-
STX-Vote: Improving Reliability with Bit Voting in Synchronous Transmission-based IoT Networks
Authors:
Burhanuddin Rangwala,
Ava Powelson,
Michael Baddeley,
Israat Haque
Abstract:
Industrial Internet of Things (IIoT) networks must meet strict reliability, latency, and low energy consumption requirements. However, traditional low-power wireless protocols are ineffective in finding a sweet spot for balancing these performance metrics. Recently, network flooding protocols based on Synchronous Transmissions (STX) have been proposed for better performance in reliability-critical…
▽ More
Industrial Internet of Things (IIoT) networks must meet strict reliability, latency, and low energy consumption requirements. However, traditional low-power wireless protocols are ineffective in finding a sweet spot for balancing these performance metrics. Recently, network flooding protocols based on Synchronous Transmissions (STX) have been proposed for better performance in reliability-critical IIoT, where simultaneous transmissions are possible without packet collisions. STX-based protocols can offer a competitive edge over routing-based protocols, particularly in dependability. However, they notably suffer from the beating effect, a physical layer phenomenon that results in sinusoidal interference across a packet and, consequently, packet loss. Thus, we introduce STX-Vote, an error correction scheme that can handle errors caused by beating effects. Importantly, we utilize transmission redundancy already inherent within STX protocols so do not incur additional on-air overhead. Through simulation, we demonstrate STX-Vote can provide a 40% increase in reliability. We subsequently implement STX-Vote on nRF52840-DK devices and perform extensive experiments. The results confirm that STX-Vote improves reliability by 25-28% for BLE 5 PHYs and 8% for IEEE 802.15.4; thus, it can complement existing error correction schemes.
△ Less
Submitted 3 May, 2024;
originally announced May 2024.
-
Understanding Concurrent Transmissions: The Impact of Carrier Frequency Offset and RF Interference on Physical Layer Performance
Authors:
Michael Baddeley,
Carlo Alberto Boano,
Antonio Escobar-Molero,
Ye Liu,
Xiaoyuan Ma,
Victor Marot,
Usman Raza,
Kay Römer,
Markus Schuss,
Aleksandar Stanoev
Abstract:
The popularity of concurrent transmissions (CT) has soared after recent studies have shown their feasibility on the four physical layers specified by BLE 5, hence providing an alternative to the use of IEEE 802.15.4 for the design of reliable and efficient low-power wireless protocols. However, to date, the extent to which physical layer properties affect the performance of CT has not yet been inv…
▽ More
The popularity of concurrent transmissions (CT) has soared after recent studies have shown their feasibility on the four physical layers specified by BLE 5, hence providing an alternative to the use of IEEE 802.15.4 for the design of reliable and efficient low-power wireless protocols. However, to date, the extent to which physical layer properties affect the performance of CT has not yet been investigated in detail. This paper fills this gap and provides an extensive study on the impact of the physical layer on CT-based solutions using IEEE 802.15.4 and BLE 5. We first highlight through simulation how the impact of errors induced by relative carrier frequency offsets on the performance of CT highly depends on the choice of the underlying physical layer. We then confirm these observations experimentally on real hardware and with varying environmental conditions through an analysis of the bit error distribution across received packets, unveiling possible techniques to effectively handle these errors. We further study the performance of CT-based data collection and dissemination protocols in the presence of RF interference on a large-scale testbed, deriving insights on how the employed physical layer affects their dependability.
△ Less
Submitted 1 April, 2023;
originally announced April 2023.
-
Benchmarking and Security Considerations of Wi-Fi FTM for Ranging in IoT Devices
Authors:
Govind Singh,
Anshul Pandey,
Monika Prakash,
Martin Andreoni,
Michael Baddeley
Abstract:
The IEEE 802.11mc standard introduces fine time measurement (Wi-Fi FTM), allowing high-precision synchronization between peers and round-trip time calculation (Wi-Fi RTT) for location estimation - typically with a precision of one to two meters. This has considerable advantages over received signal strength (RSS)-based trilateration, which is prone to errors due to multipath reflections. We examin…
▽ More
The IEEE 802.11mc standard introduces fine time measurement (Wi-Fi FTM), allowing high-precision synchronization between peers and round-trip time calculation (Wi-Fi RTT) for location estimation - typically with a precision of one to two meters. This has considerable advantages over received signal strength (RSS)-based trilateration, which is prone to errors due to multipath reflections. We examine different commercial radios which support Wi-Fi RTT and benchmark Wi-Fi FTM ranging over different spectrums and bandwidths. Importantly, we find that while Wi-Fi FTM supports localization accuracy to within one to two meters in ideal conditions during outdoor line-of-sight experiments, for indoor environments at short ranges similar accuracy was only achievable on chipsets supporting Wi-Fi FTM on wider (VHT80) channel bandwidths rather than narrower (HT20) channel bandwidths. Finally, we explore the security implications of Wi-Fi FTM and use an on-air sniffer to demonstrate that Wi-Fi FTM messages are unprotected. We consequently propose a threat model with possible mitigations and directions for further research.
