scispace - formally typeset
Search or ask a question
Book ChapterDOI

A Game Theoretical Approach to Design: A MAC Protocol for Wireless Sensor Networks

01 Jan 2012-pp 1475-1497
TL;DR: The research results show that game theoretical approach with the persistent/non-persistent sift algorithm can improve the overall performance as well as achieve all the goals simultaneously for MAC protocol in WSNs.
Abstract: Game Theory provides a mathematical tool for the analysis of interactions between the agents with conflicting interests, hence it is a suitable tool to model some problems in communication systems, especially, to wireless sensor networks (WSNs) where the prime goal is to minimize energy consumption than high throughput and low delay. Another important aspect of WSNs are their ad-hoc topology. In such ad-hoc and distributed environment, selfish nodes can easily obtain the unfair share of the bandwidth by not following the medium access control (MAC) protocol. This selfish behavior, at the expense of well behaved nodes, can degrade the performance of overall network. In this chapter, the authors use the concepts of game theory to design an energy efficient MAC protocol for WSNs. This allows them to introduce persistent/non-persistent sift protocol for energy efficient MAC protocol and to counteract the selfish behavior of nodes in WSNs. Finally, the research results show that game theoretical approach with the persistent/non-persistent sift algorithm can improve the overall performance as well as achieve all the goals simultaneously for MAC protocol in WSNs. DOI: 10.4018/978-1-4666-0101-7.ch022
Citations
More filters
Book ChapterDOI
01 Jan 2012
TL;DR: This chapter presents a comprehensive study of signal detection techniques for spectrum sensing proposed for cognitive radio systems, and outlines the state of the art research results, challenges, and future perspectives of spectrum sensing in CR systems.
Abstract: The rising number and capacity requirements of wireless systems bring increasing demand for RF spectrum. Cognitive radio (CR) system is an emerging concept to increase the spectrum efficiency. CR system aims to enable opportunistic usage of the RF bands that are not occupied by their primary licensed users in spectrum overlay approach. In this approach, the major challenge in realizing the full potential of CR systems is to identify the spectrum opportunities in the wide band regime reliably and optimally. In the spectrum underlay approach, CR systems enable dynamic spectrum access by co-existing and transmitting simultaneously with licensed primary users without creating harmful interference to them. In this case, the challenge is to transmit with low power so as not to exceed the tolerable interference level to the primary users. Spectrum sensing and estimation is an integral part of the CR system, which is used to identify the spectrum opportunities in spectrum overlay and to identify the interference power to primary users in spectrum underlay approach. In this chapter, the authors present a comprehensive study of signal detection techniques for spectrum sensing proposed for CR systems. Specifically, they outline the state of the art research results, challenges, and future perspectives of spectrum sensing in CR systems, and also present a comparison of different methods. With this chapter, readers can have a comprehensive insight of signal processing methods of spectrum sensing for cognitive radio networks and the ongoing research and development in this area.

70 citations

Journal ArticleDOI
01 Jul 2014
TL;DR: It is concluded that Swarm Intelligence being a novel and bio-inspired field has contributed as well as contributing much in the area of improving routing issues of sensor networks.
Abstract: Wireless Sensor Networks (WSNs) have always been a hot area of researchers for finding more solutions towards making WSN network more energy efficient and reliable. Energy efficient routing is always a key challenging task to enhance the network lifetime and balance energy among the sensor nodes. Various solutions have been proposed in terms of energy efficient routing via protocol development, various techniques have also been incorporated like Genetic Algorithm, Swarm Intelligence etc. The main aim of this research paper to study all the routing protocols which are energy efficient and are based on Ant Colony Optimization (ACO). This paper also highlights the pros and cons of each of routing protocol which has been developed on lines of Energy Efficiency and has also been compared among one another to find which protocol outwits one another. Further, we conclude that Swarm Intelligence being a novel and bio-inspired field has contributed as well as contributing much in the area of improving routing issues of sensor networks.

38 citations

Book
31 May 2012
TL;DR: Martin Fleury has authored or co-authored over two hundred and twenty five articles on topics such as document and image compression algorithms, performance prediction of parallel systems, software engineering, reconfigurable hardware, and vision systems.
Abstract: Martin Fleury holds a first degree from Oxford University, UK and an additional Maths/Physics based bachelor degree from the Open University, Milton Keynes, UK. He obtained an MSc in Astrophysics from QMW College, University of London, UK in 1990 and an MSc from the University of South-West England, Bristol in Parallel Computing Systems in 1991. He holds a PhD in Parallel Image-Processing Systems from the University of Essex, Colchester, UK. He is currently a Visiting Fellow at the University of Essex, UK, having previously worked as a Senior Lecturer at the University of Essex. Martin has authored or co-authored over two hundred and twenty five articles on topics such as document and image compression algorithms, performance prediction of parallel systems, software engineering, reconfigurable hardware, and vision systems. His current research interests are video communication over MANs, WLANs, PANs, BANs, MANETs, and VANETs. He is a guest editor of a number of journal special issues and a reviewer for a good number of journals in the IEEE Transactions series. He is also an external examiner for the Arab Open University in Kuwait and the Open University in the UK. Martin Fleury (University of Essex, UK) & Nadia Qadri (COMSATS Institute of Information and Technology, Pakistan)

34 citations

Journal ArticleDOI
TL;DR: A framework for measuring the deployment of Internet protocols, consisting of deployment steps, deployment models, deployment measures, and data sources is developed, indicating that protocol deployment is driven by applications, and showing the existence of large deployment gaps between the protocol possession and usage.
Abstract: Internet protocols spread to potential adopters through several successive phases of implementation, commercialization, acquisition, and adoption of the protocol. This process of protocol deployment involves several stakeholders and varies depending on the deployment environment and the protocol in question. This complexity and the lack of comprehensive measurement studies call for a further conceptualization of measuring protocol diffusion along the whole deployment process. Therefore, this article develops a framework for measuring the deployment of Internet protocols, consisting of deployment steps, deployment models, deployment measures, and data sources. The measures are further linked to each other through deployment gaps and delays. In order to demonstrate the framework, it is used to assess how a set of pre-installed protocols spread in the Finnish mobile market. The framework highlights the differences between the deployment models and the importance to use both the deployment measures and gaps in the analysis of protocol success. Furthermore, the illustrative results indicate that protocol deployment is driven by applications, and show the existence of large deployment gaps between the protocol possession and usage. The results are relevant especially to researchers interested in holistically analyzing protocol deployment and protocol developers for measuring and improving the success of their protocols.

12 citations

Journal ArticleDOI
TL;DR: The main aim of this article is to quantify security threats in cloud computing environments due to security breaches using a new security metric to reduce the probability that an architectural components fails.
Abstract: Cloud computing is a growing technology used by several organizations because it presents a cost effective policy to manage and control Information Technology (IT). It delivers computing services as a public utility rather than a personal one. However, despite these benefits, it presents many challenges including access control and security problems. In order to assess security risks, the paper gives an overview of security risk management metrics. Then, it illustrates the use of a cyber security measure to describe an economic security model for cloud computing system. Moreover, it proposes a cloud provider business model for security issues. Finally, the paper shows a solution related to the vulnerabilities in cloud systems using a new quantitative metric to reduce the probability that an architectural components fails. The main aim of this article is to quantify security threats in cloud computing environments due to security breaches using a new security metric.

5 citations

References
More filters
Journal ArticleDOI
TL;DR: In this paper, a simple but nevertheless extremely accurate, analytical model to compute the 802.11 DCF throughput, in the assumption of finite number of terminals and ideal channel conditions, is presented.
Abstract: The IEEE has standardized the 802.11 protocol for wireless local area networks. The primary medium access control (MAC) technique of 802.11 is called the distributed coordination function (DCF). The DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slotted exponential backoff. This paper provides a simple, but nevertheless extremely accurate, analytical model to compute the 802.11 DCF throughput, in the assumption of finite number of terminals and ideal channel conditions. The proposed analysis applies to both the packet transmission schemes employed by DCF, namely, the basic access and the RTS/CTS access mechanisms. In addition, it also applies to a combination of the two schemes, in which packets longer than a given threshold are transmitted according to the RTS/CTS mechanism. By means of the proposed model, we provide an extensive throughput performance evaluation of both access mechanisms of the 802.11 protocol.

