Abstract
Most of the proposed communication protocols exploiting the collaborative nature of WSNs and its correlation characteristics improve energy efficiency. However, they follow the traditional layered protocol architectures; specifically, the majority of these communication protocols are individually developed for different networking layers, i.e., transport, network, medium access control (MAC), and physical layers. While they may realize high performance in terms of the metrics related to each of these individual layers, they are not jointly optimized to maximize the overall network performance while minimizing the energy expenditure. Considering the scarce energy and processing resources of WSNs, joint optimization, and design of networking layers, i.e., cross-layer design, stands as the most promising alternative to inefficient traditional layered protocol architectures.
The basic principle of cross-layer design is to make information available to all levels of the protocol stack. It allows the definition of protocols or mechanisms that do not meet the isolation layers of the OSI model (van der Schaar M, Shankar NS, Wirels Commun 12(4):50–58, 2005; Srivastava V, Motani M, Commun Mag 43(12):112–119, 2005). In fact, cross-layer integration and design techniques result in significant improvement in terms of energy conservation in WSNs (van Hoesel L, Nieberg T, Wu J, Havinga PJM, Wirel Commun 11(6):78–86, 2004; Yetgin H, Cheung KTK, El-Hajjar M, Hanzo L, Trans Veh Technol 64(8):3795–3803, 2015). Several researches started by focusing on the cross-layer interaction and design to develop new communication protocols (Melodia T, Vuran MC, Pompili D, The state of the art in cross-layer design for wireless sensor networks. Vol 3883, in Lecture Notes in Computer Science-Wireless Systems and Network Architectures in Next Generation Internet (EuroNGI), by M Cesana and L Fratta, Berlin/Heidelberg: Springer, pp 78–92, 2005). Yet, these works either provide analytical results without communication protocol design or perform pairwise cross-layer design within limited scope, e.g., only MAC and network layers, which do not consider all of the networking layers involved in WSNs communication, such as transport, network, MAC, and physical layers.
Considering the scarce energy and processing resources of WSNs, joint optimization, and design of networking layers, i.e., cross-layer design, stands as the most promising alternative to inefficient traditional layered protocol architectures. There are considerable benefits of rethinking the protocol functions of networking layers in a unified way so as to provide a single communication module for efficient communication in WSNs.
The truth is deceiving ... it is not what appears to be.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Note that clockwise (counter clockwise) traversal direction refers to the traversal direction of the packets rather than the way the angles are measured.
- 2.
The traffic pattern inherent to WSNs is convergecast, i.e., messages are generated from sensor nodes and are collected by the sink. As a consequence, nodes closer to the sink are more overloaded than others and are subject to premature energy depletion. This issue is known as the funneling effect or the “energy hole problem,” since the neighbors of the sink represent the bottleneck of traffic; it is also called the “crowded center effect.” Mobile elements can help reduce the funneling effect, as they can visit different regions in the network and spread the energy consumption more uniformly, even in the case of a dense WSN architecture.
- 3.
In sinkhole attack, a malicious node advertises itself as a best possible route to the basestation, which deceives its neighbors to use the route more frequently. Thus, the malicious node has the opportunity to tamper with the data, damage the regular operation, or even conduct further challenges to the security of the network.
References
Abbagnale, A., Cipollone, E., & F. Cuomo. (2008). Constraining the network topology in IEEE 802.15.4. Vol. 265, in Advances in ad hoc networking: The 7th IFIP annual mediterranean ad hoc networking workshop, by P. Cuenca, C. Guerrero, R. Puigjaner, & B. Serra, 167–178. Boston: Springer.
Akan, O., & Akyildiz, I. (2005). Event-to-sink reliable transport in wireless sensor networks. Transactions on Networking (IEEE/ACM), 13(5), 1003–1016.
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002, August). A survey on sensor networks. Communications Magazine (IEEE), 40(8), 102–114.
Akyildiz, I. F., Vuran, M. C., & Akan, O. B. (2006). A cross-layer protocol for wireless sensor networks. In 40th annual conference on information sciences and systems (pp. 1102–1107). Princeton: IEEE.
Aslam, J., Li, Q., & Rus, D. (2003, March). Three power-aware routing algorithms for sensor networks. Wireless Networks and Mobile Computing (John Wiley & Sons, Inc.), 3(2), 187–208.
Bai, Y., Liu, S., Sha, M., Lu, Y., & Xu, C. (2008, November). An energy optimization protocol based on cross-layer for wireless sensor networks. Journal of Communications (Academy Publisher), 3(6), 27–34.
Baronti, P., Pillai, P., Chook, V., Chessa, S., Gotta, A., & Hu, Y. (2007). Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards. Computer Communications (Elsevier B.V.), 30(7), 1655–1695.
Bechkit, W., Challal, Y., Bouabdallah, A., & Tarokh, V. (2013). A highly scalable key pre-distribution scheme for wireless sensor networks. Transactions on Wireless Communications (IEEE), 12(2), 948–959.
Bouabdallah, F., Bouabdallah, N., & Boutaba, R. (2009). On balancing energy consumption in wireless sensor networks. Transactions on Vehicular Technology (IEEE), 58(6), 2909–2924.
Cardei, M., & Du, D.-Z. (2005, May). Improving wireless sensor network lifetime through power aware organization. Wireless Networks (Springer Nature), 11, 333–340.
Casari, P., Nati, M., Petrioli, C., & Zorzi, M. (2006). ALBA: An adaptive load-balanced algorithm for geographic forwarding in wireless sensor networks. In The conference on Military Communications (MILCOM) (pp. 1–9). Washington, DC: IEEE.
Chang, J.-H., & Tassiulas, L. (2004, August). Maximum lifetime routing in wireless sensor networks. Transactions on Networking (IEEE/ACM), 12(4), 609–619.
Chen, D., & Varshney, P. K.. (2007First Quarter). A survey of void handling techniques for geographic routing in wireless networks. Communications Surveys & Tutorials (IEEE) 91 50–67.
Chen, B., Jamieson, K., Balakrishnan, H., & Morris, R. (2002, September). Span: An energy-efficient coordination algorithm for topology maintenance in Ad Hoc wireless networks. Wireless Networks (Kluwer Academic Publishers), 8(5), 481–494.
Chiang, M. (2005, January). Balancing transport and physical layers in wireless multihop networks: Jointly optimal congestion control and power control. Journal on Selected Areas in Communications (IEEE), 23(1), 104–116.
Chilamkurti, N., Zeadally, S., Vasilakos, A., & Sharma, V. (2009, April). Cross-layer support for energy efficient routing in wireless sensor networks. Journal of Sensors (Hindawi), 2009, 1–9.
Cipollone, E., Cuomo, F., Luna, S. D., Monaco, U., & Vacirca, F. (2007). Topology characterization and performance analysis of IEEE 802.15.4 multi-sink wireless sensor networks. In The 6th annual mediterranean ad hoc networking workshop (pp. 196–203). Corfu: Ionian University.
Crossbow. (2002January 1). MICA2. . http://www.eol.ucar.edu/isf/facilities/isa/internal/CrossBow/DataSheets/mica2.pdf. Accessed 3 Feb 2014.
Cuomo, F., Luna, S. D., Monaco, U., & Melodia, T. (2007). Routing in ZigBee: benefits from exploiting the IEEE 802.15.4 association tree. In International Conference on Communications (ICC) (pp. 3271–3276). Glasgow: IEEE.
Cuomo, F., Abbagnale, A., & Cipollone, E. (2013, March). Cross-layer network formation for energy-efficient IEEE 802.15.4/ZigBee wireless sensor networks. Ad Hoc Networks (Elsevier B.V.), 11(2), 672–686.
Deng, J., Han, Y., Varshney, P. K., Katz, J., & Khalili, A. (2005, May). A pairwise key predistribution scheme for wireless sensor networks. Transactions on Information and System Security (ACM), 8(2), 228–258.
Ding, G., Sahinoglu, Z., Orlik, P., Zhang, J., & Bhargava, B. (2006, November). Tree-based data broadcast in IEEE 802.15.4 and ZigBee networks. Transactions on Mobile Computing (IEEE), 5(11), 1561–1574.
