Next Article in Journal
Sensory Interactive Table (SIT)—Development of a Measurement Instrument to Support Healthy Eating in a Social Dining Setting
Previous Article in Journal
Effectiveness of Non-Local Means Algorithm with an Industrial 3 MeV LINAC High-Energy X-ray System for Non-Destructive Testing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy-Efficient and Fast MAC Protocol in UAV-Aided Wireless Sensor Networks for Time-Critical Applications

Department of Computer Engineering, Chosun University, 309 Pilmun-daero, Dong-gu, Gwangju 61452, Korea
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(9), 2635; https://doi.org/10.3390/s20092635
Submission received: 2 April 2020 / Revised: 30 April 2020 / Accepted: 1 May 2020 / Published: 5 May 2020
(This article belongs to the Section Sensor Networks)

Abstract

:
Unmanned aerial vehicle (UAV)-aided wireless sensor networks (UWSNs) can be effectively used for time-critical sensing applications. UAVs can be used to collect the sensed data from sensors and transfer them to a base station. The real-time transfer of data is highly desired in the time-critical applications. However, the medium access control (MAC) protocols designed for UWSNs so far are primarily focused on the efficient use of UAVs to collect data in the sensing areas. In this paper, we propose an energy-efficient and fast MAC (EF-MAC) protocol in UWSNs for time-critical sensing applications. EF-MAC adopts carrier sense multiple access (CSMA) for the registration of sensor nodes with a UAV and time division multiple access (TDMA) with variable slot time for the transmission of collected data. The UAV is equipped with two transceivers to minimize both energy consumption and delay in air-to-ground communication. The energy consumption and delay are formally analyzed and the performance of EF-MAC is evaluated via extensive simulation. The simulation results show that the proposed EF-MAC outperforms the conventional MAC protocols in terms of energy efficiency and communication delay.

1. Introduction

Wireless sensor networks (WSNs) have become popular in a wide range of applications aimed at the modernization and betterment of our society [1,2]. The applicability of WSNs has been enhanced by advances in the technology and availability of small, inexpensive, and smart sensors resulting in cost effective and easily deployable WSNs. Sensor nodes are designed to perform high-level information processing tasks such as detection [3], classification [4], tracking [5], monitoring, and surveillance [6]. In WSN applications, sensors are usually deployed such that they are directly or indirectly connected with a base station (BS) which will receive the sensing information. In most WSNs, sensor nodes are grouped into clusters. Every sensor node sends the sensed data to its cluster head (CH), and the CH aggregates the data received from its members and then sends the aggregated data to the BS.
However, fully connected network of sensor nodes may not be established in remote areas. In addition, we cannot rely on previously established infrastructures in harsh environments (i.e., wars and disasters) because there is no guarantee that the built network will remain operational as discussed in [7]. Moreover, energy consumption is significantly high and unequal one if sensor nodes need to transfer the sensed information to BS through multi-hop communication. Mission and time-critical WSN applications are defined as target applications that demand data delivery in the bounds of time and reliability. A vast number of time-critical applications can be found in the literature [8,9], which require high throughput with minimum delay. Furthermore, energy consumption remains a design concern, as a reasonably long network lifetime is always desirable. Thus, employing a mobile sink for data gathering is an option to fortify such applications.
Unmanned aerial vehicles (UAVs), on the other hand, have received tremendous interests in both research community as well as civil applications such as surveillance and reconnaissance operations [10]. With the recent advancement in wireless networking technologies, the use of UAV has been incorporated in many applications. UAV is capable of sensing or collecting data from a wider area within a faster period. Different routing and clustering approaches for UAVs are studied in [11,12]. Other promising features of UAV include small size, easy deployment, low maintenance cost, improved safety for humans, environmental flexibility, and high maneuverability [13]. Thus, it is suitable to deploy the UAV for disaster management operations where the safety of human and time-sensitive data collection is of prime concern [14,15]. Correspondingly, the increasingly rapid incorporation of UAVs in other wireless technologies has been studied.
One of such integrations is a UAV-aided WSN (UWSN). In UWSNs, UAVs can be effectively utilized for several different purposes such as deployment of sensor nodes [16], extension of communication range [17], and wireless power transfer in WSNs [18], data gathering from ground sensor nodes [19], maintaining connectivity [20], and localization of sensor nodes [21]. UWSNs are different from mobile WSNs where sensor nodes or sink may move [22]. In UWSNs, UAVs are used to receive data from sensor nodes directly, which greatly reduces the communication between sensor nodes and BS and saves the energy required for listening to neighbors. Another advantage of UWSNs is the presence of a free space between sensor fields and UAVs. The free space reduces the chances of signal decaying, which is very prominent in sensor-to-BS communication. In addition, UAVs can detect weak signals because they are equipped with high-level signal processing units and multiple antennas.
For guaranteeing high network throughput and low energy consumption in UWSNs, several issues must be addressed in the medium access control (MAC) layer. Existing MAC protocols designed for WSNs or UAVs do not perform well in UWSNs because of the high mobility of UAVs and the limited contact time between UAVs and sensor nodes. Even though there are some similarities between UWSNs and vehicular ad hoc networks (VANETs), the MAC protocols utilized in VANETs are also unsuitable for UWSNs owing to the densely employed sensor nodes, which results in collisions while communicating with UAVs. Due to the rapid mobility of UAVs, the dynamic change of network topology, and the constraints of operation time and energy in UWSNs, designing an efficient MAC protocol that addresses abovementioned issues is a challenging task. All the extant MAC protocols for UWSNs are compared and studied in [23].
In this paper, we propose energy-efficient and fast MAC (EF-MAC) in UWSNs for time-critical applications. The application scenario of the proposed protocols is depicted in Figure 1. In the figure, sensor nodes are grouped into clusters and each CH collects data from its cluster members. Every CH then transmits the aggregated data to the UAV when it receives beacon signals from UAV.

1.1. Contribution of the Study

In this paper, it is assumed that sensor nodes are clustered and cluster heads are responsible for communicating with the UAV. As mentioned earlier, many clustering schemes have been developed in WSNs for many years. The proposed EF-MAC significantly decreases both energy consumption and delay in air-to-ground communication. In our work, UAV’s energy consumption is not emphasized because UAV is assumed to have enough energy for data gathering operation and gets charged once it returns to BS. The major contributions of our work are as follows:
  • We present a hybrid MAC protocol for time-critical sensing applications in emergency and disaster environments by incorporating two transceivers in a UAV. The two transceivers operate concurrently for minimizing both energy consumption and delay in air-to-ground communication. It should be noted that sensor nodes are clustered and only CHs communicate with UAV.
  • The proposed EF-MAC uses carrier sense multiple access (CSMA) for registration process. For data transmission, on the other hand, time division multiple accesses (TDMA) with variable slot time is used. As a result, proper synchronization is done before exchanging data packets.
  • The prioritization of registered sensor nodes is carried out before scheduling process. Priority is assigned on the basis of contact duration time (CDT), packet size, and residual energy. If a CH goes out of communication range of UAV, it is discarded for scheduling.
  • The EF-MAC protocol is mathematically analyzed with respect to delay and energy consumption. Markov chain-based modeling is presented for delay and energy analysis of CHs at different stages of communication.
  • Our performance study shows that the proposed EF-MAC outperforms the existing CSMA with collision avoidance (CSMA/CA) and hybrid MAC protocol (HP-MAC) in terms of delay, energy usage, throughput, network lifetime, and fairness.

1.2. Outline of the Paper

The rest of this paper is organized as follows. Related works are summarized in brief in the following section. The system model for our study is described in Section 3. The proposed EF-MAC is presented in detail along with the devised algorithms in Section 4. The delays and energy consumption of EF-MAC are analyzed and discussed in Section 5. The performance of the proposed EF-MAC is evaluated through a computer simulation and compared with conventional MAC protocols in Section 6. Finally, the paper is concluded in Section 7.

