Skip to main content

Part of the book series: Signals and Communication Technology ((SCT))

  • 562 Accesses

Abstract

Most of the proposed communication protocols exploiting the collaborative nature of WSNs and its correlation characteristics improve energy efficiency. However, they follow the traditional layered protocol architectures; specifically, the majority of these communication protocols are individually developed for different networking layers, i.e., transport, network, medium access control (MAC), and physical layers. While they may realize high performance in terms of the metrics related to each of these individual layers, they are not jointly optimized to maximize the overall network performance while minimizing the energy expenditure. Considering the scarce energy and processing resources of WSNs, joint optimization, and design of networking layers, i.e., cross-layer design, stands as the most promising alternative to inefficient traditional layered protocol architectures.

The basic principle of cross-layer design is to make information available to all levels of the protocol stack. It allows the definition of protocols or mechanisms that do not meet the isolation layers of the OSI model (van der Schaar M, Shankar NS, Wirels Commun 12(4):50–58, 2005; Srivastava V, Motani M, Commun Mag 43(12):112–119, 2005). In fact, cross-layer integration and design techniques result in significant improvement in terms of energy conservation in WSNs (van Hoesel L, Nieberg T, Wu J, Havinga PJM, Wirel Commun 11(6):78–86, 2004; Yetgin H, Cheung KTK, El-Hajjar M, Hanzo L, Trans Veh Technol 64(8):3795–3803, 2015). Several researches started by focusing on the cross-layer interaction and design to develop new communication protocols (Melodia T, Vuran MC, Pompili D, The state of the art in cross-layer design for wireless sensor networks. Vol 3883, in Lecture Notes in Computer Science-Wireless Systems and Network Architectures in Next Generation Internet (EuroNGI), by M Cesana and L Fratta, Berlin/Heidelberg: Springer, pp 78–92, 2005). Yet, these works either provide analytical results without communication protocol design or perform pairwise cross-layer design within limited scope, e.g., only MAC and network layers, which do not consider all of the networking layers involved in WSNs communication, such as transport, network, MAC, and physical layers.

Considering the scarce energy and processing resources of WSNs, joint optimization, and design of networking layers, i.e., cross-layer design, stands as the most promising alternative to inefficient traditional layered protocol architectures. There are considerable benefits of rethinking the protocol functions of networking layers in a unified way so as to provide a single communication module for efficient communication in WSNs.

The truth is deceiving ... it is not what appears to be.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Note that clockwise (counter clockwise) traversal direction refers to the traversal direction of the packets rather than the way the angles are measured.

  2. 2.

    The traffic pattern inherent to WSNs is convergecast, i.e., messages are generated from sensor nodes and are collected by the sink. As a consequence, nodes closer to the sink are more overloaded than others and are subject to premature energy depletion. This issue is known as the funneling effect or the “energy hole problem,” since the neighbors of the sink represent the bottleneck of traffic; it is also called the “crowded center effect.” Mobile elements can help reduce the funneling effect, as they can visit different regions in the network and spread the energy consumption more uniformly, even in the case of a dense WSN architecture.

  3. 3.

    In sinkhole attack, a malicious node advertises itself as a best possible route to the basestation, which deceives its neighbors to use the route more frequently. Thus, the malicious node has the opportunity to tamper with the data, damage the regular operation, or even conduct further challenges to the security of the network.

References

  • Abbagnale, A., Cipollone, E., & F. Cuomo. (2008). Constraining the network topology in IEEE 802.15.4. Vol. 265, in Advances in ad hoc networking: The 7th IFIP annual mediterranean ad hoc networking workshop, by P. Cuenca, C. Guerrero, R. Puigjaner, & B. Serra, 167–178. Boston: Springer.

    Google Scholar 

  • Akan, O., & Akyildiz, I. (2005). Event-to-sink reliable transport in wireless sensor networks. Transactions on Networking (IEEE/ACM), 13(5), 1003–1016.

    Google Scholar 

  • Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002, August). A survey on sensor networks. Communications Magazine (IEEE), 40(8), 102–114.

    Google Scholar 

  • Akyildiz, I. F., Vuran, M. C., & Akan, O. B. (2006). A cross-layer protocol for wireless sensor networks. In 40th annual conference on information sciences and systems (pp. 1102–1107). Princeton: IEEE.

    Google Scholar 

  • Aslam, J., Li, Q., & Rus, D. (2003, March). Three power-aware routing algorithms for sensor networks. Wireless Networks and Mobile Computing (John Wiley & Sons, Inc.), 3(2), 187–208.

    Google Scholar 

  • Bai, Y., Liu, S., Sha, M., Lu, Y., & Xu, C. (2008, November). An energy optimization protocol based on cross-layer for wireless sensor networks. Journal of Communications (Academy Publisher), 3(6), 27–34.

    Google Scholar 

  • Baronti, P., Pillai, P., Chook, V., Chessa, S., Gotta, A., & Hu, Y. (2007). Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards. Computer Communications (Elsevier B.V.), 30(7), 1655–1695.

    Google Scholar 

  • Bechkit, W., Challal, Y., Bouabdallah, A., & Tarokh, V. (2013). A highly scalable key pre-distribution scheme for wireless sensor networks. Transactions on Wireless Communications (IEEE), 12(2), 948–959.

    Google Scholar 

  • Bouabdallah, F., Bouabdallah, N., & Boutaba, R. (2009). On balancing energy consumption in wireless sensor networks. Transactions on Vehicular Technology (IEEE), 58(6), 2909–2924.

    Google Scholar 

  • Cardei, M., & Du, D.-Z. (2005, May). Improving wireless sensor network lifetime through power aware organization. Wireless Networks (Springer Nature), 11, 333–340.

    Google Scholar 

  • Casari, P., Nati, M., Petrioli, C., & Zorzi, M. (2006). ALBA: An adaptive load-balanced algorithm for geographic forwarding in wireless sensor networks. In The conference on Military Communications (MILCOM) (pp. 1–9). Washington, DC: IEEE.

    Google Scholar 

  • Chang, J.-H., & Tassiulas, L. (2004, August). Maximum lifetime routing in wireless sensor networks. Transactions on Networking (IEEE/ACM), 12(4), 609–619.

    Google Scholar 

  • Chen, D., & Varshney, P. K.. (2007First Quarter). A survey of void handling techniques for geographic routing in wireless networks. Communications Surveys & Tutorials (IEEE) 91 50–67.

    Google Scholar 

  • Chen, B., Jamieson, K., Balakrishnan, H., & Morris, R. (2002, September). Span: An energy-efficient coordination algorithm for topology maintenance in Ad Hoc wireless networks. Wireless Networks (Kluwer Academic Publishers), 8(5), 481–494.

    Google Scholar 

  • Chiang, M. (2005, January). Balancing transport and physical layers in wireless multihop networks: Jointly optimal congestion control and power control. Journal on Selected Areas in Communications (IEEE), 23(1), 104–116.

    Google Scholar 

  • Chilamkurti, N., Zeadally, S., Vasilakos, A., & Sharma, V. (2009, April). Cross-layer support for energy efficient routing in wireless sensor networks. Journal of Sensors (Hindawi), 2009, 1–9.

    Google Scholar 

  • Cipollone, E., Cuomo, F., Luna, S. D., Monaco, U., & Vacirca, F. (2007). Topology characterization and performance analysis of IEEE 802.15.4 multi-sink wireless sensor networks. In The 6th annual mediterranean ad hoc networking workshop (pp. 196–203). Corfu: Ionian University.

    Google Scholar 

  • Crossbow. (2002January 1). MICA2. . http://www.eol.ucar.edu/isf/facilities/isa/internal/CrossBow/DataSheets/mica2.pdf. Accessed 3 Feb 2014.

  • Cuomo, F., Luna, S. D., Monaco, U., & Melodia, T. (2007). Routing in ZigBee: benefits from exploiting the IEEE 802.15.4 association tree. In International Conference on Communications (ICC) (pp. 3271–3276). Glasgow: IEEE.

