1,165 research outputs found

    Goodbye, ALOHA!

    Get PDF
    ©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The vision of the Internet of Things (IoT) to interconnect and Internet-connect everyday people, objects, and machines poses new challenges in the design of wireless communication networks. The design of medium access control (MAC) protocols has been traditionally an intense area of research due to their high impact on the overall performance of wireless communications. The majority of research activities in this field deal with different variations of protocols somehow based on ALOHA, either with or without listen before talk, i.e., carrier sensing multiple access. These protocols operate well under low traffic loads and low number of simultaneous devices. However, they suffer from congestion as the traffic load and the number of devices increase. For this reason, unless revisited, the MAC layer can become a bottleneck for the success of the IoT. In this paper, we provide an overview of the existing MAC solutions for the IoT, describing current limitations and envisioned challenges for the near future. Motivated by those, we identify a family of simple algorithms based on distributed queueing (DQ), which can operate for an infinite number of devices generating any traffic load and pattern. A description of the DQ mechanism is provided and most relevant existing studies of DQ applied in different scenarios are described in this paper. In addition, we provide a novel performance evaluation of DQ when applied for the IoT. Finally, a description of the very first demo of DQ for its use in the IoT is also included in this paper.Peer ReviewedPostprint (author's final draft

    TSCH 네트워크에서 충돌을 완화하기 위한 Timeslot 내 적응적 랜덤 Back-Off 전송

    Get PDF
    학위논문 (석사) -- 서울대학교 대학원 : 공과대학 전기·정보공학부, 2020. 8. 박세웅.Recently, as the market of Internet of Things (IoT) has been rapidly extending and developing, the research focusing on low-power wireless sensor networks has been actively ongoing. In particular, for the satisfaction of IoT requirements, many studies have been conducted using IEEE 802.15.4 TSCH (Time-Slotted Channel Hopping) based networks with characteristics of high reliability and low-power. Transmitter and receiver using TSCH can exchange the data through time-synchronized communication using timeslot. However, if multiple users transmit the packets on the same timeslot and channel in the TSCH network, severe data collisions may occur. In this paper, we propose Random Back-Off TSCH (RBO-TSCH) which helps to mitigate the collisions by proceeding a random back-off in the timeslot before transmission. In addition, to reduce the energy consumption of RBO-TSCH, we propose receiver-triggered RBO-TSCH which can adaptively control the number of a random back-off set at the receiver side. To verify this, we conduct extensive experiments and evaluate the RBOTSCH and receiver-triggered RBO-TSCH. Compared to TSCH, we demonstrate that RBO-TSCH and receiver-triggered RBO-TSCH demonstrate achieve up to 3.8 times higher reliability and have higher stability against collision in both link layer and routing layer.최근 사물 인터넷(Internet of Things) 시장의 발전이 급성장함에 따라 저 전력, 무선 센서 네트워크에 초점을 맞춘 연구가 활발히 진행되고 있다. 특히, IoT의 요구조건을 만족하기 위해 높은 신뢰도와 저 전력의 특징을 가지는 IEEE 802.15.4 TSCH (Time-Slotted Channel Hopping) 기반의 네트워크를 사용한 연구가 많이 이루어 지고 있다. TSCH를 사용하는 송신자와 수신자는 timeslot을 이용한 시간 동기화된 통신을 통하여 데이터를 교환한다. 그러나 TSCH 네트워크의 같은 timeslot과 채널에서 다자 간 전송이 일어나게 될 경우, 심각한 데이터 충돌이 발생하게 된다. 이에 따라, 본 논문에서는 timeslot 내에서 랜덤하게 back-off를 진행 후 전송하게 함으로써 충돌을 회피할 수 있게 하는 Random Back-Off TSCH (RBO-TSCH)를 제안하였다. 더하여, RBO-TSCH의 에너지 소비를 줄이기 위해 송신자가 랜덤 back-off set의 개수를 적응적으로 제어하는 receiver-triggered RBO-TSCH를 제안하였다. 이를 검증하기 위해, 여러 실험들을 수행하였으며, RBO-TSCH와 receiver-triggered RBO-TSCH를 평가하였다. TSCH와 비교하여, 두 기법이 최대 3.8배 높은 신뢰성을 가지며, 링크 계층과 라우팅 계층에서 모두 충돌에 대하여 더 높은 안정성을 가진다는 것을 증명하였다.1 Introduction 1 2 Backgrond 4 2.1 Time-Slotted Channel Hopping (TSCH) 4 2.2 Problem Statement 5 3 Random Back-Off TSCH (RBO-TSCH) 8 3.1 Design of RBO-TSCH 8 3.2 Consideration of RBO-TSCH 9 3.2.1 RBO SET 9 3.2.2 Clock Drift Correction 10 3.3 Weakness of RBO-TSCH 10 4 Receiver-triggered RBO-TSCH 12 4.1 Design of Receiver-Triggered RBO-TSCH 12 4.1.1 Operation of Increasing RBO SET 13 4.1.2 Operation of Decreasing RBO SET 14 5 Performance Evaluation 16 5.1 Experimental Setting 16 5.2 Communication Reliability 17 5.3 Radio Duty Cycle 18 5.4 Network Stability 19 6 Conclusion 22 6.1 Conclusion 22 Abstract (In Korean) 26Maste

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    An Energy Efficient Mac Layer Design for Wireless Sensor Network

    Get PDF
    Recent technological advances in sensors, low power integrated circuits, and wireless communications have enabled the design of low-cost, lightweight, and intelligent wireless sensor nodes. The IEEE 802.15.4 standard is a specific Wireless Personal Area Network (WPAN) standard designed for various wireless sensor applications. Idle listening, packet collision, control packet overhead and overhearing are considered as energy consuming resources in WSNs. As the idle listening and packet collision are two major power consuming parts, we considered two solutions for reducing both of them to achieve an energy efficient protocol. We concentrate on the MAC layer design to overcome the energy consumption by radio management procedure and the backoff exponent mechanism. In the radio management, we analyze the contention part of the active duration of the MAC IEEE 802.15.4 standard superframe and allow nodes to enter the sleep state regarding to their available data for transmission instead of staying awake for the entire active period. This method will be useful especially when sensors do not have any data to send. The proposed non-persistent Carrier Sense Multiple Access (np-CSMA) protocol employs backoff exponent management mechanism. This algorithm helps the network to be reliable under traffic changes and saves more energy by avoiding collision. It assigns different range of BE (backoff exponent) to each node with respect to node’s contribution in network traffic. In our scheme a coordinator can observe the network traffic due to the data information associated with devices. It can manage the Personal Area Networks (PANs) devices by the beacon packet to go to sleep mode when they do not have any packet to send. In this thesis, by using the sleep period together with backoff exponent management in our protocol design, the amount of energy consumption will be reduced. The proposed model has been compared to original 802.15.4 standard and the existing Adaptive Backoff Exponent (ABE) MAC protocol to illustrate the improvement. Moreover, the BE management algorithm derives better system performance such as end-to-end delay, throughput, packet delivery ratio and Link Quality Indicator (LQI). The proposed model has been designed in such a way that the introduction of extra sleep period inserted in superframe improves the energy efficiency while maintaining other system performance parameters. The proposed MAC protocol has improved the energy consumption around 60% as compared to ABE-MAC. The proposed MAC protocol with an extra radio management technique together with backoff management procedure can achieve 70% more energy saving than MAC IEEE 802.15.4 standard

    On a Joint Physical Layer and Medium Access Control Sublayer Design for Efficient Wireless Sensor Networks and Applications

