29
Views
5
CrossRef citations to date
0
Altmetric
Articles

Performance evaluation of ADMC-MAC mission critical protocol for wireless sensor networks

&

References

  • Donghong Xu, Ke Wang, “An adaptive traffic MAC protocol based on correlation of nodes”, EURASIP Journal on Wireless Communications and Networking. December 2015, 2015:258. doi: 10.1186/s13638-015-0488-x
  • Beom-Su Kim, HoSung Park, Kyong Hoon Kim, Daniel Godfrey, and Ki-Il Kim, “A Survey on Real-Time Communications in Wireless Sensor Networks,” Wireless Communications and Mobile Computing, vol. 2017, Article ID 1864847, 14 pages, 2017. https://doi.org/10.1155/2017/1864847.
  • F. Xu, H. Ye, F. Yang, and C. Zhao, “Software-Defined Mission-Critical Wireless Sensor Network: Architecture and Edge Offloading Strategy,” in IEEE Access, vol. 7, pp. 10383-10391, 2019. doi: 10.1109/ ACCESS.2019.2890854 doi: 10.1109/ACCESS.2019.2890854
  • G. Verma and V. Sharma, “A Novel Thermoelectric Energy Harvester for Wireless Sensor Network Application,” in IEEE Transactions on Industrial Electronics, vol. 66, no. 5, pp. 3530-3538, May2019. doi: 10.1109/TIE.2018.2863190
  • Gayatri Sakya and Vidushi Sharma, “ADMC-MAC: Energy-efficient adaptive MAC protocol for mission-critical applications in WSN.” Sustainable Computing: Informatics and Systems, Volume 23, 2019, Pages 21-28, ISSN 2210-5379.
  • G. Sakya, V. Sharma, “Performance analysis of SMAC protocol in wireless sensor networks using network simulator (Ns-2),” in International Conference on Heterogeneous Networking for Quality, Reliability, Security, and Robustness 2013 Jan 11 (pp. 42-51). Springer Berlin Heidelberg.
  • G. Sakya, V. Sharma, and P.C. Jain, “Analysis of SMAC protocol for mission-critical applications in wireless sensor networks,” In Advance Computing Conference (IACC), 2013 IEEE 3rd International 2013 Feb 22 (pp. 488–492).
  • G. Sakya and V. Sharma, “MAC Protocol with Regression-based Dynamic Duty Cycle Feature for Mission-Critical Applications in WSN,” International Journal of Advanced Computer Science and Applications (IJACSA), 8(6), 2017.
  • Hsu TH, Kim TH, Chen CC, Wu JS “A dynamic traffic-aware duty cycle adjustment MAC protocol for energy conserving in wireless sensor networks.” International Journal of Distributed Sensor Networks, 2012 Feb 26.
  • H. Farag, M. Gidlund, and P. Österberg, “A Delay-Bounded MAC Protocol for Mission- and Time-Critical Applications in Industrial Wireless Sensor Networks,” in IEEE Sensors Journal, vol. 18, no. 6, pp. 2607-2616, 15 March15, 2018. doi: 10.1109/JSEN.2018.2793946.
  • Heejung Byun, Soogook Son, and Jungmin So. 2013. Queue management based duty cycle control for end-to-end delay guarantees in wireless sensor networks. Wirel. Netw. 19, 6 (August 2013), 1349–1360. doi: 10.1007/s11276-012-0537-x
  • J. Yick, B. Mukherjee, and D. Ghosal, “Wireless Sensor Network Survey,” Elsevier Computer Networks, Vol. 52, Issue 12, pp. 2292–2330, 2008. doi: 10.1016/j.comnet.2008.04.002
  • Joshi, Ashish, and Amar Kumar Mohapatra. “Authentication protocols for wireless body area network with key management approach.” Journal of Discrete Mathematical Sciences and Cryptography 22.2 (2019): 219-240. doi: 10.1080/09720529.2019.1582869
  • Kumar, Devender, Harsh Kumar Singh, and Chhahat Ahlawat. “A secure three-factor authentication scheme for wireless sensor networks using ECC.” Journal of Discrete Mathematical Sciences and Cryptography (2019): 1-22. doi: 10.1080/09720529.2019.1627072
  • Khan, Tayyab, Karan Singh, Mohamed Abdel-Basset, Hoang Viet Long, Satya P. Singh, and Manisha Manjul. “A Novel and Comprehensive Trust Estimation Clustering-Based Approach for Large Scale Wireless Sensor Networks .” IEEE Access, vol. 7, pp. 58221-58240, (2019). doi: 10.1109/ACCESS.2019.2914769
  • Kumar, Kakelli Anil, Addepalli VN Krishna, and K. Shahu Chatrapati. “New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks.” Journal of Information and Optimization Sciences 38, no. 2 (2017): 341-365. doi: 10.1080/02522667.2016.1220092
  • Kush, Ashwani, Phalguni Gupta, and Ram Kumar. “Performance evaluation of associative based routing in Adhoc networks.” Journal of Interdisciplinary Mathematics 9, no. 2 (2006): 347-361. doi: 10.1080/09720502.2006.10700448
  • Narwal, Bhawna, Amar Kumar Mohapatra, and Kaleem Ahmed Usmani. “Towards a taxonomy of cyber threats against target applications.” Journal of Statistics and Management Systems 22, no. 2 (2019): 301-325. doi: 10.1080/09720510.2019.1580907
  • P. Suriyachai, U. Roedig, and A. Scott, “A survey of MAC protocols for mission-critical applications in wireless sensor networks,” IEEE Commun. Surveys Tuts., vol. 14, no. 2, pp. 240–264, 2nd Quart., 2012. doi: 10.1109/SURV.2011.020211.00036
  • Sudip Misra and Debashish Mohanta, “Adaptive listen for energy-efficient medium access control in wireless sensor networks,” in Multimedia Tools Appl., vol. 47,no. 1, 121-145, 2010. doi: 10.1007/s11042-009-0410-9
  • Taneja, Kavita, Harmunish Taneja, and Rohit Kumar. “Multi-channel medium access control protocols: review and comparison.” Journal of Information and Optimization Sciences 39, no. 1 (2018): 239-247. doi: 10.1080/02522667.2017.1372921
  • Ye W., Heidemann J., Estrin D., “Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks”, IEEE/ ACM Transactions on Networking, vol. 12, no. 3, pp. 493 – 506, June 2004. doi: 10.1109/TNET.2004.828953
  • Yuvaraj, D., M. Sivaram, and S. Navaneetha Krishnan. “Intelligent detection of untrusted data transmission to optimize energy in sensor networks.” Journal of Information and Optimization Sciences (2019): 1-13. doi: 10.1080/02522667.2019.1616910
  • Zhang, D., Zhou, S. & Tang, Y, “A Low Duty Cycle Efficient MAC Protocol Based on Self-Adaption and Predictive Strategy.”MobileNetw Appl (2018) 23: 828. https://doi.org/10.1007/s11036-017-0878-x

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.