    Google Scholar 

  • Cuomo, F., Abbagnale, A., & Cipollone, E. (2013, March). Cross-layer network formation for energy-efficient IEEE 802.15.4/ZigBee wireless sensor networks. Ad Hoc Networks (Elsevier B.V.), 11(2), 672–686.

    Google Scholar 

  • Deng, J., Han, Y., Varshney, P. K., Katz, J., & Khalili, A. (2005, May). A pairwise key predistribution scheme for wireless sensor networks. Transactions on Information and System Security (ACM), 8(2), 228–258.

    Google Scholar 

  • Ding, G., Sahinoglu, Z., Orlik, P., Zhang, J., & Bhargava, B. (2006, November). Tree-based data broadcast in IEEE 802.15.4 and ZigBee networks. Transactions on Mobile Computing (IEEE), 5(11), 1561–1574.

    Google Scholar 

  • Dobson, S. A., et al. (2006, December). A survey of autonomic communications. Transactions on Autonomous and Adaptive Systems (ACM), 1(2), 223–259.

    Google Scholar 

  • Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In The 9th conference on Computer and Communications Security (CCS) (pp. 41–47). Washington, DC: ACM.

    Google Scholar 

  • Fu, B., Xiao, Y., Deng, H., & Zeng, H. (2014). A survey of cross-layer designs in wireless networks. Communications Surveys & Tutorials (IEEE), 16(1), 110–126.

    Google Scholar 

  • Gu, Y., Hwang, G., He, T., & Du, D. (2007). uSense: A unified asymmetric sensing coverage architecture for wireless sensor networks. In The 27th International Conference on Distributed Computing Systems (ICDCS). IEEE: Toronto.

    Google Scholar 

  • Haapola, J., Shelby, Z., Pomalaza-Ráez, C., & Mähönen, P. (2005). Cross-layer energy analysis of multi-hop wireless sensor networks. In The 2nd international conference on Embedded Wireless Systems and Networks (EWSN) (pp. 33–44). Istanbul: ACM/SIGBED.

    Google Scholar 

  • Han, G., Dong, Y., Guo, H., Shu, L., & Wu, D. (2015, November). Cross-layer optimized routing in wireless sensor networks with duty cycle and energy harvesting. Wireless Communications and Mobile Computing (John Wiley & Sons, Inc.), 15(16), 1957–1981.

    Google Scholar 

  • Hefeida, M. S., Canli, T., & Khokhar, A. (2013, January). CL-MAC: A cross-layer mac protocol for heterogeneous wireless sensor networks. Ad Hoc Networks (Elsevier B.V.), 11(1), 213–225.

    Google Scholar 

  • Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., & Pister, K. (2000). System architecture directions for networked sensors. In The 9th international conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS IX) (pp. 93–104). Cambridge, MA: ACM.

    Google Scholar 

  • Holland, M., Wang, T., Tavli, B., Seyedi, A., & Heinzelman, W. (2011, February). Optimizing physical layer parameters for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN) (ACM), 7(4), 28:1–28:20.

    Google Scholar 

  • Hu, Y., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks (Springer Nature), 11, 21–38.

    Google Scholar 

  • Jones, K. H., Wadaa, A. H., Olariu, S., Wilson, L. T., & Eltoweissy, M. Y. (2003). Towards a new paradigm for securing wireless sensor networks. In The workshop on New Security Paradigms (NSPW) (pp. 115–121). Ascona: ACM.

    Google Scholar 

  • Karp, B., & Kung, H. T. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In The 6th annual international conference on Mobile Computing and Networking (MobiCom) (pp. 243–254). Boston: ACM SIGMOBILE.

    Chapter  Google Scholar 

  • Kawadia, V., & Kumar, P. R. (2005, February). A cautionary perspective on cross-layer design. Wireless Communications (IEEE), 12, 3–11.

