Skip to Content

76 Results Found

  • Article
  • Open Access
4 Citations
2,753 Views
21 Pages

22 August 2023

The CSMA/CA algorithm uses the binary backoff mechanism to solve the multi-user channel access problem, but this mechanism is vulnerable to jamming attacks. Existing research uses channel-hopping to avoid jamming, but this method fails when the chann...

  • Article
  • Open Access
19 Citations
7,419 Views
24 Pages

Performance Optimization of Priority Assisted CSMA/CA Mechanism of 802.15.6 under Saturation Regime

  • Mustafa Shakir,
  • Obaid Ur Rehman,
  • Mudassir Rahim,
  • Nabil Alrajeh,
  • Zahoor Ali Khan,
  • Mahmood Ashraf Khan,
  • Iftikhar Azim Niaz and
  • Nadeem Javaid

2 September 2016

Due to the recent development in the field of Wireless Sensor Networks (WSNs), the Wireless Body Area Networks (WBANs) have become a major area of interest for the developers and researchers. Human body exhibits postural mobility due to which distanc...

  • Article
  • Open Access
8 Citations
9,147 Views
38 Pages

19 April 2012

Studies of the IEEE 802.15.4 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme have been received considerable attention recently, with most of these studies focusing on homogeneous or saturated traffic. Two novel transmission s...

  • Article
  • Open Access
1 Citations
2,431 Views
24 Pages

To address the issues of high attenuation, weak reception signal, and channel blockage in the current electric field communication of underwater robots, research on autonomous underwater vehicle (AUV) multi-node networking communication based on unde...

  • Article
  • Open Access
6 Citations
3,094 Views
22 Pages

6 December 2019

We study a CSMA/CA (Carrier Sense Medium Access with Collision Avoidance) wireless network where some stations deviate from the defined contention mechanism. By using Bianchi’s model, we study how this deviation impacts the network throughput a...

  • Article
  • Open Access
6 Citations
6,182 Views
17 Pages

19 October 2017

This paper presents an automatic modulation and coding scheme (MCS) level adaptation algorithm to embrace Internet of Things (IoT) devices by improving the area spectral efficiency of carrier-sense multiple access with collision avoidance (CSMA/CA) w...

  • Article
  • Open Access
7 Citations
6,219 Views
20 Pages

26 March 2015

Distributed transmission rate tuning is important for a wide variety of IEEE 802.15.4 network applications such as industrial network control systems. Such systems often require each node to sustain certain throughput demand in order to guarantee the...

  • Article
  • Open Access
1 Citations
2,709 Views
20 Pages

Energy-Efficient MAC Protocol for Underwater Sensor Networks Using CSMA/CA, TDMA, and Actor–Critic Reinforcement Learning (AC-RL) Fusion

  • Wazir Ur Rahman,
  • Qiao Gang,
  • Feng Zhou,
  • Muhammad Tahir,
  • Wasiq Ali,
  • Muhammad Adil,
  • Sun Zong Xin and
  • Muhammad Ilyas Khattak

Due to the dynamic and harsh underwater environment, which involves a long propagation delay, high bit error rate, and limited bandwidth, it is challenging to achieve reliable communication in underwater wireless sensor networks (UWSNs) and network s...

  • Article
  • Open Access
29 Citations
4,429 Views
23 Pages

Traffic Class Prioritization-Based Slotted-CSMA/CA for IEEE 802.15.4 MAC in Intra-WBANs

  • Farhan Masud,
  • Abdul Hanan Abdullah,
  • Ayman Altameem,
  • Gaddafi Abdul-Salaam and
  • Farkhana Muchtar

23 January 2019

This paper proposes an improved Traffic Class Prioritization based Carrier Sense Multiple Access/Collision Avoidance (TCP-CSMA/CA) scheme for prioritized channel access to heterogenous-natured Bio-Medical Sensor Nodes (BMSNs) for IEEE 802.15.4 Medium...

  • Article
  • Open Access
2 Citations
3,762 Views
22 Pages

In wireless networks, users may experience outages owing to low received signal strength. Divergent from other research, we investigate the outages for users of CSMA/CA-based wireless networks when multiple access points (APs) and multiple users are...

