1
|
Kane L, Liu V, McKague M, Walker G. An Experimental Field Comparison of Wi-Fi HaLow and LoRa for the Smart Grid. Sensors (Basel) 2023; 23:7409. [PMID: 37687866 PMCID: PMC10490590 DOI: 10.3390/s23177409] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/26/2023] [Revised: 08/17/2023] [Accepted: 08/22/2023] [Indexed: 09/10/2023]
Abstract
IEEE 802.11ah, or Wi-Fi HaLow, is a long-range Internet of Things (IoT) communication technology with promising performance claims. Being IP-based makes it an attractive prospect when interfacing with existing IP networks. Through real-world performance experiments, this study evaluates the network performance of Wi-Fi HaLow in terms of throughput, latency, and reliability against IEEE 802.11n (Wi-Fi n) and a competing IoT technology LoRa. These experiments are enabled through three proposed network evaluation architectures that facilitate remote control of the devices in a secure manner. The performance of Wi-Fi HaLow is then assessed against the network requirements of various smart grid applications. Wi-Fi HaLow offers promising performance when compared to rival technology LoRa. This study is the first to evaluate Wi-Fi HaLow in an authentic experimental way, providing performance data and insights that are not possible through simulation and modelling alone. This work provides the basis for further evaluation and implementation of this emerging technology.
Collapse
Affiliation(s)
- Luke Kane
- Faculty of Science, Queensland University of Technology, Brisbane, QLD 4000, Australia; (V.L.); (M.M.)
- Cyber Security Cooperative Research Centre, Brisbane, QLD 4000, Australia
| | - Vicky Liu
- Faculty of Science, Queensland University of Technology, Brisbane, QLD 4000, Australia; (V.L.); (M.M.)
| | - Matthew McKague
- Faculty of Science, Queensland University of Technology, Brisbane, QLD 4000, Australia; (V.L.); (M.M.)
| | - Geoffrey Walker
- Faculty of Engineering, Queensland University of Technology, Brisbane, QLD 4000, Australia;
| |
Collapse
|
2
|
Garcia-Villegas E, Lopez-Garcia A, Lopez-Aguilera E. Genetic Algorithm-Based Grouping Strategy for IEEE 802.11ah Networks. Sensors (Basel) 2023; 23:862. [PMID: 36679662 PMCID: PMC9862971 DOI: 10.3390/s23020862] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/10/2022] [Revised: 12/23/2022] [Accepted: 01/09/2023] [Indexed: 06/17/2023]
Abstract
The IEEE 802.11ah standard is intended to adapt the specifications of IEEE 802.11 to the Internet of Things (IoT) scenario. One of the main features of IEEE 802.11ah consists of the Restricted Access Window (RAW) mechanism, designed for scheduling transmissions of groups of stations within certain periods of time or windows. With an appropriate configuration, the RAW feature reduces contention and improves energy efficiency. However, the standard specification does not provide mechanisms for the optimal setting of RAW parameters. In this way, this paper presents a grouping strategy based on a genetic algorithm (GA) for IEEE 802.11ah networks operating under the RAW mechanism and considering heterogeneous stations, that is, stations using different modulation and coding schemes (MCS). We define a fitness function from the combination of the predicted system throughput and fairness, and provide the tuning of the GA parameters to obtain the best result in a short time. The paper also includes a comparison of different alternatives with regard to the stages of the GA, i.e., parent selection, crossover, and mutation methods. As a proof of concept, the proposed GA-based RAW grouping is tested on a more constrained device, a Raspberry Pi 3B+, where the grouping method converges in around 5 s. The evaluation concludes with a comparison of the GA-based grouping strategy with other grouping approaches, thus showing that the proposed mechanism provides a good trade-off between throughput and fairness performance.