    Google Scholar 

  • Kim, W. S., Kim, I. W., Hong, S. E., & Kang, C. G. (2003, August). A Seamless Coordinator Switching (SCS) scheme for wireless personal area network. Transactions on Consumer Electronics (IEEE), 49(3), 554–560.

    Google Scholar 

  • Kim, J., Lee, J., & Kim, S. (2009). An enhanced cross-layer protocol for energy efficiency in wireless sensor networks. In The 3rd international conference on Sensor Technologies and Applications (pp. 657–664). Glyfada: IEEE.

    Google Scholar 

  • Kumar, V., Jain, A., & Barwal, P. N. (2014). Wireless sensor networks: Security issues, challenges and solutions. International Journal of Information & Computation Technology (International Research Publications House), 4(8), 859–868.

    Google Scholar 

  • Lachenmann, A., Marrón, P. J., Minder, D., & Rothermel, K. (2005). An analysis of cross-layer interactions in sensor network applications. In International conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) (pp. 121–126). Melbourne: IEEE.

    Google Scholar 

  • LAN/MAN Standards Committee. (2006). Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). Computer Society, Washington, DC: IEEE.

    Google Scholar 

  • Lazos, L., & Poovendran, R. (2004). Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks. In International Conference on Communications (ICC) (pp. 3633–3639). Paris, France: IEEE.

    Google Scholar 

  • Leong, B., Mitra, S., & Liskov, B. (2005). Path vector face routing: Geographic routing with local face information. In The 13th international conference on Network Protocols (ICNP) (pp. 147–158). Boston: IEEE.

    Chapter  Google Scholar 

  • Li, J., & Mohapatra, P. (2007, June). Analytical modeling and mitigation techniques for the energy hole problem in sensor networks. Pervasive and Mobile Computing (Elsevier B.V.), 3(3), 233–254.

    Google Scholar 

  • Liu, D., & Ning, P. (2003). Location-based pairwise key establishments for Static Sensor Networks (SASN). In The 1st workshop on Security of Ad Hoc and Sensor Networks (pp. 72–82). Fairfax: ACM.

    Google Scholar 

  • Liu, J., Zhao, F., Cheung, P., & Guibas, L. (2004, December). Apply geometric duality to energy-efficient non-local phenomenon awareness using sensor networks. Wireless Communications (IEEE), 11(6).

    Google Scholar 

  • Liu, D., Ning, P., & Li, R. (2005a, February). Establishing pairwise keys in distributed sensor networks. Transactions on Information and System Security (ACM), 8(1), 52–61.

    Google Scholar 

  • Liu, Y., Elhanany, I., & Qi, H. (2005b). An Energy-Efficient QoS-Aware Media Access Control Protocol for Wireless Sensor Networks. In The International Conference on Mobile Adhoc and Sensor Systems (MASS) (pp. 189–191). Washington, DC: IEEE.

    Google Scholar 

  • Liu, S., Bai, Y., Sha, M., Deng, Q., & Qian, D. (2008). CLEEP: A Novel Cross-Layer Energy-Efficient Protocol for Wireless Sensor Networks. In The 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom) (pp. 1–4). Dalian, China: IEEE.

    Google Scholar 

  • Lo Bello, L., & Toscano, E. (2009, May). Coexistence issues of multiple co-located IEEE 802.15.4/ZigBee networks running on adjacent radio channels in industrial environments. Transactions on industrial informatics (IEEE), 5(2), 157–167.

    Google Scholar 

  • Madan, R., Cui, S., Lall, S., & Goldsmith, A. (2006, November). Cross-layer design for lifetime maximization in interference-limited wireless sensor networks. Transactions on Wireless Communications (IEEE), 5(11), 725–729.

    Google Scholar 

  • Madden, S., Franklin, M. J., Hellerstein, J. M., & Hong, W. (2002, Winter). Tag: A tiny aggregation service for ad hoc sensor networks. Operating Systems Review, 36, 131–146.

    Article  Google Scholar 

  • Madden, S., Franklin, M. J., Hellerstein, J. M., & Hong, W. (2003). The design of an acquisitional query processor for sensor networks. In The international conference on Management of Data (SIGMOD) (pp. 491–502). San Diego: ACM SIGMOD.

    Google Scholar 

  • Madden, S. R., Franklin, M. J., Hellerstein, J. M., & Hong, W. (2005). TinyDB: An acquisitional query processing system for sensor networks. Transactions on Database Systems (TODS) (ACM), 30(1), 122–173.

    Google Scholar 

  • Melodia, T., Vuran, M. C., & Pompili, D. (2005). The state of the art in cross-layer design for wireless sensor networks. Vol. 3883, in Lecture notes in computer science-wireless systems and network architectures in Next Generation Internet (EuroNGI), by M. Cesana & L. Fratta, 78–92. Berlin/Heidelberg: Springer, .

    Google Scholar 

  • Min, R., Bhardwaj, M., Ickes, N., Wang, A., & Chandrakasan, A. (2002). Microsensors, the hardware and the network: Total-system strategies for power aware wireless. In CAS workshop on wireless communications and networking. IEEE: Pasadena.

    Google Scholar 

  • Moore, D. C., Leonard, J. J., Rus, D. L., & Teller, S. J. (2004). Robust distributed network localization with noisy range measurements. In The 2nd international conference on Embedded Networked Sensor Systems (SenSys) (pp. 50–61). Baltimore: ACM.

    Chapter  Google Scholar 

  • Naeem, T., & Loo, K. K. (2009, March). Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks. International Journal of Digital Content Technology and its Applications (JDCTA) (Advanced Institute of Convergence IT), 3(1), 88–93.

    Google Scholar 

  • Nath, S. K., & Gibbons, P. B. (2007). Communicating via fireflies: Geographic routing on duty-cycled sensors. In The 6th international conference on Information Processing in Sensor Networks (IPSN) (pp. 440–449). Cambridge, MA: ACM.

    Google Scholar 

  • Pathan, A. S. K., Lee, H.-W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. In The 8th International Conference Advanced Communication Technology (ICACT) (pp. 1043–1048). Phoenix Park, IEEE.

    Google Scholar 

  • Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002, September). SPINS: Security protocols for sensor networks. Wireless Networks (Springer Nature), 8, 521–534.

    Google Scholar 

  • Perrig, A., Stankovic, J., & Wagner, D. (2004, June). Security in wireless sensor networks. Communications (ACM), 47(6), 53–57.

    Google Scholar 

  • Petrioli, C., Nati, M., Casari, P., Zorzi, M., & Basagni, S. (2014, March). ALBA-R: Load-balancing geographic routing around connectivity holes in wireless sensor networks. Transactions on Parallel and Distributed Systems (IEEE), 25(3), 529–539.

    Google Scholar 

  • Pichler, M., Schwarzer, S., Stelzer, A., & Vossiek, M. (2009, October). Multi-channel distance measurement with IEEE 802.15.4 (ZigBee) devices. Journal of Selected Topics in Signal Processing (IEEE), 3(5), 845–859.

    Google Scholar 

  • Pompili, D., & Akyildiz, I. F. (2010, September). A multimedia cross-layer protocol for underwater acoustic sensor networks. Transactions on Wireless Communications (IEEE), 9(9), 2924–2933.

    Google Scholar 

  • Pompili, D., Vuran, M. C., & Melodia, T. (2006). Cross-layer design in wireless sensor networks. In M. P. Mahalik (Ed.), Sensor network and configuration: fundamentals, techniques, platforms, and experiments. Berlin/Heidelberg: Springer.

    Google Scholar 

  • Popa, L., Rostamizadeh, A., Karp, R., Papadimitriou, C., & Stoica, I. (2007). Balancing traffic load in wireless networks with curveball routing. In The 8th international symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (pp. 170–179). Quebec: ACM.

    Google Scholar 

  • Puccinelli, D., Sifakis, E., & Haenggi, M. (2006). A cross-layer approach to energy balancing in wireless sensor networks. Vol. 331, in Lecture notes in control and information: Networked embedded sensing and control, by P. Tabuada, 309–324. Berlin/Heidelberg: Springer

    Google Scholar 

  • Salido, J., Lazos, L., & Poovendran, R. (2007, December). Energy and bandwidth-efficient key distribution in wireless ad hoc networks: A cross-layer approach. Transactions on Networking (IEEE/ACM), 15(6), 1527–1540.

    Google Scholar 

  • Santi, P. (2005, June). Topology control in wireless ad hoc and sensor networks. Computing Surveys (CSUR) (ACM), 37(2), 164–194.

    Google Scholar 

  • Seada, K., Zúñiga, M. A., Helmy, A., & Krishnamachari, B. (2004). Energy-efficient forwarding strategies for geographic routing in lossy wireless sensor networks. In The 2nd international conference on Embedded Networked Sensor Systems (SenSys) (pp. 108–121). Baltimore: ACM.

    Chapter  Google Scholar 

  • Semchedine, F., Bouallouche-Medjkoune, L., Bennacer, L., Aber, N., & Aïssani, D. (2012). Routing protocol based on tabu search for wireless sensor networks. Wireless Personal Communications (Springer Nature), 67, 105–112.

    Google Scholar 

  • Shafiei, H., Khonsariab, A., Derakhshia, H., & Mousavia, P. (2014, May). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences (Elsevier B.V.), 80(3), 644–653.

    Google Scholar 

  • Shah, R. C., & Rabaey, J. M. (2002). Energy aware routing for low energy ad hoc sensor networks. In Wireless Communications and Networking Conference (WCNC) (pp. 350–355). Orlando: IEEE.

    Google Scholar 

  • Shi, E., & Perrig, A. (2004, December). Designing secure sensor networks. Wireless Communications (IEEE), 11(6), 38–43.

    Google Scholar 

  • Shu, L., Zhang, Y., Yang, L. T., Wang, Y., Hauswirth, M., & Xiong, N. (2010, June). TPGF: Geographic routing in wireless multimedia sensor networks. Telecommunication Systems (Springer Nature Switzerland, AG), 44, 79–95.

    Google Scholar 

  • Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., & Srivastava, M. B. (2002). On communication security in wireless ad-hoc sensor networks. In The 11th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE) (pp. 139–144). Los Alamitos: IEEE.

    Google Scholar 

  • Song, L., & Hatzinakos, D. (2007, February). A cross-layer architecture of wireless sensor networks for target tracking. Transactions on Networking (IEEE/ACM), 15(1), 145–158.

    Google Scholar 

  • Srivastava, V., & Motani, M. (2005, December). Cross-layer design: A survey and the road ahead. Communications Magazine (IEEE), 43(12), 112–119.

    Google Scholar 

  • Suh, C., Ko, Y.-B., & Son, D.-M.. (2006). An energy efficient cross-layer mac protocol for wireless sensor networks. Vol. 3842, in Lecture notes in computer science-advanced web and network technologies, and applications (APWeb), by H.T. Shen, J. Li, M. Li, J. Ni, & W. Wang, 410–419. Berlin/Heidelberg: Springer.

    Google Scholar 

  • Sulaiman, T. H., Sivarajah, K., Al-Raweshidy, H. S. (2007, December). Improved PNC selection criteria and process for IEEE802.15.3. Communications Magazine (IEEE), 45(12), 102–109.

    Google Scholar 

  • Urrutia, J. (2007, September). Local Solutions for Global Problems in Wireless Networks. Journal of Discrete Algorithms (Elsevier B.V.), 5(3), 395–407.

    Google Scholar 

  • van Dam, T., & Langendoen, K. (2003). An adaptive energy-efficient MAC protocol for wireless sensor networks. In The 1st international conference on Embedded Networked Sensor Systems (SenSys) (pp. 171–180). Los Angeles: ACM.

    Google Scholar 

  • van der Schaar, M., & Shankar, N. S. (2005, August). Cross-layer wireless multimedia transmission: Challenges, principles, and new paradigms. Wireless Communications (IEEE), 12(4), 50–58.

    Google Scholar 

  • van Hoesel, L., Nieberg, T., Wu, J., & Havinga, P. J. M. (2004, December). Prolonging the lifetime of wireless sensor networks by cross-layer interaction. Wireless Communications (IEEE), 11(6), 78–86.

    Google Scholar 

  • Venkitasubramaniam, P., Adireddy, S., & Tong, L. (2003). Opportunistic ALOHA and cross layer design for sensor networks. In Military Communications Conference (MILCOM) (pp. 705–710). Boston: IEEE.

    Google Scholar 

  • Vuran, M. C., & Akyildiz, I. F. (2006, April). Spatial correlation-based collaborative medium access control in wireless sensor networks. Transactions on Networking (IEEE/ACM), 14(2), 316–329.

    Google Scholar 

  • Vuran, M. C., & Akyildiz, I. F. (2009, August). Error control in wireless sensor networks: A cross layer analysis. Transactions on Networking (IEEE/ACM), 17(4), 1186–1199.

    Google Scholar 

  • Vuran, M. C., & Akyildiz, I. F. (2010, November). XLP: A cross-layer protocol for efficient communication in wireless sensor networks. Transactions on Mobile Computing (IEEE), 9(11), 1578–1591.

    Google Scholar 

  • Wang, Y. (2008). Topology control for wireless sensor networks. In Y. Li, M. T. Thai, & W. Wu (Eds.), Wireless sensor networks and applications. Signals and communication technology (pp. 113–147). Boston: Springer.

    Chapter  Google Scholar 

  • Wang, F., & Liu, J. (2009). Duty-cycle-aware broadcast in wireless sensor networks. In The 28th international conference on Computer Communications (INFOCOM) (pp. 468–476). Rio de Janeiro: IEEE.

    Google Scholar 

  • Wang, X., Xing, G., Zhang, Y., Lu, C., Pless, R. B., & Gill, C. (2003). Integrated coverage and connectivity configuration in wireless sensor networks. In The 1st international conference on Embedded Networked Sensor Systems (SenSys) (pp. 28–39). Los Angeles: ACM.

    Chapter  Google Scholar 

  • Wattenhofer, R., Li, L., Bahl, P., & Wang, Y.-M. (2001). Distributed topology control for power efficient operation in multihop wireless ad hoc networks. In The conference on computer communications – The 20th annual joint conference of the IEEE Computer and Communications Societies (INFOCOMM) (pp. 1388–1397). Anchorage, IEEE.

    Google Scholar 

  • Wood, A. D., & Stankovic, J. A. (2002, October). Denial of service in sensor networks. Computer (IEEE), 35(10), 54–62.

    Google Scholar 

  • worldometer. (2020January 1). COVID-19 Coronavirus Pandemic. https://www.worldometers.info/coronavirus/? Accessed 8 July 2020.

  • Xiao, M., Wang, X., & Yang, G. (2006a). Cross-layer design for the security of wireless sensor networks. In The 6th world congress on intelligent control and automation (pp. 104–108). Dalian: IEEE.

    Google Scholar 

  • Xiao, M., Wang, X., & Yang, G. (2006b). Cross-layer design for WSNs security. In Y. Xiao (Ed.), Security in sensor networks (pp. 311–328). Boca Raton: CRC Press.

    Chapter  Google Scholar 

  • Xie, P., & Cui, J.-H. (2007). R-MAC: An energy-efficient MAC protocol for underwater sensor networks. In The 2nd international conference on Wireless Algorithms, Systems and Applications (WASA) (pp. 187–198). Chicago: IEEE.

    Chapter  Google Scholar 

  • Xue, Q., & Ganz, A. (2003). Runtime security composition for sensor networks (SecureSense). In The 58th Vehicular Technology Conference (VTC) (pp. 2976–2980). Orlando, FL: IEEE.

    Google Scholar 

  • Yan, T., He, T., & Stankovic, J. A. (2003). Differentiated surveillance for sensor networks. In The 1st international conference on Embedded Networked Sensor Systems (SenSys) (pp. 51–62). Los Angeles: ACM.

    Chapter  Google Scholar 

  • Ye, W., Heidemann, J., & Estrin, D. (2002). An energy-efficient MAC protocol for wireless sensor networks. In The 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) (pp. 1567–1576). New York: IEEE.

    Google Scholar 

  • Ye, W., Heidemann, J., & Estrin, D. (2004, June). Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Transactions on Networking (IEEE/ACM), 12(3), 493–506.

    Google Scholar 

  • Ye, F., Luo, H., Lu, S., & Zhang, L. (2005, April). Statistical en-route filtering of injected false data in sensor networks. Journal on Selected Areas in Communications (IEEE), 23(4), 839–850.

    Google Scholar 

  • Yessad, S., Bouallouche, L., & Aissani, D. (2011). Proposition and evaluation of a novel routing protocol for wireless sensor networks. In The 5th international workshop on Verification and Evaluation of Computer and Communication Systems (VECOS) (pp. 1–9). Tunis: BCS, The Chartered Institute for IT.

    Google Scholar 

  • Yessad, S., Tazarart, N., Bakli, L., Medjkoune-Bouallouche, L., & Aissani, D. (2012). Balanced energy efficient routing protocol for WSN. In International Conference on Communications and Information Technology (ICCIT) (pp. 326–330). Hammamet: IEEE.

    Google Scholar 

  • Yessad, S., Bouallouche-Medjkoune, L., & Aïssani, D. (2015). A cross-layer routing protocol for balancing energy consumption in wireless sensor networks. Wireless Personal Communications (Springer Nature), 81, 1303–1320.

    Google Scholar 

  • Yetgin, H., Cheung, K. T. K., El-Hajjar, M., & Hanzo, L. (2015, August). Cross-layer network lifetime maximization in interference-limited WSNs. Transactions on Vehicular Technology (IEEE), 64(8), 3795–3803.

    Google Scholar 

  • Yu, Z., & Guan, Y. (2008, October). A key management scheme using deployment knowledge for wireless sensor networks. Transactions on Parallel and Distributed Systems (IEEE), 19(10), 1411–1425.

    Google Scholar 

  • Yuan, Z., Wang, L., Shu, L., Hara, T., & Qin, Z. (2011). A Balanced Energy Consumption Sleep Scheduling Algorithm in Wireless Sensor Networks. In The 7th International Wireless Communications and Mobile Computing Conference (IWCMC) (pp. 831–835). Istanbul, Turkey: IEEE.

    Google Scholar 

  • Zamalloa, M. Z., Seada, K., Krishnamachari, B., & Helmy, A. (2008, June). Efficient geographic routing over lossy links in wireless sensor networks. Transactions on Sensor Networks (ACM).

    Google Scholar 

  • Zhang, J., & Varadharajan, V. (2010, March). Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications (Elsevier B.V.), 33(2), 63–75.

    Google Scholar 

  • Zigbee Alliance. (2020). Zigbee. Zigbee Alliance. January, 1. https://zigbeealliance.org/solution/zigbee/. Accessed 18 Apr 2020.

  • Zorzi, M., & Rao, R. R. (2003, October/December). Geographic Random Forwarding (GeRaF) for ad hoc and sensor networks: Multihop performance. Transactions on Mobile Computing (IEEE), 2(4), 337–348.

    Google Scholar 

  • Zuniga, M., & Krishnamachari, B. (2004). Analyzing the transitional region in low power wireless links. In 1st annual communications society conference on Sensor and Ad Hoc Communications and Networks (SECON) (pp. 517–526). Santa Clara: IEEE.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Fahmy, H.M.A. (2021). Cross-Layer Protocols for WSNs. In: Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-58015-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-58015-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-58014-8

  • Online ISBN: 978-3-030-58015-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics