1,546 research outputs found

    Goodbye, ALOHA!

    Get PDF
    ©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The vision of the Internet of Things (IoT) to interconnect and Internet-connect everyday people, objects, and machines poses new challenges in the design of wireless communication networks. The design of medium access control (MAC) protocols has been traditionally an intense area of research due to their high impact on the overall performance of wireless communications. The majority of research activities in this field deal with different variations of protocols somehow based on ALOHA, either with or without listen before talk, i.e., carrier sensing multiple access. These protocols operate well under low traffic loads and low number of simultaneous devices. However, they suffer from congestion as the traffic load and the number of devices increase. For this reason, unless revisited, the MAC layer can become a bottleneck for the success of the IoT. In this paper, we provide an overview of the existing MAC solutions for the IoT, describing current limitations and envisioned challenges for the near future. Motivated by those, we identify a family of simple algorithms based on distributed queueing (DQ), which can operate for an infinite number of devices generating any traffic load and pattern. A description of the DQ mechanism is provided and most relevant existing studies of DQ applied in different scenarios are described in this paper. In addition, we provide a novel performance evaluation of DQ when applied for the IoT. Finally, a description of the very first demo of DQ for its use in the IoT is also included in this paper.Peer ReviewedPostprint (author's final draft

    Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid

    Get PDF
    The surge of mobile devices, such as smartphones, and tables, demands additional capacity. On the other hand, Internet-of-Things (IoT) and smart grid, which connects numerous sensors, devices, and machines require ubiquitous connectivity and data security. Additionally, some use cases, such as automated manufacturing process, automated transportation, and smart grid, require latency as low as 1 ms, and reliability as high as 99.99\%. To enhance throughput and support massive connectivity, sharing of the unlicensed spectrum (3.5 GHz, 5GHz, and mmWave) is a potential solution. On the other hand, to address the latency, drastic changes in the network architecture is required. The fifth generation (5G) cellular networks will embrace the spectrum sharing and network architecture modifications to address the throughput enhancement, massive connectivity, and low latency. To utilize the unlicensed spectrum, we propose a fixed duty cycle based coexistence of LTE and WiFi, in which the duty cycle of LTE transmission can be adjusted based on the amount of data. In the second approach, a multi-arm bandit learning based coexistence of LTE and WiFi has been developed. The duty cycle of transmission and downlink power are adapted through the exploration and exploitation. This approach improves the aggregated capacity by 33\%, along with cell edge and energy efficiency enhancement. We also investigate the performance of LTE and ZigBee coexistence using smart grid as a scenario. In case of low latency, we summarize the existing works into three domains in the context of 5G networks: core, radio and caching networks. Along with this, fundamental constraints for achieving low latency are identified followed by a general overview of exemplary 5G networks. Besides that, a loop-free, low latency and local-decision based routing protocol is derived in the context of smart grid. This approach ensures low latency and reliable data communication for stationary devices. To address data security in wireless communication, we introduce a geo-location based data encryption, along with node authentication by k-nearest neighbor algorithm. In the second approach, node authentication by the support vector machine, along with public-private key management, is proposed. Both approaches ensure data security without increasing the packet overhead compared to the existing approaches

    Zigbee based Wireless Sensor Network for Smart Energy Meter

    Get PDF
    Wireless sensor networks are expanding across a wide range of application scenarios. The most widely used transmitter is "ZigBee," which is used in wireless sensor networks. Based on the IEEE standard known as IEEE 802.15.4, ZigBee is an enabling low-cost technology that offers minimal energy consumption and a low data rate. It is used for remote control, medical aid, home automation, industry control, and other wireless sensor applications, in addition to wireless sensor networks and personal area network applications. This paper aims to develop a wireless sensor network and a protocol for smart energy meter applications. Our proposed system comprises a digital energy meter, a ZigBee coordinator, and a management application. A terminal alert and a cover alarm can be automatically sent to the management software by the wireless meter reading system once it has read the unit. Mistakes from Errors in leakage metering reading to manual meter reading can be avoided. This proposed system will improve efficiency by reducing labor intensity to liberate labor and force. The system setup can accommodate a large number of energy meters with sufficient hop network depth to detect a new energy meter automatically. The technology can be widely used in wireless monitoring and control applications because of its low cost, low power consumption, extended battery life, and mesh networking's ability to extend high reliability to a broader range. To connect a variety of low-power devices wirelessly, ZigBee will satisfy the rising demand. For the future generation of industrial technologies, ZigBee will be deployed.Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved

    Latency Optimization in Smart Meter Networks

    Get PDF
    In this thesis, we consider the problem of smart meter networks with data collection to a central point within acceptable delay and least consumed energy. In smart metering applications, transferring and collecting data within delay constraints is crucial. IoT devices are usually resource-constrained and need reliable and energy-efficient routing protocol. Furthermore, meters deployed in lossy networks often lead to packet loss and congestion. In smart grid communication, low latency and low energy consumption are usually the main system targets. Considering these constraints, we propose an enhancement in RPL to ensure link reliability and low latency. The proposed new additive composite metric is Delay-Aware RPL (DA-RPL). Moreover, we propose a repeaters’ placement algorithm to meet the latency requirements. The performance of a realistic RF network is simulated and evaluated. On top of the routing solution, new asynchronous ordered transmission algorithms of UDP data packets are proposed to further enhance the overall network latency performance and mitigate the whole system congestion and interference. Experimental results show that the performance of DA-RPL is promising in terms of end-to-end delay and energy consumption. Furthermore, the ordered asynchronous transmission of data packets resulted in significant latency reduction using just a single routing metric

    Controllable radio interference for experimental and testing purposes in wireless sensor networks

    Get PDF
    Abstract—We address the problem of generating customized, controlled interference for experimental and testing purposes in Wireless Sensor Networks. The known coexistence problems between electronic devices sharing the same ISM radio band drive the design of new solutions to minimize interference. The validation of these techniques and the assessment of protocols under external interference require the creation of reproducible and well-controlled interference patterns on real nodes, a nontrivial and time-consuming task. In this paper, we study methods to generate a precisely adjustable level of interference on a specific channel, with lowcost equipment and rapid calibration. We focus our work on the platforms carrying the CC2420 radio chip and we show that, by setting such transceiver in special mode, we can quickly and easily generate repeatable and precise patterns of interference. We show how this tool can be extremely useful for researchers to quickly investigate the behaviour of sensor network protocols and applications under different patterns of interference, and we further evaluate its performance
    • …
    corecore