1,900 research outputs found

    The performance evaluation of IEEE 802.11 against IEEE 802.15.4 with low transmission power

    Get PDF
    Theoretically, IEEE 802.15.4 is more suitable for resource-constraint ad-hoc network because of its low power consumption characteristic. However, performance of IEEE 802.11 is unknown if its transmission power and receiver sensitivity are limited to match those levels of IEEE 802.15.4. In this paper, the performance evaluation of IEEE 802.11 against IEEE 802.15.4 with those power levels is presented. The transmission power and receiver sensitivity of IEEE 802.11 are derived from IEEE 802.15.4 in order to compare their performance and energy consumption. The Ad-hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) routing protocols are exploited for the evaluation of varying network size and node placement models, namely Grid, Random and Uniform. Simulation results show that IEEE 802.11 still outperforms IEEE 802.15.4 in terms of packet delivery ratio, throughput, average end-to-end delay (latency) and average jitter. Besides, the average energy consumed by each node in IEEE 802.11 is even lower than that in IEEE 802.15.4. Nevertheless, under the limited energy condition, the transmission range of IEEE 802.11 is far lower than that supported by IEEE 802.15.4. This is a trade-off of IEEE 802.11 compared to IEEE 802.15.14

    Implementing and Evaluating a Wireless Body Sensor System for Automated Physiological Data Acquisition at Home

    Full text link
    Advances in embedded devices and wireless sensor networks have resulted in new and inexpensive health care solutions. This paper describes the implementation and the evaluation of a wireless body sensor system that monitors human physiological data at home. Specifically, a waist-mounted triaxial accelerometer unit is used to record human movements. Sampled data are transmitted using an IEEE 802.15.4 wireless transceiver to a data logger unit. The wearable sensor unit is light, small, and consumes low energy, which allows for inexpensive and unobtrusive monitoring during normal daily activities at home. The acceleration measurement tests show that it is possible to classify different human motion through the acceleration reading. The 802.15.4 wireless signal quality is also tested in typical home scenarios. Measurement results show that even with interference from nearby IEEE 802.11 signals and microwave ovens, the data delivery performance is satisfactory and can be improved by selecting an appropriate channel. Moreover, we found that the wireless signal can be attenuated by housing materials, home appliances, and even plants. Therefore, the deployment of wireless body sensor systems at home needs to take all these factors into consideration.Comment: 15 page

    JamLab: Augmenting Sensornet Testbeds with Realistic and Controlled Interference Generation

    Get PDF
    Radio interference drastically affects the performance of sensor-net communications, leading to packet loss and reduced energy-efficiency. As an increasing number of wireless devices operates on the same ISM frequencies, there is a strong need for understanding and debugging the performance of existing sensornet protocols under interference. Doing so requires a low-cost flexible testbed infrastructure that allows the repeatable generation of a wide range of interference patterns. Unfortunately, to date, existing sensornet testbeds lack such capabilities, and do not permit to study easily the coexistence problems between devices sharing the same frequencies. This paper addresses the current lack of such an infrastructure by using off-the-shelf sensor motes to record and playback interference patterns as well as to generate customizable and repeat-able interference in real-time. We propose and develop JamLab: a low-cost infrastructure to augment existing sensornet testbeds with accurate interference generation while limiting the overhead to a simple upload of the appropriate software. We explain how we tackle the hardware limitations and get an accurate measurement and regeneration of interference, and we experimentally evaluate the accuracy of JamLab with respect to time, space, and intensity. We further use JamLab to characterize the impact of interference on sensornet MAC protocols

