To see the other types of publications on this topic, follow the link: Low-Power Wireless Protocols.

Journal articles on the topic 'Low-Power Wireless Protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Low-Power Wireless Protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bartolomeu, Paulo, Muhammad Alam, Joaquim Ferreira, and José Fonseca. "Survey on low power real-time wireless MAC protocols." Journal of Network and Computer Applications 75 (November 2016): 293–316. http://dx.doi.org/10.1016/j.jnca.2016.09.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Zhi Ming, and Xiang Guang Chen. "The Development and Application of Ultra-Low-Power Wireless Sensor Network Nodes." Advanced Materials Research 846-847 (November 2013): 411–14. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.411.

Full text
Abstract:
In order to extend the life span of battery-powered wireless sensor network nodes, this article proceed from the power module, data processing module, wireless module and MAC protocols to design an ultra-low-power wireless sensor network nodes. The nodes improve the power module efficiency maximally, at the same time it utilizes the ultra-low-power data processing module and the asynchronous MAC protocol adopting a sleep wake-up mechanism. Thus it reduces the integrated energy consumption of wireless module significantly. The life span of the nodes has been increased more than three times. In a word, the design in proposed in this paper greatly cuts down the energy consumption of wireless sensor network, which has practical significance of expanding the application space and improving the application effects of wireless sensor network.
APA, Harvard, Vancouver, ISO, and other styles
3

Malavenda, Claudio S., F. Menichelli, and M. Olivieri. "Delay-Tolerant, Low-Power Protocols for Large Security-Critical Wireless Sensor Networks." Journal of Computer Networks and Communications 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/863521.

Full text
Abstract:
This paper reports the analysis, implementation, and experimental testing of a delay-tolerant and energy-aware protocol for a wireless sensor node, oriented to security applications. The solution proposed takes advantages from different domains considering as a guideline the low power consumption and facing the problems of seamless and lossy connectivity offered by the wireless medium along with very limited resources offered by a wireless network node. The paper is organized as follows: first we give an overview on delay-tolerant wireless sensor networking (DTN); then we perform a simulation-based comparative analysis of state-of-the-art DTN approaches and illustrate the improvement offered by the proposed protocol; finally we present experimental data gathered from the implementation of the proposed protocol on a proprietary hardware node.
APA, Harvard, Vancouver, ISO, and other styles
4

Heo, Ju Seung, Ki Sang Ok, and Kee Cheon Kim. "Public Key Techniques for Prevention of Resource Exhaustion Attack in Wireless Sensor Networks." Advanced Materials Research 740 (August 2013): 159–63. http://dx.doi.org/10.4028/www.scientific.net/amr.740.159.

Full text
Abstract:
This paper proposes a prevention mechanism for resource exhaustion attack in Wireless Sensor Networks (WSN). WSNs are widely used in science, medical, and military applications. However, WSN has problems of small memory, weak processors, and the limited battery power. On the other hands, public key techniques provide powerful security, but they need high energy, memory, computation cost than the symmetric cryptography. Therefore, we propose a more efficient protocol than the existing protocols in WSN, which analyze RSA algorithm and simulate ECC algorithm in CC2420 which is a true single-chip 2.4Ghz IEEE 802.15.4 compliant RF transceiver designed for low-power and low voltage wireless application. We also compared our proposed protocol and other public key-based protocols.
APA, Harvard, Vancouver, ISO, and other styles
5

Kumar, Vinay, and Sudarshan Tiwari. "Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A Survey." Journal of Computer Networks and Communications 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/316839.

Full text
Abstract:
6LoWPANs (IPv6-based Low-Power Personal Area Networks) are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP) does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6) and data link layer (IEEE802.15.4 MAC) to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.
APA, Harvard, Vancouver, ISO, and other styles
6

El-Hoiydi, Amre, and Jean-Dominique Decotignie. "Simulation of low power MAC protocols for wireless sensor networks." IFAC Proceedings Volumes 36, no. 13 (July 2003): 59–66. http://dx.doi.org/10.1016/s1474-6670(17)32465-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

El-Hoiydi, Amre, and Jean-Dominique Decotignie. "Low Power Downlink MAC Protocols for Infrastructure Wireless Sensor Networks." Mobile Networks and Applications 10, no. 5 (October 2005): 675–90. http://dx.doi.org/10.1007/s11036-005-3362-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rao, K. Raghava, D. Sateesh Kumar, Mohiddin Shaw, and V. Sitamahalakshmi. "Energy Efficiency Analysis of LoRa and ZigBee Protocols in Wireless Sensor Networks." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 22, 2021): 2836–49. http://dx.doi.org/10.47059/revistageintec.v11i4.2322.

Full text
Abstract:
Now a days IoT technologies are emerging technology with wide range of applications. Wireless sensor networks (WSNs) are plays vital role in IoT technologies. Construction of wireless sensor node with low-power radio link and high-speed processors is an interesting contribution for wireless sensor networks and IoT applications. Most of WSNs are furnished with battery source that has limited lifetime. The maximum operations of these networks require more power utility. Nevertheless, improving network efficiency and lifetime is a curtail issue in WSNs. Designing a low powered wireless sensor networks is a major challenges in recent years, it is essential to model its efficiency and power consumption for different applications. This paper describes power consumption model based on LoRa and Zigbee protocols, allows wireless sensor nodes to monitor and measure power consumption in a cyclic sleeping scenario. Experiential results reveals that the designed LoRa wireless sensor nodes have the potential for real-world IoT application with due consideration of communicating distance, data packets, transmitting speed, and consumes low power as compared with Zigbee sensor nodes. The measured sleep intervals achieved lower power consumption in LoRa as compared with Zigbee. The uniqueness of this research work lies in the review of wireless sensor node optimization and power consumption of these two wireless sensor networks for IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Petrosky, Eric E., Alan J. Michaels, and Joseph M. Ernst. "A Low Power IoT Medium Access Control for Receiver-Assigned CDMA." International Journal of Interdisciplinary Telecommunications and Networking 11, no. 2 (April 2019): 24–41. http://dx.doi.org/10.4018/ijitn.2019040103.

