首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
无线传感器网络MAC层协议的对比研究   总被引:8,自引:0,他引:8  
无线传感器网络是二十一世纪新兴的网络技术,它的出现使网络的发展进入一个新的阶段。针对无线传感器网络MAC层协议的研究一直是人们普遍关注的问题。总结了近年来的研究成果并针对TDMA,IEEE802.15.4,S—MAC,T—MAC几种典型的MAC层协议进行了对比分析,根据其各自的优点提出将来工作的方向和建议。  相似文献   

2.
李坡源  王艳艳  杨济安 《信息技术》2007,31(4):34-37,41
无线传感器网络要求的能量高效,低延时,使得MAC协议的设计充满挑战。近来已经提出了很多基于簇的MAC协议,为减少冲突在簇内部采用TDMA方式来协调簇内各个节点的传输。提出了一种在采用簇结构的基础上,使用预约方式来发送数据的R-MAC(Reservation-MAC)协议。当争用节点少的时候,采用随机争用方式来预约数据的发送;在争用节点多的时候,采用时隙争用方式来预约数据的发送。分析表明,R-MAC能够有效地降低能耗和减少延迟。  相似文献   

3.
Time‐division multiple‐access (TDMA) is a common medium access control paradigm in wireless sensor networks. However, in its traditional form, the TDMA‐based protocols suffer from low channel utilization and high message delay because of a long frame length needed to provide collision‐free transmissions, which is particularly damaging in dense wireless sensor networks. In this paper, we investigate the performance and the energy efficiency of a class of TDMA‐based protocols, called reduced‐frame TDMA, where every TDMA slot is augmented with a short time period dedicated for carrier sense multiple access‐based contention resolution mechanism. Because of their ability to dynamically resolve collisions caused by conflicting slot assignments, the reduced‐frame TDMA protocols can be configured with any frame length, independently of node density. In addition, we present a distributed heuristic slot assignment algorithm that minimizes interslot interference in the presence of limited number of slots per frame. The simulation results indicate that the reduced‐frame TDMA protocols significantly reduce the message delay and increase the maximum throughput without incurring significant penalty in energy efficiency compared with the traditional TDMA scheme. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

4.
无线传感器MAC层协议的研究   总被引:1,自引:0,他引:1  
作为信号处理、通信和传感器三项技术结合的产物,无线传感器网络具有许多方面的应用,像在环境保护、领土安全和未来数字化战争等中。近年来对无线传感器的介质访问控制(Media Access Control,MAC)层协议研究也越来越多。在详细介绍了一些典型的协议基础上分析了协议的优缺点,以便无线传感器网络MAC层协议的近一步研究和改进。  相似文献   

5.
提出了一种新的随机多址接入无线传感器网络的MAC控制协议,在发送分组的时间1+a中,采用P概率检测与1-坚持的联合控制策略,并对多通道的随机多址接入无线传感器网络进行了分析,理论分析了系统的吞吐量和多通道中不同业务的吞吐量,以及信息分组的发送时延等参数,理论分析与仿真实验结果相一致.还结合无线传感器网络的能量有效性,通过对概率P值的选取,控制忙周期侦听信道的节点数和空闲期的休眠站点数,采用休眠技术实现了系统的节能效果.通过对2种无线传感器网络控制协议的能量有效性分析,证明了改进的控制协议其节点具有更长的生命周期,更适合作为无线传感器网络的MAC控制协议.  相似文献   

6.
无线传感器网络及其MAC层协议   总被引:5,自引:0,他引:5  
焦超  王得宇 《信息技术》2007,31(2):32-35
无线传感器网络(WSN)是当今信息领域的一大研究热点,在军事、环境、医疗护理和智能家居等方面有着广阔的应用前景,引起了世界各国的广泛关注。首先介绍了无线传感器网络的相关理论知识,然后对无线传感器网络目前所采用的典型的MAC协议按类型进行了介绍。  相似文献   

7.
卢艳宏  掌明  冯源 《电讯技术》2012,52(8):1349-1353
针对无线传感器网络MAC协议中存在的能耗问题,提出了能量高效的无线传感器网络混合MAC(EEH-MAC)算法,采用基于TDMA机制的时槽系数动态调整簇内节点的时槽大小来降低数据的传输时延;同时,对部分不需要数据传输的节点不分配时槽来减少能耗;按簇内节点剩余能量系数形成时槽分配顺序来减少状态转换的能耗;在簇头之间采用CSMA/CA机制的随机分配策略进行通信.仿真结果表明,EEH-MAC协议能有效减少能耗并延长网络生命周期.  相似文献   

8.
高锦超 《电光与控制》2007,14(1):136-139
由于无线传感器网络的特殊性,针对其节能问题的媒体访问控制(MAC)协议研究越来越受到人们的关注.首先分析了无线传感器网络中能源损耗的原因,接着对近年来典型的基于节能策略的无线传感器网络MAC协议进行了分析总结,并综合其它性能指标比较了协议性能,最后提出了一些未来的研究方向.  相似文献   

9.
This paper reviews multi-channel media access control (MAC) protocols based on IEEE 802.11 in wireless Mesh networks (WMNs). Several key issues in multi-channel IEEE 802.1l-based WMNs are introduced and typical solutions proposed in recent years are classified and discussed in detail. The experiments are performed by network simulator version 2 (NS2) to evaluate four representative algorithms compared with traditional IEEE 802.11. Simulation results indicate that using multiple channels can substantially improve the performance of WMNs in single-hop scenario and each node equipped with multiple interfaces can substantially improve the performance of WMNs in multi-hop scenario.  相似文献   

10.
无线传感器网络中,可用正交信道数目较少和噪声干扰问题制约着多信道MAC协议性能的提升,结合数据采集应用的特点,提出一种基于网络分割的多信道MAC协议。在最小化网络总干扰值的基础上,网络分割引入碰撞因子进一步优化子树结构、降低树内干扰。并利用基于图着色理论的分配策略为每棵子树分配一条高质量信道。仿真实验结果表明,该协议显著提高了网络吞吐量,并且大幅降低了传输延迟和分组丢失率。  相似文献   

11.
This paper presents a novel link-layer encryption protocol for wireless sensor networks. The protocol design aims to reduce energy consumption by reducing security related communication overhead. This is done by merging security related data of consecutive packets. The merging (or combining packets) based on simple mathematical operations helps to reduce energy consumption by eliminating the requirement to send security related fields in headers and trailers. We name our protocol as the Compact Security Protocol referred to as C-Sec. In addition to energy savings, the C-Sec protocol also includes a unique security feature of hiding the packet header information. This feature makes it more difficult to trace the flow of wireless communication, and helps to minimize the cost of defending against replay attacks. We performed rigorous testing of the C-Sec protocol and compared it with well-known protocols including TinySec, MiniSec, SNEP and Zigbee. Our performance evaluation demonstrates that the C-Sec protocol outperforms other protocols in terms of energy savings. We also evaluated our protocol with respect to other performance metrics including queuing delay and error probability.  相似文献   

12.
Ioannis  Ioannis  Eirini  Fotini-Niovi   《Ad hoc Networks》2008,6(6):953-969
In this paper we focus on the problems of high latency and low throughput arising from the periodic operation of MAC protocols for wireless sensor networks. In order to meet both design criteria we propose an energy-efficient, low delay, fast-periodic MAC algorithm, namely FP-MAC, that is exclusively designed for 802.15.4-like networks utilizing in full the standard’s physical layer. Our proposal relies on the short periodic communication operation of the nodes comprising the WSN. This is achieved by decreasing the actions that a node needs to perform at the start of every communication period and by incorporating a variable radio-on operation. Moreover, the algorithm introduces differences in nodes’ scheduling to further reduce delay. Local synchronization and the crucial task of determining the proper timing for transmission and reception of data is achieved through the periodic broadcast of special synchronization frames at the beginning of each on-period. FP-MAC is evaluated and compared to S-MAC and T-MAC through extensive simulations, showing a significant improvement in terms of low energy consumption and average MAC delay.  相似文献   

