scholarly journals Cooperative ARQ: A Medium Access Control (MAC) Layer Perspective

10.5772/9476 ◽  
2010 ◽  
Author(s):  
Jesus Alonso-Zarate ◽  
Elli Kartsakli ◽  
Luis Alonso ◽  
Christos Verikoukis

A set of wireless sensor nodes comprises to form a sensor field called Wireless Sensor Networks (WSN).The main purpose of using the sensor node is to collect information from the ambience process it and send to a common gateway interface called Base Station(BS). The major problems that we face while using WSN are limited battery power, bandwidth, security issues and transmission delay etc. Many algorithms and protocols were developed in order to solve the above issues. Therefore, better solutions are required to face the improvements and challenges in the current technologies. In WSN, the sensor node highly loses its energy during communication period. One of the major issues of Medium Access Control (MAC) layer is collision. Collision increases the energy consumption and delay of the sensor node. So we have to conserve the energy of the sensor node in order to extend the lifetime of the network. At the same time it is also important to transmit the data through secure path and identify the malicious node. In this paper, we propose a novelty approach called Secure Routing with Improved Medium Access control (SRI –MAC) Protocol to solve the issues. SRIMAC identifies packet precedence sets using Fuzzy Implication System (FIS) to avoid packet collision in MAC layer and also it detects wormhole attacks and selects secure path among k-paths using Particle Swarm Optimization (PSO) algorithm. By simulation results, we show that the proposed approach is efficient in terms of energy consumption and secure routing.


2017 ◽  
Vol 2017 ◽  
pp. 1-8 ◽  
Author(s):  
Trong-Minh Hoang ◽  
Van-Kien Bui ◽  
Thanh-Tra Nguyen

Security of any wireless network is always an important issue due to its serious impacts on network performance. Practically, the IEEE 802.11 medium access control can be violated by several native or smart attacks that result in downgrading network performance. In recent years, there are several studies using analytical model to analyze medium access control (MAC) layer misbehavior issue to explore this problem but they have focused on binary exponential backoff only. Moreover, a practical condition such as the freezing backoff issue is not included in the previous models. Hence, this paper presents a novel analytical model of the IEEE 802.11 MAC to thoroughly understand impacts of misbehaving node on network throughput and delay parameters. Particularly, the model can express detailed backoff algorithms so that the evaluation of the network performance under some typical attacks through numerical simulation results would be easy.


2019 ◽  
Vol 11 (1) ◽  
pp. 16 ◽  
Author(s):  
Luiz Oliveira ◽  
Joel Rodrigues ◽  
Sergei Kozlov ◽  
Ricardo Rabêlo ◽  
Victor Albuquerque

Due to the wide variety of uses and the diversity of features required to meet an application, Internet of Things (IoT) technologies are moving forward at a strong pace to meet this demand while at the same time trying to meet the time-to-market of these applications. The characteristics required by applications, such as coverage area, scalability, transmission data rate, and applicability, refer to the Physical and Medium Access Control (MAC) layer designs of protocols. This paper presents a deep study of medium access control (MAC) layer protocols that are used in IoT with a detailed description of such protocols grouped (by short and long distance coverage). For short range coverage protocols, the following are considered: Radio Frequency Identification (RFID), Near Field Communication (NFC), Bluetooth IEEE 802.15.1, Bluetooth Low Energy, IEEE 802.15.4, Wireless Highway Addressable Remote Transducer Protocol (Wireless-HART), Z-Wave, Weightless, and IEEE 802.11 a/b/g/n/ah. For the long range group, Narrow Band IoT (NB-IoT), Long Term Evolution (LTE) CAT-0, LTE CAT-M, LTE CAT-N, Long Range Protocol (LoRa), and SigFox protocols are studied. A comparative study is performed for each group of protocols in order to provide insights and a reference study for IoT applications, considering their characteristics, limitations, and behavior. Open research issues on the topic are also identified.


Sign in / Sign up

Export Citation Format

Share Document