LUCID: Receiver-aware Model-based Data Communication for Low-power Wireless Networks

In the last decade, the advancement of the Internet of Things (IoT) has caused unlicensed radio spectrum, especially the 2.4 GHz ISM band, to be immensely crowded with smart wireless devices that are used in a wide range of application domains. Due to their diversity in radio resource use and channel access techniques, when collocated, these wireless devices create interference with each other, known as CrossTechnology Interference (CTI), which can lead to increased packet losses and energy consumption. CTI is a significant problem for low-power wireless networks, such as IEEE 802.15.4, as it decreases the overall dependability of the wireless network. To improve the performance of low-power wireless networks under CTI conditions, we propose a datadriven proactive receiver-aware MAC protocol, LUCID, based on interference estimation and white space prediction. We leverage statistical analysis of real-world traces from two indoor environments characterised by varying channel conditions to develop CTI prediction methods. The CTI models that generate accurate predictions of interference behaviour are an intrinsic part of our solution. LUCID is thoroughly evaluated in realistic simulations and we show that depending on the application data rate and the network size, our solution achieves higher dependability, 1.2% increase in packet delivery ratio and 0.02% decrease in dutycycle under bursty indoor interference than state of the art alternative methods. INDEX TERMS Cross technology interference, low-power wireless communication, wireless sensor networks, interference modelling, white space, predictive models, receiver-aware communication, crosslayer MAC protocol

[1]  Matthias Hollick,et al.  Competition: Sparkle: Energy Efficient, Reliable, Ultra-low Latency Communication in Wireless Control Networks , 2016, EWSN.

[2]  Feng Li,et al.  ART: Adaptive fRequency-Temporal Co-Existing of ZigBee and WiFi , 2017, IEEE Transactions on Mobile Computing.

[3]  Mehul Motani,et al.  MAC Protocol Design and Performance Analysis for Random Access Cognitive Radio Networks , 2013, IEEE Journal on Selected Areas in Communications.

[4]  Marco Zuniga,et al.  JamLab: Augmenting sensornet testbeds with realistic and controlled interference generation , 2011, Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks.

[5]  Andreas Terzis,et al.  Minimising the effect of WiFi interference in 802.15.4 wireless sensor networks , 2007, Int. J. Sens. Networks.

[6]  Jens Zander,et al.  Energy-efficient detection of intermittent interference in wireless sensor networks , 2010, Int. J. Sens. Networks.

[7]  Ian F. Akyildiz,et al.  CRAHNs: Cognitive radio ad hoc networks , 2009, Ad Hoc Networks.

[8]  Brian Randell,et al.  Dependability and its threats - A taxonomy , 2004, IFIP Congress Topical Sessions.

[9]  Prathima Agrawal,et al.  Synchronized MAC Protocol For Multi-Hop Cognitive Radio Networks , 2008, 2008 IEEE International Conference on Communications.

[10]  Hang Su,et al.  Opportunistic MAC Protocols for Cognitive Radio Based Wireless Networks , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[11]  Mário Alves,et al.  Quantifying the channel quality for interference-aware wireless sensor networks , 2011, SIGBED.

[12]  Andreas Terzis,et al.  Koala: Ultra-Low Power Data Retrieval in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[13]  Roger Wattenhofer,et al.  Dozer: Ultra-Low Power Data Gathering in Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[14]  Philip Levis,et al.  Collection tree protocol , 2009, SenSys '09.

[15]  Amy L. Murphy,et al.  Interference-Resilient Ultra-Low Power Aperiodic Data Collection , 2018, 2018 17th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[16]  Amy L. Murphy,et al.  Competition: CRYSTAL Clear: Making Interference Transparent , 2018, EWSN.

[17]  C.-C. Jay Kuo,et al.  A Cognitive MAC Protocol Using Statistical Channel Allocation for Wireless Ad-Hoc Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[18]  R. Wattenhofer,et al.  Dozer: Ultra-Low Power Data Gathering in Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[19]  Douglas A. Reynolds,et al.  Gaussian Mixture Models , 2018, Encyclopedia of Biometrics.

[20]  Fernando Moreno-Cruz,et al.  Competition: BigBangBus , 2018, EWSN.

[21]  Aamir Mahmood,et al.  Real-Time Interference Identification via Supervised Learning: Embedding Coexistence Awareness in IoT Devices , 2018, IEEE Access.

[22]  Amy L. Murphy,et al.  Data Prediction + Synchronous Transmissions = Ultra-low Power Wireless Sensor Networks , 2016, SenSys.

[23]  Alex Bateman,et al.  An introduction to hidden Markov models. , 2007, Current protocols in bioinformatics.

[24]  Dirk Pesch,et al.  White Space Prediction for Low-Power Wireless Networks: A Data-Driven Approach , 2018, 2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS).

[25]  Ossama Younis,et al.  MAC Protocol for Opportunistic Cognitive Radio Networks with Soft Guarantees , 2009, IEEE Transactions on Mobile Computing.

[26]  Brian M. Sadler,et al.  Cognitive Medium Access: Constraining Interference Based on Experimental Models , 2008, IEEE Journal on Selected Areas in Communications.

[27]  Marco Zuniga,et al.  JAG: Reliable and Predictable Wireless Agreement under External Radio Interference , 2012, 2012 IEEE 33rd Real-Time Systems Symposium.

[28]  Guoliang Xing,et al.  Beyond co-existence: Exploiting WiFi white space for Zigbee performance assurance , 2010, The 18th IEEE International Conference on Network Protocols.

[29]  Daniel Minoli,et al.  Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .

[30]  Adam Dunkels,et al.  Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[31]  Chiara Petrioli,et al.  Modeling and estimation of partially observed WLAN activity for cognitive WSNs , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[32]  Nurul I. Sarkar,et al.  A distributed multichannel MAC protocol for rendezvous establishment in cognitive radio ad hoc networks , 2018, Ad Hoc Networks.

[33]  Michael J. McGrath,et al.  Sensor Network Topologies and Design Considerations , 2013 .

[34]  Dominique Fohr,et al.  Speaker diarization using normalized cross likelihood ratio , 2007, INTERSPEECH.

[35]  Amy L. Murphy,et al.  TRIDENT: In-field Connectivity Assessment for Wireless Sensor Networks , 2014 .

[36]  Jirka Klaue,et al.  Competition: RedFixHop with Channel Hopping , 2017, EWSN.

[37]  Lothar Thiele,et al.  Efficient network flooding and time synchronization with Glossy , 2011, Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks.

[38]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[39]  Thiemo Voigt,et al.  Detecting and Avoiding Multiple Sources of Interference in the 2.4 GHz Spectrum , 2015, EWSN.

[40]  Simon Duquennoy,et al.  Understanding the impact of cross technology interference on IEEE 802.15.4 , 2014, WiNTECH '14.

[41]  Fernando Moreno-Cruz,et al.  Competition: RedNodeBus, Stretching out the Preamble , 2019, EWSN.

[42]  James Gross,et al.  CrossZig: Combating Cross-Technology Interference in Low-Power Wireless Networks , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[43]  Thiemo Voigt,et al.  SoNIC: Classifying interference in 802.15.4 sensor networks , 2013, 2013 ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[44]  C. Cordeiro,et al.  C-MAC: A Cognitive MAC Protocol for Multi-Channel Wireless Networks , 2007, 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[45]  Dirk Pesch,et al.  Modeling WiFi Traffic for White Space Prediction in Wireless Sensor Networks , 2017, 2017 IEEE 42nd Conference on Local Computer Networks (LCN).

[46]  Marco Zuniga,et al.  Making Sensornet MAC Protocols Robust against Interference , 2010, EWSN.

[47]  Adam Dunkels,et al.  The ContikiMAC Radio Duty Cycling Protocol , 2011 .

[48]  Andreas Terzis,et al.  Surviving wi-fi interference in low power ZigBee networks , 2010, SenSys '10.

[49]  AvizienisAlgirdas,et al.  Basic Concepts and Taxonomy of Dependable and Secure Computing , 2004 .

[50]  Simon Duquennoy,et al.  TIIM: technology-independent interference mitigation for low-power wireless networks , 2015, IPSN.