Ad Hoc Networks. WA-MAC: A weather adaptive MAC protocol in survivability-heterogeneous wireless sensor networks

Size: px
Start display at page:

Download "Ad Hoc Networks. WA-MAC: A weather adaptive MAC protocol in survivability-heterogeneous wireless sensor networks"

Transcription

1 Ad Hoc Networks 67 (2017) Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: WA-MAC: A weather adaptive MAC protocol in survivability-heterogeneous wireless sensor networks Jie Tian a, Yi Wang b, Xiaoyuan Liang a,, Guiling Wang a, Yujun Zhang b a Department of Computer Science, New Jersey Institute of Technology, Newark, USA b Institute of Computing Technology, Chinese Academy of Sciences, Beijing, PR China a r t i c l e i n f o a b s t r a c t Article history: Received 14 November 2016 Revised 23 September 2017 Accepted 4 October 2017 Available online 5 October 2017 Keywords: Survivability-heterogeneous wireless sensor networks Medium access control Weather adaptivity Relative delay bound Nowadays, sensor nodes are deployed to different environments to perform applications. Harsh environments such as rain or snow could damage the sensor nodes permanently. In this paper, a novel survivability-heterogeneous wireless sensor network composed of sensor nodes that is resistant to environmental detriments is designed. We for the first time study the medium access control protocol in such heterogeneous wireless sensor networks for data transmission under different weather conditions. We present a new Weather Adaptive receiver-initiated MAC protocol, called WA-MAC. WA-MAC can largely reduce idle listening time to save energy consumption for sensors during data transmission and provide a relative delay bound data delivery service by establishing appropriate rendezvous time between senders and receivers. Besides, by adopting weather forecast information, WA-MAC adjusts the data transmission process between different types of sensors to avoid packets being lost or delayed. Simulation results in ns-2 simulator show that WA-MAC can achieve the required relative delay bound, a low duty cycle and a high packet delivery ratio in the network, which outperforms other existing MAC protocols Elsevier B.V. All rights reserved. 1. Introduction Wireless sensor networks are expected to applied to many outdoor applications, such as habitat monitoring [1], environment control [2] and solar radiation monitoring [3]. Outdoor environments are often harsh and detrimental to unprotected tiny lowcost electronic devices, such as sensor nodes. For example, after rain, sensor nodes could stop working and the precious generated data could be lost [4,5]. The environmental detriments could have a huge negative impact on the dependability of sensor networks and cause the failure of the entire network [6,7]. However, currently, there is few research works addressing such a problem in the community. To address the above problem, a new kind of heterogeneous wireless sensor networks was proposed in [8,9], called Survivability-Heterogeneous Wireless Sensor Networks (SHWSN). A SHWSN is composed of two types of sensor nodes: One type of sensor nodes are equipped with additional protections to make them for example water-proof [10]. Such sensor nodes are called robust sensors. Another type of sensor nodes don t have such ro- This work is supported by the National Science Foundation grants NSF Corresponding author. addresses: jt66@njit.edu (J. Tian), wangyi2012@ict.ac.cn (Y. Wang), xl367@njit.edu (X. Liang), gwang@njit.edu (G. Wang), zhmj@ict.ac.cn (Y. Zhang). bust features and are called regular sensors. By deploying both robust sensors and regular sensors, a network would be able to sustain in harsh environments, like rain, snow or high temperature, and provide better performance than a network just composed of regular sensors in many applications [8,9]. Meanwhile, the network cost is maintained at a reasonable level by deploying both kinds of sensors, considering robust sensors are more expensive than regular sensors. The robust feature to the environments provided by robust sensors is a new kind of heterogeneities in wireless sensor networks. In the applications, sensors have to work under both normal weather and harsh weather. Considering robust sensors are usually much pricier than regular sensors [11], The network cost became very high if all sensors were robust sensors. Thus we propose a network composed of both regular and robust sensors to balance the tradeoff between cost and field coverage. Under harsh weather, robust sensors can work to provide basic sensing, which is enough to provide uninterrupted sensing in outdoor applications. It is significantly different from the heterogeneity being studied in the existing works [12 15] in terms of computing capacity, energy, communication range, and sensing range. None of them considers the heterogeneity in the capabilities to withstand environmental detriments, which cannot be neglected in outdoor wireless sensor networks. This paper focuses on designing a new Weather Adaptive MAC protocol for such kind of heterogeneous sensor networks. Many / 2017 Elsevier B.V. All rights reserved.

2 J. Tian et al. / Ad Hoc Networks 67 (2017) MAC protocols aim to reduce the idle listening time of sensors to conserve energy. Among them, receiver-initiated MAC protocols gain popularity recently, such as A-MAC [16], RI-MAC [17], PW- MAC [18] and CyMAC [19], since they are more energy efficient than sender-initiated MAC protocols [20]. In a receiver-initiated MAC protocol, both sender and receiver agree on a wake-up time; at the wake-up time, the receiver notifies the sender that it is ready to receive; the sender then starts data transmission. At all the other time, they can be off-duty. However, no previous work considers environmental detriments that will disable regular sensors from working when there is rain. Rain will be used to represent the harsh weather in the remainder of the paper. The rain could damage a sensor and cause cached data in it to be lost. Moreover, the harsh weather can also cause the data delayed for a long time, since data cannot be sent out immediately. This additional dimension of complexity incurred by weather prevents previous works from being directly applied to our scenario. In this paper, we propose a novel Weather Adaptive receiverinitiated MAC protocol, WA-MAC. We leverage the widely available weather forecast information to schedule sensors to avoid data loss and delayed. It provides rain information in coming time slots. Previous work [21] shows that even by simply adopting an inaccurate weather forecast in the scheduling, the network performance can be improved significantly. WA-MAC can work effectively and efficiently under different weather conditions, including sunny weather and rainy weather. Moreover, WA-MAC targets on providing relative delay bound services for data delivery [19,22], which is a more meaningful evaluation metric in the proposed scenario and has been widely employed recently in optimizing MAC protocols. The relative delay ratio is defined as the data delivery delay to the average data arrival interval. To achieve the goal, we design a relative delay bound scheduling algorithm to calculate the rendezvous time between senders and receivers. We formally prove that the scheduling algorithm can achieve the required relative delay bound on average statistically. During the sunny weather, the algorithm directs each node to send and receive packets. Furthermore, WA-MAC can also avoid packets being lost and delayed by adjusting wake-up time between regular sensor nodes and robust sensor nodes before and after the rain. Extensive simulations have demonstrated that WA-MAC works effectively and efficiently under both sunny weather and rainy weather. To summarize, our contributions in this paper are: We for the first time study the medium access control problem in the survivability-heterogeneous WSN composed of sensors having different capabilities in withstanding harsh environment. We design a novel weather adaptive receiver-initiated MAC protocol, WA-MAC, for the proposed survivability-heterogeneous WSN. WA-MAC can simultaneously achieve a low duty cycle, a high packet delivery ratio and a relative delay bound. We formally prove that our designed scheduling algorithm can achieve the required relative delay bound on average statistically under different weather conditions. The scheduling algorithm and the theoretical result can also be borrowed in other types of sensor networks. The remainder of the paper is organized as follows. We present the assumptions and background in Section 2 and Section 3, respectively. Section 4 describes the design of WA-MAC. Section 5 reports simulation results. Related work is discussed in Section 6. Finally, we conclude the paper in Section Assumptions We make the following assumptions in the paper: Fig. 1. WA-MAC general procedure. The network we study is composed of two types of sensor nodes: robust sensors and regular sensors. Robust sensors can work under both sunny period and rainy period. Regular sensors can only function well under sunny period. When there is rain, the regular sensors will be damaged and the data in it will be lost. But regular sensors have a probability to survive after rain [23,24], get dried and come back to work if they are not on under rain and thus not damaged permanently [25]. Future weather information is assumed to be available to the network. Current weather forecast techniques are mature and can provide accurate weather forecast information of a given area [26,27] in the near short future. Specifically, a Minitab s report shows that the p-value for the weather accuracy in the next-day prediction is 0.00 [28], which means it is very reliable. The information can be broadcast from a station [29]. The station obtains the latest weather information and simply broadcasts it to the network by flooding at a certain time interval, which can be integrated within any dissemination protocol [30]. All sensors wake up at the broadcasting time to receive the weather forecast. Since the proposed MAC protocol needs only reliable weather information of the coming hundreds of seconds, the weather forecast is assumed to be 100% accurate [8]. In the network, any two neighboring nodes which can be MAC layer sender and receiver are assumed to be synchronized. The synchronization can be achieved by many mature techniques with low overheads [31 33]. Each sensor generates data packets independently when it is sensing. The generation process follows a Poisson process [34 36]. This is a widely adopted data generation process in WSN. The data packets will be transferred to the sink or other sensor nodes depending on the application running in the network. 3. Background on receiver-initiated MAC protocol and relative delay ratio In a receiver-initiated MAC protocol, any sender and receiver pair has a mutual agreement on a wake-up time. The receiver is in sleep mode until that wake-up time. When the receiver wakes up, the sender must already be awake. The receiver then sends a beacon message to notify the sender that it is ready to receive the packet. The sender sends the data packet to the receiver if there is any cached in the sender. The packets cached in the sender can be self-generated or received from other sensor nodes. After the receiver receives a packet, it sends an ACK message back to the sender. Fig. 1 illustrates the receiver-initiated MAC protocols: Sender A receives a packet at time t 1 and needs to send it to receiver B. t 2 is their mutually-agreed wake-up time. At time t 2, B

