Distributed Latency-Energy Minimization and interference avoidance in TDMA Wireless Sensor Networks

被引:21
|
作者
Macedo, Mario [2 ,3 ]
Grilo, Antonio [1 ,2 ]
Nunes, Mario [1 ,2 ]
机构
[1] Univ Tecn Lisboa, Inst Super Tecn, P-1096 Lisbon, Portugal
[2] INESC ID, P-1000029 Lisbon, Portugal
[3] Univ Nova Lisboa, FCT, P-2829516 Caparica, Portugal
关键词
Wireless Sensor Networks; MAC; TDMA; Latency; Energy-efficiency; Interference avoidance;
D O I
10.1016/j.comnet.2008.10.015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents Latency-Energy Minimization Medium Access (LEMMA), a new TDMA-based MAC protocol for Wireless Sensor Networks (WSNs), specially suited to extend the lifetime of networks supporting alarm-driven, delay-sensitive applications characterized by convergecast traffic patterns and sporadic traffic generation. Its cascading time-slot assignment scheme conciliates low end-to-end latency with a low duty-cycle, while supporting multi-sink WSN topologies. Unlike most of the current solutions, LEMMA's time-slot allocation protocol makes decisions based on the interference actually experienced by the nodes, instead of following the simple but potentially ineffective n-hop approach. Simulation results are presented to demonstrate the ineffectiveness of the n-hop time-slot allocation in comparison with LEMMA, as well as to evaluate the performance of LEMMA against L-MAC, T-MAC and Low Power Listening. The results show that under the target scenario conditions, LEMMA presents lower interference between assigned time-slots and lower end-to-end latency, while matching its best contender in terms of energy-efficiency. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:569 / 582
页数:14
相关论文
共 50 条
  • [31] Balancing overhearing energy and latency in Wireless Sensor Networks
    Lee, Byoungyong
    Park, Kyungseo
    Elmasri, Ramez
    WIRELESS SENSOR AND ACTOR NETWORKS II, 2008, 264 : 25 - 36
  • [32] Low Energy and Low Latency in Wireless Sensor Networks
    Cortes Cabezas, Albeiro
    Gamboa Medina, Ricardo
    Pena T, Nestor M.
    Labrador, Miguel A.
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 5247 - +
  • [33] A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks
    Khan, Anwar
    Ahmedy, Ismail
    Anisi, Mohammad Hossein
    Javaid, Nadeem
    Ali, Ihsan
    Khan, Nawsher
    Alsaqer, Mohammed
    Mahmood, Hasan
    SENSORS, 2018, 18 (01)
  • [34] Convex Optimization Approach to Joint Interference and Distortion Minimization in Energy Harvesting Wireless Sensor Networks
    Vieeralingaam, G.
    Ramanathan, R.
    Jayakumar, M.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (03) : 1669 - 1684
  • [35] Convex Optimization Approach to Joint Interference and Distortion Minimization in Energy Harvesting Wireless Sensor Networks
    G. Vieeralingaam
    R. Ramanathan
    M. Jayakumar
    Arabian Journal for Science and Engineering, 2020, 45 : 1669 - 1684
  • [36] An interference free cluster-based TDMA protocol for wireless sensor networks
    Gong Haigang
    Ming, Liu
    Wang Xiaomin
    Chen Lijun
    Li, Xie
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 217 - 227
  • [37] Dynamic TDMA for Wireless Sensor Networks
    Benrebbouh, Chahrazed
    Louail, Lemia
    2021 30TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC 2021), 2021, : 204 - 208
  • [38] A TDMA Jitter Minimization Algorithm for Real-time Applications in Wireless Sensor Networks
    Tao, Liqiang
    Yu, Fengqi
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,
  • [39] Distortion Minimization in Wireless Sensor Networks With Energy Harvesting
    Du, Pengfei
    Yang, Qinghai
    Shen, Zhong
    Kwak, Kyung Sup
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (06) : 1393 - 1396
  • [40] Energy Minimization for Broadcasting Message in Wireless Sensor Networks
    Xiang, Min
    Zhang, Xiaohui
    Luo, Zhiyong
    Xu, Yang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 447 - +