Energy efficiency analysis of hybrid-MAC protocols with application constraints in wireless sensor networks

Abdul Sattar Malik, Jingming Kuang, Jiakang Liu, Muhammad Kamran, Qiang Liu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Various energy and computational constraints for sensor nodes in wireless sensor networks have led to the development of many protocols with emphasis on medium access control (MAC) layer protocols. Several applications have already been envisioned for wireless sensor networks. This paper classifies the existing MAC protocols & the applications/ scenarios for wireless sensor networks. In addition the paper analyses and compares the application specific-ness of the existing Hybrid-MAC protocols depicting the effect of the inefficient behavior of these protocols if imposed on some other applications/scenarios. Simulation results also verify their application dependency which highlights the need for a generalized, standardized & adaptive MAC protocol suitable for a wider range of applications. The paper concludes with some recommendations for such protocols.

Original languageEnglish
Title of host publicationProceedings - 3rd International Conference on Emerging Technologies, ICET 2007
Pages22-26
Number of pages5
DOIs
Publication statusPublished - 2007
Event3rd International Conference on Emerging Technologies, ICET 2007 - Islamabad, Pakistan
Duration: 12 Nov 200713 Nov 2007

Publication series

NameProceedings - 3rd International Conference on Emerging Technologies, ICET 2007

Conference

Conference3rd International Conference on Emerging Technologies, ICET 2007
Country/TerritoryPakistan
CityIslamabad
Period12/11/0713/11/07

Keywords

  • Application patterns
  • Energy efficiency
  • Latency
  • Medium access control protocols
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Energy efficiency analysis of hybrid-MAC protocols with application constraints in wireless sensor networks'. Together they form a unique fingerprint.

Cite this