A Comparative Study: Efficient Multihop Broadcast Protocol and Receiver Initiated-Medium Access Control Protocol

Pramatha, S.; Sakthivel, N. K.; Subasree, S.
May 2014
International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 3, p4665
Academic Journal
In this paper, we propose the comparison of an Efficient Multihop Broadcast Protocol for Asynchronous Duty-Cycled Wireless Sensor Networks (EMBA) and Receiver Initiated-Medium Access Control (RI-MAC) protocol. EMBA comprises two techniques for asynchronous mode broadcast of messages namely the forwarder's guidance and the overhearing of broadcast messages and ACKs. Receiver initiated MAC broadcast for sparse and dense networks attempts to minimize the channel utilization requirements compared to other existing asynchronous scheduling approaches. We implement EMBA and conventional protocols of RI-MAC broadcast in ns-2 simulator to compare and contrast their performance.


Related Articles

  • Resources Access Control Strategy based on CPK Identification Authentication. Wen-Yuan Tang; Qin-Wei Li; Mu Liu // International Proceedings of Computer Science & Information Tech;2012, Vol. 53, p155 

    Resource access control is a vital link to ensure the security of system. The combination of authentication and authorization is the guarantee of system security. A kind of resource access control scheme is proposed on the basis of CPK logo authentication system in this thesis. It generates an...

  • Access Control Based on a Distributed Fingerprint Recognition System. Miron, Radu-Florin; HULEA, Mihai // Applied Mechanics & Materials;2014, Issue 555, p759 

    This paper presents an implemented solution for controlling the access of the users to restricted areas and resources (including machines and robots), based on fingerprint recognition. The proposed distributed system is composed of a number of fingerprint scanning mobile terminals connected to a...

  • 7 Trends Moving Integrators Towards Physical-Logical Convergence. Engebretson, Joan // SDM: Security Distributing & Marketing;May2011, Vol. 41 Issue 5, p95 

    The article offers the author's insights on physical-logical convergence innovations for access control used for physical access to entry doors and logical access to enterprise-wide computer systems. It states that Open Protocol for Access Control Identification and Ticketing (OPACITY) is a new...

  • The Improvements of KeyNote Trust Management System. Lingling Meng; Rui Xu; Xiaohong Li; Guangquan Xu // International Journal of Digital Content Technology & its Applic;Feb2012, Vol. 6 Issue 3, p177 

    KeyNote trust management system has been applied to access control field, especially in the Distributed Access Control System (DACS). However, KeyNote is just a prototype system and it has many inadequacies in implement system. In this paper, we mainly improve the KeyNote trust management in...

  • On the Complexity of Authorization in RBAC under Qualification and Security Constraints. Sun, Yuqing; Wang, Qihua; Li, Ninghui; Bertino, Elisa; Atallah, Mikhail // IEEE Transactions on Dependable & Secure Computing;Nov2011, Vol. 8 Issue 6, p883 

    In practice, assigning access permissions to users must satisfy a variety of constraints motivated by business and security requirements. Here, we focus on Role-Based Access Control (RBAC) systems, in which access permissions are assigned to roles and roles are then assigned to users. User-role...

  • Dilbert, the DMCA, and the Internet bubble video. Johnson, Johna Till // Network World;12/17/2007, Vol. 24 Issue 49, p22 

    The article discusses the importance of protecting intellectual property in the U.S. She argues that some people uses online content as a way to make fun on the company or to embarrass or humiliate person especially during increasing free downloadable items over the net. She stresses that...

  • Multi-segment Identification Method for Multi-sensor Multi-channel ARMA Signal with White Measurement Noise. Mingbo Zhang // International Journal of Control & Automation;Apr2013, Vol. 6 Issue 2, p153 

    For the multi-sensor multi-channel ARMA( the autoregressive and moving average model) signal with white measurement noise, unknown model parameters and noise variance, a multi-segment identification method is proposed. The simulation example shows the effectiveness of this method. These...

  • Australian government plans Internet censorship.  // Nature;11/6/2008, Vol. 456 Issue 7218, p14 

    The article reports that the Australian government is planning to block Australians' access to certain web sites from inside the country. According to Communications Minister Stephen Conroy, the government proposes a two-tier system with one of the systems compulsory and the other one an...

  • Mapping Censorship. Boyd, Clark // Technology Review;Oct2007, Vol. 110 Issue 5, p19 

    The article reports on the growth of Internet filtering in terms of scale, scope and sophistication. According to a study by researchers at Cambridge, Oxford, Harvard, and the University of Toronto, the extent to which nations block or restrict online content ranging from political dissent to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics