Search results for "LESS"
showing 10 items of 2452 documents
ErrorSense: Characterizing WiFi Error Patterns for Detecting ZigBee Interference
2014
Recent years have witnessed the increasing adoption of heterogeneous wireless networks working in unlicensed ISM bands, thus creating serious problems of spectrum overcrowding. Although ZigBee, Bluetooth and WiFi networks have been natively designed for working in presence of interference, it has been observed that several performance impairments may occur because of heterogeneous sensitivity to detect or react to the presence of other technologies. In this paper we focus on the WiFi capability to detect interfering ZigBee links. Despite of the narrowband transmissions performed by ZigBee, in emerging scenarios ZigBee interference can have a significant impact on WiFi performance. Therefore…
MAC Protocols for Wake-up Radio: Principles, Modeling and Performance Analysis
2018
[EN] In wake-up radio (WuR) enabled wireless sensor networks (WSNs), a node triggers a data communication at any time instant by sending a wake-up call (WuC) in an on-demand manner. Such wake-up operations eliminate idle listening and overhearing burden for energy consumption in duty-cycled WSNs. Although WuR exhibits its superiority for light traffic, it is inefficient to handle high traffic load in a network. This paper makes an effort towards improving the performance of WuR under diverse load conditions with a twofold contribution. We first propose three protocols that support variable traffic loads by enabling respectively clear channel assessment (CCA), backoff plus CCA, and adaptive …
PV-Alert: A fog-based architecture for safeguarding vulnerable road users
2017
International audience; High volumes of pedestrians, cyclists and other vulnerable road users (VRUs) have much higher casualty rates per mile; not surprising given their lack of protection from an accident. In order to alleviate the problem, sensing capabilities of smartphones can be used to detect, warn and safeguard these road users. In this research we propose an infrastructure-less fog-based architecture named PV-Alert (Pedestrian-Vehicle Alert) where fog nodes process delay sensitive data obtained from smartphones for alerting pedestrians and drivers before sending the data to the cloud for further analysis. Fog computing is considered in developing the architecture since it is an emer…
Wireless sensor network for Spectrum Cartography based on Kriging interpolation
2012
Dynamic spectrum access with Cognitive Radio (CR) network is a promising approach to increase the efficiency of spectrum usage. To allow the optimization of resource allocation and transmission adaptation techniques, each CR terminal needs to acquire awareness of the state of the time-frequency-location varying radio spectrum. In this paper we present a Spectrum Cartography (SC) approach where CR terminals are supported by a fixed wireless sensor network (WSN) to estimate and update the Power Spectral Density (PSD) over the area of interest. The wireless sensors collaborate to estimate the spatial distribution of the received power at a given frequency using either a centralized or a distri…
ACT-MAC: An asynchronous cooperative transmission MAC protocol for WSNs
2014
Duty cycling (DC) has been proven to be an efficient mechanism to reduce energy consumption in wireless sensor networks (WSNs). On the other hand, cooperative transmission (CT) enables longer range transmission to hop over an energy-hole node, resulting in more balanced energy consumption among nodes. In the literature, there exist few CT MAC protocols for DC operated WSNs and these protocols rely on fixed cycle length. In this paper, we propose a novel variable cycle length protocol, namely asynchronous cooperative transmission medium access control (ACT-MAC), which contains both features of reducing the unnecessary idle listening by DC and mitigating the energy-hole by making use of CT. T…
Resource sharing optimality in WiFi infrastructure networks
2009
In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios. Assuming that a contending node can dynamically change its strategy, by tuning its contention parameters to non-standard values on the basis of channel observations, we prove that, for infrastructure networks with bidirectional traffic and homogeneous application requirements, selfish access strategies are able to reach equilibrium condi…
Performance analysis of selfish access strategies on WiFi infrastructure networks
2009
In this paper we propose a game-theoretic approach for characterizing WiFi network performance in presence of intelligent nodes employing cognitive functionalities. We assume that a cognitive WiFi node is aware of its application requirements and is able to dynamically estimate the network status, in order to dynamically change its access strategy by tuning the contention window settings. We prove that, for infrastructure networks with bidirectional traffic and homogeneous application requirements, selfish access strategies are able to reach equilibrium conditions, which are also Pareto optimal. Indeed, we show that the station strategies converge toward values which maximize a per-node uti…
Smart Manufacturing Testbed for the Advancement of Wireless Adoption in the Factory
2020
Wireless communication is a key enabling technology central to the advancement of the goals of the Industry 4.0 smart manufacturing concept. Researchers at the National Institute of Standards and Technology are constructing a testbed to aid in the adoption of wireless technology within the factory workcell and other harsh industrial radio environments. In this paper the authors present a new industrial wireless testbed design that motivates academic research and is relevant to the needs of industry. The testbed is designed to serve as both a demonstration and research platform for the wireless workcell. The work leverages lessons learned from past testbed incarnations that included a dual r…
MSS: A Multi-Level Data Placement Scheme for Data Survival in Wireless Sensor Networks
2009
In recently popularized unattended wireless sensor networks, sensed data are stored locally or some designated nodes for a long term and retrieved sometime by collectors on demand. Such data may be delete or modified as sensor nodes are always exposed to risks such as random failure and mobile adversary. To maximize the data survival, we propose a secure and efficient scheme - MSS. MSS makes use of hopbounded computational secret sharing to achieve fault tolerance and compromise resilience, and takes advantages of multi-level secret sharing to mitigate communication overhead and improve overall security. MSS has the most advantages in terms of security and efficiency among presented schemes…
On the Impact of Wireless Communications on Controlling a Two-Dimensional Gantry System
2019
Abstract Industrial wireless is essential to achieve the vision of future manufacturing systems which are highly dynamic and reconfigurable, and communicate large amounts of data. Main challenges of wireless deployment include the stochastic nature of the wireless channels and the harsh industrial transmission environment. In this work, a typical two-dimensional gantry system is controlled by a local controller which receives G-code commands wirelessly over a Wi-Fi network. The industrial wireless channel is replicated using a radio frequency (RF) channel emulator where various scenarios are considered and various wireless channel parameters are studied. The movement of the gantry system to…