期刊论文详细信息
IEEE Access
A Comprehensive Study of IoT and WSN MAC Protocols: Research Issues, Challenges and Opportunities
Ming Zhao1  Arun Kumar2  Peter Han Joo Chong3  Yong Liang Guan4  Kai-Juan Wong5 
[1] Agency for Science, Technology and Research, Institute for Infocomm Research, Singapore;Department of Computer Science and Engineering, National Institute of Technology, Rourkela, India;Department of Electrical and Electronic Engineering, Auckland University of Technology, Auckland, New Zealand;School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore;Singapore Institute of Technology, Singapore;
关键词: MAC protocols;    wireless sensor networks;    Internet of Things;    energy-efficient and energy conservation;   
DOI  :  10.1109/ACCESS.2018.2883391
来源: DOAJ
【 摘 要 】

Recent advances in wireless technologies, micro-electro-mechanical systems, and embedded systems enable the popular usage of the Internet of Things (IoT) and wireless sensor networks (WSNs) in many important applications, such as smart buildings, security, target tracking, industrial automation, and so on. Typically, a WSN consists of a large number of tiny, low-cost sensor nodes that are limited in terms of their capabilities of computation, communication, memory, and power. In WSNs, energy-efficient algorithms are of paramount importance for a long lasting high throughput network. MAC protocol plays a prominent role in extending the life-time of WSNs. MAC protocols provide various schemes on how multiple nodes access a common wireless medium. To achieve a longer lifetime for the nodes and the networks, MAC protocols need to be energy-efficient and reduce the sources of energy wastage. Energy conservation in sensor nodes is generally achieved by duty cycling the radios, and it is the MAC layer protocol that controls when to switch on and off the radio. In this paper, we discuss the essential properties of MAC protocols, the MAC for IoT and the common causes of energy consumptions. Thereafter, we categorize the MAC layer protocols and discuss several protocols under each category in depth, emphasizing their strengths and weaknesses, and giving a detailed comparison of MAC protocols. Finally, we conclude the survey with the insights on future research directions.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:6次