  • Article
  • Open Access
16 Citations
7,411 Views
16 Pages

Segmentized Clear Channel Assessment for IEEE 802.15.4 Networks

  • Kyou Jung Son,
  • Sung Hyeuck Hong,
  • Seong-Pil Moon,
  • Tae Gyu Chang and
  • Hanjin Cho

3 June 2016

This paper proposed segmentized clear channel assessment (CCA) which increases the performance of IEEE 802.15.4 networks by improving carrier sense multiple access with collision avoidance (CSMA/CA). Improving CSMA/CA is important because the low-pow...

  • Article
  • Open Access
20 Citations
11,667 Views
15 Pages

Study on Additional Carrier Sensing for IEEE 802.15.4 Wireless Sensor Networks

  • Bih-Hwang Lee,
  • Ruei-Lung Lai,
  • Huai-Kuei Wu and
  • Chi-Ming Wong

24 June 2010

Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs). The slotted carrier sense multiple access with collision avo...

  • Article
  • Open Access
9 Citations
2,375 Views
17 Pages

18 February 2022

Numerous Internet of Things (IoT) devices adopt the IEEE 802.15.4 standard, which targets low data rate wireless networks. With the explosive growth in the use of IoT devices, it is essential to design effective and efficient channel access schemes f...

  • Article
  • Open Access
4 Citations
2,577 Views
15 Pages

25 June 2018

Previous studies have shown that in many wireless sensor network applications the IEEE 802.15.4 carrier sense multiple access with collision avoidance (CSMA/CA) mechanism with default parameters cannot guarantee the constraints of reliability, time e...

  • Article
  • Open Access
6 Citations
4,870 Views
15 Pages

13 November 2017

Round Robin based Intermittent Periodic Transmit (RR-IPT) has been proposed which achieves highly efficient multi-hop relays in multi-hop wireless backhaul networks (MWBN) where relay nodes are 2-dimensionally deployed. This paper newly investigates...

  • Article
  • Open Access
22 Citations
4,217 Views
33 Pages

13 August 2024

Survivability is a critical concern in WSNs, heavily influenced by energy efficiency. Addressing severe energy constraints in WSNs requires solutions that meet application goals while prolonging network life. This paper presents an Energy Optimizatio...

  • Article
  • Open Access
1 Citations
2,603 Views
24 Pages

Visible Light Communication (VLC) offers distinctive advantages over conventional radio frequency; wide unlicensed spectrum, resistance to electrometric interference and low susceptibility to security risks, are few to name. Excitingly, VLC becomes a...

  • Article
  • Open Access
9 Citations
3,589 Views
19 Pages

30 January 2018

We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of the sensors of the network are malicious and deviate from the defined contention mechanism. We use Bianchi’s network model to study the impact of the ma...

  • Article
  • Open Access
8 Citations
7,320 Views
13 Pages

24 December 2016

In this paper, we obtained the optimized network allocation vector (NAV) for underwater handshaking-based protocols, as inefficient determination of the NAV leads to unnecessarily long silent periods. We propose a scheme which determines the NAV by t...

  • Article
  • Open Access
10 Citations
2,560 Views
27 Pages

4 March 2024

With the development and popularization of Intelligent Transportation Systems (ITS), Vehicle Ad-Hoc Networks (VANETs) have attracted extensive attention as a key technology. In order to achieve real-time monitoring, VANET technology enables vehicles...

  • Article
  • Open Access
348 Views
18 Pages

25 December 2025

Applications for intelligent cooperative Unmanned Aerial Vehicle (UAV) swarms are rapidly expanding. Efficient and reliable communication is critical for realizing this swarm intelligence, especially in remote areas lacking infrastructure where ad ho...

  • Article
  • Open Access
38 Citations
8,941 Views
24 Pages

Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance

  • Carlos Ley-Bosch,
  • Itziar Alonso-González,
  • David Sánchez-Rodríguez and
  • Carlos Ramírez-Casañas

6 February 2016

In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of...