13.
Wireless sensor networks are characterized by multihop wireless lossy links and resource constrained nodes. Energy efficiency is a major concern in such networks. In this paper, we study Geographic Routing with Environmental Energy Supply (GREES) and propose two protocols, GREES-L and GREES-M, which combine geographic routing and energy efficient routing techniques and take into account the realistic lossy wireless channel condition and the renewal capability of environmental energy supply when making routing decisions. Simulation results show that GREESs are more energy efficient than the corresponding residual energy based protocols and geographic routing protocols without energy awareness. GREESs can maintain higher mean residual energy on nodes, and achieve better load balancing in terms of having smaller standard deviation of residual energy on nodes. Both GREES-L and GREES-M exhibit graceful degradation on end-to-end delay, but do not compromise the end-to-end throughput performance. Kai Zeng received his B.E. degree in Communication Engineering and M.E. degree in Communication and Information System both from Huazhong University of Science and Technology, China, in 2001 and 2004, respectively. He is currently a Ph.D. student in the Electrical and Computer Engineering department at Worcester Polytechnic Institute. His research interests are in the areas of wireless ad hoc and sensor networks with emphases on energy-efficient protocol, cross-layer design, routing, and network security. Kui Ren received his B. Eng. and M. Eng. both from Zhejiang University, China, in 1998 and 2001, respectively. He worked as a research assistant at Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences from March 2001 to January 2003, at Institute for Infocomm Research, Singapore from January 2003 to August 2003, and at Information and Communications University, South Korea from September 2003 to June 2004. Currently he is a PhD candidate in the ECE department at Worcester Polytechnic Institute. His research interests include ad hoc/sensor network security, wireless mesh network security, Internet security, and security and privacy in ubiquitous computing environments. Wenjing Lou is an assistant professor in the Electrical and Computer Engineering department at Worcester Polytechnic Institute. She obtained her Ph.D. degree in Electrical and Computer Engineering from University of Florida in 2003. She received the M.A.Sc. degree from Nanyang Technological University, Singapore, in 1998, the M.E. degree and the B.E. degree in Computer Science and Engineering from Xi’an Jiaotong University, China, in 1996 and 1993 respectively. From December 1997 to July 1999, she worked as a Research Engineer in Network Technology Research Center, Nanyang Technological University. Her current research interests are in the areas of ad hoc and sensor networks, with emphases on network and system security and routing. Patrick J. Moran received his MSEE from Carnegie Mellon University, 1993. He is currently the CTO and Founder of AirSprite Technologies Inc, and is driving the company to utilize advanced networking protocols for low-power wireless network systems. His interests include architecture, protocols and high performance implementation of emerging communication technologies. Patrick has been involved in deployment of communication and signal processing technologies since graduating from the University of Minn. in 1986. He holds several patents and publications relating to storage, medical and data processing information systems. He is a member of the IEEE.  相似文献   

14.
In this paper, we propose an optimization of MAC protocol design for wireless sensor networks, that accounts for cross‐layering information, in terms of location accuracy for nodes and residual energy levels. In our proposed solution we encode this cross‐layer information within a decreasing backoff function in the MAC. The protocol is optimized by appropriately selecting priority window lengths, and we have shown that accurate cross‐layer information plays a crucial role in achieving an optimal performance at the MAC layer level. The estimation accuracy can be characterized spatially using a location reliability probability distribution function. We show that this distribution function greatly influences the design of the optimal backoff window parameters, and the overall throughput performance of the MAC protocol. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

15.
孙鹏  李光明  汪付强  庞泳 《电讯技术》2016,56(12):1417-1424
在无线传感网( WSN)体系结构中,介质访问控制( MAC)协议负责调配网络中节点的信道接入,具有保障网络高效通信的重要作用。混合类MAC 协议综合了竞争类MAC 协议以及调度类MAC协议的特点,在融合两种机制的优点的同时克服其缺点,为无线信道资源的分配提供了更加灵活和全面的策略。首先概述了无线传感网MAC协议设计要点及分类,然后重点分析了无线传感网中经典的混合类MAC协议及国内外前沿的研究进展,并进一步归纳对比了各协议运行机制、性能及不足,得出混合类MAC协议的应用相关性及差异性的结论,最后总结了无线传感网混合类MAC协议研究现状并指出了未来的研究重点,以期为相关领域的研究人员提供参考。  相似文献   

