 Research
 Open Access
An adaptive traffic MAC protocol based on correlation of nodes
 Donghong Xu^{1, 2} and
 Ke Wang^{1}Email author
https://doi.org/10.1186/s136380150488x
© Xu and Wang. 2015
 Received: 21 September 2015
 Accepted: 27 November 2015
 Published: 9 December 2015
Abstract
EAMAC protocol is proposed on the basis of SMAC protocol to remedy the shortcomings of SMAC. In the EAMAC, node correlation analysis algorithm and traffic adaptive duty cycle mechanism are added. Meanwhile, the residual energy is introduced into the existing traffic adaptive backoff mechanism to measure the saving efficiency. In the node correlation algorithm, all network nodes are divided into several areas by computing node correlation according to the collected information. The clustering mechanism is applied for choosing representative node in each area for transmitting data. This method can effectively reduce redundant nodes transmitting duplicate data. In traffic adaptive duty cycle mechanism, the duty cycle is regulated dynamically to decrease idle listening by comparing the threshold set with the flow value obtained from the predict flow model. In backoff mechanisms, by adjusting the value of contention window and backoff time, data collisions can be effectively avoided when network traffic is heavy. In addition, nodes with more remaining energy have priority to access the channel and have shorter backoff time, which can keep the balance of the whole network energy consumption and lengthen network lifetime. Simulation results show that the EAMAC protocol has better energy saving, throughput, shorter delay performance, and low packet loss rate than that of SMAC protocol in dynamic traffic sensor networks.
Keywords
 Wireless sensor networks
 EAMAC protocol
 Node remaining energy
 Traffic adaptive mechanism
 Crosslayer optimization
1 Introduction

(1) Nodes are not differentially divided. In SMAC protocol, the nodes in the network use the same mechanism to work, but in reality, some information collected by nodes in the network is not reliable or redundant. In the context of reliable or redundant information, it may result in unnecessary waste of energy when letting all nodes involved in the channel contention. Therefore, it is better to selectively accept the information from partial nodes under certain conditions of network characteristics.

(2) Nodes cannot suit to the requirement of the dynamic changes of network traffic due to time for sleeping and listening being fixed for nodes through periodic dormant and listening method in SMAC. Nodes cannot make the appropriate adjustments when large changes of network traffic occur. For example, when the network load suddenly increases, the listener time will become short and will result in multiple retransmissions of data; meanwhile, it will increase the chances of conflict and delay. When network traffic is low, energy maybe wasted due to the idle listening.
The paper [6–8] proposed a new schema to balance the lifetime of the deployed sensor network by assigning weights to links based on the remaining power level of individual nodes. Meanwhile, they developed a centralized heuristic to reduce its computational complexity. The methods and conclusion of the papers are taken as a basis for this paper. Han et al. [9] surveyed data communication protocols in DSWSNS and the survey can be served as motivations and inspiration for our research. Xiao et al. [10] studied the underwater sensor networks according to the tight performance bounds of multihop fair access for MAC protocols. The papers [11–13] proposed a novel compressive data collection scheme. The measurement methods give our basis for measuring our methods. In the research of channel access, He et al. [14] proposed a semirandom backoff method [15] that enables resource reservation in contentionbased wireless LANs and the method can be readily applied to both 802.11.DCF and 802.11e EDCA networks with minimum modification.
For solving these two above discussed drawbacks, the paper proposes node correlation based on flow adaptive Efficient Adaptive Medium Access Control (EAMAC) protocol to classify nodes by computing node correlation before data transmission. The algorithm for correlation computing between nodes can divide similar nodes to a certain area and choose the representative node for data transmission in the region. Representative node can cyclically be elected upon some parameters such as node residual energy and distance to sink node. During data transfer process, according to the prediction of flow changes, the system selfadaptively changes the duty cycle and contention window of the node. Conflict probability is significantly controlled by altering the backoff range and constraining the backoff window size, effectively reducing energy consumption.
The paper is organized as follows. In Section 2, we pose the problem and give the calculating processing. Meanwhile, ARMA model for node flow forecasting is presented. In Section 3, we describe the EAMAC protocol. In Section 4, the data and result of the experiment including average energy consumption, endtoend delay, and effective throughput are given out. At last, we conclude with a summary and some directions for future work.
2 Problem descriptions
2.1 Problem statement
2.2 Calculation of correlation of nodes
In the above two formulas, H(x), H(y) separately represent the entropy of node i, j. p(x _{ i }) is the probability of events detected by the node i. p(y _{ j }) is the probability of events detected by the node j, and qis the sum of all events which are being collected.
When 0<K≤ε, the similarity of nodes is low. When ε<K≤1, then the similarity of nodes becomes high. By calculating their joint entropy and their own information entropy, correlation coefficient between nodes can be obtained. The nodes satisfying ε<K≤1 are divided into a group. All the nodes in the similarity coefficient are automatically divided into several smaller areas, called the relevant area (correlated area, CA). For each node within relevant area, cyclical formula 4 and 5 are used as merits of priority measure. The selected node within the relevant area is set as a representative node (RN) and cycle length is T. The value of T must be larger than and at least twice the value of the EAMAC protocol listener ∖sleep cycle to prevent the disruption of original data transmission caused by the switch of RN. Collected data will only be transmitted to sink node by RN.
2.3 ARMA model for node flow forecasting
Flow in the sensor network is usually dynamically changed with the practical applications and exhibits nonequilibrium with the position change of the nodes. Nodes nearby the base station bear heavy traffic. In some eventdriven applications, accident data stream is collected, while in the periodic data acquisition applications, network traffic is relatively stable. Therefore, the selection of the sensor network flow model must be consistent with its application scenarios. Literature [18–20] proposed an ARMA model for flow predictions, which applies to periodic data acquisition.
2.3.1 ARMA model for periodic data applications
Select the ARMA (2p, 2p1) model to analyze the flow of sensor network, where the positive integer pis the order number. In order to avoid too much calculation, let p=1. Specific modeling process for ARMA (2, 1) is as follows: Assuming the sliding time window is n, the data traffic sequences \(X_{0}^{\prime },X_{1}^{\prime },\cdots,X_{i}^{\prime },X_{n}^{\prime }\) during each time slot do not appear smoothly and steady, so firstly taking the logarithmic to smooth it and getting the smooth sequences X _{0},X _{1},⋯,X _{ i },X _{ n } and then creating ARMAmodel with stationary series to predict the value of n + 1 flow rate. Hence, we can know that a predicted value can be obtained for each forward sliding of the time window.
2.3.2 Parameter selection
When using ARMA traffic forecasting model to predict the flow of nodes, firstly, a traffic acquisition cycle is necessary to be set. For example, if data are collected in 1 s, the forecasting result is the next second flow. In most realtime applications, the acquisition cycle should be set to a smaller value to observe the flow changes timely. The ARMA model needs to calculate parameter values based on its historical data. During the periodic collection of data, the same data streams are generated as long as the transmission rate and the sleep/listening cycles of nodes are the same, so part of the data sequence is selected from [21–23]. In the paper, the parameters of the ARMA model are estimated as \(\hat {\phi }_{1}=0.86579, \hat {\phi }_{2}=0.07356,\hat {\theta }_{1}=0.68954\), and \(\hat {\sigma }_{a}^{2}=0.00186.\) The advantage of ARMA model is to provide accurate prediction of the actual flow of the node, and it is widely used for general periodic data collection. Traffic adaptive mechanism proposed in this paper applies flow f _{node} prediction ARMA model to adjust the duty cycle and the contention window.
3 Description of EAMAC protocol
3.1 Node classification strategy
EMSG message frame structure
Frame type  Node ID  Frame size  Node residual  Distance between 

energy  sink nodes 
3.2 Selfadaptive algorithm of duty cycle
(2) When the flow predictive value L<f _{node}<H, network traffic is moderate, the duty cycle will be restored to its original size.
3.3 Selfadaptive backoff algorithm

Selection of C W _{min} and C W _{max}
For the selection of C W _{min} and C W _{max}, node traffic information f _{node} needs to be combined to adjust the contention window. When f _{node}<L, half the value of the C W _{min} and C W _{max} is given, thus reducing the waiting, the backoff time, and the delay time. When f _{node}>H, it increases the value of C W _{min} and C W _{max}, thus reducing the backoff time for channel listening and collisions.

Selection value of node CW
According to Eq. (9), it is clear that when the value of residual energy of the node is larger, the mean value of the normal distribution will be relatively smaller. Meanwhile, the probability of backoff time CW to select a smaller value is larger. When the remaining energy is smaller, the mean value of the normal distribution will be relatively larger. Meanwhile, the probability that CW achieves greater value is larger. From Eq. (10), it is obvious that D(CW) selection is related to C W _{min}. When the flow rate is increased, C W _{min} increases together, and the variance of the normal distribution becomes large, showing a large normal unevenness. So backoff time difference selected by the sending node is relatively large with minimal conflict potential. In this backoff method, backoff time selection is related to the normal distribution function in formulas 9 and 10, allowing the node with more residual energy access channel with priority, taking more responsibility for data transmission, thus balancing network energy distribution, and extending the network life cycle. When network traffic is large, the selection range of the backoff time is increased as well as the difference, reducing the possibility of simultaneous data sending. It is not necessary for the node to inform the neighbor nodes the remaining energy, thus avoiding the overhead of broadcast communication.
4 Simulations
Parameter setting
Packet size(B)  50  SIFS(ms)  5 

Sending power(mW)  360  DIFS(ms)  10 
Sending power(mW)  360  DIFS(ms)  10 
Receiving power(mW)  360  ILPC(mW)  340 
Sleep power consumption(uW)  50  Routing protocol  AODV 
Node initial energy(J)  100  Simulation time(s)  650 
In the singlehop scene, packet interval is sent to change the variation of network traffic. With network traffic varying, the duty cycle for listening/sleep also alters. Delay and backoff time for channel listening vary with the residual energy and network traffic. The initial operation period of the network is 0–100 s. The medium phase of network operation is 100–200 s. For the period of 200–300 s, transmission interval is reduced, and the network traffic is moderate. During 300–400 s, the transmission interval is further reduced, and the network load is high. Late network operation period: 400–650 s, the transmission interval is increased, and the network is in a low flow state. Gawk [32] is used to run the simulation script files and analyze the generated trance file. It also can obtain delay, average energy consumption of the network and packet loss rate, and corresponding file. Simulation data is extracted with 10s interval and plotted below.
4.1 Average energy consumption
4.2 Endtoend delay
4.3 Effective throughput
4.4 Packet loss rate
5 Conclusions
In this paper, an improved algorithm of EAMAC protocol is given to address the deficiencies of the SMAC protocol. Firstly, an algorithm for correlation computing between nodes is proposed which divides similar nodes to a certain area and chooses the representative node for data transmission in the considered region. Representative node is cyclically elected upon some parameters such as node residual energy and distance to sink node. In the transmission, network traffic prediction is conducted by ARMA mode and the duty cycle is dynamically changed accordingly through comparing the predicted value with the presetting threshold value. Conflict probability is significantly controlled by altering the backoff range and constraining the backoff window size, effectively reducing energy consumption. Finally, NS2 is adopted to implement for simulations of EAMAC protocol and SMAC protocol. Simulation results including the network average energy consumption, latency and effective throughput, and packet loss rate are analyzed, showing that EAMAC protocol performs superior to that of SMAC protocol.
Declarations
Acknowledgements
This work was supported by “the Fundamental Research Funds for the Central Universities” (2013QNB15) and the National Science Foundation of China under grant no. 61203304. Thanks for the contributors on this paper.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Authors’ Affiliations
References
 Hc Lee, Jw Lee, Jh Hwang, H Yoe, in Future Generation Information Technology. A study on energy efficient MAC protocol of wireless sensor network for ubiquitous agriculture (SpringerBerlin Heidelberg, 2010), pp. 642–650.View ArticleGoogle Scholar
 R Sokullu, E Demir, MAC layer protocols for linear wireless sensor networks: a survey. Commun. Special Issue on Adhoc Netw. 38(4), 393–422 (2014).Google Scholar
 WM Song, YM Liu, SE Zhang, in Wireless Communications, Networking and Mobile Computing, 2008. WiCOM’08. 4th International Conference on. Research on SMAC protocol for WSN (IEEE, 2008), pp. 1–4.Google Scholar
 J Luo, L Jiang, C He, An analytical model for SMAC protocol in multihop wireless sensor networks. Sci. China Inf. Sci. 53(11), 2323–2331 (2010).View ArticleMATHGoogle Scholar
 Q Wang, K JaffrèsRunserb, JL Scharbarg, C Frabou, Y Suna, J Lia, Z Lia, A thorough analysis of the performance of delay distribution models for IEEE 802.11 dcf. Ad Hoc Networks. 24:, 21–33 (2014).View ArticleGoogle Scholar
 Y Yao, Q Cao, AV Vasilakos, in Mobile adhoc and sensor systems (MASS), 2013 IEEE 10th international conference on. EDAL: An energyefficient, delayaware, and lifetimebalancing data collection protocol for wireless sensor networks (IEEE, 2013), pp. 182–190.Google Scholar
 Y Yao, Q Cao, AV Vasilakos, EDAL: an energyefficient, delayaware, and lifetimebalancing data collection protocol for heterogeneous wireless sensor networks. IEEE/ACM Trans. Networking. 23:, 810–823 (2015).View ArticleGoogle Scholar
 D Xu, K Wang, Stochastic modeling and analysis with energy optimization for wireless sensor networks. Int. J. Distrib. Sensor Netw. 2014:, 1–5 (2014).Google Scholar
 K Han, J Luo, Y Liu, AV Vasilakos, Algorithm design for data communications in dutycycled wireless sensor networks: a survey. Commun. Mag. IEEE. 51(7), 107–113 (2013).View ArticleGoogle Scholar
 Y Xiao, M Peng, JH Gibson, GG Xie, DZ Du, AV Vasilakos, Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks. Mob. Comput. IEEE Trans. 11(10), 1538–1554 (2012).View ArticleGoogle Scholar
 S Sengupta, S Das, M Nasir, AV Vasilakos, W Pedrycz, An evolutionary multiobjective sleepscheduling scheme for differentiated coverage in wireless sensor networks. IEEE Trans. Syst. Man & Cybern. Part C Appl & Rev. 42(6), 1093–1102 (2012).View ArticleGoogle Scholar
 XY Liu, Y Zhu, L Kong, C Liu, Y Gu, AV Vasilakos, MY Wu, CDC : compressive data collection for wireless sensor networks. IEEE Trans. Parallel & Distribut. Syst. 26:, 2188–2197 (2015).View ArticleGoogle Scholar
 X Xu, R Ansari, A Khokhar, AV Vasilakos, Hierarchical data aggregation using compressive sensing (HDACS) in WSNs. ACM Trans. Sensor Netw. (TOSN). 11(3), 45 (2015).Google Scholar
 Y He, J Sun, X Ma, AV Vasilakos, R Yuan, W Gong, Semirandom backoff: towards resource reservation for channel access in wireless LANs. Netw. IEEE/ACM Trans. 21(1), 204–217 (2013).View ArticleGoogle Scholar
 Y Zeng, K Xiang, D Li, AV Vasilakos, Directional routing and scheduling for green vehicular delay tolerant networks. Wirel. netw. 19(2), 161–173 (2013).View ArticleGoogle Scholar
 S Coleri Ergen, C Fischione, C Borean, Method for setting the operation of a routing node of an asynchronous wireless communication network, network node and communication network implementing the method (Google Patents, 2012). US Patent 8,243,620.Google Scholar
 J Vrhovec, D Rudel, AM Lebar, in XII Mediterranean Conference on Medical and Biological Engineering and Computing 2010. The importance of uterine contractions extraction in evaluation of the progress of labour by calculating the values of sample entropy from uterine electromyogram (SpringerBerlin Heidelberg, 2010), pp. 140–143.View ArticleGoogle Scholar
 K Mohammadi, HR Eslami, R Kahawita, Parameter estimation of an ARMA model for river flow forecasting using goal programming. j hydrol J. Hydrol. 331(1), 293–299 (2006).View ArticleGoogle Scholar
 C Dong, C Shao, SH Richards, LD Han, Flow rate and time mean speed predictions for the urban freeway network using state space models. Transp. Res. Part C Emerg. Technol. 43 part 1:, 20–32 (2014).View ArticleGoogle Scholar
 H Gao, F Liu, in International Conference on Transportation Engineering 2009. A combined model for traffic flow prediction based on wavelet analysis (ASCE, 2009), pp. 2389–2394.Google Scholar
 Y Yang, Z Fu, TS Lee, MS Park, Tasl: A trafficadapted sleep/listening MAC protocol for wireless sensor network. JIPS. 2(1), 39–43 (2006).Google Scholar
 M Moh, EJ Kim, TS Moh, Design and analysis of distributed power scheduling for data aggregation in wireless sensor networks. Int. J. Sensor Netw. 3–4:, 143–15513 (2007).Google Scholar
 J Lee, NT Dinh, G Hwang, JK Choi, C Han, Powerefficient load distribution for multihomed services with sleep mode over heterogeneous wireless access networks. IEEE Trans. Veh. Technol. 63(4), 1843–1854 (2014).View ArticleGoogle Scholar
 MJ Azhar, S Ko se, in Circuits and Systems (ISCAS), 2014 IEEE International Symposium On. An enhanced pulse width modulator with adaptive duty cycle and frequency control (IEEE, 2014), pp. 958–961.Google Scholar
 H Rasouli, YS Kavian, HF Rashvand, ADCA: adaptive duty cycle algorithm for energy efficient IEEE 802.15.4 beaconenabled wireless sensor networks. Sensors J. IEEE. 14(11), 3893–3902 (2014).View ArticleGoogle Scholar
 P Shi, Y Wang, K Li, AT Chan, in Pervasive Computing and the Networked World. Crosslayer adaptive endtoend delay control for asynchronous dutycycle wireless sensor networks, (2014), pp. 520–531.Google Scholar
 KK Sharma, M Aggarwal, N Yadav, Squaring back off based media access control for vehicular adhoc networks, (2014).Google Scholar
 D Sharma, S Patsariya, A Mahajan, Effects of backoff factor on exponential backoff algorithm. MITA 2011, 326–329 (2011).Google Scholar
 JL Huang, P Jin, LG Li, The Application of Binary Exponential Backoff Algorithm for WIA Wireless Network. Appl. Mech. Mater. 556:, 4568–4572 (2014).View ArticleGoogle Scholar
 D Qiu, YX Yang, The Hidden Terminal Problem of 802.11 MAC and 802.15. 4 MAC Protocols Based on NS2 Platform. Advanced Mater. Res. 989:, 4078–4081 (2014).View ArticleGoogle Scholar
 K Wu, H Dai, Z Yang, S Lu, D Chen, X Li, NDP2PSim: A NS2based platform for peertopeer network simulations. Lect. Notes Comput. Sci. 3759:, 520–529 (2005).View ArticleGoogle Scholar
 N Zhao, X Li, M Yang, XT Huang, Vehicular adhoc network and routing design. Appl Mech & Mater. 641–642:, 829–832 (2014).View ArticleGoogle Scholar