Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (248)

Search Parameters:
Keywords = medium access control (MAC)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 3678 KB  
Article
Virtual Signal Processing-Based Integrated Multi-User Detection
by Dabao Wang and Zhao Li
Sensors 2025, 25(15), 4761; https://doi.org/10.3390/s25154761 - 1 Aug 2025
Viewed by 316
Abstract
The demand for high data rates and large system capacity has posed significant challenges for medium access control (MAC) methods. Successive interference cancellation (SIC) is a classical multi-user detection (MUD) method; however, it suffers from an error propagation problem. To address this deficiency, [...] Read more.
The demand for high data rates and large system capacity has posed significant challenges for medium access control (MAC) methods. Successive interference cancellation (SIC) is a classical multi-user detection (MUD) method; however, it suffers from an error propagation problem. To address this deficiency, we propose a method called Virtual Signal Processing-Based Integrated Multi-User Detection (VSP-IMUD). In VSP-IMUD, the received mixed multi-user signals are treated as an equivalent signal. The channel ambiguity corresponding to each user’s signal is then examined. For channels with non-zero ambiguity values, the signal components are detected using zero-forcing (ZF) reception. Next, the detected ambiguous signal components are reconstructed and subtracted from the received mixed signal using SIC. Once all the ambiguous signals are detected, the remaining signal components with zero ambiguity values are equated to a virtual integrated signal, to which a matched filter (MF) is applied. Finally, by selecting the signal with the highest channel gain and adopting its data as the reference symbol, the remaining signals’ dataset can be determined. Our theoretical analysis and simulation results demonstrate that VSP-IMUD effectively reduces the frequency of SIC applications and mitigates its error propagation effects, thereby improving the system’s bit-error rate (BER) performance. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

15 pages, 271 KB  
Article
Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices
by Iain Baird, Isam Wadhaj, Baraq Ghaleb, Craig Thomson and Gordon Russell
IoT 2025, 6(3), 40; https://doi.org/10.3390/iot6030040 - 11 Jul 2025
Viewed by 648
Abstract
The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments. While SHA-256 remains a widely used standard, the emergence of SHA-3 particularly the KangarooTwelve variant offers potential benefits in flexibility [...] Read more.
The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments. While SHA-256 remains a widely used standard, the emergence of SHA-3 particularly the KangarooTwelve variant offers potential benefits in flexibility and post-quantum resilience for lightweight resource-constrained devices. This paper presents a comparative evaluation of the energy costs associated with SHA-256 and SHA-3 hashing in Contiki 3.0, using three generationally distinct IoT platforms: Sky Mote, Z1 Mote, and Wismote. Unlike previous studies that rely on hardware acceleration or limited scope, our work conducts a uniform, software-only analysis across all motes, employing consistent radio duty cycling, ContikiMAC (a low-power Medium Access Control protocol) and isolating the cryptographic workload from network overhead. The empirical results from the Cooja simulator reveal that while SHA-3 provides advanced security features, it incurs significantly higher CPU and, in some cases, radio energy costs particularly on legacy hardware. However, modern platforms like Wismote demonstrate a more balanced trade-off, making SHA-3 viable in higher-capability deployments. These findings offer actionable guidance for designers of secure IoT systems, highlighting the practical implications of cryptographic selection in energy-sensitive environments. Full article
Show Figures

