159 research outputs found

    Decentralized Ultra-Reliable Low-Latency Communications through Concurrent Cooperative Transmission

    Get PDF
    Emerging cyber-physical systems demand for communication technologies that enable seamless interactions between humans and physical objects in a shared environment. This thesis proposes decentralized URLLC (dURLLC) as a new communication paradigm that allows the nodes in a wireless multi-hop network (WMN) to disseminate data quickly, reliably and without using a centralized infrastructure. To enable the dURLLC paradigm, this thesis explores the practical feasibility of concurrent cooperative transmission (CCT) with orthogonal frequency-division multiplexing (OFDM). CCT allows for an efficient utilization of the medium by leveraging interference instead of trying to avoid collisions. CCT-based network flooding disseminates data in a WMN through a reception-triggered low-level medium access control (MAC). OFDM provides high data rates by using a large bandwidth, resulting in a short transmission duration for a given amount of data. This thesis explores CCT-based network flooding with the OFDM-based IEEE 802.11 Non-HT and HT physical layers (PHYs) to enable interactions with commercial devices. An analysis of CCT with the IEEE 802.11 Non-HT PHY investigates the combined effects of the phase offset (PO), the carrier frequency offset (CFO) and the time offset (TO) between concurrent transmitters, as well as the elapsed time. The analytical results of the decodability of a CCT are validated in simulations and in testbed experiments with Wireless Open Access Research Platform (WARP) v3 software-defined radios (SDRs). CCT with coherent interference (CI) is the primary approach of this thesis. Two prototypes for CCT with CI are presented that feature mechanisms for precise synchronization in time and frequency. One prototype is based on the WARP v3 and its IEEE 802.11 reference design, whereas the other prototype is created through firmware modifications of the Asus RT-AC86U wireless router. Both prototypes are employed in testbed experiments in which two groups of nodes generate successive CCTs in a ping-pong fashion to emulate flooding processes with a very large number of hops. The nodes stay synchronized in experiments with 10 000 successive CCTs for various modulation and coding scheme (MCS) indices and MAC service data unit (MSDU) sizes. The URLLC requirement of delivering a 32-byte MSDU with a reliability of 99.999 % and with a latency of 1 ms is assessed in experiments with 1 000 000 CCTs, while the reliability is approximated by means of the frame reception rate (FRR). An FRR of at least 99.999 % is achieved at PHY data rates of up to 48 Mbit/s under line-of-sight (LOS) conditions and at PHY data rates of up to 12 Mbit/s under non-line-of-sight (NLOS) conditions on a 20 MHz wide channel, while the latency per hop is 48.2 µs and 80.2 µs, respectively. With four multiple input multiple output (MIMO) spatial streams on a 40 MHz wide channel, a LOS receiver achieves an FRR of 99.5 % at a PHY data rate of 324 Mbit/s. For CCT with incoherent interference, this thesis proposes equalization with time-variant zero-forcing (TVZF) and presents a TVZF receiver for the IEEE 802.11 Non-HT PHY, achieving an FRR of up to 92 % for CCTs from three unsyntonized commercial devices. As CCT-based network flooding allows for an implicit time synchronization of all nodes, a reception-triggered low-level MAC and a reservation-based high-level MAC may in combination support various applications and scenarios under the dURLLC paradigm

    Analysis of an IEEE 802.11-based protocol for real-time applications in agriculture

    Get PDF
    La tesi descrive un sistema originale basato sullo standard IEEE 802.11 per il monitoraggio ed il controllo remoto in tempo reale di una macchina agricola attraverso dispositivi commerciali quali smartphones e tablet. Le prestazioni del sistema sono state attentamente caratterizzate, sia dal punto di vista teorico che da quello pratico, tramite numerose sessioni di misure sperimentali. Opportune soluzioni alle problematiche riscontrate sono proposte, evidenziando sostanziali miglioramentiopenEmbargo temporaneo per motivi di segretezza e/o di proprietĂ  dei risultati e informazioni di enti esterni o aziende private che hanno partecipato alla realizzazione del lavoro di ricerca relativo alla tes

    Technologies to improve the performance of wireless sensor networks in high-traffic applications

    Get PDF
    The expansion of wireless sensor networks to advanced areas, including structure health monitoring, multimedia surveillance, and health care monitoring applications, has resulted in new and complex problems. Traditional sensor systems are designed and optimised for extremely low traffic loads. However, it has been witnessed that network performance drops rapidly with the higher traffic loads common in advanced applications. In this thesis, we examine the system characteristics and new system requirements of these advanced sensor network applications. Based on this analysis, we propose an improved architecture for wireless sensor systems to increase the network performance while maintaining compatibility with the essential WSN requirements: low power, low cost, and distributed scalability. We propose a modified architecture deriving from the IEEE 802.15.4 standard, which is shown to significantly increase the network performance in applications generating increased data loads. This is achieved by introducing the possibility of independently allocating the sub-carriers in a distributed manner. As a result, the overall efficiency of the channel contention mechanism will be increased to deliver higher throughput with lower energy consumption. Additionally, we develop the concept of increasing the data transmission efficiency by adapting the spreading code length to the wireless environment. Such a modification will not only be able to deliver higher throughput but also maintain a reliable wireless link in the harsh RF environment. Finally, we propose the use of the battery recovery effect to increase the power efficiency of the system under heavy traffic load conditions. These three innovations minimise the contention window period while maximising the capacity of the available channel, which is shown to increase network performance in terms of energy efficiency, throughput and latency. The proposed system is shown to be backwards compatible and able to satisfy both traditional and advanced applications and is particularly suitable for deployment in harsh RF environments. Experiments and analytic techniques have been described and developed to produce performance metrics for all the proposed techniques

    Towards the efficient use of LoRa for wireless sensor networks

    Get PDF
    Since their inception in 1998 with the Smart Dust Project from University of Berkeley, Wireless Sensor Networks (WSNs) had a tremendous impact on both science and society, influencing many (new) research fields, like Cyber-physical System (CPS), Machine to Machine (M2M), and Internet of Things (IoT). In over two decades, WSN researchers have delivered a wide-range of hardware, communication protocols, operating systems, and applications, to deal with the now classic problems of resourceconstrained devices, limited energy sources, and harsh communication environments. However, WSN research happened mostly on the same kind of hardware. With wireless communication and embedded hardware evolving, there are new opportunities to resolve the long standing issues of scaling, deploying, and maintaining a WSN. To this end, we explore in this work the most recent advances in low-power, longrange wireless communication, and the new challenges these new wireless communication techniques introduce. Specifically, we focus on the most promising such technology: LoRa. LoRa is a novel low-power, long-range communication technology, which promises a single-hop network with millions of sensor nodes. Using practical experiments, we evaluate the unique properties of LoRa, like orthogonal spreading factors, nondestructive concurrent transmissions, and carrier activity detection. Utilising these unique properties, we build a novel TDMA-style multi-hop Medium Access Control (MAC) protocol called LoRaBlink. Based on empirical results, we develop a communication model and simulator called LoRaSim to explore the scalability of a LoRa network. We conclude that, in its current deployment, LoRa cannot support the scale it is envisioned to operate at. One way to improve this scalability issue is Adaptive Data Rate (ADR). We develop two ADR protocols, Probing and Optimistic Probing, and compare them with the de facto standard ADR protocol used in the crowdsourced TTN LoRaWAN network. We demonstrate that our algorithms are much more responsive, energy efficient, and able to reach a more efficient configuration quicker, though reaching a suboptimal configuration for poor links, which is offset by the savings caused by the convergence speed. Overall, this work provides theoretical and empirical proofs that LoRa can tackle some of the long standing problems within WSN. We envision that future work, in particular on ADR and MAC protocols for LoRa and other low-power, long-range communication technologies, will help push these new communication technologies to main-stream status in WSNs

    A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques

    Get PDF
    Unmanned Aerial Vehicles (UAV) have revolutionized the aircraft industry in this decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier delivery, and a lot more. A lot of research is happening on making UAVs more robust using energy harvesting techniques to have a better battery lifetime, network performance and to secure against attackers. UAV networks are many times used for unmanned missions. There have been many attacks on civilian, military, and industrial targets that were carried out using remotely controlled or automated UAVs. This continued misuse has led to research in preventing unauthorized UAVs from causing damage to life and property. In this paper, we present a literature review of UAVs, UAV attacks, and their prevention using anti-UAV techniques. We first discuss the different types of UAVs, the regulatory laws for UAV activities, their use cases, recreational, and military UAV incidents. After understanding their operation, various techniques for monitoring and preventing UAV attacks are described along with case studies
    • …
    corecore