Two-way beacon scheduling in ZigBee tree-based wireless sensor networks

Lun Wu Yeh*, Meng Shiuan Pan, Yu-Chee Tseng

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Abstract

Broadcast and convergecast are two fundamental operations in wireless sensor networks. Although previous works have addressed energy-efficient and low-latency scheduling, these works either consider only one-way (broadcast or convergecast) communication or are not compliant to ZigBee/IEEE 802.15.4 standards. Motivated by these observations, this work defines a two-way beacon scheduling problem for ZigBee tree-based networks. We propose a scheduling algorithm that can reduce indirect interference neighbors and achieve low-latency broadcast and convergecast. Simulation results are presented.

Original languageEnglish
Title of host publication2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, SUTC 2008
Pages130-137
Number of pages8
DOIs
StatePublished - 9 Sep 2008
Event2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, SUTC 2008 - Taichung, Taiwan
Duration: 11 Jun 200813 Jun 2008

Publication series

NameProceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing

Conference

Conference2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, SUTC 2008
CountryTaiwan
CityTaichung
Period11/06/0813/06/08

Fingerprint Dive into the research topics of 'Two-way beacon scheduling in ZigBee tree-based wireless sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Yeh, L. W., Pan, M. S., & Tseng, Y-C. (2008). Two-way beacon scheduling in ZigBee tree-based wireless sensor networks. In 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, SUTC 2008 (pp. 130-137). [4545749] (Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing). https://doi.org/10.1109/SUTC.2008.51