Académique Documents
Professionnel Documents
Culture Documents
Review
art ic l e i nf o
a b s t r a c t
Article history:
Received 25 February 2013
Received in revised form
22 November 2013
Accepted 27 January 2014
During the last decade, Wireless Sensor Networks (WSNs) have evolved as an incredibly useful
technology in the area of signal processing and data communication. They have found prolic
applications in a wide range of domains which include cell phone monitoring, robotic exploration,
disaster management, intrusion detection and medical systems. Medium Access Control (MAC) protocols
constitute an important set of regulations which enables the successful and smooth operation of the
WSN. A fundamental design goal of all MAC protocols is to prevent energy wastes from various possible
sources during data communications. Till now, a wide variety of MAC protocols with different objectives
have been accumulated in sensor network literature. A thorough study of these protocols is very
important both from the perspectives of understanding the current research trends and determining
scopes for further innovative works in this domain. This paper meticulously discusses about the
associated issues and difculties which are faced in designing efcient MAC protocols for WSNs. Several
popular MAC protocols are described here with their inherent merits and demerits. In order to provide
an up-to-date survey, various MAC protocols which have been developed relatively recently are
discussed, together with the traditional benchmark ones. Finally, this paper concludes with outlining a
number of innovative ideas and future research directions in this domain.
& 2014 Elsevier Ltd. All rights reserved.
Keywords:
Data communication
Wireless sensor networks
MAC protocols
Distributed nodes
Energy waste
Collision avoidance
Overhearing
Contents
1.
2.
3.
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Design and implementation issues of MAC protocols for WSN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1.
Primary reasons of energy waste . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.2.
Properties of a good MAC protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Various developed MAC protocols for WSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3.1.
MACA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.2.
MACAW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.3.
IEEE 802.11. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.4.
Power aware multi-access signaling (PAMAS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.5.
Sensor MAC (S-MAC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.5.1.
An empirical demonstration of energy saving vs. increased latency. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.5.2.
Advantages of S-MAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.5.3.
Disadvantages of S-MAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.6.
Timeout MAC (T-MAC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.6.1.
Clustering and synchronization in T-MAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.6.2.
RTS operation in T-MAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.6.3.
Determining the threshold TA in T-MAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.6.4.
One solution of the early sleeping problem in T-MAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.6.5.
Advantages of T-MAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.6.6.
Disadvantages of T-MAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.7.
Dynamic sensor MAC (DS-MAC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
3.8.
3.9.
1. Introduction
An overwhelming raise in the demand for collecting and
utilizing information about the surroundings has been observed
throughout the last decade. A breakthrough in this domain is the
concept of Wireless Sensor Networks (WSNs) which can process
and disseminate knowledge in notably fast speed (Cal et al.,
2007). WSNs are benecial over many other traditional networks
in terms of cost, size and efciency. Over the years, these networks
have been used in diversied elds such as cell phone monitoring,
robotic exploration, intrusion detection, disaster management,
climate control, and temperature pressure monitoring (Yadav
et al., 2009; Akyildiz et al., 2002). A typical WSN consists of a
large number of sensor nodes which are distributed in the
environment to collectively constitute a multi-hop wireless network. Each sensor node is composed of an embedded processor,
low power radio and limited memory unit. These nodes are
operated through batteries and are organized to perform a
common task (Ye et al., 2002). Due to low power capacities of
the sensor nodes, a WSN has limited coverage and range for
communication as compared to other mobile devices. Thus, such a
network must contain large number of interconnecting nodes for
successful practical applications.
Sensor networks have different issues and challenges depending
on the situations they are applied for. One crucial challenge faced is
energy consumption. It is often very difcult to change or replace the
exhausted batteries of the constituent nodes in a sensor network
which is an obvious obstacle in maximizing the network lifetime. In
order to reduce the energy consumption, a major objective of a
sensor network is to minimize the associated communication while
achieving the desired network operation (Yadav et al., 2009;
Demirkol et al., 2006). Extensive research works have been carried
out on the design of low power electronic devices to reduce energy
consumption in sensor networks. However, due to hardware limitations and manufacturing costs it has been observed that substantial
energy consumption can be more economically achieved through
designing energy efcient communication protocols.
It is an incredibly challenging task to create a wireless sensor
network that implements energy efcient medium access rules
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
at the same time, these packets are then called collided packets.
All packets which cause the collision have to be discarded and
the subsequent follow-on retransmissions considerably
increase energy consumption. The occurrence of collision
increases latency as well.
