2012 IEEE/ACM 16th International Symposium on Distributed Simulation and Real Time Applications 2012
DOI: 10.1109/ds-rt.2012.13
|View full text |Cite
|
Sign up to set email alerts
|

S-TDMA: A New MAC Protocol for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 10 publications
0
4
0
1
Order By: Relevance
“…In S-TDMA, if a node has no data to transmit, it will not have any time slot, thereby, decreasing latency. Simulation results in Boulfekhar et al (2012)indicate that S-TDMA outperforms LEACH protocol in terms of energy efficiency and latency and packet delivery ratio.…”
Section: S-tdmamentioning
confidence: 94%
See 1 more Smart Citation
“…In S-TDMA, if a node has no data to transmit, it will not have any time slot, thereby, decreasing latency. Simulation results in Boulfekhar et al (2012)indicate that S-TDMA outperforms LEACH protocol in terms of energy efficiency and latency and packet delivery ratio.…”
Section: S-tdmamentioning
confidence: 94%
“…In Boulfekhar et al (2012), a TDMA-based energy-efficient MAC protocol named S-TDMA is proposed to maximise network lifetime by reducing major energy wastages such as idle listening, collisions and overhearing. Overhearing is avoided by letting nodes, which are not in the reception period, go to sleep mode.…”
Section: S-tdmamentioning
confidence: 99%
“…1). It exploits the inherent features of Time Division Multiple Access (TDMA) [31,32], to avoid the main sources of energy wastage: collision and control packet overhead. It uses the concept of periodic listen and sleep in order to avoid idle listening and overhearing.…”
Section: Ss-mac Protocol Designmentioning
confidence: 99%
“…Thus, reduction of the event data size plays an important part in the resource conservation mentioned above. We use widely accepted data-centric routing protocol for optimization of routes from sensors to sinks, such as [8,9].…”
Section: Network Architecture and Threat Modelmentioning
confidence: 99%