53 research outputs found

    Ultra Low Power Communication Protocols for UWB Impulse Radio Wireless Sensor Networks

    Get PDF
    This thesis evaluates the potential of Ultra Wideband Impulse Radio for wireless sensor network applications. Wireless sensor networks are collections of small electronic devices composed of one or more sensors to acquire information on their environment, an energy source (typically a battery), a microcontroller to control the measurements, process the information and communicate with its peers, and a radio transceiver to enable these communications. They are used to regularly collect information within their deployment area, often for very long periods of time (up to several years). The large number of devices often considered, as well as the long deployment durations, makes any manual intervention complex and costly. Therefore, these networks must self-configure, and automatically adapt to changes in their electromagnetic environment (channel variations, interferers) and network topology modifications: some nodes may run out of energy, or suffer from a hardware failure. Ultra Wideband Impulse Radio is a novel wireless technology that, thanks to its extremely large bandwidth, is more robust to frequency dependent propagation effects. Its impulsional nature makes it robust to multipath fading, as the short duration of the pulses leads most multipath components to arrive isolated. This technology should also enable high precision ranging through time of flight measurements, and operate at ultra low power levels. The main challenge is to design a system that reaches the same or higher degree of energy savings as existing narrowband systems considering all the protocol layers. As these radios are not yet widely available, the first part of this thesis presents Maximum Pulse Amplitude Estimation, a novel approach to symbol-level modeling of UWB-IR systems that enabled us to implement the first network simulator of devices compatible with the UWB physical layer of the IEEE 802.15.4A standard for wireless sensor networks. In the second part of this thesis, WideMac, a novel ultra low power MAC protocol specifically designed for UWB-IR devices is presented. It uses asynchronous duty cycling of the radio transceiver to minimize the power consumption, combined with periodic beacon emissions so that devices can learn each other's wake-up patterns and exchange packets. After an analytical study of the protocol, the network simulation tool presented in the first part of the thesis is used to evaluate the performance of WideMac in a medical body area network application. It is compared to two narrowband and an FM-UWB solutions. The protocol stack parameters are optimized for each solution, and it is observed that WideMac combined to UWB-IR is a credible technology for such applications. Similar simulations, considering this time a static multi-hop network are performed. It is found that WideMac and UWB-IR perform as well as a mature and highly optimized narrowband solution (based on the WiseMAC ULP MAC protocol), despite the lack of clear channel assessment functionality on the UWB radio. The last part of this thesis studies analytically a dual mode MAC protocol named WideMac-High Availability. It combines the Ultra Low PowerWideMac with the higher performance Aloha protocol, so that ultra low power consumption and hence long deployment times can be combined with high performance low latency communications when required by the application. The potential of this scheme is quantified, and it is proposed to adapt it to narrowband radio transceivers by combining WiseMAC and CSMA under the name WiseMAC-HA

    Optimization of positioning capabilities in wireless sensor networks : from power efficiency to medium access

    Get PDF
    In Wireless Sensor Networks (WSN), the ability of sensor nodes to know its position is an enabler for a wide variety of applications for monitoring, control, and automation. Often, sensor data is meaningful only if its position can be determined. Many WSN are deployed indoors or in areas where Global Navigation Satellite System (GNSS) signal coverage is not available, and thus GNSS positioning cannot be guaranteed. In these scenarios, WSN may be relied upon to achieve a satisfactory degree of positioning accuracy. Typically, batteries power sensor nodes in WSN. These batteries are costly to replace. Therefore, power consumption is an important aspect, being performance and lifetime of WSN strongly relying on the ability to reduce it. It is crucial to design effective strategies to maximize battery lifetime. Optimization of power consumption can be made at different layers. For example, at the physical layer, power control and resource optimization may play an important role, as well as at higher layers through network topology and MAC protocols. The objective of this Thesis is to study the optimization of resources in WSN that are employed for positioning purposes, with the ultimate goal being the minimization of power consumption. We focus on anchor-based positioning, where a subset of the WSN nodes know their location (anchors) and send ranging signals to nodes with unknown position (targets) to assist them in estimating it through distance-related measurements. Two well known of such measurements are received signal strength (RSS) and time of arrival (TOA), in which this Thesis focuses. In order to minimize power consumption while providing a certain quality of positioning service, in this dissertation we research on the problems of power control and node selection. Aiming at a distributed implementation of the proposed techniques, we resort to the tools of non-cooperative game theory. First, transmit power allocation is addressed for RSS based ranging. Using game theory formulation, we develop a potential game leading to an iterated best response algorithm with sure convergence. As a performance metric, we introduce the geometric dilution of precision (GDOP), which is shown to help achieving a suitable geometry of the selected anchor nodes. The proposed scheme and relative distributed algorithms provide good equilibrium performance in both static and dynamic scenarios. Moreover, we present a distributed, low complexity implementation and analyze it in terms of computational complexity. Results show that performance close to that of exhaustive search is possible. We then address the transmit power allocation problem for TOA based ranging, also resorting to a game theoretic formulation. In this setup, and also considering GDOP as performance metric, a supermodular game formulation is proposed, along with a distributed algorithm with guaranteed convergence to a unique solution, based on iterated best response. We analyze the proposed algorithm in terms of the price of anarchy (PoA), that is, compared to a centralized optimum solution, and shown to have a moderate performance loss. Finally, this dissertation addresses the effect of different MAC protocols and topologies in the positioning performance. In this direction, we study the performance of mesh and cluster-tree topologies defined in WSN standards. Different topologies place different constraints in network connectivity, having a substantial impact on the performance of positioning algorithms. While mesh topology allows high connectivity with large energy consumption, cluster-tree topologies are more energy efficient but suffer from reduced connectivity and poor positioning performance. In order to improve the performance of cluster-tree topologies, we propose a cluster formation algorithm. It significantly improves connectivity with anchor nodes, achieving vastly improved positioning performance.En les xarxes de sensors sense fils (WSN), l'habilitat dels nodes sensors per conèixer la seva posició facilita una gran varietat d'aplicacions per la monitorització, el control i l'automatització. Així, les dades que proporciona un sensor tenen sentit només si la posició pot ésser determinada. Moltes WSN són desplegades en interiors o en àrees on la senyal de sistemes globals de navegació per satèl.lit (GNSS) no té prou cobertura, i per tant, el posicionament basat en GNSS no pot ésser garantitzat. En aquests escenaris, les WSN poden proporcionar una bona precisió en posicionament. Normalment, en WSN els nodes són alimentats amb bateries. Aquestes bateries són difícils de reemplaçar. Per tant, el consum de potència és un aspecte important i és crucial dissenyar estratègies efectives per maximitzar el temps de vida de la bateria. L'optimització del consum de potència pot ser fet a diferents capes del protocol. Per exemple, en la capa física, el control de potència i l'optimització dels recursos juguen un rol important, igualment que la topologia de xarxa i els protocols MAC en les capes més altes. L'objectiu d'aquesta tesi és estudiar l¿optimització de recursos en WSN que s'utilitzen per fer posicionament, amb el propòsit de minimitzar el consum de potència. Ens focalitzem en el posicionament basat en àncora, en el qual un conjunt de nodes coneixen la seva localització (nodes àncora) i envien missatges als nodes que no saben la seva posició per ajudar-los a estimar les seves coordenades amb mesures de distància. Dues classes de mesures són la potència de la senyal rebuda (RSS) i el temps d'arribada (TOA) en les quals aquesta tesi està focalitzada. Per minimitzar el consum de potència mentre que es proporciona suficient qualitat en el posicionament, en aquesta tesi estudiem els problemes de control de potència i selecció de nodes. Tenint en compte una implementació distribuïda de les tècniques proposades, utilitzem eïnes de teoria de jocs no cooperatius. Primer, l'assignació de potència transmesa és abordada pel càlcul de la distància amb RSS. Utilitzant la teoria de jocs, desenvolupem un joc potencial que convergeix amb un algoritme iteratiu basat en millor resposta (best response). Com a mètrica d'error, introduïm la dilució de la precisió geomètrica (GDOP) que mostra quant d'apropiada és la geometria dels nodes àncora seleccionats. L'esquema proposat i els algoritmes distribuïts proporcionen una bona resolució de l'equilibri en l'escenari estàtic i dinàmic. Altrament, presentem una implementació distribuïda i analitzem la seva complexitat computacional. Els resultats obtinguts són similars als obtinguts amb un algoritme de cerca exhaustiva. El problema d'assignació de la potència transmesa en el càlcul de la distància basat en TOA, també és tractat amb teoria de jocs. En aquest cas, considerant el GDOP com a mètrica d'error, proposem un joc supermodular juntament amb un algoritme distribuït basat en millor resposta amb convergència garantida cap a una única solució. Analitzem la solució proposada amb el preu de l'anarquia (PoA), és a dir, es compara la nostra solució amb una solució òptima centralitzada mostrant que les pèrdues són moderades. Finalment, aquesta tesi tracta l'efecte que causen diferents protocols MAC i topologies en el posicionament. En aquesta direcció, estudiem les topologies de malla i arbre formant clusters (cluster-tree) que estan definides als estàndards de les WSN. La diferència entre les topologies crea diferents restriccions en la connectivitat de la xarxa, afectant els resultats de posicionament. La topologia de malla permet una elevada connectivitat entre els nodes amb gran consum d'energia, mentre que les topologies d'arbre són més energèticament eficients però amb baixa connectivitat entre els nodes i baix rendiment pel posicionament. Per millorar la qualitat del posicionament en les topologies d'arbre, proposem un algoritme de formació de clústers.Postprint (published version

