JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 17, NO. 2, APRIL 2015 203 An Energy-Efficient Mobility-Supporting MAC Protocol in Wireless Sensor Networks Fei Peng and Meng Cui Abstract: Although mobile applications are an essential characteristic of wireless sensor networks, most existing media access control (MAC) protocols focus primarily on static networks. In these protocols, fixed periodic neighbor discovery and schedule updating are used to connect and synchronize neighbors to provide successful data transmission; however, they cannot adapt to mobile speed variation and degrade the network performance dramatically. In this paper, we propose a mobile-supporting mechanism for MAC protocols, in which the decision to update the neighbors of a mobile node is made adaptively according to the mobile speed. Analysis and simulation results demonstrate that the mechanism efficiently avoids the disconnection of a mobile node from its neighbors and achieves a better performance as compared with fixed periodic neighbor discovery. Index Terms: Media access control (MAC), mobility, performance evaluation, wireless sensor networks. I. INTRODUCTION OST traditional applications in wireless sensor networks (WSNs) focus mainly on static networks, in which the nodes are, in general, fixed from the time of their deployment. Recently, mobility emerged and has become a typical characteristic in the application of WSNs. Mobility in WSN applications refers to the fact that some network elements, such as sensor nodes, sinks, monitored targets, or actuators, may be mobile for reasons such as environmental influences, e.g., wind or water, or because the sensors are attached to or carried by mobile entities or possess automotive capabilities to quickly react to emergency situations. As the number of mobile entities monitored by sensors has gradually increased, the role played by mobility has become increasingly important in WSNs. However, most existing media access control (MAC) protocols are customized for stationary networks, where the topology is considered fixed and the neighbors of each node remain unchanged for a long period. According to our survey, only several MAC protocols consider the support of mobility. These MAC protocols are generally classified into three types; contention-based, time division multiple access (TDMA)-based, and hybrid. We concentrate on contention-based MAC protocols, since they do M Manuscript received February 26, 2014; approved for publication by Niyato, Dusit (Tao), Division III Editor, September 19, 2014. This work is jointly supported by the National Nature Science Foundation under Grant 61102009 and the Natural Sciences and Engineering Research Council of Canada. Fei Peng is with University of British Columbia, Vancouver, BC, Canada V6T 1Z4. (Institute of Information on Traditional Chinese Medicine, China Academy of Chinese Medical Sciences), email: fpengca@yahoo.ca. Meng Cui is with Institute of Information on Traditional Chinese Medicine, China Academy of Chinese Medical Sciences, email: cm@ail.cintcm.ac.cn. Digital object identifier 10.1109/JCN.2015.000034 not use a complicated scheduling algorithm for channel division. Furthermore, contention-based MAC protocols provide an equal probability for mobile and static nodes to access the channel and they do not incur the overhead produced by hybrid protocols. To handle the schedule updating problem of the mobile node when it crosses between different virtual clusters, in [1] the border nodes add all the schedules’ information that they follow to the SYNC packets, so that the mobile node performs schedule adaptation according to the schedules it receives from the border nodes. However, since SYNC packets broadcast at a fixed interval of 10 listen-sleep cycles, it is possible that the mobile node will miss them if they pass through the border nodes at a speed faster than 10 cycles. In [1], the authors also proposed adjusting the establishing period of the active/sleep schedule according to the estimation of the change in the number of onehop neighbors; however, their method does not consider making the schedule adaptable to the variation in mobile speed. The mobility-aware delay-sensitive sensor MAC (MD-SMAC) protocol [2] inherited the basic idea of the mobility-aware sensor MAC (MS-MAC) protocol: The mobile node increases the frequency of the neighbor discovery and leaves the other nodes to continue their normal operations. When the mobile node has discovered the new schedule, it returns to its normal neighbor discovery frequency (every 5 m) and removes its old schedule. In [3], an enhanced MS-MAC protocol named EMS-MAC was introduced to predict the node’s movement more accurately by using both received signal strength indication (RSSI) and link quality indication (LQI), since MS-MAC causes energy wastage because of the inappropriate mobility prediction produced by using only RSSI. However, EMS-MAC has the same periodic procedure for connection setup as MS-MAC. In existing variations of contention-based MAC to support mobility, the fixed period of neighbor discovery and schedule updating does not allow the mobile node with its varying speed to connect to new neighbors in a sufficiently short time. In the contention-based MAC protocols mentioned above, a mobile node synchronizes with its neighbors after hearing a SYNC frame. We propose a mobility support mechanism based on the exchange of SYNC to allow the mobile nodes to set up connections with their neighbors adaptively, while a low power level is maintained. The rest of this paper is organized as follows. In Section II, we present our mobility-supporting mechanism in detail. In Section III, we describe the performance evaluation of our mechanism. Section IV concludes the paper. II. THE MOBILITY - SUPPORTING MECHANISM A. Brief Review of S-MAC S-MAC [4] is one of the most popular contention-based MAC protocols designed to ensure energy efficiency in WSNs. It 1229-2370/15/$10.00 c 2015 KICS 204 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 17, NO. 2, APRIL 2015 SYNC Synchronization period=10 frames ≈ 10 s Type One frame ≈ 1 s Length srcAddr synNode sleepTime state Length srcAddr synNode sleepTime state RSSI crc MSYNC SYNC (broadcast) DATA Sleep SYNC DATA Sleep SYNC DATA … SYNC (broadcast) DATA … Type speed angle crc MACK Type Neighbor discovery … srcAddr synNode1 sleepTime1 synNode2(opt) sleepTime2(opt) NextAnnounceInterval crc Neighbor discovery 5 m or 30 s Fig. 2. Formats of SYNC, MSYNC, and MACK. Fig. 1. Description of S-MAC synchronization period. adopts a periodic listen-sleep cycle (called a frame, in general, constituting 1.0 s, with a listen period of about 100 ms and a sleep period) as the schedule for the node to follow. Nodes that have the same schedule form a virtual cluster to wake up for listening at the same time. The listen period is further divided into a SYNC period and a Data period for broadcasting or receiving SYNC packets (nearly 30 ms) and sending or receiving DATA packets, respectively. As shown in Fig. 1, each node broadcasts a SYNC packet every synchronization period, which is generally 10 frames, about 10 s. Furthermore, to avoid loss of SYNC among neighbors, S-MAC is defined to repeatedly execute neighbor discovery every 5 m, when the node has at least one neighbor, and more frequently, for instance every 30 s, when the node has no neighbors. During the neighbor discovery period, the node continues to listen for 10 listen-sleep cycles without sleeping to achieve more chances of hearing a new neighbor node. MS-MAC has the same packet format as S-MAC, while DE-ASS [1] adds multiple schedule information in the SYNC packet at the border node. The packet structures of other MAC protocols designed to support mobility [5], [6] are more complicated than those of S-MAC. The design of our mechanism is based on the S-MAC format. B. Design of Control Packet Format There are three types of SYNC packets in our mobilitysupporting mechanism; the original SYNC, MSYNC, and MACK. MSYNC is used by the mobile node and MACK is broadcast by the nodes that receive the MSYNC. The original SYNC is still used by the ordinary static nodes and border nodes. The two fields sleepTime and srcAddr in the SYNC packet, shown in Fig. 2, represent the sender’s schedule information to determine when the sender will enter the next sleep period after it sends the SYNC packet and the sender address through which the receiver can update its neighbor list, respectively. The mobile nodes broadcast only MSYNC with two fields of speed and angle added in the original SYNC packets. In addition to the usages similar to those of the original SYNC, MSYNC can inform the receivers that the mobile node has entered their communication range. We built a reply packet of MACK specifically corresponding to MSYNC, as shown in Fig. 2. The field called NextAnnounceInterval in the MACK packet helps the mobile node to determine when to send the MSYNC packet. sleepTime1 in the MACK packet represents the schedule of the sender’s virtual cluster. If the MACK packet is sent by border nodes, sleepTime2 represents the schedule of another virtual cluster; else, sleepTime2 is null. Here, we assume the border nodes follow only two different schedules. To ensure that the MSYNC/MACK handshake can be completed in a frame time, we reserve half of the duration in the SYNC period for the