41 research outputs found
CONVERGED WIRELESS TECHNOLOGY ARCHITECTURES: HYBRID NETWORKS CONSISTING OF LORA AND WI-SUN NODES
The embodiments presented herein utilize class B LoRa to avoid conflicts with Wi-SUN traffic that is on the same band. In areas covered by a LoRa edge, portions of the time slots of specific channels may be aggregated into longer time slots to adapt to LoRa spreading factors. Edge mesh nodes may use class B to pull traffic from channels of LoRa devices at the appropriate time. LoRa may be configured to operate in the appropriate channels, and any interference with Wi-SUN can be minimalized
ENABLING DETERMINISM IN A BEST EFFORT HOPPING SEQUENCE TIME SLOTTED CHANNEL HOPPING MESH
Techniques are described for sharing a network between flows that follow a deterministic hopping sequence (same sequence for all) and flows that follows a best effort hopping sequence (which depends on the receiver Media Access Control (MAC) address for unicast). This is accomplished by moving the best effort channel in case of a collision in a manner that can be predicted by the sender and that maintains the pseudo-randomness of the selection
TECHNIQUES TO IMPROVE THE HIT RATE OF UNICAST NODE-TO-NODE (N2N) DELIVERY IN CHANNEL-HOPPING AND MULTI-HOP LOW-POWER AND LOSSY NETWORKS (LLNS)
In a large scale wireless mesh network, such as a Wireless Smart Utility Network (Wi-SUN), there can be many losses. For example, a transmitter typically does not know the availability of a receiver when transmitting, which can create losses. In another example, link quality measurements, such as expected transmission count (ETX), may not be well represented for every channel. In one instance, this proposal provides an improved scheduling technique that leverages Broadcast Interval (BI) information to determine receive (RX) and transmit (TX) plans for child nodes. Child nodes can select an appropriate parent node according to received schedules, which can facilitate download traffic propagation. In another instance, this proposal provides for the ability to facilitate fine management of ETX evaluation to improve the successful rate of packet delivery. Techniques of this proposal not only leverage a central control method, but also introduce a free contention mechanism through which a central node can announce acceptable time slots to sub-nodes. The central node may avoid assigning smaller slots for each sub-node in order to allow the sub-nodes to compete for communications. Thus, techniques herein may combine various advantages for both deterministic networks and mesh networks
ENHANCING POINT-TO-POINT PERFORMANCE IN LOW-POWER AND LOSSY NETWORKS BASED ON GROUP AD HOC ON-DEMAND DISTANCE VECTOR AND PROJECTED DESTINATION ADVERTISEMENT OBJECT
Techniques are described herein for enhancing the performance of Point-to-Point (P2P) performance in Low-power and Lossy Networks (LLNs) based on Ad-hoc On-demand Distance Vector (AODV) and Projected Destination Advertisement Object (P-DAO). These techniques may restrict the flooding range of AODV and reduce the computational complexity of P-DAO
NOVEL SECURED INTER-PERSONAL AREA NETWORK GROUP MANAGEMENT IN LOW-POWER AND LOSSY NETWORKS
Low-power and Lossy Network (LLN) environments may comprise, possibly among other things, different personal area networks (PANs) resulting in, for example, node communication challenges across or between PANs. To address these types of challenges, techniques are presented herein that support a novel secure group management method to self-solve the inter-PAN problem that is both low-cost and customer-friendly. Aspects of the techniques presented herein encompass establishing a secure node-to-node (N2N) communication link between involved inter-PAN nodes, automatically looking for the relay neighbors between different PANs (as the inter-PAN node can help with forwarding the local the Routing Protocol for LLN (RPL) messages), automatically propagating the group information and maintaining the local RPL tree between the inter-PAN nodes, etc. Aspects of the techniques presented herein employ, among other things, spreading PAN advertisement (PA) messages with group and hop information to identify a feasible routing path, using the Extensible Authentication Protocol-Tunneled Transport Layer Security (EAP-TTLS) protocol to establish a secure transport tunnel, automatically unicasting a destination-oriented directed acyclic graph (DODAG) Information Solicitation (DIS) message to join the group tree, etc. Under aspects of the techniques presented herein an application server need not know the topology of a network
A NOVEL INTER-PERSONAL AREA NETWORK COMMUNICATION MECHANISM FOR LARGE-SCALE LOW-POWER AND LOSSY NETWORKS
For large-scale Low-Power and Lossy Networks (LLNs), communications between nodes in different Personal Area Networks (PANs) (i.e., inter-PAN communications) typically have to traverse long routing paths, even for cases in which two nodes may be located physically close to each other. Techniques herein provide a novel mechanism to improve inter-PAN communications by utilizing the nodes that are located at the boundary of PANs
RELIABLE WIRELESS SOLUTION FOR TIME-CRITICAL COMMUNICATIONS IN SMART UTILITY ENVIRONMENTS
The Generic Object Oriented Substation Event (GOOSE) protocol is a communication model that is defined by the International Electrotechnical Commission (IEC) 61850 standard which supports the sharing of time-critical information between Intelligent Electronic Devices (IEDs) within a substation. Due to strict requirements, GOOSE demands a fast, reliable, and deterministic network, which today is based on Ethernet networking technologies. Customers desire an alternative solution that is based on wireless radio technologies such as, for example, mesh-based networks. However, for a variety of reasons, it can be challenging to implement GOOSE over a wireless medium. Techniques are presented herein that support a reliable wireless solution for time-critical communication facilities such as GOOSE. Aspects of the presented techniques encompass using several radios coupled with an intelligent assignment of radio channels to avoid interference and employing duplication over such radios to carry critical information between IEDs. Use of the presented techniques yields an important level of determinism that allows critical information (such as GOOSE type 1A messages) to be carried over a wireless medium
ZERO TRUST: DISTRIBUTED AND LIGHT-WEIGHT AUTHENTICATION FOR WORMHOLE ATTACKS IN LOW-POWER AND LOSSY NETWORKS
Anomaly detection in a Low-Power and Lossy Network (LLN) is important in light of threats such as a wormhole attack. However, such detection is challenging given node constraints such as, for example, limited power and memory. Techniques are presented herein that address those challenges thus benefiting the stability, reliability, and security of LLNs. The presented techniques include, among other things, a distributed and light-weight authentication method (where identification of a suspicious node is done locally, between two nodes, thus obviating heavy traffic upward to a root node) and a node rating credit rank mechanism (through which, for example, a node may detect whether there is a wormhole attack)
HEARTBEAT MECHANISM FOR SYNCHRONIZATION IN LOW-POWER AND LOSSY NETWORKS
Described herein are techniques to enable nodes to determine whether the Border Router (BR) is alive. These techniques leverage existing traffic, thereby avoiding wasting bandwidth resources such as periodic asynchronous messages to maintain Wireless Mesh Network (WMN) connectivity
WIRELESS MESH NETWORK FAULT DIAGNOSIS AND MANAGEMENT BASED ON BINARY TREE BASED SUPPORT VECTOR MACHINE
Techniques are provided herein for using a Support Vector Machine (SVM) method for fault diagnosis and device management by data mining in the cloud. The result could provide valuable references for specialists to analyze and then perform operations to avoid loss. In current Connected Grid Mesh (CG-Mesh) implementations, many status profiles of nodes are collected for further use, but fault diagnosis is not performed. Preventive strategies for users are also provided