    Secure Neighbor Discovery and Ranging in Wireless Networks

    Get PDF
    This thesis addresses the security of two fundamental elements of wireless networking: neighbor discovery and ranging. Neighbor discovery consists in discovering devices available for direct communication or in physical proximity. Ranging, or distance bounding, consists in measuring the distance between devices, or providing an upper bound on this distance. Both elements serve as building blocks for a variety of services and applications, notably routing, physical access control, tracking and localization. However, the open nature of wireless networks makes it easy to abuse neighbor discovery and ranging, and thereby compromise overlying services and applications. To prevent this, numerous works proposed protocols that secure these building blocks. But two aspects crucial for the security of such protocols have received relatively little attention: formal verification and attacks on the physical-communication-layer. They are precisely the focus of this thesis. In the first part of the thesis, we contribute a formal analysis of secure communication neighbor discovery protocols. We build a formal model that captures salient characteristics of wireless systems such as node location, message propagation time and link variability, and we provide a specification of secure communication neighbor discovery. Then, we derive an impossibility result for a general class of protocols we term "time-based protocols", stating that no such protocol can provide secure communication neighbor discovery. We also identify the conditions under which the impossibility result is lifted. We then prove that specific protocols in the time-based class (under additional conditions) and specific protocols in a class we term "time- and location-based protocols," satisfy the neighbor discovery specification. We reinforce these results by mechanizing the model and the proofs in the theorem prover Isabelle. In the second part of the thesis, we explore physical-communication-layer attacks that can seemingly decrease the message arrival time without modifying its content. Thus, they can circumvent time-based neighbor discovery protocols and distance bounding protocols. (Indeed, they violate the assumptions necessary to prove protocol correctness in the first part of the thesis.) We focus on Impulse Radio Ultra-Wideband, a physical layer technology particularly well suited for implementing distance bounding, thanks to its ability to perform accurate indoor ranging. First, we adapt physical layer attacks reported in prior work to IEEE 802.15.4a, the de facto standard for Impulse Radio, and evaluate their performance. We show that an adversary can achieve a distance-decrease of up to hundreds of meters with an arbitrarily high probability of success, with only a minor cost in terms of transmission power (few dB). Next, we demonstrate a new attack vector that disrupts time-of-arrival estimation algorithms, in particular those designed to be precise. The distance-decrease achievable by this attack vector is in the order of the channel spread (order of 10 meters in indoor environments). This attack vector can be used in previously reported physical layer attacks, but it also creates a new type of external attack based on malicious interference. We demonstrate that variants of the malicious interference attack are much easier to mount than the previously reported external attack. We also provide design guidelines for modulation schemes and devise receiver algorithms that mitigate physical layer attacks. These countermeasures allow the system designer to trade off security, ranging precision and cost in terms of transmission power and packet length

    Performance Review of Selected Topology-Aware Routing Strategies for Clustering Sensor Networks

    Get PDF
    In this paper, cluster-based routing (CBR) protocols for addressing issues pertinent to energy consumption, network lifespan, resource allocation and network coverage are reviewed. The paper presents an indepth  performance analysis and critical review of selected CBR algorithms. The study is domain-specific and simulation-based with emphasis on the tripartite trade-off between coverage, connectivity and lifespan. The rigorous statistical analysis of selected CBR schemes was also presented. Network simulation was conducted with Java-based Atarraya discrete-event simulation toolkit while statistical analysis was carried out using MATLAB. It was observed that the Periodic, Event-Driven and Query-Based Routing (PEQ) schemes performs better than Low-Energy Adaptive Clustering Hierarchy (LEACH), Threshold-Sensitive Energy-Efficient Sensor Network (TEEN) and Geographic Adaptive Fidelity (GAF) in terms of network lifespan, energy consumption and network throughput.Keywords: Wireless sensor network, Hierarchical topologies, Cluster-based routing, Statistical analysis, Network simulatio

    A Performance-to-Cost Analysis of IEEE 802.15.4 MAC With 802.15.4e MAC Modes

    Full text link
    [EN] The IEEE 802.15.4 standard is one of the widely adopted networking specification for Internet of Things (IoT). It defines several physical layer (PHY) options and medium access control (MAC) sub-layer protocols for interconnection of constrained wireless devices. These devices are usually battery-powered and need to support requirements like low-power consumption and low-data rates. The standard has been revised twice to incorporate new PHY layers and improvements learned from implementations. Research in this direction has been primarily centered around improving the energy consumption of devices. Recently, to meet specific Quality-of-Service (QoS) requirements of different industrial applications, the IEEE 802.15.4e amendment was released that focuses on improving reliability, robustness and latency. In this paper, we carry out a performance-to-cost analysis of Deterministic and Synchronous Multi-channel Extension (DSME) and Time-slotted Channel Hopping (TSCH) MAC modes of IEEE 802.15.4e with 802.15.4 MAC protocol to analyze the trade-off of choosing a particular MAC mode over others. The parameters considered for performance are throughput and latency, and the cost is quantified in terms of energy. A Markov model has been developed for TSCH MAC mode to compare its energy costs with 802.15.4 MAC. Finally, we present the applicability of different MAC modes to different application scenarios.This work was supported in part by the SERB, DST, Government of India under Grant ECRA/2016/001651.Choudhury, N.; Matam, R.; Mukherjee, M.; Lloret, J. (2020). A Performance-to-Cost Analysis of IEEE 802.15.4 MAC With 802.15.4e MAC Modes. IEEE Access. 8:41936-41950. https://doi.org/10.1109/ACCESS.2020.2976654S4193641950

    Scheduling UWB Ranging and Backbone Communications in a Pure Wireless Indoor Positioning System

    Get PDF
    International audienceIn this paper, we present and evaluate an ultra-wideband (UWB) indoor processing architecture that allows the performing of simultaneous localizations of mobile tags. This architecture relies on a network of low-power fixed anchors that provide forward-ranging measurements to a localization engine responsible for performing trilateration. The communications within this network are orchestrated by UWB-TSCH, an adaptation to the ultra-wideband (UWB) wireless technology of the time-slotted channel-hopping (TSCH) mode of IEEE 802.15.4. As a result of global synchronization, the architecture allows deterministic channel access and low power consumption. Moreover, it makes it possible to communicate concurrently over multiple frequency channels or using orthogonal preamble codes. To schedule communications in such a network, we designed a dedicated centralized scheduler inspired from the traffic aware scheduling algorithm (TASA). By organizing the anchors in multiple cells, the scheduler is able to perform simultaneous localizations and transmissions as long as the corresponding anchors are sufficiently far away to not interfere with each other. In our indoor positioning system (IPS), this is combined with dynamic registration of mobile tags to anchors, easing mobility, as no rescheduling is required. This approach makes our ultra-wideband (UWB) indoor positioning system (IPS) more scalable and reduces deployment costs since it does not require separate networks to perform ranging measurements and to forward them to the localization engine. We further improved our scheduling algorithm with support for multiple sinks and in-network data aggregation. We show, through simulations over large networks containing hundreds of cells, that high positioning rates can be achieved. Notably, we were able to fully schedule a 400-cell/400-tag network in less than 11 s in the worst case, and to create compact schedules which were up to 11 times shorter than otherwise with the use of aggregation, while also bounding queue sizes on anchors to support realistic use situations

    On uncoordinated wireless ad-hoc networks:data dissemination over WIFI and cross-layer optimization for ultra wide band impulse radio

    Get PDF
    Emerging pervasive wireless networks, pocket switched networks, Internet of things, vehicular networks and even sensor networks present very challenging communication circumstances. They might involve up to several hundreds of wireless devices with mobility and intermittent connectivity. Centralized coordination in such networks is practically unfeasible. We deal with these challenge using two potential technologies: WIFI and Ultra Wide Band (UWB) Impulse Radio (IR) for medium and short communication range, respectively. Our main goal is to improve the communication performance and to make these networks sustainable in the absence of a centralized coordination. With WIFI, the goal is to design an environment-oblivious data dissemination protocol that holds in highly dynamic unpredictable wireless ad-hoc networks. To this end, we propose a complete design for a scope limited, multi-hop broadcast middleware, which is adapted to the variability of the ad-hoc environment and works in unlimited ad-hoc networks such as a crowd in a city, or car passengers in a busy highway system. We address practical problems posed by: the impossibility of setting the TTL correctly at all times, the poor performance of multiple access protocols in broadcast mode, flow control when there is no acknowledgment and scheduling of multiple concurrent broadcasts. Our design, called "Self Limiting Epidemic Forwarding" (SLEF), automatically adapts its behavior from single hop MAC layer broadcast to epidemic forwarding when the environment changes from being extremely dense to sparse, sporadically connected. A main feature of SLEF is a non-classical manipulation of the TTL field, which combines the usual decrement-when-sending to many very small decrements when receiving. Then, we identify vulnerabilities that are specific to epidemic forwarding. We address broadcast applications over wireless ad-hoc networks. Epidemic forwarding employs several mechanisms such as forwarding factor control and spread control, and each of them can be implemented using alternative methods. Thus, the existence of vulnerabilities is highly dependent on the methods used. We examine the links between them. We classify vulnerabilities into two categories: malicious and rational. We examine the effect of the attacks according to the number of attackers and the different network settings such as density, mobility and congestion. We show that malicious attacks are hard to achieve and their effects are scenario-dependent. In contrast, rational attackers always obtain a significant benefit. The evaluation is carried out using detailed realistic simulations over networks with up to 1000 nodes. We consider static scenarios, as well as vehicular networks. In order to validate our simulation results, we build a solid and widely adaptable experimental testbed for wireless networks. It is composed of 57 mobile wireless nodes equipped with WIFI interface. The adopted platform is OpenWrt, a Linux-like firmware, which makes the testbed robust and easily configurable. With UWB IR, the main problem we deal with is the presence of uncontrolled interference. Indeed, similarly to Code Division Multiple Access (CDMA) systems, signal acquisition with UWB IR signaling requires power control in the presence of interferers, which is very expensive in an uncoordinated system. We solve this problem through a cross-layer optimization: We propose a new signal acquisition method that is independent of the received signal power and we adapt the MAC layer accordingly. Our signal acquisition method is designed to solve the IUI (Inter-User Interference) that occurs in some ad-hoc networks where concurrent transmissions are allowed with heterogeneous power levels. In such scenarios, the conventional detection method, which is based on correlating the received IR signal with a Template Pulse Train (TPT), does not always perform well. The complexity of our proposal is similar to that of the conventional method. We evaluate its performance with the Line Of Sight (LOS) and the Non-LOS (NLOS) office indoor-channel models proposed by the IEEE P802.15.4a study group and find that the improvement is significant. We also investigate the particular case where the concurrent transmissions have the same time-hopping code, and we show that it does not result in collision, such scenarios appear in ad-hoc networks that employ a common code for control or broadcast purposes. At the MAC level, we focus only on one component of a MAC layer, which is the sleeping mode that could be added to any MAC layer proposal adequate to UWB IR. We are motivated by the low power consumption constraint required by the potential applications. We identify the design elements that should be taken into account for an optimal design for a sleeping protocol for UWB-IR such as the possibility of transmitting concurrently without collision and the power consumption model of the hardware behind which is completely different than with the narrow-band signaling. Then, we design two sleeping protocols for centralized and decentralized ad-hoc networks, respectively. We evaluate their performance analytically with the adopted metric being the average life-time of the wireless nodes