mobile to receive the MACK packet in the same frame as MSYNC. C. Location Estimation from RSSI When a mobile node initiates movement in the networks, it sends MSYNC, through which it becomes synchronized with its neighbors. One of the neighbor nodes is chosen to deduce the appropriate announcement time of MSYNC and broadcasts a MACK packet to the mobile node. The mobile node then adaptively broadcasts MSYNC to its one-hop neighbors during its movement. Other neighbor nodes that are not chosen to send the MACK packet compete to broadcast original SYNC packets at the following frames. In the proposed MS-MAC protocol [5], a change in the radio signal level of received SYNC messages is used as an indication of a mobile’s presence. Although this method does not provide a high level of accuracy, it is effective in our mechanism, which is described in more detail in [5]. An incorrect detection of mobility may unnecessarily trigger a neighbor search, but it does not degrade the network performance. Unlike the IR, acoustic, or ultrasound signals used in other methods, the radio signal of SYNC messages is available at no extra cost in terms of energy consumption. To expedite the connection set up process, we enable each node to discover the presence as well as the level of mobility within its neighborhood, based on the RSSI values obtained from the SYNC messages transmitted by its neighbors. Each node maintains a one-hop neighbor list to record the relative position of its neighbors. The relative position can be easily obtained from the measurable location. Please refer to [6] for more details. If the RSSI value from one and the same neighbor changes during a time interval, it realizes that either this neighbor, the node itself, or both are moving, since a one-to-one mapping between the distance and the RSSI values is assumed. According to the change in the RSSI values, the relative moving speed of the mobile individual can be deduced. Based on this information, a mobile node broadcasts an MSYNC message containing its own schedule and additional mobility information, i.e., the estimated speed. D. The Announcement Time of MSYNC We assume each node has the same communication range R. For simplicity without losing generality, first only one mobile node is considered. The proposed approach can then be extended to multiple mobile nodes. Suppose the topology around the mobile node shown in PENG AND CUI: AN ENERGY-EFFICIENT MOBILE-SUPPORTING MAC PROTOCOL... 205 node g, and node m constitute a triangle, as shown in Fig. 3. Assuming the distance between point O and m is d(vm , g), according to the cosine theorem we obtain the relation N d2 (vm , g)−2d (v, g) Lm→g cos(β−γ)+L2m→g −R2 = 0. (4) g i From (4), we obtain d(vm , g) if (1) is satisfied, k R m q d (vm , g) = Lm→g cos(β − γ) ± R2 − L2m→g sin2 (β − γ) q L2m→g − R2 , if it takes − ; q = 2 L2 m→g COS (2 (β − γ)) + R , if it takes + . O h j (5) Fig. 3. Topology and abstraction around the mobile node. Fig. 3. The mobile node m broadcasts MSYNC. Sensor nodes i and j are the new one-hop neighbors, while nodes k and h are the previous one-hop neighbors of the mobile node. Assuming both nodes i and j can receive MSYNC, we propose a limitation to select one. Node i is selected to send MACK if the angle ωlvi→j between the directed edge li→j and the movement direction of the mobile node meets the condition: ωlvi→j ≥ 90◦ . (1) From all the neighbor nodes that satisfy (1), we select that which is farthest from the mobile node and has largest ωlvi→j ∈ [90◦ , 180◦ ]. In Fig. 3, node i is selected from among the onehop neighbors of the mobile node, and is entitled to compute the next MSYNC announcement time and send the results to the mobile node through MACK. We then take the next step to select node g, which is the one-hop neighbor of node i, and the two-hop neighbor of the mobile node. The distance that the mobile node moves from its one-hop communication range to its two-hop range is denoted by dg . Fig. 3 shows the relationships among the mobile node, node i, and node g. Li→g , Lm→i and Lm→g represent the distance from node i to g, from the mobile node to node i and from the mobile node to node g respectively. α, β, and γ represents the angle between directed line m → i and i → g, the angle between directed line m → i and the movement direction, and the angle between directed line m → i and m → g respectively. We determine the condition under which the mobile node can move into the communication range of its two-hop neighbor g through its one hop neighbor i: R ≥ Lm→g sin |β − γ| . (2) We can see in Fig. 3 that nodes i and g and the mobile node m constitute a triangle, so that a cosine theorem can be applied to obtain the relation among Lm→g , Lm→i , and Li→g : q L2i→g + L2m→i − 2Li→g Lm→i cos(180 − α). (3) Further, the intersection point O (between the movement direction and the edge of the communication range of node g), Lm→g = q Since Lm→g sin(β − γ) ≤ R in (2), L2m→g − R2 ≤ q L2m→g COS (2 (β − γ)) + R2 , we take q d (vm , g) = L2m→g − R2 . (6) Lm→g expressed in (3) is related to the speed direction of mobile node m. Suppose Vm is the set of speed of mobile node m and Vm := IR+ . D = minv,g {d(vm , g)}, g ∈ Ni and vm ∈ Vm (7) Considering that node i has several neighbors, the neighbor set of node i is denoted by Ni , and node g is in Ni as assumed. The general equation we take as the NextAnnounceInterval value in MACK is the minimum d(vm ,g) in (7). Node i is selected to v < reply to the mobile node if the condition (2), (4), and ωL i→g ◦ 90 are satisfied. E. The Active Cycle of Neighbors In S-MAC, each node maintains a one-hop neighbor list in which the active time for each neighbor node is not included. To record the duration for which the neighbor node stays active in the communication range of the mobile node, we add an active cycle field to the neighbor list in the unit of number of frames. The value of the active cycle is initialized and updated when the mobile node receives the first SYNC packet and the MACK packet from any of its new neighbors, respectively. The neighbor node should be deleted from the neighbor list and disconnected from the mobile node when the time of the active cycle has elapsed. As shown in Fig. 4, assume r is the passby distance of the mobile node when it first receives the SYNC packet of node c until it moves out its communication range, q represents the intersection point between the movement direction of the mobile node and the communication edge of node c, θ represents the angle between Lm→c and the movement direction of the mobile node. As assumed, we can determine the values of the Lm→c , R, and θ in triangle ∆mcq. According to the triangle geometry theorem - cosine theorem, we obtain, r2 − 2rLm→c cos θ + L2m→c − R2 = 0. The solution to (8) is (8) 206 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 17, NO. 2, APRIL 2015 c R m c q V r m Fig. 4. Topology for a mobile node to calculate active cycle of node c. r = Lm→c cos θ + q R2 − L2m→c sin2 θ (9) only if R ≥ Lm→c sin θ. Therefore, the active cycle of node c in the mobile node’s neighbor list is equal to: q 2 j r k Lm→c cos θ + R2 − L2m→c sin θ = activeCycle= vT vT only if R ≥ Lm→c sin θ. (10) Similarly, the static node, i.e., node c, also records the active cycle frames in its neighbor list when it receives the MSYNC from the mobile node, which means the mobile node is just coming into its communication range. It can then keep account of the frames of the active cycle. This avoids redundant transmission to the mobile node caused by the static node not knowing when the mobile node has left its communication range. F. The Process of the Mobility-Supporting Mechanism For the sake of clarity, we divide our mobility-supporting mechanism into intra-cluster and inter-cluster processes. In both, the same neighbor updating process is applied. For example, the static node checks whether it meets the limitation (3) and computes the NextAnnounceInterval field in the MACK packet to inform the mobile node when to send MSYNC again. The mobile node and the static node add the sender to the neighbor list and set the active cycle field based on (11) if they receive the control packets from the sender the first time; else, they decrease the active cycles in the neighbor list by 1 per frame to delete the disconnected neighbors. Our scheme employs an adaptive MSYNC announcement and ensures that the mobile node broadcasts MSYNC when it is approaching the border of a virtual cluster. If two schedules are included in the MACK packet, this means it is broadcast by the border node; the mobile node can follow these two schedules and determine when it can broadcast MSYNC again according to the NextAnnounceInterval field in the MACK packet. G. Communication Overhead Analysis The communication overhead in our analysis is considered to be the impact of the control packets on the throughput, defined as the ratio between the number of control packets and the data packets transmitted. In our mechanism, the control packets refer primarily to MSYNC, MACK, and original SYNC. Since MSYNC is proposed to insert small fields in SYNC, no additional SYNC control packet is included. In our mechanism, since only one static node is selected to communicate with the mobile node adaptively instead of periodically, the data collision is not significant. We ignore sync and data collisions for