R-PMAC: A Robust Preamble Based MAC Mechanism Applied in Industrial Internet of Things

نویسندگان

چکیده

This paper proposes a novel media access control (MAC) mechanism, called the robust preamble-based MAC mechanism (R-PMAC), which can be applied to power line communication (PLC) networks in context of Industrial Internet Things (IIoT). Compared with other mechanisms such as P-MAC and layer IEEE1901.1, R-PMAC has higher networking speed. Besides, it supports whitelist authentication functions properly presence data frame loss. Firstly, we outline three basic R-PMAC, containing precise time difference calculation, preambles generation short ID allocation. Secondly, elaborate its process single multiple layers. Thirdly, illustrate mechanisms, including collision handling retransmission. Moreover, low-cost hardware platform is established measure connecting hundreds PLC nodes for P-MAC, IEEE1901.1 real environment. The experiment results show that outperforms by achieving 50% reduction time. These findings indicate holds great potential quickly effectively building network actual industrial scenarios.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

improvement of Location-based Algorithm in the Internet of Things

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

متن کامل

A method to increasing the Quality of Service (QoS) in Wireless body area networks by providing a MAC layer Protocol based of Internet of Things

With the development of technology, the use of wireless telecommunication networks for the various affairs is essential. These networks are one of the safest and most widely used networks, for instance, in medical care and remote patient monitoring. What matters is the quality of service in these networks. The purpose of this paper is to increase packet transduction in a wireless body area netw...

متن کامل

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

Security and the Industrial Internet of Things

Benjamin will discuss challenges in securing next-generation infrastructure technology. He will introduce the topic and discuss fundamental differences between IT, OT, IoT and IIoT security. He will then discuss some of the approaches Siemens takes in deploying security in products, and ongoing research, with real-world examples. Faculty Host: James Abello Monedero

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet of Things Journal

سال: 2023

ISSN: ['2372-2541', '2327-4662']

DOI: https://doi.org/10.1109/jiot.2023.3285890