16.
无线传感器网络是由大量微型传感器节点组成的一个自组织的网络系统,路由协议是其关键技术之一.现有的路由协议分为:能量感知路由协议、以数据为中心的路由协议、基于地理位置的路由协议、可靠的路由协议和层次路由协议五类,对每类协议的特点和比较典型的协议进行了介绍.  相似文献   

17.
无线传感器网络(WSN)是一种多跳自组织网络,它由大量具有有限能力的节点组成,在工业、农业、交通、国防等领域具有广泛应用.为了减少节点的能量消耗,延长网络的生命周期,近年来逐渐出现了基于低占空比技术(Low-Duty-Cycle)的WSN,简称LDC-WSN.在LDC-WSN中,节点在一个工作周期内大部分时间处于睡眠状态,只有极少时间内处于工作状态.MAC协议是实现LDC-WSN中节点睡眠调度的关键,对LDC-WSN保持正常工作并获得理想的工作性能具有非常重要的意义.针对LDC-WSN中MAC协议的研究仍处于起步阶段,是目前研究的热点.对当前研究进行综述,详细介绍和分析LDC-WSN中最具代表性和较新的MAC协议.通过对比和总结当前工作的优缺点,明确了目前存在的问题和难点,为未来更深入的研究指明了方向.  相似文献   

18.
Wireless sensor networks (WSN) are event‐based systems that rely on the collective effort of several sensor nodes. Reliable event detection at the sink is based on collective information provided by the sensor nodes and not on any individual sensor data. Hence, conventional end‐to‐end reliability definitions and solutions are inapplicable in the WSN regime and would only lead to a waste of scarce sensor resources. Moreover, the reliability objective of WSN must be achieved within a certain real‐time delay bound posed by the application. Therefore, the WSN paradigm necessitates a collective delay‐constrained event‐to‐sink reliability notion rather than the traditional end‐to‐end reliability approaches. To the best of our knowledge, there is no transport protocol solution which addresses both reliability and real‐time delay bound requirements of WSN simultaneously. In this paper, the delay aware reliable transport (DART) protocol is presented for WSN. The objective of the DART protocol is to timely and reliably transport event features from the sensor field to the sink with minimum energy consumption. In this regard, the DART protocol simultaneously addresses congestion control and timely event transport reliability objectives in WSN. In addition to its efficient congestion detection and control algorithms, it incorporates the time critical event first (TCEF) scheduling mechanism to meet the application‐specific delay bounds at the sink node. Importantly, the algorithms of the DART protocol mainly run on resource rich sink node, with minimal functionality required at resource constrained sensor nodes. Furthermore, the DART protocol can accommodate multiple concurrent event occurrences in a wireless sensor field. Performance evaluation via simulation experiments show that the DART protocol achieves high performance in terms of real‐time communication requirements, reliable event detection and energy consumption in WSN. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

19.
A survey on routing protocols for wireless sensor networks   总被引:33,自引:0,他引:33  
Kemal  Mohamed 《Ad hoc Networks》2005,3(3):325-349
Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Most of the attention, however, has been given to the routing protocols since they might differ depending on the application and network architecture. This paper surveys recent routing protocols for sensor networks and presents a classification for the various approaches pursued. The three main categories explored in this paper are data-centric, hierarchical and location-based. Each routing protocol is described and discussed under the appropriate category. Moreover, protocols using contemporary methodologies such as network flow and quality of service modeling are also discussed. The paper concludes with open research issues.  相似文献   

20.
With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight. Though the security in sensor networks share many characteristics with wireless ad hoc networks, the two fields are rapidly diverging due to the fundamental differences between the make‐up and goals of the two types of networks. Perhaps the greatest dividing difference is the energy and computational abilities. Sensor nodes are typically smaller, less powerful, and more prone to failure than nodes in an ad hoc network. These differences indicate that protocols that are valid in the context of ad‐hoc networks may not be directly applicable for sensor networks. In this paper, we survey the state of art in securing wireless sensor networks. We review several protocols that provide security in sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号