743 research outputs found

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs

    Wireless Sensor Networking in Challenging Environments

    Get PDF
    Recent years have witnessed growing interest in deploying wireless sensing applications in real-world environments. For example, home automation systems provide fine-grained metering and control of home appliances in residential settings. Similarly, assisted living applications employ wireless sensors to provide continuous health and wellness monitoring in homes. However, real deployments of Wireless Sensor Networks (WSNs) pose significant challenges due to their low-power radios and uncontrolled ambient environments. Our empirical study in over 15 real-world apartments shows that low-power WSNs based on the IEEE 802.15.4 standard are highly susceptible to external interference beyond user control, such as Wi-Fi access points, Bluetooth peripherals, cordless phones, and numerous other devices prevalent in residential environments that share the unlicensed 2.4 GHz ISM band with IEEE 802.15.4 radios. To address these real-world challenges, we developed two practical wireless network protocols including the Adaptive and Robust Channel Hopping (ARCH) protocol and the Adaptive Energy Detection Protocol (AEDP). ARCH enhances network reliability through opportunistically changing radio\u27s frequency to avoid interference and environmental noise and AEDP reduces false wakeups in noisy wireless environments by dynamically adjusting the wakeup threshold of low-power radios. Another major trend in WSNs is the convergence with smart phones. To deal with the dynamic wireless conditions and varying application requirements of mobile users, we developed the Self-Adapting MAC Layer (SAML) to support adaptive communication between smart phones and wireless sensors. SAML dynamically selects and switches Medium Access Control protocols to accommodate changes in ambient conditions and application requirements. Compared with the residential and personal wireless systems, industrial applications pose unique challenges due to their critical demands on reliability and real-time performance. We developed an experimental testbed by realizing key network mechanisms of industrial Wireless Sensor and Actuator Networks (WSANs) and conducted an empirical study that revealed the limitations and potential enhancements of those mechanisms. Our study shows that graph routing is more resilient to interference and its backup routes may be heavily used in noisy environments, which demonstrate the necessity of path diversity for reliable WSANs. Our study also suggests that combining channel diversity with retransmission may effectively reduce the burstiness of transmission failures and judicious allocation of multiple transmissions in a shared slot can effectively improve network capacity without significantly impacting reliability

    QF-MAC: Adaptive, Local Channel Hopping for Interference Avoidance in Wireless Meshes

    Full text link
    The throughput efficiency of a wireless mesh network with potentially malicious external or internal interference can be significantly improved by equipping routers with multi-radio access over multiple channels. For reliably mitigating the effect of interference, frequency diversity (e.g., channel hopping) and time diversity (e.g., carrier sense multiple access) are conventionally leveraged to schedule communication channels. However, multi-radio scheduling over a limited set of channels to minimize the effect of interference and maximize network performance in the presence of concurrent network flows remains a challenging problem. The state-of-the-practice in channel scheduling of multi-radios reveals not only gaps in achieving network capacity but also significant communication overhead. This paper proposes an adaptive channel hopping algorithm for multi-radio communication, QuickFire MAC (QF-MAC), that assigns per-node, per-flow ``local'' channel hopping sequences, using only one-hop neighborhood coordination. QF-MAC achieves a substantial enhancement of throughput and latency with low control overhead. QF-MAC also achieves robustness against network dynamics, i.e., mobility and external interference, and selective jamming attacker where a global channel hopping sequence (e.g., TSCH) fails to sustain the communication performance. Our simulation results quantify the performance gains of QF-MAC in terms of goodput, latency, reliability, communication overhead, and jamming tolerance, both in the presence and absence of mobility, across diverse configurations of network densities, sizes, and concurrent flows

