143 research outputs found

    Poster Abstract: Opportunistic RPL

    Get PDF
    Sensor nodes constituting Wireless Sensor Networks (WSN) are often battery- operated and have limited resources. To save energy, nodes sleep most of the time, and wake up periodically to handle communication. Such radio duty cycling poses a basic trade-off between energy and latency. In previous work, we have shown that opportunistic routing is an efficient way to achieve low-latency yet energy efficient data collection in WSN (ORW [3]). In this paper, we extend this approach to the context of low-power IP networks, where nodes need to be addressed individually and where traffic patterns are irregular. We present ORPL, an opportunistic extension of RPL, the stan- dard, state-of-the-art routing protocol for low-power IP networks. We discuss our preliminary results obtained with Contiki in a 137-node testbed

    Let the Tree Bloom: Scalable Opportunistic Routing with ORPL

    Get PDF
    Routing in battery-operated wireless networks is challenging, posing a tradeoff between energy and latency. Previous work has shown that opportunistic routing can achieve low-latency data collection in duty-cycled networks. However, applications are now considered where nodes are not only periodic data sources, but rather addressable end points generating traffic with arbitrary patterns. We present ORPL, an opportunistic routing protocol that supports any-to-any, on-demand traffic. ORPL builds upon RPL, the standard protocol for low-power IPv6 networks. By combining RPL's tree-like topology with opportunistic routing, ORPL forwards data to any destination based on the mere knowledge of the nodes' sub-tree. We use bitmaps and Bloom filters to represent and propagate this information in a space-efficient way, making ORPL scale to large networks of addressable nodes. Our results in a 135-node testbed show that ORPL outperforms a number of state-of-the-art solutions including RPL and CTP, conciliating a sub-second latency and a sub-percent duty cycle. ORPL also increases robustness and scalability, addressing the whole network reliably through a 64-byte Bloom filter, where RPL needs kilobytes of routing tables for the same task

    Towards Energy Efficient, High-speed Communication in WSNs

    Get PDF
    Traditionally, protocols in wireless sensor networks focus on low-power operation with low data-rates. In addition, a small set of protocols provides high throughput communication. With sensor networks developing into general propose networks, we argue that protocols need to provide both: low data-rates at high energy-efficiency and, additionally, a high throughput mode. This is essential, for example, to quickly collect large amounts of raw-data from a sensor. This paper presents a set of practical extensions to the low-power, low delay routing protocol ORW. We introduce the capability to handle multiple, concurrent bulk-transfers in dynamic application scenarios. Overall, our extensions allow ORW to reach an almost 500% increase in the throughput with less than a 25% increase of the power consumption during a bulk transfer. Thus, we show that instead of developing a new protocol from scratch, we can carefully enhance an existing, energy-efficient protocol with high-throughput extensions. Both the energy-efficient low data-rate mode and the high throughput extensions transparently coexist inside a single protocol

    Opportunistic Routing and Synchronous Transmissions Meet TSCH

    Get PDF
    Low-power wireless networking commonly uses either Time-Slotted Channel Hopping (TSCH), synchronous transmissions, or opportunistic routing. All three of these different, orthogonal approaches strive for efficient and reliable communication but follow different trajectories. With this paper, we combine these concepts into one protocol: AUTOBAHN.AUTOBAHN merges TSCH scheduling with opportunistically routed, synchronous transmissions. This opens the possibility to create long-term stable schedules overcoming local interference. We prove the stability of schedules over several days in our experimental evaluation. Moreover, AUTOBAHN outperforms the autonomous scheduler Orchestra under interference in terms of reliability by 13.9 percentage points and in terms of latency by a factor of 9 under a minor duty cycle increase of 2.1 percentage points

    Whisper: Fast Flooding for Low-Power Wireless Networks

    Full text link
    This paper presents Whisper, a fast and reliable protocol to flood small amounts of data into a multi-hop network. Whisper relies on three main cornerstones. First, it embeds the message to be flooded into a signaling packet that is composed of multiple packlets. A packlet is a portion of the message payload that mimics the structure of an actual packet. A node must intercept only one of the packlets to know that there is an ongoing transmission. Second, Whisper exploits the structure of the signaling packet to reduce idle listening and, thus, to reduce the radio-on time of the nodes. Third, it relies on synchronous transmissions to quickly flood the signaling packet through the network. Our evaluation on the Flocklab testbed shows that Whisper achieves comparable reliability but significantly lower radio-on time than Glossy -- a state-of-the-art flooding algorithm. Specifically, Whisper can disseminate data in FlockLab twice as fast as Glossy with no loss in reliability. Further, Whisper spends 30% less time in channel sampling compared to Glossy when no data traffic must be disseminated

    Low Power, Low Delay: Opportunistic Routing meets Duty Cycling

    Get PDF
    Traditionally, routing in wireless sensor networks consists of two steps: First, the routing protocol selects a next hop, and, second, the MAC protocol waits for the intended destination to wake up and receive the data. This design makes it difficult to adapt to link dynamics and introduces delays while waiting for the next hop to wake up. In this paper we introduce ORW, a practical opportunistic routing scheme for wireless sensor networks. In a dutycycled setting, packets are addressed to sets of potential receivers and forwarded by the neighbor that wakes up first and successfully receives the packet. This reduces delay and energy consumption by utilizing all neighbors as potential forwarders. Furthermore, this increases resilience to wireless link dynamics by exploiting spatial diversity. Our results show that ORW reduces radio duty-cycles on average by 50% (up to 90% on individual nodes) and delays by 30% to 90% when compared to the state of the art

    Dimmer: Self-Adaptive Network-Wide Flooding with Reinforcement Learning

    Full text link
    The last decade saw an emergence of Synchronous Transmissions (ST) as an effective communication paradigm in low-power wireless networks. Numerous ST protocols provide high reliability and energy efficiency in normal wireless conditions, for a large variety of traffic requirements. Recently, with the EWSN dependability competitions, the community pushed ST to harsher and highly-interfered environments, improving upon classical ST protocols through the use of custom rules, hand-tailored parameters, and additional retransmissions. The results are sophisticated protocols, that require prior expert knowledge and extensive testing, often tuned for a specific deployment and envisioned scenario. In this paper, we explore how ST protocols can benefit from self-adaptivity; a self-adaptive ST protocol selects itself its best parameters to (1) tackle external environment dynamics and (2) adapt to its topology over time. We introduce Dimmer as a self-adaptive ST protocol. Dimmer builds on LWB and uses Reinforcement Learning to tune its parameters and match the current properties of the wireless medium. By learning how to behave from an unlabeled dataset, Dimmer adapts to different interference types and patterns, and is able to tackle previously unseen interference. With Dimmer, we explore how to efficiently design AI-based systems for constrained devices, and outline the benefits and downfalls of AI-based low-power networking. We evaluate our protocol on two deployments of resource-constrained nodes achieving 95.8% reliability against strong, unknown WiFi interference. Our results outperform baselines such as non-adaptive ST protocols (27%) and PID controllers, and show a performance close to hand-crafted and more sophisticated solutions, such as Crystal (99%)

    Poster: Trace yourself-it could be easy

    Get PDF
    Contact tracing helps to predict and prevent the spread of viruses. This work proposes Tracey for decentralized, privacy-preserving tracing. Unlike automated tracing solutions that operate in the background, such as the widespread governmental Corona Tracing Apps, our system builds on manual contact exchanges to ensure reliable contact tracing even for groups and venues. The devices share secrets that allow anonymous notifications using the health authorities’ trusted database. This work illustrates the concept, provides initial security analysis, first results, and gives an outlook on possible extensions

    eAFH: Informed Exploration for Adaptive Frequency Hopping in Bluetooth Low Energy

    Get PDF
    With more than 4 billion devices produced in 2020, Bluetooth and Bluetooth Low Energy (BLE) have become the dominant solutions for short-range wireless communication in IoT. BLE mitigates interference via Adaptive Frequency Hopping (AFH), spreading communication over the entire spectrum. However, the ever-growing number of BLE devices and WiFi traffic in the already crowded 2.4 GHz band lead to situations where the quality of BLE connections dynamically changes with nearby wireless traffic, location, and time of day. These dynamic environments demand new approaches for channel management in AFH, by both dynamically excluding frequencies suffering from localized interference and adaptively re-including channels, thus providing sufficient channel diversity to survive the rise of new interference.We introduce eAFH, a new channel-management approach in BLE with a strong focus on efficient channel re-inclusion. eAFH introduces informed exploration as a driver for inclusion: using only past measurements, eAFH assesses which frequencies we are most likely to benefit from re-inclusion into the hopping sequence. As a result, eAFH adapts in dynamic scenarios where interference varies over time. We show that eAFH achieves 98-99.5% link layer reliability in the presence of dynamic WiFi interference with 1% control overhead and 40% higher channel diversity than state-of-the-art approaches

    Competition: Centrally Scheduled Low-Power Wireless Networking for Dependable Data Collection

    Get PDF
    For low-power wireless networks, it is important to survive interference to be usable for Industrial Internet-of-Things (IIoT) applications. Distributed flooding protocols like Glossy or Chaos have shown that they can meet the expectations of surviving interference and node failures. However, non-distributed, centralized schedulers are favorable for IIoT but are not used yet in these environments. In this paper, we explore the use of centralized schedulers for low-power wireless networks to achieve robustness in data collection applications
    • …
    corecore