simplicity. According to the synchronization period defined in the original S-MAC and MS-MAC, when the mobile node moves into the communication range of a new neighbor, it has to wait for 9 listen-sleep cycles to receive a SYNC from the new neighbor and become synchronized with the new neighbor, after which only one data packet can be sent. Since only one data and one SYNC packet are sent during the synchronization period, we obtain the communication overhead C = 1:1. In our mechanism, when the mobile node enters the communication range of a new neighbor, it synchronizes with its new neighbor through adaptively broadcasting MSYNC and receives a MACK reply from the new neighbor during the same SYNC period at the first frame; the remaining time of the first frame and the following nine frames of the synchronization period can be used to transmit data. In this way, 2 control packets and 10 data packets can be sent during the synchronization period. Therefore, we obtain the communication overhead Cm in our mechanism as Cm = 2:10 = 1:5. Through the comparison between C and Cm , we can draw the conclusion that the communication overhead is much smaller in our mechanism than in the original S-MAC. III. PERFORMANCE ANALYSIS In a network consisting of a large number of sensors placed in a vast two-dimensional geographical region A, the sensor locations can be modeled by a stationary two-dimensional Poisson point process. The number of sensors located in a region A, N (A), follows a Poisson distribution of parameter. Since the mobile sensor covers a disk of radius R, the number of sensors located in a virtual cluster region R, N (R), can be similarly obtained by using the Poisson point process. To study the effect of the size of the network, i.e., the number of nodes, on the performance of the protocol, we define the following coverage measures. Definition. Detection time, consider a mobile target located at a random position of virtual cluster k at time t = tk , the detection time of the target X, is defined to be time at which the target first enters the sensing area of a sensor in the next virtual cluster k+1 along the moving direction of the target, i.e., the target is first detected by the sensor. Theorem. Consider a sensor network at time t = k, let T be the detection time of a randomly located mobile target moving towards a next virtual cluster with speed vs and moving direction θi refer to the stationary node i, we have T ∼ exp(2λRvs ). Here, X ∼ exp(u) stands for P (X < x) = 1 − exp(−ux), namely, the random variable X is exponentially distributed with parameter u. The expected detection time of a mobile target with randomly PENG AND CUI: AN ENERGY-EFFICIENT MOBILE-SUPPORTING MAC PROTOCOL... 207 Table 1. Parameters used in the simulations. Parameter Bandwidth(kbps) Initial energy/node(J) txPower (mw) rxPower (mw) idlePower(mw) sleepPower (mw) Duty Cycle (%) Traffic Length of data packet(bytes) Packet generation interval(s) Value 20 1,000 386.0 368.2 344.2 0.05 10 CBR 50 5 distributed direction is E(T) = 1 / 2λRvs . Therefore, in order to quickly detect a target, one can add more sensors, use sensors with larger sensing ranges, or increase the speed of the mobile node. The detection time would directly reflect the performance such as delay, packet loss and throughput, for example, short detection time would enable short connection setup time and high throughput, low packet loss and delay. kZ kY kW kX Fig. 5. Intra-cluster topology. kW IV. SIMULATION RESULTS In this section, we present our evaluation of the performance of our mobility-supporting mechanism (named MS-SMAC) in TOSSIM [7], which is a discrete time event simulator for TinyOS. We compared MS-SMAC with MS-MAC, where a shorter period of schedule synchronization and neighbor updating is adopted. Similar to MS-MAC, we use RSSI to detect mobility. Although MS-MAC has a faster schedule frequency than S-MAC, when the moving speed of the mobile node exceeds their updating frequencies, they obtain the same results. The simulation is divided into two parts: intra-cluster and intercluster. The distance between adjacent nodes was 20 m. The transmission range of a node was 30 m. Table 1 shows the main parameters for the simulation. A. Intra-Cluster and Inter-Cluster Topologies The network intra-cluster topology for the simulation is shown in Fig. 5. The mobile node is located at D0. The moving track is shown as D1→D2→D3→D0. A series of simulations were run for 3000 s. For demonstration, we assume that the mobile node works as a sink to collect data. The source node sends data packets to the mobile node every 50 s and is located at the bottom of the leftmost corner. The inter-cluster topology for simulation is shown in Fig. 6. Nodes wake up at different times and form two virtual clusters with manual configuration. The mobile node is located at D0. The trajectory is formed as the mobile node moves from left to the right along the solid line and returns to D0 from right to the left along the dashed line. B. Energy Consumption Efficiency We define the energy consumption efficiency (J/byte) as the energy consumption on each valid byte received by the sink. Fig. 6. Inter-cluster topology. Fig. 7 shows that MS-SMAC achieves better energy consumption efficiency than S-MAC and MS-MAC for the intra-cluster case, since the SYNC packet introduced in our MS-SMAC helps the mobile node set up connections with its new neighbors in a sufficiently short time to allow more data packets to be transmitted to the mobile node, which improves energy efficiency per received packet. In comparison, S-MAC and MS-MAC send the SYNC packet at fixed intervals so that it is difficult to update the connection with its neighbors adaptively, the packet bytes are not successfully received, and the energy efficiency per received packet is influenced. Fig. 8 shows MS-SMAC achieves a 20% and 15% lower energy consumption efficiency (J/byte) than S-MAC and MSMAC, respectively, for the inter-cluster case under different mobile speeds. In addition to synchronization with the neighbors, the mobile node needs to change the schedule from one cluster to another. However, S-MAC and MS-MAC send the SYNC packet at fixed time intervals that do not change the schedule of the mobile node in a sufficiently short time when the mobile node travels through different clusters. The overhead of ACK for each SYNC in our mechanism is compensated by the large number of data packets received at the sink. C. Packet Loss Fig. 9 shows that when the mobile speed is high, the difference between MS-SMAC, MS-MAC, and S-MAC is clear. As shown in Fig. 9, the packet loss due to mobility in S-MAC and MS-MAC is approximately 20% and 15%, respectively, more than that in MS-SMAC, with the increase in the mobile speed. The origin of this significant difference is the fact that the neigh- 208 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 17, NO. 2, APRIL 2015 Fig. 9. Packet loss comparison in intra-cluster case. Fig. 7. Energy consumption efficiency comparison in intra-cluster case. Fig. 10. Packet loss comparison in inter-cluster case. and MS-MAC, respectively, which would not update the schedule as fast as the mobile speed and produce more packet losses. Fig. 8. Energy consumption efficiency comparison in inter-cluster case. bors of the mobile node change very fast with the increase in mobile speed; however, S-MAC updates the neighbors at a slow fixed period such that the connection between the mobile node and its neighbor is easily broken and large packet losses are introduced; MS-MAC uses faster neighbor updating but still at a fixed interval that cannot adapt to the mobile speed; in our MS-SMAC, the neighbors help the mobile node to adjust the MSYNC frequency according to the mobile speed, and therefore, the connection between the mobile node and its new neighbors can be set up in a sufficiently short time to avoid packet losses. Fig. 10 shows the packet loss ratio for the inter-cluster topology. The results suggest that MS-SMAC can reduce packet losses by at least 10% and 20% as compared with S-MAC and MS-MAC, respectively. The reason is that our schedule adaptation mechanism can keep pace with the mobile to adaptively change its schedule across virtual clusters, whereas the mobile node has to wait for about 5 m and 30 s to complete the change in the schedules from one cluster to another in original S-MAC D. Average End-to-End Delay Figs. 11 and 12 shows the end-to-end delay difference between MS-SMAC, MS-MAC, and S-MAC. Since the mobile node operates as the sink in the simulation, the connection to its neighbors significantly influences the end-to-end delay. From Fig. 11 with the intra-cluster configuration, we can see that the end-to-end delay in MS-SMAC is 25% and 20% less than that in S-MAC and MS-MAC, respectively, since our mobilitysupporting mechanism builds the connection for the mobile node with its new neighbors adaptively so that the data can be transmitted to the mobile node with a shorter delay. In Fig. 12 with inter-cluster configuration, it can be seen that MS-SMAC improves the average end-to-end delay by at least 20% and 15% as compared to S-MAC and MS-MAC, respectively. Our mechanism achieves the best end-to-end delay performance, since it can change the schedule of the mobile node as quickly as it moves through the clusters. In addition, it can be seen in Figs. 11 and 12 that the average end-to-end delays for MS-SMAC, MS-MAC, and S-MAC are greatly influenced by the hops between the source and the mobile node, since the data have to be transmitted through several more hops to the mobile node. PENG AND CUI: AN ENERGY-EFFICIENT MOBILE-SUPPORTING MAC PROTOCOL... 209 comments. REFERENCES [1] [2] [3] [4] [5] Fig. 11. Average end-to-end delay comparison in intra-cluster case. [6] [7] [8] [9] [10] [11] [12] Fig. 12. Average end-to-end delay comparison in inter-cluster case. [13] Dalong Zhang et al., “DE-ASS: An adaptive MAC algorithm based on mobility evaluation for wireless sensor networks,” in Proc. WiCOM, Chengdu, China, Sept. 2010, pp. 1–5. S. A. Hameed et al., “Mobility-aware MAC protocol for delay-sensitive wireless sensor networks,” in Proc. ICUMT, St. Petersburg, Russia, Oct. 2009, pp. 1–8. Mahdi Zareei et al., “EMS-MAC: Energy efficient contention-based MAC protocol for mobile sensor networks,” Comput. J., vol. 54, no. 12, pp. 1963–1972, 2011. Wei Ye, John Herdemann, and Deborah Estin, “An energy-efficient MAC protocol for wireless sensor networks,” in Proc. INFOCOM, NY, USA, June 2002, pp. 1567–1576. Sung-Chan Choi and Jang-Won Lee, “An energy-efficient mobilitysupporting MAC protocol for mobile sensor networks,” IEICE Trans. Commun., vol. E91.B, pp. 2720–2723, 2010. Stuart MacLean and Suprakash Datta, “Improving the accuracy of connectivity-based positioning for mobile sensor networks,” in Proc. IEEE PIMRC, Toronto, ON, Canada, Sept. 2011, pp. 1197–1202. Philip Levis et al., “TOSSIM: Accurate and scalable simulation of entire tinyOS applications,” in Proc. ACM SenSys, Los Angeles, California, USA, Nov. 2003, pp. 126–137. Huan Pham and Sanjay Jha, “An adaptive mobility-aware MAC protocol for sensor networks (MS-MAC),” IEEE MASS, Fort Lauderdale, Florida, USA Oct. 2004, pp. 558–560. Dusit Niyato, Ekram Hossain, and Afshin Fallahi, “Sleep and wakeup strategies in solar-powered wireless sensor/mesh networks: Performance analysis and optimization,” IEEE Trans. Mobile Comput., vol. 6, no. 2, pp. 221–236, Feb. 2007. Fei Peng et al., “An application oriented power saving MAC protocol for wireless sensor networks,” Wireless Pers. Commun., vol. 67, no. 2, pp. 279–293, Nov. 2012. Fei Peng et al., “Theoretical performance evaluation of EDCA in IEEE 802.11e wireless LANs,” European Trans. Telecommun., vol. 21, no. 5, pp. 478, Aug. 2010. Fei Peng et al., “Performance analysis of IEEE 802.11e enhanced distributed channel access,” IET Telecommun., vol. 4, no. 6, pp 728–738, Apr. 16, 2010. Bharat Shrestha et al., “An optimization-based GTS allocation scheme for IEEE 802.15.4 MAC with application to wireless body area sensor networks,” in Proc. IEEE ICC, Cape Town, South Africa, May 2010. V. CONCLUSIONS This paper focused on the key criteria of energy-efficient MAC to support and promote the performances of mobile applications in WSNs. The most important feature of our mechanism is that the mobile node adaptively builds connections with its new neighbors in an active manner based on the two-way handshake for the speed and schedule information exchange in a frame time of the SYNC period and minimizes the overhead. Simulation results demonstrated that our mechanism can improve energy efficiency performances by approximately 20% as compared with S-MAC under mobility situations. In the future, we will conduct more experiments with random topologies and a varying number of mobile nodes to investigate the effectiveness of our method. Future work will also consider the loss of control packets, packet collisions, and errors that affect the performance of our method. Additionally, we will integrate the MAC layer mechanism with the route protocols using a cross-layer method to further improve the mobile performances in WSNs. ACKNOWLEDGMENTS This work is jointly supported by the National Nature Science Foundation under Grant 61102009, and the Natural Sciences and Engineering Research Council of Canada (NSERC). The authors appreciate anonymous reviewers for their helpful Fei Peng is a ssociated with UBC. She participated in drafting of IETF and IEEE standard; undertook Program Committee for ICC, WCNC, IPCCC and etc, reviewed for major international journals in the computer and networking areas; published over 40 papers in the world conferences and journals and held national and international patents. Main research areas are in wireless/mobile communication networks and information security, wireless sensor networks, biomedical informatics, data (text) mining and distributed computing, and artificial intelligence. Meng Cui is an Academic Leader of Traditional Chinese Medicine (TCM) and is the creator for the subject of TCM informatics.