z-logo
Premium
Multi‐hop medium access control protocol for low energy critical infrastructure monitoring networks using wake‐up radio
Author(s) -
Ullah Niamat,
Chowdhury M. Sanaullah,
Khan Pervez,
Kwak Kyung Sup
Publication year - 2014
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.2487
Subject(s) - computer science , computer network , energy consumption , protocol (science) , power control , event (particle physics) , access control , efficient energy use , media access control , cluster (spacecraft) , real time computing , power (physics) , telecommunications , wireless , electrical engineering , medicine , physics , alternative medicine , pathology , quantum mechanics , engineering
SUMMARY The IEEE 802.15.4K Task Group was formed recently to address the low energy critical infrastructure monitoring networks. The aim is to collect scheduled and event data from a large number of non‐mains powered endpoints that are widely dispersed. The application requirements include reliable data transfer, energy efficiency, and long deployment lifetime. To meet the low energy critical infrastructure monitoring network requirements, we propose a multihop medium access control protocol where the scheduled or event data are routed to the coordinator through the cluster heads. The power consumption of the cluster heads is critical as they use more power than the normal endpoints. Our protocol uses the wake‐up radio approach from cluster head to cluster head communication and an efficient guaranteed time slots allocation scheme to minimize the power consumption of the cluster heads. We derive analytical expressions for the average power consumption of cluster heads as well as ordinary endpoints. The results show that our proposed protocol outperforms the IEEE 802.15.4 MAC and SCP MAC in terms of power consumption. High power efficiency is achieved in both the cluster heads and normal endpoints. Copyright © 2012 John Wiley & Sons, Ltd.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here