  • Article
  • Open Access
13 Citations
15,520 Views
16 Pages

4 March 2009

Embedding data-aggregation capabilities into sensor nodes of wireless networks could save energy by reducing redundant data flow transmissions. Existing research describes the construction of data aggregation trees to maximize data aggregation times...

  • Article
  • Open Access
2 Citations
1,944 Views
18 Pages

22 July 2023

Herein, we propose the use of the logarithmic values of data transmission rates for multi-armed bandit (MAB) algorithms that adjust the modulation and coding scheme (MCS) levels of data packets in carrier-sensing multiple access/collision avoidance (...

  • Article
  • Open Access
10 Citations
7,167 Views
26 Pages

Self-Configuring IoT Service QoS Guarantee Using QBAIoT

  • Ahmad Khalil,
  • Nader Mbarek and
  • Olivier Togni

17 November 2018

Providing Internet of Things (IoT) environments with service level guarantee is a challenging task for improving IoT application usage experience. We specify in this paper an IoT architecture enabling an IoT Service Level Agreement (iSLA) achievement...

  • Article
  • Open Access
1 Citations
1,361 Views
30 Pages

Embedding Trust in the Media Access Control Protocol for Wireless Networks

  • Chaminda Alocious,
  • Hannan Xiao,
  • Bruce Christianson and
  • Joseph Spring

9 January 2025

IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.11 have been designed under the assumption that all nodes in...

  • Article
  • Open Access
15 Citations
4,787 Views
14 Pages

Full-Duplex MAC Protocol for CSMA/CA-Based Single-Hop Wireless Networks

  • Yu Song,
  • Wangdong Qi,
  • Weiwei Zhao and
  • Wenchi Cheng

27 May 2019

Full-duplex (FD) communication provides new opportunities for improving the throughputs of networks. However, this condition means that the number of senders increases from one to two within a certain range. We have to arrange the two nodes to send f...

  • Article
  • Open Access
4 Citations
2,914 Views
14 Pages

Full-duplex (FD) radios can transmit and receive packets simultaneously in the same frequency band. Although this potentially doubles the spectral efficiency, it also causes inter-node interference, which was not an issue for half-duplex (HD) radios...

  • Article
  • Open Access
7 Citations
2,600 Views
21 Pages

9 November 2022

A smart grid is a next-generation intelligent power grid that can maximize energy efficiency by monitoring power information in real time and by controlling the flow of power by introducing IT communication technology to the existing power grid. In o...

  • Article
  • Open Access
4 Citations
1,689 Views
21 Pages

Wireless sensor networks (WSNs) based on the IEEE 802.15.4 standard have important applications in many fields, such as the Internet of Things and smart cities because of their low energy consumption. Hybrid carrier sense multiple access/time divisio...

  • Article
  • Open Access
1,686 Views
19 Pages

4 August 2023

Utilizing a multi-frame signal (MFS) rather than a single-frame signal (SFS) for radio frequency fingerprint authentication (RFFA) shows the advantage of higher accuracy. However, previous studies have often overlooked the associated security threats...

  • Review
  • Open Access
16 Citations
6,621 Views
26 Pages

16 April 2020

In-band full duplex wireless medium access control (MAC) protocol is essential in order to enable higher layers of the protocol stack to exploit the maximum benefits from physical layer full duplex technology. Unlike half duplex wireless local area n...

  • Article
  • Open Access
5 Citations
4,009 Views
21 Pages

Handshake Sense Multiple Access Control for Cognitive Radio-Based IoT Networks

  • Muhammad Shafiq,
  • Maqbool Ahmad,
  • Muhammad Khalil Afzal,
  • Amjad Ali,
  • Azeem Irshad and
  • Jin-Ghoo Choi

10 January 2019

Internet-of-Things (IoT) enabling technologies such as ZigBee, WiFi, 6LowPAN, RFID, Machine-to-Machine, LTE-Advanced, etc. depend on the license-free Industrial Scientific and Medical (ISM) bands for the Internet. The proliferation of IoT devices is...