Dobson, S. A., et al. (2006, December). A survey of autonomic communications. Transactions on Autonomous and Adaptive Systems (ACM), 1(2), 223–259.
Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In The 9th conference on Computer and Communications Security (CCS) (pp. 41–47). Washington, DC: ACM.
Fu, B., Xiao, Y., Deng, H., & Zeng, H. (2014). A survey of cross-layer designs in wireless networks. Communications Surveys & Tutorials (IEEE), 16(1), 110–126.
Gu, Y., Hwang, G., He, T., & Du, D. (2007). uSense: A unified asymmetric sensing coverage architecture for wireless sensor networks. In The 27th International Conference on Distributed Computing Systems (ICDCS). IEEE: Toronto.
Haapola, J., Shelby, Z., Pomalaza-Ráez, C., & Mähönen, P. (2005). Cross-layer energy analysis of multi-hop wireless sensor networks. In The 2nd international conference on Embedded Wireless Systems and Networks (EWSN) (pp. 33–44). Istanbul: ACM/SIGBED.
Han, G., Dong, Y., Guo, H., Shu, L., & Wu, D. (2015, November). Cross-layer optimized routing in wireless sensor networks with duty cycle and energy harvesting. Wireless Communications and Mobile Computing (John Wiley & Sons, Inc.), 15(16), 1957–1981.
Hefeida, M. S., Canli, T., & Khokhar, A. (2013, January). CL-MAC: A cross-layer mac protocol for heterogeneous wireless sensor networks. Ad Hoc Networks (Elsevier B.V.), 11(1), 213–225.
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., & Pister, K. (2000). System architecture directions for networked sensors. In The 9th international conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS IX) (pp. 93–104). Cambridge, MA: ACM.
Holland, M., Wang, T., Tavli, B., Seyedi, A., & Heinzelman, W. (2011, February). Optimizing physical layer parameters for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN) (ACM), 7(4), 28:1–28:20.
Hu, Y., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks (Springer Nature), 11, 21–38.
Jones, K. H., Wadaa, A. H., Olariu, S., Wilson, L. T., & Eltoweissy, M. Y. (2003). Towards a new paradigm for securing wireless sensor networks. In The workshop on New Security Paradigms (NSPW) (pp. 115–121). Ascona: ACM.
Karp, B., & Kung, H. T. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In The 6th annual international conference on Mobile Computing and Networking (MobiCom) (pp. 243–254). Boston: ACM SIGMOBILE.
Kawadia, V., & Kumar, P. R. (2005, February). A cautionary perspective on cross-layer design. Wireless Communications (IEEE), 12, 3–11.
Kim, W. S., Kim, I. W., Hong, S. E., & Kang, C. G. (2003, August). A Seamless Coordinator Switching (SCS) scheme for wireless personal area network. Transactions on Consumer Electronics (IEEE), 49(3), 554–560.
Kim, J., Lee, J., & Kim, S. (2009). An enhanced cross-layer protocol for energy efficiency in wireless sensor networks. In The 3rd international conference on Sensor Technologies and Applications (pp. 657–664). Glyfada: IEEE.
Kumar, V., Jain, A., & Barwal, P. N. (2014). Wireless sensor networks: Security issues, challenges and solutions. International Journal of Information & Computation Technology (International Research Publications House), 4(8), 859–868.
Lachenmann, A., Marrón, P. J., Minder, D., & Rothermel, K. (2005). An analysis of cross-layer interactions in sensor network applications. In International conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) (pp. 121–126). Melbourne: IEEE.
LAN/MAN Standards Committee. (2006). Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). Computer Society, Washington, DC: IEEE.
Lazos, L., & Poovendran, R. (2004). Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks. In International Conference on Communications (ICC) (pp. 3633–3639). Paris, France: IEEE.
Leong, B., Mitra, S., & Liskov, B. (2005). Path vector face routing: Geographic routing with local face information. In The 13th international conference on Network Protocols (ICNP) (pp. 147–158). Boston: IEEE.
Li, J., & Mohapatra, P. (2007, June). Analytical modeling and mitigation techniques for the energy hole problem in sensor networks. Pervasive and Mobile Computing (Elsevier B.V.), 3(3), 233–254.
Liu, D., & Ning, P. (2003). Location-based pairwise key establishments for Static Sensor Networks (SASN). In The 1st workshop on Security of Ad Hoc and Sensor Networks (pp. 72–82). Fairfax: ACM.
Liu, J., Zhao, F., Cheung, P., & Guibas, L. (2004, December). Apply geometric duality to energy-efficient non-local phenomenon awareness using sensor networks. Wireless Communications (IEEE), 11(6).
Liu, D., Ning, P., & Li, R. (2005a, February). Establishing pairwise keys in distributed sensor networks. Transactions on Information and System Security (ACM), 8(1), 52–61.
Liu, Y., Elhanany, I., & Qi, H. (2005b). An Energy-Efficient QoS-Aware Media Access Control Protocol for Wireless Sensor Networks. In The International Conference on Mobile Adhoc and Sensor Systems (MASS) (pp. 189–191). Washington, DC: IEEE.
Liu, S., Bai, Y., Sha, M., Deng, Q., & Qian, D. (2008). CLEEP: A Novel Cross-Layer Energy-Efficient Protocol for Wireless Sensor Networks. In The 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCom) (pp. 1–4). Dalian, China: IEEE.
Lo Bello, L., & Toscano, E. (2009, May). Coexistence issues of multiple co-located IEEE 802.15.4/ZigBee networks running on adjacent radio channels in industrial environments. Transactions on industrial informatics (IEEE), 5(2), 157–167.
Madan, R., Cui, S., Lall, S., & Goldsmith, A. (2006, November). Cross-layer design for lifetime maximization in interference-limited wireless sensor networks. Transactions on Wireless Communications (IEEE), 5(11), 725–729.
Madden, S., Franklin, M. J., Hellerstein, J. M., & Hong, W. (2002, Winter). Tag: A tiny aggregation service for ad hoc sensor networks. Operating Systems Review, 36, 131–146.
Madden, S., Franklin, M. J., Hellerstein, J. M., & Hong, W. (2003). The design of an acquisitional query processor for sensor networks. In The international conference on Management of Data (SIGMOD) (pp. 491–502). San Diego: ACM SIGMOD.
Madden, S. R., Franklin, M. J., Hellerstein, J. M., & Hong, W. (2005). TinyDB: An acquisitional query processing system for sensor networks. Transactions on Database Systems (TODS) (ACM), 30(1), 122–173.
Melodia, T., Vuran, M. C., & Pompili, D. (2005). The state of the art in cross-layer design for wireless sensor networks. Vol. 3883, in Lecture notes in computer science-wireless systems and network architectures in Next Generation Internet (EuroNGI), by M. Cesana & L. Fratta, 78–92. Berlin/Heidelberg: Springer, .
Min, R., Bhardwaj, M., Ickes, N., Wang, A., & Chandrakasan, A. (2002). Microsensors, the hardware and the network: Total-system strategies for power aware wireless. In CAS workshop on wireless communications and networking. IEEE: Pasadena.
Moore, D. C., Leonard, J. J., Rus, D. L., & Teller, S. J. (2004). Robust distributed network localization with noisy range measurements. In The 2nd international conference on Embedded Networked Sensor Systems (SenSys) (pp. 50–61). Baltimore: ACM.
Naeem, T., & Loo, K. K. (2009, March). Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks. International Journal of Digital Content Technology and its Applications (JDCTA) (Advanced Institute of Convergence IT), 3(1), 88–93.
Nath, S. K., & Gibbons, P. B. (2007). Communicating via fireflies: Geographic routing on duty-cycled sensors. In The 6th international conference on Information Processing in Sensor Networks (IPSN) (pp. 440–449). Cambridge, MA: ACM.
Pathan, A. S. K., Lee, H.-W., & Hong, C. S. (2006). Security in wireless sensor networks: Issues and challenges. In The 8th International Conference Advanced Communication Technology (ICACT) (pp. 1043–1048). Phoenix Park, IEEE.
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002, September). SPINS: Security protocols for sensor networks. Wireless Networks (Springer Nature), 8, 521–534.
Perrig, A., Stankovic, J., & Wagner, D. (2004, June). Security in wireless sensor networks. Communications (ACM), 47(6), 53–57.
Petrioli, C., Nati, M., Casari, P., Zorzi, M., & Basagni, S. (2014, March). ALBA-R: Load-balancing geographic routing around connectivity holes in wireless sensor networks. Transactions on Parallel and Distributed Systems (IEEE), 25(3), 529–539.
Pichler, M., Schwarzer, S., Stelzer, A., & Vossiek, M. (2009, October). Multi-channel distance measurement with IEEE 802.15.4 (ZigBee) devices. Journal of Selected Topics in Signal Processing (IEEE), 3(5), 845–859.
Pompili, D., & Akyildiz, I. F. (2010, September). A multimedia cross-layer protocol for underwater acoustic sensor networks. Transactions on Wireless Communications (IEEE), 9(9), 2924–2933.
Pompili, D., Vuran, M. C., & Melodia, T. (2006). Cross-layer design in wireless sensor networks. In M. P. Mahalik (Ed.), Sensor network and configuration: fundamentals, techniques, platforms, and experiments. Berlin/Heidelberg: Springer.
Popa, L., Rostamizadeh, A., Karp, R., Papadimitriou, C., & Stoica, I. (2007). Balancing traffic load in wireless networks with curveball routing. In The 8th international symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (pp. 170–179). Quebec: ACM.
Puccinelli, D., Sifakis, E., & Haenggi, M. (2006). A cross-layer approach to energy balancing in wireless sensor networks. Vol. 331, in Lecture notes in control and information: Networked embedded sensing and control, by P. Tabuada, 309–324. Berlin/Heidelberg: Springer
Salido, J., Lazos, L., & Poovendran, R. (2007, December). Energy and bandwidth-efficient key distribution in wireless ad hoc networks: A cross-layer approach. Transactions on Networking (IEEE/ACM), 15(6), 1527–1540.
Santi, P. (2005, June). Topology control in wireless ad hoc and sensor networks. Computing Surveys (CSUR) (ACM), 37(2), 164–194.
Seada, K., Zúñiga, M. A., Helmy, A., & Krishnamachari, B. (2004). Energy-efficient forwarding strategies for geographic routing in lossy wireless sensor networks. In The 2nd international conference on Embedded Networked Sensor Systems (SenSys) (pp. 108–121). Baltimore: ACM.
Semchedine, F., Bouallouche-Medjkoune, L., Bennacer, L., Aber, N., & Aïssani, D. (2012). Routing protocol based on tabu search for wireless sensor networks. Wireless Personal Communications (Springer Nature), 67, 105–112.
Shafiei, H., Khonsariab, A., Derakhshia, H., & Mousavia, P. (2014, May). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences (Elsevier B.V.), 80(3), 644–653.
Shah, R. C., & Rabaey, J. M. (2002). Energy aware routing for low energy ad hoc sensor networks. In Wireless Communications and Networking Conference (WCNC) (pp. 350–355). Orlando: IEEE.
Shi, E., & Perrig, A. (2004, December). Designing secure sensor networks. Wireless Communications (IEEE), 11(6), 38–43.
Shu, L., Zhang, Y., Yang, L. T., Wang, Y., Hauswirth, M., & Xiong, N. (2010, June). TPGF: Geographic routing in wireless multimedia sensor networks. Telecommunication Systems (Springer Nature Switzerland, AG), 44, 79–95.
Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., & Srivastava, M. B. (2002). On communication security in wireless ad-hoc sensor networks. In The 11th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE) (pp. 139–144). Los Alamitos: IEEE.
Song, L., & Hatzinakos, D. (2007, February). A cross-layer architecture of wireless sensor networks for target tracking. Transactions on Networking (IEEE/ACM), 15(1), 145–158.
Srivastava, V., & Motani, M. (2005, December). Cross-layer design: A survey and the road ahead. Communications Magazine (IEEE), 43(12), 112–119.
Suh, C., Ko, Y.-B., & Son, D.-M.. (2006). An energy efficient cross-layer mac protocol for wireless sensor networks. Vol. 3842, in Lecture notes in computer science-advanced web and network technologies, and applications (APWeb), by H.T. Shen, J. Li, M. Li, J. Ni, & W. Wang, 410–419. Berlin/Heidelberg: Springer.
Sulaiman, T. H., Sivarajah, K., Al-Raweshidy, H. S. (2007, December). Improved PNC selection criteria and process for IEEE802.15.3. Communications Magazine (IEEE), 45(12), 102–109.
Urrutia, J. (2007, September). Local Solutions for Global Problems in Wireless Networks. Journal of Discrete Algorithms (Elsevier B.V.), 5(3), 395–407.
van Dam, T., & Langendoen, K. (2003). An adaptive energy-efficient MAC protocol for wireless sensor networks. In The 1st international conference on Embedded Networked Sensor Systems (SenSys) (pp. 171–180). Los Angeles: ACM.
van der Schaar, M., & Shankar, N. S. (2005, August). Cross-layer wireless multimedia transmission: Challenges, principles, and new paradigms. Wireless Communications (IEEE), 12(4), 50–58.
van Hoesel, L., Nieberg, T., Wu, J., & Havinga, P. J. M. (2004, December). Prolonging the lifetime of wireless sensor networks by cross-layer interaction. Wireless Communications (IEEE), 11(6), 78–86.
Venkitasubramaniam, P., Adireddy, S., & Tong, L. (2003). Opportunistic ALOHA and cross layer design for sensor networks. In Military Communications Conference (MILCOM) (pp. 705–710). Boston: IEEE.
Vuran, M. C., & Akyildiz, I. F. (2006, April). Spatial correlation-based collaborative medium access control in wireless sensor networks. Transactions on Networking (IEEE/ACM), 14(2), 316–329.
Vuran, M. C., & Akyildiz, I. F. (2009, August). Error control in wireless sensor networks: A cross layer analysis. Transactions on Networking (IEEE/ACM), 17(4), 1186–1199.
Vuran, M. C., & Akyildiz, I. F. (2010, November). XLP: A cross-layer protocol for efficient communication in wireless sensor networks. Transactions on Mobile Computing (IEEE), 9(11), 1578–1591.
Wang, Y. (2008). Topology control for wireless sensor networks. In Y. Li, M. T. Thai, & W. Wu (Eds.), Wireless sensor networks and applications. Signals and communication technology (pp. 113–147). Boston: Springer.
Wang, F., & Liu, J. (2009). Duty-cycle-aware broadcast in wireless sensor networks. In The 28th international conference on Computer Communications (INFOCOM) (pp. 468–476). Rio de Janeiro: IEEE.
Wang, X., Xing, G., Zhang, Y., Lu, C., Pless, R. B., & Gill, C. (2003). Integrated coverage and connectivity configuration in wireless sensor networks. In The 1st international conference on Embedded Networked Sensor Systems (SenSys) (pp. 28–39). Los Angeles: ACM.
Wattenhofer, R., Li, L., Bahl, P., & Wang, Y.-M. (2001). Distributed topology control for power efficient operation in multihop wireless ad hoc networks. In The conference on computer communications – The 20th annual joint conference of the IEEE Computer and Communications Societies (INFOCOMM) (pp. 1388–1397). Anchorage, IEEE.
Wood, A. D., & Stankovic, J. A. (2002, October). Denial of service in sensor networks. Computer (IEEE), 35(10), 54–62.
worldometer. (2020January 1). COVID-19 Coronavirus Pandemic. https://www.worldometers.info/coronavirus/? Accessed 8 July 2020.
Xiao, M., Wang, X., & Yang, G. (2006a). Cross-layer design for the security of wireless sensor networks. In The 6th world congress on intelligent control and automation (pp. 104–108). Dalian: IEEE.
Xiao, M., Wang, X., & Yang, G. (2006b). Cross-layer design for WSNs security. In Y. Xiao (Ed.), Security in sensor networks (pp. 311–328). Boca Raton: CRC Press.
Xie, P., & Cui, J.-H. (2007). R-MAC: An energy-efficient MAC protocol for underwater sensor networks. In The 2nd international conference on Wireless Algorithms, Systems and Applications (WASA) (pp. 187–198). Chicago: IEEE.
Xue, Q., & Ganz, A. (2003). Runtime security composition for sensor networks (SecureSense). In The 58th Vehicular Technology Conference (VTC) (pp. 2976–2980). Orlando, FL: IEEE.
Yan, T., He, T., & Stankovic, J. A. (2003). Differentiated surveillance for sensor networks. In The 1st international conference on Embedded Networked Sensor Systems (SenSys) (pp. 51–62). Los Angeles: ACM.
Ye, W., Heidemann, J., & Estrin, D. (2002). An energy-efficient MAC protocol for wireless sensor networks. In The 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) (pp. 1567–1576). New York: IEEE.
Ye, W., Heidemann, J., & Estrin, D. (2004, June). Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Transactions on Networking (IEEE/ACM), 12(3), 493–506.
Ye, F., Luo, H., Lu, S., & Zhang, L. (2005, April). Statistical en-route filtering of injected false data in sensor networks. Journal on Selected Areas in Communications (IEEE), 23(4), 839–850.
Yessad, S., Bouallouche, L., & Aissani, D. (2011). Proposition and evaluation of a novel routing protocol for wireless sensor networks. In The 5th international workshop on Verification and Evaluation of Computer and Communication Systems (VECOS) (pp. 1–9). Tunis: BCS, The Chartered Institute for IT.
Yessad, S., Tazarart, N., Bakli, L., Medjkoune-Bouallouche, L., & Aissani, D. (2012). Balanced energy efficient routing protocol for WSN. In International Conference on Communications and Information Technology (ICCIT) (pp. 326–330). Hammamet: IEEE.
Yessad, S., Bouallouche-Medjkoune, L., & Aïssani, D. (2015). A cross-layer routing protocol for balancing energy consumption in wireless sensor networks. Wireless Personal Communications (Springer Nature), 81, 1303–1320.
Yetgin, H., Cheung, K. T. K., El-Hajjar, M., & Hanzo, L. (2015, August). Cross-layer network lifetime maximization in interference-limited WSNs. Transactions on Vehicular Technology (IEEE), 64(8), 3795–3803.
Yu, Z., & Guan, Y. (2008, October). A key management scheme using deployment knowledge for wireless sensor networks. Transactions on Parallel and Distributed Systems (IEEE), 19(10), 1411–1425.
Yuan, Z., Wang, L., Shu, L., Hara, T., & Qin, Z. (2011). A Balanced Energy Consumption Sleep Scheduling Algorithm in Wireless Sensor Networks. In The 7th International Wireless Communications and Mobile Computing Conference (IWCMC) (pp. 831–835). Istanbul, Turkey: IEEE.
Zamalloa, M. Z., Seada, K., Krishnamachari, B., & Helmy, A. (2008, June). Efficient geographic routing over lossy links in wireless sensor networks. Transactions on Sensor Networks (ACM).
Zhang, J., & Varadharajan, V. (2010, March). Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications (Elsevier B.V.), 33(2), 63–75.
Zigbee Alliance. (2020). Zigbee. Zigbee Alliance. January, 1. https://zigbeealliance.org/solution/zigbee/. Accessed 18 Apr 2020.
Zorzi, M., & Rao, R. R. (2003, October/December). Geographic Random Forwarding (GeRaF) for ad hoc and sensor networks: Multihop performance. Transactions on Mobile Computing (IEEE), 2(4), 337–348.
Zuniga, M., & Krishnamachari, B. (2004). Analyzing the transitional region in low power wireless links. In 1st annual communications society conference on Sensor and Ad Hoc Communications and Networks (SECON) (pp. 517–526). Santa Clara: IEEE.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Fahmy, H.M.A. (2021). Cross-Layer Protocols for WSNs. In: Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-58015-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-58015-5_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-58014-8
Online ISBN: 978-3-030-58015-5
eBook Packages: EngineeringEngineering (R0)