    Get PDF
    Wireless sensor networks (WSNs) are distributed networks comprising small sensing devices equipped with a processor, memory, power source, and often with the capability for short range wireless communication. These networks are used in various applications, and have created interest in WSN research and commercial uses, including industrial, scientific, household, military, medical and environmental domains. These initiatives have also been stimulated by the finalisation of the IEEE 802.15.4 standard, which defines the medium access control (MAC) and physical layer (PHY) for low-rate wireless personal area networks (LR-WPAN). Future applications may require large WSNs consisting of huge numbers of inexpensive wireless sensor nodes with limited resources (energy, bandwidth), operating in harsh environmental conditions. WSNs must perform reliably despite novel resource constraints including limited bandwidth, channel errors, and nodes that have limited operating energy. Improving resource utilisation and quality-of-service (QoS), in terms of reliable connectivity and energy efficiency, are major challenges in WSNs. Hence, the development of new WSN applications with severe resource constraints will require innovative solutions to overcome the above issues as well as improving the robustness of network components, and developing sustainable and cost effective implementation models. The main purpose of this research is to investigate methods for improving the performance of WSNs to maintain reliable network connectivity, scalability and energy efficiency. The study focuses on the IEEE 802.15.4 MAC/PHY layers and the carrier sense multiple access with collision avoidance (CSMA/CA) based networks. First, transmission power control (TPC) is investigated in multi and single-hop WSNs using typical hardware platform parameters via simulation and numerical analysis. A novel approach to testing TPC at the physical layer is developed, and results show that contrary to what has been reported from previous studies, in multi-hop networks TPC does not save energy. Next, the network initialization/self-configuration phase is addressed through investigation of the 802.15.4 MAC beacon interval setting and the number of associating nodes, in terms of association delay with the coordinator. The results raise doubt whether that the association energy consumption will outweigh the benefit of duty cycle power management for larger beacon intervals as the number of associating nodes increases. The third main contribution of this thesis is a new cross layer (PHY-MAC) design to improve network energy efficiency, reliability and scalability by minimising packet collisions due to hidden nodes. This is undertaken in response to findings in this thesis on the IEEE 802.15.4 MAC performance in the presence of hidden nodes. Specifically, simulation results show that it is the random backoff exponent that is of paramount importance for resolving collisions and not the number of times the channel is sensed before transmitting. However, the random backoff is ineffective in the presence of hidden nodes. The proposed design uses a new algorithm to increase the sensing coverage area, and therefore greatly reduces the chance of packet collisions due to hidden nodes. Moreover, the design uses a new dynamic transmission power control (TPC) to further reduce energy consumption and interference. The above proposed changes can smoothly coexist with the legacy 802.15.4 CSMA/CA. Finally, an improved two dimensional discrete time Markov chain model is proposed to capture the performance of the slotted 802.15.4 CSMA/CA. This model rectifies minor issues apparent in previous studies. The relationship derived for the successful transmission probability, throughput and average energy consumption, will provide better performance predictions. It will also offer greater insight into the strengths and weaknesses of the MAC operation, and possible enhancement opportunities. Overall, the work presented in this thesis provides several significant insights into WSN performance improvements with both existing protocols and newly designed protocols. Finally, some of the numerous challenges for future research are described

    Energy Efficient Protocols for Active RFID

    Get PDF
    Radio frequency identification (RFID) systems come in different flavours; passive, active, semi-passive, or semi-active. Those different types of RFID are supported by different, internationally accepted protocol standards as well as by several accepted proprietary protocols. Even though the diversity is large between the flavours and between the standards, the RFID technology has evolved to be a mature technology, which is ready to be used in a large variety of applications. This thesis explores active RFID technology and how to develop and apply data communication protocols that are energy efficient and which comply with the different application constraints. The use of RFID technology is growing rapidly, and today mostly “passive” RFID systems are used because no onboard energy source is needed on the transponder (tag). However, the use of “active” RFID-tags with onboard power sources adds a range of opportunities not possible with passive tags. Besides that Active RFID offers increased working distance between the interrogator (RFID-reader) and tags, the onboard power source also enables the tags to do sensor measurements, calculations and storage even when no RFID-reader is in the vicinity of the tags. To obtain energy efficiency in an Active RFID system the communication protocol to be used should be carefully designed. This thesis describes how energy consumption can be calculated, to be used in protocol definition, and how evaluation of protocols in this respect can be made. The performance of such a new protocol, in terms of energy efficiency, aggregated throughput, delay, and number of collisions in the radio channel is evaluated and compared to an existing, commercially available protocol for Active RFID, as well as to the IEEE standard 802.15.4 (used, e.g., in the Zigbee medium-access layer). Simulations show that, by acknowledging the payload and using deep sleep mode on the tag, the lifetime of a tag is increased. For all types of protocols using a radio channel, when arbitrating information, it is obvious that the utilization of that channel is maximized when no collisions occur. To avoid and minimize collisions in the media it is possible to intercept channel interference by using carrier sense technology. The knowledge that the channel is occupied should result in a back-off and a later retry, instead of persistently listening to the channel which would require constant energy consumption. We study the effect on tag energy cost and packet delay incurred by some typical back-off algorithms (constant, linear, and exponential) used in a contention based CSMA/CA (Carrier Sense Multiple Access/ Collision Avoidance) protocol for Active RFID communication. The study shows that, by selecting the proper back-off algorithm coefficients (based on the number of tags and the application constraints), i.e., the initial contention window size and back-off interval coefficient, the tag energy consumption and read-out delays can be significantly lowered. The initial communication between reader and tag, on a control channel, establishes those important protocol parameters in the tag so that it tries to deliver its information according to the current application scenario in an energy efficient way. The decision making involved in calculating the protocol parameters is conducted in the local RFID-reader for highest efficiency. This can be done by using local statistics or based on knowledge provided by the logistic backbone databases. As the CMOS circuit technology evolves, new possibilities arise for mass production of low price and long life active tags. The use of wake-up radio technology makes it possible for active tags to react on an RFID-reader at any time, in contrast to tags with cyclic wake-up behaviour. The two main drawbacks with an additional wake-up circuit in a tag are the added die area and the added energy consumption. Within this project the solution is a complete wake-up radio transceiver consisting of only one hi-frequency very low power, and small area oscillator. To support this tag topology we propose and investigate a novel reader-tag communication protocol, the frequency binary tree protocol

