Throughput and delay analysis of MAC protocol based on frame slotted aloha for low energy critical infrastructure sensor networks

2015 ◽  
Vol 51 (13) ◽  
pp. 1035-1037 ◽  
Author(s):  
Niamat Ullah ◽  
Bong D. Choi ◽  
Kyung‐sup Kwak
2015 ◽  
Vol 11 (6) ◽  
pp. 701418 ◽  
Author(s):  
Niamat Ullah ◽  
Kifayat Ullah ◽  
S. M. Riazul Islam ◽  
Pervaiz Khan ◽  
Sana Ullah ◽  
...  

2012 ◽  
Vol 27 (10) ◽  
pp. 1783-1797 ◽  
Author(s):  
M. Sanaullah Chowdhury ◽  
Niamat Ullah ◽  
Mosaddique Al Ameen ◽  
Kyung Sup Kwak

2012 ◽  
Vol 8 (4) ◽  
pp. 504946 ◽  
Author(s):  
Niamat Ullah ◽  
M. Sanaullah Chowdhury ◽  
Mosaddique Al Ameen ◽  
Kyung Sup Kwak

Critical infrastructure monitoring applications are rapidly increasing. Application requirements include reliable data transfer, energy efficiency, and long deployment lifetime. These applications must also be able to operate in an extremely low-cost communication environment in order to be attractive to potential users. A low rate wireless personal area network can help control and manage the operations of such applications. In this paper, we present a medium access control (MAC) protocol for low-energy critical infrastructure monitoring (LECIM) applications. The proposed MAC protocol is based on a framed slotted aloha multiple access schemes. For downlink communication, we use a wakeup radio approach to avoid complex bookkeeping associated with the traditional MAC protocols. Analytical expressions for power consumption and delay are derived to analyze and compare the performance of our proposed protocol with the existing well-known T-MAC, B-MAC, X-MAC, ZigBee, and WiseMAC protocols. It is shown that our proposed protocol outperforms all the other protocols in terms of power consumption and delay.


2018 ◽  
Vol 7 (2.8) ◽  
pp. 477
Author(s):  
Siri Maidhili R ◽  
Karthik GM

Wireless Sensor Networks are usually the assortation of sensors, which are versatile in sensing the data based on multihued exertions. The cardinal bulge with the sensor networks is its dispersed nature. Since they are spread over, they sense and forward data from their dispersed areas. They consume high energy resources and vulnerable to various attacks. To prevail this bulge, source identity (signature) based authentication scheme is proposed on ECC to prevent external attacks and a neighbor monitoring scheme is proposed by overhearing to prevent internal attacks. Now the cardinal strike with the sensor networks are its bounded energy resources, they have a very limited / less energy resources, they cannot have a hefty application assignment. To prevail this strike and to improve the energy efficiency, a low energy consumption MAC protocol is acquainted called the IEEE 802.15.4 / ZigBee standards un the MAC layer, through which the data forwarding among the networks devours very low energy when compared to all other traditional methods. The main objective of the proposed work is to perform broadcast after authentication, to prevent resource consuming attacks through authentication externally and to construct a monitoring table for each node by overhearing and detecting them based on their activities if they are malicious to provide internal security to the network. The proposed work attains a minimal energy wastage along with security integrated in WSN communication. The ratio of efficiency comparisons of the broadcasting authentication scheme and monitoring scheme for the traditional and the proposed works for the factors secure authentication / monitoring and energy consumption is resulted to be as 7:2. Thus the proposed system has a higher endorsed based on the generated results.


2015 ◽  
Vol 86 (3) ◽  
pp. 1299-1319 ◽  
Author(s):  
Samra Boulfekhar ◽  
Assia Arab ◽  
Djamil Aïssani ◽  
Megdouda Ourbih

Sign in / Sign up

Export Citation Format

Share Document