Figure 1

20 pages, 3108 KB  
Article
Energy-Efficient MAC Protocol for Underwater Sensor Networks Using CSMA/CA, TDMA, and Actor–Critic Reinforcement Learning (AC-RL) Fusion
by Wazir Ur Rahman, Qiao Gang, Feng Zhou, Muhammad Tahir, Wasiq Ali, Muhammad Adil, Sun Zong Xin and Muhammad Ilyas Khattak
Acoustics 2025, 7(3), 39; https://doi.org/10.3390/acoustics7030039 - 25 Jun 2025
Viewed by 935
Abstract
Due to the dynamic and harsh underwater environment, which involves a long propagation delay, high bit error rate, and limited bandwidth, it is challenging to achieve reliable communication in underwater wireless sensor networks (UWSNs) and network support applications, like environmental monitoring and natural [...] Read more.
Due to the dynamic and harsh underwater environment, which involves a long propagation delay, high bit error rate, and limited bandwidth, it is challenging to achieve reliable communication in underwater wireless sensor networks (UWSNs) and network support applications, like environmental monitoring and natural disaster prediction, which require energy efficiency and low latency. To tackle these challenges, we introduce AC-RL-based power control (ACRLPC), a novel hybrid MAC protocol that can efficiently integrate Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)-based MAC and Time Division Multiple Access (TDMA) with Actor–Critic Reinforcement Learning (AC-RL). The proposed framework employs adaptive strategies, utilizing adaptive power control and intelligent access methods, which adjust to fluctuating conditions on the network. Harsh and dynamic underwater environment performance evaluations of the proposed scheme confirm a significant outperformance of ACRLPC compared to the current protocols of FDU-MAC, TCH-MAC, and UW-ALOHA-QM in all major performance measures, like energy consumption, throughput, accuracy, latency, and computational complexity. The ACRLPC is an ultra-energy-efficient protocol since it provides higher-grade power efficiency by maximizing the throughput and limiting the latency. Its overcoming of computational complexity makes it an approach that greatly relaxes the processing requirement, especially in the case of large, scalable underwater deployments. The unique hybrid architecture that is proposed effectively combines the best of both worlds, leveraging TDMA for reliable access, and the flexibility of CSMA/CA serves as a robust and holistic mechanism that meets the desired enablers of the system. Full article
Show Figures

Figure 1

24 pages, 586 KB  
Article
Performance Evaluation of a Mesh-Topology LoRa Network
by Thomas Gerhardus Durand and Marthinus Johannes Booysen
Sensors 2025, 25(5), 1602; https://doi.org/10.3390/s25051602 - 5 Mar 2025
Viewed by 2753
Abstract
Research into, and the usage of, Low-Power Wide-Area Networks (LPWANs) has increased significantly to support the ever-expanding requirements set by IoT applications. Specifically, the usage of Long-Range Wide-Area Networks (LoRaWANs) has increased, due to the LPWAN’s robust physical layer, Long-Range (LoRa), modulation scheme, [...] Read more.
Research into, and the usage of, Low-Power Wide-Area Networks (LPWANs) has increased significantly to support the ever-expanding requirements set by IoT applications. Specifically, the usage of Long-Range Wide-Area Networks (LoRaWANs) has increased, due to the LPWAN’s robust physical layer, Long-Range (LoRa), modulation scheme, which enables scalable, low-power consumption, long-range communication to IoT devices. The LoRaWAN Medium Access Control (MAC) protocol is currently limited to only support single-hop communication. This limits the coverage of a single gateway and increases the power consumption of devices which are located at the edge of a gateway’s coverage range. There is currently no standardised and commercialised multi-hop LoRa-based network, and the field is experiencing ongoing research. In this work, we propose a complementary network to LoRaWAN, which integrates mesh networking. An ns-3 simulation model has been developed, and the proposed LoRaMesh network is simulated for a varying number of scenarios. This research focuses on the design decisions needed to design a LoRa-based mesh network which maintains the low-power consumption advantages that LoRaWAN offers while ensuring that data packets are routed successfully to the gateway. The results highlighted a significant increase in the packet delivery ratio in nodes located far from a centralised gateway in a dense network. Nodes located further than 5.8 km from a gateway’s packet delivery ratio were increased from an average of 40.2% to 73.78%. The findings in this article validate the concept of a mesh-type LPWAN network based on the LoRa physical layer and highlight the potential for future optimisation. Full article
(This article belongs to the Special Issue LoRa Communication Technology for IoT Applications)
Show Figures

