29 research outputs found

    IEEE 802.15.4e: a Survey

    Get PDF
    Several studies have highlighted that the IEEE 802.15.4 standard presents a number of limitations such as low reliability, unbounded packet delays and no protection against interference/fading, that prevent its adoption in applications with stringent requirements in terms of reliability and latency. Recently, the IEEE has released the 802.15.4e amendment that introduces a number of enhancements/modifications to the MAC layer of the original standard in order to overcome such limitations. In this paper we provide a clear and structured overview of all the new 802.15.4e mechanisms. After a general introduction to the 802.15.4e standard, we describe the details of the main 802.15.4e MAC behavior modes, namely Time Slotted Channel Hopping (TSCH), Deterministic and Synchronous Multi-channel Extension (DSME), and Low Latency Deterministic Network (LLDN). For each of them, we provide a detailed description and highlight the main features and possible application domains. Also, we survey the current literature and summarize open research issues

    Improving QoS for IEEE 802.15.4e DSME Networks

    Get PDF

    Low-Power Wireless for the Internet of Things: Standards and Applications: Internet of Things, IEEE 802.15.4, Bluetooth, Physical layer, Medium Access Control,coexistence, mesh networking, cyber-physical systems, WSN, M2M

    Get PDF
    International audienceThe proliferation of embedded systems, wireless technologies, and Internet protocols have enabled the Internet of Things (IoT) to bridge the gap between the virtual and physical world through enabling the monitoring and actuation of the physical world controlled by data processing systems. Wireless technologies, despite their offered convenience, flexibility, low cost, and mobility pose unique challenges such as fading, interference, energy, and security, which must be carefully addressed when using resource-constrained IoT devices. To this end, the efforts of the research community have led to the standardization of several wireless technologies for various types of application domains depending on factors such as reliability, latency, scalability, and energy efficiency. In this paper, we first overview these standard wireless technologies, and we specifically study the MAC and physical layer technologies proposed to address the requirements and challenges of wireless communications. Furthermore, we explain the use of these standards in various application domains, such as smart homes, smart healthcare, industrial automation, and smart cities, and discuss their suitability in satisfying the requirements of these applications. In addition to proposing guidelines to weigh the pros and cons of each standard for an application at hand, we also examine what new strategies can be exploited to overcome existing challenges and support emerging IoT applications

    Exploração de Covert Channels de Rede sobre comunicações IEEE 802.15.4

    Get PDF
    The advancements in information and communication technology in the past decades have been converging into a new communication paradigm in which everything is expected to be interconnected with the heightened pervasiveness and ubiquity of the Internet of Things (IoT) paradigm. As these technologies mature, they are increasingly finding its way into more sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are paramount. While the number of deployed IoT devices continues to increase annually, up to tens of billions of connected devices, IoT devices continue to present severe cyber-security vulnerabilities, which are worsened by challenges such as scalability, heterogeneity, and their often scarce computing capacity. Network covert channels are increasingly being used to support malware with stealthy behaviours, aiming at exfiltrating data or to orchestrate nodes of a botnet in a cloaked fashion. Nevertheless, the attention to this problem regarding underlying and pervasive IoT protocols such as the IEEE 802.15.4 has been scarce. Therefore, in this Thesis, we aim at analysing the performance and feasibility of such covertchannel implementations upon the IEEE 802.15.4 protocol to support the development of new mechanisms and add-ons that can effectively contribute to improve the current state of-art of IoT systems which rely on such, or similar underlying communication technologies.Os avanços nas tecnologias de informação e comunicação nas últimas décadas têm convergido num novo paradigma de comunicação, onde se espera que todos os intervenientes estejam interconectados pela ubiquidade do paradigma da Internet of Things (Internet das Coisas). Com a maturação destas tecnologias, elas têm-se vindo a infiltrar em domínios cada vez mais sensíveis, como nas aplicações médicas e industriais, onde a confiabilidade da informação e cyber-segurança são um fator crítico. Num contexto onde o número de dispositivos IoT continua a aumentar anualmente, já na ordem das dezenas de biliões de dispositivos interconectados, estes continuam, contudo, a apresentar severas vulnerabilidades no campo da cyber-segurança, sendo que os desafios como a escalabilidade, heterogeneidade e, na maioria das vezes, a sua baixa capacidade de processamento, tornam ainda mais complexa a sua resolução de forma permanente. Os covert channels de rede são cada vez mais um meio de suporte a malwares que apresentam comportamentos furtivos, almejando a extração de informação sensível ou a orquestração de nós de uma botnet de uma forma camuflada. Contudo, a atenção dada a este problema em protocolos de rede IoT abrangentes como o IEEE 802.15.4, tem sido escassa. Portanto, nesta tese, pretende-se elaborar uma análise da performance e da viabilidade da implementação de covert channels em modelos de rede onde figura o protocolo IEEE 802.15.4 de forma a suportar o desenvolvimento de novos mecanismos e complementos que podem efetivamente contribuir para melhorar a ciber-segurança de sistemas IoT que dependem do suporte destas tecnologias de comunicação