Full text
Abstract:
Low power, low cost, and security-conscious wireless sensor networks are becoming increasingly pervasive in the internet of things (IoT). In these networks, receiver-assigned code division multiple access (RA-CDMA) offers benefits over existing multiple access techniques. RA-CDMA networks are asynchronous, robust against multipath interference, and offer resilience against collision. A lightweight medium access control (MAC) protocol is needed to facilitate communication in RA-CDMA networks between low power sensor nodes and access points. This article provides an overview of RA-CDMA and proposes elements of a new MAC protocol that could improve performance of certain wireless sensor networks. Key features of the proposed MAC design are introduced and compared to those of existing protocols, highlighting its simple and lightweight design. Through its compatibility with RA-CDMA, the MAC design eliminates significant overhead and complexity while meeting requirements for low power networks, which enables the implementation of dense IoT sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
10

Yasser R. Alselehibi, Yasser R. Alselehibi. "Secure Lightweight Routing Scheme for Energy Efficient Wireless Sensor Networks." journal of King Abdulaziz University Computing and Information Technology Sciences 8, no. 2 (March 6, 2019): 57–68. http://dx.doi.org/10.4197/comp.8-2.5.

Full text
Abstract:
The technology revolution in wireless communications and micro-electro-mechanical systems (MEMS) directly affects the development of wireless sensor networks (WSNs), which are used in several application areas, including the military, home, and environment. One of the best categories of routing networks in WSNs are hierarchical protocols (cluster-based). The wellknown protocols in this category include the Low Energy Adaptive Clustering Hierarchy (LEACH). However, the LEACH is vulnerable to many attacks. To provide cryptographic protection against outsider attacks, a modified version of LEACH, called Enhancing Secure LEACH (MS-LEACH) protocol, is used. MS-LEACH enhances security but increases power consumption. To maintain an acceptable level of security and decrease the power consumption of secure LEACH protocols, the present research proposes a Secure Lightweight LEACH (SLWLEACH) scheme. The simulation results show that this proposed SLW-LEACH protocol outperforms the MS-LEACH in terms of ne
APA, Harvard, Vancouver, ISO, and other styles
11

Jones, Justin, and Mohammed Atiquzzaman. "Transport Protocols for Wireless Sensor Networks: State-of-the-Art and Future Directions." International Journal of Distributed Sensor Networks 3, no. 1 (February 1, 2007): 119–33. http://dx.doi.org/10.1080/15501320601069861.

Full text
Abstract:
Characteristics of wireless sensor networks, specifically dense deployment, limited processing power, and limited power supply, provide unique design challenges at the transport layer. Message transmission between sensor nodes over a wireless medium is especially expensive. Care must be taken to design an efficient transport layer protocol that combines reliable message delivery and congestion control with minimal overhead and retransmission. Sensor networks are created using low cost, low power nodes. Wireless sensors are assumed to have a finite lifetime; care must be taken to design and implement transport layer algorithms that allow maximum network lifetime. In this paper we present current and future challenges in the design of transport layers for sensor networks. Current transport layer protocols are compared based on how they implement reliable message delivery, congestion control, and energy efficiency.
APA, Harvard, Vancouver, ISO, and other styles
12

P., Samundiswary, and Surender R. "Performance Analysis of IEEE 802.15.4 Based Wireless Sensor Networks using LAR protocol for CBR and ZIGBEE Traffic Applications." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 9 (September 15, 2013): 1963–68. http://dx.doi.org/10.24297/ijct.v10i9.1374.

Full text
Abstract:
IEEE 802.15.4 standard based wireless sensor networks (WSNs) emerges as the next generation wireless standard for low-rate wireless personal area networks. IEEE 802.15.4 standard offers low power, low data rate and short range networking for wireless battery powered devices. It has also started to demand much attention towards research. The performance of the network can be analysed by using different types of routing protocols. In this paper, the performance analysis of IEEE 802.15.4 based Wireless Sensor Networks is done by using  Location Aided Routing (LAR) protocols for the traffic applications such as Constant Bit Rate (CBR) and Zigbee traffic application. The LAR protocol enables the routing of data between the source and destination by using directional flooding technique. The performance metrics such as throughput, delay, jitter and packets dropped of LAR for  CBR and Zigbee traffic application is evaluated and analysed. The simulation is modelled by using QualNet.
APA, Harvard, Vancouver, ISO, and other styles
13

Merlin, C. J., and W. B. Heinzelman. "Schedule Adaptation of Low-Power-Listening Protocols for Wireless Sensor Networks." IEEE Transactions on Mobile Computing 9, no. 5 (May 2010): 672–85. http://dx.doi.org/10.1109/tmc.2009.153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Singh, Anuj Kumar, and B. D. K. Patro. "Signcryption-Based Security Framework for Low Computing Power Devices." Recent Advances in Computer Science and Communications 13, no. 5 (November 5, 2020): 845–57. http://dx.doi.org/10.2174/2213275912666190617161732.

Full text
Abstract:
Background: With technological advancements, the use of many kinds of computing devices has given birth to a new era of computing. RFID tags, smart cards, and wireless sensors are the low computing power devices, which are being used massively in sensitive applications. Therefore, securing these low computing environments has become a great concern. Proposed Work: In this paper, an elliptic curve signcryption based security framework for securing low computing power devices has been proposed which provides mutual authentication, confidentiality, non-repudiation, forward secrecy, integrity, availability, key privacy, and anonymity. In addition to this, the proposed security framework has the capability to resist replay attack, desynchronization attack, impersonation attack, key-compromise attack, location tracking attack, denial of service attack, and man-in-the-middle attack. Results: Results have revealed that the proposed framework is efficient in terms of computational time as compared to the other related schemes. Conclusion: The proposed protocol presented in this paper can be used as a building block in designing efficient security protocols for all kinds of low computing power devices including RFID, wireless sensors, and smart cards.
APA, Harvard, Vancouver, ISO, and other styles
15

Abdelatty, Omar, Xing Chen, Abdullah Alghaihab, and David Wentzloff. "Bluetooth Communication Leveraging Ultra-Low Power Radio Design." Journal of Sensor and Actuator Networks 10, no. 2 (April 26, 2021): 31. http://dx.doi.org/10.3390/jsan10020031.

Full text
Abstract:
Energy-efficient wireless connectivity plays an important role in scaling both battery-less and battery-powered Internet-of-Things (IoT) devices. The power consumption in these devices is dominated by the wireless transceivers which limit the battery’s lifetime. Different strategies have been proposed to tackle these issues both in physical and network layers. The ultimate goal is to lower the power consumption without sacrificing other important metrics like latency, transmission range and robust operation under the presence of interference. Joint efforts in designing energy-efficient wireless protocols and low-power radio architectures result in achieving sub-100 μW operation. One technique to lower power is back-channel (BC) communication which allows ultra-low power (ULP) receivers to communicate efficiently with commonly used wireless standards like Bluetooth Low-Energy (BLE) while utilizing the already-deployed infrastructure. In this paper, we present a review of BLE back-channel communication and its forms. Additionally, a comprehensive survey of ULP radio design trends and techniques in both Bluetooth transmitters and receivers is presented.
APA, Harvard, Vancouver, ISO, and other styles
16

Boumassata, Meriem, and Mohamed Benmohammed. "Two Rounds Based LEACH." International Journal of Information Systems and Social Change 8, no. 3 (July 2017): 34–44. http://dx.doi.org/10.4018/ijissc.2017070103.