Figure 1

24 pages, 1016 KB  
Article
MILD: Minimizing Idle Listening Energy Consumption via Down-Clocking for Energy-Efficient Wi-Fi Communications
by Jae-Hyeon Park, Young-Joo Suh, Dongdeok Kim, Harim Lee, Hyeongtae Ahn and Young Deok Park
Sensors 2025, 25(4), 1155; https://doi.org/10.3390/s25041155 - 13 Feb 2025
Viewed by 1362
Abstract
Mobile devices, such as smartphones and laptops, face energy consumption challenges due to battery limitations, with Wi-Fi being one of the major sources of energy consumption in these devices. The IEEE 802.11 standard addresses this issue with Power Saving Mode (PSM), which reduces [...] Read more.
Mobile devices, such as smartphones and laptops, face energy consumption challenges due to battery limitations, with Wi-Fi being one of the major sources of energy consumption in these devices. The IEEE 802.11 standard addresses this issue with Power Saving Mode (PSM), which reduces power consumption but increases latency. To mitigate this latency, Adaptive-PSM (A-PSM) dynamically switches between PSM and Constantly Awake Mode (CAM); however, the associated Idle Listening (IL) process still results in high energy consumption. Various strategies have been proposed to optimize IL time; however, Medium Access Control (MAC)-level contention and network delays limit their effectiveness. To overcome these limitations, we propose MILD (Minimizing Idle Listening energy consumption via Down-clocking), a novel scheme that reduces energy consumption without compromising throughput. MILD introduces specialized preambles for Packet Arrival Detection (PAD) and Device Address Recognition (DAR), allowing the client to operate in a down-clocked state during IL and switch to full clocking only when necessary. Experimental results demonstrate that MILD reduces energy consumption by up to 23.6% while maintaining a minimal throughput loss of 12.5%, outperforming existing schemes. Full article
(This article belongs to the Special Issue Energy-Efficient Communication Networks and Systems: 2nd Edition)
Show Figures

Figure 1

30 pages, 2272 KB  
Article
Embedding Trust in the Media Access Control Protocol for Wireless Networks
by Chaminda Alocious, Hannan Xiao, Bruce Christianson and Joseph Spring
Sensors 2025, 25(2), 354; https://doi.org/10.3390/s25020354 - 9 Jan 2025
Viewed by 913
Abstract
IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.11 have been designed under the assumption that all nodes in the network are cooperative [...] Read more.
IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.11 have been designed under the assumption that all nodes in the network are cooperative and trustworthy. However, the potential for non-cooperative nodes exists, nodes that may purposefully misbehave in order to, for example, obtain extra bandwidth, conserve their resources, or disrupt network performance. This issue is further compounded when receivers such as Wi-Fi hotspots, normally trusted by other module nodes, also misbehave. Such issues, their detection, and mitigation have, we believe, not been sufficiently addressed in the literature. This research proposes a novel trust-incorporated MAC protocol (TMAC) which detects and mitigates complex node misbehavior for distributed network environments. TMAC introduces three main features into the original IEEE 802.11 protocol. First, each node assesses a trust level for their neighbors, establishing a verifiable backoff value generation mechanism with an incorporated trust model involving senders, receivers, and common neighbors. Second, TMAC uses a collaborative penalty scheme to penalize nodes that deviate from the IEEE 802.11 protocol. This feature removes the assumption of a trusted receiver. Third, a TMAC diagnosis mechanism is carried out for each distributed node periodically, to reassess neighbor status and to reclassify each based on their trust value. Simulation results in ns2 showed that TMAC is effective in diagnosing and starving selfish or misbehaving nodes in distributed wireless networks, improving the performance of trustworthy well-behaving nodes. The significant feature of TMAC is its ability to detect sender, receiver, and colluding node misbehavior at the MAC layer with a high level of accuracy, without the need to trust any of the communicating parties. Full article
(This article belongs to the Special Issue Innovative Approaches to Cybersecurity for IoT and Wireless Networks)
Show Figures

Figure 1

18 pages, 2329 KB  
Article
Communication and Sensing: Wireless PHY-Layer Threats to Security and Privacy for IoT Systems and Possible Countermeasures
by Renato Lo Cigno, Francesco Gringoli, Stefania Bartoletti, Marco Cominelli, Lorenzo Ghiro and Samuele Zanini
Information 2025, 16(1), 31; https://doi.org/10.3390/info16010031 - 7 Jan 2025
Cited by 2 | Viewed by 1583
Abstract
Recent advances in signal processing and AI-based inference enable the exploitation of wireless communication signals to collect information on devices, people, actions, and the environment in general, i.e., to perform Integrated Sensing And Communication (ISAC). This possibility offers exciting opportunities for Internet of [...] Read more.
Recent advances in signal processing and AI-based inference enable the exploitation of wireless communication signals to collect information on devices, people, actions, and the environment in general, i.e., to perform Integrated Sensing And Communication (ISAC). This possibility offers exciting opportunities for Internet of Things (IoT) systems, but it also introduces unprecedented threats to the security and privacy of data, devices, and systems. In fact, ISAC operates in the wireless PHY and Medium Access Control (MAC) layers, where it is impossible to protect information with standard encryption techniques or with any other purely digital methodologies. The goals of this paper are threefold. First, it analyzes the threats to security and privacy posed by ISAC and how they intertwine in the wireless PHY layer within the framework of IoT and distributed pervasive communication systems in general. Secondly, it presents and discusses possible countermeasures to protect users’ security and privacy. Thirdly, it introduces an architectural proposal, discussing the available choices and tradeoffs to implement such countermeasures, as well as solutions and protocols to preserve the potential benefits of ISAC while ensuring data protection and users’ privacy. The outcome and contribution of the paper is a systematic argumentation on wireless PHY-layer privacy and security threats and their relation with ISAC, framing the boundaries that research and innovation in this area should respect to avoid jeopardizing people’s rights. Full article
(This article belongs to the Special Issue Data Privacy Protection in the Internet of Things)
Show Figures