Collapse
Affiliation(s)
- Eduard Garcia-Villegas
- Department of Network Engineering, Universitat Politècnica de Catalunya, 08034 Barcelona, Spain
| | | | - Elena Lopez-Aguilera
- Department of Network Engineering, Universitat Politècnica de Catalunya, 08034 Barcelona, Spain
| |
Collapse
|
3
|
Farhad A, Pyun JY. Resource Management for Massive Internet of Things in IEEE 802.11ah WLAN: Potentials, Current Solutions, and Open Challenges. Sensors (Basel) 2022; 22:s22239509. [PMID: 36502211 PMCID: PMC9738663 DOI: 10.3390/s22239509] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/31/2022] [Revised: 12/01/2022] [Accepted: 12/02/2022] [Indexed: 06/12/2023]
Abstract
IEEE 802.11ah, known as Wi-Fi HaLow, is envisioned for long-range and low-power communication. It is sub-1 GHz technology designed for massive Internet of Things (IoT) and machine-to-machine devices. It aims to overcome the IoT challenges, such as providing connectivity to massive power-constrained devices distributed over a large geographical area. To accomplish this objective, IEEE 802.11ah introduces several unique physical and medium access control layer (MAC) features. In recent years, the MAC features of IEEE 802.11ah, including restricted access window, authentication (e.g., centralized and distributed) and association, relay and sectorization, target wake-up time, and traffic indication map, have been intensively investigated from various aspects to improve resource allocation and enhance the network performance in terms of device association time, throughput, delay, and energy consumption. This survey paper presents an in-depth assessment and analysis of these MAC features along with current solutions, their potentials, and key challenges, exposing how to use these novel features to meet the rigorous IoT standards.
Collapse
|
4
|
Soares SM, Carvalho MM. An Analytical Model for the Aggregate Throughput of IEEE 802.11ah Networks under the Restricted Access Window Mechanism. Sensors (Basel) 2022; 22:5561. [PMID: 35898065 PMCID: PMC9331850 DOI: 10.3390/s22155561] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/10/2022] [Revised: 06/10/2022] [Accepted: 06/13/2022] [Indexed: 06/15/2023]
Abstract
The IEEE 802.11ah is an amendment to the IEEE 802.11 standard to support the growth of the Internet of Things (IoT). One of its main novelties is the restricted access window (RAW), which is a channel access feature designed to reduce channel contention by dividing stations into RAW groups. Each RAW group is further divided into RAW slots, and stations only attempt channel access during the RAW slot they were assigned to. In this paper, we propose a discrete-time Markov chain model to evaluate the average aggregate throughput of IEEE 802.11ah networks using the RAW mechanism under saturated traffic and ideal channel conditions. The proposed analytical model describes the behavior of an active station within its assigned RAW slot. A key aspect of the model is the consideration of the event of RAW slot time completion during a station's backoff operation. We study the average aggregate network throughput for various numbers of RAW slots and stations in the network. The numerical results derived from our analytical model are compared to computer simulations based on an IEEE 802.11ah model developed for the ns-3 simulator by other researchers, and its performance is also compared to two other analytical models proposed in the literature. The presented results indicate that the proposed analytical model reaches the closest agreement with independently-derived computer simulations.
Collapse
|
5
|
Georgiev Y, Verhoeven R, Meratnia N. Selfish Behavior in IEEE 802.11ah Networks: A Detection Algorithm and Mitigation Strategies. Sensors (Basel) 2022; 22:4472. [PMID: 35746257 DOI: 10.3390/s22124472] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/24/2022] [Revised: 06/05/2022] [Accepted: 06/09/2022] [Indexed: 11/17/2022]
Abstract
One of the latest protocols developed for the Internet of Things networks is IEEE 802.11ah, proposed by the WiFi Alliance. The new channel access mechanism in IEEE 802.11ah, which is called Restricted Access Window, aims at reducing the contention between the stations by allowing only selected stations to transmit data at certain time slots. Stations may exhibit selfish behavior to maximize their own throughput. This will come at the cost of the overall network quality of service. In this paper, we first analyze the default behavior of the IEEE 802.11ah protocol in terms of fairness. We then introduce various percentages of selfish stations and observe how the network's quality of service in terms of fairness, throughput and packet-loss are affected. After establishing the inherent fairness of IEEE 802.11ah, we analyze applicability of two existing selfish behavior detection algorithms designed for IEEE 802.11 to the IEEE 802.11ah protocol. Due to their poor performance, we propose a new definition of 'selfish behavior' specifically for IEEE 802.11ah, based on which we present a new algorithm for detecting selfish behavior. To combat selfish behavior and to create a better fairness, throughput and lower packet loss, we consequently present a novel mitigation algorithm called Selfish Stations Quarantine Punishment Algorithm (SSQPA). The proposed algorithm takes advantage of the RAW grouping to isolate selfish stations from the honest stations, thus mitigating the effect of the selfish behavior. SSQPA comes in two variants: honest stations-centric and network-centric. Our experimental results show that both variants can successfully mitigate selfish behavior effects in IEEE 802.11ah networks and either one can be used depending on the goal of the network.