Full text
Abstract:
Wireless sensor networks (WSNs) are networks formed by a large number of electronic devices called sensor nodes, where each node is capable of measuring environmental or physical values and communicating data, through wireless links, to a base station. The main problem that WSNs routing protocols face, is that sensors are powered with low power batteries, which plays an important role in network lifetime. Low Energy Adaptive Clustering Hierarchy (LEACH) is a hierarchical cluster based routing protocol that was proposed as a solution for low power consumption in WSNs. One of LEACH protocol limitations is “Extra Transmissions”. This paper studies LEACH protocol, some of its various enhancements and finally proposes a new clustering and selecting cluster head scheme with the goal of optimizing the energy consumption in WSNs.
APA, Harvard, Vancouver, ISO, and other styles
17

Ullah, Niamat, M. Sanaullah Chowdhury, Mosaddique Al Ameen, and Kyung Sup Kwak. "Energy Efficient MAC Protocol for Low-Energy Critical Infrastructure Monitoring Networks Using Wakeup Radio." International Journal of Distributed Sensor Networks 8, no. 4 (April 1, 2012): 504946. http://dx.doi.org/10.1155/2012/504946.

Full text
Abstract:
Critical infrastructure monitoring applications are rapidly increasing. Application requirements include reliable data transfer, energy efficiency, and long deployment lifetime. These applications must also be able to operate in an extremely low-cost communication environment in order to be attractive to potential users. A low rate wireless personal area network can help control and manage the operations of such applications. In this paper, we present a medium access control (MAC) protocol for low-energy critical infrastructure monitoring (LECIM) applications. The proposed MAC protocol is based on a framed slotted aloha multiple access schemes. For downlink communication, we use a wakeup radio approach to avoid complex bookkeeping associated with the traditional MAC protocols. Analytical expressions for power consumption and delay are derived to analyze and compare the performance of our proposed protocol with the existing well-known T-MAC, B-MAC, X-MAC, ZigBee, and WiseMAC protocols. It is shown that our proposed protocol outperforms all the other protocols in terms of power consumption and delay.
APA, Harvard, Vancouver, ISO, and other styles
18

Al Ameen, Moshaddique, S. M. Riazul Islam, and Kyungsup Kwak. "Energy Saving Mechanisms for MAC Protocols in Wireless Sensor Networks." International Journal of Distributed Sensor Networks 6, no. 1 (January 1, 2010): 163413. http://dx.doi.org/10.1155/2010/163413.

Full text
Abstract:
Energy efficiency is a primary requirement in a wireless sensor network (WSN). This is a major design parameter in medium access control (MAC) protocols for WSN due to limited resources in sensor nodes that include low battery power. Hence a proposed MAC protocol must be energy efficient by reducing the potential energy wastes. Developing such a MAC protocol has been a hot research area in WSN. To avoid wasting the limited energy, various energy saving mechanisms are proposed for MAC protocols. These mechanisms have a common design objective—to save energy to maximize the network lifetime. This paper presents a survey on various energy saving mechanisms that are proposed for MAC protocols in WSN. We present a detailed discussion of these mechanisms and discuss their strengths and weaknesses. We also discuss MAC protocols that use these energy saving mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
19

Rajeswari, S. Raja, and V. Seenivasagam. "Comparative Study on Various Authentication Protocols in Wireless Sensor Networks." Scientific World Journal 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/6854303.

Full text
Abstract:
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.
APA, Harvard, Vancouver, ISO, and other styles
20

Azizi, Ridha. "Consumption of Energy and Routing Protocols in Wireless Sensor Network." Network Protocols and Algorithms 8, no. 3 (December 31, 2016): 76. http://dx.doi.org/10.5296/npa.v8i3.10257.

Full text
Abstract:
Extend the life of a wireless sensor network (WSN) is a fundamental challenge, as they have a limited supply. Multiple protocols and approaches have been proposed to minimize power consumption. Routing protocols and especially the hierarchical approach is one of the techniques used to minimize energy consumption and to improve the duration of network life. In this paper we propose a new approach to transfer and select the CH (Cluster Head). ART-LEACH (Advanced Routing Transfer- Low-Energy Adaptive Clustering Hierarchy) is a self-organizing protocol based on clustering. Our approach is to use energy more evenly the selected nodes as CH. We evaluated the performance of LEACH (Low-Energy Adaptive Clustering Hierarchy) and IB-LEACH (Improved and Balanced Low Energy Adaptive Clustering Hierarchy) protocol with the proposed new approach using MATLAB as a simulation tool. The simulation results showed that our proposal provides a reduction in energy consumption and increase the duration of network life.
APA, Harvard, Vancouver, ISO, and other styles
21

Meng, Fan Gui, Bao Chen Jiang, and Cheng You Wang. "An Improvement of ZigBee Cluster-Tree Routing Protocol." Advanced Materials Research 588-589 (November 2012): 1214–17. http://dx.doi.org/10.4028/www.scientific.net/amr.588-589.1214.

Full text
Abstract:
ZigBee is a wireless standard for Wireless Personal Area Networks (WPANs), and it is widely used in industrial, commercial, medical fields where low energy consumption is needed. ZigBee routing protocols should be stable, reliable and low-power. Cluster-Tree routing protocol is a simple and reliable routing protocol used in ZigBee network, and it only takes into account parent-child relationships of nodes, therefore its routing path is single and inefficient. This paper improves Cluster-Tree algorithm by introducing a neighbor table. The improved routing protocol has better performance in less energy consumption and a longer life cycle of entire ZigBee network.
APA, Harvard, Vancouver, ISO, and other styles
22

Hwang, Kwang-il, and Gangman Yi. "Adaptive Low-Power Listening MAC Protocol Based on Transmission Rates." Scientific World Journal 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/473132.