Figure 1

25 pages, 482 KB  
Article
Enhancing Time-Domain Interference Alignment for Underwater Acoustic Networks with Cross-Layer Design
by Qiao Xiao, Zhicheng Bi and Chaofeng Wang
Sensors 2025, 25(1), 68; https://doi.org/10.3390/s25010068 - 26 Dec 2024
Viewed by 831
Abstract
In exploiting large propagation delays in underwater acoustic (UWA) networks, the time-domain interference alignment (TDIA) mechanism aligns interference signals through delay-aware slot scheduling, creating additional idle time for improved transmission at the medium access control (MAC) layer. However, perfect alignment remains challenging due [...] Read more.
In exploiting large propagation delays in underwater acoustic (UWA) networks, the time-domain interference alignment (TDIA) mechanism aligns interference signals through delay-aware slot scheduling, creating additional idle time for improved transmission at the medium access control (MAC) layer. However, perfect alignment remains challenging due to arbitrary delays. This study enhances TDIA by incorporating power allocation into its transmission scheduling framework across the physical and MAC layers, following the cross-layer design principle. The proposed quasi-interference alignment (QIA) mechanism enables controlled interference on useful signals by jointly optimizing the transmission schedule and power. The formulated optimization problem to maximize network throughput is divided into two sub-problems: one for coarse slot scheduling and another for refining both scheduling and power allocation. The simulation results validate the QIA framework’s superiority over the traditional TDIA and genetic algorithm benchmarks. Full article
Show Figures

Figure 1

33 pages, 9060 KB  
Article
A Q-Learning-Based Approach to Design an Energy-Efficient MAC Protocol for UWSNs Through Collision Avoidance
by Qiao Gang, Wazir Ur Rahman, Feng Zhou, Muhammad Bilal, Wasiq Ali, Sajid Ullah Khan and Muhammad Ilyas Khattak
Electronics 2024, 13(22), 4388; https://doi.org/10.3390/electronics13224388 - 8 Nov 2024
Cited by 3 | Viewed by 1466
Abstract
Deploying and effectively utilizing wireless sensor networks (WSNs) in underwater habitats remains a challenging task. In underwater wireless sensors networks (UWSNs), the availability of a continuous energy source for communicating with nodes is either very costly or is prohibited due to the marine [...] Read more.
Deploying and effectively utilizing wireless sensor networks (WSNs) in underwater habitats remains a challenging task. In underwater wireless sensors networks (UWSNs), the availability of a continuous energy source for communicating with nodes is either very costly or is prohibited due to the marine life law enforcement agencies. So, in order to address this issue, we present a Q-learning-based approach to designing an energy-efficient medium access control (MAC) protocol for UWSNs through collision avoidance. The main goal is to prolong the network’s lifespan by optimizing the communication methods, specifically focusing on improving the energy efficiency of the MAC protocols. Factors affecting the energy consumption in communication are adjustments to the interference ranges, i.e., changing frequencies repeatedly to obtain optimal communication; data packet retransmissions in case of a false acknowledgment; and data packet collision occurrences in the channel. Our chosen protocol stands out by enabling sensor (Rx) nodes to avoid collisions without needing extra communication or prior interference knowledge. According to the results obtained through simulations, our protocol may increase the network’s performance in terms of network throughput by up to 23% when compared to benchmark protocols depending on the typical traffic load. It simultaneously decreases end-to-end latency, increases the packet delivery ratio (PDR), boosts channel usage, and lessens packet collisions by over 38%. All these gains result in minimizing the network’s energy consumption, with a proportional gain. Full article
(This article belongs to the Special Issue New Advances in Underwater Communication Systems)
Show Figures

