scholarly journals An energy efficient hybrid MAC protocol for smart home networks

2021 ◽  
Vol 18 (1) ◽  
pp. 63-73
Author(s):  
Atul Pandey ◽  
Nisha Gupta

In this paper cluster-based hybrid MAC (CB-HMAC) protocol, based on IEEE 802.15.4 MAC is proposed for smart home networks. The CB-HMAC is specially designed for short packet transmission in a dense home network environment. Simulation results show that the proposed CB-HMAC is more energy-efficient than other medium access control (MAC) protocols without sacrificing much delay and throughput.

2016 ◽  
Vol 26 (03) ◽  
pp. 1750043 ◽  
Author(s):  
Ching-Han Chen ◽  
Ming-Yi Lin ◽  
Wen-Hung Lin

Wireless sensor networks (WSNs) represent a promising solution in the fields of the Internet of Things (IoT) and machine-to-machine networks for smart home applications. However, to feasibly deploy wireless sensor devices in a smart home environment, four key requirements must be satisfied: stability, compatibility, reliability routing, and performance and power balance. In this study, we focus on the unreliability problem of the IEEE 802.15.4 WSN medium access control (MAC), which is caused by the contention-based MAC protocol used for channel access. This problem results in a low packet delivery ratio, particularly in a smart home network with only a few sensor nodes. In this paper, we first propose a lightweight WSN protocol for a smart home or an intelligent building, thus replacing the IEEE 802.15.4 protocol, which is highly complex and has a low packet delivery ratio. Subsequently, we describe the development of a discrete event system model for the WSN by using a GRAFCET and propose a development platform based on a reconfigurable FPGA for reducing fabrication cost and time. Finally, a prototype WSN controller ASIC chip without an extra CPU and with our proposed lightweight MAC was developed and tested. It enhanced the packet delivery ratio by up to 100%.


Author(s):  
Rinkuben N. Patel ◽  
Nirav V. Bhatt

Background: WSN is a network of smart tiny electromechanical devices named as sensors. Sensors perform various tasks like sensing the environment as per its range, transmit the data using transmission units, store the data in the storage unit and perform an action based on captured data. As they are installed in an unfriendly environment, to recharge the sensors are not possible every time which leads to a limited lifetime of a network. To enhance the life of a sensor network, the network required energy-efficient protocols. Various energy-efficient MAC protocols are developed by Research community, but very few of them are integrated with the priority-based environment which performs the priority-based data transmission. Another challenge of WSN is, most of the WSN areas are delay-sensitive because it is implemented in critical fields like military, disaster management, and health monitoring. Energy, Delay, and throughput are major quality factors that affect the sensor network. Objective: In this paper, the aim is to design and develop a MAC Protocol for a field like the military where the system requires energy efficiency and priority-based data transmission. Method: In the proposed model, the cluster-based network with priority queues are formed that can achieve higher power efficiency and less delay for sensitive data. Results: In this research simulation of Proposed MAC, TMAC and SMAC are done with different numbers of nodes, same inter-packet intervals, and variant inter-packet intervals. Based on the script simulation, result graphs are generated. Conclusion: The proposed work achieves greater lifetime compared to TMAC and SMAC using priority-based data transmission.


Sensors ◽  
2019 ◽  
Vol 19 (8) ◽  
pp. 1789 ◽  
Author(s):  
Apostolos Karalis ◽  
Dimitrios Zorbas ◽  
Christos Douligeris

IEEE802.15.4-time slotted channel hopping (TSCH) is a medium access control (MAC) protocol designed to support wireless device networking, offering high reliability and low power consumption, two features that are desirable in the industrial internet of things (IIoT). The formation of an IEEE802.15.4-TSCH network relies on the periodic transmissions of network advertising frames called enhanced beacons (EB). The scheduling of EB transmissions plays a crucial role both in the joining time and in the power consumption of the nodes. The existence of collisions between EB is an important factor that negatively affects the performance. In the worst case, all the neighboring EB transmissions of a node may collide, a phenomenon which we call a full collision. Most of the EB scheduling methods that have been proposed in the literature are fully or partially based on randomness in order to create the EB transmission schedule. In this paper, we initially show that the randomness can lead to a considerable probability of collisions, and, especially, of full collisions. Subsequently, we propose a novel autonomous EB scheduling method that eliminates collisions using a simple technique that does not increase the power consumption. To the best of our knowledge, our proposed method is the first non-centralized EB scheduling method that fully eliminates collisions, and this is guaranteed even if there are mobile nodes. To evaluate our method, we compare our proposal with recent and state-of-the-art non-centralized network-advertisement scheduling methods. Our evaluation does not consider only fixed topology networks, but also networks with mobile nodes, a scenario which has not been examined before. The results of our simulations demonstrate the superiority of our method in terms of joining time and energy consumption.


2012 ◽  
Vol 3 (2) ◽  
pp. 51-61
Author(s):  
A. Punitha ◽  
Sujin P. Jose

The authors provide an extensive survey of recent energy-efficient and contention based medium access control (MAC) protocols for wireless body area networks (WBANs). They briefed the crucial applications of WBAN in present scenario and also discussed low-power and contention based MAC protocols for medical and consumer electronics. The authors outlined the future applications of WBAN and the enhancement to be incorporated to improve the efficiency of WBAN systems.


