3,275 research outputs found

    Event-Driven Data Gathering in Pure Asynchronous Multi-Hop Underwater Acoustic Sensor Networks

    Full text link
    [EN] In underwater acoustic modem design, pure asynchrony can contribute to improved wake-up coordination, thus avoiding energy-inefficient synchronization mechanisms. Nodes are designed with a pre-receptor and an acoustically adapted Radio Frequency Identification system, which wakes up the node when it receives an external tone. The facts that no synchronism protocol is necessary and that the time between waking up and packet reception is narrow make pure asynchronism highly efficient for energy saving. However, handshaking in the Medium Control Access layer must be adapted to maintain the premise of pure asynchronism. This paper explores different models to carry out this type of adaptation, comparing them via simulation in ns-3. Moreover, because energy saving is highly important to data gathering driven by underwater vehicles, where nodes can spend long periods without connection, this paper is focused on multi-hop topologies. When a vehicle appears in a 3D scenario, it is expected to gather as much information as possible in the minimum amount of time. Vehicle appearance is the event that triggers the gathering process, not only from the nearest nodes but from every node in the 3D volume. Therefore, this paper assumes, as a requirement, a topology of at least three hops. The results show that classic handshaking will perform better than tone reservation because hidden nodes annulate the positive effect of channel reservation. However, in highly dense networks, a combination model with polling will shorten the gathering time.Blanc Clavero, S. (2020). Event-Driven Data Gathering in Pure Asynchronous Multi-Hop Underwater Acoustic Sensor Networks. Sensors. 20(5):1-16. https://doi.org/10.3390/s20051407S116205Roy, A., & Sarma, N. (2018). Effects of Various Factors on Performance of MAC Protocols for Underwater Wireless Sensor Networks. Materials Today: Proceedings, 5(1), 2263-2274. doi:10.1016/j.matpr.2017.09.228Awan, K. M., Shah, P. A., Iqbal, K., Gillani, S., Ahmad, W., & Nam, Y. (2019). Underwater Wireless Sensor Networks: A Review of Recent Issues and Challenges. Wireless Communications and Mobile Computing, 2019, 1-20. doi:10.1155/2019/6470359Rudnick, D. L., Davis, R. E., Eriksen, C. C., Fratantoni, D. M., & Perry, M. J. (2004). Underwater Gliders for Ocean Research. Marine Technology Society Journal, 38(2), 73-84. doi:10.4031/002533204787522703Petritoli, E., & Leccese, F. (2018). High Accuracy Attitude and Navigation System for an Autonomous Underwater Vehicle (AUV). ACTA IMEKO, 7(2), 3. doi:10.21014/acta_imeko.v7i2.535Nam, H. (2018). Data-Gathering Protocol-Based AUV Path-Planning for Long-Duration Cooperation in Underwater Acoustic Sensor Networks. IEEE Sensors Journal, 18(21), 8902-8912. doi:10.1109/jsen.2018.2866837Sun, J., Hu, F., Jin, W., Wang, J., Wang, X., Luo, Y., … Zhang, A. (2020). Model-Aided Localization and Navigation for Underwater Gliders Using Single-Beacon Travel-Time Differences. Sensors, 20(3), 893. doi:10.3390/s20030893Wahid, A., Lee, S., Kim, D., & Lim, K.-S. (2014). MRP: A Localization-Free Multi-Layered Routing Protocol for Underwater Wireless Sensor Networks. Wireless Personal Communications, 77(4), 2997-3012. doi:10.1007/s11277-014-1690-6Sánchez, A., Blanc, S., Yuste, P., Perles, A., & Serrano, J. J. (2012). An Ultra-Low Power and Flexible Acoustic Modem Design to Develop Energy-Efficient Underwater Sensor Networks. Sensors, 12(6), 6837-6856. doi:10.3390/s120606837Li, S., Qu, W., Liu, C., Qiu, T., & Zhao, Z. (2019). Survey on high reliability wireless communication for underwater sensor networks. Journal of Network and Computer Applications, 148, 102446. doi:10.1016/j.jnca.2019.102446Jiang, S. (2018). State-of-the-Art Medium Access Control (MAC) Protocols for Underwater Acoustic Networks: A Survey Based on a MAC Reference Model. IEEE Communications Surveys & Tutorials, 20(1), 96-131. doi:10.1109/comst.2017.2768802Chirdchoo, N., Soh, W., & Chua, K. C. (2008). RIPT: A Receiver-Initiated Reservation-Based Protocol for Underwater Acoustic Networks. IEEE Journal on Selected Areas in Communications, 26(9), 1744-1753. doi:10.1109/jsac.2008.081213Zenia, N. Z., Aseeri, M., Ahmed, M. R., Chowdhury, Z. I., & Shamim Kaiser, M. (2016). Energy-efficiency and reliability in MAC and routing protocols for underwater wireless sensor network: A survey. Journal of Network and Computer Applications, 71, 72-85. doi:10.1016/j.jnca.2016.06.005Khasawneh, A., Latiff, M. S. B. A., Kaiwartya, O., & Chizari, H. (2017). A reliable energy-efficient pressure-based routing protocol for underwater wireless sensor network. Wireless Networks, 24(6), 2061-2075. doi:10.1007/s11276-017-1461-xSánchez, A., Blanc, S., Yuste, P., Perles, A., & Serrano, J. J. (2015). An Acoustic Modem Featuring a Multi-Receiver and Ultra-Low Power. Circuits and Systems, 06(01), 1-12. doi:10.4236/cs.2015.6100

    Unified clustering and communication protocol for wireless sensor networks

    Get PDF
    In this paper we present an energy-efficient cross layer protocol for providing application specific reservations in wireless senor networks called the “Unified Clustering and Communication Protocol ” (UCCP). Our modular cross layered framework satisfies three wireless sensor network requirements, namely, the QoS requirement of heterogeneous applications, energy aware clustering and data forwarding by relay sensor nodes. Our unified design approach is motivated by providing an integrated and viable solution for self organization and end-to-end communication is wireless sensor networks. Dynamic QoS based reservation guarantees are provided using a reservation-based TDMA approach. Our novel energy-efficient clustering approach employs a multi-objective optimization technique based on OR (operations research) practices. We adopt a simple hierarchy in which relay nodes forward data messages from cluster head to the sink, thus eliminating the overheads needed to maintain a routing protocol. Simulation results demonstrate that UCCP provides an energy-efficient and scalable solution to meet the application specific QoS demands in resource constrained sensor nodes. Index Terms — wireless sensor networks, unified communication, optimization, clustering and quality of service

    A Study of Medium Access Control Protocols for Wireless Body Area Networks

    Get PDF
    The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satisfy the stringent WBAN requirements including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent WBAN requirements.Comment: 13 pages, 8 figures, 7 table

    An efficient scalable scheduling mac protocol for underwater sensor networks

    Get PDF
    Underwater Sensor Networks (UWSNs) utilise acoustic waves with comparatively lower loss and longer range than those of electromagnetic waves. However, energy remains a challenging issue in addition to long latency, high bit error rate, and limited bandwidth. Thus, collision and retransmission should be efficiently handled at Medium Access Control (MAC) layer in order to reduce the energy cost and also to improve the throughput and fairness across the network. In this paper, we propose a new reservation-based distributed MAC protocol called ED-MAC, which employs a duty cycle mechanism to address the spatial-temporal uncertainty and the hidden node problem to effectively avoid collisions and retransmissions. ED-MAC is a conflict-free protocol, where each sensor schedules itself independently using local information. Hence, ED-MAC can guarantee conflict-free transmissions and receptions of data packets. Compared with other conflict-free MAC protocols, ED-MAC is distributed and more reliable, i.e., it schedules according to the priority of sensor nodes which based on their depth in the network. We then evaluate design choices and protocol performance through extensive simulation to study the load effects and network scalability in each protocol. The results show that ED-MAC outperforms the contention-based MAC protocols and achieves a significant improvement in terms of successful delivery ratio, throughput, energy consumption, and fairness under varying offered traffic and number of nodes

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    Proposition and validation of an original MAC layer with simultaneous medium accesses for low latency wireless control/command applications

    Get PDF
    Control/command processes require a transmission system with some characteristics like high reliability, low latency and strong guarantees on messages delivery. Concerning wire networks, field buses technologies like FIP offer this kind of service (periodic tasks, real time constraints...). Unfortunately, few wireless technologies can propose a communication system which respects such constraints. Indeed, wireless transmissions must deal with medium characteristics which make impossible the direct translation of mechanisms used with wire networks. The purpose of this paper is to present an original Medium Access Control (MAC) layer for a real time Low Power-Wireless Personal Area Network (LP-WPAN). The proposed MAC-layer has been validated by several complementary methods; in this paper, we focus on the specific Simultaneous Guaranteed Time Slot (SGTS) part

    A Case for Time Slotted Channel Hopping for ICN in the IoT

    Full text link
    Recent proposals to simplify the operation of the IoT include the use of Information Centric Networking (ICN) paradigms. While this is promising, several challenges remain. In this paper, our core contributions (a) leverage ICN communication patterns to dynamically optimize the use of TSCH (Time Slotted Channel Hopping), a wireless link layer technology increasingly popular in the IoT, and (b) make IoT-style routing adaptive to names, resources, and traffic patterns throughout the network--both without cross-layering. Through a series of experiments on the FIT IoT-LAB interconnecting typical IoT hardware, we find that our approach is fully robust against wireless interference, and almost halves the energy consumed for transmission when compared to CSMA. Most importantly, our adaptive scheduling prevents the time-slotted MAC layer from sacrificing throughput and delay

    Wireless industrial monitoring and control networks: the journey so far and the road ahead

    Get PDF
    While traditional wired communication technologies have played a crucial role in industrial monitoring and control networks over the past few decades, they are increasingly proving to be inadequate to meet the highly dynamic and stringent demands of today’s industrial applications, primarily due to the very rigid nature of wired infrastructures. Wireless technology, however, through its increased pervasiveness, has the potential to revolutionize the industry, not only by mitigating the problems faced by wired solutions, but also by introducing a completely new class of applications. While present day wireless technologies made some preliminary inroads in the monitoring domain, they still have severe limitations especially when real-time, reliable distributed control operations are concerned. This article provides the reader with an overview of existing wireless technologies commonly used in the monitoring and control industry. It highlights the pros and cons of each technology and assesses the degree to which each technology is able to meet the stringent demands of industrial monitoring and control networks. Additionally, it summarizes mechanisms proposed by academia, especially serving critical applications by addressing the real-time and reliability requirements of industrial process automation. The article also describes certain key research problems from the physical layer communication for sensor networks and the wireless networking perspective that have yet to be addressed to allow the successful use of wireless technologies in industrial monitoring and control networks

    Goodbye, ALOHA!

    Get PDF
    ©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The vision of the Internet of Things (IoT) to interconnect and Internet-connect everyday people, objects, and machines poses new challenges in the design of wireless communication networks. The design of medium access control (MAC) protocols has been traditionally an intense area of research due to their high impact on the overall performance of wireless communications. The majority of research activities in this field deal with different variations of protocols somehow based on ALOHA, either with or without listen before talk, i.e., carrier sensing multiple access. These protocols operate well under low traffic loads and low number of simultaneous devices. However, they suffer from congestion as the traffic load and the number of devices increase. For this reason, unless revisited, the MAC layer can become a bottleneck for the success of the IoT. In this paper, we provide an overview of the existing MAC solutions for the IoT, describing current limitations and envisioned challenges for the near future. Motivated by those, we identify a family of simple algorithms based on distributed queueing (DQ), which can operate for an infinite number of devices generating any traffic load and pattern. A description of the DQ mechanism is provided and most relevant existing studies of DQ applied in different scenarios are described in this paper. In addition, we provide a novel performance evaluation of DQ when applied for the IoT. Finally, a description of the very first demo of DQ for its use in the IoT is also included in this paper.Peer ReviewedPostprint (author's final draft
    • …
    corecore