Skip to main content
Log in

Cross-layer cooperative multichannel medium access for internet of things

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Wireless networking in the Internet of Things is a challenging problem because a huge amount of devices in a relatively small region need to be interconnected. Particularly, the carrier sensing multiple access with collision avoidance (CSMA/CA) operation of IoT devices is not viable solution, since dense network leads to high channel contentions. Moreover, given an intensive network traffic load, long queues or even queue overflows are expected, which further deteriorates network performance. To address these issue, multichannel medium access is proposed and it attracts great attention recently. In this paper, we firstly establish models based on combinatorics theory to analyze the performance of dynamic multichannel medium access. Then, a Cross-layer Cooperative Multichannel Medium Access (CCMMA) is proposed to effectively avoid channel contentions by enabling neighboring devices to communicate on orthogonal channels. The CCMMA also introduces a routing-enhanced mechanism that enables relaying nodes to wake up intelligently if there is incoming traffic, that successfully mitigates delay and queue overflow problems caused by low-power operation of IoT devices. The performance of CCMMA is evaluated through extensive simulations. The results show that it provides significant improvement in terms of quality of service over existing solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Stankovic J (2014) Research directions for the internet of things. IEEE Internet of Things Journal 1(1):3–9

    Article  Google Scholar 

  2. Chen S, Xu H, Liu D, Hu B, Wang H (2014) A vision of iot: applications, challenges, and opportunities with China perspective. IEEE Internet of Things Journal 1(4):349–359

    Article  Google Scholar 

  3. Joh H, Yang I, Ryoo I (2016) The internet of everything based on energy efficient p2p transmission technology with bluetooth low energy. Peer-to-Peer Networking and Applications 9(3):520– 528

    Article  Google Scholar 

  4. Deng X, He L, Li X, Liu Q, Cai L, Chen Z (2016) A reliable qos-aware routing scheme for neighbor area network in smart grid. Peer-to-Peer Networking and Applications 9(4):616–627

    Article  Google Scholar 

  5. Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352

    Article  Google Scholar 

  6. Ren Y-J, Shen J, Wang J, Han J, Lee S-Y (2015) Mutual verifiable provable data auditing in public cloud storage. J Intell Technol 16(2):317–323

    Google Scholar 

  7. Zhangjie F, Xingming S, Qi L, Lu Z, Jiangang S (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98 (1):190–200

    Google Scholar 

  8. Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706–2716

    Article  Google Scholar 

  9. Guo P, Wang J, Geng XH, Kim CS, Kim J-U (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Intell Technol 15(6):929–935

    Google Scholar 

  10. Hnat TW, Srinivasan V, Lu J, Sookoor TI, Dawson R, Stankovic J, Whitehouse K (2011) The hitchhiker’s guide to successful residential sensing deployments. In: Proceedings of the 9th ACM conference on embedded networked sensor systems, ser. Sensys ’11, pp 232–245

  11. Jin M, Jia R, Kang Z, Konstantakopoulos IC, Spanos CJ (2014) Presencesense: Zero-training algorithm for individual presence detection based on power monitoring. In: Proceedings of the 1st ACM conference on embedded systems for energy-efficient buildings, ser. Buildsys ’14, pp 1–10

  12. Zhang T, Chowdhery A, Bahl PV, Jamieson K, Banerjee S (2015) The design and implementation of a wireless video surveillance system. In: Proceedings of the 21st annual international conference on mobile computing and networking, ser. Mobicom ’15, pp 426–438

  13. Abari O, Vasisht D, Katabi D, Chandrakasan A (2015) Caraoke: an e-toll transponder network for smart cities. In: Proceedings of the 2015 ACM conference on special interest group on data communication, ser. SIGCOMM ’15, pp 297–310

  14. Zhu T, Cao Z, Gong W, He Y, Liu Y (2013) Illuminations and the revelations: lessons learned from greenorbs project development. SIGMOBILE Mob Comput Commun Rev 17(4):42– 46

    Article  Google Scholar 

  15. Shen J, Tan H, Wang J, Wang J, Lee S (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Intell Technol 16(1):170

    Google Scholar 

  16. Wang Z, Song H, Watkins DW, Ong KG, Xue P, Yang Q, Shi X (2015) Cyber-physical systems for water sustainability: challenges and opportunities. IEEE Commun Mag 53(5):216–222

    Article  Google Scholar 

  17. Given DD, Cochran ES, Heaton T, Hauksson E, Allen R, Hellweg P, Vidale J, Bodin P (2014) Technical implementation plan for the shakealert production system: an earthquake early warning system for the west coast of the United States. US Geological Survey, Tech. Rep.

  18. Yang Q, Lim A, Casey K, Neelisetti R-K (2009) An enhanced cpa algorithm for real-time target tracking in wireless sensor networks. Int J Distrib Sens Netw 5(5):619–643

    Article  Google Scholar 

  19. Yang Q, Lim A, Casey K, Neelisetri R-K (2009) An empirical study on real-time target tracking with enhanced cpa algorithm in wireless sensor networks. Adhoc & Sensor Wireless Networks 7

  20. Zhang Y, Sun X, Wang B (2016) Efficient algorithm for k-barrier coverage based on integer linear programming. China Communications 13(7):16–23

    Article  Google Scholar 

  21. Jamieson K, Balakrishnan H, Tay Y (2006) Sift: a mac protocol for event-driven wireless sensor networks. In: Wireless sensor networks. Springer, pp 260–275