Overhearing: It refers to the phenomenon where a sensor node
picks up the packets which are intended for some other nodes.
This results in wastage of network energy.
Protocol overhead: Control packets in a WSN do not contain
useful information and so their transmissions consume unnecessary energy.
Idle listening: A major source of energy waste in a WSN is idle
listening, i.e. listening to receive possible trafc from an idle
channel which is actually sending nothing. This happens in
most WSNs as a node goes to an idle state if nothing is sensed.
Over emitting: Energy waste by over emitting occurs through
transmission of a message when the intended destination node
is not yet ready.
Adaptation: It refers to reconguring a WSN when nodes join
or leave the arrangement and is also a major source of
energy waste.
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
Fig. 1. Deployment of sensor nodes in a typical end-to-end IP-enabled wireless sensor network.
MAC protocols
for WSN
Contention based
Technology
CSMA
Merits
Schedule based
Example
Technology
IEEE 802.11
TDMA
Demerit
Much energy
consuming
Easily adaptable to
topology changes
Relaxed time
synchronizations
Merit
Example
Bluetooth
Demerits
Highly energy
efficient
Strict time
synchronizations
Hard to adapt to
topology changes
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
Fig. 5. The S-MAC mechanism: (a) periodic listen/sleep and (b) inter-cluster
synchronization.
Fig. 7. Energy saving vs. average sleep delay for S-MAC protocol.
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
Fig. 8. Communication patterns of the MAC protocols: (a) S-MAC and (b) T-MAC.
where
T f rame T listen T sleep
In the above equations, Tlisten, Tsleep and Tframe denote the listen,
sleep and frame time, respectively. Now, comparing with the
protocols which do not have the periodic sleep mechanism, the
relative energy saving Es in S-MAC can be given as
Es
T sleep
1
T f rame
T listen
T f rame
The last term in Eq. (3) is the duty cycle of the respective node.
It is desirable to have the listen time as short as possible, so that
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
Fig. 10. The early sleeping problem with the T-MAC protocol.
for a certain duty cycle, the average sleep delay is short. The
percentage of energy saving Es vs. sleep delay Ds on each node for
the listen time of 300 ms and 200 ms is depicted in Fig. 7.
From Fig. 7, we can see that even if the sleep time for a node is
zero which indicates no sleeping, there is still a delay. This
happens because of the fact that contention only starts at the
beginning of each listen interval.
3.5.2. Advantages of S-MAC
S-MAC is conceptually simple to understand and implement,
yet provides very good energy conserving compared to various
other contention based protocols, especially the IEEE 802.11. In
S-MAC, energy waste is substantially reduced as well as time
synchronization overhead is prevented to a large extent through
sleep schedules. This protocol also does not require very strict time
synchronization and the sensor nodes can even use their sleep
periods for communicating. Another salient feature of S-MAC is
that it is able to make tradeoffs between energy saving and latency
as per the network trafc situation.
3.5.3. Disadvantages of S-MAC
Although straightforward but S-MAC allows a low duty cycle
unless the active time is signicantly smaller than the wakeup
period (Anastasi et al., 2009). Another drawback of the S-MAC
protocol is that when two neighboring clusters follow entirely
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
10
Time slot
CR
TC
DATA
CR
TC
DATA
...
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
11
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
12
the help of any local or global master nodes. After the deployment
of the nodes in the network, each node wakes up randomly
according to some predened distribution. It is assumed that the
nodes are able to turn their radios on or off and also they can tune
the carrier frequency to different bands. Unlike some earlier
methods, SMACs assigns a channel to a link immediately after
discovering the existence of the link. In this manner, nodes start
accumulating in a connected network, joined by concurrent links.
In order to reduce possible time collisions among slots between
adjacent links, distinct frequency bands are assigned to each link.
Once a link is established, a node has the knowledge about when
to turn on its radio for communicating. If no communications are
scheduled, it turns off its radio.
SMACs is particularly suitable for distributed sensor networks
in which there are a large number of static nodes with highly
constrained sources of energy. The ability of the nodes to discover
the neighbors and communicate with them leads to energy
efciency, reduced implementation cost and high adaptability to
network topology changes. However, a downside of this protocol is
the increasing possibilities for collisions and lack of time synchronization. Further, the allocated time slots are wasted if the sender
does not possess enough data to transmit to the recipient nodes
(Yadav et al., 2009).
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
13
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
14
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
15
Table 1
A concise comparison of the studied MAC protocols.
Protocol
Category
Type
Comm.
pattern
Adaptability to
changes
Salient features
Contention
based
Contention
based
Contention
based
CSMA
All
Good
CSMA
All
Good
CSMA
All
Good
Schedule
based
Contention
based
Contention
based
Contention
based
Schedule
based
Hybrid
TDMA
All
Good
CSMA/np-CSMA
All
Good
CSMA/CA
All
Good
CSMA
All
Good
TDMA
All
Good
Very good
TDMA
Distributed
WSNs
All
TDMA
Convergecast Weak
TDMA
All
Moderate
All
Very good
Very good
PAMAS
S-MAC,
T-MAC,
DS-MAC
EMACs, LMAC
WiseMAC, B-MAC, X-MAC
Sift
Optimized MAC
TRAMA
SMACs
Energy Aware MAC
Z-MAC
Schedule
based
Schedule
based
Schedule
based
Hybrid
Funneling-MAC
Hybrid
D-MAC
PMAC
Good
S-MAC, and T-MAC are described with more details than others.
This is because these protocols are highly important and motivated the development of many later MAC protocols. For example,
S-MAC can be regarded as a benchmark as it alone inspired several
other MAC protocols, e.g. T-MAC, DS-MAC, and optimized MAC.
Further, many authors often prefer to evaluate the performances of
their proposed MAC protocols against those of S-MAC. It should
also be noted that MAC protocols for WSNs is a very dynamic area
with nonstop contributions from many researchers. There is an
ongoing trend of developing new MAC protocols from different
novel perspectives and so the total count of the available MAC
protocols is increasing persistently. Considering these facts, the
preceding section carries out an intensive study of the various
important MAC protocols which are developed till now for WSNs;
but, the study is in no way exhaustive. This section is devoted to
provide a brief comparison of the MAC protocols which are
described so far and outline a number of future research directions
in this domain. All the discussed MAC protocols are concisely
presented, together with their salient characteristics in Table 1.
From Table 1, it can be seen that energy conservation is the
primary goal of all the MAC protocols which are proposed so far.
Conservation of energy is achieved through adopting various means
which include dual communication channels, preamble sampling,
adaptive duty cycle, clustering of sensor nodes and sleepwake
patterns. Furthermore, most of the developed MAC protocols support all types of communication patterns and are also quite good in
adapting to the changes in network topology and size. Another
important fact is that in spite of so many existing MAC protocols for
WSNs, none can be accepted as the absolute standard. The choice of
a MAC protocol is normally based on the nature of the sensor
network, specic performance goals and implementation cost. Now,
we isolate a number of open issues and research scopes which will
be helpful in designing future MAC protocols for WSNs.
The present MAC protocols are mostly based on either CSMA or
TDMA methods of medium utilization. Traditional CSMA methods
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
16
5. Conclusions
Wireless sensor networks comprise an emerging technology
which has found overwhelming applications in a wide range of
practical communication scenarios during the last decade. A
typical WSN is composed of several battery-operated, usually
static sensor nodes which are constrained in energy supply,
bandwidth, storage capacity and processing ability. The primary
objective of a MAC protocol is to enable smooth operation of the
associated WSN and prevent energy consumption from all potential sources. Although, the domain of MAC protocols is relatively
new, it is rapidly enriching in both quality and quantity through
active contributions from research community.
In this paper, at rst the designing challenges of MAC protocols
for WSNs are discussed and then a wide variety of existing MAC
protocols are meticulously studied, highlighting their inherent
merits and demerits. In order to provide an up-to-date survey,
several recently developed MAC protocols, e.g. PMAC, X-MAC, ZMAC are described together with the earlier well recognized
protocols, e.g. MACA, MACAW, IEEE 802.11, S-MAC. The important
ndings of the present study are summarized as follows. First, it is
observed that in spite of their abundance in literature, the choice
of a MAC protocol for a particular WSN application is not
straightforward and is normally problem-dependent. Also, none
of the designed MAC protocol can be selected as the standard one
for all sensor networking scenarios. Second, although, energyefciency is the fundamental objective, a MAC protocol can seldom
prevent energy wastes from all potential sources. Third, some
protocols, e.g. MACA, S-MAC, T-MAC have signicantly inspired the
designs of various other MAC protocols. The penultimate section of
this paper concisely compares all the studied MAC protocols and
discusses some important future research directions in this
domain. Although, the present study is quite intensive, but is of
course not exhaustive. This paper includes several important MAC
protocols, designed so far in sensor networking literature, but not
all. The counts of available MAC protocols are continuously
increasing and as such time-to-time surveys are very important.
Hopefully, the present study will be signicantly helpful in understanding the current research trend in designing MAC protocols
for WSNs.
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i
References
Ahn GS, Hong SG, Miluzzo E, Campbell AT, Cuomo F. Funneling-MAC: A localized,
sink-oriented MAC for boosting delity in sensor networks. In: Proceedings of
the 4th ACM international conference on embedded networked sensor systems
(SenSys); October 2006. pp. 293306.
Akkaya K, Younis M. A survey on routing protocols for wireless sensor networks.
Ad hoc Netw 2005;3(3):32549.
Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E. A survey on sensor networks.
IEEE CommunMag 2002:10214.
Anastasi G, Conti M, Di Francesco M, Passarella A. Energy conservation in wireless
sensor networks: a survey. Ad Hoc Netw 2009;7(3):53768.
Arisha K, Youssef M, Younis M. Energy aware TDMA based MAC for sensor network.
In: Proceedings of the IEEE workshop on integrated management of power
aware communications computing and networking (impacct); 2002.
Bharghavan V, Demers A, Shenker S, Zhang L. MACAW: a media access protocol for
wireless LAN's. ACM SIGCOMM ComputCommun Rev 1994;24(4):21225.
Buettner M, Yee GV, Anderson, E, Han R. X-MAC: a short preamble mac protocol for
duty-cycled wireless sensor networks, In: Proceedings of the 4th ACM international conference on embedded networked sensor systems (SenSys); October
2006, pp. 307320.
Cal G, Ghizdavescu I, Grauballe A, Jensen MG, Pozzo F. MAC protocol for wireless
sensor network, Project Report. Communications Systems, Group 652, Aalborg
University; 2007.
Cui S, Madan R, Goldsmith A, Lall S. Joint routing, MAC, and link layer optimization
in sensor networks with energy constraints. In: Proceedings of the IEEE
international conference on communications (ICC), Seoul, Korea; May 1620,
2005. pp. 7259.
Demirkol I, Ersoy C, Alagz F. MAC protocols for wireless sensor networks: a survey.
IEEE Commun Mag 2006;44(4):11521.
Ding J, Sivalingam K, Kashyapa R, Chuan LJ. A multi-layered architecture and
protocols for large-scale wireless sensor networks. In: IEEE 58th vehicular
technology conference (VTC 2003-Fall), Orlando, Florida, USA; October 69,
2003. pp. 14437.
El-Hoiydi A. Spatial TDMA and CSMA with preamble sampling for low power adhoc wireless sensor network. In: Proceedings of the seventh international
symposium on computers and communications (ISCC); July 2004. pp. 68592.
Enz CC, El-Hoiydi A, Decotignie JD, Peiris V. WiseNET: an ultralow-power wireless
sensor network solution. IEEE Comput 2004;37(8):6270.
Haartsen JC. The bluetooth radio system. IEEE Pers Commun 2000:2836.
Heinzelman WR, Chandrakasan A, Balakrishnan H. Energy-efcient communication
protocol for wireless microsensor networks. In: Proceedings of the 33rd IEEE
annual Hawaii international conference on system sciences; January 47, 2000.
pp. 110.
Hull B, Jamieson K, Balakrishnan H. Mitigating congestion in wireless sensor
networks. In: Proceedings of the 2nd ACM international conference on
embedded networked sensor systems (SenSys); November 35, 2004.
pp. 13447.
Jamieson K, Balakrishnan H, Tay YC. Sift: A MAC protocol for event-driven wireless
sensor networks. In: Proceedings of the European workshop on wireless sensor
networks (EWSN); February 1315, 2006, pp. 260275.
Karlof C, Sastry N, Wagner D, TinySec: a link layer security architecture for wireless
sensor networks. In: Proceedings of the 2nd ACM international conference on
embedded networked sensor systems (SenSys); November 35, 2004. pp. 162
75.
Karn P. MACAa new channel access method for packet radio. In: Proceedings of
the ARRL/CRRL amateur radio 9th computer networking conference; September
22, 1990.
17
Lin P, Qiao C, Wang X. Medium access control with a dynamic duty cycle for sensor
networks. In: Proceedings of the IEEE wireless communications and networking conference (WCNC); March 2004. pp. 15349.
Lu G, Krishnamachari B, Raghavendra CS. An adaptive energy-efcient and lowlatency MAC for tree-based data gathering in sensor networks. Wireless
Commun Mob Comput 2007;7(7):86375.
Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks. Commun
ACM 2004;47(6):537.
Polastre J, Hill J, Culler D. Versatile low power media access for sensor networks. In:
Proceedings of the 2nd ACM international conference on embedded networked
sensor systems (SenSys), November 35, 2004. pp. 95107.
Rajendran V, Obraczka K, Garcia-Luna-Aceves JJ. Energy-efcient, collision-free
medium access control for wireless sensor networks. In: Proceedings of the 1st
ACM international conference on embedded networked sensor systems
(SenSys), Los Angeles, California, November 57, 2003. pp. 18192.
Rhee I, Warrier A, Aia M, Min J. Z-MAC: a hybrid MAC for wreless sensor networks.
In: Proceedings of the 3rd ACM international conference on embedded
networked sensor systems (SenSys), Sun Diego, USA; November 2005.
Shrivastava N, Buragohain C, Agrawal D, Suri S. Medians and beyond: new
aggregation techniques for sensor networks. In: Proceedings of the 2nd ACM
international conference on embedded networked sensor systems (SenSys),
November 35, 2004. pp. 239249.
Singh S, Raghavendra CS. PAMAS: power aware multi-access protocol with signaling for ad hoc networks. Comput Commun Rev 1998;28(3):526.
Sohrabi K, Gao J, Ailawadhi V, Pottie GJ. Protocols for self-organization of a wireless
sensor network. IEEE Pers Commun 2000;7(5):1627.
Stemm M, Katz RH. Measuring and reducing energy consumption of network
interfaces in hand-held devices. IEICE Trans Commun 1997;E80-B(8):112531.
Tay YC, Jamieson K, Balakrishnan H. Collision-minimizing CSMA and its applications
to wireless sensor networks. IEEE J Selected Areas Commun 2004;22
(6):104857.
Tilak S, Abu-Ghazaleh NB, Heinzelman W. A taxonomy of wireless micro-sensor
network models. ACM SIGMOBILE Mob Comput Commun Rev 2002;6
(2):2836.
Van Dam T, Langendoen K. An adaptive energy efcient MAC protocol for wireless
networks. In: Proceedings of the 1st ACM conference on embedded networked
sensor systems; 2003.
Van Hoesel LF, Havinga PJM. A lightweight medium access protocol (LMAC) for
wireless sensor networks: reducing preamble transmissions and transceiver
state switches. In: Proceedings of the 1st international workshop on networked
sensing systems (INSS), Tokyo, Japan; 2004.
Van Hoesel LFW, Nieberg T, Kip HJ, Havinga PJM. Advantages of a TDMA based,
energy-efcient, self-organizing MAC Protocol for WSNs. In: Proceedings of the
IEEE vehicular technology conference (VTC), May 2004. pp. 1598602.
Wan CY, Eisenman SB, Campbell AT, Crowcroft J. Siphon: overload trafc management using multi-radio virtual sinks in sensor networks. In: Proceedings of the
3rd ACM international conference on embedded networked sensor systems
(SenSys), Sun Diego, USA; November 2005. pp. 11629.
Yadav R, Varma S, Malaviya N. Optimized medium access control for wireless
sensor network. Int J Comput Sci Netw Secur 2008;8(2):3348.
Yadav R, Varma S, Malaviya N. A survey of MAC protocols for wireless sensor
networks. UbiCC J 2009;4(3):82733.
Ye W, Heidemann J, Estrin D. An energy-efcient MAC protocol for wireless sensor
networks. Proc IEEE INFOCOM 2002:156776.
Zheng T, Radhakrishnan S, Sarangan V. PMAC: an adaptive energy-efcient mac
protocol for wireless sensor networks. In: Proceedings of the 19th IEEE parallel
and distributed processing symposium (IPDPS); 2005. pp. 6572.
Zorzi M. A new contention-based mac protocol for geographic forwarding in ad hoc
and sensor networks. In: Proceedings of the IEEE international conference on
communications (ICC), Paris, France; June 2024, 2004. pp. 34815.
Please cite this article as: Adhikari R. A meticulous study of various medium access control protocols for wireless sensor networks.
Journal of Network and Computer Applications (2014), http://dx.doi.org/10.1016/j.jnca.2014.01.011i