海报:推动WSN/IoT的互连网络架构

L. Feeney
{"title":"海报:推动WSN/IoT的互连网络架构","authors":"L. Feeney","doi":"10.1145/2594368.2601449","DOIUrl":null,"url":null,"abstract":"Growing commercial development of WSN/WBAN/IoT solutions will eventually lead to their ubiquitous deployment. Inevitably, there will be environments that contain many independent, co-located networks with overlapping areas of wireless coverage. Examples of high density scenarios include transit stations and urban housing. Because these various networks and applications will be owned by different people and because they mostly operate in ISM bands, there is no trusted authority that can coordinate their activity. Cross-technology interference has been widely studied, e.g. between IEEE 802.11 and IEEE 802.15.4, but very little work has addressed inter-network interference between co-located WSNs using the same communication technology. However, the potentially large number of co-located networks and fairly small number of channels suggests that this will not be an unusual situation. The risk of external frames being received and misinterpreted as local frames is studied in [2], which emphasized the need for authentication on all frames. Interference between co-located IEEE 802.15.4 PANs is demonstrated in [3]. This work reflects a similar interest in timing and interference interactions between networks that can receive and identify, but not decrypt, each other’s frames. The diversity of IEEE 802.15.4-based WSN protocols is the motivating use case. These protocols use the same PHY/ MAC in very different ways, from pure unslotted CSMA to the scheduled mesh in WirelessHART. Such significant differences in channel access mechanisms can lead to adverse interactions between independent networks, which will not be able to explicitly negotiate (or even infer) how to share the channel efficiently. Thus the long-term goal of this work-in-progress is to motivate the development of architecture and design principles that can mitigate problems of inter-network interference. As a specific example, consider two kinds of asynchronous MAC layers. Figure 1 shows interactions between networks using an X-MAC [1] type protocol (i.e. sender strobes, receivers periodically listen) and an RI-MAC [4] type protocol","PeriodicalId":131209,"journal":{"name":"Proceedings of the 12th annual international conference on Mobile systems, applications, and services","volume":"158 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Poster: Motivating an inter-networking architecture for WSN/IoT\",\"authors\":\"L. Feeney\",\"doi\":\"10.1145/2594368.2601449\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Growing commercial development of WSN/WBAN/IoT solutions will eventually lead to their ubiquitous deployment. Inevitably, there will be environments that contain many independent, co-located networks with overlapping areas of wireless coverage. Examples of high density scenarios include transit stations and urban housing. Because these various networks and applications will be owned by different people and because they mostly operate in ISM bands, there is no trusted authority that can coordinate their activity. Cross-technology interference has been widely studied, e.g. between IEEE 802.11 and IEEE 802.15.4, but very little work has addressed inter-network interference between co-located WSNs using the same communication technology. However, the potentially large number of co-located networks and fairly small number of channels suggests that this will not be an unusual situation. The risk of external frames being received and misinterpreted as local frames is studied in [2], which emphasized the need for authentication on all frames. Interference between co-located IEEE 802.15.4 PANs is demonstrated in [3]. This work reflects a similar interest in timing and interference interactions between networks that can receive and identify, but not decrypt, each other’s frames. The diversity of IEEE 802.15.4-based WSN protocols is the motivating use case. These protocols use the same PHY/ MAC in very different ways, from pure unslotted CSMA to the scheduled mesh in WirelessHART. Such significant differences in channel access mechanisms can lead to adverse interactions between independent networks, which will not be able to explicitly negotiate (or even infer) how to share the channel efficiently. Thus the long-term goal of this work-in-progress is to motivate the development of architecture and design principles that can mitigate problems of inter-network interference. As a specific example, consider two kinds of asynchronous MAC layers. Figure 1 shows interactions between networks using an X-MAC [1] type protocol (i.e. sender strobes, receivers periodically listen) and an RI-MAC [4] type protocol\",\"PeriodicalId\":131209,\"journal\":{\"name\":\"Proceedings of the 12th annual international conference on Mobile systems, applications, and services\",\"volume\":\"158 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-06-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 12th annual international conference on Mobile systems, applications, and services\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2594368.2601449\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 12th annual international conference on Mobile systems, applications, and services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2594368.2601449","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

WSN/WBAN/IoT解决方案日益增长的商业发展最终将导致其无处不在的部署。不可避免地,会有一些环境包含许多独立的、位于同一位置的、具有重叠无线覆盖区域的网络。高密度场景的例子包括中转站和城市住房。由于这些不同的网络和应用程序将由不同的人拥有,并且它们大多在ISM频带中运行,因此没有可信任的权威来协调它们的活动。跨技术干扰已被广泛研究,例如IEEE 802.11和IEEE 802.15.4之间的干扰,但很少有工作涉及使用相同通信技术的同址wsn之间的网络间干扰。然而,潜在的大量同址网络和相当少的频道表明,这将不是一个不寻常的情况。外部帧被接收并误读为本地帧的风险在[2]中进行了研究,强调需要对所有帧进行认证。共存的IEEE 802.15.4 pan之间的干扰在[3]中得到了证明。这项工作反映了对可以接收和识别但不能解密彼此帧的网络之间的定时和干扰相互作用的类似兴趣。基于IEEE 802.15.4的WSN协议的多样性是激励用例。这些协议以非常不同的方式使用相同的PHY/ MAC,从纯无槽CSMA到WirelessHART中的计划网格。通道访问机制的这种显著差异可能导致独立网络之间的不利交互,这些网络将无法明确协商(甚至推断)如何有效地共享通道。因此,这项正在进行的工作的长期目标是激励能够减轻网络间干扰问题的体系结构和设计原则的开发。作为一个具体的例子,考虑两种异步MAC层。图1显示了使用X-MAC[1]类型协议(即发送方频闪,接收方定期监听)和RI-MAC[4]类型协议的网络之间的交互
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Poster: Motivating an inter-networking architecture for WSN/IoT
Growing commercial development of WSN/WBAN/IoT solutions will eventually lead to their ubiquitous deployment. Inevitably, there will be environments that contain many independent, co-located networks with overlapping areas of wireless coverage. Examples of high density scenarios include transit stations and urban housing. Because these various networks and applications will be owned by different people and because they mostly operate in ISM bands, there is no trusted authority that can coordinate their activity. Cross-technology interference has been widely studied, e.g. between IEEE 802.11 and IEEE 802.15.4, but very little work has addressed inter-network interference between co-located WSNs using the same communication technology. However, the potentially large number of co-located networks and fairly small number of channels suggests that this will not be an unusual situation. The risk of external frames being received and misinterpreted as local frames is studied in [2], which emphasized the need for authentication on all frames. Interference between co-located IEEE 802.15.4 PANs is demonstrated in [3]. This work reflects a similar interest in timing and interference interactions between networks that can receive and identify, but not decrypt, each other’s frames. The diversity of IEEE 802.15.4-based WSN protocols is the motivating use case. These protocols use the same PHY/ MAC in very different ways, from pure unslotted CSMA to the scheduled mesh in WirelessHART. Such significant differences in channel access mechanisms can lead to adverse interactions between independent networks, which will not be able to explicitly negotiate (or even infer) how to share the channel efficiently. Thus the long-term goal of this work-in-progress is to motivate the development of architecture and design principles that can mitigate problems of inter-network interference. As a specific example, consider two kinds of asynchronous MAC layers. Figure 1 shows interactions between networks using an X-MAC [1] type protocol (i.e. sender strobes, receivers periodically listen) and an RI-MAC [4] type protocol
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信