  22. Miskowicz M (2009) Average channel utilization of csma with geometric distribution under varying workload. IEEE Trans Ind Inf 5(2):123–131

    Article  Google Scholar 

  23. Tang C, Song L, Balasubramani J, Wu S, Biaz S, Yang Q, Wang H (2014) Comparative investigation on csma/ca-based opportunistic random access for internet of things. IEEE Internet of Things Journal 1(2):171–179

    Article  Google Scholar 

  24. Lu G, Sadagopan N, Krishnamachari B, Goel A (2005) Delay efficient sleep scheduling in wireless sensor networks. In: INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies. Proceedings IEEE, vol 4, pp 2470–2481

  25. Lou C, Zhuang W (2016) Energy-efficient routing over coordinated sleep scheduling in wireless ad hoc networks. Peer-to-Peer Networking and Applications 9(2):384–396

    Article  Google Scholar 

  26. Huang P, Xiao L, Soltani S, Mutka M, Xi N (2013) The evolution of mac protocols in wireless sensor networks: a survey. IEEE Commun Surv Tutorials 15(1):101–120

    Article  Google Scholar 

  27. Almotairi KH, Shen XS (2015) A distributed multi-channel mac protocol for ad hoc wireless networks. IEEE Trans Mob Comput 14(1):1–13

    Article  Google Scholar 

  28. Zhou G, Huang C, Yan T, He T, Stankovic J, Abdelzaher T (2006) Mmsn: Multi-frequency media access control for wireless sensor networks. In: INFOCOM 2006. 25th IEEE international conference on computer communications. Proceedings, pp 1– 13

  29. Kim Y, Shin H, Cha H (2008) Y-mac: an energy-efficient multi-channel mac protocol for dense wireless sensor networks. In: International conference on information processing in sensor networks, 2008. IPSN ’08, pp 53–63

  30. Borms J, Steenhaut K, Lemmens B (2010) Low-overhead dynamic multi-channel mac for wireless sensor networks. In: Wireless sensor networks. Springer, pp 81–96

  31. Tang L, Sun Y, Gurewitz O, Johnson DB (2011) Em-mac: a dynamic multichannel energy-efficient mac protocol for wireless sensor networks. In: Proceedings of the twelfth ACM international symposium on mobile ad hoc networking and computing, ser. Mobihoc ’11, pp 23:1–23:11

  32. Al Nahas B, Duquennoy S, Iyer V, Voigt T (2014) Low-power listening goes multi-channel. In: IEEE international conference on distributed computing in sensor systems (DCOSS), 2014, pp 2– 9

  33. Dunkels A (2011) The ContikiMAC Radio Duty Cycling Protocol, SICS Technical Report T2011: 13

  34. Watteyne T, Molinaro A, Richichi M, Dohler M (2011) From manet to ietf roll standardization: a paradigm shift in wsn routing protocols. IEEE Commun Surv Tutorials 13(4):688–707

    Article  Google Scholar 

  35. Pantazis NA, Nikolidakis SA, Vergados DD (2013) Energy-efficient routing protocols in wireless sensor networks: a survey. IEEE Commun Surv Tutorials 15(2):551–591

    Article  Google Scholar 

  36. Yu S, Zhang B, Li C, Mouftah HT (2014) Routing protocols for wireless sensor networks with mobile sinks: a survey. IEEE Commun Mag 52(7):150–157

    Article  Google Scholar 

  37. Xie S, Wang Y (2014) Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel Pers Commun 78(1):231–246

    Article  Google Scholar 

  38. Schurgers C, Srivastava MB (2001) Energy efficient routing in wireless sensor networks. In: Military communications conference, 2001. MILCOM 2001. Communications for network-centric operations: creating the information force. IEEE, vol 1. IEEE, pp 357–361

  39. Gnawali O, Fonseca R, Jamieson K, Moss D, Levis P (2009) Collection tree protocol. In: Proceedings of the 7th ACM conference on embedded networked sensor systems. ACM, pp 1–14

  40. Ietf roll, https://datatracker.ietf.org/wg/roll/charter/

  41. Winter ET, Thubert EP, Brandt A, Hui J, Kelsey R, Levis P, Pister K, Struik R, Vasseur J, Alexander R (2012) Rpl: Ipv6 routing protocol for low-power and lossy networks. Internet Requests for Comment 6550(5):853–861

    Google Scholar 

  42. Buettner M, Yee GV, Anderson E, Han R (2006) X-mac: a short preamble mac protocol for duty-cycled wireless sensor networks

  43. Doyle PG (2007) The number of latin rectangles. arXiv:math/0703896

  44. Texas instrument inc. cc2420 data sheet. http://www.ti.com

  45. Sun Y, Gurewitz O, Johnson DB (2008) Ri-mac: a receiver-initiated asynchronous duty cycle mac protocol for dynamic traffic loads in wireless sensor networks. In: Proceedings of the 6th ACM conference on embedded network sensor systems. ACM, pp 1–14

Download references

Acknowledgments

The authors would like to thank anonymous reviewers for their valuable comments and constructive suggestions that significantly helped us to improve the quality of this paper. This work was partly supported by the Natural Science Foundation of China (Grant No.61550110244) and Natural Science Foundation of Jiangsu (Grant No.BK20161147).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ye Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Y., Fan, C., Liu, H. et al. Cross-layer cooperative multichannel medium access for internet of things. Peer-to-Peer Netw. Appl. 11, 504–517 (2018). https://doi.org/10.1007/s12083-017-0548-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-017-0548-6

Keywords