1,210 research outputs found

    Contention tree-based access for wireless machine-to-machine networks with energy harvesting

    Get PDF
    ©2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.In this paper, we consider a wireless machine-to-machine network composed of end-devices with energy harvesters that periodically transmit data to a gateway. While energy harvesting allows for perpetual operation, the uncertain amount of harvested energy may not guarantee fully continuous operation due to temporary energy shortages. This fact needs to be addressed at the medium access control layer. We thus investigate the performance of an energy harvesting-aware contention tree-based access (EH-CTA) protocol, which uses a tree-splitting algorithm to resolve collisions and takes energy availability into account. We derive a theoretical model to compute the probability of delivery and the time efficiency. In addition, we conduct a performance comparison of EH-CTA using an EH-aware dynamic frame slotted-ALOHA (EH-DFSA) as a benchmark. We determine the parameters that maximize performance and analyze how it is influenced by the amount of harvested energy and the number of end-devices. Results reveal the superior performance of EH-CTA over EH-DFSA. While EH-DFSA requires an estimate of the number of contending end-devices per frame to adapt the frame length, EH-CTA uses short and fixed frame lengths, which enables scalability and facilitates synchronization as the network density increases.Peer ReviewedPostprint (author's final draft

    Combining distributed queuing with energy harvesting to enable perpetual distributed data collection applications

    Get PDF
    This is the peer reviewed version of the following article: Vazquez-Gallego F, Tuset-Peiró P, Alonso L, Alonso-Zarate J. Combining distributed queuing with energy harvesting to enable perpetual distributed data collection applications. Trans Emerging Tel Tech. 2017;e3195 , which has been published in final form at https://doi.org/10.1002/ett.3195. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving.This paper presents, models, and evaluates energy harvesting–aware distributed queuing (EH-DQ), a novel medium access control protocol that combines distributed queuing with energy harvesting (EH) to address data collection applications in industrial scenarios using long-range and low-power wireless communication technologies. We model the medium access control protocol operation using a Markov chain and evaluate its ability to successfully transmit data without depleting the energy stored at the end devices. In particular, we compare the performance and energy consumption of EH-DQ with that of time-division multiple access (TDMA), which provides an upper limit in data delivery, and EH-aware reservation dynamic frame slotted ALOHA, which is an improved variation of frame slotted ALOHA. To evaluate the performance of these protocols, we use 2 performance metrics: delivery ratio and time efficiency. Delivery ratio measures the ability to successfully transmit data without depleting the energy reserves, whereas time efficiency measures the amount of data that can be transmitted in a certain amount of time. Results show that EH-DQ and TDMA perform close to the optimum in data delivery and outperform EH-aware reservation dynamic frame slotted ALOHA in data delivery and time efficiency. Compared to TDMA, the time efficiency of EH-DQ is insensitive to the amount of harvested energy, making it more suitable for energy-constrained applications. Moreover, compared to TDMA, EH-DQ does not require updated network information to maintain a collision-free schedule, making it suitable for very dynamic networks.Peer ReviewedPostprint (author's final draft

    Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications

    Get PDF
    Wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. To adapt to such conditions, sensor networks often adopt machine learning techniques to eliminate the need for unnecessary redesign. Machine learning also inspires many practical solutions that maximize resource utilization and prolong the lifespan of the network. In this paper, we present an extensive literature review over the period 2002-2013 of machine learning methods that were used to address common issues in wireless sensor networks (WSNs). The advantages and disadvantages of each proposed algorithm are evaluated against the corresponding problem. We also provide a comparative guide to aid WSN designers in developing suitable machine learning solutions for their specific application challenges.Comment: Accepted for publication in IEEE Communications Surveys and Tutorial

    Towards zero-power wireless machine-to-machine networks

    Get PDF
    This thesis aims at contributing to overcome two of the main challenges for the deployment of M2M networks in data collection scenarios for the Internet of Things: the management of massive numbers of end-devices that attempt to get access to the channel; and the need to extend the network lifetime. In order to solve these challenges, two complementary strategies are considered. Firstly, the thesis focuses on the design, analysis and performance evaluation of MAC protocols that can handle abrupt transitions in the traffic load and minimize the energy consumption devoted to communications. And secondly, the use of energy harvesting (EH) is considered in order to provide the network with unlimited lifetime. To this end, the second part of the thesis focuses on the design and analysis of EH-aware MAC protocols. While the Frame Slotted-ALOHA (FSA) protocol has been traditionally adopted in star topology networks for data collection, results show that FSA-based protocols lack of scalability and present synchronization problems as the network density increases. Indeed, the frame length of FSA must be adjusted to the number of contenders, which may be complex to attain in dense networks with large and dynamic number of end-devices. In order to overcome these issues, a tree splitting-based random access protocol, referred to as Low Power Contention Tree-based Access (LP-CTA), is proposed in the first part of this thesis. In LP-CTA, the frame length can be very short and fixed, which facilitates synchronization and provides better network scalability than FSA. While LP-CTA uses data slots for contention, it is possible to use short access requests in minislots, where collisions are resolved using tree splitting, and avoid the contention in data. Since these minislots can be much shorter than the duration of a data packet, the performance can be improved. The Low Power Distributed Queuing (LP-DQ) protocol proposed in this thesis is based on this idea. LP-DQ combines tree splitting with the logic of two distributed queues that manage the contention resolution and the collision-free data transmission. Results show that LP-DQ outperforms LP-CTA and FSA in terms of delay and energy efficiency, and it relaxes the need to know the size of the network and adapts smoothly to any change in the number of end-devices. The approach of LP-DQ is convenient when the messages transmitted by each end-device fit in one single slot, however, if the end-devices generate long messages that have to be fragmented, it is better to add a reservation mechanism in order to boost the performance. In this sense, the LPR-DQ protocol is proposed as an extension of LP-DQ where the concept of reservation is integrated to allow the end-devices reserve as many collision-free slots as needed. The second part of the thesis is devoted to the integration of the MAC layer with the use of energy harvesting. The variability and fluctuations of the harvested energy is considered for the design of EH-aware MAC protocols and three performance metrics are proposed: the probability of delivery, the data delivery ratio and the time efficiency. Previous works on data collection networks with EH focus on DFSA. In this thesis, the EH-CTA protocol is proposed as an adaptation of LP-CTA that takes the energy harvesting process into account. Results show that EH-CTA outperforms DFSA if the energy threshold for an end-device to become active is properly configured. In addition, while DFSA needs to adapt the frame length dynamically, EH-CTA uses a fixed frame length, thus facilitating scalability and synchronization. Finally, the EH-RDFSA and EH-DQ protocols are proposed for scenarios where data must be fragmented. EH-RDFSA is a combination of RFSA and DFSA, and EH-DQ is an extension of LPR-DQ.Esta tesis contribuye a resolver dos de los retos para el despliegue de redes M2M en escenarios de recolección de datos para el Internet de las Cosas: la gestión del acceso al canal de un número masivo de dispositivos; y la necesidad de extender la vida de la red. Para resolverlos se consideran dos estrategias complementarias. En primer lugar, se centra en el diseño, el análisis y la evaluación de protocolos MAC que pueden manejar transiciones abruptas de tráfico y reducen el consumo de energía. Y en segundo lugar, se considera el uso de mecanismos de captura de energía (Energy Harvesters, EH) para ofrecer un tiempo de vida ilimitado de la red. Con este fin, la segunda parte de la tesis se centra en el diseño y el análisis de protocolos MAC de tipo "EH-aware". Mientras que Frame Slotted-ALOHA (FSA) ha sido tradicionalmente adoptado en aplicaciones de recolección de datos, los resultados muestran que FSA presenta problemas de escalabilidad y sincronización cuando aumenta la densidad de la red. De hecho, la longitud de trama de FSA se debe ajustar según sea el número de dispositivos, lo cual puede ser difícil de estimar en redes con un número elevado y dinámico de dispositivos. Para superar estos problemas, en esta tesis se propone un protocolo de acceso aleatorio basado en "tree-splitting" denominado Low Power Contention Tree-based Access (LP-CTA). En LP-CTA, la longitud de trama puede ser corta y constante, lo cual facilita la sincronización y proporciona mejor escalabilidad. Mientras que LP-CTA utiliza paquetes de datos para la contienda, es posible utilizar solicitudes de acceso en mini-slots, donde las colisiones se resuelven utilizando "tree-splitting", y evitar la contención en los datos. Dado que estos mini-slots pueden ser mucho más cortos que la duración de un slot de datos, el rendimiento de LP-CTA puede ser mejorado. El protocolo Low Power Distributed Queuing (LP-DQ) propuesto en esta tesis se basa en esta idea. LP-DQ combina "tree-splitting" con la lógica de dos colas distribuidas que gestionan la resolución de la contienda en la solicitud de acceso y la transmisión de datos libre de colisiones. Los resultados demuestran que LP-DQ mejora LP-CTA y FSA en términos de retardo y eficiencia energética, LP-DQ no requiere conocer el tamaño de la red y se adapta sin problemas a cualquier cambio en el número de dispositivos. LP-DQ es conveniente cuando los mensajes transmitidos por cada dispositivo caben en un único slot de datos, sin embargo, si los dispositivos generan mensajes largos que requieren fragmentación, es mejor añadir un mecanismo de reserva para aumentar el rendimiento. En este sentido, el protocolo LPR-DQ se propone como una extensión de LP-DQ que incluye un mecanismo de reserva para permitir que cada dispositivo reserve el número de slots de datos según sea el número de fragmentos por mensaje. La segunda parte de la tesis está dedicada a la integración de la capa MAC con el uso de "Energy Harvesters". La variabilidad y las fluctuaciones de la energía capturada se consideran para el diseño de protocolos MAC de tipo "EH-aware" y se proponen tres métricas de rendimiento: la probabilidad de entrega, el "Data Delivery Ratio" y la eficiencia temporal. Los trabajos previos en redes de recolección de datos con EH se centran principalmente en DFSA. En esta tesis, el protocolo EH-CTA se propone como una adaptación de LP-CTA que tiene en cuenta el proceso de captura de energía. Los resultados muestran que EH-CTA supera DFSA si el umbral de energía para que un dispositivo se active está configurado correctamente. Además, mientras que en DFSA se necesita adaptar la longitud de trama de forma dinámica, EH-CTA utiliza una longitud de trama fija, facilitando así la escalabilidad y la sincronización. Por último, se proponen los protocolos EH-RDFSA y EH-DQ para escenarios en los que los datos deben ser fragmentados. EH-RDFSA es una combinación de RFSA y DFSA, y EH-DQ es una extensión de LPR-DQ.Aquesta tesi contribueix a resoldre dos dels reptes per al desplegament de xarxes M2M en escenaris de recol·lecció de dades per a l'Internet de les Coses: la gestió de l'accés al canal d'un nombre massiu de dispositius; i la necessitat d'extendre la vida de la xarxa. Per resoldre'ls es consideren dues estratègies complementàries. En primer lloc, es centra en el disseny, l'anàlisi i l'avaluació de protocols MAC que poden manegar transicions abruptes de trànsit i redueixen el consum d'energia. I en segon lloc, es considera l'ús de mecanismes de captura d'energia (Energy Harvesters, EH) per a oferir un temps de vida il·limitat de la xarxa. Amb aquesta finalitat, la segona part de la tesi es centra en el disseny i l'anàlisi de protocols MAC de tipus "EH-aware".Mentre que Frame Slotted-ALOHA (FSA) ha estat tradicionalment adoptat en aplicacions de recol·lecció de dades, els resultats mostren que FSA presenta problemes d'escalabilitat i sincronització quan augmenta la densitat de la xarxa. De fet, la longitud de trama de FSA s'ha d'ajustar segons sigui el nombre de dispositius, la qual cosa pot ser difícil d'estimar en xarxes amb un nombre elevat i dinàmic de dispositius. Per superar aquests problemes, en aquesta tesi es proposa un protocol d'accés aleatori basat en "tree-splitting" denominat Low Power Contention Tree-based Access (LP-CTA). En LP-CTA, la longitud de trama pot ser curta i constant, la qual cosa facilita la sincronització i proporciona millor escalabilitat.Mentre que LP-CTA utilitza paquets de dades per a la contenció, és possible utilitzar sol·licituds d'accés a mini-slots, on les col·lisions es resolen utilitzant "tree-splitting", i evitar la contenció a les dades. Atès que aquests mini-slots poden ser molt més curts que la durada d'un slot de dades, el rendiment de LP-CTA pot ser millorat. El protocol Low Power Distributed Queuing (LP-DQ) proposat en aquesta tesi es basa en aquesta idea. LP-DQ combina "tree-splitting" amb la lògica de dues cues distribuïdes que gestionen la resolució de la contenció en la sol·licitud d'accés i la transmissió de dades lliure de col·lisions. Els resultats demostren que LP-DQ millora LP-CTA i FSA en termes de retard i eficiència energètica, LP-DQ no requereix conèixer la mida de la xarxa i s'adapta sense problemes a qualsevol canvi en el nombre de dispositius.LP-DQ és convenient quan els missatges transmesos per cada dispositiu caben en un únic slot de dades, però, si els dispositius generen missatges llargs que requereixen fragmentació, és millor afegir un mecanisme de reserva per augmentar el rendiment. En aquest sentit, el protocol LPR-DQ es proposa com una extensió de LP-DQ que inclou un mecanisme de reserva per a permetre que cada dispositiu reservi el nombre de slots de dades segons sigui el nombre de fragments per missatge.La segona part de la tesi està dedicada a la integració de la capa MAC amb l'ús de "Energy Harvesters". La variabilitat i les fluctuacions de l'energia capturada es consideren per al disseny de protocols MAC de tipus "EH-aware" i es proposen tres mètriques de rendiment: la probabilitat d'entrega, el "Data Delivery Ratio" i l'eficiència temporal.Els treballs previs en xarxes de recol·lecció de dades amb EH se centren principalment en DFSA. En aquesta tesi, el protocol EH-CTA es proposa com una adaptació de LP-CTA que té en compte el procés de captura d'energia. Els resultats mostren que EH-CTA supera DFSA si el llindar d'energia perquè un dispositiu s'activi s'ajusta correctament. A més, mentre que a DFSA es necessita adaptar la longitud de trama de forma dinàmica, EH-CTA utilitza una longitud de trama fixa, facilitant així l'escalabilitat i la sincronització. Finalment, es proposen els protocols EH-RDFSA i EH-DQ per a escenaris en els quals les dades han de ser fragmentades. EH-RDFSA és una combinació de RFSA i DFSA, i EH-DQ és una extensió de LPR-DQ.Postprint (published version

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs

    Distributed Optimization in Energy Harvesting Sensor Networks with Dynamic In-network Data Processing

    Get PDF
    Energy Harvesting Wireless Sensor Networks (EH- WSNs) have been attracting increasing interest in recent years. Most current EH-WSN approaches focus on sensing and net- working algorithm design, and therefore only consider the energy consumed by sensors and wireless transceivers for sensing and data transmissions respectively. In this paper, we incorporate CPU-intensive edge operations that constitute in-network data processing (e.g. data aggregation/fusion/compression) with sens- ing and networking; to jointly optimize their performance, while ensuring sustainable network operation (i.e. no sensor node runs out of energy). Based on realistic energy and network models, we formulate a stochastic optimization problem, and propose a lightweight on-line algorithm, namely Recycling Wasted Energy (RWE), to solve it. Through rigorous theoretical analysis, we prove that RWE achieves asymptotical optimality, bounded data queue size, and sustainable network operation. We implement RWE on a popular IoT operating system, Contiki OS, and eval- uate its performance using both real-world experiments based on the FIT IoT-LAB testbed, and extensive trace-driven simulations using Cooja. The evaluation results verify our theoretical analysis, and demonstrate that RWE can recycle more than 90% wasted energy caused by battery overflow, and achieve around 300% network utility gain in practical EH-WSNs

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    DTLS Performance in Duty-Cycled Networks

    Get PDF
    The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic. There has been much debate in both the standardization and research communities on the applicability of DTLS to constrained environments. The main concerns are the communication overhead and latency of the DTLS handshake, and the memory footprint of a DTLS implementation. This paper provides a thorough performance evaluation of DTLS in different duty-cycled networks through real-world experimentation, emulation and analysis. In particular, we measure the duration of the DTLS handshake when using three duty cycling link-layer protocols: preamble-sampling, the IEEE 802.15.4 beacon-enabled mode and the IEEE 802.15.4e Time Slotted Channel Hopping mode. The reported results demonstrate surprisingly poor performance of DTLS in radio duty-cycled networks. Because a DTLS client and a server exchange more than 10 signaling packets, the DTLS handshake takes between a handful of seconds and several tens of seconds, with similar results for different duty cycling protocols. Moreover, because of their limited memory, typical constrained nodes can only maintain 3-5 simultaneous DTLS sessions, which highlights the need for using DTLS parsimoniously.Comment: International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC - 2015), IEEE, IEEE, 2015, http://pimrc2015.eee.hku.hk/index.htm
    • …
    corecore