    ์ด๊ธฐ์ข… IoT ๊ธฐ๊ธฐ๊ฐ„ ํ˜‘๋ ฅ์„ ํ†ตํ•œ ๋„คํŠธ์›Œํฌ ์„ฑ๋Šฅ ํ–ฅ์ƒ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ •๋ณด๊ณตํ•™๋ถ€, 2022. 8. ๋ฐ•์„ธ์›….The Internet of Things (IoT) has become a daily life by pioneering applications in various fields. In this dissertation, we consider increasing transmission data rate with energy efficiency, extending transmission coverage with low power, and improving reliability in congested frequency bands as three challenges to expanding IoT applications. We address two issues to overcome these challenges. First, we design a layered network system with a new structure that combines Bluetooth Low Energy (BLE) and Wi-Fi networks in a multi-hop network. Based on the system, we propose methods to increase data rate with energy efficiency and extend transmission coverage in a low-power situation. We implement the proposed system in the Linux kernel and evaluate the performance through an indoor testbed. As a result, we confirmed that the proposed system supports high data traffic and reduces average power consumption in the testbed compared to the existing single BLE/Wi-Fi ad-hoc network in a multi-hop situation. Second, we tackle the adaptive frequency hopping (AFH) problem of BLE through cross-technology communication (CTC) and channel weighting. We design the AFH scheme that weights the channels used by BLE devices with improving reliability in the congested bands of both Wi-Fi and BLE devices. We evaluate the proposed scheme through prototype experiments and simulations, confirming that the proposed scheme increases the packet reception rate of BLE in the congested ISM band compared to the existing AFH algorithm.์‚ฌ๋ฌผ์ธํ„ฐ๋„ท์€ ํ˜„์žฌ ๋‹ค์–‘ํ•œ ์˜์—ญ์—์„œ application์„ ๊ฐœ์ฒ™ํ•˜์—ฌ ์ƒํ™œํ™”๋˜์–ด ์™”๋‹ค. ์ด ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š” ์‚ฌ๋ฌผ์ธํ„ฐ๋„ท์˜ ์‘์šฉ ์‚ฌ๋ก€ ํ™•์žฅ์„ ์œ„ํ•ด ์—๋„ˆ์ง€ ํšจ์œจ์ ์ธ ์ „์†ก ์†๋„ ํ–ฅ์ƒ, ์ €์ „๋ ฅ ์ƒํ™ฉ์—์„œ์˜ ์ „์†ก ๋ฒ”์œ„ ํ™•์žฅ, ํ˜ผ์žกํ•œ ๋Œ€์—ญ์—์„œ์˜ ์‹ ๋ขฐ์„ฑ ํ–ฅ์ƒ์„ ์ƒˆ๋กœ์šด ๋„์ „ ๊ณผ์ œ๋กœ ์‚ผ๊ณ , ์ด๋Ÿฌํ•œ ๋„์ „ ๊ณผ์ œ๋ฅผ ๊ทน๋ณตํ•  ๋‘ ๊ฐ€์ง€ ์ฃผ์ œ๋ฅผ ๋‹ค๋ฃฌ๋‹ค. ์ฒซ์งธ, ๋‹ค์ค‘ ํ™‰ ๋„คํŠธ์›Œํฌ ์ƒํ™ฉ์—์„œ์˜ ๋ธ”๋ฃจํˆฌ์Šค ์ €์ „๋ ฅ๊ณผ Wi-Fi ๋„คํŠธ์›Œํฌ๋ฅผ ๊ฒฐํ•ฉ ํ•œ ์ƒˆ๋กœ์šด ๊ตฌ์กฐ์˜ ๊ณ„์ธต์  ๋„คํŠธ์›Œํฌ ์‹œ์Šคํ…œ์„ ์„ค๊ณ„ํ•˜๊ณ  ์ด์— ๊ธฐ๋ฐ˜ํ•œ ์—๋„ˆ์ง€ ํšจ์œจ์ ์ธ ์ „์†ก ์†๋„ ํ–ฅ์ƒ ๋ฐ ์ €์ „๋ ฅ ์ƒํ™ฉ์—์„œ์˜ ์ „์†ก ๋ฒ”์œ„ํ™•์žฅ์„ ์ œ์•ˆํ•œ๋‹ค. ์ œ์•ˆ๋œ ์‹œ์Šคํ…œ์€ Linux ์ปค๋„์— ๊ตฌํ˜„ํ•˜์—ฌ ์‹ค๋‚ด ํ…Œ์ŠคํŠธ๋ฒ ๋“œ๋ฅผ ํ†ตํ•ด ์„ฑ๋Šฅ์„ ํ‰๊ฐ€ํ•œ๋‹ค. ๊ฒฐ๊ณผ์ ์œผ๋กœ ์ œ์•ˆ ํ•œ ๊ธฐ๋ฒ•์ด ๋‹ค์ค‘ ํ™‰ ์ƒํ™ฉ์—์„œ ๊ธฐ์กด ๋ธ”๋ฃจํˆฌ์Šค ์ €์ „๋ ฅ/Wi-Fi ๋‹จ์ผ ad-hoc ๋„คํŠธ์›Œํฌ์™€ ๋น„๊ตํ•˜์—ฌ ๋†’์€ ๋ฐ์ดํ„ฐ ํŠธ๋ž˜ํ”ฝ์„ ์ง€์›ํ•˜๋ฉฐ, ํ…Œ์ŠคํŠธ๋ฒ ๋“œ์—์„œ์˜ ํ‰๊ท  ์ „๋ ฅ ์†Œ๋น„๋ฅผ ์ค„ ์ด๋Š” ๊ฒƒ์„ ํ™•์ธํ•œ๋‹ค. ๋‘˜์งธ, Cross-technology Communication (CTC)๊ณผ ์ฑ„๋„ ๊ฐ€์ค‘์น˜๋ฅผ ํ†ตํ•œ ๋ธ”๋ฃจํˆฌ์Šค ์ €์ „๋ ฅ์˜ Adaptive Frequency Hopping (AFH) ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•œ๋‹ค. ์ตœ์ข…์ ์œผ๋กœ ๋ธ”๋ฃจํˆฌ์Šค ์ €์ „๋ ฅ ๊ธฐ๊ธฐ๊ฐ€ ์‚ฌ์šฉํ•˜๋Š” ์ฑ„๋„์— ๊ฐ€์ค‘์น˜๋ฅผ ๋‘๋Š” AFH ๊ธฐ๋ฒ•์„ ์„ค๊ณ„ํ•˜์—ฌ Wi-Fi ์™€ ๋ธ”๋ฃจํˆฌ์Šค ์ €์ „๋ ฅ ๊ธฐ๊ธฐ๊ฐ€ ๋ชจ๋‘ ํ˜ผ์žกํ•œ ๋Œ€์—ญ์—์„œ์˜ ์‹ ๋ขฐ์„ฑ์„ ํ–ฅ์ƒํ•œ๋‹ค. ํ”„๋กœํ† ํƒ€์ž… ์‹คํ—˜๊ณผ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ์ œ์•ˆํ•œ ๊ธฐ๋ฒ•์ด ๊ธฐ์กด์˜ AFH ๊ธฐ๋ฒ•๊ณผ ๋น„๊ตํ•˜์—ฌ ํ˜ผ์žกํ•œ ISM ๋Œ€์—ญ์—์„œ ๋ธ”๋ฃจํˆฌ์Šค ์ €์ „๋ ฅ์˜ ํŒจํ‚ท ์ˆ˜์‹ ์œจ์„ ์ฆ๊ฐ€์‹œํ‚ค๋Š” ๊ฒƒ์„ ํ™•์ธํ•œ๋‹ค.1 Introduction 1 1.1 Motivation 1 1.2 Contributions and Outline 2 2 Wi-BLE: On Cooperative Operation of Wi-Fi and Bluetooth Low Energy under IPv6 4 2.1 Introduction 4 2.2 Related Work 7 2.2.1 Multihop Connectivity for Wi-Fi or BLE 7 2.2.2 Multi-radio Operation 11 2.3 System Overview 13 2.3.1 Control Plane 13 2.3.2 Data Plane 16 2.3.3 Overall Procedure 16 2.4 MABLE: AODV Routing over BLE 17 2.4.1 BLE Channel Utilization 17 2.4.2 Joint Establishment of Route and Connection 20 2.4.3 Link Quality Metric for BLE Data Channels 22 2.4.4 Bi-directional Route Error Propagation 25 2.5 Wi-BLE: Wi-Fi Ad-hoc over BLE 27 2.5.1 Radio Selection 27 2.5.2 Routing and Radio Wake-up for Wi-Fi 30 2.6 Evaluation 32 2.6.1 BLE Routing 33 2.6.2 Wi-Fi Routing over BLE 35 2.6.3 Radio Selection 38 2.7 Summary 40 3 WBC-AFH: Direct Wi-Fi to BLE Communication based AFH 41 3.1 Introduction 41 3.2 Background 45 3.2.1 Frequency hopping in BLE 45 3.2.2 Cross Technology Communication 47 3.3 Proposed AFH 49 3.3.1 CTC based informing 50 3.3.2 Weighted channel select 51 3.3.3 Hopping set size optimization 52 3.3.4 WBC-AFH 54 3.4 Evaluation 57 3.4.1 Setup 57 3.4.2 Robustness 60 3.4.3 Reliability 61 3.5 Future Work 65 3.6 Summary 66 4 Conclusion 67๋ฐ•

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    Medium access in cognitive radio networks: From single hop to multiple hops

    Get PDF
    If channel assembling is enabled, this technique can be utilized for potential performance improvement in CRNs. Two use cases are envisaged for channel assembling. In the first use case, the system can accommodate parallel SU services in multiple channels, while in the second use case, the system allows only one SU service at a time. In the use case where parallel SU services are allowed, various channel assembling strategies are proposed and modeled in order to investigate their performance and to acquire better comprehension of the behavior of CRNs with channel assembling. Moreover, the capacity upper bound for CRNs with channel assembling in the quasistationary regime is derived. In the use case when there is only one SU service that can utilize the vacant channels at a time, we formulate channel access into two optimization problems on power allocation in multi-channel CRNs and propose various algorithms to solve these problems
    • โ€ฆ
    corecore