Scheduling and adaptive listening approaches in MAC for WSN applications: A survey

2020 ◽  
Vol 26 (4) ◽  
pp. 325-338
Author(s):  
S. Radha ◽  
G. Josemin Bala ◽  
E. Grace Mary Kanaga ◽  
P. Nagabushanam

False data detection, intrusion detection and coverage rate are major challenges in wireless sensor networks (WSN). Scheduling in media access control (MAC) using gateway and relay nodes solve some of the problems. In this paper, we carried out a brief survey on scheduling, delay aware MAC, cooperative communications in MAC, and adaptive listening to keep controlling the energy in sensors. In addition, multichannel MAC and various routing strategy techniques for WSN are discussed. Firefly algorithm for dynamic scheduling pipelined scheduling for linear sensor networks gives better throughput and latency. Heuristic configuration solves the overhearing problem, as node power-based MAC controls power of each node. Based on WSN applications and the performance metrics concentrated, various techniques for MAC are discussed throughout in this paper.

Author(s):  
John A. Stankovic ◽  
Tian He

This paper presents a holistic view of energy management in sensor networks. We first discuss hardware designs that support the life cycle of energy, namely: (i) energy harvesting, (ii) energy storage and (iii) energy consumption and control. Then, we discuss individual software designs that manage energy consumption in sensor networks. These energy-aware designs include media access control, routing, localization and time-synchronization. At the end of this paper, we present a case study of the VigilNet system to explain how to integrate various types of energy management techniques to achieve collaborative energy savings in a large-scale deployed military surveillance system.


Author(s):  
Tushar Kanta Samal ◽  
Manas Ranjan Kabat ◽  
Prasant Kumar Dash

The advancement of information and communication technology directly influences the life style of human being by making their life easier, sophisticated in many circumstances. The healthcare sensor network is one of the emerging areas of research for both computer science and health professionals. The Quality of Service (QoS) requirement of the traffic in emergency situation is one of the key challenges in this network. The Medium Access Control (MAC) layer plays vital role for reliable and on time delivery in the healthcare sensor networks. The healthcare system provides remote monitoring, real-time identification and control information which helps in identifying the unusual patterns and making more precise information about the situation. In this chapter, we present the issues and challenges of supporting sensor networks for healthcare applications. Then we present an extensive survey of MAC protocols developed to address the major challenges and improve the capacity of healthcare system in WSN.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Lurong Jiang ◽  
Qiaoyu Xu ◽  
Hangyi Pan ◽  
Yanyun Dai ◽  
Jijun Tong

In wireless sensor networks, network security against virus propagation is one of the challenges with the applications. In severe cases, the network system may become paralyzed. In order to study the process of virus propagation in wireless sensor networks with the media access control mechanism, this paper uses the susceptible-infectious-removed (SIR) model to analyze the spreading process. It provides a theoretical basis for the development of virus immune mechanisms to solve network virus attack hidden dangers. The research shows that the media access control (MAC) mechanism in the wireless sensor network can inhibit the process of virus propagation, reduce the network virus propagating speed, and decrease the scale of infected nodes. The listen/sleep duty cycle of this mechanism will affect the suppression effect of virus propagation. The smaller the listen/sleep duty cycle, the stronger the suppression effect. Energy consumption has a peak value under specific infection probability. Meanwhile, it is also found that the spreading scale of the virus in wireless sensor networks can be effectively inhibited by the MAC mechanism.


Sign in / Sign up

Export Citation Format

Share Document