skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Attention:

The NSF Public Access Repository (PAR) system and access will be unavailable from 10:00 PM ET on Friday, February 6 until 10:00 AM ET on Saturday, February 7 due to maintenance. We apologize for the inconvenience.


Title: Burst-MAC: A MAC Protocol for Handling Burst Traffic in LoRa Network
Award ID(s):
2301757
PAR ID:
10638153
Author(s) / Creator(s):
; ; ;
Publisher / Repository:
IEEE
Date Published:
ISBN:
979-8-3315-4026-5
Page Range / eLocation ID:
148 to 160
Format(s):
Medium: X
Location:
York, United Kingdom
Sponsoring Org:
National Science Foundation
More Like this
  1. Bessani, Alysson; Défago, Xavier; Nakamura, Junya; Wada, Koichi; Yamauchi, Yukiko (Ed.)
    This paper studies the design of Byzantine consensus algorithms in an asynchronous single-hop network equipped with the "abstract MAC layer" [DISC09], which captures core properties of modern wireless MAC protocols. Newport [PODC14], Newport and Robinson [DISC18], and Tseng and Zhang [PODC22] study crash-tolerant consensus in the model. In our setting, a Byzantine faulty node may behave arbitrarily, but it cannot break the guarantees provided by the underlying abstract MAC layer. To our knowledge, we are the first to study Byzantine faults in this model. We harness the power of the abstract MAC layer to develop a Byzantine approximate consensus algorithm and a Byzantine randomized binary consensus algorithm. Both of our algorithms require only the knowledge of the upper bound on the number of faulty nodes f, and do not require the knowledge of the number of nodes n. This demonstrates the "power" of the abstract MAC layer, as consensus algorithms in traditional message-passing models require the knowledge of both n and f. Additionally, we show that it is necessary to know f in order to reach consensus. Hence, from this perspective, our algorithms require the minimal knowledge. The lack of knowledge of n brings the challenge of identifying a quorum explicitly, which is a common technique in traditional message-passing algorithms. A key technical novelty of our algorithms is to identify "implicit quorums" which have the necessary information for reaching consensus. The quorums are implicit because nodes do not know the identity of the quorums - such notion is only used in the analysis. 
    more » « less
  2. Dense RFID environments pose critical challenges such as Reader-to-Reader Interference (RRI), Reader-to-Tag Collisions (RTC), and inefficient resource utilization, which degrade system performance and scalability. Traditional Media Access Control (MAC) protocols, including CSMA and TDMA, struggle to address these issues effectively, particularly in dynamic and large-scale deployments. This paper introduces MCSMARA (Markov Decision Process (MDP)-based Carrier Sense Multiple Access with Reader Arbitration), a novel MAC protocol designed to optimize reader coordination in dense RFID networks. By leveraging an MDP framework, MCSMARA models reader state transitions and employs a utility-based arbitration mechanism to dynamically allocate frequencies and time slots. The protocol incorporates adaptive backoff and decentralized neighborhood discovery for efficient resource management without centralized control. Simulation results demonstrate that MCSMARA reduces collisions by up to 30%, improves throughput by 25%, and ensures superior scalability, supporting a large amount of readers with minimal computational overhead. These findings establish MCSMARA as a transformative solution for RFID networks in logistics, retail, and industrial IoT, with potential for extension to mobile and heterogeneous environments. 
    more » « less
  3. null (Ed.)