scholarly journals Implementation of envelope detection based Wake-Up Receiver for IEEE 802.15.4 WPAN from off-the-shelf components

2017 ◽  
Vol 15 ◽  
pp. 107-113 ◽  
Author(s):  
Josua Arndt ◽  
Lukas Krystofiak ◽  
Vahid Bonehi ◽  
Ralf Wunderlich ◽  
Stefan Heinen

Abstract. Power consumption in wireless networks is crucial. In most scenarios the transmission time is short compared to the idle listening time for data transmission, the most power is consumed by the receiver. In low latency systems there is a need for low power wake-up receivers (WuRx) that reduce the power consumption when the node is idle, but keep it responsive. This work presents a WuRx designed out of commercial components to investigate the needs of a WuRx when it is embedded in a Wireless Personal Area Network (WPAN) system in a real environment setup including WLAN and LTE communication and considering interferer rejection. The calculation necessary for the attenuation of those interferers is explained in detail. Furthermore, a system design is presented that fulfills the requirements for this environment and is build from off-the-shelf components.

2013 ◽  
Vol 2013 ◽  
pp. 1-9 ◽  
Author(s):  
Tsung-Han Lee ◽  
Hung-Chi Chu ◽  
Lin-Huang Chang ◽  
Hung-Shiou Chiang ◽  
Yen-Wen Lin

6LoWPAN technology has attracted extensive attention recently. It is because 6LoWPAN is one of Internet of Things standard and it adapts to IPv6 protocol stack over low-rate wireless personal area network, such as IEEE 802.15.4. One view is that IP architecture is not suitable for low-rate wireless personal area network. It is a challenge to implement the IPv6 protocol stack into IEEE 802.15.4 devices due to that the size of IPv6 packet is much larger than the maximum packet size of IEEE 802.15.4 in data link layer. In order to solve this problem, 6LoWPAN provides header compression to reduce the transmission overhead for IP packets. In addition, two selected routing schemes, mesh-under and route-over routing schemes, are also proposed in 6LoWPAN to forward IP fragmentations under IEEE 802.15.4 radio link. The distinction is based on which layer of the 6LoWPAN protocol stack is in charge of routing decisions. In route-over routing scheme, the routing distinction is taken at the network layer and, in mesh-under, is taken by the adaptation layer. Thus, the goal of this research is to understand the performance of two routing schemes in 6LoWPAN under error-prone channel condition.


2020 ◽  
Vol 3 (4) ◽  
pp. 259-270
Author(s):  
Nhan Chi Nguyen ◽  
Hoang Huy Nguyen ◽  
Tuan Ngoc Pham

This paper presents the design of wireless sensor network (WSN) based on low-power wide area network technology for high-tech agriculture. This WSN allows the farmer to collect data such as air temperature, air humidity, soil moisture. The WSN system consists of components: 02 wireless sensor nodes, 01 gateway, 01 cloud server and smartphone app. This WSN tested for data transmission in two zones: zone 1 (dense urban environments) at a distance of 500m and zone 2 (urban environments - less obstacles) at a distance of 1,500m and 1,700m. The data collected at different times of the day and updated every 15 minutes. The results show that the wireless sensor network system operates stably, data constantly updated to LoRa Server and there was not data packet loss. The power consumption of sensor node and gateway determined in three operating modes: transmitting, receiving, turn-off. This shows the advantages of LoRa technology in the development of wireless sensor network which is the distance of data transmission distance and low power consumption. Besides this WSN also tested in the net house of aquaponics of the Research Center for High-tech Application in Agriculture (RCHAA), University of Science, Vietnam National University-HCM. The results show that the WSN system is working reliably and promising which brings significantly benefits to smart agriculture as aquaponics, clean vegetable farms, aquaculture farms…


Author(s):  
Md. Mohibur Rahaman ◽  
Mohammad Khairul Islam ◽  
Kazi Ashrafuzzaman ◽  
Mohammad Sanaullah Chowdhury