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs

    LBS: A Beacon Synchronization Scheme With Higher Schedulability for IEEE 802.15. 4 Cluster-Tree-Based IoT Applications

    Full text link
    [EN] The IEEE 802.15.4 standard is one of the most widely used link layer technology for building Internet of Things (IoT). It specifies several physical layer options and MAC layer for meeting low-power and low-rate requirements of devices deployed in a network of IoT. The standard also specifies a synchronization scheme for devices connected in a star topology, operating in beacon-enabled (BE) mode using periodic beacons. The BE mode facilitates synchronization among devices for data transmission and is suitable for large networks to establish low duty-cycles. Absence of a such a scheme for a cluster-tree network has confined its application only to nonbeacon mode. The challenge here is to schedule beacon frame transmissions of multiple devices in a nonoverlapping manner to avoid beacon collisions. This paper tackles the problem of synchronization by proposing localized beacon synchronization (LBS) scheme, a distributed technique for beacon scheduling in cluster-tree network topologies. LBS uses 2-hop information and association order to compute beacon transmission offsets that better utilize the available time slots, incur fewer transmissions, and is highly scalable. Further, we analytically show that the schedulability of the proposed scheme is higher compared to other related schemes. In addition, we also address the important issue of resynchronization that has been ignored in all of the prior works. The proposed resynchronization mechanisms consider the interdependencies between synchronization and duty-cycling schemes and are shown to significantly lower the synchronization overhead when synchronization among devices is lost.This work was supported by the Science and Engineering Research Board, Department of Science and Technology, Govt. of India, under Grant ECR/2016/001651.Choudhury, N.; Matam, R.; Mukherjee, M.; Lloret, J. (2019). LBS: A Beacon Synchronization Scheme With Higher Schedulability for IEEE 802.15. 4 Cluster-Tree-Based IoT Applications. IEEE Internet of Things. 6(5):8883-8896. https://doi.org/10.1109/JIOT.2019.2924317888388966

    Response time analysis of slotted WiDOM in noisy wireless channels

    Get PDF
    International Conference on Emerging Technologies and Factory Automation (ETFA 2015), Industrial Communication Technologies and Systems, Luxembourg, Luxembourg.Timely delivery of critical traffic is a major challenge in industrial applications. The Wireless Dominance (WiDOM) medium access control protocol offers a very large number of priority levels to suit time sensitive application requirements. In particular, assuming that its overhead is properly modeled, WiDOM enables an accurate evaluation of the network response time in the wireless domain, through the power of the schedulability analysis, based on non-preemptive and staticpriority scheduling. Recent research proposed a new version of WiDOM (dubbed Slotted WiDOM), which offers a lower overhead as compared to the original version. In this paper, we propose a new schedulability analysis for Slotted WiDOM and extend it to handle message streams with release jitter. In order to provide a more accurate timing analysis, the effect of transmission faults must be taken into account. Therefore, in our novel analysis we consider the case where messages are transmitted in a realistic wireless channel, affected by noise and interference. Evaluation is performed on a real test-bed and the results from experiments provide a firm validation of our findings
    corecore