Collapse
|
6
|
Bankov D, Khorov E, Lyakhov A, Famaey J. Resource Allocation for Machine-Type Communication of Energy-Harvesting Devices in Wi-Fi HaLow Networks. Sensors (Basel) 2020; 20:E2449. [PMID: 32344902 DOI: 10.3390/s20092449] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/24/2020] [Revised: 04/21/2020] [Accepted: 04/22/2020] [Indexed: 11/21/2022]
Abstract
The recent Wi-Fi HaLow technology focuses on adopting Wi-Fi for the needs of the Internet of Things. A key feature of Wi-Fi HaLow is the Restricted Access Window (RAW) mechanism that allows an access point to divide the sensors into groups and to assign each group to an exclusively reserved time interval where only the stations of a particular group can transmit. In this work, we study how to optimally configure RAW in a scenario with a high number of energy harvesting sensor devices. For such a scenario, we consider a problem of device grouping and develop a model of data transmission, which takes into account the peculiarities of channel access and the fact that the devices can run out of energy within the allocated intervals. We show how to use the developed model in order to determine the optimal duration of RAW intervals and the optimal number of groups that provide the required probability of data delivery and minimize the amount of consumed channel resources. The numerical results show that the optimal RAW configuration can reduce the amount of consumed channel resources by almost 50%.
Collapse
|
7
|
Seferagić A, Famaey J, De Poorter E, Hoebeke J. Survey on Wireless Technology Trade-Offs for the Industrial Internet of Things. Sensors (Basel) 2020; 20:E488. [PMID: 31952214 DOI: 10.3390/s20020488] [Citation(s) in RCA: 22] [Impact Index Per Article: 5.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/07/2019] [Revised: 01/10/2020] [Accepted: 01/13/2020] [Indexed: 11/17/2022]
Abstract
Aside from vast deployment cost reduction, Industrial Wireless Sensor and Actuator Networks (IWSAN) introduce a new level of industrial connectivity. Wireless connection of sensors and actuators in industrial environments not only enables wireless monitoring and actuation, it also enables coordination of production stages, connecting mobile robots and autonomous transport vehicles, as well as localization and tracking of assets. All these opportunities already inspired the development of many wireless technologies in an effort to fully enable Industry 4.0. However, different technologies significantly differ in performance and capabilities, none being capable of supporting all industrial use cases. When designing a network solution, one must be aware of the capabilities and the trade-offs that prospective technologies have. This paper evaluates the technologies potentially suitable for IWSAN solutions covering an entire industrial site with limited infrastructure cost and discusses their trade-offs in an effort to provide information for choosing the most suitable technology for the use case of interest. The comparative discussion presented in this paper aims to enable engineers to choose the most suitable wireless technology for their specific IWSAN deployment.
Collapse
|
8
|
Cheng Y, Zhou H, Yang D. CA-CWA: Channel-Aware Contention Window Adaption in IEEE 802.11ah for Soft Real-Time Industrial Applications. Sensors (Basel) 2019; 19:s19133002. [PMID: 31288387 PMCID: PMC6651277 DOI: 10.3390/s19133002] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/12/2019] [Revised: 06/29/2019] [Accepted: 07/05/2019] [Indexed: 11/16/2022]
Abstract
In 2016, the IEEE task group ah (TGah) released a new standard called IEEE 802.11ah, and industrial Internet of Things (IoT) is one of its typical use cases. The restricted access window (RAW) is one of the core MAC mechanisms of IEEE 802.11ah, which aims to address the collision problem in the dense wireless networks. However, in each RAW period, stations still need to contend for the channel by Distributed Coordination Function and Enhanced Distributed Channel Access (DCF/EDCA), which cannot meet the real-time requirements of most industrial applications. In this paper, we propose a channel-aware contention window adaption (CA-CWA) algorithm. The algorithm dynamically adapts the contention window based on the channel status with an external interference discrimination ability, and improves the real-time performance of the IEEE 802.11ah. To validate the real-time performance of CA-CWA, we compared CA-CWA with two other backoff algorithms with an NS-3 simulator. The results illustrate that CA-CWA has better performance than the other two algorithms in terms of packet loss rate and average delay. Compared with the other two algorithms, CA-CWA is able to support industrial applications with higher deadline constraints under the same channel conditions in IEEE 802.11ah.
Collapse
Affiliation(s)
- Yujun Cheng
- School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
| | - Huachun Zhou
- School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China.
| | - Dong Yang
- School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
| |
Collapse
|
9
|
Santi S, Tian L, Khorov E, Famaey J. Accurate Energy Modeling and Characterization of IEEE 802.11ah RAW and TWT. Sensors (Basel) 2019; 19:E2614. [PMID: 31181808 DOI: 10.3390/s19112614] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/12/2019] [Revised: 05/27/2019] [Accepted: 06/06/2019] [Indexed: 11/24/2022]
Abstract
Minimizing the energy consumption is one of the main challenges in internet of things (IoT) networks. Recently, the IEEE 802.11ah standard has been released as a new low-power Wi-Fi solution. It has several features, such as restricted access window (RAW) and target wake time (TWT), that promise to improve energy consumption. Specifically, in this article we study how to reduce the energy consumption thanks to RAW and TWT. In order to do this, we first present an analytical model that calculates the average energy consumption during a RAW slot. We compare these results to the IEEE 802.11ah simulator that we have extended for this scope with an energy life-cycle model for RAW and TWT. Then we study the energy consumption under different conditions using RAW. Finally, we evaluate the energy consumption using TWT. In the results, we show that the presented model has a maximum deviation from the simulations of 10% in case of capture effect (CE) and 7% without it. RAW always performs better than carrier-sense multiple access with collision avoidance (CSMA/CA) when the traffic is higher and the usage of more slots has showed to have better energy efficiency, of up to the 76%, although also significantly increasing the latency. We will show how TWT outperforms pure RAW, by over 100%, when the transmission time is over 5 min.
Collapse
|
10
|
Bankov D, Khorov E, Lyakhov A, Stepanova E, Tian L, Famaey J. What Is the Fastest Way to Connect Stations to a Wi-Fi HaLow Network? Sensors (Basel) 2018; 18:E2744. [PMID: 30134534 DOI: 10.3390/s18092744] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/21/2018] [Revised: 08/07/2018] [Accepted: 08/18/2018] [Indexed: 11/23/2022]
Abstract
Wi-Fi HaLow is an adaptation of the widespread Wi-Fi technology for the Internet of Things scenarios. Such scenarios often involve numerous wireless stations connected to a shared channel, and contention for the channel significantly affects the performance in such networks. Wi-Fi HaLow contains numerous solutions aimed at handling the contention between stations, two of which, namely, the Centralized Authentication Control (CAC) and the Distributed Authentication Control (DAC), address the contention reduction during the link set-up process. The link set-up process is special because the access point knows nothing of the connecting stations and its means of control of these stations are very limited. While DAC is self-adaptive, CAC does require an algorithm to dynamically control its parameters. Being just a framework, the Wi-Fi HaLow standard neither specifies such an algorithm nor recommends which protocol, CAC or DAC, is more suitable in a given situation. In this paper, we solve both issues by developing a novel robust close-to-optimal algorithm for CAC and compare CAC and DAC in a vast set of experiments.
Collapse
|
11
|
Tuta J, Juric MB. MFAM: Multiple Frequency Adaptive Model-Based Indoor Localization Method. Sensors (Basel) 2018; 18:s18040963. [PMID: 29587352 PMCID: PMC5948609 DOI: 10.3390/s18040963] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/20/2018] [Revised: 03/20/2018] [Accepted: 03/21/2018] [Indexed: 11/22/2022]
Abstract
This paper presents MFAM (Multiple Frequency Adaptive Model-based localization method), a novel model-based indoor localization method that is capable of using multiple wireless signal frequencies simultaneously. It utilizes indoor architectural model and physical properties of wireless signal propagation through objects and space. The motivation for developing multiple frequency localization method lies in the future Wi-Fi standards (e.g., 802.11ah) and the growing number of various wireless signals present in the buildings (e.g., Wi-Fi, Bluetooth, ZigBee, etc.). Current indoor localization methods mostly rely on a single wireless signal type and often require many devices to achieve the necessary accuracy. MFAM utilizes multiple wireless signal types and improves the localization accuracy over the usage of a single frequency. It continuously monitors signal propagation through space and adapts the model according to the changes indoors. Using multiple signal sources lowers the required number of access points for a specific signal type while utilizing signals, already present in the indoors. Due to the unavailability of the 802.11ah hardware, we have evaluated proposed method with similar signals; we have used 2.4 GHz Wi-Fi and 868 MHz HomeMatic home automation signals. We have performed the evaluation in a modern two-bedroom apartment and measured mean localization error 2.0 to 2.3 m and median error of 2.0 to 2.2 m. Based on our evaluation results, using two different signals improves the localization accuracy by 18% in comparison to 2.4 GHz Wi-Fi-only approach. Additional signals would improve the accuracy even further. We have shown that MFAM provides better accuracy than competing methods, while having several advantages for real-world usage.
Collapse
Affiliation(s)
- Jure Tuta
- Faculty of Computer and Information Science, University of Ljubljana, Vecna pot 113, SI-1000 Ljubljana, Slovenia.
| | - Matjaz B Juric
- Faculty of Computer and Information Science, University of Ljubljana, Vecna pot 113, SI-1000 Ljubljana, Slovenia.
| |
Collapse
|
12
|
Šljivo A, Kerkhove D, Tian L, Famaey J, Munteanu A, Moerman I, Hoebeke J, De Poorter E. Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic. Sensors (Basel) 2018; 18:E325. [PMID: 29360798 DOI: 10.3390/s18020325] [Citation(s) in RCA: 39] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/03/2018] [Revised: 01/18/2018] [Accepted: 01/19/2018] [Indexed: 11/20/2022]
Abstract
So far, existing sub-GHz wireless communication technologies focused on low-bandwidth, long-range communication with large numbers of constrained devices. Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. This has changed with the advent of the new IEEE 802.11ah Wi-Fi standard, which is much more suitable for reliable bidirectional communication and high-throughput applications over a wide area (up to 1 km). The standard offers great possibilities for network performance optimization through a number of physical- and link-layer configurable features. However, given that the optimal configuration parameters depend on traffic patterns, the standard does not dictate how to determine them. Such a large number of configuration options can lead to sub-optimal or even incorrect configurations. Therefore, we investigated how two key mechanisms, Restricted Access Window (RAW) grouping and Traffic Indication Map (TIM) segmentation, influence scalability, throughput, latency and energy efficiency in the presence of bidirectional TCP/IP traffic. We considered both high-throughput video streaming traffic and large-scale reliable sensing traffic and investigated TCP behavior in both scenarios when the link layer introduces long delays. This article presents the relations between attainable throughput per station and attainable number of stations, as well as the influence of RAW, TIM and TCP parameters on both. We found that up to 20 continuously streaming IP-cameras can be reliably connected via IEEE 802.11ah with a maximum average data rate of 160 kbps, whereas 10 IP-cameras can achieve average data rates of up to 255 kbps over 200 m. Up to 6960 stations transmitting every 60 s can be connected over 1 km with no lost packets. The presented results enable the fine tuning of RAW and TIM parameters for throughput-demanding reliable applications (i.e., video streaming, firmware updates) on one hand, and very dense low-throughput reliable networks with bidirectional traffic on the other hand.
Collapse
|
13
|
Kim KW, Han YH, Min SG. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks. Sensors (Basel) 2017; 17:s17102170. [PMID: 28934152 PMCID: PMC5676616 DOI: 10.3390/s17102170] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/10/2017] [Revised: 09/18/2017] [Accepted: 09/20/2017] [Indexed: 11/16/2022]
Abstract
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.