    Study on Additional Carrier Sensing for IEEE 802.15.4 Wireless Sensor Networks

    Get PDF
    Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs). The slotted carrier sense multiple access with collision avoidance (CSMA/CA) is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA) detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS) algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC) delay and power consumption of CCA detection

    LPDQ: a self-scheduled TDMA MAC protocol for one-hop dynamic lowpower wireless networks

    Get PDF
    Current Medium Access Control (MAC) protocols for data collection scenarios with a large number of nodes that generate bursty traffic are based on Low-Power Listening (LPL) for network synchronization and Frame Slotted ALOHA (FSA) as the channel access mechanism. However, FSA has an efficiency bounded to 36.8% due to contention effects, which reduces packet throughput and increases energy consumption. In this paper, we target such scenarios by presenting Low-Power Distributed Queuing (LPDQ), a highly efficient and low-power MAC protocol. LPDQ is able to self-schedule data transmissions, acting as a FSA MAC under light traffic and seamlessly converging to a Time Division Multiple Access (TDMA) MAC under congestion. The paper presents the design principles and the implementation details of LPDQ using low-power commercial radio transceivers. Experiments demonstrate an efficiency close to 99% that is independent of the number of nodes and is fair in terms of resource allocation.Peer ReviewedPostprint (author’s final draft

    Energy-Efficiency Analysis of a Distributed Queuing Medium Access Control Protocol for Biomedical Wireless Sensor Networks in Saturation Conditions

    Get PDF
    The aging population and the high quality of life expectations in our society lead to the need of more efficient and affordable healthcare solutions. For this reason, this paper aims for the optimization of Medium Access Control (MAC) protocols for biomedical wireless sensor networks or wireless Body Sensor Networks (BSNs). The hereby presented schemes always have in mind the efficient management of channel resources and the overall minimization of sensors’ energy consumption in order to prolong sensors’ battery life. The fact that the IEEE 802.15.4 MAC does not fully satisfy BSN requirements highlights the need for the design of new scalable MAC solutions, which guarantee low-power consumption to the maximum number of body sensors in high density areas (i.e., in saturation conditions). In order to emphasize IEEE 802.15.4 MAC limitations, this article presents a detailed overview of this de facto standard for Wireless Sensor Networks (WSNs), which serves as a link for the introduction and initial description of our here proposed Distributed Queuing (DQ) MAC protocol for BSN scenarios. Within this framework, an extensive DQ MAC energy-consumption analysis in saturation conditions is presented to be able to evaluate its performance in relation to IEEE 802.5.4 MAC in highly dense BSNs. The obtained results show that the proposed scheme outperforms IEEE 802.15.4 MAC in average energy consumption per information bit, thus providing a better overall performance that scales appropriately to BSNs under high traffic conditions. These benefits are obtained by eliminating back-off periods and collisions in data packet transmissions, while minimizing the control overhead
    corecore