Nomenclature of Medium Access Control Protocol over Wireless Sensor Networks

被引:5
|
作者
Razaque, Abdul [1 ]
Elleithy, Khaled [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Engn, Bridgeport, CT 06604 USA
关键词
Classification of MAC protocols; MAC protocol threats; medium access control protocols; nomenclature of MAC protocols; performance-impairing factors; MAC PROTOCOL; DUTY CYCLE; SECURITY;
D O I
10.1080/02564602.2015.1057769
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor networks (WSNs) are considered as the appealing research area. WSNs require highly robust medium access control (MAC) protocol to enhance the performance in several application areas, such as intrusion detection, target detection, industrial automation, environmental monitoring, surveillance system, medical diagnosing system, and tactical system. On the other hand, there are several factors that affect the performance of these applications particularly selection of weak MAC protocol. In this paper, we provide performance impairing drivers for MAC protocols, which affect the efficiency and robustness of MAC protocols in WSN applications. We classify MAC protocols into six categories, as compared with previous MAC surveys that only focused on classifying the MAC protocols into two, three, or four major categories. In addition, we show the link of each category with another based on their existing features. Furthermore, this survey provides a detailed nomenclature in which protocols are categorized based on synchronous and asynchronous communication. This survey also discusses the possible threats and some existing solutions at the MAC layer from 2000 to 2014. Finally, we identify the future research challenges and raise directions for controlling these challenges.
引用
收藏
页码:160 / 171
页数:12
相关论文
共 50 条
  • [41] Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks
    Razaque, Abdul
    Elleithy, Khaled M.
    [J]. SENSORS, 2014, 14 (03): : 5074 - 5117
  • [42] Priority-based medium access control protocol for providing QoS in wireless sensor networks
    Paek, Kwang-Jin
    Kim, Jongwan
    Song, Ui-Sung
    Hwang, Chong-Sun
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2007, E90D (09): : 1448 - 1451
  • [43] Energy-Efficient Scheduled Directional Medium Access Control Protocol for Wireless Sensor Networks
    Akbar, A.
    Jaseemuddin, M.
    Fernando, X.
    Farjow, W.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 6258 - 6264
  • [44] Improved medium access control for wireless sensor networks - A study on the S-MAC protocol
    Chiras, T
    Paterakis, M
    Koutsakis, P
    [J]. 2005 14TH IEEE WORKSHOP ON LOCAL & METROPOLITAN AREA NETWORKS (LANMAN), 2005, : 154 - 158
  • [45] A Hybrid Contention/Reservation Medium Access Protocol for Wireless Sensor Networks
    Bithas, Petros. S.
    Lioumpas, Athanasios S.
    Alexiou, Angeliki
    [J]. 2012 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2012, : 1669 - 1674
  • [46] Access Control Protocol With Node Privacy in Wireless Sensor Networks
    Kumar, Pardeep
    Gurtov, Andrei
    Iinatti, Jari
    Sain, Mangal
    Ha, Phuong H.
    [J]. IEEE SENSORS JOURNAL, 2016, 16 (22) : 8142 - 8150
  • [47] Medium Access Control Protocol for Hybrid Radio-over-Fiber Wireless Sensors Networks
    de Andrade, Tiago P. C.
    Villas, Leandro A.
    da Fonseca, Nelson L. S.
    [J]. 2014 IFIP Wireless Days (WD), 2014,
  • [48] A taxonomy for medium access control protocols in wireless sensor networks
    Correia, LHA
    Macedo, DF
    Dos Santos, AL
    Nogueira, JM
    Loureiro, AAE
    [J]. ANNALS OF TELECOMMUNICATIONS, 2005, 60 (7-8) : 944 - 969
  • [49] Energy Efficient Medium Access Control for Wireless Sensor Networks
    Ramakrishnan, Sabitha
    Thyagarajan, T.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (06): : 273 - 279
  • [50] An adaptive coordinated medium access control for wireless sensor networks
    Ai, J
    Kong, J
    Turgut, D
    [J]. ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 214 - 219