349 research outputs found

    ARCH: Practical Channel Hopping for Reliable Home-Area Sensor Networks

    Get PDF
    Home area networks (HANs) promise to enable sophisticated home automation applications such as smart energy usage and assisted living. However, recent empirical study of HAN reliability in real-world residential environments revealed significant challenges to achieving reliable performance in the face of significant and variable interference from a multitude of coexisting wireless devices. We propose the Adaptive and Robust Channel Hopping (ARCH) protocol: a lightweight receiveroriented protocol which handles the dynamics of residential environments by reactively channel hopping when channel conditions have degraded. ARCH has several key features. First, ARCH is an adaptive protocol that channel-hops based on changes in channel quality observed in real time. Second, ARCH is a distributed protocol that selects channels on a per-link basis, due to the large link-to-link variations in channel quality observed under empirical study. Third, ARCH is designed to be robust and lightweight. ARCH uses a practical hand-shaking approach to handle channel desynchronization and an efficient slidingwindow scheme that does not involve expensive calculations or modeling, and can be reasonably implemented on memoryconstrained wireless sensor platforms. Fourth, ARCH introduces minimal communication overhead for applications where packet acknowledgements are already enabled. We evaluate our approach through real deployment in real-life apartments with residents’ daily activity. Our results demonstrate that ARCH can reduce the number of packet retransmissions by a median of 42.3% compared to using a single, fixed wireless channel, and can enable up to a 2.2 improvement in delivery rate on the most unreliable links in our experiment. Under a multi-hop routing scenario, ARCH achieved an average 31.6% reduction in radio usage, by reducing the ETX along each path by up to 83.6%. Due to ARCH’s lightweight reactive design, most links achieve this improvement in reliability with 10 or fewer channel hops per day

    Interference mitigation strategy design and applications for wireless sensor networks

    Get PDF
    The Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 standard presents a very useful technology for implementing low-cost, low-power, wireless sensor networks. Its main focus, which is to applications requiring simple wireless connectivity with relaxed throughout and latency requirements, makes it suitable for connecting devices that have not been networked, such as industrial and control instrumentation equipments, agricultural equipments, vehicular equipments, and home appliances. Its usage of the license-free 2.4 GHz frequency band makes the technique successful for fast and worldwide market deployments. However, concerns about interference have arisen due to the presence of other wireless technologies using the same spectrum. Although the IEEE 802.15.4 standard has provided some mechanisms, to enhance capability to coexist with other wireless devices operating on the same frequency band, including Carrier Sensor Multiple Access (CSMA), Clear Channel Assessment (CCA), channel alignment, and low duty cycle, it is essential to design and implement adjustable mechanisms for an IEEE 802.15.4 based system integrated into a practical application to deal with interference which changes randomly over time. Among the potential interfering systems (Wi-Fi, Bluetooth, cordless phones, microwave ovens, wireless headsets, etc) which work on the same Industrial, Scientific, and Medical (ISM) frequency band, Wi-Fi systems (IEEE 802.11 technique) have attracted most concerns because of their high transmission power and large deployment in both residential and office environments. This thesis aims to propose a methodology for IEEE 802.15.4 wireless systems to adopt proper adjustment in order to mitigate the effect of interference caused by IEEE 802.11 systems through energy detection, channel agility and data recovery. The contribution of this thesis consists of five parts. Firstly, a strategy is proposed to enable IEEE 802.15.4 systems to maintain normal communications using the means of consecutive transmissions, when the system s default mechanism of retransmission is insufficient to ensure successful rate due to the occurrence of Wi-Fi interference. Secondly, a novel strategy is proposed to use a feasible way for IEEE 802.15.4 systems to estimate the interference pattern, and accordingly adjust system parameters for the purpose of achieving optimized communication effectiveness during time of interference without relying on hardware changes and IEEE 802.15.4 protocol modifications. Thirdly, a data recovery mechanism is proposed for transport control to be applied for recovering lost data by associating with the proposed strategies to ensure the data integrity when IEEE 802.15.4 systems are suffering from interference. Fourthly, a practical case is studied to discuss how to design a sustainable system for home automation application constructed on the basis of IEEE 802.15.4 technique. Finally, a comprehensive design is proposed to enable the implementation of an interference mitigation strategy for IEEE 802.15.4 based ad hoc WSNs within a structure of building fire safety monitoring system. The proposed strategies and system designs are demonstrated mainly through theoretical analysis and experimental tests. The results obtained from the experimental tests have verified that the interference caused by an IEEE 802.11 system on an IEEE 802.15.4 system can be effectively mitigated through adjusting IEEE 802.15.4 system s parameters cooperating with interference pattern estimation. The proposed methods are suitable to be integrated into a system-level solution for an IEEE 802.15.4 system to deal with interference, which is also applicable to those wireless systems facing similar interference issues to enable the development of efficient mitigation strategies

    A Comprehensive Analysis of Literature Reported Mac and Phy Enhancements of Zigbee and its Alliances

    Get PDF
    Wireless communication is one of the most required technologies by the common man. The strength of this technology is rigorously progressing towards several novel directions in establishing personal wireless networks mounted over on low power consuming systems. The cutting-edge communication technologies like bluetooth, WIFI and ZigBee significantly play a prime role to cater the basic needs of any individual. ZigBee is one such evolutionary technology steadily getting its popularity in establishing personal wireless networks which is built on small and low-power digital radios. Zigbee defines the physical and MAC layers built on IEEE standard. This paper presents a comprehensive survey of literature reported MAC and PHY enhancements of ZigBee and its contemporary technologies with respect to performance, power consumption, scheduling, resource management and timing and address binding. The work also discusses on the areas of ZigBee MAC and PHY towards their design for specific applications

    Frequency hopping in wireless sensor networks

    Get PDF
    Wireless sensor networks (WSNs) are nowadays being used to collectively gather and spread information in different kinds of applications, for military, civilian, environmental as well as commercial purposes. Therefore the proper functioning of WSNs under different kinds of environmental conditions, especially hostile environments, is a must and a lot of research currently ongoing. The problems related to the initialization and deployment of WSNs under harsh and resource limited conditions are investigated in this thesis. Frequency hopping (FH) is a spread spectrum technique in which multiple channels are used, or hoped, for communications across the network. This mitigates the worst effects of interference with frequency agile communication systems rather than by brute force approaches. FH is a promising technique for achieving the coexistence of sensor networks with other currently existing wireless systems, and it is successful within the somewhat limited computational capabilities of the sensor nodes hardware radios. In this thesis, a FH scheme for WSNs is implemented for a pair of nodes on an application layer. The merits and demerits of the scheme are studied for different kinds of WSN environments. The implementation has been done using a Sensinode NanoStack, a communication stack for internet protocol (IP) based wireless sensor networks and a Sensinode Devkit, for an IPv6 over low power wireless personal area network (6LoWPAN). The measurements are taken from the developed test bed and channel simulator for different kinds of scenarios. The detailed analysis of the FH scheme is done to determine its usefulness against interference from other wireless systems, especially wireless local area networks (WLANs), and the robustness of the scheme to combat fading or frequency selective fading

    Wireless Sensor Networking in Challenging Environments

    Get PDF
    Recent years have witnessed growing interest in deploying wireless sensing applications in real-world environments. For example, home automation systems provide fine-grained metering and control of home appliances in residential settings. Similarly, assisted living applications employ wireless sensors to provide continuous health and wellness monitoring in homes. However, real deployments of Wireless Sensor Networks (WSNs) pose significant challenges due to their low-power radios and uncontrolled ambient environments. Our empirical study in over 15 real-world apartments shows that low-power WSNs based on the IEEE 802.15.4 standard are highly susceptible to external interference beyond user control, such as Wi-Fi access points, Bluetooth peripherals, cordless phones, and numerous other devices prevalent in residential environments that share the unlicensed 2.4 GHz ISM band with IEEE 802.15.4 radios. To address these real-world challenges, we developed two practical wireless network protocols including the Adaptive and Robust Channel Hopping (ARCH) protocol and the Adaptive Energy Detection Protocol (AEDP). ARCH enhances network reliability through opportunistically changing radio\u27s frequency to avoid interference and environmental noise and AEDP reduces false wakeups in noisy wireless environments by dynamically adjusting the wakeup threshold of low-power radios. Another major trend in WSNs is the convergence with smart phones. To deal with the dynamic wireless conditions and varying application requirements of mobile users, we developed the Self-Adapting MAC Layer (SAML) to support adaptive communication between smart phones and wireless sensors. SAML dynamically selects and switches Medium Access Control protocols to accommodate changes in ambient conditions and application requirements. Compared with the residential and personal wireless systems, industrial applications pose unique challenges due to their critical demands on reliability and real-time performance. We developed an experimental testbed by realizing key network mechanisms of industrial Wireless Sensor and Actuator Networks (WSANs) and conducted an empirical study that revealed the limitations and potential enhancements of those mechanisms. Our study shows that graph routing is more resilient to interference and its backup routes may be heavily used in noisy environments, which demonstrate the necessity of path diversity for reliable WSANs. Our study also suggests that combining channel diversity with retransmission may effectively reduce the burstiness of transmission failures and judicious allocation of multiple transmissions in a shared slot can effectively improve network capacity without significantly impacting reliability

    Low-Power Wireless for the Internet of Things: Standards and Applications: Internet of Things, IEEE 802.15.4, Bluetooth, Physical layer, Medium Access Control,coexistence, mesh networking, cyber-physical systems, WSN, M2M

    Get PDF
    International audienceThe proliferation of embedded systems, wireless technologies, and Internet protocols have enabled the Internet of Things (IoT) to bridge the gap between the virtual and physical world through enabling the monitoring and actuation of the physical world controlled by data processing systems. Wireless technologies, despite their offered convenience, flexibility, low cost, and mobility pose unique challenges such as fading, interference, energy, and security, which must be carefully addressed when using resource-constrained IoT devices. To this end, the efforts of the research community have led to the standardization of several wireless technologies for various types of application domains depending on factors such as reliability, latency, scalability, and energy efficiency. In this paper, we first overview these standard wireless technologies, and we specifically study the MAC and physical layer technologies proposed to address the requirements and challenges of wireless communications. Furthermore, we explain the use of these standards in various application domains, such as smart homes, smart healthcare, industrial automation, and smart cities, and discuss their suitability in satisfying the requirements of these applications. In addition to proposing guidelines to weigh the pros and cons of each standard for an application at hand, we also examine what new strategies can be exploited to overcome existing challenges and support emerging IoT applications

    A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks

    Get PDF
    In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs

    Security protocols suite for machine-to-machine systems

    Get PDF
    Nowadays, the great diffusion of advanced devices, such as smart-phones, has shown that there is a growing trend to rely on new technologies to generate and/or support progress; the society is clearly ready to trust on next-generation communication systems to face today’s concerns on economic and social fields. The reason for this sociological change is represented by the fact that the technologies have been open to all users, even if the latter do not necessarily have a specific knowledge in this field, and therefore the introduction of new user-friendly applications has now appeared as a business opportunity and a key factor to increase the general cohesion among all citizens. Within the actors of this technological evolution, wireless machine-to-machine (M2M) networks are becoming of great importance. These wireless networks are made up of interconnected low-power devices that are able to provide a great variety of services with little or even no user intervention. Examples of these services can be fleet management, fire detection, utilities consumption (water and energy distribution, etc.) or patients monitoring. However, since any arising technology goes together with its security threats, which have to be faced, further studies are necessary to secure wireless M2M technology. In this context, main threats are those related to attacks to the services availability and to the privacy of both the subscribers’ and the services providers’ data. Taking into account the often limited resources of the M2M devices at the hardware level, ensuring the availability and privacy requirements in the range of M2M applications while minimizing the waste of valuable resources is even more challenging. Based on the above facts, this Ph. D. thesis is aimed at providing efficient security solutions for wireless M2M networks that effectively reduce energy consumption of the network while not affecting the overall security services of the system. With this goal, we first propose a coherent taxonomy of M2M network that allows us to identify which security topics deserve special attention and which entities or specific services are particularly threatened. Second, we define an efficient, secure-data aggregation scheme that is able to increase the network lifetime by optimizing the energy consumption of the devices. Third, we propose a novel physical authenticator or frame checker that minimizes the communication costs in wireless channels and that successfully faces exhaustion attacks. Fourth, we study specific aspects of typical key management schemes to provide a novel protocol which ensures the distribution of secret keys for all the cryptographic methods used in this system. Fifth, we describe the collaboration with the WAVE2M community in order to define a proper frame format actually able to support the necessary security services, including the ones that we have already proposed; WAVE2M was funded to promote the global use of an emerging wireless communication technology for ultra-low and long-range services. And finally sixth, we provide with an accurate analysis of privacy solutions that actually fit M2M-networks services’ requirements. All the analyses along this thesis are corroborated by simulations that confirm significant improvements in terms of efficiency while supporting the necessary security requirements for M2M networks

    7. GI/ITG KuVS Fachgespräch Drahtlose Sensornetze

    Get PDF
    In dem vorliegenden Tagungsband sind die Beiträge des Fachgesprächs Drahtlose Sensornetze 2008 zusammengefasst. Ziel dieses Fachgesprächs ist es, Wissenschaftlerinnen und Wissenschaftler aus diesem Gebiet die Möglichkeit zu einem informellen Austausch zu geben – wobei immer auch Teilnehmer aus der Industrieforschung willkommen sind, die auch in diesem Jahr wieder teilnehmen.Das Fachgespräch ist eine betont informelle Veranstaltung der GI/ITG-Fachgruppe „Kommunikation und Verteilte Systeme“ (www.kuvs.de). Es ist ausdrücklich keine weitere Konferenz mit ihrem großen Overhead und der Anforderung, fertige und möglichst „wasserdichte“ Ergebnisse zu präsentieren, sondern es dient auch ganz explizit dazu, mit Neueinsteigern auf der Suche nach ihrem Thema zu diskutieren und herauszufinden, wo die Herausforderungen an die zukünftige Forschung überhaupt liegen.Das Fachgespräch Drahtlose Sensornetze 2008 findet in Berlin statt, in den Räumen der Freien Universität Berlin, aber in Kooperation mit der ScatterWeb GmbH. Auch dies ein Novum, es zeigt, dass das Fachgespräch doch deutlich mehr als nur ein nettes Beisammensein unter einem Motto ist.Für die Organisation des Rahmens und der Abendveranstaltung gebührt Dank den beiden Mitgliedern im Organisationskomitee, Kirsten Terfloth und Georg Wittenburg, aber auch Stefanie Bahe, welche die redaktionelle Betreuung des Tagungsbands übernommen hat, vielen anderen Mitgliedern der AG Technische Informatik der FU Berlin und natürlich auch ihrem Leiter, Prof. Jochen Schiller
    • …
    corecore