2,551 research outputs found
The ContikiMAC Radio Duty Cycling Protocol
Low-power wireless devices must keep their radio
transceivers off as much as possible to reach a low power
consumption, but must wake up often enough to be able to
receive communication from their neighbors. This report
describes the ContikiMAC radio duty cycling mechanism,
the default radio duty cycling mechanism in Contiki 2.5,
which uses a power efficient wake-up mechanism with
a set of timing constraints to allow device to keep their
transceivers off. With ContikiMAC, nodes can participate
in network communication yet keep their radios turned
off for roughly 99% of the time. This report describes the
ContikiMAC mechanism, measures the energy consumption
of individual ContikiMAC operations, and evaluates
the efficiency of the fast sleep and phase-lock optimizations
Efficient time synchronized one-time password scheme to provide secure wake-up authentication on wireless sensor networks
In this paper we propose Time Synchronized One-Time-Password scheme to
provide secure wake up authentication. The main constraint of wireless sensor
networks is their limited power resource that prevents us from using radio
transmission over the network to transfer the passwords. On the other hand
computation power consumption is insignificant when compared to the costs
associated with the power needed for transmitting the right set of keys. In
addition to prevent adversaries from reading and following the timeline of the
network, we propose to encrypt the tokens using symmetric encryption to prevent
replay attacks.Comment: International Journal Of Advanced Smart Sensor Network Systems
(IJASSN), Vol 3, No.1, January 2013
http://airccse.org/journal/ijassn/papers/3113ijassn01.pd
How to Choose the Relevant MAC Protocol for Wireless Smart Parking Urban Networks?
Parking sensor network is rapidly deploying around the world and is regarded
as one of the first implemented urban services in smart cities. To provide the
best network performance, the MAC protocol shall be adaptive enough in order to
satisfy the traffic intensity and variation of parking sensors. In this paper,
we study the heavy-tailed parking and vacant time models from SmartSantander,
and then we apply the traffic model in the simulation with four different kinds
of MAC protocols, that is, contention-based, schedule-based and two hybrid
versions of them. The result shows that the packet interarrival time is no
longer heavy-tailed while collecting a group of parking sensors, and then
choosing an appropriate MAC protocol highly depends on the network
configuration. Also, the information delay is bounded by traffic and MAC
parameters which are important criteria while the timely message is required.Comment: The 11th ACM International Symposium on Performance Evaluation of
Wireless Ad Hoc, Sensor, and Ubiquitous Networks (2014
Performance Comparison of Contention- and Schedule-based MAC Protocols in Urban Parking Sensor Networks
Network traffic model is a critical problem for urban applications, mainly
because of its diversity and node density. As wireless sensor network is highly
concerned with the development of smart cities, careful consideration to
traffic model helps choose appropriate protocols and adapt network parameters
to reach best performances on energy-latency tradeoffs. In this paper, we
compare the performance of two off-the-shelf medium access control protocols on
two different kinds of traffic models, and then evaluate their application-end
information delay and energy consumption while varying traffic parameters and
network density. From the simulation results, we highlight some limits induced
by network density and occurrence frequency of event-driven applications. When
it comes to realtime urban services, a protocol selection shall be taken into
account - even dynamically - with a special attention to energy-delay tradeoff.
To this end, we provide several insights on parking sensor networks.Comment: ACM International Workshop on Wireless and Mobile Technologies for
Smart Cities (WiMobCity) (2014
Low Power, Low Delay: Opportunistic Routing meets Duty Cycling
Traditionally, routing in wireless sensor networks consists of
two steps: First, the routing protocol selects a next hop,
and, second, the MAC protocol waits for the intended destination
to wake up and receive the data. This design makes
it difficult to adapt to link dynamics and introduces delays
while waiting for the next hop to wake up.
In this paper we introduce ORW, a practical opportunistic
routing scheme for wireless sensor networks. In a dutycycled
setting, packets are addressed to sets of potential receivers
and forwarded by the neighbor that wakes up first
and successfully receives the packet. This reduces delay and
energy consumption by utilizing all neighbors as potential
forwarders. Furthermore, this increases resilience to wireless
link dynamics by exploiting spatial diversity. Our results
show that ORW reduces radio duty-cycles on average
by 50% (up to 90% on individual nodes) and delays by 30%
to 90% when compared to the state of the art
Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services
Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication and computation at a low premium of cost and power. In this article, we explore the fundamental concepts guiding the design and implementation of WSNs. We report the latest developments in WSN software and services for meeting existing requirements and newer demands; particularly in the areas of: operating system, simulator and emulator, programming abstraction, virtualization, IP-based communication and security, time and location, and network monitoring and management. We also reflect on the ongoing
efforts in providing dependable assurances for WSN-driven CPS. Finally, we report on its applicability with a case-study on smart buildings
Atomic-SDN: Is Synchronous Flooding the Solution to Software-Defined Networking in IoT?
The adoption of Software Defined Networking (SDN) within traditional networks
has provided operators the ability to manage diverse resources and easily
reconfigure networks as requirements change. Recent research has extended this
concept to IEEE 802.15.4 low-power wireless networks, which form a key
component of the Internet of Things (IoT). However, the multiple traffic
patterns necessary for SDN control makes it difficult to apply this approach to
these highly challenging environments. This paper presents Atomic-SDN, a highly
reliable and low-latency solution for SDN in low-power wireless. Atomic-SDN
introduces a novel Synchronous Flooding (SF) architecture capable of
dynamically configuring SF protocols to satisfy complex SDN control
requirements, and draws from the authors' previous experiences in the IEEE EWSN
Dependability Competition: where SF solutions have consistently outperformed
other entries. Using this approach, Atomic-SDN presents considerable
performance gains over other SDN implementations for low-power IoT networks. We
evaluate Atomic-SDN through simulation and experimentation, and show how
utilizing SF techniques provides latency and reliability guarantees to SDN
control operations as the local mesh scales. We compare Atomic-SDN against
other SDN implementations based on the IEEE 802.15.4 network stack, and
establish that Atomic-SDN improves SDN control by orders-of-magnitude across
latency, reliability, and energy-efficiency metrics
A Study of Medium Access Control Protocols for Wireless Body Area Networks
The seamless integration of low-power, miniaturised, invasive/non-invasive
lightweight sensor nodes have contributed to the development of a proactive and
unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health
monitoring of a patient without any constraint on his/her normal dailylife
activities. This monitoring requires low-power operation of
invasive/non-invasive sensor nodes. In other words, a power-efficient Medium
Access Control (MAC) protocol is required to satisfy the stringent WBAN
requirements including low-power consumption. In this paper, we first outline
the WBAN requirements that are important for the design of a low-power MAC
protocol. Then we study low-power MAC protocols proposed/investigated for WBAN
with emphasis on their strengths and weaknesses. We also review different
power-efficient mechanisms for WBAN. In addition, useful suggestions are given
to help the MAC designers to develop a low-power MAC protocol that will satisfy
the stringent WBAN requirements.Comment: 13 pages, 8 figures, 7 table
- …