    Wireless sensor networks using network coding for structural health monitoring

    Get PDF
    Wireless Sensor Networks (WSNs) have been deployed for the purpose of structural health monitoring (SHM) of civil engineering structures, e.g. bridges. SHM applications can potentially produce a high volume of sensing data, which consumes much transmission power and thus decreases the lifetime of the battery-run networks. We employ the network coding technique to improve the network efficiency and prolong its lifetime. By increasing the transmission power, we change the node connectivity and control the number of nodes that can overhear transmitted messages so as to hopefully realize the capacity gain by use of network coding. In Chapter 1, we present the background, to enable the reader to understand the need for SHM, advantages and drawbacks of WSNs and potential the application of network coding techniques has. In Chapter 2 we provide a review of related research explaining how it relates to our work, and why it is not fully applicable in our case. In Chapter 3, we propose to control transmission power as a means to adjust the number of nodes that can overhear a message transmission by a neighbouring node. However, too much of the overhearing by high power transmission consumes aggressively limited battery energy. We investigate the interplay between transmission power and network coding operations in Chapter 4. We show that our solution reduces the overall volume of data transfer, thus leading to significant energy savings and prolonged network lifetime. We present the mathematical analysis of our proposed algorithm. By simulation, we also study the trade-offs between overhearing and power consumption for the network coding scheme. In Chapter 5, we propose a methodology for the optimal placement of sensor nodes in linear network topologies (e.g., along the length of a bridge), that aims to minimise the link connectivity problems and maximise the lifetime of the network. Both simple packet relay and network coding are considered for the routing of the collected data packets towards two sink nodes positioned at both ends of the bridge. Our mathematical analysis, verified by simulation results, shows that the proposed methodology can lead to significant energy saving and prolong the lifetime of the underlying wireless sensor network. Chapter 6 is dedicated to the delay analysis. We analytically calculate the gains in terms of packet delay obtained by the use of network coding in linear multi-hop wireless sensor network topologies. Moreover, we calculate the exact packet delay (from the packet generation time to the time it is delivered to the sink nodes) as a function of the location of the source sensor node within the linear network. The derived packet delay distribution formulas have been verified by simulations and can provide a benchmark for the delay performance of linear sensor networks. In the Chapter 7, we propose an adaptive version of network coding based algorithm. In the case of packet loss, nodes do not necessary retransmit messages as they are able to internally decide how to cope with the situation. The goal of this algorithm is to reduce the power consumption, and decrease delays whenever it can. This algorithm achieves the delay similar to that of three-hop direct-connectivity version of the deterministic algorithm, and consumes power almost like one-hop direct-connectivity version of deterministic algorithm. In very poor channel conditions, this protocol outperforms the deterministic algorithm both in terms of delay and power consumption. In Chapter 8, we explain the direction of our future work. Particularly, we are interested in the application of combined TDMA/FDMA technique to our algorithm.Open Acces
    corecore