51 research outputs found

    Guard time optimisation and adaptation for energy efficient multi-hop TSCH networks

    Get PDF
    International audienceIn the IEEE 802.15.4-2015 standard, Time Slotted Channel Hopping (TSCH) aims to guarantee high-level network reliability by keeping nodes time-synchronised. In order to ensure successful communication between a sender and a receiver, the latter starts listening shortly before the expected time of a MAC layer frame's arrival. The offset between the time a node starts listening and the estimated time of frame arrival is called guard time and it aims to reduce the probability of missed frames due to clock drift. In this paper, we investigate the impact of the guard time on network performance. We identify that, when using the 6tisch minimal schedule, the most significant cause of energy consumption is idle listening during guard time. Therefore, we first perform mathematical modelling on a TSCH link to identify the guard time that maximises the energy-efficiency of the TSCH network in single hop topology. We then continue in multi-hop network, where we empirically adapt the guard time locally at each node depending its distance, in terms of hops, from the sink. Our performance evaluation results, conducted using the Contiki OS, demonstrate that the proposed decentralised guard time adaptation can reduce the energy consumption by up to 40%, without compromising network reliability

    A Case for Time Slotted Channel Hopping for ICN in the IoT

    Full text link
    Recent proposals to simplify the operation of the IoT include the use of Information Centric Networking (ICN) paradigms. While this is promising, several challenges remain. In this paper, our core contributions (a) leverage ICN communication patterns to dynamically optimize the use of TSCH (Time Slotted Channel Hopping), a wireless link layer technology increasingly popular in the IoT, and (b) make IoT-style routing adaptive to names, resources, and traffic patterns throughout the network--both without cross-layering. Through a series of experiments on the FIT IoT-LAB interconnecting typical IoT hardware, we find that our approach is fully robust against wireless interference, and almost halves the energy consumed for transmission when compared to CSMA. Most importantly, our adaptive scheduling prevents the time-slotted MAC layer from sacrificing throughput and delay

    The analysis of energy consumption in 6TiSCH network nodes working in sub-GHz band

    Get PDF
    The 6TiSCH communication stack enables IPv6 networking over the TSCH (Time Slotted Channel Hopping) mode of operation defined in IEEE 802.15.4. Lately, it becomes an attractive solution for Low power and Lossy Networks (LLNs), suitable for Industrial Internet of Things (IIoT) applications. This article introduces a credible energy consumption model for the 6TiSCH network nodes, operating in the 863-870 MHz band. It presents the analysis leading to the construction of the model as well as detailed verification through experimental measurements which showed 98% accuracy in determining power consumption for two different network topologies. The article includes reliable battery lifetime predictions for transit and leaf nodes along with other parametric study results

    The Contiki-NG open source operating system for next generation IoT devices

    Get PDF
    Contiki-NG (Next Generation) is an open source, cross-platform operating system for severely constrained wireless embedded devices. It focuses on dependable (reliable and secure) low-power communications and standardised protocols, such as 6LoWPAN, IPv6, 6TiSCH, RPL, and CoAP. Its primary aims are to (i) facilitate rapid prototyping and evaluation of Internet of Things research ideas, (ii) reduce time-to-market for Internet of Things applications, and (iii) provide an easy-to-use platform for teaching embedded systems-related courses in higher education. Contiki-NG started as a fork of the Contiki OS and retains many of its original features. In this paper, we discuss the motivation behind the creation of Contiki-NG, present the most recent version (v4.7), and highlight the impact of Contiki-NG through specific examples

    Atomic-SDN: Is Synchronous Flooding the Solution to Software-Defined Networking in IoT?

    Get PDF
    The adoption of Software Defined Networking (SDN) within traditional networks has provided operators the ability to manage diverse resources and easily reconfigure networks as requirements change. Recent research has extended this concept to IEEE 802.15.4 low-power wireless networks, which form a key component of the Internet of Things (IoT). However, the multiple traffic patterns necessary for SDN control makes it difficult to apply this approach to these highly challenging environments. This paper presents Atomic-SDN, a highly reliable and low-latency solution for SDN in low-power wireless. Atomic-SDN introduces a novel Synchronous Flooding (SF) architecture capable of dynamically configuring SF protocols to satisfy complex SDN control requirements, and draws from the authors' previous experiences in the IEEE EWSN Dependability Competition: where SF solutions have consistently outperformed other entries. Using this approach, Atomic-SDN presents considerable performance gains over other SDN implementations for low-power IoT networks. We evaluate Atomic-SDN through simulation and experimentation, and show how utilizing SF techniques provides latency and reliability guarantees to SDN control operations as the local mesh scales. We compare Atomic-SDN against other SDN implementations based on the IEEE 802.15.4 network stack, and establish that Atomic-SDN improves SDN control by orders-of-magnitude across latency, reliability, and energy-efficiency metrics

    Experimental Analysis of the Efficiency of Shared Access in IEEE802.15.4-TSCH Networks with Sporadic Traffic

    Get PDF
    International audienceIndustrial wireless networks are now used in many applications, and require to fulfill a certain set of requirements to operate properly. IEEE802.15.4-TSCH is considered a suitable solution to provide real time multihop transmissions in noisy and harsh environments. The standard relies on a strict schedule of the transmissions to reduce the radio duty cycle ratio. While constructing a schedule for periodic traffic has been widely studied in the past, we focus here on the aperiodic, sporadic case. We have to multiplex the transmissions in the schedule to reduce the energy consumption while limiting the number of collisions to provide still high reliability. We propose here to study experimentally the performance of TSCH with shared access and bursty arrivals. Then, we demonstrate how to re-adapt the scheduler to better deal with unpredictable traffic. By performing experiments, we can predict the optimal number of transmitters in a shared cell. Thus, we can overcome collisions and packets drops in complex scenarios where bursty traffic is required

    Evaluation of Feasibility and Impact of Attacks against the 6top Protocol in 6TiSCH Networks

    Get PDF
    The 6TiSCH architecture has been gaining attraction as a promising solution to ensure reliability and security for communication in applications for the Industrial Internet of Things (IIoT). While many different aspects of the architecture have been investigated in literature, an in-depth analysis of the security features included in its design is still missing. In this paper, we assess the security vulnerabilities of the 6top protocol, a core component of the 6TiSCH architecture for enabling network nodes to negotiate communication resources. Our analysis highlights two possible attacks against the 6top protocol that can impair network performance and reliability in a significant manner. To prove the feasibility of the attacks in practice, we implemented both of them on the Contiki-NG Operating System and tested their effectiveness on a simple deployment with three Zolertia RE-Mote sensor nodes. Also, we carried out a set of simulations using Cooja in order to assess their impact on larger networks. Our results show that both attacks reduce reliability in the overall network and increase energy consumption of the network nodes
    • 

    corecore