2. Related Works

UWSNs applications are attracting a lot of attention from industry and academia. Nowadays, incorporating UAVs in WSNs for data disseminating and gathering has been a common trend. However, proper coordination between UAV and WSN is prerequisite of UWSN networks. Hence, in UWSNs, MAC needs to be designed for obtaining high network throughput within low energy usage. Additionally, due to the movement of the UAV, there is a short time interval during which data can be transmitted from the sensor to the UAV. Having said that, we can find that immense research is going on for the enhancement of MAC protocols for UWSNs in the literature. It has been shown that IEEE 802.11 CSMA MAC is not suitable for the UWSN system although it has been widely used in wireless communications. This is due to the following reasons: it suffers from longer contention delay during UAV-to-CHs communication and it becomes worse in the dense network. Another issue faced by CSMA/CA MAC is hidden terminal effect and the exchange of request to send and clear to send (RTS/CTS) adds overhead and results in delay. Another conventional MAC protocol i.e., TDMA eliminates the issues of collisions and re-transmission by pre-allocating the transmission resources to the nodes in the network but it requires information of the network before scheduling nodes.
Adaptive-opportunistic Aloha has been proposed in [24] which being based on cross layer design considers the uniformity of data collection, energy consumption, and transmission efficiency. Code division multiple access (CDMA) is considered for physical transmission. A novel multiple access scheme for aerial sensor networks employing adaptive antenna arrays with spatial reuse is proposed in [25]. A priority-based optimized frame selection (POFS), a circularly optimized frame selection scheme (COFS), and a priority-based contention window adjustment scheme (PCWAS) with a collision resolution mechanism are introduced in [26].
A prioritized frame selection (PFS) based CDMA MAC (PFSC-MAC) [27,28,29] incorporates both the beacon signal receiving power and the variation trend of this factor to lower down packet error rate (PER) value. Integration of PFS-TDMA (PFST) and FRA schemes (frame based random access) are also presented in the literature [30] with findings such as optimal number of sub groups, data packet size, and altitude of the UAV under an acceptable ratio of PER and the number of sensors in the network.
A novel MAC protocol in UWSNs, called advanced prioritized MAC (AP-MAC) is proposed in [31]. The authors in [32] proposed a cooperative sensing data-collecting framework for UWSNs. Being based on the IEEE 802.11 CSMA/CA MAC, the neighboring nodes can receive and store the overhearing data into their received buffer. The neighboring node can retransmit the overheard data whenever needed, such as in the case, if an original node is not able to transmit its data to the UAV because it gets out of the UAV communication range. HP-MAC, a hybrid MAC protocol, based on the IEEE 802.11 CSMA/CA MAC protocol and TDMA protocol is proposed in [33]. A hybrid protocol that partially adopts the beacon-based IEEE 802.15.4 MAC DR/CDT mechanisms is proposed in [34]. Recently, MAC for UAV-based mission-critical WSNs is proposed in [35]. The authors have focused on designing MAC for efficient communication and coordination between UAVs employed in a mission. However, UAV-to-sensor communication is not considered.

3. System Model

3.1. Clustering of Sensor Nodes

It is assumed that homogenous sensor nodes are randomly deployed on the ground. The sensor nodes are clustered using an energy-efficient clustering method as presented in [36,37]. At first, sensor nodes share their head status to all the sensor nodes within its transmission range. The head status includes node identifier, residual energy and location coordinates. The node having the highest energy is elected as CH in that region. Figure 2 clarifies CH selection process where circles represent different competition ranges. If CH1 is selected as CH, no other CH will be selected within its competition range R1. The selection of CHs is controlled over the network. The competition range for CHi is determined as in [37], where 0 ≤ in and n is the number of CHs. That is,
R a n g e c o m p = 1 α ( D m a x d ( C H i , S N j ) ) D m a x D m i n β ( 1 E r E m a x ) R m a x
where α and β are weights ranging between 0 and 1, Rmax is the maximum transmission range, Er is the remaining energy of the node, Emax is the maximum value of energy, d(CHi, SNj) is the distance between CHi and sensor node SNj (0 ≤ jN and N is the number of sensor nodes), Dmax and Dmin are the maximum and minimum distance between SNj and other CHs in the neighborhood.
After a CH is nominated, sensor nodes send join request to the CH. Then, the CH selects its cluster members on the basis of distance and the number of cluster members it can accommodate. If the number of join requests exceeds the cluster size (i.e., the maximum number of nodes in a cluster), the CH rejects the excessive join requests from sensor nodes. The sensor nodes that do not receive the join reply try to join any other CH in their vicinity. CHs are responsible for collecting data from their cluster members before the arrival of the UAV. Data aggregation is carried out to filter redundant data so that the size of data to be transmitted is small. CH selection and cluster formation takes place after the nodes are deployed on ground and before the arrival of UAV. At every round, after UAV-to-CH communication, the remaining energy of CH is compared with the minimum energy required for SN to be CH (i.e., Emin). If the remaining energy of a particular CH is lesser than Emin, a new CH is selected for the next round. Otherwise, the same node continues as CH for the next round as well.

3.2. UAV and Antenna Type

We consider a fixed wing UAV for our system, which flies at constant height (h) and velocity (v) without stopping at any place to gather data from CHs. A fixed wing UAV has the capabilities to be stable during high speed as well as its ability to maneuver during bad conditions. In addition, takeoff and landing are not so complicated due to the lightweight of such UAVs. The flight path of the UAV is predefined such that it travels all the area without stopping to collect data. The UAV is equipped with two transceivers. One of the transceivers is used to broadcast beacon signals and receive registration packets whereas second one is used to send scheduling information and receiving data packets. Information about the antenna bearing is sent by the UAV in beacon signals and scheduling frames. CHs tune to the respective frequencies before transmitting the packets to UAV. UAV uses a directional antenna with flare angle φ = 60° Directional communication offers many benefits such as extended range of transmission, less delay, and spatial reuse. The communication range of the UAV can be given by r = h tan(φ/2), where φ is the angle of the antenna orientation of the UAV. The sensors, which lie on the coverage area of flare angle and receive the beacon signal from the UAV, become active. If sensors do not receive signal or the received signal strength is weak, the sensors go to sleep mode to save energy. In this way, directional antenna limits the coverage of the UAV and overcomes the directional deafness problem.

3.3. Localization of Sensor Nodes and UAV

We utilize geographic location information of sensors to improve the accuracy in the localization process. Both UAV and sensor nodes are equipped with global positioning system (GPS) for achieving higher efficiency location information and timing. Location and timing information are used during registration phase by sensor nodes to be registered with the UAV. The UAV uses GPS information during scheduling phase to achieve fairness and efficient use of TDMA slots. In some works [31,38], it is also assumed that only few of the sensor nodes in the network are equipped with local GPS receiver and other sensor nodes can find their position according to GPS empowered sensors to reduce the cost of network. Because our work is highly focused for critical situations, however, the certain amount of additional cost in the network is acceptable. We also assume that the flight path of the UAV covers all the sensors in the field and speed of the UAV is chosen such that it gets in the vicinity of all sensor nodes during its fight time.

3.4. Communication Phases

Communication in the proposed EF-MAC system completes in the three steps: i.e., sensor-to-CH communication, CH-to-UAV communication, and the UAV-to-BS communication. For sensor-to-CH communication, after the deployment of sensor nodes in the application area, the sensors are grouped into clusters by using a clustering algorithm. A CH is selected on each cluster and the CH collects data from its cluster members before the arrival of the UAV. Each CH assigns TDMA slots to its cluster members and the cluster members transmit the sensed data to its CH using the allotted slot time. Sensor-to-CH communication is very similar as in WSNs and it has been highly researched in the existing literature. Therefore, we have not given much attention to intra-cluster communication in our work. Then, CHs are also responsible to communicate with UAV and transmit the collected data to the UAV. In addition to this, UAV-to-BS communication occurs using a cellular link. We assume that the UAV can easily transmit the collected data to BS. As a result, energy consumption issue does not exist there. Hence, we have focused our research on designing novel MAC protocol that assures efficient CH-to-UAV communication with minimum delay.

4. Energy-Efficient and Fast Medium Access Control

In this section, we have detailed the proposed EF-MAC protocol for emergency environments. Three algorithms are presented in the following subsections, which are EF-MAC at UAV side, EF-MAC at sensor side, and prioritization process, respectively. Algorithms are discussed in association with their operational principles and packet formats.

4.1. EF-MAC at UAV Side

In UWSNs, the UAV is responsible for gathering data from the low powered sensors deployed on the ground. Keeping this in mind, channel is divided into four different phases after the arrival of the UAV. Algorithm 1 describes how UAV-MAC functions for efficient UAV-to-CH communication. At first, when the UAV gets into the area of WSN deployment, it announces its presence to the sensor nodes by broadcasting the beacon signals in the current active area by using transceiver T1. Beacon frame includes information about the UAV such as current position, velocity, transceiver T1, and time. This phase is known as beaconing phase. After transmitting beacon signals, UAV waits for sensor nodes to send registration frames. This is the second phase i.e., registration phase. Information of CHs is embedded in the registration frame. Third phase i.e., scheduling phase begins after UAV receives registration frames from the sensors in its active area. By using the information of CHs in registration frame, the UAV calculates CDT with every CH in the list, remaining energy of CH and the amount of data to be transmitted. Afterwards, the UAV assigns priority to CHs and then allocates time slots being based on that priority. Size of the time slot is decided considering the data size buffer of CHs. In this way, the channel time is not wasted and ultimately the energy of the network is reduced to great extent. Then, the UAV broadcasts scheduling information by using the transceiver (T2) and this phase is known as scheduling phase. Finally, the UAV receives data packets from the CHs in the fourth phase i.e., data gathering and transmits it to the BS. CHs use the assigned slots to transfer data so there is no collision during the data gathering process. Thus, EF-MAC significantly reduces the time and energy consumption due to multiple re-transmissions.
Algorithm 1. The algorithm is run in the UAV as it gets into the area of a WSN to establish communication with CHs.
Input: UAV_id, location (x, y, z), velocity (v), transceiver bearings (T1 and T2), and RegisteredCHList = {Ø}
Output: TDMA slots with variable time
/*Initialize the network*/
//The flight time, path and velocity of UAV is determined and controlled by the BS. UAV flies on its preplanned path and schedule to gather data from the sensor nodes.
1:   begin
2:                  while (UAV is in the area of WSN) do//when UAV reaches the area of sensor nodes deployment
3:                        Send beacon frames//UAV transmits beacon signals to let the sensors know about its presence
4:                        if (receive registration frames from CHs) then//after beaconing process, UAV waits for the registration frames from CHs
/*Update*/
5:                          RegisteredCHList = {CHi, CHj, CHk, …}//UAV maintains a queue to keep record of the registered CHs and it is updated every time UAV receives registration frame from CHs
6:                          Use prioritization process// Prioritization process is described in Section 4.3.
7:                           Schedules CHs on the basis of prioritization process
8:                          Send scheduling frames to CHs
//after scheduling the registered CHs, UAV transmits the scheduling frames to CHs
9:                          Receive data frames from CHs//UAV receives data frames from CHs in final phase
10:        end if
11:        Remove CH from the RegisteredCHList//after data gathering process, the CH is removed from the list
/*Update*///UAV updates its RegisteredCHList so that the CHs that transmitted their data will not be scheduled again
12:     end while
13:   end

4.2. EF-MAC at Sensor Side

Owing to the mobility of the UAV, CHs need to transmit their data to the UAV before it leaves the coverage area of the UAV. Hence, there must be an efficient MAC running at WSN to ensure proper scheduling of the sensor nodes. After collecting data from the cluster members, CH sleeps and periodically wakes up to check beacon signals. Once CHs receive beacon signals from the UAV, they get active and immediately contend a channel to send registration frame to the UAV. During this phase, CHs use CSMA MAC protocol and use random back-off in case of collision. The registration frame size is very small compared to the data size and exchange of RTS/CTS is excluded to reduce the network overhead. In addition, the active area is bounded by the smaller beam-width of antenna and sensors are clustered so we assume that there is tolerable contention delay. Registration frame includes the information of CHs such as sensor_id, the position information (Xs, Ys) remaining energy and data buffer size. This whole process is carried out on the registration phase. Before transmitting registration frame, CHs use the location and speed information of the UAV, which are received in beacon signals, to calculate the current position of the UAV as:
X C = X i + V × ( t c t i )
Y C = Y i + V × ( t c t i )
and
Z C =   Z i + V × ( t c t i )
where the first term (i.e., Xi, Yi, and Zi) in every equation gives the current axes coordinates of the UAV, respectively. The second term (i.e., V × (tcti)) denotes the distance covered by the UAV in a certain time frame. We assume that CHs will contend the channel only if they have some data to transfer to the UAV otherwise, they will sleep until next active period to save the energy. Additionally, we assume that CHs aggregate the collected data from its cluster members and drop the redundant data. Hence, the amount of data collected by every CH is not of same size. Therefore, variable-length TDMA is introduced to utilize the channel efficiently. Format of four packets used in the four different phases of UAV-to-CHs communication is shown in Figure 3.
CHs wait for the scheduling frames after sending the registration frame to the UAV. If the CH fails to receive scheduling frame in that particular period due to collision or other network issues then it tries again after random time until it is in the active region of the UAV and does not exceed the retries count limit. CHs receiving the scheduling information will wait for their turn in the frame. Finally, the scheduled CH uses the assigned time slot and transfer data directly to the UAV using T2 in a data-gathering phase. Hence, the UAV-to-CH link is efficiently utilized regarding time and energy. The MAC implemented at CH is detailed with the help of Algorithm 2.
Algorithm 2. The algorithm is run in the ground CHs after the arrival of UAV.
Input: CH_id, location (x, y), packet size (l), remaining energy, and RecieveBCN = 0
Output: Aggregated variable-sized data packets to transmit to UAV
/*Initialize the network*/
//After the sensor nodes are deployed on the ground, they form a cluster and select CH for each group. CH collects data from its cluster members by assigning proper TDMA slots and aggregates the collected data. Redundant data are discarded by CHs during the aggregation process and CHs wait for the UAV’s arrival
1:   begin
2:     if (RecieveBCN = 1) then
//CHs wake up periodically to check the arrival of UAV. Once CH senses the UAV’s arrival through the beacon signals, it immediately gets active and tries to send registration frames
3:     while (CH is in the active region of UAV’s antenna orientation) do
4:             CHs get active and contend for registration
//All CHs in active area tries to communicate with UAV using contention-based method i.e., CSMA
/*Update */
5:              Send registration frame to UAV
//CHs contend the channel to send registration frame to the UAV embedding information about its location, packet size, remaining energy, CH_id
6:                if (receives scheduling frames from UAV) then
/*Update*/
//CHs synchronize its time with UAV
7:                Waits for its turn
//CHs check their slot time in scheduling frame and wait
8:                Sends data frames
//CHs send all the collected data in their time slot and sleep
9:                  else
10:                Resends registration frames
//CHs keep trying for registration until maximum retry limit is met. If a CH cannot get registered until the time, then there is loss of data packets from the UAV
11:                end if
12:                for (each CHs in the UAV’s coverage region) do`
13:                Repeat Steps 4 to 11
//this is run in every CHs that receives beacon signals from UAV, is in the coverage area of UAV and if the re-transmission limit is not exceeded.
14:                end for
15:       end while
16:      end if
17:     end

4.3. Prioritization Process

The principal objective of EF-MAC is to maximize the amount of data collection with minimum delay and reduced energy consumption. Apart from energy and delay minimization, the protocol should also be fair enough to collect data from all the cluster heads. Hence, concerning the fairness of the network priority mechanism is introduced where priority is assigned by the UAV to the registered CHs based on their data buffer size, remaining energy and CDT. In this subsection, we describe the priority assignment mechanism with the help of Algorithm 3. Prioritization process is used by the UAV after receiving the registration frames from CHs and before transmitting the scheduling frames. As explained in Algorithm 1, during the registration phase, information regarding the location, data size, and energy level is embedded and transferred to the UAV by CHs. The UAV records this information in a list (i.e., RegisteredCHList). For all the registration packets received, the UAV calculates the distance between the UAV and CHs (i.e., d(UAV, CH)) and also the coverage range (r) by using the information of CHs in the registration packets. Afterwards, using the information calculated, the UAV finds out for how long time it can be in the communication range of the particular CH. This information is stored in CDT. If the value of CDT is too less to establish communication then that CH is discarded for that round. It helps to reduce the packet loss rate due to coverage problem. Additionally, the waste of time and energy due to communication failure is minimized. Then, the UAV uses CDT values and the information of data size and also the remaining energy of the CH to finalize the scheduling process. The CH which has large amount of data to transmit and less amount of remaining energy is scheduled first so that the data loss is minimized due to death of CH. The UAV shares the scheduling information with the registered CHs using T2.
Algorithm 3. The prioritization process for EF-MAC before scheduling the CHs.
Input: list of CH_id {CH1, CH2, CH3, …., CHn}, location (x, y), data size (l), remaining energy, range (r), and velocity (v)
Output: ScheduleList of registered CHs used by UAV for scheduling
/*Initialize the network*/
1:  begin prioritization process
2:   for (each CHs in the list) do
/*Computation*/
//By using the information of size of packets, location coordinates, and remaining energy received in registration frame, UAV calculates the time CH remains in its coverage area. If CH has enough time and energy to communicate with UAV, then it is scheduled; otherwise, it is discarded.
3:     Calculates CDT and α: C D T = r 2 d 2 v 2 , α = CDT/l
//UAV uses this information for scheduling process
4:     if (α is the lowest among all registered CHs and the remaining energy is enough for communication) then
//UAV checks for the CH with the minimum value of α
5:       CH has the highest priority and is placed at first in the ScheduleList
//UAV maintains a queue to keep the CHs in order of their priority
6:       else if (remaining energy of CH is not enough to complete communication with UAV) then
7:       CH is not scheduled and it is removed from the RegisteredCHList // From Algorithm 1
/*Update*/
//RegisteredCHList is updated
//CH with the second lowest value of α is scheduled if it has enough energy for communication
8:     end if
9:    end for
10:  end
/*Update*/
11: Return ScheduleList

5. Analysis of Energy and Delay

We consider a UWSN consisting of N sensors within an area of interest A, where a UAV is employed as a mobile data collector to gather information from n cluster heads (CHs) on the ground. The location of CHi is (xi, yi). Each CH collects data packets from its cluster members. We assume that the UAV flies at a fixed altitude of h meters and its maximum speed is denoted as Smax in meters/second (m/s). The UAV’s path is pre-planned. Let Xo and Xf are the initial and final location of the UAV in the defined path. We assume | | X f X o | | S max × T , where T is the data-gathering period of the UAV from CHs. CHs employ sleep and wake-up phases for energy consumption minimization. CHs wake up after sensing beacon signal from UAV. Only one CH can communicate with the UAV; otherwise, collision occurs. That is,
P   ( U A V , C H ) = { 1 0 I f   c o n n e c t i o n   b e t w e e n   U A V   a n d   C H   i s   e s t a b l i s h e d O t h e r w i s e
The proposed UWSN model for EF-MAC is designed to minimize delay during UAV-to-CH communication without increasing the energy consumption of CHs. This is given by the following objective function:
Minimize   delay ( D ) ,   Subject   to   E = E min ,
where Emin is the minimum possible energy required for UAV-to-CH communication. The communication process of EF-MAC is shown in Figure 4.
As shown in the figure, CHs try to communicate with the UAV to transfer data. If the CH senses the channel busy, it postpones its transmission by a random number that is back-off interval (0, CWi-1), in, where CWi is the contention window size for particular CH. The value of contention window depends on the number of retransmissions attempts and is given as in [39]
    C W i = 2 j C W ( min ) , j number   of   attempts ,
where the minimum value of CW is given by CWmin and CWmax gives the maximum value of back-off window. If the CH fails to communicate with the UAV within a number of attempts, data packets are discarded and CH sleeps to save the energy. We have considered certain retry limits so that energy waste due to long contention is minimized in our analysis. If CH is scheduled when it is in the active area, data is successfully transmitted to the UAV and CH sleeps.
Figure 5 illustrates the Markov model for three different states (i.e., collision, success, and idle states) which basically define the energy and delay performance of the UAV-to-CH communication. CHs sleep in other time to save their energy. The back-off state of a CH is also included inside the idle state in the figure as the CH has to remain idle during the period. In a homogenous network, packet transmission probabilities are the same for all CHs. If ϰ is the probability, any CH has data packets to transmit, ζ is the probability to sense the channel, and τ is the probability to sense the channel busy, the probability for CHk to transmit at a given time t is given by:
P t ( k | n c ) = i = 1 n c ϰ ( 1 τ ) ξ   ,
where nc is the number of contending CHs in particular time and region for CHk. Assuming that each transmission attempt is independent of previous ones, the probability that any CH (CHk), knc, will transmit successfully in a given time is:
P s u c c e s s ( k | n c ) = i = 1 , i k n c ( P ¯ t ( i ) ) P t ( k ) ,
where ( P ¯ t ( i ) ) is the probability that no CH will transmit in a given time. In case of multiple transmissions from CHs to UAV, collision occurs. The probability of collision for CHk is thus given by:
P c o l l i s i o n ( k | n c ) = i = 1 n c 1 ( P t ( i ) )
CHk changes its state either from success to idle state or from collision to back-off state. During its active period, the state of CHs is assumed to be any of the three states defined in the Marcov model. Hence, the sum of their steady-state probabilities is 1. Thus, the probability for CHk to be idle (either due to collision or after successful transmission) is:
P i d l e ( k | n c ) = 1 ( P c o l l i s i o n + P s u c c e s s )
If m is the number of simultaneous transmissions from different nodes, the state probabilities in Equations (9), (10), and (11) can be written as:
P s t a t e ( m , p ) = { P i d l e P s u c c e s s P c o l l i s i o n m = 0 m = 1 m > 1 .
If there is no any transmission or reception, then the node is said to be in idle state. If a single node is either transmitting or receiving, then it is in success state. If many nodes are transmitting or receiving at the same time, it is in collision state. If t is the present state, then state transition probabilities of next state (t + 1) are:
    P i   ( t + 1 ) = P i P i   ( t ) + P c i P c ( t ) + P s i P s ( t ) ,
  P c   ( t + 1 ) = P i c P i   ( t ) + P c P c ( t ) ,
and
P s   ( t + 1 ) = P i s P i   ( t ) + P s P s ( t )
In Equation (13), PiPi (t) gives the probability of a node continuing its idle state in the next state as well. PciPc (t) represents the probability of a node to be in idle state after observing collision. PsiPs (t) is the probability of node being in idle state after successful communication with the UAV. Similarly, in Equation (14), PicPi (t) gives the probability of a node to be in collision when it tries to communicate after its back-off time. PcPc (t) is the probability that nodes collide in the second attempt. There is no successful transmission in case of collision. Hence, the state transition from collision to success does not exist. In Equation (15), PisPi (t) shows the transition of node from idle state to successful transmission state. PsPs (t) is the probability that a node successfully communicates with the UAV for the second time. Moreover, in this equation, if a node succeeds to communicate with the UAV, the probability of switching to collision state is zero. From the above equations, the probability matrix of state transition is given by:
P = [ P i P c i P s i   P i c P c 0 P i s 0 P s ]
If ETot is the total energy consumed by any CH node, then:
E T o t   = i = 1 3 P s i   E s i   ,
where Psi is the probability of a node being in each of three sensors states, and Esi is the energy dissipated by CH in corresponding states and is given by:
E s i   = E s u c c e s s   + E c o l l i s i o n + E i d l e ,
where Esuccess and Ecollision are represented as:
E s u c c e s s   = E T X   + E R X   + E s e n s e  
and
E c o l l i s i o n   = R E T X   + E s e n s e   ,
where ETx, ERX, Eidle, and Esense are the energy consumed for transmitting, receiving, back-off stage, and sensing, respectively, and R is the number of re-attempts for CH to get registered.
Transmission energy depends on the packet size (l) and distance between the UAV and CH (δ) transmission energy and receiving energy is calculated as in [40,41]:
E T x ( l , δ ) = { l × E e l e c + l × E a m p × δ 2           i f   δ < d l × E e l e c + l × E a m p × δ 4 i f   δ d
and
E R X = l × E e l e c ,
where Eelec and Eamp are the energy dissipated to run transmitter and the energy dissipated by the transmission amplifier with different distance level, respectively, and d’ is given as:
d = ( 4 π ) 2 × l × R t r × R r λ 2 ,
where Rtr and Rr are the range of transmitter and receiver, respectively, and λ is the wavelength. The energy consumed by the CHk during three different states (success, collision and idle) is thus given by:
E s u c c e s s ( C H k ) = P s u c c e s s ( k | n c ) × [ E s e n s e + ( E T x × l r e g ) + ( E R x × l s c h ) + ( E T x × l T d a t a ) ]
E c o l i s i o n ( C H k ) = P c o l l i s i o n ( k | n c ) × [ ( E s e n s e × R ) + ( E T x × l r e g × R ) ]
and
E i d l e ( C H k ) = P i d l e ( k | n c ) × ( C W k + T i d l e )
where lreg, lTdata, lsch are the length of registration packet, the length of aggregated data packets by CHk, and the length of schedule packets, respectively. Tidle is the time CHk remains in idle state. Then, the total energy depleted by CHk can be derived from Equations (24), (25), and (26) as:
E T o t ( C H k ) = E s u c c e s s ( C H k ) + E c o l l i s i o n ( C H k ) + E i d l e ( C H k ) = P s u c c e s s ( k | n c ) × [ E s e n s e + ( E T x × l r e g ) + ( E R x × l s c h ) + ( E T x × l T d a t a ) ] + P c o l l i s i o n ( k | n c ) × [ ( E s e n s e × R ) + ( E T x × l r e g × R ) + ( E R x × l s c h ) + ( E T x × l T d a t a ) ] + P i d l e ( k | n c ) × ( C W k + T i d l e ) = P s u c c e s s ( k | n c ) × [ E s e n s e + ( l r e g × E e l e c + l r e g × E a m p × δ 2 ) + ( E R x × l s c h ) + ( l T d a t a × E e l e c + l T d a t a × E a m p × δ 2 ) ] + P c o l l i s i o n ( k | n c ) × [ ( E s e n s e × R ) + ( l r e g × E e l e c + l r e g × E a m p × δ 2 ) × R ] + P i d l e ( k | n c ) × ( C W k + T i d l e ) .
The delay observed by CHk can be calculated by dividing the process into two steps of registration phase (contention period) and data-gathering phase (contention-free). That is,
T C S M A = j = 1 R D c o l l i s i o n × 2 j C W ( min )
and
T T D M A = D Q u e u e + D T r a n s + D P r o p
where Dcollision is the delay due to collision while transmitting the registration frame which is given as:
D c o l l i s i o n = ( T s l o t ( i ) + D p ( i ) ) .
During contention-free phase, CHk simply uses assigned slot and transmits data. No any extra delay is expected due to collisions and retransmissions. Since variable-length TDMA slots are used, the transmitting time is different for CHs. The three different delays observed (i.e., DTrans, DQueue, and DProp) are calculated as:
T r a n s m i s s i o n   d e l a y   (   D T r a n s ) = i = 1 l m l T d a t a ( i ) B W ,
Q u e u e i n g   d e l a y   ( D Q u e u e ) = j = 1 P L X j + ω ,
and
P r o p a g a t i o n   d e l a y   (   D P r o p ) = i = 1 l m δ i l T d a t a ( i ) B W
respectively, where BW is the bandwidth of the channel used, Xj is the service period of high priority nodes, ω is waiting time until it is scheduled, and PL is the number of priority levels for different CHs. The value of l T d a t a ( i ) ranges between 100 and 150 bytes. If the steady-state vector is v = [vidle + vc + vs], the network throughput is:
T h r o u g h p u t ( T h ) = υ s   i = 1 , i ε { i , c , s } υ i   .
If ψ is the delay observed due to retransmissions of registration frames, then
ψ = 1 R i = 1 R ( C W i / l r e g ) D T r a n s ,
where lreg is the length of registration frame. If we consider the worst-case scenario, where O is the maximum offered slot size given as O = i = 1 l m P s u c c e s s ( k | n r ) × l T d a t a ( i ) and CHk is registered at the last retransmission attempt, the average packet delay experienced by CHk is:
D = ( O T h 1 ) ψ + O × υ s   T h ( T C S M A + T T D M A )
At the UAV side, the registration packets arrived from CHs are queued until the scheduling process begins. UAV immediately starts scheduling process once the queue is filled. It uses the second transceiver to share the scheduled information to the sensor nodes. Therefore, we assume that the delay incurred during the scheduling process is negligible. The numerical results of Marcov-based analytical model are shown in Figure 6, in which the average delay and average energy consumption for UAV-to-CH communication in the proposed scheme are shown.

6. Performance Evaluation

In this section, the performance of the EF-MAC protocol is evaluated and compared with that of the two conventional protocols. For comparison with our work, we have selected the IEEE 802.11 CSMA/CA MAC first because it is extensively used for wireless communication in UWSNs. We have then selected the HP-MAC protocol because it is a recently proposed state-of-the-art ‘hybrid’ MAC protocol as in our EF-MAC. In our performance study, the MAC protocols under evaluation are simulated by using the Matlab R2018a simulator.

6.1. Simulation Environment

In our simulation, sensor nodes are randomly distributed in the area of 500 × 400 m, the UAV is assumed to fly at the height 10m and with the speed of 15 m/s. Out of the total sensor nodes deployed, 10 percent (10%) is supposed to be CHs, which are responsible for data transmission to the UAV. We have tested the results by increasing the number of sensor nodes. For the proficient operation of the protocol, we have chosen constant height and velocity of the UAV such that every CH will get an access to the UAV at least once during the flight time.
We have considered key metrics to evaluate the performance of the proposed MAC and to compare it with existing ones. The performance metrics are as follows:
  • Network latency: As we have targeted our work for disastrous and emergency situations, delay is primarily focused. However, we have narrowed our work to the average time consumed for UAV-to-CHs communication. Total network delay considered in our UWSN network is given in Equation (36).
  • Fairness: In every resource sharing system, all the users should necessarily be treated equally such that network would perform fairly. Fairness is a key point under high mobility context as in UWSNs where every sensor should communicate in limited time for better utilization of the network. It is the function of variability of throughput to the users. For any set of user throughputs ( x 1 , x 2 , x 3 , x n ) , the fairness index of a network can be assigned as:
    f ( x 1 , x 2 , x 3 , x n ) = ( i = 1 n x i ) 2 n i = 1 n ( x i ) 2
  • For all non-negative values of xi’s, the fairness index lies between 0 and 1. In the proposed UWSN network, if all the sensor nodes get the equal chance of communicating with the UAV, then fairness is indexed as one. Sensor nodes may have different duration to be in contact with the UAV and the size of data to be transmitted varies. Therefore, the weighted fairness regarding the CDT and packet size to be transmitted is required when evaluating the fairness in our prioritization algorithm. For any CHi, i.e., n, the weighted fairness index is the ratio of CDT of that particular CH to the time required for transmitting data by that CH (Wfi = CDTi/Ti). Thus, the opportunity for every sensor to participate in communication process is given by
    F c = (   i = 1 n N s l o t s ( i ) × W f i ) 2 n i = 1 n ( N s l o t s ( i ) × W f i ) 2 ,
    where Nslots (i) is the size of time slot allocated to CHs that is of variable length. If the UAV spends much time in gathering data from certain sensors only then it may not have enough time to address all the sensors.
  • Energy efficiency of sensor nodes: Energy efficiency of UWSN network is defined as the amount of energy consumed by the wireless sensor nodes during the communication with UAV. Regardless of the number of sensor nodes used in UWSN network, CHs are responsible to aggregate the received information from the cluster members to l bits and transmit it to UAV. The major reason of energy exhaustion in sensor nodes is due to its radioactivity i.e., transmission and reception of data. Hence, much works are being carried out to minimize the number transmission and reception as a result of collisions. We have assumed the distance between CH and the UAV as δ, and then the energy consumption is calculated as shown in Equation (27).
  • Throughput: It is the rate of data delivery at the MAC layer of the network. In other words, it is the total amount of data transmitted to the UAV by the sensors. Let, Φ denotes average traffic that is generated in the observed area per unit time. Total traffic per distance δ is Φδ. If S(x) is the probability that a packet is successfully delivered to the UAV at δ i.e., S(x) = (1−PTxm) where P is the probability of packet failure and Txm is the maximum attempts made. Then, the overall throughput of the network is given as expressed in seconds and evaluated as:
    T h r o u g h p u t ( T h ) = 0 A Φ δ S ( x ) d x
  • Network lifetime: The operation of UWSN is subject to multiple constraints, among which one of the most critical is the available energy of the nodes in UWSN. Network lifetime is an important parameter in UWSN networks, which shows the number of dead nodes in every round of simulation due to the exhaustion of energy. Sensor nodes commonly use lithium thionyl chloride battery (Li/SOCL2) which has the capacity of 400–35000 mA. The lifetime of the network can be expressed in seconds and evaluated as:
    l i f e t i m e = e n e r g y i n i t i a l e n e r g y t o t a l ,
    where energyinitial is the energy of sensor node during its deployment and energytotal is the amount of total energy depleted during transmission, reception and other radio activities and expressed as e n e r g y t o t a l = E T x ( l , d ) + E R x ( l ) .
  • Runtime complexity: The asymptotic computational complexity of the proposed algorithm is estimated on the basis of the instructions provided in the algorithm. The number of basic linear operations is calculated as O(n), where n is the number of clusters. In our algorithm, we have used a RegisteredCHList and ScheduleList to keep the records of CHs. The complexity of inserting elements is 2×O(log n). The proposed scheme is accompanied by m transmissions from n clusters. Its complexity is given by O(mn). Hence, the asymptotic complexity of the algorithm is O(n) +O(log n) + O(mn) = O(mn).
Simulation parameters are listed in the Table 1.

6.2. Simulation Results and Discussion

In this section, results obtained via simulation are summarized and then they are compared with other conventional MAC protocols for various parameters mentioned in the above section. The simulation results in Figure 7 depict the implementation of the UAV in WSN environment for data gathering process with different antenna orientation. Implementation is done in 3D scenario. We assume that the UAV uses a simple trajectory which is defined and controlled by the BS. Because our work aims to enhance the CH-to-UAV communication, we consider the mobility and height of the UAV within the WSN deployment region only. For simplicity, it is assumed that the UAV moves with constant speed and at fixed height as in Figure 7. In the simulation, the UAV receives the information about CHs and their location while it is moving. That is, the UAV’s path covers all the sensors while it is moving within the WSN area. The UAV keeps gathering data from CHs while it is moving without stopping or slowing down at any point.
Figure 8 shows the lifetime of the proposed EF-MAC network. Simulation is done for the number of rounds to check the number of dead nodes, which is due to the depletion of energy. It is very apparent from the figure that the number of dead nodes is proportionally high for CSMA/CA MAC than other two MAC protocols. It is due to the number of collisions and re-transmissions during data transmission process. Furthermore, nodes need to stay active for longer duration contending the channel in CSMA/CA. This significantly affects the energy efficiency of the network. Number of dead nodes for HP-MAC is comparatively lesser than that of CSMA/CA but higher than that of the EF-MAC due to the fact that in the proposed EF-MAC nodes need not to stay active for long time to send data and also the channel is very efficiently used.
Figure 9 shows the time taken for a sensor node (CH in EF-MAC) to communicate with UAV. In addition, we have checked the result by varying the number of contending nodes. It can be observed that there is certain delay in the network as the number of nodes is increased. However, there is not significant increment in the time duration (only 0.05) even when the number of nodes is increased by five times. Thus, the result shows that the proposed system performs well even in the highly dense network. Afterwards, the result is compared with two other MAC protocols i.e., CSMA/ca MAC and hybrid HP-MAC. The result of comparison shows that the delay is reduced in the proposed EF-MAC by 20% and 25% than in HP-MAC and CSMA/CA MAC. This is due to the fact that both of the transceivers are not used for data-gathering. The time for broadcasting beacons and receiving beacons is minimized which is much shorter than the time for scheduling and data-gathering process. The time slots are assigned and used efficiently which also minimizes the network delay. Moreover, the data are aggregated by the CH and only useful information is sent to the UAV using LOS communication.
From the results obtained in Figure 10, we can say that the proposed EF-MAC reduces the energy consumption than the previously proposed MAC protocols i.e., CSMA/CA MAC and HP-MAC. Reduction in energy is due to the minimum time for sensors to remain active and communicate with UAV, a smaller number of collisions, re-transmissions, and variable slot-time TDMA slots which restricts the wastage of time during the data transmission process. Furthermore, the nodes are clustered and only CH takes part in UAV-to-CH communication, which also minimizes the energy depletion. As there is proper handshaking between the UAV and CHs before data transmission process, there is nominal chance of idle listening and overhearing. Energy consumption is thus reduced by 12% than in HP-MAC and by 17% than in CSMA/CA MAC protocol in EF-MAC.
Figure 11 shows the total number of data packets transmitted to the UAV from CHs within the different rounds of data gathering phase. It can be figured out that the number of packets transmitted is highest in the proposed EF-MAC than other two conventional MAC protocols. In EF-MAC, UAV can receive data using two channels and the information about the number of data packets is used by UAV during scheduling process. This helps the UAV to assign slot time properly such that more number of packets can be received in the given time. There are minimal chances of packet loss due to the coverage problem and the lifetime of sensor nodes in EF-MAC is improved one. Ultimately, the number of nodes communicating is increased and so is the number of packets collected by UAV. Hence, the throughput of the EF-MAC is also improved and the base station can take right decision with the sufficient information received from the sensor nodes.
Figure 12 depicts the simulated fairness of EF-MAC for various number of contending nodes. In the proposed UWSN system, the network is supposed to be fair enough if every CH gets equal chance of communicating with UAV and transmitting its data. In this scenario, EF-MAC has improved fairness than HP-MAC and CSMA/CA MAC. EF-MAC uses prioritization method, which uses information such as duration CH remains in UAV’s coverage area, packet size and remaining energy to assign priority such that every CH has chance of participating in the communication process before it dies or gets out of the active region. Fairness level is indexed very low in case of CSMA because there is high chance that many CHs get out of the active region of the UAV before transmitting its data to the UAV or due to the collisions occurred while transmitting data packets. Meanwhile, in the proposed EF-MAC two transceivers are concurrently operated which escalates the probability for every CH to participate in communication process. However, the result shows fluctuating values of fairness, which is because of the variable size of, time slots assigned as in Equation (38). If data is collected from every CH then the network is also assumed reliable one.

7. Conclusions

In this paper, we have presented an energy-efficient and fast MAC protocol called EF-MAC for time-critical applications such as border surveillance, pre- and post-war environments and disaster-prone atmospheres. Reliable and timely communication in case of surveillance and aftermath of natural calamities helps to minimize the loss of lives and properties to the great extent. If the information of unauthorized border crossing by trespassers, smugglers, and terrorists is transmitted to the base station without much delay, then the instant action could be taken against it. In addition, during wars and disasters, proper rescue can be arranged, which saves lives of many people. To address these issues, variable slot-time TDMA that reduces the unnecessary energy and time of the network has been presented in this paper.
The proposed EF-MAC adaptively handles the varying amount of data traffic by using a large number of small size data slots. EF-MAC has been analytically evaluated using the Markov model and then validated through the extensive simulation. The simulation results closely resemble the results obtained through the Marcov-based analytical model in terms of energy consumption and time. From the performance study, it is apparent that the time to communicate with the UAV for sensors is highly reduced and the energy consumption is lessened. Thus, we can target our protocol for the critical environment where network latency is primarily concerned.
The use of multiple UAVs could be considered rather than a single UAV for this work, but the coordination and efficient communication between UAVs must be guaranteed for better performance of the protocol. In addition, designing an efficient path-planning algorithm and synchronizing the UAV’s arrival time with the active period of CHs can be thought-out so that energy wasted during the periodic wake up can be minimized. We have left this as our future work. As another future work, we will study the optimality of MAC protocols in UWSNs in terms of energy consumption and network latency.

Author Contributions

S.P. developed and simulated the EF-MAC protocol; S.M. directed the research and contributed to refining the protocol and interpreting the simulation results; the paper was drafted by S.P., and subsequently revised and approved by S.M. All authors have read and agreed to the published version of the manuscript.

Funding

This study was supported in part by research fund from Chosun University, 2020.

Acknowledgments

The authors wish to thank the editor and anonymous referees for their helpful comments in improving the quality of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lutakamale, A.S.; Kaijage, S. Wildfire monitoring and detection system using wireless sensor network: A case study of Tanzania. Wirel. Sens. Netw. 2017, 9, 274–289. [Google Scholar] [CrossRef] [Green Version]
  2. Kumar, S.; Duttagupta, S.; Rangan, V.P.; Ramesh, M.V. Reliable Network connectivity in wireless sensor networks for remote monitoring of landslides. Wirel. Netw. 2020, 26, 2137–2152. [Google Scholar] [CrossRef]
  3. Zhang, R.; Xiao, X. Intrusion detection in wireless sensor networks with an improved NSA based on space division. J. Sens. 2019, 1–20. [Google Scholar] [CrossRef] [Green Version]
  4. Garcia-Font, V.; Garrigues, C.; Rifà-Pous, H. Attack classification schema for smart city WSNs. Sensors 2017, 17, 771. [Google Scholar] [CrossRef] [Green Version]
  5. Abid, A.; Khan, F.; Hayat, M.; Khan, W. Real-time object tracking in wireless sensor network. In Proceedings of the 10th International Conference on Electrical and Electronics Engineering (ELECO), Bursa, Turkey, 30 November–2 December 2017; pp. 1103–1107. [Google Scholar]
  6. Viani, F.; Oliveri, G.; Donelli, M.; Lizzi, L.; Rocca, P.; Massa, A. WSN-based solutions for security and surveillance. In Proceedings of the 40th European Microwave Conference, Paris, France, 28–30 September 2010; pp. 1762–1765. [Google Scholar]
  7. Zhao, N.; Lu, W.; Sheng, M.; Chen, Y.; Tang, J.; Yu, F.R.; Wong, K.K. UAV-assisted emergency networks in disasters. IEEE Wirel. Commun. 2019, 26, 45–51. [Google Scholar] [CrossRef] [Green Version]
  8. Suriyachai, P.; Brown, J.; Roedig, U. Time-critical data delivery in wireless sensor networks. Distrib. Comput. Sens. Syst. 2010, 216–229. [Google Scholar] [CrossRef]
  9. Luo, S.; Sun, Y.; Ji, Y. Data collection for time-critical applications in the low-duty-cycle wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015, 11, 931913. [Google Scholar] [CrossRef] [Green Version]
  10. Kopfstedt, T.; Mukai, M.; Fujita, M.; Ament, C. Control of formations of UAVS for surveillance and reconnaissance missions. IFAC Proc. 2008, 41, 5161–5166. [Google Scholar] [CrossRef] [Green Version]
  11. Arafat, M.Y.; Moh, S. Routing protocols for unmanned aerial vehicle networks: A survey. IEEE Access 2019, 7, 99694–99720. [Google Scholar] [CrossRef]
  12. Arafat, M.Y.; Moh, S. A survey on cluster-based routing protocols for unmanned aerial vehicle networks. IEEE Access 2018, 7, 498–516. [Google Scholar] [CrossRef]
  13. Ho, D.; Grøtli, E.; Sujit, P.; Johansen, T.; Sousa, J. Optimization of wireless sensor network and UAV data acquisition. J. Intell. Robot. Syst. 2015, 78, 159–179. [Google Scholar] [CrossRef]
  14. Arafat, M.Y.; Moh, S. Location-aided delay tolerant routing protocol in UAV networks for post-disaster operation. IEEE Access 2018, 6, 59891–59906. [Google Scholar] [CrossRef]
  15. Arafat, M.Y.; Moh, S. Localization and clustering based on swarm intelligence in UAV networks for emergency communications. IEEE Internet Things J. 2019, 6, 8958–8976. [Google Scholar] [CrossRef]
  16. Tuna, G.; Mumcu, T.; Gulez, K.; Gungor, V.; Erturk, H. Unmanned aerial vehicle-aided wireless sensor network deployment system for post-disaster monitoring. Commun. Comput. Inf. Sci. 2012, 298–305. [Google Scholar] [CrossRef]
  17. Mozaffari, M.; Saad, W.; Bennis, M.; Nam, Y.; Debbah, M. A tutorial on UAVs for wireless networks: Applications, challenges, and open problems. IEEE Commun. Surv. Tutor. 2019, 21, 2334–2360. [Google Scholar] [CrossRef] [Green Version]
  18. Xu, J.; Zeng, Y.; Zhang, R. UAV-enabled wireless power transfer: Trajectory design and energy optimization. IEEE Trans. Wirel. Commun. 2018, 17, 5092–5106. [Google Scholar] [CrossRef] [Green Version]
  19. Kim, E.; Choi, H.; Kwon, J. Regional density-aware data collection using unmanned aerial vehicle in large-scale wireless sensor networks. Sens. Mater. 2018, 30, 1735. [Google Scholar] [CrossRef]
  20. Joshi, Y.; Younis, M. Restoring connectivity in a resource constrained WSN. J. Netw. Comput. Appl. 2016, 66, 151–165. [Google Scholar] [CrossRef] [Green Version]
  21. Yang, X.; Gao, Z.; Niu, Q. Unmanned aerial vehicle–assisted node localization for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2017, 13. [Google Scholar] [CrossRef]
  22. Alrashed, E.; Karaata, M. Imposter detection in mobile wireless sensor networks. Int. J. Comput. Commun. Eng. 2014, 3, 434–441. [Google Scholar] [CrossRef]
  23. Poudel, S.; Moh, S. Medium access control protocols for unmanned aerial vehicle-aided wireless sensor networks: A survey. IEEE Access 2019, 7, 65728–65744. [Google Scholar] [CrossRef]
  24. Wang, L.; Li, H.; Jiang, Y. Adaptive-opportunistic aloha: A media access control protocol for unmanned aerial vehicle–wireless sensor network systems. Int. J. Distrib. Sens. Netw. 2016, 12. [Google Scholar] [CrossRef]
  25. Say, S.; Aomi, N.; Ando, T.; Shimamoto, S. Circularly multi-directional antenna arrays with spatial reuse based MAC for aerial sensor networks. In Proceedings of the 2015 IEEE International Conference on Communication Workshop (ICCW), London, UK, 8–12 June 2015; pp. 2225–2230. [Google Scholar]
  26. Say, S.; Aomi, N.; Ando, T.; Jiang, L.; Shiratori, N.; Shimamoto, S. Effective data gathering protocol in WSN-UAV employing priority-based contention window adjustment scheme. In Proceedings of the 2014 IEEE Globecom Workshops (GC Wkshps), Austin, TX, USA, 8–12 December 2014; pp. 1475–1480. [Google Scholar]
  27. Ho, T.D.; Park, J.; Shimamoto, S. Novel multiple access scheme for wireless sensor network employing unmanned aerial vehicle. In Proceedings of the IEEE/AIAA 29th Digital Avionics Systems Conference (DASC), Salt Lake City, UT, USA, 3–7 October 2010. [Google Scholar]
  28. Ho, T.D.; Park, J.; Shimamoto, S. QoS constraint with prioritized frame selection CDMA MAC protocol for WSN employing UAV. In Proceedings of the 2010 IEEE Globecom Workshops, Miami, FL, USA, 6–10 December 2010; pp. 1826–1830. [Google Scholar]
  29. Ho, D.; Park, J.; Shimamoto, S. Power and performance tradeoff of MAC protocol for wireless sensor network employing UAV. In Proceedings of the 2010 International Conference on Advanced Technologies for Communications, Ho Chi Minh City, Vietnam, 20–22 October 2010; pp. 23–28. [Google Scholar]
  30. Ho, D.; Shimamoto, S. Highly Reliable communication protocol for WSN-UAV system employing TDMA and PFS scheme. In Proceedings of the 2011 IEEE GLOBECOM Workshops (GC Wkshps), Houston, TX, USA, 5–9 December 2011; pp. 1320–1324. [Google Scholar]
  31. Araghizadeh, M.; Teymoori, P.; Yazdani, N.; Safari, S. An efficient medium access control protocol for WSN-UAV. Ad Hoc Networks 2016, 52, 146–159. [Google Scholar] [CrossRef]
  32. Mori, S. Cooperative sensing data collecting framework by using unmanned aircraft vehicle in wireless sensor network. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 22–27 May 2016; pp. 1–6. [Google Scholar]
  33. Ramli, M.R.; Kim, D.; Lee, J.M. Hybrid MAC protocol for UAV-assisted wireless sensor networks. Preprints 2018. [Google Scholar] [CrossRef]
  34. Ma, X.; Kacimi, R.; Dhaou, R. Adaptive hybrid MAC protocols for UAV-assisted mobile sensor networks. In Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 12–15 January 2018; pp. 1–4. [Google Scholar]
  35. Yang, X.; Wang, L.; Xie, J.; Wang, Y. Medium Access control for unmanned aerial vehicle based mission critical wireless sensor networks in 3D monitoring networks. IEEE Access 2019, 7, 102274–102283. [Google Scholar] [CrossRef]
  36. Li, C.; Ye, M.; Chen, G.; Wu, J. An energy-efficient unequal clustering mechanism for wireless sensor networks. In Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, Washington, DC, USA, 7 November 2005; pp. 604–697. [Google Scholar]
  37. Gupta, V.; Pandey, R. An improved energy aware distributed unequal clustering protocol for heterogeneous wireless sensor networks. Eng. Sci. Technol. Int. J. 2016, 19, 1050–1058. [Google Scholar] [CrossRef] [Green Version]
  38. Manolakis, D.E. Efficient solution and performance analysis of 3-D position estimation by trilateration. IEEE Trans. Aerosp. Elect. Syst. 1996, 32, 1239–1248. [Google Scholar] [CrossRef]
  39. Khan, P.; Ullah, N.; Ali, F.; Ullah, S.; Hong, Y.S.; Lee, K.Y.; Kim, H. Performance analysis of different back-off algorithms for WBAN-based emerging sensor networks. Sensors 2017, 17, 492. [Google Scholar] [CrossRef] [Green Version]
  40. Liu, X.; Wu, J. A method for energy balance and data transmission optimal routing in wireless sensor networks. Sensors 2019, 19, 3017. [Google Scholar] [CrossRef] [Green Version]
  41. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for wireless micro sensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Application scenario of unmanned aerial vehicle (UAV)-aided data gathering in wireless sensor networks (WSN) for mission and time-critical applications.
Figure 1. Application scenario of unmanned aerial vehicle (UAV)-aided data gathering in wireless sensor networks (WSN) for mission and time-critical applications.
Sensors 20 02635 g001
Figure 2. Cluster head (CH) selection in unequal size clustering method as in [37].
Figure 2. Cluster head (CH) selection in unequal size clustering method as in [37].
Sensors 20 02635 g002
Figure 3. Format of packets for energy-efficient and fast medium access control(EF-MAC).
Figure 3. Format of packets for energy-efficient and fast medium access control(EF-MAC).
Sensors 20 02635 g003
Figure 4. Communication process of EF-MAC.
Figure 4. Communication process of EF-MAC.
Sensors 20 02635 g004
Figure 5. Three-state Markov model.
Figure 5. Three-state Markov model.
Sensors 20 02635 g005
Figure 6. Results of the Marcov-based analytical model: (a) average delay experienced by the nodes and (b) average energy consumption of the nodes.
Figure 6. Results of the Marcov-based analytical model: (a) average delay experienced by the nodes and (b) average energy consumption of the nodes.
Sensors 20 02635 g006
Figure 7. UAV based data collection in WSN with three different antenna orientations of (ac).
Figure 7. UAV based data collection in WSN with three different antenna orientations of (ac).
Sensors 20 02635 g007
Figure 8. Network Lifetime.
Figure 8. Network Lifetime.
Sensors 20 02635 g008
Figure 9. Network Latency.
Figure 9. Network Latency.
Sensors 20 02635 g009
Figure 10. Average energy consumption.
Figure 10. Average energy consumption.
Sensors 20 02635 g010
Figure 11. Packet delivery per rounds.
Figure 11. Packet delivery per rounds.
Sensors 20 02635 g011
Figure 12. Fairness.
Figure 12. Fairness.
Sensors 20 02635 g012
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterValue
Network simulatorMatlab
UWSN deployment area500 m × 400 m × 10 m
Number of sensor nodes100–200
Number of UAV1
Initial energy2 J
Transmission energy17.1 nJ
Receiving energy15 nJ
Idle state energy12.7 nJ
Sensing energy2.7 nJ
Packet size (variable)100–150 bytes
Registration frame size20 bytes
Maximum queueing delay20 × 16 × 10−6 s
Back-off valuerand (3, 5)
UAV’s speed15 m/s
AV’s height10 m
UAV’s transmission range200–250 m
SensorsStatic
Directional antenna flare angle60°

Share and Cite

MDPI and ACS Style

Poudel, S.; Moh, S. Energy-Efficient and Fast MAC Protocol in UAV-Aided Wireless Sensor Networks for Time-Critical Applications. Sensors 2020, 20, 2635. https://doi.org/10.3390/s20092635

AMA Style

Poudel S, Moh S. Energy-Efficient and Fast MAC Protocol in UAV-Aided Wireless Sensor Networks for Time-Critical Applications. Sensors. 2020; 20(9):2635. https://doi.org/10.3390/s20092635

Chicago/Turabian Style

Poudel, Sabitri, and Sangman Moh. 2020. "Energy-Efficient and Fast MAC Protocol in UAV-Aided Wireless Sensor Networks for Time-Critical Applications" Sensors 20, no. 9: 2635. https://doi.org/10.3390/s20092635

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop