scispace - formally typeset
Open AccessJournal Article

An Energy-Efficient MAC Protocol for Wireless Sensor Networks

Wei Ye, +2 more
- 10 Jun 2009 - 
- Vol. 01, Iss: 1, pp 0-0
TLDR
S-MAC as discussed by the authors is a medium access control protocol designed for wireless sensor networks, which uses three novel techniques to reduce energy consumption and support self-configuration, including virtual clusters to auto-sync on sleep schedules.
Abstract
This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. We expect sensor networks to be deployed in an ad hoc fashion, with individual nodes remaining largely inactive for long periods of time, but then becoming suddenly active when something is detected. These characteristics of sensor networks and applications motivate a MAC that is different from traditional wireless MACs such as IEEE 802.11 in almost every way: energy conservation and self-configuration are primary goals, while per-node fairness and latency are less important. S-MAC uses three novel techniques to reduce energy consumption and support self-configuration. To reduce energy consumption in listening to an idle channel, nodes periodically sleep. Neighboring nodes form virtual clusters to auto-synchronize on sleep schedules. Inspired by PAMAS, S-MAC also sets the radio to sleep during transmissions of other nodes. Unlike PAMAS, it only uses in-channel signaling. Finally, S-MAC applies message passing to reduce contention latency for sensor-network applications that require store-and-forward processing as data move through the network. We evaluate our implementation of S-MAC over a sample sensor node, the Mote, developed at University of California, Berkeley. The experiment results show that, on a source node, an 802.11-like MAC consumes 2–6 times more energy than S-MAC for traffic load with messages sent every 1–10s.

read more

Citations
More filters
Proceedings ArticleDOI

Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks

TL;DR: This work presents a dynamic transmission-power-control algorithm based on previous studies and evaluates the algorithm using realistic multi-hop WSN workloads and a large Mica2dot-based testbed, finding that potential gains of dynamic Transmission-power control are much smaller than what is indicated by prior research.

Issues in Wireless Sensor Networks

TL;DR: A cursory look at each and every topic in WSN is provided and the main aim is to introduce a newbie to the field of WSN and make him understand the various topics of interest available for research.

A Survey on Topology Control in Wireless Sensor Networks: Taxonomy, Comparative Study, and Open Issues Topology control techniques for wireless sensor networks are systematically classified into two categories, namely, network coverage and network connectivity. The relevant basic principles, state of the art, and future research directions are summarized in this paper.

TL;DR: In this paper, the authors classify existing topology control techniques into two categories: network coverage and network connectivity, and propose a series of design guidelines under these two categories, with the focus on blanket coverage, barrier coverage, sweep coverage, power management, and power control.
Journal ArticleDOI

A multi-objective evolutionary algorithm for the deployment and power assignment problem in wireless sensor networks

TL;DR: Using the Multi-Objective Evolutionary Algorithm based on Decomposition (MOEA/D), the DPAP is decomposed into a set of scalar subproblems that are classified based on their objective preference and tackled in parallel by using neighborhood information and problem-specific evolutionary operators, in a single run.
Dissertation

Lisp: lightweight security protocols for wireless sensor networks

Abstract: Sensor networks, usually built with a large number of small, low-cost sensor devices, are characterized by their large-scale and unattended deployment that invites many critical attacks, thereby necessitating high-level security support for their intended applications and services. However, making sensor networks secure is challenging due mainly to the fact that sensors are battery-powered and it is often very difficult to change or recharge their batteries. To address this challenge, we design, develop and evaluate Lightweight S ecurity Protocols (LiSP) that cooperatively build a unified, energy-efficient security framework for sensor networks. We present two (group-based and distributed) key management/sharing schemes that are tailored to local and remote transactions, respectively. While the group-based scheme achieves efficient and robust re-keying via key broadcasting/authentication/recovery, distributed key sharing enables the development of attack-tolerant routing protocols capable of gracefully resisting device compromises as well as replacing resource-expensive, public-key-cipher-based protocols with a purely symmetric-cipher-based alternative. The problem of attack-tolerance is further investigated for the development of a secure localization protocol. The proposed protocol uses mutual collaboration among sensors to achieve high-level attack-tolerance in terms of detecting/identifying/rejecting sources of attacks, if present. Accordingly, it plays the role of an anomaly-based intrusion detection system tailored to localization that safeguards the network from localization-targeted attacks. As a countermeasure against physically tampering with sensors, we develop a novel soft tamper-proofing technique that verifies integrity of the program residing in each sensor device whenever it joins the network, or is suspected to have been compromised. Unlike other techniques unsuitable for low-cost, resource-limited sensors, our technique augments such sensors to be usable for applications that require high-level security. Finally, the benefits of our protocols are demonstrated via analysis and evaluation of their capability to defeat known security attacks, and their performance in terms of processing, communication and memory overheads.
References
More filters

Energy-efficient communication protocols for wireless microsensor networks

TL;DR: LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network, is proposed.
Proceedings ArticleDOI

Directed diffusion: a scalable and robust communication paradigm for sensor networks

TL;DR: This paper explores and evaluates the use of directed diffusion for a simple remote-surveillance sensor network and its implications for sensing, communication and computation.
Journal ArticleDOI

System architecture directions for networked sensors

TL;DR: Key requirements are identified, a small device is developed that is representative of the class, a tiny event-driven operating system is designed, and it is shown that it provides support for efficient modularity and concurrency-intensive operation.
Journal ArticleDOI

Wireless integrated network sensors

TL;DR: The WINS network represents a new monitoring and control capability for applications in such industries as transportation, manufacturing, health care, environmental oversight, and safety and security, and opportunities depend on development of a scalable, low-cost, sensor-network architecture.
Proceedings ArticleDOI

MACAW: a media access protocol for wireless LAN's

TL;DR: This paper studies media access protocols for a single channel wireless LAN being developed at Xerox Corporation's Palo Alto Research Center and develops a new protocol, MACAW, which uses an RTS-CTS-DS-DATA-ACK message exchange and includes a significantly different backoff algorithm.
Related Papers (5)