Full text
Abstract:
Even though existing low-power listening (LPL) protocols have enabled ultra-low-power operation in wireless sensor networks (WSN), they do not address trade-off between energy and delay, since they focused only on energy aspect. However, in recent years, a growing interest in various WSN applications is requiring new design factors, such as minimum delay and higher reliability, as well as energy efficiency. Therefore, in this paper we propose a novel sensor multiple access control (MAC) protocol, transmission rate based adaptive low-power listening MAC protocol (TRA-MAC), which is a kind of preamble-based LPL but is capable of controlling preamble sensing cycle adaptively to transmission rates. Through experiments, it is demonstrated that TRA-MAC enables LPL cycle (LC) and preamble transmission length to adapt dynamically to varying transmission rates, compensating trade-off between energy and response time.
APA, Harvard, Vancouver, ISO, and other styles
23

Samant, Tapaswini, and Amlan Datta. "Analysis and Comparison of SMAC and TMAC Protocol for Energy Efficient Dynamic Topology in Sensor Network." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (October 1, 2016): 2331. http://dx.doi.org/10.11591/ijece.v6i5.10645.

Full text
Abstract:
<p>In the era of wireless communication, wireless sensor is one of the best technologies we are witnessing. In case of environmental monitoring, tactical systems and different tracking applications, wireless sensors are being used. Here, the corresponding nodes operate on incomplete power and thus the energy comes into play to operate these entire networks. Managing the energy and its utilization is vital for TCP/IP protocol suite which is MAC layer’s application. Thus keeping in mind the above challenges, the techniques used are increasing the sleep duration, over hearing and ideal listening, collision of packet and eliminating hidden terminal problem. This paper is oriented towards the comparison of energy consumption by SMAC and TMAC protocol. The characteristics of TMAC and SMAC protocols were explored keeping real transmission conditions intact, like variable transmission bit rate, dynamic topology and mobile sensors in network. TMAC and SMAC protocols are contention based protocols and are designed to keep the energy consumption low using duty cycle.</p>
APA, Harvard, Vancouver, ISO, and other styles
24

Samant, Tapaswini, and Amlan Datta. "Analysis and Comparison of SMAC and TMAC Protocol for Energy Efficient Dynamic Topology in Sensor Network." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (October 1, 2016): 2331. http://dx.doi.org/10.11591/ijece.v6i5.pp2331-2337.

Full text
Abstract:
<p>In the era of wireless communication, wireless sensor is one of the best technologies we are witnessing. In case of environmental monitoring, tactical systems and different tracking applications, wireless sensors are being used. Here, the corresponding nodes operate on incomplete power and thus the energy comes into play to operate these entire networks. Managing the energy and its utilization is vital for TCP/IP protocol suite which is MAC layer’s application. Thus keeping in mind the above challenges, the techniques used are increasing the sleep duration, over hearing and ideal listening, collision of packet and eliminating hidden terminal problem. This paper is oriented towards the comparison of energy consumption by SMAC and TMAC protocol. The characteristics of TMAC and SMAC protocols were explored keeping real transmission conditions intact, like variable transmission bit rate, dynamic topology and mobile sensors in network. TMAC and SMAC protocols are contention based protocols and are designed to keep the energy consumption low using duty cycle.</p>
APA, Harvard, Vancouver, ISO, and other styles
25

Elsharief, Mahmoud, Mohamed A. Abd El-Gawad, and HyungWon Kim. "Low-Power Scheduling for Time Synchronization Protocols in A Wireless Sensor Networks." IEEE Sensors Letters 3, no. 4 (April 2019): 1–4. http://dx.doi.org/10.1109/lsens.2019.2902389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Mao, Yong Ming, Feng Long Kan, and Dong Wei Zhang. "Research on MAC Protocol for Wireless Sensor Network." Advanced Materials Research 945-949 (June 2014): 2368–71. http://dx.doi.org/10.4028/www.scientific.net/amr.945-949.2368.

Full text
Abstract:
The MAC layer protocol for wireless sensor networks has reached a goal of the low-power and low-latency. Existing protocols using periodic sleep mechanism achieve energy efficiency, but the low duty cycle will bring considerable transmission delay, and the delay will accumulate at each hop. This paper presents a wake protocol one by one (Weak up One by One MAC, WOO-MAC), the introduction of an arbitration has been an active device (Mediation Device, MD) as the basis of managers, the agreement for the use of sleep mechanisms exists data forward interrupt and control overhead or other issues, using the method of MD waking each node and reducing the energy, accumulating delay will be decreased based on saving energy.
APA, Harvard, Vancouver, ISO, and other styles
27

Son, Vo Que, and Tran Truong Son. "Enhancement of Asynchronous MAC Protocol in Wireless Sensor Networks for Smart Monitoring Applications." Journal of Science and Technology: Issue on Information and Communications Technology 3, no. 1 (March 31, 2017): 51. http://dx.doi.org/10.31130/jst.2017.38.

Full text
Abstract:
Up to now, many research works have been focusing on designs in MAC layer of Wireless Sensor Networks (WSNs) to target high throughput, low latency and solving the problem of idle listening. In this paper, an enhancement of Low-power asynchronous protocol for MAC layer, namely E-MAC, is proposed to target a long lifetime of sensor nodes working 6LoWPAN/IPv6 networks. Moreover, the E-MAC protocol is implemented on TI low-power platforms to verify the efficiency of the proposed design. Several parameters such as energy consumption, latency and packet delivery ratio are simulated and measured in a real monitoring test-bed to show the better performance in comparison with other popular MAC protocols.
APA, Harvard, Vancouver, ISO, and other styles
28

Galluzzi, Valerie, and Ted Herman. "Survey: Discovery in Wireless Sensor Networks." International Journal of Distributed Sensor Networks 8, no. 1 (January 1, 2012): 271860. http://dx.doi.org/10.1155/2012/271860.

Full text
Abstract:
Neighbor discovery is a component of communication and access protocols for ad hoc networks. Wireless sensor networks often must operate under a more severe low-power regimen than do traditional ad hoc networks, notably by turning off radio for extended periods. Turning off a radio is problematic for neighbor discovery, and a balance is needed between adequate open communication for discovery and silence to conserve power. This paper surveys recent progress on the problems of neighbor discovery for wireless sensor networks. The basic ideas behind these protocols are explained, which include deterministic schedules of waking and sleeping, randomized schedules, and combinatorial methods to ensure discovery.
APA, Harvard, Vancouver, ISO, and other styles
29

SHELTAMI, TAREK R. "AN EFFICIENT NEIGHBOR-AWARE PROTOCOL FOR SNET FORMATION." Journal of Interconnection Networks 09, no. 04 (December 2008): 439–54. http://dx.doi.org/10.1142/s0219265908002370.