2018 ◽  
Vol 7 (3) ◽  
pp. 1263
Author(s):  
Shah Murtaza Rashid Al. Masud ◽  
Asmidar Abu Bakar ◽  
Salman Yussof

Due to lack of deployment of information and communication technology (ICT) for real-time pilgrims' health monitoring during Hajj, many pilgrims left untreated, get lost and suffer from severe health problems which sometimes end with injury, traum and even death. WBAN is an emergent healthcare technology and can be deployed at Hajj ritual sites for pilgrims' health monitoring. WBANs body coordinator or gateway as an aggregator collect data from body nodes or sensors, store them and then forward to the healthcare stations for analyzing the data through outer-WBAN communications. Currently, most of the existing research works focused on intra-WBAN communications while the technical issues, problems, opportunities and standard correlated to outer-WBAN are not well discussed and mentioned. Since, medium access control (MAC) protocol is responsible for channel access, lower delay, and energy efficient transmission of data packets. Therefore, designing of an efficient and reliable MAC protocol is the earnest research demand to alleviate the aforementioned obstacle. In this research, a feasibility study has been completed to identify the problem and a proposal has been made to develop a suitable MAC protocol for outer-WBAN communication for pilgrims’ health monitoring during Hajj.  


2015 ◽  
Vol 2015 ◽  
pp. 1-12 ◽  
Author(s):  
Jamila Bhar

IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN). The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE) according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA) for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.


Author(s):  
Tommaso Pecorella ◽  
Laura Pierucci ◽  
Francesca Nizzi

A Smart Home is characterized by the presence of a huge number of small, low power devices, along with more classical devices. According to the Internet of Things (IoT) paradigm, all of them are expected to be always connected to the Internet in order to provide enhanced services. In this scenario, an attacker can undermine both the network security and the user’s security/privacy. Traditional security measures are not sufficient, because they are too difficult to setup and are either too weak to effectively protect the user or too limiting for the new services effectiveness. The paper suggests to dynamically adapt the security level of the smart home network according to the user perceived risk level what we have called network sentiment analysis. The security level is not fixed, established by a central system (usually by the Internet Service Provider) but can be changed with the users cooperation. The security of the smart home network is improved by a distributed firewalling and Intrusion Detection Systems both to the smart home side as to the Internet Service Provider side. These two parts must cooperate and integrate their actions for reacting dynamically to new and ongoing threats. Moreover, the level of network sentiment detected can be propagate to nearby home networks (e.g. the smart home networks of the apartments inside a building) to increase/decrease their level of security, thus creating a true in-line Intrusion Prevention System (IPS). The paper also presents a test bed for Smart Home to detect and counteract to different attacks against the IoT devices,,Wi-Fi and Ethernet connections .


Author(s):  
Maode Ma

The requirement of providing real-time data service by wireless networks is a critical issue in the design of current wireless networks. Distributed Queueing Request Update Multiple Access (DQRUMA) has been proposed as a demand assignment medium access control (MAC) protocol to efficiently control the medium sharing by multiple mobile users. With the help of a packet transmission policy, DQRUMA has a potential to provide QoS service for the time-constrained burst data traffic. In this article, we study the problem of providing real-time service to fixed-size packets with or without time constraints in wireless networks. In particular, we propose a novel scheduling scheme for the DQRUMA protocol to control the packet transmission in packet-switched wireless networks. We have conducted extensive simulation experiments to evaluate the performance of the proposed algorithm and to compare its real-time performance with those of other packet transmission policies. This study proves that the new algorithm is an efficient transmission policy for the DQRUMA to support real-time service in wireless networks.


Author(s):  
Yupeng Hu ◽  
Rui Li

As an enabling network technology, energy efficient Medium Access Control (MAC) protocol plays a vital role in a battery-powered distributed sensor network. MAC protocols control how sensor nodes access a shared radio channel to communicate with each other. This chapter discusses the key elements of MAC design with an emphasis on energy efficiency. Furthermore, it reviews several typical MAC protocols proposed in the literature, comparing their energy conservation mechanism. Particularly, it presents a Collaborative Compression Based MAC (CCP-MAC) protocol, which takes advantage of the overheard data to achieve energy savings. Finally, it compares the performance of CCP-MAC with related MAC protocols, illustrating their advantages and disadvantages.


Author(s):  
S. Mehta ◽  
B. H. Kim ◽  
K.S. Kwak

Game Theory provides a mathematical tool for the analysis of interactions between the agents with conflicting interests, hence it is a suitable tool to model some problems in communication systems, especially, to wireless sensor networks (WSNs) where the prime goal is to minimize energy consumption than high throughput and low delay. Another important aspect of WSNs are their ad-hoc topology. In such ad-hoc and distributed environment, selfish nodes can easily obtain the unfair share of the bandwidth by not following the medium access control (MAC) protocol. This selfish behavior, at the expense of well behaved nodes, can degrade the performance of overall network. In this chapter, the authors use the concepts of game theory to design an energy efficient MAC protocol for WSNs. This allows them to introduce persistent/non-persistent sift protocol for energy efficient MAC protocol and to counteract the selfish behavior of nodes in WSNs. Finally, the research results show that game theoretical approach with the persistent/non-persistent sift algorithm can improve the overall performance as well as achieve all the goals simultaneously for MAC protocol in WSNs.


Sign in / Sign up

Export Citation Format

Share Document