  • Article
  • Open Access
5 Citations
3,074 Views
20 Pages

An Analytical Framework for the IEEE 802.15.4 MAC Layer Protocol under Periodic Traffic

  • Yipeng Wang,
  • Wei Yang,
  • Ruisong Han,
  • Linsen Xu and
  • Haojiang Zhao

12 June 2020

As the reference communication standard of wireless sensor networks (WSNs), the IEEE 802.15.4 standard has been adopted in various WSN-based applications. In many of these applications, one of the most common traffic pattern types is a periodic traff...

  • Article
  • Open Access
4 Citations
7,007 Views
16 Pages

Throughput Fairness Enhancement Using Differentiated Channel Access in Heterogeneous Sensor Networks

  • Eui-Jik Kim,
  • Taeshik Shon,
  • James Jong Hyuk Park and
  • Young-Sik Jeong

27 June 2011

Nowadays, with wireless sensor networks (WSNs) being widely applied to diverse applications, heterogeneous sensor networks (HSNs), which can simultaneously support multiple sensing tasks in a common sensor field, are being considered as the general f...

  • Article
  • Open Access
22 Citations
6,348 Views
28 Pages

Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks

  • Muhammad Shafiq,
  • Maqbool Ahmad,
  • Azeem Irshad,
  • Moneeb Gohar,
  • Muhammad Usman,
  • Muhammad Khalil Afzal,
  • Jin-Ghoo Choi and
  • Heejung Yu

26 June 2018

The proliferation of Internet-of-Things (IoT) technology and its reliance on the license-free Industrial, Scientific, and Medical (ISM) bands have rendered radio spectrum scarce. The IoT can nevertheless obtain great advantage from Cognitive Radio (C...

  • Article
  • Open Access
8 Citations
4,033 Views
22 Pages

Ranked Sense Multiple Access Control Protocol for Multichannel Cognitive Radio-Based IoT Networks

  • Muhammad Shafiq,
  • Pankaj Singh,
  • Imran Ashraf,
  • Maqbool Ahmad,
  • Amjad Ali,
  • Azeem Irshad,
  • Muhammad Khalil Afzal and
  • Jin-Ghoo Choi

10 April 2019

The widespread growth of the Internet-of-Things (IoT) and its dependence on the license-exempt Industrial, Scientific, and Medical (ISM) bands have made spectrum resources scarce. IoT can nonetheless get advantage from the Cognitive Radio (CR) techno...

  • Article
  • Open Access
23 Citations
7,588 Views
21 Pages

Performance Analysis of Different Backoff Algorithms for WBAN-Based Emerging Sensor Networks

  • Pervez Khan,
  • Niamat Ullah,
  • Farman Ali,
  • Sana Ullah,
  • Youn-Sik Hong,
  • Ki-Young Lee and
  • Hoon Kim

2 March 2017

The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) procedure of IEEE 802.15.6 Medium Access Control (MAC) protocols for the Wireless Body Area Network (WBAN) use an Alternative Binary Exponential Backoff (ABEB) procedure. The backof...

  • Article
  • Open Access
12 Citations
4,550 Views
16 Pages

Performance Evaluation of RTS/CTS Scheme in Beacon-Enabled IEEE 802.15.6 MAC Protocol for Wireless Body Area Networks

  • Sana Ullah ,
  • Mohammad Mehedi Hassan,
  • M. Shamim Hossain and
  • Abdulhameed Alelaiwi

22 April 2020

The IEEE 802.15.6 standard has the potential to provide cost-effective and unobtrusive medical services to individuals with chronic health conditions. It is a low-power standard developed for wireless body area networks and enables wireless communica...

  • Article
  • Open Access
5 Citations
3,224 Views
14 Pages

18 January 2022

In the limited frequency spectrum shared by various wireless communication technologies, cross-technology interference is an important factor which determines communication performance. A variety of coexistence methods to reduce the impact of this in...

  • Article
  • Open Access
2 Citations
2,569 Views
21 Pages

12 October 2021

As a multi-hop extension of the desynchronization-based TDMA (Desync-TDMA), the extended Desync-TDMA (Ext-Desync) with self-adapting property is proposed to overcome the limitations of existing CSMA/CA and dynamic TDMA-based schemes for Mobile Ad-hoc...