Full text
Abstract:
A wireless mobile sensor network is a collection of wireless mobile hosts forming nodes that are communicating without the aid of any centralized administration or standard support services. Nodes are classified as sensor nodes and router. Some nodes act both as sensors and routers. While traditional MAC protocols must balance between throughput, delay, and fairness concerns, WSN MAC protocols place an emphasis on energy efficiency as well. Schedule-based MAC protocols have been proposed for WSN. A common theme through all these protocols is putting radios to a low-power "sleep mode" either periodically or whenever possible when a node is neither receiving nor transmitting. In this paper, we propose a novel cluster-based infrastructure creation protocol, namely: the Neighbor-Aware Clusterhead (NAC). We investigate the performance of the NAC protocol under different sleep scheduling protocols and compare it against another cluster-based protocol. In NAC protocol nodes are synchronized with their clusterheads and are allowed to go sleep mode in order to conserve their energy without degrading the performance of the network. The network is divided into clusters managed by a clusterhead. The simulation results show that NAC protocol has a good potential to be a good candidate protocol for SNET.
APA, Harvard, Vancouver, ISO, and other styles
30

Ng, S. L., and C. Mitchell. "Comments on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications." IEEE Communications Letters 8, no. 4 (April 2004): 262–63. http://dx.doi.org/10.1109/lcomm.2004.825724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Guleria, Kalpna, Sushil Kumar, and Anil Kumar Verma. "Energy Efficient Synchronous Media Access Control for Wireless Sensor Networks." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2523–30. http://dx.doi.org/10.1166/jctn.2020.8925.

Full text
Abstract:
The technological advancements have brought a revolution in the field of communication, especially in the area of wireless communication. It has made the deployment of WSNs possible which comprise of a large number of low-power and low-cost sensor nodes to perform the task of sensing, processing, and communication. WSNs set stringent requirements for network lifetime, resource constraint, application specific behavior and they are highly dynamic in nature. The one factor which affects the most is the network lifetime and it requires the energy efficient operation to be performed. This article aims at providing researchers a clear understanding and deep insight into the selection MAC protocols which is one of the major design factor while establishing WSNs or developing an energy efficient routing protocol for WSNs. The article presents a systematic review of various low duty cycle syncronous MAC protocols along with an in-depth analytical comparison and discussion based on various performance metrics.
APA, Harvard, Vancouver, ISO, and other styles
32

Kaur, Harjot, Gaurav Tejpal, and Harpal P. "A Survey Report on Energy Protocols for Wireless Sensor Networks." International Journal of Emerging Research in Management and Technology 7, no. 1 (June 11, 2018): 80. http://dx.doi.org/10.23956/ijermt.v7i1.26.

Full text
Abstract:
Instant alarm communities contain little battery driven products with confined power resources. After implemented, the tiny alarm nodes are often unavailable to the consumer, and ergo alternative of the vitality supply isn't feasible. Ergo, power performance is just a important style concern that requires to be increased to be able to enhance the expected life of the network. Many system coating methods have now been planned to enhance the powerful time of a system with a restricted power supply. In this short article we propose a centralized redirecting project named Base-Station Managed Powerful Clustering Process (BCDCP), which blows the vitality dissipation consistently among all alarm nodes to enhance system life time and normal power savings. The efficiency of BCDCP is then in comparison to clustering-based systems such as for instance Low Energy Versatile Clustering Hierarchy (LEACH), LEACH centralized (LEACH-C), and Power-Efficient Getting in Warning Data Methods (PEGASIS). Simulation effects reveal that BCDCP decreases over all power use and increases system life time around their comparatives.
APA, Harvard, Vancouver, ISO, and other styles
33

Pak, Wooguil. "Ultra-low-power media access control protocol based on clock drift characteristics in wireless sensor networks." International Journal of Distributed Sensor Networks 13, no. 7 (July 2017): 155014771772215. http://dx.doi.org/10.1177/1550147717722155.

Full text
Abstract:
Many researchers have analyzed sources of uncertainty in synchronization protocols for wireless sensor networks. However, very few researchers perform this work in depth, and failed to discover comprehensive characteristics since they worked with only one or two measurement intervals. To overcome this problem, extensive measurements were conducted and analyzed to find the characteristics of the sources according to various measurement intervals. Using the characteristics, a new media access control protocol, WideMAC, was designed to support a wide range of duty cycles for various applications. The transmission node in WideMAC calculates the wakeup time of the reception node before transmitting a packet and adaptively estimates the synchronization error size according to the synchronization interval from seconds to hours. To track the reception node’s wakeup time for synchronization, WideMAC uses two estimation algorithms that estimate the wakeup time and the upper bound of the total timing error. Accurate estimation of the wakeup time results in a significant amount of energy saving at the transmission node. Finally, through extensive performance evaluations in a testbed, WideMAC confirmed that it can significantly outperform existing state-of-the-art protocols.
APA, Harvard, Vancouver, ISO, and other styles
34

Rouaba, Ahmed, Nouamane Soualmi, and He Zun Wen. "Research on Low Power Routing Protocol for WSNs." Applied Mechanics and Materials 610 (August 2014): 927–32. http://dx.doi.org/10.4028/www.scientific.net/amm.610.927.

Full text
Abstract:
A wireless sensor network (WSN) consists of large number of autonomous sensors nodes; these nodes communicate with each other in dispersed manner to observe the environment. WSNs become one of the most important researches in modern communication systems. The energy source of nodes is limited and practically it is impossible to change or charge the battery. In order to save energy and increases the life time of battery in WSNs. Many energy routing protocols using the clustering were proposed in the literature. Low Energy Adaptive Clustering Hierarchy (LEACH) is the most famous routing protocol. In this paper we propose a new algorithm to choose the cluster head which has the highest energy. We shared the network to four regions, between them 90° for each part we find the powerful sensor between the sensors groups, and this last will be the cluster head of this round. Each sensor sends its data to the nearest cluster head and this last will send it to the sink. The same work for five and six clusters heads with sink in the center and in the corner (100, 0) is done.
APA, Harvard, Vancouver, ISO, and other styles
35

Park, Mingyu, and Jeongyeup Paek. "On-Demand Scheduling of Command and Responses for Low-Power Multihop Wireless Networks." Sensors 21, no. 3 (January 22, 2021): 738. http://dx.doi.org/10.3390/s21030738.