Collapse
Affiliation(s)
- Ki-Wook Kim
- Department of Computer and Radio Communication Engineering, Korea University, Seoul 136-713, Korea.
| | - Youn-Hee Han
- School of Computer Science and Engineering, Korea University of Technology and Education, CheonAn 330-708, Korea.
| | - Sung-Gi Min
- Department of Computer Science and Engineering, Korea University, Seoul 136-713, Korea.
| |
Collapse
|
14
|
Tian L, Khorov E, Latré S, Famaey J. Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah. Sensors (Basel) 2017; 17:E1559. [PMID: 28677617 DOI: 10.3390/s17071559] [Citation(s) in RCA: 37] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/12/2017] [Revised: 06/22/2017] [Accepted: 06/29/2017] [Indexed: 11/22/2022]
Abstract
IEEE 802.11ah, marketed as Wi-Fi HaLow, extends Wi-Fi to the sub-1 GHz spectrum. Through a number of physical layer (PHY) and media access control (MAC) optimizations, it aims to bring greatly increased range, energy-efficiency, and scalability. This makes 802.11ah the perfect candidate for providing connectivity to Internet of Things (IoT) devices. One of these new features, referred to as the Restricted Access Window (RAW), focuses on improving scalability in highly dense deployments. RAW divides stations into groups and reduces contention and collisions by only allowing channel access to one group at a time. However, the standard does not dictate how to determine the optimal RAW grouping parameters. The optimal parameters depend on the current network conditions, and it has been shown that incorrect configuration severely impacts throughput, latency and energy efficiency. In this paper, we propose a traffic-adaptive RAW optimization algorithm (TAROA) to adapt the RAW parameters in real time based on the current traffic conditions, optimized for sensor networks in which each sensor transmits packets with a certain (predictable) frequency and may change the transmission frequency over time. The TAROA algorithm is executed at each target beacon transmission time (TBTT), and it first estimates the packet transmission interval of each station only based on packet transmission information obtained by access point (AP) during the last beacon interval. Then, TAROA determines the RAW parameters and assigns stations to RAW slots based on this estimated transmission frequency. The simulation results show that, compared to enhanced distributed channel access/distributed coordination function (EDCA/DCF), the TAROA algorithm can highly improve the performance of IEEE 802.11ah dense networks in terms of throughput, especially when hidden nodes exist, although it does not always achieve better latency performance. This paper contributes with a practical approach to optimizing RAW grouping under dynamic traffic in real time, which is a major leap towards applying RAW mechanism in real-life IoT networks.
Collapse
|
15
|
Gharavi H, Hu B. Synchrophasor Sensor Networks for Grid Communication and Protection. Proc IEEE Inst Electr Electron Eng 2017; 105:1408-1428. [PMID: 28890553 PMCID: PMC5590667 DOI: 10.1109/jproc.2017.2696881] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/07/2023]
Abstract
This paper focuses primarily on leveraging synchronized current/voltage amplitudes and phase angle measurements to foster new categories of applications, such as improving the effectiveness of grid protection and minimizing outage duration for distributed grid systems. The motivation for such an application arises from the fact that with the support of communication, synchronized measurements from multiple sites in a grid network can greatly enhance the accuracy and timeliness of identifying the source of instabilities. The paper first provides an overview of synchrophasor networks and then presents techniques for power quality assessment, including fault detection and protection. To achieve this we present a new synchrophasor data partitioning scheme that is based on the formation of a joint space and time observation vector. Since communication is an integral part of synchrophasor networks, the newly adopted wireless standard for machine-to-machine (M2M) communication, known as IEEE 802.11ah, has been investigated. The paper also presents a novel implementation of a hardware in the loop testbed for real-time performance evaluation. The purpose is to illustrate the use of both hardware and software tools to verify the performance of synchrophasor networks under more realistic environments. The testbed is a combination of grid network modeling, and an Emulab-based communication network. The combined grid and communication network is then used to assess power quality for fault detection and location using the IEEE 39-bus and 390-bus systems.
Collapse
Affiliation(s)
- Hamid Gharavi
- Advanced Network Technologies Division, National Institute of Standards and Technology, Gaithersburg, USA
| | - Bin Hu
- Advanced Network Technologies Division, National Institute of Standards and Technology, Gaithersburg, USA
| |
Collapse
|