  • Article
  • Open Access
3 Citations
1,961 Views
15 Pages

Analysis of the Efficiency of Various Receipting Multiple Access Methods with Acknowledgement in IoT Networks

  • Vyacheslav V. Borodin,
  • Valentin E. Kolesnichenko and
  • Vyacheslav A. Shevtsov

An Internet of things (IoT) network is a distributed set of “smart” sensors, interconnected via a radio channel. The basic method of accessing the radio channels for these networks is Carrier Sense Multiple Access/Collision Avoidance (CSM...

  • Article
  • Open Access
10 Citations
3,321 Views
19 Pages

Empirical Performance Models of MAC Protocols for Cooperative Platooning Applications

  • Aqsa Aslam,
  • Pedro M. Santos,
  • Frederico Santos and
  • Luís Almeida

12 November 2019

Vehicular ad-hoc networks (VANET) enable vehicles to exchange information on traffic conditions, dynamic status and localization, to enhance road safety and transportation efficiency. A typical VANET application is platooning, which can take advantag...

  • Article
  • Open Access
9 Citations
3,028 Views
19 Pages

Identifying Misbehaving Greedy Nodes in IoT Networks

  • Fatima Salma Sadek,
  • Khaled Belkadi,
  • Abdelhafid Abouaissa and
  • Pascal Lorenz

29 July 2021

One of the central communication infrastructures of the Internet of Things (IoT) is the IEEE 802.15.4 standard, which defines Low Rate Wireless Personal Area Networks (LR- WPAN). In order to share the medium fairly in a non-beacon-enabled mode, the s...

  • Article
  • Open Access
14 Citations
3,511 Views
16 Pages

Performance Enriching Channel Allocation Algorithm for Vehicle-to-Vehicle City, Highway and Rural Network

  • Mohammed Abdulhakim Al-Absi,
  • Ahmed Abdulhakim Al-Absi and
  • Hoon Jae Lee

25 July 2019

Future safety applications require the timely delivery of messages between vehicles. The 802.11p has been standardized as the standard Medium Access Control (MAC) protocol for vehicular communication. The 802.11p uses Carrier Sense Multiple Access wi...

  • Article
  • Open Access
7 Citations
12,864 Views
33 Pages

9 July 2009

In this paper, we present an innovative transmit power control scheme, based on optimization theory, for wireless sensor networks (WSNs) which use carrier sense multiple access (CSMA) with collision avoidance (CA) as medium access control (MAC) proto...

  • Article
  • Open Access
11 Citations
4,191 Views
23 Pages

MAC/PHY Comprehensive Visible Light Communication Networks Simulation

  • Edmundo Torres-Zapata,
  • Victor Guerra,
  • Jose Rabadan,
  • Martin Luna-Rivera and
  • Rafael Perez-Jimenez

23 October 2020

In this paper, the effect of channel conditions on the global behavior of a wireless Visible Light Communications (VLC) optical network are studied. It presents a system-level simulator that considers jointly a channel propagation model and the MAC m...

  • Article
  • Open Access
1 Citations
2,919 Views
15 Pages

14 September 2018

This article introduces a new approach in the field of network optimization based on Transmission Optimization Metric (TOM), which is aimed at improving traffic flow continuity and increasing the chances for traffic flow sustainability in a way that...

  • Article
  • Open Access
7 Citations
6,275 Views
21 Pages

HMC-MAC Protocol for High Data Rate Wireless Sensor Networks

  • Gerard Chalhoub,
  • Rana Diab and
  • Michel Misson

Using multiple channels in wireless sensor networks helps increase the overall throughput and avoid interferences. In addition, introducing multi-interface nodes further helps in increasing the packet delivery rate for those specific nodes. In this p...

  • Article
  • Open Access
20 Citations
10,844 Views
25 Pages

In this paper we present the design and implementation of a generic GA-based optimization framework iMASKO (iNL@MATLAB Genetic Algorithm-based Sensor NetworK Optimizer) to optimize the performance metrics of wireless sensor networks. Due to the globa...

of 2