Full text
Abstract:
Many IoT applications require a mechanism to disseminate commands and collect responses over a wireless network in order to control and collect data from multiple embedded devices. However, severe collisions may occur if a large number of nodes attempt to respond simultaneously and promptly, not only among the responses, but also with the dissemination of commands. This is because low-power wireless network protocols for dissemination and collection have been designed separately. Tuning the parameters of one side of the protocol has clear trade-off between reliability and latency. To address this challenge, we propose SCoRe, an on-demand scheme for joint scheduling of command and responses on multihop low-power wireless networks to improve both reliability and latency simultaneously at runtime. SCoRe gathers the amount of time required by network nodes for dissemination and collection, and allocates relative timeslots to each node recursively over multihop on-demand when (and only when) disseminating a command. While doing so, information exchange occurs only between local neighbor nodes without a need for global routing table nor time synchronization. We implement SCoRe on a low-power embedded platform, and compare with well-known dissemination and collection schemes through both simulations and testbed experiments on 30 devices. Our evaluation results show that SCoRe can improve both latency and reliability without tuning the parameters for one metric, while the legacy schemes require careful parameter selection to match only one side of SCoRe, never both.
APA, Harvard, Vancouver, ISO, and other styles
36

Kim, Seong Cheol. "A MAC Protocol for Critical Data Transmission in Wireless Sensor Networks." Applied Mechanics and Materials 303-306 (February 2013): 206–9. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.206.

Full text
Abstract:
In this paper we present a low-power, low-latency MAC protocol adequate for critical data transmission. For support critical data packet transmission the proposed MAC protocol uses the modified IEEE 802.15.4 beacon frames including priority bit, sender node address, and NAV value fields. A receiver node periodically wakes up, receives sender beacon frames from its neighbor nodes, selects a data sending node, and broadcasts a beacon frame containing the selected sender’s address. Based on the sender’s data transmission urgency, a receiver node selects a data packet sending node. So critical data packet will be considered higher priority packet and be sent preferentially. Our simulations and analytical analysis have shown that our protocol outperforms other protocols in terms of energy consumption and higher priority packet delivery delay.
APA, Harvard, Vancouver, ISO, and other styles
37

AbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud, and Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (March 28, 2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.

Full text
Abstract:
Wireless Sensor networks consist of hundreds or thousands of low cost, low power and self-organizing nodes which are highly distributed. As wireless sensor networks continue to grow, so does the need for effective security mechanisms because sensor networks may interact with sensitive data. Encryption algorithms play good roles in information security systems (ISS). Those algorithms consume a significant amount of computing resources such as battery power. Wireless Sensor networks are powered by a battery which is a very limited resource. At present, various types of cryptographic algorithms provide high security to information on networks, but there are also has some drawbacks. The present asymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limitations. For instance key maintenance is a great problem faced in symmetric encryption methods and less security level is the problem of asymmetric encryption methods even though key maintenance is easy. To improve the strength of these algorithms, we propose a new hybrid cryptographic algorithm in this paper. The algorithm is designed using combination of two symmetric cryptographic techniques and two Asymmetric cryptographic techniques. This protocol provides three cryptographic primitives, integrity, confidentiality and authentication. It is a hybrid encryption method where elliptical curve cryptography (ECC) and advanced encryption (AES) are combined to provide node encryption. RSA algorithm and Blowfish are combined to provide authentication and (MD5) for integrity. The results show that the proposed hybrid cryptographic algorithm gives better performance in terms of computation time and the size of cipher text.This paper tries to present a fair comparison between the new protocols with four existing different hybrid protocols according to power consumption. A comparison has been conducted for those protocols at different settings for each protocol such as different sizes of data blocks, and finally encryption/decryption speed. Experimental results are given to demonstrate the effectiveness of each algorithm.
APA, Harvard, Vancouver, ISO, and other styles
38

Es-sabery, Fatima, Hicham Ouchitachen, and Abdellatif Hair. "Energy Optimization of Routing Protocols in Wireless Sensor Networks." International Journal of Informatics and Communication Technology (IJ-ICT) 6, no. 2 (August 1, 2017): 76. http://dx.doi.org/10.11591/ijict.v6i2.pp76-85.

Full text
Abstract:
The hierarchical routing of data in WSNs is a specific class of routing protocols it encompasses solutions that take a restructuring of the physical network in a logical hierarchy system for the optimization of the consum-ption of energy. Several hierarchical routing solutions proposed, namely: the protocol LEACH (Low Energy Adaptive Clustering Hierarchy) consist of dividing the network in distributed clusters at one pop in order of faster data delivery and PEGASIS protocol (Power-Efficient Gathering in Sensor Information Systems) which uses the principle of constructing a chain’s sensor node. Our contribution consists of a hierarchical routing protocol, which is the minimization of the energy consumption by reducing the transmission distance of data and reducing the data delivery time. Our solution combines the two hierarchical routing approaches: chain based approach and the cluster based approach. Our approach allows for multi-hop communications, intra- and intercluster, and a collaborative aggregation of data in each Cluster, and a collaborative aggregation of data at each sensor node<strong>.</strong>
APA, Harvard, Vancouver, ISO, and other styles
39

Harikrishnan, Harshini, Aarjish Sarkar, Shams Al Ajrawi, Albena Mihovska, and Christopher Paolini. "Medium Access Control Protocols for Brain Computer Interface Applications." International Journal of Interdisciplinary Telecommunications and Networking 13, no. 2 (April 2021): 24–41. http://dx.doi.org/10.4018/ijitn.2021040103.

Full text
Abstract:
Noteworthy advancements have occurred in the field of brain computer interfaces (BCI) in the last decade. The transmission of the collected signals to the corresponding organ through a wireless link is still in a nascent stage. This paper investigates the feasibility of having multiple UHF-RFID transmitters inside the skull which communicate to the receiver outside. The purpose of this paper is to design a wireless communication channel and enhance the communication using a MAC protocol. The existing MAC protocols were analyzed to be used in a BCI application. Though the combination of existing protocols seems like a possibility to use in a BCI system, the complexity of such a protocol is high. This drawback is overcome by proposing a novel MAC protocol. The performance of the proposed MAC algorithm is related with the widely used Q algorithm for anti-collision in the RFID tags. Parameters like delay and collisions are analyzed in detail which are essential to build a consistent, energy efficient, and a low power BCI system.
APA, Harvard, Vancouver, ISO, and other styles
40

Chen, Yibo, Jean-Pierre Chanet, Kun Mean Hou, and Hong Ling Shi. "Extending the RPL Routing Protocol to Agricultural Low Power and Lossy Networks (A-LLNs)." International Journal of Agricultural and Environmental Information Systems 4, no. 4 (October 2013): 25–47. http://dx.doi.org/10.4018/ijaeis.2013100102.