<p>The IEEE 802.15.4 is the standard for Low Rate Wireless Personal Area network (LR-WPAN). It is widely used in many application areas. The standard uses Slotted CSMA/CA mechanism in its contention access period (CAP) for the beacon enabled mode. The protocol has two modes - single sensing (SS) and double sensing (DS). The protocol also adopts a binary exponential backoff (BEB) algorithm. In this paper, we explore the saturation throughput, delay and energy consumption of this standard with double sensing (DS) using the existing BEB algorithm. We also investigate three other backoff schemes - exponential increase exponential decrease (EIED), exponential increase linear decrease (EILD) and exponential increase multiplicative decrease (EIMD). From simulation results, it is found that the EIED, EILD, EIMD perform better than the BEB for higher loads. It shows that the EIED, EILD, EIMD have better throughput and lower delay than the BEB. The EIED outperforms the other schemes in terms of throughput, delay and energy for the higher loads.</p>


2017 ◽  
Vol 13 (01) ◽  
pp. 14 ◽  
Author(s):  
Shantanu K. Nath ◽  
Sayera Aznabi ◽  
Nabila T. Islam ◽  
Annan Faridi ◽  
Wayesh Qarony

The manuscript represents wireless sensor networks using numerous topologies of ZigBee. Along with coordinator load, the uses of coordination with such networks were inspected. The investigation has been accomplished via the use of various plots in the OPNET Modeler simulator. The results of the simulation explore the use of coordination with mesh and tree routing to verify the suitability of the topology. It also demonstrates some of the implemented features of the ZigBee protocol and IEEE 802.15.4 MAC specification, using OPNET's ZigBee model suite, like: Mesh routing vs. tree routing, Roaming between Personal Area Network (PANs) &amp; Failure and Recovery procedures. The simulation has been carried out for 20 minutes to investigate the response of routing topologies on the delay, coordinator load and the MAC Load and the data have been collected. The results indicate that the End to End delay, number of hops and MAC load for mesh routing is lower than the tree routing. The results also show that in case of failure and recovery procedures, the simulated networks perform according to the ZigBee Standard.


Author(s):  
ABDULLAH ALABDULATIF

Many different networks that rely on short-distance wireless technology for their functions utilize the IEEE 802.15.4 Standard, especially in the case of systems that experience a low level of traffic. The networks using this standard are typically based on the Low-Rate Wireless Personal Area Network, herein called the LR-WPAN; this network is used for the provision of both the physical layer, herein referred to as the PHY, and the media access control, herein abbreviated as the MAC. There are four security features in the IEEE 802.15.4 Standard that are designed to ensure the safe and secure transmission of data through the network. Disconnection from the network is managed and controlled by the message authentication code, herein referred to as the MAC, while the coordinator personal area network, herein abbreviated as the PAN, is also able to trigger the disconnection. However, the process of disconnection from the network is one area of vulnerability to denial-of-service attacks, herein referred to as DoS; this highlights a major shortcoming of the IEEE 802.15.4 Standard’s security features. This paper is intended to contribute to the improvement of security for the IEEE network by conducting a specific and in-depth review of available literature as well as conducting an analysis of the disassociation process. In doing so, potential new threats will be highlighted, and this data can be used to improve the security of the IEEE 802.15.4 Standard. Overall, in this paper, the role of the Castalia tool in the OMNET++ environment is analysed and interpreted for these potential new threats. Also, this paper proposes a solution to such threats to improve the security IEEE 802.15.4 disassociation process. Keywords: Disassociation vulnerability of IEEE 802.15.4 Standard, DoS attack, IoT security.


Author(s):  
Manuel Mogollon

The nature of wireless is that of a physically open medium which makes authentication, access control, and confidentiality necessary in the implementation of a wireless LAN. There are three primary categories of networks: wireless local area network (WLAN), wireless metropolitan-area network (WMAN), and wireless personal area network (WPAN). The security for each of these types of wireless networks is discussed in this chapter.


Sign in / Sign up

Export Citation Format

Share Document