3 42 J. Tian et al. / Ad Hoc Networks 67 (2017) wakes up and sends a beacon message to notify A that it is ready. Then sender A transmits the data immediately. When receiver B successfully receives the data, it sends an ACK message back to A. Note that the key issue in receiver-based MAC protocols is how the sender and receiver pair determines their mutually-agreed wakeup time, which is generally called rendezvous time. Relative delay bound guarantee is a data delivery service [19,22]. It is an important evaluation metric for many receiverinitiated MAC protocols. The relative delay ratio is defined as the data delivery delay to the average data arrival interval in each sensor node. For example, if on average, a sensor node receives a data packet every 10 s and the delivery delay of each data packet is 2 s on average, then the relative delivery delay ratio is 20%. The relative delay bound is more meaningful than an absolute delay bound in the proposed heterogeneous wireless sensor networks, since the absolute delay is largely affected by duration of rainy period and cannot be always satisfied. If the rain period is very long, the delivery delay is very close to the rain duration, which cannot be optimized by MAC scheduling. In this paper, our MAC protocol is proposed to optimize the relative delay ratio. It can also improve the performance regarding to other metrics, such as delivery delay, duty cycle and packet delivery ratio, which is shown in the evaluation. Providing relative delay bound is the key objective of this paper. 4. Weather adaptive MAC protocol In this paper, we propose a Weather Adaptive MAC protocol, WA-MAC, which is designed for survivability-heterogeneous wireless sensor networks to provide relative delay bound guaranteed packet delivery service. WA-MAC is a receiver-initiated MAC protocol and follows the general procedure presented in Fig. 1. Different with other receiver-initiated MAC protocols, the senders in WA-MAC dynamically calculate a rendezvous interval based on the incoming traffic and weather forecast. As shown in Fig. 1, the interval is added to the current wake-up time to render the next wake-up time. The calculated rendezvous interval is piggybacked in the data packet transmitted from the sender to the receiver. When there is no data to send, the rendezvous interval remains the same and the receiver goes to sleep after a short interval. In this way, the sender and the receiver have an agreement on when to wake up. The rendezvous interval is calculated such that the required relative delay is guaranteed on average for packet delivery considering the traffic condition. When the traffic becomes light, the rendezvous interval is enlarged, such that both sender and receiver can be off-duty for a longer time to reduce energy consumption. When the traffic turns heavier, they wake up more often to perform data transmission with a shorter rendezvous interval. Another unique feature of WA-MAC is that it provides an adaptive packet delivery service to weather conditions. It checks the incoming weather to adjust the transmission strategy to achieve the required relative delay and avoid packets being lost considering under rain, regular sensors cannot work properly. Generally, when rain is expected to come, WA-MAC adjusts rendezvous interval time so all packets in regular sensors can be transmitted to robust sensors before the rain to avoid packets delay and loss. When it rains, robust sensors are only scheduled to perform data transmission. When rain stops, WA-MAC adjusts the rendezvous interval again to ensure that enough time is reserved for data cached in robust sensors to be transmitted to regular sensors. In the following, we first present how the rendezvous interval is calculated such that relative delay bound is guaranteed. Then we discuss the weather adaptive feature of WA-MAC. After that, we discuss how to deal with transmission failure and collision Calculating rendezvous time and relative delay bound guarantee The objective of WA-MAC is to simultaneously conserve energy consumption and provide relative delay guarantee. To save energy, the rendezvous interval should be prolonged as much as possible, but to provide relative delay guarantee, it cannot be too long. Considering packets arrive randomly, and providing 100% delay guarantee is very energy-consuming, WA-MAC focuses on providing the required relative delay on average in each sensor node. Thus, WA- MAC calculates a longest rendezvous interval between two data transmissions for the sender and the receiver based on the packet arrival process and historical packet arrival observations such that the expected value of relative delay for all packets arriving in this interval satisfies the required bound. It means that only a few of packets incur high delay with a small probability and most of packets experience low delay with a high probability. Thus the mean value of the delivery delay can be bounded under the requirement. In the following, the calculation of rendezvous time is discussed in details Rendezvous time calculation In WA-MAC, a sender calculates the rendezvous time for next time packet transmission between it and a receiver. Considering the packet generation process at each sensor follows a Poisson process, it can be proved that the packet arrival process at each sensor node always follows a Poisson process [35,36]. Then the rendezvous interval is calculated by Eq. (1), where is the rate of the packet arrival process at the sender and r is the relative delay ratio. In this way, the expected mean relative delivery delay is bounded by the required value. Lemma 4.1 formally states the conclusion and the proof is followed. Lemma 4.1. By setting the rendezvous interval 2 r 2 ln (r + 1) + ln (r + 1) x r =, (1) the required average relative delivery delay bound can be satisfied. Proof of Lemma 4.1. Suppose x r is the rendezvous interval. The packet arrival process at each node follows a Poisson process with parameter as mentioned before. Then with a given x r, the probability that a packet arriving between (0, x r ] in a node is p = 1 e x r, (2) which follows an exponential distribution. Then the probability that a packet X arrives between (0, x ], where x (0, x r ], on conditioning X x r is: P r(0 < X x X x r ) = P r(0 < X x, X x r ) P r(x x r ) = P r(0 < X x ) P r(x x r ) = 1 e x. (3) 1 e x r Let F ( x ) denote the new CDF with x (0, x r ], then we have F (x) = 1 e x, (4) 1 e x r and the corresponding pdf is x e f (x) =. (5) 1 e x r Then we calculate the expected delay of packet X when it is transmitted at time x r, which is E[ x r x ]. We need to show that E[ x r x ] r 1. (6) It means the average delay that a packet waits for its transmission needs to be less than or equal to the relative delay, which is calculated by relative delay ratio and packet arrival interval. It is also the relative delay requirement in our MAC protocol.

4 We calculate the expected value E[ x r x ], and then we have E[ x r x ] = x r x r 0 xf(x ) dx = Then we need to show that x r 1 e 1 x. (7) r x r 1 e 1 x r 1, (8) r which is also the relative delay bound. Since > 0 and 1 e x r > 0, we can establish the following equation, which is equivalent to Eq. (8) : x r + (r + 1)(e x r 1) 0. (9) A new function is defined as: g(y ) = y + (r + 1)(e y 1), y (0, + ), (10) in which y substitutes x r in Eq. (9). Then our objective becomes to find a maximized y with the constraint g ( y ) 0. We do the first derivative test on g ( y ) and obtain: ln (r + 1) < 0 if y <, g ln (r + (y) 1) = 0 if y =, (11) ln (r + 1) > 0 if y <. It is obvious that the function g ( y ) has a minimum value at y min = ln (r+1). To satisfy g ( y ) 0 for some y, the minimum value g(y min ) must be less than or equal to 0. Otherwise, such y doesn t exist. To put y min into g ( y ), we can obtain: g(y min ) = ln (r + 1) r. (12) Let us further define h (r) = ln (r + 1) r. We also run first derivative test on h ( r ) and then obtain: h (r) = 1 r (13) Since 0 r 1 according to realistic settings (if r > 1, the relative delay will be meaningless), then h ( r ) is always less than or equal to 0. Also because h (0) = 0, we can simply prove that h ( r ) 0 when 0 r 1. Therefore, we prove that the minimum value of g ( y ) is a non-positive value. There are always some y satisfying g ( y ) 0. To find such y, we solve the equation g(y ) = 0. It is obvious that there are two roots in the equation according to our previous analysis and one root is 0. Then our purpose is to find another root, which is also the maximized value to satisfy the equation. Since the above equation is a transcendental equation, it cannot be solved for one factor in terms of another. Hence, we adopt numerical methods to solve it and find the other root. Taylor series is adopted to calculate the maximized approximation root. The equation e y in g ( y ) is extended on the position y = ln (r+1) in the second order Taylor polynomial. Then we have: g(y ) = g (y) + R (y), (14) where ( 1 g (y) = y (r + 1) + (r + 1) + ( 2 y 2(r + 1) ln (r + 1) r + 1 ) 2 ) ( y r + 1 J. Tian et al. / Ad Hoc Networks 67 (2017) ) ln (r + 1), (15) y ( ) ln (r + 1), y. (16) It can be observed that R ( y ) 0. To find the maximized y satisfying g ( y ) 0, we only need to set g (y) = 0. We solve the equation and obtain one maximized root: y r = 2 r 2 ln (r + 1) + ln (r + 1), (17) which is also the value of x r. Thus we prove the lemma. Note that in Eq. (1), a parameter is required for each sensor node, but cannot be known beforehand. We propose a traffic estimation algorithm to calculate an estimated parameter, ˆ which is used in the calculation of Eq. (1) to represent the ideal parameter. Upon arrival of a data packet, the sender updates ˆ of the packet s receiver as: ˆ = β ˆ + (1 β), (18) where ˆ is the old parameter before the packet is received, is the maximum likelihood estimate from recent samples, and β is the weight, which is a system parameter. After a packet arrives at a sensor node, it calculates the based on recent samples in a certain range, such as 10 time units. Then it sets old ˆ to be ˆ and calculates a new ˆ based on Eq. (18). The reason to establish the above equation to estimate is that ˆ needs to reflect the most recent traffic conditions by carefully choosing β, since the weather conditions are unpredictable and may cause very dynamic traffic in the network Rendezvous time calculation when no packets arrive After the sender calculates a rendezvous interval, it informs the receiver. Then they both sleep till the scheduled wake-up time. During the interval, if the sender receives packets from other sensor nodes or generates packets itself, the packets can be transmitted to the receiver at the scheduled wake-up time. If the sender doesn t have any packet during the interval, a new rendezvous time needs to be calculated to schedule next wake-up time. The new rendezvous time also needs to meet the relative delay bound. When a sender doesn t have any packet to send in the coming rendezvous interval, it means the packet must arrive at the time that is greater than the rendezvous time. As shown in Fig. 2, after sender A and receiver B finish the last packet transmission at time t 2, they set time t 3 as the rendezvous time for next transmission. If there is no packet arriving at sender A between time t 2 and t 3, packets must arrive at the time greater than time t 3 if there is any. Then the problem lying here is how to determine the next rendezvous interval such that the required relative delay can still be guaranteed on average in the sensor node. In the following, we prove that the next rendezvous interval is the same as the old one. Lemma 4.2. For a sender that doesn t have any packet to send, the rendezvous interval with the receiver is: x r = 2 r 2 ln (r + 1) + ln (r + 1), (19) such that the required relative delay can be satisfied. and ( R (y) = (r + 1) 3 e y y 3! ) 3 ln (r + 1), Proof of Lemma 4.2. Similar as the proof of Lemma 4.1, we assume a packet X arrives at the receiver between (x r, x r + x r ], at which x r is the next rendezvous interval. Then the probability that packet X arrives between ( x r, x ], where x (x r, x r + x r ], on condi-

5 44 J. Tian et al. / Ad Hoc Networks 67 (2017) Fig. 2. Next rendezvous time when no packets arrival. tioning x r < X x r + x r is: P r(x r < X x x r < X x r + x r ) = P r(x r < X x, x r < X x r + x P r(x r < X x r + x = = P r(x r < X x ) P r(x r < X x r + x r ) r ) 1 e x (1 e x r ) = 1 e (x r + x r ) (1 e x r ) r ) 1 e (x x r ) 1 e x r. (20) We substitute x x r with y and x r with y r. Then we have y (0, y r ] and y r becomes the next rendezvous interval. A new CDF 1 e y F (y) = with y (0, y 1 e y r r ] can also be obtained from the above function. It can be observed that F ( y ) is exactly the same as F ( x ) in Lemma 4.1. Then the calculation results of y r is the same as x r. It also means x r is same as x r. Thus, the lemma is proved. From the above analysis, it can be further induced that if a sender has no packets arrived during the second rendezvous interval, it can keep the same rendezvous interval to make the appointment with receiver. In the following, we prove the statement. Lemma 4.3. For a sender that doesn t have any packet arrived, the rendezvous interval with the receiver always keeps: 2 r 2 ln (r + 1) + ln (r + 1) x r =, (21) such that the required relative delay can be satisfied. Proof of Lemma 4.3. We use mathematical induction to prove the lemma. Similar as the proof of previous lemmas, we assume a packet X arrives at the receiver between (0, x ]. When x x r, packet X must be transmitted at x r and thus the required relative delay can be satisfied according to Lemma 4.1. When x > x r, assume all the previous rendezvous interval is the same, which is x r. Then there must exist some k, which satisfies kx r < x (k + 1) x r. Let s assume x r is the next rendezvous interval to transmit packet X. Then the probability that packet X arrives between ( kx r, x ], where x (kx r, kx r + x r ], on conditioning kx r < X kx r + x r is: P r(kx r < X x kx r < X kx r + x = = = P r(kx r < X x ) P r(kx r < X kx r + x r ) 1 e x (1 e kx r ) 1 e (kx r + x r ) (1 e kx r ) (x kx r 1 e ) 1 e x r r ). (22) Same as Lemmas 4.2, we substitute x kx r with y and x r with y r. Then we have y (0, y r ] and y r becomes the next rendezvous interval. A new CDF F (y ) = 1 e y 1 e y r with y (0, y r ] can also be ob- tained from the above function. It can be observed that F ( y ) is exactly the same as F ( x ) in Lemma 4.1. Then the calculation results of y r is the same as x r. It also means x r is same as x r. Thus, the lemma is proved. To achieve continuous appointment between a sender and a receiver when no packets need to be transmitted, after the sender receives the beacon message, it just ignores it and replies nothing as shown in Fig. 2 at time t 3. Then after a short time, the receiver knows that no packet will arrive. It uses the previous rendezvous interval to calculate next rendezvous time and goes to sleep. Note that keeping x r the rendezvous interval is the sufficient condition to achieve the required relative delay Weather adaptivity During the rain, regular sensors are in sleep mode; however, the data stored in regular sensors may still be lost. Therefore, to be adaptive to the weather, we propose pre-rain rendezvous time adjustment, which helps regular sensors to transmit as much as possible data to robust sensors before raining, and post-rain rendezvous time adjustment, which aims to avoid transmission collision when robust sensors have a large amount of data to transmit to regular sensors after rain stops Pre-rain rendezvous adjustment The objective of pre-rain rendezvous adjustment is to reduce packet loss and delay at regular sensors because of the rain. To achieve this goal, regular sensors and robust sensors take different strategies. Before rain comes, regular sensors reduce the rendezvous interval and try to transmit all their packets to robust sensors. Robust sensors cache the packets if the next-hop receivers are regular sensors. For regular sensors to determine how to reduce the rendezvous interval, we first examine the average frequency of packet receiving and sending in regular sensors. The average frequency of sending packets is calculated based on rendezvous interval. Then the following equation must be satisfied: 1. x ˆ (23) r It means that regular sensor can always send its packets to other sensors faster than receive a new packet on average. Then we have: 2 r 2 ln (r + 1) + ln (r + 1) 1. (24) If the system parameter r doesn t satisfy the above equation, we can solve the equation to find a new r. Obviously, r is always less than or equal to r, which means a smaller r can still achieve the required relative delay bound. If r does satisfy the equation, the

6 J. Tian et al. / Ad Hoc Networks 67 (2017) fore, there is a high probability that the packets are delayed and thus the required delay is not satisfied because of the long data transmission time. To prevent the above from happening, we propose to set the first rendezvous time after rainy weather between robust senders and regular receivers to be ahead of the scheduled time. Since after the rain, there are very few packets needed to be transmitted between regular sensors and between robust sensors, such early scheduling does not potentially increase the probability of transmission failure. The ideal is to calculate a transmission window, which is the length of time that the rendezvous time should be moved ahead. The transmission window is an estimation of how long it takes to transmit packets cached in a robust sensor to its neighbor regular sensors on average. Since all sensors are deployed in a field for the same application, we assume packet generation rate is the same in every sensor node. Let 0 denote the packet generation rate in a robust sensor, n b denote the number of robust sensors, and T r denote the duration of a rainy period. n b 0 T r is the total number of packets generated in all robust sensors during the rainy period. Then such amount of packets need to be transmitted to neighbor regular sensors. Let n g denote the total number of regular sensors, T t denote the transmission time to transmit a packet entirely including data message, beacon message and ACK message, and c denote transmission time, which is a system parameter. Then the required length of time, which is also the transmission window T w, can be calculated as follows: Fig. 3. Pre-rain rendezvous adjustment. following method is used to further reduce the probability that a regular sensor cannot dump all its packets before the rain. In the pre-rain rendezvous adjustment, a robust sensor checks whether or not a current packet s next receiver is a regular sensor. If the receiver is a regular sensor, then the regular sensor further checks whether or not its next rendezvous time to send such packet is in the rainy period. If the regular sensor s rendezvous time is in the rainy period, then the regular sensor notifies the robust sensor that the previous transmitted packet needs to be cancelled as shown in Fig. 3 (a) and the robust sensor keeps the packet for transmitting it later. One bit can be set in the ACK message to notify the transmission is cancelled. If the next rendezvous time is before the rainy period, the regular sensor node keeps the packet and tries to transmit it at its next rendezvous time as shown in Fig. 3 (b). In the pre-rain rendezvous adjustment, only the receiver s information within 2 hops can be used to decide whether or not to cache a packet in the current robust sensor node. If a regular sensor becomes the packet s receiver more than 2 hops away, the robust sensor cannot know it and then the packet may be lost during the rain. For example, in Fig. 3 (b), if a regular sensor node D receives data from regular sensor node C and the regular sensor node D s next rendezvous time is in the rainy period, then the packet will be lost in node D. To avoid such packet loss, additional routing information is required. In the paper, we only consider to avoid the packet loss in the data communication layer Post-rain rendezvous adjustment After rainy weather passes, most of regular sensors come back to work again. Since robust sensors work under the rainy weather, they cache a lot of packets, whose next hops could be regular sensors. The packets need to be transmitted to the next hop immediately such that they are not delayed. Note that, during every data transmission in WA-MAC, a sender tries to send all packets to a receiver at once. Then after the rain is over, the first time of data transmission from robust sensors to regular sensors takes longer than usual. If the rendezvous time is still scheduled as be- T w = c T t n b 0 T r n g, (25) The window is, in the worst case, the time needed to dump the packets generated by robust sensors during rainy periods to regular sensors. Here the worst case means packets are transmitted for c times to be successfully delivered. Next, we present how a regular sensor receiver calculates the first rendezvous time after rain. Before rain comes, every regular sensor has its own rendezvous time. When the rain is approaching, one rendezvous time must fall in the rainy periods as shown in Fig. 3 (a). Since the regular sensors don t work under the rain, such rendezvous time is postponed till rain passes. The duration of rainy periods is added to obtain a rescheduled rendezvous time after the rain. Then we further put the transmission window ahead to calculate a new rendezvous time. It considers leaving enough time for packet transmitting cached in robust sensors. The calculation process is illustrated in Fig. 4 (a). If the new rendezvous time falls in the rainy periods, then the new rendezvous time is set to be the ending time of the rainy periods as illustrated in Fig. 4 (b). After the rain, the regular sensors follow the new rendezvous time to wake up and transmit the packets only once. After this one time transmission, all sensors still use the algorithm in Section 4.1 to calculate its next rendezvous time. Since all information can be obtained ahead of rainy periods, the post-rain rendezvous adjustment can always be performed successfully. If the new rendezvous time falls into the rainy period because of long rainy period, the sensors will wake up to receive the latest weather forecast and then go back to sleep till the sunny period comes Transmission collision After pre-rain and post-rain rendezvous adjustment, the traffic could become heavy. Then there is a probability that transmission collisions happen in a sensor node since its rendezvous interval is small. The transmission collision happens in a sensor node when it either acts as a sender or a receiver during the data transmission. The collision happens in a sender when it hasn t finished the data sending but its next rendezvoused sending time comes as shown in Fig. 5 (a). Then the sender cannot transmit next data at

7 46 J. Tian et al. / Ad Hoc Networks 67 (2017) Fig. 4. Post-rain rendezvous adjustment. Fig. 5. Transmission collision. the scheduled time. For example, in Fig. 5 (a), sender A sends data to receiver B at time t 1. t 2 is the rendezvous time between sender A and receiver C. Let T t denote the transmission time to transmit a large packet, which is greater than t 2 t 1. Then the collision happens in sender A at time t 2. Since the data transmission from sender A to receiver B is not finished at t 2, the data transmissions from sender A to receiver C is delayed. To deal with the collision at the sender side, in WA-MAC, after a receiver wakes up, it first checks whether or not the channel is busy. If it is, then it waits and checks the channel with interval T t for c times. When it senses the channel is not busy anymore, it sends a beacon. Otherwise, it stops sending the beacon. As shown in Fig. 5 (a), when receiver C notifies that the channel is not busy at time t 2 + T t, it sends a beacon out and prepares the data transmission. Moreover, since the sender has all receivers rendezvous time, it processes packet transmission as the rendezvoused sequence. The collision happens in a receiver when it needs to frequently receive packets from different senders as shown in Fig. 5 (b). The collision at a receiver is very similar as that at a sender. It happens when its next rendezvous receiving time comes but it has unfinished receiving packets. To deal with the collision at the receiver side, its senders are scheduled to wait with the interval T t for c times. Once the receiver finishes the packet transmission, it calculates the rescheduled time for the conflicting sender and sends a beacon message at that time. As shown in Fig. 5 (b), at t 2, the conflicting sender is sender C. Then both receiver A and sender C wake up at rescheduled time t 2 + T t and then receiver A sends a beacon message to notify sender C to transmit the packet. If there are more than 1 sender wait for transmission, the receiver contains the information that which sender is going to be the next sender in the beacon message and then every sender is aware of its turn. In this way, the sender can begin the next packet transmission with a short delay. The pseduo-code at the sender and the receiver is show in Algorithms 1 and 2 respectively Transmission failure Transmission failure happens in the network due to collisions or weak signals or other factors. Specifically, there are three failure scenarios: (1) The beacon message is lost during the transmission from receiver to sender, as illustrated in Fig. 6 (a). In the scenario, the receiver cannot know if there is no data to transmit or the beacon message is lost. To deal with the problem, the receiver tries to continuously send a beacon message for c times with the interval T t to the sender to confirm no packet to arrive, where T t is the transmission time to transmit a packet. Similarly, the sender continuously wakes up for c times with the interval T t to try to receive the beacon message. After the c times retrying, if the beacon message is still lost, both sender and receiver use the same rendezvous interval to calculate the next rendezvous time. Note the probability of beacon message loss is low because a beacon message is short and has higher priority. (2) The data message is lost during the transmission from sender to receiver as show in Fig. 6 (b). In this scenario, the receiver does not receive the piggybacked updated rendezvous interval, and thus will use the old rendezvous interval. The sender cannot receive the ACK message since the data packet is lost. However, the sender does not know whether the ACK is lost or the data is lost. Therefore, the sender will calculate two rendezvous times based on both the new and old rendezvous interval. (3) The ACK message is lost during the transmission from receiver to sender. In this case, the receiver receives the updated rendezvous interval and calculates the new rendezvous time. As for the sender, same as scenario (2), the sender does not know whether it is the data which is lost or the ACK which is lost. Therefore, the sender will wake up twice. Please note that if the sender does not receive the ACK in scenarios (2) and (3), it will retransmit the packet for c times with the interval T t. If after the c times attempts, either the ACK or the data is still lost, we follow the above strategy to deal with the transmission failure. 5. Evaluation In this section, we evaluate the proposed WA-MAC protocol. Our objective in conducting the evaluation study is four-fold: (1) Evaluating WA-MAC protocol in minimizing energy consumption for packet transmission in the network; (2) Evaluating WA-MAC protocol in achieving a required relative delivery delay in the net-

8 J. Tian et al. / Ad Hoc Networks 67 (2017) Algorithm 1 Collision handling algorithm at a sender. Notations: T t : the transimmision time for a packet. T : SIFS + maximized propagation delay. l t r : 0, the current try times. c: the max try times. t: the rendezvous time. Algorithm 2 Collision handling algorithm at a receiver. Notations: T t : the transimmision time for a packet. T l : 2 * SIFS + maximized propagation delay. t r : 0, the current try time. c: try limits. t: the rendezvous time. (1) Upon t arriving Sender wakes up and waits for the beacon message. if No beacon message is received in T l then It schedules itself to wake up at a T t interval. t r t r + 1. if t r > c then It drops the data and wakes up at a new rendezvous time. else if the beacon message is disturbed then It schedules itself to wake up at a T t + T l interval. else Sender sends data and waits for the ACK. if No ACK arrives in T l then t r t r + 1. if t r > c then It drops the data and wakes up at a new rendezvous time. It sends data again and waits for the ACK. (2) Upon an ACK arriving after sending the data in T l The process finishes and sender goes to sleep. t r 0. work; (3) Evaluating WA-MAC protocol in achieving a high packet delivery ratio in the network; and (4) Evaluating whether WA-MAC protocol work effectively under both sunny and rainy weather. To evaluate WA-MAC, four metrics are employed: (1) duty cycle on each sensor, (2) packet delivery delay, (3) relative packet delivery delay ratio, and (4) packet delivery ratio. The duty cycle is the working time of sending and receiving packets to the network running time averaged on each sensor. The packet delivery delay is the average delay of each packet between the time that it is generated and the time that it arrives at the destination. The relative packet delivery delay is the packet delivery delay divided by average packet arrival interval. The packet delivery ratio is the ratio of the number of total packets arrived at destination to the number of total packets generated in the network. We compare WA-MAC protocol with several representative receiver-initiated MAC protocols, which are RI-MAC [17], PW-MAC [18] and CyMAC [19]. RI-MAC is one of the first several receiverinitiated MAC protocols. To further reduce the energy consumption of sender in RI-MAC, PW-MAC adopts a pseudo-random number generator to calculate each appointment time for a pair of sender and receiver. CyMac aims to achieve a relative delay bound for packet transmission as well as a low working duty-cycle for each sensor. Since none of the above three MAC protocols considers weather information, in the evaluation, all the three algorithms are assumed to be aware of weather forecast to avoid regular sensors damage and only the robust sensors are scheduled to be working under the rainy weather. We implement WA-MAC in network simulator ns-2 and evaluate its performance through simulations. By default, in the sim- (1) Upon t arriving Receiver senses the channel. t r t r + 1. if t r > c then It drops the beacon and wakes up at a new rendezvous time. if the channel is busy then It schedules itself to wake up at a T t interval. else It sends a beacon message and waits for the data. if There is no data arriving in T l then It schedules itself to wake up at a T t interval. (2) Upon the data arriving It receives the data. if The data transmission is disturbed then It drops the data after the data transmission. It schedules itself to wake up at a T t interval. t r t r + 1. if t r > c then It drops the beacon and wakes up at a new rendezvous time. else It sends an ACK back after transmission. t r 0. ulations, the area is 1800 m 1800 m. There are n g = 36 regular sensors and n b = 13 robust sensors deployed in the field. The deployment of both regular sensors and robust sensors follows a two dimensional Poisson process. The sensing range and communication range of each sensor is 200 m and 400 m, respectively. The propagation conditions are partially affected by the rain factor, which is below 5 db/km in propagation attenuation when the rain rate is 100 mm/hr [37]. The communication range can be simply guaranteed without affecting the simulation results by increasing the transmission power under those extremely harsh weather [38]. The time span is divided into slots of 100 s. Each node independently generates packets in the network at each second. The packet generation process in each sensor follows a Poisson process. In the simulations, the average packets generation intervals are set to be 6 s, 8 s, 10 s, 12 s, 14 s, 16 s, 18 s, and 20 s. After a packet is generated in each sensor, it is randomly sent to one sensor node following some established routing path. Hence, there are multiple transmissions occurring concurrently, which is similar to the traffic in real applications. In both WA-MAC and CyMac, the relative delay ratio r is set to 0.2 and the weight β is set to 0.9. WA-MAC uses the packets information in the recent 5 time slots to update. ˆ The retrying times of transmission are set to 4 in all four MAC protocols. In PW-MAC, the parameter a and c are randomly chosen from the range (0, 100), and m is set to 100. To obtain a short delay in RI-MAC and PW-MAC, the wakeup interval is set to 1000 ms in RI-MAC, and the wakeup interval is computed as a pseudo-random number between 0 and 1000 ms in PW-MAC. Other than these, all

9 48 J. Tian et al. / Ad Hoc Networks 67 (2017) Fig. 6. Transmission failure. other parameters in RI-MAC, PW-MAC and CyMac are set to be the same as in [17,19], respectively. We evaluate our algorithm under 6 slots of sunny weather and 11 slots of both sunny and rainy weather. In the 11 slots of both sunny and rainy weather, the weather condition in the network is that the first 5 slots are sunny, then the next 1 slot is rainy and the remaining 5 slots are sunny again. During the 1 slot rainy period, one regular sensor has a probability of 10% to be damaged. The weather information is given to every node before the simulations. Since all four MAC protocols need to receive the weather forecast, the overhead of broadcasting is ignored in the simulation. All simulation results are the average of 100 times simulations. The network topology is different in each simulation by redeploying all sensor nodes in the network. The setting of the simulation is listed in Table Evaluation of packet delivery delay and relative delay ratio In this section, the average packet delivery delay are evaluated. To achieve a short delay in PW-MAC and RI-MAC, their wakeup intervals are set to be short, which is 1 s. Fig. 7 (a) shows the average delay in all the four MAC protocols under sunny weather. It can be observed that as the packet generation interval becomes large, the delivery delay increases in both WA-MAC and CyMAC. The reason is that both PW-MAC and WA-MAC are designed to achieve a relative delay bound during the transmission. When the packet interval becomes large, the allowable delay in each sensor becomes large and thus the total delay increases. When the packet generation frequency is high, WA-MAC performs better than the other three MAC protocols, even if the wakeup interval in PW-MAC and Table 1 Simulation configuration. Parameter Value Sensing range ( m ) 200 Communication range ( m ) 400 Number of regular sensors 36 Number of robust sensors 13 Failure probability of a regular sensor 10% Packet generation interval ( s ) 6 20 Retrying times 4 Relative delay ratio in WA-MAC and CyMac 0.2 β in WA-MAC 0.9 Wakeup interval in RI-MAC (ms) 1000 Wakeup interval in PW-MAC (ms) (0, 1000) a and c in PW-MAC (0, 100) m in PW-MAC 100 RI-MAC is short. For example, when packet generation interval is 6s, WA-MAC achieves a delivery delay of 4.7 s that is 29.8% less than CyMAC, 185.1% less than RI-MAC, and 459.6% less than PW- MAC. Their delivery delays are 6.1 s, 13.4 s, and 26.3 s, respectively. Fig. 7 (b) shows the delivery delay of all the four MAC protocols under rainy weather. The results in Fig. 7 (b) are similar to those in Fig. 7 (a), because of the same reason. It can also be observed that the delivery delays of all the four MAC protocols increase because of the rainy weather compared to the results in Fig. 7 (a) Evaluation of duty cycle We evaluate the average duty cycle in each sensor under both sunny and rainy weather. Fig. 8 (a) shows the results under sunny

10 J. Tian et al. / Ad Hoc Networks 67 (2017) Fig. 7. Packet delivery delay. Fig. 8. Duty cycle. weather. From the results, it can be observed that WA-MAC protocol outperforms the other three MAC protocols. For example, when the interval is 6 s, WA-MAC can achieve 4.3% duty cycle on average, which is 277% less than CyMAC, 398% less than PW-MAC, and 440% less than RI-MAC. Their duty cycles are 16.2%, 21.4% and 23.2%, respectively. It can also be observed that the high duty cycle of RI- MAC and PW-MAC is the result of the short wakeup interval to achieve low delivery delay. Fig. 8 (b) shows the performance of the four MAC protocols under both sunny and rainy weather. It can be observed that WA- MAC always performs better than the other three. For example, when the interval is 6 s, WA-MAC protocol can achieve 4.4% duty cycle that is 259% less than CyMAC, 432% less than PW-MAC, and 452% less than RI-MAC. Their duty cycles are 15.7%, 23.4% and 24.3%, respectively. The results also prove that WA-MAC protocol works more efficiently than the other MAC protocols under both sunny and rainy weathers Evaluation of relative delay ratio Since only CyMAC and WA-MAC protocols support the relative delay bound, we further evaluate the relative delay ratio of each sensor node in CyMAC and WA-MAC. In the evaluation, the relative delay ratio is 0.2 for both WA-MAC and CyMAC. As shown in Fig. 9 (a), under sunny weather, WA-MAC can achieve a relative delay ratio very close to 0.2, which is the default setting in the network, except when the packet generation interval is really small. For example, when packet generation interval is 20 s, WA- MAC achieves a ratio of during packet transmission, while CyMAC achieves a ratio of The reason of WA-MAC achieving a high relative delay ratio when the packets are generated frequently in the network under sunny weather is that there is a high probability that transmission collisions happen. WA-MAC provides the solution to deal with such situations, but increases the relative delay during the transmission. Instead, CyMAC just simply drops the packets. It has lots of packets missing, which can be shown in the evaluation of Section 5.4. Fig. 9 (b) shows the relative delivery delay ratio achieved by both CyMAC and WA-MAC under both sunny and rainy weathers. It can be observed that WA-MAC always achieves a relative delay ratio closer to 0.2 than CyMAC. For example, when packet generation interval is 20 s, the relative delay ratio under WA-MAC is 0.210, which is much closer to 0.2 than that under CyMAC, which is It proves that WA-MAC works effectively under rainy weather as well to provide the required relative delay Evaluation of packet delivery ratio Packet delivery ratio is evaluated for all the four MAC protocols under both sunny and rainy weather. Fig. 10 (a) shows the packet delivery ratio under sunny weather. It can be observed that WA- MAC can always maintain an almost 100% packet delivery ratio under different packet generation interval while the other three cannot under either short packet generation interval or long packet generation interval. It shows that WA-MAC deals with the transmission collision more effectively than the other three MAC protocols. For example, when packet generation interval is 6 s, WA-MAC achieves 99.4% packet delivery ratio, but CyMAC, PW-MAC, and RI- MAC can only achieve 96.9%, 79.9%, and 92.5% packet delivery ratio, respectively. Fig. 10 (b) shows the packet delivery ratio under both sunny weather and rainy weather. It can be observed that the rainy weather has a higher impact on RI-MAC than the other three MAC protocols. Compared to Fig. 10 (b), the packet delivery ratio drops in RI-MAC, almost maintains the same in PW-MAC, and increases in CyMAC. Since WA-MAC caches the data in the robust sensors

11 50 J. Tian et al. / Ad Hoc Networks 67 (2017) Fig. 9. Packet relative delivery delay ratio. Fig. 10. Packet delivery ratio. during pre-rain rendezvous adjustment, thus WA-MAC can keep an almost 100% packet delivery ratio and performs much better than all the other three MAC protocols. 6. Related works Recently, a significant number of works have already been done in the design of receiver-initiated MAC protocols in wireless sensor networks. Sun et al. first applies the concept of receiver-initiated data transmission to duty cycle MAC protocols in WSN in [17]. They also design a Receiver-Initiated MAC, called RI-MAC, to implement the concept. To further reduce the idle listening time, PW- MAC (Predictive-Wakeup MAC) is proposed by Tang et al. in [18]. It introduces a method to predict the target receivers wake-up time so that a sender only needs to wake up slightly before the target receiver. Boulfekhar et al. propose SRI-MAC (Synchronous Receiver Initiated MAC) protocol in [39], which is designed on the basis of synchronized duty cycled MAC protocol. It employs an adaptive beacon and a series of RTS/CTS packets to reduce duty cycle and minimize idle listening. SARI-MAC (Self Adapting Receiver Initiated MAC protocol) is proposed in [40] by Lampin et al. It dynamically adjusts the on-duty and off-duty according to the traffic load. Cy- MAC is proposed by Peng et al. in [19]. It provides a desired relative delay bound guarantee for data delivery services via planning the rendezvous schedules carefully between neighbors and also adjusts the sensor nodes duty cycles dynamically according to the varying traffic condition. RWB, a single-hop broadcast protocol for asynchronous receiver-initiated MAC in WSN, is proposed in [41]. It reduces energy consumption by predicting the receivers wakeup time and cutting the long back-to-back broadcast into several unicast packets. Dutta et al. propose A-MAC in [16], which is a receiver-initiated link layer protocol for low-power wireless networks that supports unicast, broadcast, wake-up and pollcast services under a unified architecture. HKMAC protocol is proposed in [42]. It achieves a low end-to-end packet delivery latency and high energy efficiency under burst traffic by adaptively adjusting beacon time of the receiver and scheduling the sender s listening time during scheduled period. Fafoutis et al. study collision avoidance mechanism in receiver-initiated MAC protocols in [43]. A new collision avoidance mechanism named altruistic backoff (AB) is designed to avoid collisions before the transmission of a beacon. In [44], Date et al. study the effects of receiver-initiated MAC protocol for power saving in WSN. It shows that the receiver-initiated MAC protocol can improve power consumption characteristics by reducing packet collisions and reducing transmission power consumption. MR-MAC, a receiver-initiated MAC protocol for underwater acoustic sensor networks, is proposed in [45]. It increases of the throughput and reduces of the transmission of control packet for handshaking by sending the data packet in a packet train manner. DRMAC, a double-loop receiver-initiated MAC protocol is proposed in [46] for data dissemination in delay tolerant networks (DTNs) via roadside wireless local area networks (RS-WLANs). However, none of the existing works focuses on designing a MAC protocol in the heterogeneous networks with sensors having different environmental survivability. Moreover, none of them considers environmental attributes, such as weather, which is an important factor that may cause packet to be delayed and lost in the network. Without such consideration, above protocols cannot work effectively to cope with different weathers and thus cannot be directly applied to solve the problem in this paper. 7. Conclusion In this paper, we propose a new Weather Adaptive receiverinitiated MAC protocol called WA-MAC in the survivabilityheterogeneous wireless sensor networks. We theoretically analyze WA-MAC and prove that it can achieve a relative delay bound data delivery service. We also demonstrate that WA-MAC can be adap-

12 J. Tian et al. / Ad Hoc Networks 67 (2017) tive to different weather conditions. The performance evaluation of WA-MAC shows that it works effectively and efficiently under different weather conditions and outperforms other existing works. References [1] R. Szewczyk, A. Mainwaring, J. Polastre, J. Anderson, D. Culler, An analysis of a large scale habitat monitoring application, in: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, ACM, 2004, pp [2] M. Zink, D. Westbrook, S. Abdallah, B. Horling, V. Lakamraju, E. Lyons, V. Manfredi, J. Kurose, K. Hondl, Meteorological command and control: An end-to-end architecture for a hazardous weather detection sensor network, in: Proceedings of the 2005 Workshop on End-to-End, Sense-and-Respond Systems, Applications and Services, USENIX Association, 2005, pp [3] G. Tolle, J. Polastre, R. Szewczyk, D. Culler, N. Turner, K. Tu, S. Burgess, T. Dawson, P. Buonadonna, D. Gay, et al., A macroscope in the redwoods, in: Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, ACM, 2005, pp [4] A. Markham, N. Trigoni, S. Ellwood, Effect of rainfall on link quality in an outdoor forest deployment, in: Wireless Information Networks and Systems (WIN- SYS), Proceedings of the 2010 International Conference on, 2010, pp [5] J. Tian, X. Liang, G. Wang, Deployment and reallocation in mobile survivability-heterogeneous wireless sensor networks for barrier coverage, Ad Hoc Netw. 36 (2016) [6] J. Panchard, S. Rao, M.S. Sheshshayee, P. Papadimitratos, S. Kumar, J.-P. Hubaux, Wireless sensor networking for rain-fed farming decision support, in: Proceedings of the Second ACM SIGCOMM Workshop on Networked Systems for Developing Regions, 2008, pp [7] J. Suhonen, M. Kohvakka, M. Hännikäinen, T.D. Hämäläinen, Design, implementation, and experiments on outdoor deployment of wireless sensor network for environmental monitoring, in: Embedded Computer Systems: Architectures, Modeling, and Simulation, Springer, 2006, pp [8] J. Tian, T. Yan, G. Wang, A network coding based energy efficient data backup in survivability-heterogeneous sensor networks, IEEE Trans. Mob. Comput. 14 (10) (2015) [9] J. Tian, T. Yan, X. Gao, G. Wang, Scheduling survivability-heterogeneous sensor networks for critical location surveillance, ACM Trans. Sens. Netw. 11 (4) (2015) 56:1 56:23. [10] K. Martinez, J.K. Hart, R. Ong, Environmental sensor networks, Computer (Long Beach Calif) 37 (8) (2004) [11] L. Selavo, A. Wood, Q. Cao, T. Sookoor, H. Liu, A. Srinivasan, Y. Wu, W. Kang, J. Stankovic, D. Young, J. Porter, Luster: wireless sensor network for environmental research, in: SenSys, 2007, pp [12] Y. Wang, X. Wang, B. Xie, D. Wang, D. Agrawal, Intrusion detection in homogeneous and heterogeneous wireless sensor networks, IEEE Trans. Mob. Comput. 7 (2008) [13] X. Wang, X. Wang, J. Zhao, Impact of mobility and heterogeneity on coverage and energy consumption in wireless sensor networks, in: ICDCS, 2011, pp [14] M. Cardei, S. Yang, J. Wu, Algorithms for fault-tolerant topology in heterogeneous wireless sensor networks, IEEE Trans. Parallel Distrib. Syst. 19 (2008) [15] X. Du, F. Lin, Maintaining differentiated coverage in heterogeneous sensor networks, EURASIP J. Wirel. Commun. Networking (4) (2005). [16] P. Dutta, S. Dawson-Haggerty, Y. Chen, C.-J.M. Liang, A. Terzis, A-MAC: a versatile and efficient receiver-initiated link layer for low-power wireless, ACM Trans. Sens. Netw. 8 (4) (2012) 30:1 30:29. [17] Y. Sun, O. Gurewitz, D.B. Johnson, RI-MAC: a receiver-initiated asynchronous duty cycle MAC protocol for dynamic traffic loads in wireless sensor networks, in: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, in: SenSys 08, 2008, pp [18] L. Tang, Y. Sun, O. Gurewitz, D. Johnson, PW-MAC: an energy-efficient predictive-wakeup MACprotocol for wireless sensor networks, in: INFOCOM, 2011 Proceedings IEEE, 2011, pp [19] Y. Peng, Z. Li, D. Qiao, W. Zhang, Delay-bounded MAC with minimal idle listening for sensor networks, in: INFOCOM, 2011 Proceedings IEEE, 2011, pp [20] X. Fafoutis, A. Di Mauro, M.D. Vithanage, N. Dragoni, Receiver-initiated medium access control protocols for wireless sensor networks, Comput. Networks 76 (2015) [21] W. Kang, J.A. Stankovic, S.H. Son, On using weather information for efficient remote data collection in WSN, Workshop on Embedded Networked Sensors, [22] R. Krashinsky, H. Balakrishnan, Minimizing energy for wireless web access with bounded slowdown, Wirel. Netw. 11 (1 2) (2005) [23] W. Goble, Getting failure rate data, [Online]. Available: [24] S. Aschenbrenner, Failure modes, effects and diagnostic analysis, Channels (2006). [25] Vaisala, User s guide vaisala drycap dewpoint transmitter dmt143, [Online]. Available: [26] L. Richardson, Weather Prediction by Numerical Process, Cambridge University Press, [27] A. Lorenc, Analysis methods for numerical weather prediction, Q. J. R. Meteorolog. Soc. (1986). [28] P. Michelle, M. Eston, Weather forecasts: just how reliable are they?, ( us/published- Articles/Weather- Forecasts- - Just- How- Reliable- Are- They- ). Accessed May 19, [29] Weather station with morning, noon & night precision forecast, ( acurite.com/digital- weather- center- with- morning- noon- night- precisionforecast html ). Accessed May 19, [30] W.R. Heinzelman, J. Kulik, H. Balakrishnan, Adaptive protocols for information dissemination in wireless sensor networks, in: Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, ACM, 1999, pp [31] Z. Yang, L. Cai, Y. Liu, J. Pan, Environment-aware clock skew estimation and synchronization for wireless sensor networks, in: IEEE INFOCOM, 2012, pp [32] Z. Zhong, P. Chen, T. He, On-demand time synchronization with predictable accuracy, in: IEEE INFOCOM, 2011, pp [33] J. Tian, X. Liang, T. Yan, M.K. Somashekar, G. Wang, C. Bandera, A novel disjoint set division algorithm for joint scheduling and routing in wireless sensor networks, Wirel. Netw. 21 (5) (2015) [34] X. Shi, G. Stromberg, SyncWUF: an ultra low-power MAC protocol for wireless sensor networks, Mob. Comput. IEEE Trans. 6 (1) (2007) [35] I. Demirkol, C. Ersoy, F. Alagöz, H. Deliç, The impact of a realistic packet traffic model on the performance of surveillance wireless sensor networks, Comput. Netw. 53 (3) (2009) [36] Y. Ma, J. Aylor, System lifetime optimization for heterogeneous sensor networks with a hub-spoke technology, Mob. Comput. IEEE Trans. 3 (3) (2004) [37] M.C. Kestwal, S. Joshi, L.S. Garia, Prediction of rain attenuation and impact of rain in wave propagation at microwave frequency for tropical region (Uttarakhand, India), Int. J. Microw. Sci.Technol (2014). [38] J. Zhao, R. Govindan, Understanding packet delivery performance in dense wireless sensor networks, in: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, ACM, 2003, pp [39] S. Boulfekhar, M. Benmohammed, Synchronous receiver initiated MAC protocol for long-lived sensor networks, Comput. Electrical Eng. 40 (2) (2014) [40] Q. Lampin, D. Barthel, I. Auge-Blum, F. Valois, Sari-MAC: The self adapting receiver initiated MACprotocol for wireless sensor networks, in: Wireless and Mobile Computing, Networking and Communications (WiMob), 2012 IEEE 8th International Conference on, 2012, pp [41] Y. Qiu, S. Li, D. Yang, Z. Li, Rwb: An efficient receiver-initiated single-hop broadcast protocol for asynchronous MAC in wireless sensor networks, in: Recent Advances in Computer Science and Information Engineering, 127, Springer Berlin Heidelberg, 2012, pp [42] H. Tang, C. Sun, Y. Liu, B. Fan, Low-latency asynchronous duty-cycle MAc protocol for burst traffic in wireless sensor networks, in: Wireless Communications and Mobile Computing Conference (IWCMC), th International, 2013, pp [43] X. Fafoutis, C. Orfanidis, N. Dragoni, Altruistic backoff: collision avoidance for receiver-initiated MAC protocols for wireless sensor networks, Int. J. Distrib. Sens. Netw (2014). [44] H. Date, T. Shigeyasu, Effects of receiver initiated MAC protocol for reducing power consumption in wireless sensor networks, in: Network-Based Information Systems (NBiS), th International Conference on, 2013, pp [45] W.-H. Liao, Y.-C. Lin, S.-C. Kuai, A receiver-initiated MAC protocol for underwater acoustic sensor networks, in: Information Networking (ICOIN), 2014 International Conference on, 2014, pp [46] H. Liang, W. Zhuang, Double-loop receiver-initiated MAC for cooperative data dissemination via roadside WLANs, Commun. IEEE Trans. 60 (9) (2012)

13 52 J. Tian et al. / Ad Hoc Networks 67 (2017) Jie Tian received the B.S. degree in Computer Science from Tianjin University, Tianjin, China, in 2005, the M.S. degree in Computer Science at Nankai University, Tianjin, China, in 2008 and the Ph.D. degree in Department of Computer Science at New Jersey Institute of Technology, USA, in He joined Audible Inc. as a software development engineer in His research includes wireless networks, ad hoc/sensor network and mobile computing. Yi Wang received the B.S. degree in Software Engineering from Dalian University of Technology, Dalian, China, in 2012 and the M.S. degree in Computer Applied Technology from University of Chinese Academy of Sciences, Beijing, China, in He joined Alphabet Inc. as a software development engineer in His research includes wireless networks and content centric networking. Xiaoyuan Liang is currently a Ph.D. student at Computer Science Department in New Jersey Institute of Technology, USA, since He received his bachelor degree in Computer Science and Technology department at Harbin Institute of Technology in China. His research interest includes wireless networks, vehicular networks, deep learning and data analysis. Guiling Wang received the B.S. degree in software from Nankai University, Tianjin, China, and the Ph.D. degree in computer science and engineering with a minor in statistics from The Pennsylvania State University, State College, PA, USA, in She is currently a Professor in the New Jersey Institute of Technology, Newark, NJ, USA. Her research interest includes mobile computing, network, system security and deep learning applications. Yujun Zhang received the B.S. degree in computer science from Nankai University, China, in 1999 and the Ph.D. degree in computer science in from Chinese Academy of Sciences, China, in He is currently a Professor in the Institute of Computing Technology, Chinese Academy of Sciences. His research interest includes future Internet architecture and network security.

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Reliable and Energy Efficient Protocol for Wireless Sensor Network

Reliable and Energy Efficient Protocol for Wireless Sensor Network Reliable and Energy Efficient Protocol for Wireless Sensor Network Hafiyya.R.M 1, Fathima Anwar 2 P.G. Student, Department of Computer Engineering, M.E.A Engineering College, Perinthalmanna, Kerala, India

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks Peng Xie and Jun-Hong Cui UCONN CSE Technical Report: UbiNet-TR06-06 Last Update: June 2007 Abstract Underwater sensor networks are

More information

Design of Energy Efficient MAC Protocols in Wireless Sensor Networks

Design of Energy Efficient MAC Protocols in Wireless Sensor Networks Design of Energy Efficient MAC Protocols in Wireless Sensor Networks By Javad Lamei Supervisors: Lakshmikanth Guntupalli Prof. Frank Y Li A Thesis Submitted in Partial Fulfillment of the Requirements for

More information

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks AD: An Efficient Multihop roadcast Protocol ased on Asynchronous Duty-Cycling in Wireless Sensor Networks Yanjun Sun* Omer Gurewitz Shu Du Lei Tang* David. Johnson* *Rice University en Gurion University

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks A MAC Protocol with Little Idle Listening for Wireless Sensor Networks Chaoguang Men 1,, Yongqian Lu 1, Dongsheng Wang 1, 1 Research and Development Center of High Dependability Computing Technology, Harbin

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10652-10656 Performance and Comparison of Energy Efficient MAC Protocol in Wireless

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-

More information

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

Time Synchronization in Wireless Sensor Networks: CCTS

Time Synchronization in Wireless Sensor Networks: CCTS Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm

More information

Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks

Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks Early studies shows that congestion avoid in wireless sensor networks (WSNs) is a critical issue, it will

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Trail-Based Search for Efficient Event Report to Mobile Actors in Wireless Sensor and Actor Networks

Trail-Based Search for Efficient Event Report to Mobile Actors in Wireless Sensor and Actor Networks sensors Article Trail-Based Search for Efficient Event Report to Mobile Actors in Wireless Sensor and Actor Networks Zhezhuang Xu 1, *, Guanglun Liu 1, Haotian Yan 2, Bin Cheng 3 and Feilong Lin 4 1 School

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

Sustainable Computing: Informatics and Systems 00 (2014) Huangxin Wang

Sustainable Computing: Informatics and Systems 00 (2014) Huangxin Wang Sustainable Computing: Informatics and Systems 00 (2014) 1 17 Sustainable Computing Worst-Case Performance Guarantees of Scheduling Algorithms Maximizing Weighted Throughput in Energy-Harvesting Networks

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Onroad Vehicular Broadcast

Onroad Vehicular Broadcast Onroad Vehicular Broadcast Jesus Arango, Alon Efrat Computer Science Department University of Arizona Srinivasan Ramasubramanian, Marwan Krunz Electrical and Computer Engineering University of Arizona

More information

CONCLUSIONS AND SCOPE FOR FUTURE WORK

CONCLUSIONS AND SCOPE FOR FUTURE WORK Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

SA-MAC: Self-stabilizing Adaptive MAC Protocol for Wireless Sensor Networks

SA-MAC: Self-stabilizing Adaptive MAC Protocol for Wireless Sensor Networks Bo C, Li XY, Wang Y, Xiao B. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY : 1 Mon. Year SA-MAC: Self-stabilizing Adaptive MAC Protocol for Wireless Sensor Networks Cheng Bo 1 ( 波澄 ), Xiang-Yang Li 2 ( 李向阳

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

Presented by: Murad Kaplan

Presented by: Murad Kaplan Presented by: Murad Kaplan Introduction. Design of SCP-MAC. Lower Bound of Energy Performance with Periodic Traffic. Protocol Implementation. Experimental Evaluation. Related Work. 2 Energy is a critical

More information

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad

More information

Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks

Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks 1 Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks Joohwan Kim, Xiaoun Lin, and Ness B. Shroff School of Electrical and Computer Engineering, Purdue University

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Pervasive and Mobile Computing. Improved sensor network lifetime with multiple mobile sinks

Pervasive and Mobile Computing. Improved sensor network lifetime with multiple mobile sinks Pervasive and Mobile Computing 5 (2009) 542 555 Contents lists available at ScienceDirect Pervasive and Mobile Computing journal homepage: www.elsevier.com/locate/pmc Fast track article Improved sensor

More information

ScienceDirect. Analogy between immune system and sensor replacement using mobile robots on wireless sensor networks

ScienceDirect. Analogy between immune system and sensor replacement using mobile robots on wireless sensor networks Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 35 (2014 ) 1352 1359 18 th International Conference in Knowledge Based and Intelligent Information & Engineering Systems

More information

Improving Channel Scanning Procedures for WLAN Handoffs 1

Improving Channel Scanning Procedures for WLAN Handoffs 1 Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

Wireless Sensor Networks 8th Lecture

Wireless Sensor Networks 8th Lecture Wireless Sensor Networks 8th Lecture 21.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Media Access Control (MAC) Controlling when to send a packet and when to listen for a packet

More information

Expanding Ring Search for Route Discovery in LOADng Routing Protocol

Expanding Ring Search for Route Discovery in LOADng Routing Protocol Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

A Dynamic TDMA Protocol Utilizing Channel Sense

A Dynamic TDMA Protocol Utilizing Channel Sense International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2

More information

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 1 Suresh, 2 C.B.Vinutha, 3 Dr.M.Z Kurian 1 4 th Sem, M.Tech (Digital Electronics), SSIT, Tumkur 2 Lecturer, Dept.of E&C, SSIT,

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

SMITE: A Stochastic Compressive Data Collection. Sensor Networks

SMITE: A Stochastic Compressive Data Collection. Sensor Networks SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks Longjiang Guo, Raheem Beyah, and Yingshu Li Department of Computer Science, Georgia State University, USA Data

More information

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS 1 M.KARPAGAM, 2 DR.N.NAGARAJAN, 3 K.VIJAIPRIYA 1 Department of ECE, Assistant Professor, SKCET, Coimbatore, TamilNadu, India

More information

An Iterative Greedy Approach Using Geographical Destination Routing In WSN

An Iterative Greedy Approach Using Geographical Destination Routing In WSN ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 1 Sofia 2016 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2016-0005 Mitigating Hot Spot Problems

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks Routing M. Schölzel Network in computer science Network is a graph G = (V,E) V set of all nodes E set of all edges: (v 1,v 2 ) E V 2 V = { A, B, C,... } E = { (A,B), (B,C), (C,F),...

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

Sl.No Project Title Year

Sl.No Project Title Year Sl.No Project Title Year WSN(Wireless Sensor ) 1 Distributed Topology Control With Lifetime Extension Based on Non-Cooperative Game for Wireless Sensor 2 Intercept Behavior Analysis of Industrial Wireless

More information

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.854

More information

Sensor Network Protocols

Sensor Network Protocols EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Error Control in Wireless Sensor Networks: A Cross Layer Analysis

Error Control in Wireless Sensor Networks: A Cross Layer Analysis University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 2009 Error Control in Wireless Sensor Networks: A Cross

More information

Research on Transmission Based on Collaboration Coding in WSNs

Research on Transmission Based on Collaboration Coding in WSNs Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information

More information

Event Driven Routing Protocols For Wireless Sensor Networks

Event Driven Routing Protocols For Wireless Sensor Networks Event Driven Routing Protocols For Wireless Sensor Networks Sherif Moussa 1, Ghada Abdel Halim 2, Salah Abdel-Mageid 2 1 Faculty of Engineering, Canadian University Dubai, Dubai, UAE. 2 Faculty of Engineering,

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Problem Social Networking Tags System for Visually Impaired is an project aims to utilize electronic id technology

More information

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe Sensor Deployment, Self- Organization, And Localization Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley, 2007 5/20/2008 WiSeLab@WMU; www.cs.wmich.edu/wise

More information

Robust Method of Power Saving Approach in Zigbee Connected WSN with TDMA

Robust Method of Power Saving Approach in Zigbee Connected WSN with TDMA Robust Method of Power Saving Approach in Zigbee Connected WSN with TDMA V. Prathyusha 1, Y. Pavan Kumar 2 1 M.Tech Student, Andhra Loyola Institute of Engineering and Technology, Vijayawada, Krishna District,

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks

An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks Yoh-han Lee Department of Electrical Engineering Korea Advanced Institute of Science & Technology Daejeon, KOREA yohhanlee@kaist.ac.kr

More information

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage:

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage: Computer Networks 53 (2009) 1879 1902 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet An energy-efficient, transport-controlled MAC protocol

More information

DMP Packet Scheduling For Wireless Sensor Network

DMP Packet Scheduling For Wireless Sensor Network American Journal of Engineering Research (AJER) 2015 American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-04, Issue-01, pp-08-15 www.ajer.org Research Paper Open

More information

TOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set

TOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set Available online at www.sciencedirect.com Procedia Computer Science 6 (2011) 408 412 Complex Adaptive Systems, Volume 1 Cihan H. Dagli, Editor in Chief Conference Organized by Missouri University of Science

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information