Full text
Abstract:
The routing protocol for low power and lossy network (RPL) started to be designed by the ROLL working group of IETF since the year of 2008. Until the RFC6550 was released, this standard with its routing algorithms and four application scenarios, such as home and building automation, industrial control, and urban environment, have been grounded. As a main jigsaw of the paradigm of the Internet of Things (IoT), RPL plays the major role and has become an impressed technical tendency in the field of wireless communication. However, it is still very difficult to find effective approaches to simulate and evaluate RPL’s behaviors and other extensions of its applicability, especially in the domain of precision agriculture. Notice that wireless sensor network (WSN) has been deployed a wide variety of wireless sensing devices, and should be one valued supported part of the promising IoT ecosystem. In this paper, first the authors provide a brief presentation of the related protocols including their standardization, the existing implementations, and a group of simulation experiment results obtained from the RPL capable COOJA simulator with its developed modules. Second, the authors then focus on the utilization of this protocol in the agricultural low power and lossy network (A-LLN) area and propose their dedicated instances hybrid network architecture to meet its specific requirement. Moreover, the Web of things (WoT), a trend and new vision of IoT, is appended in the authors’ proposal to provide a novel dimension in design of A-LLN since it enables a full interoperability with current web application and higher efficiency of development. As a conclusion, the authors summarized their ongoing work and future solutions of the current technology issues.
APA, Harvard, Vancouver, ISO, and other styles
41

El Ouadi, Mohammed Réda, and Abderrahim Hasbi. "Comparison of LEACH and PEGASIS Hierarchical Routing Protocols in WSN." International Journal of Online and Biomedical Engineering (iJOE) 16, no. 09 (August 13, 2020): 159. http://dx.doi.org/10.3991/ijoe.v16i09.14691.

Full text
Abstract:
<p>Wireless Sensor Networks is a group of sensor nodes dispatched in a geographical area for a defined objective. These sensor nodes are characterized by limited capacity of communicating, computing and especially of energy. The performance of these WSN is resting on a good routing protocol, hence the need to choose the routing protocol able to satisfy the wsn's objectives, and to satisfy the common challenge to prolong network life time.</p><p>Several routing concepts have been proposed for the WSN, hierarchical routing is one of the most used concepts. It is divided into 3 types: cluster based routing, grid based routing and chain based protocol. In this paper, we are interested to Study, analyse and compare two popular routing protocols for Wireless sensor networks (WSNs), Low-Energy Adaptive Clustering Hierarchy (LEACH) using clusters based concept and Power-Efficient Gathering in Sensor Information System (PEGASIS) with chain based concept. The both protocols are simulated with Matlab simulator, in order to evaluate its performances against the different users and the WSNs objectives defined.</p>
APA, Harvard, Vancouver, ISO, and other styles
42

Yonis, A. Z. "Influence of low power consumption on IEEE 802.15.4 in wireless networks performance." Bulletin of Electrical Engineering and Informatics 9, no. 1 (February 1, 2020): 205–11. http://dx.doi.org/10.11591/eei.v9i1.1678.

Full text
Abstract:
IEEE 802.15.4 standard defines both media access control (MAC) and physical (PHY) layer protocols for low power consumption, low peak data rate, and low cost applications. Nowadays the most important feature of IEEE 802.15.4 is maximizing battery life. This paper is focusing how to achieve low average power consumption through assuming that the amount of data transmitted is short and that it is transmitted infrequently so as to keep a low duty cycle. The outcomes demonstrate that the phase shift estimation of Offset quadrature phase-shift keying (OQPSK) modulation has no impact on bit error rate (BER) if it is identical in the transmitter as same as in the receiver.
APA, Harvard, Vancouver, ISO, and other styles
43

Oh, Hayoung, and Sangsoon Lim. "Light-weight Routing Protocol in IoT-based Inter-Device Telecommunication Wireless Environment." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (October 1, 2016): 2352. http://dx.doi.org/10.11591/ijece.v6i5.10504.

Full text
Abstract:
<p><span lang="EN-US">The primary task for IoT-based hyper-connectivity communications lies in the development of direct communications technique among IoT devices in RPL (Routing Protocol for Low-Power and Lossy Networks) environment without the aid from infras such as access points, base stations etc. In a low-power and lossy wireless network, IoT devices and routers cannot keep the original path toward the destination since they have the limited memory, except for a limited number of the default router information.. Different from the previous light-weight routing protocols focusing on the reduction of the control messages, the proposed scheme provides the light-weight IPv6 address auto-configuration, IPv6 neighbor discovery and routing protocol in a IoT capable infra-less wireless networks with the bloom filer and enhanced rank concepts. And for the first time we evaluate our proposed scheme based on the modeling of various probability distributions in the IoT environments with the lossy wireless link. Specifically, the proposed enhanced RPL based light-weight routing protocol improves the robustness with the multi-paths locally established based on the enhanced rank concepts even though lossy wireless links are existed. We showed the improvements of the proposed scheme up to 40% than the RPL based protocol.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
44

Oh, Hayoung, and Sangsoon Lim. "Light-weight Routing Protocol in IoT-based Inter-Device Telecommunication Wireless Environment." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (October 1, 2016): 2352. http://dx.doi.org/10.11591/ijece.v6i5.pp2352-2361.

Full text
Abstract:
<p><span lang="EN-US">The primary task for IoT-based hyper-connectivity communications lies in the development of direct communications technique among IoT devices in RPL (Routing Protocol for Low-Power and Lossy Networks) environment without the aid from infras such as access points, base stations etc. In a low-power and lossy wireless network, IoT devices and routers cannot keep the original path toward the destination since they have the limited memory, except for a limited number of the default router information.. Different from the previous light-weight routing protocols focusing on the reduction of the control messages, the proposed scheme provides the light-weight IPv6 address auto-configuration, IPv6 neighbor discovery and routing protocol in a IoT capable infra-less wireless networks with the bloom filer and enhanced rank concepts. And for the first time we evaluate our proposed scheme based on the modeling of various probability distributions in the IoT environments with the lossy wireless link. Specifically, the proposed enhanced RPL based light-weight routing protocol improves the robustness with the multi-paths locally established based on the enhanced rank concepts even though lossy wireless links are existed. We showed the improvements of the proposed scheme up to 40% than the RPL based protocol.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
45

Sharma, Bhisham, and Trilok C. Aseri. "A Comparative Analysis of Reliable and Congestion-Aware Transport Layer Protocols for Wireless Sensor Networks." ISRN Sensor Networks 2012 (December 30, 2012): 1–14. http://dx.doi.org/10.5402/2012/104057.