8,072 citations

Journal Article
TL;DR: S-MAC as discussed by the authors is a medium access control protocol designed for wireless sensor networks, which uses three novel techniques to reduce energy consumption and support self-configuration, including virtual clusters to auto-sync on sleep schedules.
Abstract: This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. We expect sensor networks to be deployed in an ad hoc fashion, with individual nodes remaining largely inactive for long periods of time, but then becoming suddenly active when something is detected. These characteristics of sensor networks and applications motivate a MAC that is different from traditional wireless MACs such as IEEE 802.11 in almost every way: energy conservation and self-configuration are primary goals, while per-node fairness and latency are less important. S-MAC uses three novel techniques to reduce energy consumption and support self-configuration. To reduce energy consumption in listening to an idle channel, nodes periodically sleep. Neighboring nodes form virtual clusters to auto-synchronize on sleep schedules. Inspired by PAMAS, S-MAC also sets the radio to sleep during transmissions of other nodes. Unlike PAMAS, it only uses in-channel signaling. Finally, S-MAC applies message passing to reduce contention latency for sensor-network applications that require store-and-forward processing as data move through the network. We evaluate our implementation of S-MAC over a sample sensor node, the Mote, developed at University of California, Berkeley. The experiment results show that, on a source node, an 802.11-like MAC consumes 2–6 times more energy than S-MAC for traffic load with messages sent every 1–10s.

5,354 citations

Proceedings ArticleDOI
07 Nov 2002
TL;DR: S-MAC uses three novel techniques to reduce energy consumption and support self-configuration, and applies message passing to reduce contention latency for sensor-network applications that require store-and-forward processing as data move through the network.
Abstract: This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless sensor networks Wireless sensor networks use battery-operated computing and sensing devices A network of these devices will collaborate for a common application such as environmental monitoring We expect sensor networks to be deployed in an ad hoc fashion, with individual nodes remaining largely inactive for long periods of time, but then becoming suddenly active when something is detected These characteristics of sensor networks and applications motivate a MAC that is different from traditional wireless MACs such as IEEE 80211 in almost every way: energy conservation and self-configuration are primary goals, while per-node fairness and latency are less important S-MAC uses three novel techniques to reduce energy consumption and support self-configuration To reduce energy consumption in listening to an idle channel, nodes periodically sleep Neighboring nodes form virtual clusters to auto-synchronize on sleep schedules Inspired by PAMAS, S-MAC also sets the radio to sleep during transmissions of other nodes Unlike PAMAS, it only uses in-channel signaling Finally, S-MAC applies message passing to reduce contention latency for sensor-network applications that require store-and-forward processing as data move through the network We evaluate our implementation of S-MAC over a sample sensor node, the Mote, developed at University of California, Berkeley The experiment results show that, on a source node, an 80211-like MAC consumes 2-6 times more energy than S-MAC for traffic load with messages sent every 1-10 s

5,117 citations

Proceedings ArticleDOI
05 Nov 2003
TL;DR: T-MAC, a contention-based Medium Access Control protocol for wireless sensor networks, introduces an adaptive duty cycle in a novel way: by dynamically ending the active part of it to handle load variations in time and location.
Abstract: In this paper we describe T-MAC, a contention-based Medium Access Control protocol for wireless sensor networks. Applications for these networks have some characteristics (low message rate, insensitivity to latency) that can be exploited to reduce energy consumption by introducing an activesleep duty cycle. To handle load variations in time and location T-MAC introduces an adaptive duty cycle in a novel way: by dynamically ending the active part of it. This reduces the amount of energy wasted on idle listening, in which nodes wait for potentially incoming messages, while still maintaining a reasonable throughput.We discuss the design of T-MAC, and provide a head-to-head comparison with classic CSMA (no duty cycle) and S-MAC (fixed duty cycle) through extensive simulations. Under homogeneous load, T-MAC and S-MAC achieve similar reductions in energy consumption (up to 98%) compared to CSMA. In a sample scenario with variable load, however, T-MAC outperforms S-MAC by a factor of 5. Preliminary energy-consumption measurements provide insight into the internal workings of the T-MAC protocol.

2,844 citations

Journal ArticleDOI
J. B. Rosen1
TL;DR: In this paper, the existence and uniqueness of equilibrium points for concave n-person games is studied in a dynamic model for nonequilibrium situations, where the equilibrium points are chosen by the players.
Abstract: Existence and uniqueness of equilibrium points for concave n-person games - dynamic model for nonequilibrium situations

2,280 citations