Figure 1

27 pages, 1412 KB  
Article
A Real-Time System Status Evaluation Method for Passive UHF RFID Robots in Dynamic Scenarios
by Honggang Wang, Weibing Du, Bo Qin, Ruoyu Pan and Shengli Pang
Electronics 2024, 13(21), 4162; https://doi.org/10.3390/electronics13214162 - 23 Oct 2024
Cited by 1 | Viewed by 1393
Abstract
In dynamic scenarios, the status of a Radio Frequency Identification (RFID) system fluctuates with environmental changes. The key to improving system efficiency lies in the real-time monitoring and evaluation of the system status, along with adaptive adjustments to the system parameters and read [...] Read more.
In dynamic scenarios, the status of a Radio Frequency Identification (RFID) system fluctuates with environmental changes. The key to improving system efficiency lies in the real-time monitoring and evaluation of the system status, along with adaptive adjustments to the system parameters and read algorithms. This paper focuses on the status changes in RFID systems in dynamic scenarios, aiming to enhance system robustness and reading performance, ensuring high link quality, reasonable resource scheduling, and real-time status evaluation under varying conditions. This paper comprehensively considers the system parameter settings in dynamic scenarios, integrating the interaction model between readers and tags. The system’s real-time status is evaluated from both the physical layer and the Medium Access Control (MAC) layer perspectives. For the physical layer, a link quality evaluation model based on Uniform Manifold Approximation and Projection (UMAP) and K-Means clustering is proposed from the link quality. For the MAC layer, a multi-criteria decision-making evaluation model based on combined weighting and the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is proposed, which comprehensively considers both subjective and objective factors, utilizing the TOPSIS algorithm for an accurate evaluation of the MAC layer system status. For the RFID system, this paper proposes a real-time status evaluation model based on the Classification and Regression Tree (CART), which synthesizes the evaluation results of the physical layer and MAC layer. Finally, engineering tests and verification were conducted on the RFID robot system in mobile scenarios. The results showed that the clustering average silhouette coefficient of the physical layer link quality evaluation model based on K-Means was 0.70184, indicating a relatively good clustering effect. The system status evaluation model of the MAC layer, based on the combined weighting-TOPSIS method, demonstrated good flexibility and generalization. The real-time status evaluation model of the RFID system, based on CART, achieved a classification accuracy of 98.3%, with an algorithm runtime of 0.003 s. Compared with other algorithms, it had a higher classification accuracy and shorter runtime, making it well suited for the real-time evaluation of the RFID robot system’s status in dynamic scenarios. Full article
Show Figures

Figure 1

28 pages, 2069 KB  
Article
Latency Analysis of Drone-Assisted C-V2X Communications for Basic Safety and Co-Operative Perception Messages
by Abhishek Gupta and Xavier N. Fernando
Drones 2024, 8(10), 600; https://doi.org/10.3390/drones8100600 - 18 Oct 2024
Cited by 4 | Viewed by 3361
Abstract
Drone-assisted radio communication is revolutionizing future wireless networks, including sixth-generation (6G) and beyond, by providing unobstructed, line-of-sight links from air to terrestrial vehicles, enabling robust cellular cehicle-to-everything (C-V2X) communication networks. However, addressing communication latency is imperative, especially when considering autonomous vehicles. In this [...] Read more.
Drone-assisted radio communication is revolutionizing future wireless networks, including sixth-generation (6G) and beyond, by providing unobstructed, line-of-sight links from air to terrestrial vehicles, enabling robust cellular cehicle-to-everything (C-V2X) communication networks. However, addressing communication latency is imperative, especially when considering autonomous vehicles. In this study, we analyze different types of delay and the factors impacting them in drone-assisted C-V2X networks. We specifically investigate C-V2X Mode 4, where multiple vehicles utilize available transmission windows to communicate the frequently collected sensor data with an embedded drone server. Through a discrete-time Markov model, we assess the medium access control (MAC) layer performance, analyzing the trade-off between data rates and communication latency. Furthermore, we compare the delay between cooperative perception messages (CPMs) and periodically transmitted basic safety messages (BSMs). Our simulation results emphasize the significance of optimizing BSM and CPM transmission intervals to achieve lower average delay as well as utilization of drones’ battery power to serve the maximum number of vehicles in a transmission time interval (TTI). The results also reveal that the average delay heavily depends on the packet arrival rate while the processing delay varies with the drone occupancy and state-transition rates for both BSM and CPM packets. Furthermore, an optimal policy approximates a threshold-based policy in which the threshold depends on the drone utilization and energy availability. Full article
(This article belongs to the Special Issue Wireless Networks and UAV)
Show Figures

Figure 1

22 pages, 4895 KB  
Article
Adaptive MAC Scheme for Interference Management in Ad Hoc IoT Networks
by Ehsan Ali, Adnan Fazil, Jihyoung Ryu, Muhammad Ashraf and Muhammad Zakwan
Appl. Sci. 2024, 14(19), 8628; https://doi.org/10.3390/app14198628 - 25 Sep 2024
Cited by 1 | Viewed by 1281
Abstract
The field of wireless communication has undergone revolutionary changes driven by technological advancements in recent years. Central to this evolution is wireless ad hoc networks, which are characterized by their decentralized nature and have introduced numerous possibilities and challenges for researchers. Moreover, most [...] Read more.
The field of wireless communication has undergone revolutionary changes driven by technological advancements in recent years. Central to this evolution is wireless ad hoc networks, which are characterized by their decentralized nature and have introduced numerous possibilities and challenges for researchers. Moreover, most of the existing Internet of Things (IoT) networks are based on ad hoc networks. This study focuses on the exploration of interference management and Medium Access Control (MAC) schemes. Through statistical derivations and systematic simulations, we evaluate the efficacy of guard zone-based MAC protocols under Rayleigh fading channel conditions. By establishing a link between network parameters, interference patterns, and MAC effectiveness, this work contributes to optimizing network performance. A key aspect of this study is the investigation of optimal guard zone parameters, which are crucial for interference mitigation. The adaptive guard zone scheme demonstrates superior performance compared to the widely recognized Carrier Sense Multiple Access (CSMA) and the system-wide fixed guard zone protocol under fading channel conditions that mimic real-world scenarios. Additionally, simulations reveal the interactions between network variables such as node density, path loss exponent, outage probability, and spreading gain, providing insights into their impact on aggregated interference and guard zone effectiveness. Full article
Show Figures

Figure 1

24 pages, 918 KB  
Article
Quality of Service-Aware Multi-Objective Enhanced Differential Evolution Optimization for Time Slotted Channel Hopping Scheduling in Heterogeneous Internet of Things Sensor Networks
by Aida Vatankhah and Ramiro Liscano
Sensors 2024, 24(18), 5987; https://doi.org/10.3390/s24185987 - 15 Sep 2024
Viewed by 1149
Abstract
The emergence of the Internet of Things (IoT) has attracted significant attention in industrial environments. These applications necessitate meeting stringent latency and reliability standards. To address this, the IEEE 802.15.4e standard introduces a novel Medium Access Control (MAC) protocol called Time Slotted Channel [...] Read more.
The emergence of the Internet of Things (IoT) has attracted significant attention in industrial environments. These applications necessitate meeting stringent latency and reliability standards. To address this, the IEEE 802.15.4e standard introduces a novel Medium Access Control (MAC) protocol called Time Slotted Channel Hopping (TSCH). Designing a centralized scheduling system that simultaneously achieves the required Quality of Service (QoS) is challenging due to the multi-objective optimization nature of the problem. This paper introduces a novel optimization algorithm, QoS-aware Multi-objective enhanced Differential Evolution optimization (QMDE), designed to handle the QoS metrics, such as delay and packet loss, across multiple services in heterogeneous networks while also achieving the anticipated service throughput. Through co-simulation between TSCH-SIM and Matlab, R2023a we conducted multiple simulations across diverse sensor network topologies and industrial QoS scenarios. The evaluation results illustrate that an optimal schedule generated by QMDE can effectively fulfill the QoS requirements of closed-loop supervisory control and condition monitoring industrial services in sensor networks from 16 to 100 nodes. Through extensive simulations and comparative evaluations against the Traffic-Aware Scheduling Algorithm (TASA), this study reveals the superior performance of QMDE, achieving significant enhancements in both Packet Delivery Ratio (PDR) and delay metrics. Full article
(This article belongs to the Special Issue Advanced Applications of WSNs and the IoT)
Show Figures

Figure 1

11 pages, 1056 KB  
Communication
Combined Sweeping and Jumping Method to Enhance Node Insertion Algorithm for Wi-Fi Sensor Networks
by Woo-Yong Choi
Appl. Sci. 2024, 14(17), 7762; https://doi.org/10.3390/app14177762 - 3 Sep 2024
Viewed by 1349
Abstract
Two dominant driving forces for evolving communication technologies in the current society have been the proliferation of wireless access networks to the Internet and the broadbandization of access and infrastructure networks. Through these evolutions of communication technologies, high-resolution contents are instantly delivered to [...] Read more.
Two dominant driving forces for evolving communication technologies in the current society have been the proliferation of wireless access networks to the Internet and the broadbandization of access and infrastructure networks. Through these evolutions of communication technologies, high-resolution contents are instantly delivered to wireless devices such as mobile phones, wireless tablets, and headsets. Recently, wireless sensor networks, where up to 1000 low-power sensors are wirelessly connected to each other, have been created and connected to the Internet, which presents a new challenge of efficiently coordinating the transmissions of many wireless sensors with minimal transmission overheads. Developing an efficient Medium Access Control (MAC) protocol governing the transmissions of wireless sensor networks is crucial for the success of wireless sensor networks for the realization of the Internet of Things (IoT). In 2023, the node insertion algorithm was proposed to efficiently derive the minimal number of serially connected multipolling sequences of many wireless sensors, by which Access Points (APs) can poll wireless sensors with minimal polling overheads. In this paper, the combined sweeping and jumping method is presented to dramatically enhance the searching performance of the node insertion algorithm. To validate the performance of the combined sweeping and jumping method, simulation results are presented for wireless sensor networks where wireless sensors with varying transmission ranges exist. Full article
(This article belongs to the Special Issue Wireless Networking: Application and Development)
Show Figures

Figure 1

24 pages, 7635 KB  
Article
Improved Adaptive Backoff Algorithm for Optimal Channel Utilization in Large-Scale IEEE 802.15.4-Based Wireless Body Area Networks
by Mounib Khanafer, Mouhcine Guennoun, Mohammed El-Abd and Hussein T. Mouftah
Future Internet 2024, 16(9), 313; https://doi.org/10.3390/fi16090313 - 29 Aug 2024
Cited by 2 | Viewed by 3886
Abstract
The backoff algorithm employed by the medium access control (MAC) protocol of the IEEE 802.15.4 standard has a significant impact on the overall performance of the wireless sensor network (WSN). This algorithm helps the MAC protocol resolve the contention among multiple nodes in [...] Read more.
The backoff algorithm employed by the medium access control (MAC) protocol of the IEEE 802.15.4 standard has a significant impact on the overall performance of the wireless sensor network (WSN). This algorithm helps the MAC protocol resolve the contention among multiple nodes in accessing the wireless medium. The standard binary exponent backoff (BEB) used by the IEEE 802.15.4 MAC protocol relies on an incremental method that doubles the size of the contention window after the occurrence of a collision. In a previous work, we proposed the adaptive backoff algorithm (ABA), which adapts the contention window’s size to the value of the probability of collision, thus relating the contention resolution to the size of the WSN in an indirect manner. ABA was studied and tested using contention window sizes of up to 256. However, the latter limit on the contention window size led to degradation in the network performance as the size of the network exceeded 50 nodes. This paper introduces the Improved ABA (I-ABA), an improved version of ABA. In the design of I-ABA we observe the optimal values of the contention window that maximize performance under varying probabilities of collision. Based on that, we use curve fitting techniques to derive a mathematical expression that better describes the adaptive change in the contention window. This forms the basis of I-ABA, which demonstrates scalability and the ability to enhance performance. As a potential area of application for I-ABA, we target wireless body area networks (WBANs) that are large-scale, that is, composed of hundreds of sensor nodes. WBAN is a major application area for the emerging Internet of Things (IoT) paradigm. We evaluate the performance of I-ABA based on simulations. Our results show that, in a large-scale WBAN, I-ABA can achieve superior performance to both ABA and the standard BEB in terms of various performance metrics. Full article
(This article belongs to the Special Issue IoT, Edge, and Cloud Computing in Smart Cities)
Show Figures

Figure 1

Back to TopTop