Full text
Abstract:
Design and implementation of wireless sensor Networks have gathered increased attention in recent years due to vast potential of sensor networks consisting of spatially distributed devices (motes) to cooperatively monitor physical or environmental conditions at different locations. Wireless sensor networks are built upon low cost nodes with limited battery (power), CPU clock (processing capacity), and memory modules (storage). Transport layer protocols applied to wireless sensor networks can handle the communications between the sink node and sensor nodes in upstream (sensor-to-sink) or downstream (sink-to-sensor) direction. In this paper, we present a comparative analysis of reliable and congestion aware transport layer protocols for wireless sensor networks and number of open issues that have to be carefully realized to make use of the wireless sensor networks more efficiently and to enhance their performance. We first list the characteristics of transport layer protocols. We then provide a summary of reliable and congestion aware transport layer protocols with their respective pros and cons and comparison of different protocols based on reliability, congestion control, and energy efficiency. Finally, we point out open research issues of transport layer protocols for wireless sensor networks, which need further attention to overcome the earlier mentioned challenges.
APA, Harvard, Vancouver, ISO, and other styles
46

LIU, PETER XIAOPING, and YIMIN LIU. "A TWO-HOP ENERGY-EFFICIENT MESH PROTOCOL FOR WIRELESS SENSOR NETWORKS." International Journal of Information Acquisition 01, no. 03 (September 2004): 237–47. http://dx.doi.org/10.1142/s0219878904000276.

Full text
Abstract:
We develop a novel energy-efficient routing protocol called the THEEM (Two-Hop Energy-Efficient Mesh) protocol for wireless sensor networks. In the THEEM protocol, a comprehensive and integrated treatment is employed to achieve energy efficiency. In specific, a two-hop in-mesh transmission scheme and a centralized mesh (cluster) formulation method are employed, along with other design innovations, such as the concepts of mesh layer/column, the power-aware assignment of mesh heads and a low-energy media access protocol. Simulation results show that the THEEM protocol is able to reduce energy consumption quite significantly compared to currently existing protocols. Equal energy dissipation among all sensor nodes in a network is also achieved. In addition, the protocol maximizes network data throughput.
APA, Harvard, Vancouver, ISO, and other styles
47

Alnajdi, Samah, and Fuad Bajaber. "Determination of the K-optimal number of chains-based routing protocol formed by the K-Means algorithm for the WSN." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (August 1, 2020): 917. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp917-930.

Full text
Abstract:
<span>Wireless sensor networks comprise of a large number of lightweight and relatively low-cost computational nodes which their main task is to sense the surrounding environment and collect the information to send it wirelessly to a central point to take the appropriate actions. Although these networks had been used in various applications, achieving this task is challenging due to the many constraints of sensor nodes including their limited processing power, communication bandwidth, and power supply. Therefore, an energy efficient routing protocols had to be developed specifically for sensor networks to insure longer lifetime and reasonable performance of the network. In this work, we propose an energy efficient hierarchical routing protocol using chain-based clustering. <span>By simulation on MATLAB, the proposed protocol proved to enhance the performance as it prolongs the lifetime of the network and decreases the energy consumption, the transmission delay, and the overhead compared to other existing protocols as it depends on some advanced methods including dynamic selection of number of chains method, k-means clustering method, advanced greedy chain construction method, and multi-factor based leader selection method.</span></span>
APA, Harvard, Vancouver, ISO, and other styles
48

Filipe, Luis, Florentino Fdez-Riverola, Nuno Costa, and António Pereira. "Wireless Body Area Networks for Healthcare Applications: Protocol Stack Review." International Journal of Distributed Sensor Networks 2015 (2015): 1–23. http://dx.doi.org/10.1155/2015/213705.

Full text
Abstract:
Wireless Body Area Networks (WBANs) supporting healthcare applications are in early development stage but offer valuable contributions at monitoring, diagnostic, or therapeutic levels. They cover real-time medical information gathering obtained from different sensors with secure data communication and low power consumption. As a consequence of the increasing interest in the application of this type of networks, several articles dealing with different aspects of such systems have been published recently. In this paper, we compile and compare technologies and protocols published in the most recent researches, seeking WBAN issues for medical monitoring purposes to select the most useful solutions for this area of networking. The most important features under consideration in our analysis include wireless communication protocols, frequency bands, data bandwidth, transmission distance, encryption, authentication methods, power consumption, and mobility. Our study demonstrates that some characteristics of surveyed protocols are very useful to medical appliances and patients in a WBAN domain.
APA, Harvard, Vancouver, ISO, and other styles
49

A. Alkathmawee, Ahmed, Lusong Feng, and Imad S. Alshawi. "Prolonging the Lifetime of Wireless Sensor Networks using LPA-star Search Algorithm." Indonesian Journal of Electrical Engineering and Computer Science 1, no. 2 (February 1, 2016): 390. http://dx.doi.org/10.11591/ijeecs.v1.i2.pp390-398.

Full text
Abstract:
<p>Since sensors have limited power resources, energy consumption has become a critical challenge to Wireless Sensor Networks (WSNs). Most of the routing protocols proposed to transmit data packets through paths which consume low energy aim simply to reduce battery power consumption. This can lead to lead to network partition and reduce network lifetime.Therefore, to balance energy consumption and extend network lifetime while minimizing packet delivery delay; this paper proposes a new energy-routing protocol using the lifelong planning A-star (LPA-star) search algorithm. This algorithm is used to find an optimum forwarding path between the source node and the sink. The optimum path can be selected depending on highest residual sensor energy, the shortest distance to the sink and lowest traffic load. Simulation results indicate that the proposed protocol increased the lifetime of the network compared with the A-star routing (EERP) protocol.</p>
APA, Harvard, Vancouver, ISO, and other styles
50

Mesmoudi, Asma, Samira Mesmoudi, Zakarya Houari, and Khelifa Mostefa. "A Novel Static Cluster-Based Hierarchical Protocol for Wireless Sensor Networks." Instrumentation Mesure Métrologie 20, no. 3 (June 30, 2021): 161–66. http://dx.doi.org/10.18280/i2m.200306.

Full text
Abstract:
Wireless sensor networks have recently gained a lot of attention from the scientific community due to their very wide spectrum of applications. In such networks, the sensor nodes have limited resources. These constraints impose many challenges to the design of related protocols. Especially, routing protocols should be energy-efficient for the prolonged network lifetime. The LEACH protocol is the most popular energy-efficient hierarchical clustering protocol for WSNs that was proposed for reducing power consumption. However, LEACH suffers from several drawbacks such as the non uniform distribution of Cluster Head nodes, the possibility of choosing a low energy node as Cluster Head, etc. In this paper, an attempt is made to overcome this shortcoming by introducing a new hierarchical clustering protocol, called SCHP (Static Cluster-based Hierarchical Protocol). The SCHP protocol is based on a static cluster creation and an optimal cluster head selection. Simulation results show that the proposal guarantees better performance than the LEACH Protocol that is considered as the baseline in the literature. We used many metrics, as packet loss rate, end-to-end delay, and energy consumption to evaluate the efficiency of our proposal. We show also that the SCHP protocol can improve the network lifetime.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography