R-PMAC: A Robust Preamble Based MAC Mechanism Applied in Industrial Internet of Things
نویسندگان
چکیده
This paper proposes a novel media access control (MAC) mechanism, called the robust preamble-based MAC mechanism (R-PMAC), which can be applied to power line communication (PLC) networks in context of Industrial Internet Things (IIoT). Compared with other mechanisms such as P-MAC and layer IEEE1901.1, R-PMAC has higher networking speed. Besides, it supports whitelist authentication functions properly presence data frame loss. Firstly, we outline three basic R-PMAC, containing precise time difference calculation, preambles generation short ID allocation. Secondly, elaborate its process single multiple layers. Thirdly, illustrate mechanisms, including collision handling retransmission. Moreover, low-cost hardware platform is established measure connecting hundreds PLC nodes for P-MAC, IEEE1901.1 real environment. The experiment results show that outperforms by achieving 50% reduction time. These findings indicate holds great potential quickly effectively building network actual industrial scenarios.
منابع مشابه
improvement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
متن کاملA method to increasing the Quality of Service (QoS) in Wireless body area networks by providing a MAC layer Protocol based of Internet of Things
With the development of technology, the use of wireless telecommunication networks for the various affairs is essential. These networks are one of the safest and most widely used networks, for instance, in medical care and remote patient monitoring. What matters is the quality of service in these networks. The purpose of this paper is to increase packet transduction in a wireless body area netw...
متن کاملA Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملSecurity and the Industrial Internet of Things
Benjamin will discuss challenges in securing next-generation infrastructure technology. He will introduce the topic and discuss fundamental differences between IT, OT, IoT and IIoT security. He will then discuss some of the approaches Siemens takes in deploying security in products, and ongoing research, with real-world examples. Faculty Host: James Abello Monedero
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2023
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2023.3285890