121
Views
5
CrossRef citations to date
0
Altmetric
Review Article

Nomenclature of Medium Access Control Protocol over Wireless Sensor Networks

&

References

  • A. Razaque, and K. M. Elleithy, “Energy-efficient boarder node medium access control protocol for wireless sensor networks,” Sensors, Vol. 14, pp. 5074–117, Mar. 2014.
  • A. Razaque, and K. M. Elleithy, “Low duty cycle, energy-efficient and mobility-based boarder node—MAC hybrid protocol for wireless sensor networks,” Journal of Signal Processing Systems, Vol. 76, pp. 1–20, Sep. 2014.
  • P. Naik, and K. M. Sivalingam, “A survey of MAC protocols for sensor networks,” in Wireless Sensor Networks, Norwell, MA: Kluwer Academic Publishers, 2004, pp. 93–107.
  • P. Huang, L. Xiao, S. Soltani, M. W. Mutka, and N. Xi, “The evolution of MAC protocols in wireless sensor networks: A survey,” Commun. Surv. Tutorials, IEEE, Vol. 15, 2013, pp. 101–20.
  • M. A. Yigitel, O. D. Incel, and C. Ersoy, “QoS-aware MAC protocols for wireless sensor networks: A survey,” Comput. Netw., Vol. 55, pp. 1982–2004, Jun. 2011.
  • A. Razaque, and K. Elleithy, “Automatic energy saving (AES) model to boost ubiquitous wireless sensor networks (WSNs),” Int. J. Comput. Technol. 2013, arXiv preprint arXiv:1309.4504, 2013.
  • J. Polastre, J. Hui, P. Levis, J. Zhao, D. Culler, S. Shenker, et al., “A unifying link abstraction for wireless sensor networks,” in Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, San Diego, CA, Nov. 2005, pp. 76–89.
  • Q. Dong, and W. Dargie, “A survey on mobility and mobility-aware MAC protocols in wireless sensor networks,” Commun. Surv. Tutorials, IEEE, Vol. 15, pp. 88–100, Feb. 2013.
  • X. Chao, W. Dargie, and G. Lin, “Energy model for h2s monitoring wireless sensor network,” in 11th IEEE International Conference on Computational Science and Engineering, 2008. CSE'08., Sao Paulo, 2008, pp. 402–9.
  • S. H. Lee, S. Lee, H. Song, and H. S. Lee, “Wireless sensor network design for tactical military applications: Remote large-scale environments,” in IEEE Military Communications Conference, 2009. MILCOM 2009, Boston, MA, 2009, pp. 1–7.
  • M. G. Rezaie, V. S. Mansouri, and M. Mani, “Critical area attention in traffic aware dynamic node scheduling for low power sensor networks,” in Wireless Communications and Networking Conference, 2005 IEEE, 2005, Vol. 4, pp. 1933–8.
  • L. Shi, and A. Fapojuwo, “TDMA scheduling with optimized energy efficiency and minimum delay in clustered wireless sensor networks,” IEEE Trans. Mobile Comput., Vol. 9, pp. 927–40, Mar. 2010.
  • H. Karl, and A. Willig, Protocols and Architectures for Wireless Sensor Networks. Chichester: John Wiley & Sons, 2007, pp. 1–507.
  • P. R. Jelenković, P. Momčilović, and M. S. Squillante, “Scalability of wireless networks,” IEEE/ACM Trans. Netw. (TON), Vol. 15, pp. 295–308, 2007.
  • Y. Chen, W. Yi, and Y. Yang, “A global time synchronized MAC for wireless sensor network,” in 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008. WiCOM'08, Dalian, 2008, pp. 1–6.
  • A. Razaque, and K. Elleithy, “Pheromone termite (PT) model to provide robust routing over Wireless Sensor Networks,” in 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1), University of Bridgeport, 2014, pp. 1–6.
  • H. Hu, J. Min, X. Wang, and Y. Zhou, “The improvement of S-MAC based on dynamic duty cycle in wireless sensor network,” in 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE), Shanghai, 2011, pp. 341–5.
  • Y. Liu, and L. M. Ni, “A new MAC protocol design for long-term applications in wireless sensor networks,” in 2007 International Conference on Parallel and Distributed Systems, Hsinchu, 2007, pp. 1–8.
  • P. Kumar, M. Gunes, Q. Mushtaq, and B. Blywis, “A real-time and energy-efficient MAC protocol for wireless sensor networks,” Int. J. Ultra Wideband Commun. Syst., Vol. 1, pp. 128–42, Apr. 2009.
  • S. Ray, I. Demirkol, and W. Heinzelman, “ATMA: Advertisement-based TDMA protocol for bursty traffic in wireless sensor networks,” in Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, Miami, FL, 2010, pp. 1–5.
  • V. Salmani, and P. H. Chou, “Bin-MAC: A hybrid MAC for ultra-compact wireless sensor nodes,” in 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems (DCOSS), Hangzhou, 2012, pp. 158–165.
  • J. Polastre, J. Hill, and D. Culler, “Versatile low power media access for wireless sensor networks,” in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, 2004, pp. 95–107.
  • S. Cho, K. Kanuri, J.-W. Cho, J.-Y. Lee, and S.-D. June, “Dynamic energy efficient tdma-based mac protocol forwireless sensor networks,” in Autonomic and Autonomous Systems and International Conference on Networking and Services, 2005. ICAS-ICNS 2005. Joint International Conference on, Papeete, Oct. 23–28, 2005, pp. 48.
  • P. Lin, C. Qiao, and X. Wang, “Medium access control with a dynamic duty cycle for sensor networks,” in IEEE Wireless Communications and Networking Conference, 2004. WCNC., 2004, Vol. 3, pp. 1534–9.
  • G. Liu, and G. Yao, “E-MAC: An event-driven data aggregation MAC protocol for wireless sensor networks,” in IEEE Consumer Communications and Networking Conference, Las Vegas, NV, Jan. 14–17, 2012, pp. 941–6.
  • U. Roedig, A. Barroso, and C. J. Sreenan, “f-MAC: a deterministic media access control protocol without time synchronization (K. Romer, H. Karl and E. Mattern, editors),” in Wireless Sensor Networks, Zurich: Springer, 2006, pp. 276–91.
  • M. I. Brownfield, K. Mehrjoo, A. S. Fayez, and N. J. D. Iv, “Wireless sensor network energy-adaptive MAC protocol,” in Proceedings of 3rd IEEE Conference on Consumer Communications and Networking Conference. Vol. 2, Jan. 8–10, 2006, pp. 778–82.
  • M. Handy, M. Haase, and D. Timmermann, “Low energy adaptive clustering hierarchy with deterministic cluster-head selection,” in 4th International Workshop on Mobile and Wireless Communications Network, Stockholm, 2002, pp. 368–72.
  • J. A. Afonso, L. A. Rocha, H. R. Silva, and J. H. Correia, “MAC protocol for low-power real-time wireless sensing and actuation,” in 13th IEEE International Conference on Electronics, Circuits and Systems, Nice, Dec. 10–13, 2006, pp. 1248–51.
  • I. Rhee, A. Warrier, M. Aia, J. Min, and M. L. Sichitiu, “Z-MAC: A hybrid MAC for wireless sensor networks,” IEEE/ACM Trans. Netw. (TON), Vol. 16, pp. 511–24, Jun. 2008.
  • M. Buettner, G. V. Yee, E. Anderson, and R. Han, “X-MAC: A short preamble MAC protocol for duty-cycled wireless sensor networks,” in Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, Boulder, CO, 2006, pp. 307–20.
  • E. Egea-López, J. Vales-Alonso, A. S. Martínez-Sala, J. García-Haro, P. Pavón-Mariño, and M. B. Delgado, “A wireless sensor networks MAC protocol for real-time applications,” Personal Ubiquitous Comput., Vol. 12, 2008, pp. 111–22.
  • S. -H. Yang, H. -W. Tseng, E. -K. Wu, and G. -H. Chen, “Utilization based duty cycle tuning MAC protocol for wireless sensor networks,” in IEEE Global Telecommunications Conference, 2005. St. Louis, MO, 2005, pp. 3258–62.
  • Y. Kwon, and Y. Chae, “Traffic adaptive IEEE 802.15. 4 MAC for wireless sensor networks (E. Sha, S-K. Han, C-Z. Xu, M-H. Kim, L T. Yang, and B. Xiao, editors),” in Embedded and Ubiquitous Computing, Seoul: Springer, Aug. 2006, pp. 864–73.
  • T. Van Dam, and K. Langendoen, “An adaptive energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, 2003, pp. 171–80.
  • W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of IEEE 21st Annual Joint Conference of the IEEE Computer and Communications Societies, 2002, Vol. 3, pp. 1567–76.
  • S. Reddy, V. Samanta, J. Burke, D. Estrin, M. Hansen, and M. Srivastava, “MobiSense – mobile network services for coordinated Participatory Sensing,” in International Symposium on Autonomous Decentralized Systems, Athens, Mar. 23–25, 2009, pp. 1–6.
  • K. Jamieson, H. Balakrishnan, and Y. Tay, “Sift: A MAC protocol for event-driven wireless sensor networks (K. Romer, H. Karl, and F. Mattern, editors),” in Wireless Sensor Networks, Zurich: Springer, 2006, pp. 260–75.
  • A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. E. Culler, “SPINS: Security protocols for sensor networks,” Wireless Netw., Vol. 8, pp. 521–34, Sep. 2002.
  • C. Karlof, N. Sastry, and D. Wagner, “TinySec: a link layer security architecture for wireless sensor networks,” in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, New York, 2004, pp. 162–75.
  • J. Shaheen, D. Ostry, V. Sivaraman, and S. Jha, “Confidential and secure broadcast in wireless sensor networks,” in IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, Athens, Sep. 3–7, 2007, pp. 1–5.
  • M. Luk, G. Mezzour, A. Perrig, and V. Gligor, “MiniSec: a secure sensor network communication architecture,” in Proceedings of the 6th International Conference on Information Processing in Sensor Networks, Cambridge, MA, Apr. 25–27, 2007, pp. 479–88.
  • C. -T. Hsueh, C. -Y. Wen, and Y. -C. Ouyang, “A secure scheme for power exhausting attacks in wireless sensor networks,” in 2011 Third International Conference on Ubiquitous and Future Networks (ICUFN), Dalian, Jun. 15–17, 2011, pp. 258–63.
  • I. Krontiris, T. Dimitriou, H. Soroush, and M. Salajegheh, “WSN link-layer security frameworks,” Wirel. Sensor Netw. Secur., Vol. 1, 2008, p. 142.
  • J. López, and J. Zhou, Wireless Sensor Network Security, Vol. 1. IOS Press, 2008, pp. 1–320.
  • S. Zhu, S. Setia, and S. Jajodia, “LEAP+: Efficient security mechanisms for large-scale distributed sensor networks,” ACM Trans. Sensor Netw., Vol. 2, pp. 500–28, 2006.
  • J. Newsome, E. Shi, D. Song, and A. Perrig, “The sybil attack in sensor networks: Analysis & defenses,” in Proceedings of the 3rd International Symposium on Information in Sensor Networks, Berkeley, CA, Apr. 26–27, 2004, pp. 259–68.
  • Q. Ren, and Q. Liang, “Fuzzy logic-optimized secure media access control (FSMAC) protocol wireless sensor networks,” in Proceedings of the 2005 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, Orlando, FL, Mar. 31–Apr. 1, 2005, pp. 37–43.
  • R. V. Kulkarni, and G. K. Venayagamoorthy, “Neural network based secure media access control protocol for wireless sensor networks,” in International Joint Conference on Neural Networks, Atlanta, GA, Jun. 14–19, 2009, pp. 1680–7.
  • Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” IEEE Trans. Commun. Surveys & Tutorials, Vol. 8, no. 2, pp. 2–23, 2006.
  • M. Conti, R. Di Pietro, L. V. Mancini, and A. Mei, “A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks,” in Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing, Montreal, QC, 2007, pp. 80–9.
  • W. T. Zhu, “Node replication attacks in wireless sensor networks: Bypassing the neighbor-based detection scheme,” in 2011 International Conference on Network Computing and Information Security, Guilin, 2011, pp. 156–60.
  • B. Parno, A. Perrig, and V. Gligor, “Distributed detection of node replication attacks in sensor networks,” in 2005 IEEE Symposium on Security and Privacy, San Jose, CA, 2005, pp. 49–63.
  • W. Znaidi, M. Minier, and S. Ubéda, “Hierarchical node replication attacks detection in wireless sensor networks,” Int. J. Distrib. Sensor Netw., Vol. 2013, pp. 1–13, 2013.
  • H. Chan, and A. Perrig, “Security and privacy in sensor networks,” Computer, Vol. 36, pp. 103–5, Oct. 2003.
  • J. Zhao, and R. Govindan, “Understanding packet delivery performance in dense wireless sensor networks,” in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, 2003, pp. 1–13.
  • G. Anastasi, E. Borgia, M. Conti, and E. Gregori, “A hybrid adaptive protocol for reliable data delivery in WSNs with multiple mobile sinks,” Comput. J., Vol. 54, pp. 213–229, Apr. 7, 2010.
  • J. -Y. Lee, N. -Y. Yun, S. Muminov, S. -Y. Shin, Y. -S. Ryuh, and S. -H. Park, “A focus on practical assessment of MAC protocols for underwater acoustic communication with regard to network architecture,” IETE Tech. Rev., Vol. 30, pp. 375–81, 2013.
  • A. Sanandaji, S. Jabbehdari, A. Balador, and D. Kanellopoulos, “MAC layer misbehavior in MANETs,” IETE Tech. Rev., Vol. 30, pp. 324–35, 2013.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.