    Survey of Spectrum Sharing for Inter-Technology Coexistence

    Full text link
    Increasing capacity demands in emerging wireless technologies are expected to be met by network densification and spectrum bands open to multiple technologies. These will, in turn, increase the level of interference and also result in more complex inter-technology interactions, which will need to be managed through spectrum sharing mechanisms. Consequently, novel spectrum sharing mechanisms should be designed to allow spectrum access for multiple technologies, while efficiently utilizing the spectrum resources overall. Importantly, it is not trivial to design such efficient mechanisms, not only due to technical aspects, but also due to regulatory and business model constraints. In this survey we address spectrum sharing mechanisms for wireless inter-technology coexistence by means of a technology circle that incorporates in a unified, system-level view the technical and non-technical aspects. We thus systematically explore the spectrum sharing design space consisting of parameters at different layers. Using this framework, we present a literature review on inter-technology coexistence with a focus on wireless technologies with equal spectrum access rights, i.e. (i) primary/primary, (ii) secondary/secondary, and (iii) technologies operating in a spectrum commons. Moreover, we reflect on our literature review to identify possible spectrum sharing design solutions and performance evaluation approaches useful for future coexistence cases. Finally, we discuss spectrum sharing design challenges and suggest future research directions

    A Smart Game for Data Transmission and Energy Consumption in the Internet of Things

    Get PDF
    The current trend in developing smart technology for the Internet of Things (IoT) has motivated a lot of research interest in optimizing data transmission or minimizing energy consumption, but with little evidence of proposals for achieving both objectives in a single model. Using the concept of game theory, we develop a new MAC protocol for IEEE 802.15.4 and IoT networks in which we formulate a novel expression for the players' utility function and establish a stable Nash equilibrium (NE) for the game. The proposed IEEE 802.15.4 MAC protocol is modeled as a smart game in which analytical expressions are derived for channel access probability, data transmission probability, and energy used. These analytical expressions are used in formulating an optimization problem (OP) that maximizes data transmission and minimizes energy consumption by nodes. The analysis and simulation results suggest that the proposed scheme is scalable and achieves better performance in terms of data transmission, energy-efficiency, and longevity, when compared with the default IEEE 802.15.4 access mechanism.Peer reviewe

    Survey on wireless technology trade-offs for the industrial internet of things

    Get PDF
    Aside from vast deployment cost reduction, Industrial Wireless Sensor and Actuator Networks (IWSAN) introduce a new level of industrial connectivity. Wireless connection of sensors and actuators in industrial environments not only enables wireless monitoring and actuation, it also enables coordination of production stages, connecting mobile robots and autonomous transport vehicles, as well as localization and tracking of assets. All these opportunities already inspired the development of many wireless technologies in an effort to fully enable Industry 4.0. However, different technologies significantly differ in performance and capabilities, none being capable of supporting all industrial use cases. When designing a network solution, one must be aware of the capabilities and the trade-offs that prospective technologies have. This paper evaluates the technologies potentially suitable for IWSAN solutions covering an entire industrial site with limited infrastructure cost and discusses their trade-offs in an effort to provide information for choosing the most suitable technology for the use case of interest. The comparative discussion presented in this paper aims to enable engineers to choose the most suitable wireless technology for their specific IWSAN deployment

    A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network

    Full text link
    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.Comment: 14 pages, 7 figures, 2 table

    Throughput and range characterization of IEEE 802.11ah

    Full text link
    The most essential part of Internet of Things (IoT) infrastructure is the wireless communication system that acts as a bridge for the delivery of data and control messages. However, the existing wireless technologies lack the ability to support a huge amount of data exchange from many battery driven devices spread over a wide area. In order to support the IoT paradigm, the IEEE 802.11 standard committee is in process of introducing a new standard, called IEEE 802.11ah. This is one of the most promising and appealing standards, which aims to bridge the gap between traditional mobile networks and the demands of the IoT. In this paper, we first discuss the main PHY and MAC layer amendments proposed for IEEE 802.11ah. Furthermore, we investigate the operability of IEEE 802.11ah as a backhaul link to connect devices over a long range. Additionally, we compare the aforementioned standard with previous notable IEEE 802.11 amendments (i.e. IEEE 802.11n and IEEE 802.11ac) in terms of throughput (with and without frame aggregation) by utilizing the most robust modulation schemes. The results show an improved performance of IEEE 802.11ah (in terms of power received at long range while experiencing different packet error rates) as compared to previous IEEE 802.11 standards.Comment: 7 pages, 6 figures, 5 table
    corecore