner and destination nodes. In this thesis, we investigate opportunities for improving reliability in Wireless Sensor Networks using cooperative MAC protocols. First, a Medium Access Control protocol, called CPS-MAC, is proposed. Design challenges such as efficiently waking up neighborhood nodes, minimizing energy overhead, and partner selection are also addressed. Then, Reliable Cooperative Transmission-MAC (RCT-MAC) is proposed which extends the functionality of Cooperative Preamble Sampling-MAC (CPS-MAC) by implementing the Cooperation on Demand concept: nodes cooperate only when needed. Furthermore, RCT-MAC is one of the first attempts to compare the performance of a cooperative Wireless Sensor Network (WSN) MAC protocol against conventional protocols for WSNs namely B-MAC, L-MAC, and IEEE 802.15.4. The reliability vs energy efficiency tradeoff is analyzed for both CPS-MAC and RCT-MAC. Lastly, we evaluate a Packet Error Prediction scheme particularly envisioned for preamble sampling cooperative protocols and meant to supplement traditional partner selection schemes. The correlation between the handshake packets and data packets is analyzed using empirical data. ; eng

Wireless Sensor Networks

Wireless Sensor Networks
Author: Jun Zheng
Publisher: John Wiley & Sons
Total Pages: 521
Release: 2009-10-27
Genre: Technology & Engineering
ISBN: 0470443510

Learn the fundamental concepts, major challenges, and effective solutions in wireless sensor networking This book provides a comprehensive and systematic introduction to the fundamental concepts, major challenges, and effective solutions in wireless sensor networking (WSN). Distinguished from other books, it focuses on the networking aspects of WSNs and covers the most important networking issues, including network architecture design, medium access control, routing and data dissemination, node clustering, node localization, query processing, data aggregation, transport and quality of service, time synchronization, network security, and sensor network standards. With contributions from internationally renowned researchers, Wireless Sensor Networks expertly strikes a balance between fundamental concepts and state-of-the-art technologies, providing readers with unprecedented insights into WSNs from a networking perspective. It is essential reading for a broad audience, including academic researchers, research engineers, and practitioners in industry. It is also suitable as a textbook or supplementary reading for electrical engineering, computer engineering, and computer science courses at the graduate level.

Intelligent Data Security Solutions for e-Health Applications

Intelligent Data Security Solutions for e-Health Applications
Author: Amit Kumar Singh
Publisher: Academic Press
Total Pages: 342
Release: 2020-09-01
Genre: Computers
ISBN: 012819538X

E-health applications such as tele-medicine, tele-radiology, tele-ophthalmology, and tele-diagnosis are very promising and have immense potential to improve global healthcare. They can improve access, equity, and quality through the connection of healthcare facilities and healthcare professionals, diminishing geographical and physical barriers. One critical issue, however, is related to the security of data transmission and access to the technologies of medical information. Currently, medical-related identity theft costs billions of dollars each year and altered medical information can put a person’s health at risk through misdiagnosis, delayed treatment or incorrect prescriptions. Yet, the use of hand-held devices for storing, accessing, and transmitting medical information is outpacing the privacy and security protections on those devices. Researchers are starting to develop some imperceptible marks to ensure the tamper-proofing, cost effective, and guaranteed originality of the medical records. However, the robustness, security and efficient image archiving and retrieval of medical data information against these cyberattacks is a challenging area for researchers in the field of e-health applications. Intelligent Data Security Solutions for e-Health Applications focuses on cutting-edge academic and industry-related research in this field, with particular emphasis on interdisciplinary approaches and novel techniques to provide security solutions for smart applications. The book provides an overview of cutting-edge security techniques and ideas to help graduate students, researchers, as well as IT professionals who want to understand the opportunities and challenges of using emerging techniques and algorithms for designing and developing more secure systems and methods for e-health applications. Investigates new security and privacy requirements related to eHealth technologies and large sets of applications Reviews how the abundance of digital information on system behavior is now being captured, processed, and used to improve and strengthen security and privacy Provides an overview of innovative security techniques which are being developed to ensure the guaranteed authenticity of transmitted, shared or stored data/information

Medium Access Protocol (MAC) Design for Wireless Multi-hop Ad Hoc and Sensor Networks

Medium Access Protocol (MAC) Design for Wireless Multi-hop Ad Hoc and Sensor Networks
Author: Afef Sayadi
Publisher:
Total Pages: 0
Release: 2013
Genre:
ISBN:

Wireless multi-hop ad hoc and sensor networks provide a promising solution to ensure ubiquitous connectivity for the Future Internet. Good network connectivity requires designing a reliable Medium Access Control (MAC) protocol, which is a challenging task in the ad hoc and sensor environments. The broadcast and shared nature of the wireless channel renders the bandwidth resources limited and expose the transmissions to relatively high collisions and loss rates. The necessity to provide guaranteed Quality of Service (QoS) to the upper layers triggered the design of conflict-free MAC protocols. The TDMA synchronization constraint is basically behind the rush of MAC protocol design based on a fixed frame size. This design shows inflexibility towards network variations and creates a network dimensioning issue that leads to a famine risk in case the network is under-dimensioned, and to a waste of resources, otherwise. Moreover, the alternative dynamic protocols provide more adaptive solutions to network topology variations at the expense of a fair access to the channel. Alongside with the efficient channel usage and the fair medium access, reducing the energy consumption represents another challenge for ad hoc and sensor networks. Solutions like node activity scheduling tend to increase the network lifetime while fulfilling the application requirements in terms of throughput and delay, for instance. Our contributions, named OSTR and S-OSTR, address the shortcomings of the medium access control protocol design in the challenging environment of wireless multi-hop ad hoc and sensor networks, respectively. For OSTR the idea consists in adopting a dynamic TDMA frame size that increases slot-by-slot according to the nodes arrival/departure to/from the network, and aiming to achieve a minimum frame size. For this end, OSTR couples three major attributes: (1) performing slot-by-slot frame size increase, (2) providing a spatial reuse scheme that favors the reuse of the same slot if possible, (3) and ensuring an on-demand frame size increase only according to the node requirements in terms of throughput. To tackle different frame sizes co-existence in the network, OSTR brings a cooperative solution that consists in fixing an appointment, a date when the frame size in the network is increased. Concerning S-OSTR, it is an amendment of OSTR for wireless sensor networks. It brings the idea of a dynamic active period, since it deploys a dynamic frame size that is built slot-by-slot according to nodes arrival to the network. S-OSTR enforces the slot-by-slot frame size increase by a node activity scheduling to prolong the inactivity period in the network, and hence prolong the overall network lifetime for wireless sensor networks. Our contributions are both based on the new dynamic TDMA frame size increase that consists in increasing the frame size slot-by-slot aiming to achieve a shorter frame size, and hence improve the channel utilization, and reduce the energy consumption. The performance analysis of OSTR and S-OSTR shows that they present good potentials to support QoS requirements, to provide energy-efficiency, to ensure fair medium access, to accommodate network topology changes and finally, to enhance robustness against scalability. The impact of this new TDMA frame size increase technique on the medium access control protocol performance is highlighted through multiple simulations of OSTR and S-OSTR. Multiple comparative studies are also handled to point out the effectiveness of this new technique and the soundness of our contributions.