△ Less
Submitted 7 March, 2023;
originally announced March 2023.
-
BlueTiSCH: A Multi-PHY Simulation of Low-Power 6TiSCH IoT Networks
Authors:
Chloe Bae,
Shiwen Yang,
Michael Baddeley,
Atis Elsts,
Israat Haque
Abstract:
Low-power wireless IoT networks have traditionally operated over a single physical layer (PHY) -- many based on the IEEE 802.15.4 standard. However, recent low-power wireless chipsets offer both the IEEE 802.15.4 and all four PHYs of the Bluetooth 5 (BT 5) standard. This introduces the intriguing possibility that IoT solutions might not necessarily be bound by the limits of a single PHY, and could…
▽ More
Low-power wireless IoT networks have traditionally operated over a single physical layer (PHY) -- many based on the IEEE 802.15.4 standard. However, recent low-power wireless chipsets offer both the IEEE 802.15.4 and all four PHYs of the Bluetooth 5 (BT 5) standard. This introduces the intriguing possibility that IoT solutions might not necessarily be bound by the limits of a single PHY, and could actively or proactively adapt their PHY depending on RF or networking conditions (e.g., to offer a higher throughput or a longer radio range). Several recent studies have explored such use-cases. However, these studies lack comprehensive evaluation over various metrics (such as reliability, latency, and energy) with regards to scalability and the Radio Frequency (RF) environment. In this work we evaluate the performance of IEEE 802.15.4 and the four BT 5 2.4GHz PHY options for the recently completed IETF 6TiSCH low-power wireless standard. To the best of our knowledge, this is the first work to directly compare these PHYs in identical settings. Specifically, we use a recently released 6TiSCH simulator, TSCH-Sim, to compare these PHY options in networks of up to 250 nodes over different RF environments (home, industrial, and outdoor), and highlight from these results how different PHY options might be better suited to particular application use-cases.
△ Less
Submitted 27 August, 2022;
originally announced August 2022.
-
OSF: An Open-Source Framework for Synchronous Flooding over Multiple Physical Layers
Authors:
Michael Baddeley,
Yevgen Gyl,
Markus Schuss,
Xiaoyuan Ma,
Carlo Alberto Boano
Abstract:
Flooding protocols based on concurrent transmissions are regarded as the most reliable way to collect or disseminate data across a multi-hop low-power wireless mesh network. Recent works have shown that such protocols are effective for narrowband communication not only over IEEE 802.15.4, but also over the BLE 5 physical layers (PHYs). However, to date, existing literature has only built synchrono…
▽ More
Flooding protocols based on concurrent transmissions are regarded as the most reliable way to collect or disseminate data across a multi-hop low-power wireless mesh network. Recent works have shown that such protocols are effective for narrowband communication not only over IEEE 802.15.4, but also over the BLE 5 physical layers (PHYs). However, to date, existing literature has only built synchronous flooding solutions on top of a single PHY, and there has been no attempt to leverage different PHYs at runtime to increase performance. This paper fills this gap and presents OSF, an open-source framework that enables the design of multi-PHY synchronous flooding solutions thanks to a novel radio driver and middle-ware architecture capable of dynamically switching the underlying physical layer. This allows exploitation of the specific benefits of each PHY (e.g., higher data-rate, increased robustness) on-demand during each flood, increasing performance. We tailor OSF to the off-the-shelf nRF52840 platform, and showcase its benefits by comparing single-PHY and multi-PHY synchronous flooding solutions on a real-world testbed.
△ Less
Submitted 26 August, 2022;
originally announced August 2022.
-
Towards Secure Wireless Mesh Networks for UAV Swarm Connectivity: Current Threats, Research, and Opportunities
Authors:
Martin Andreoni Lopez,
Michael Baddeley,
Willian T. Lunardi,
Anshul Pandey,
Jean-Pierre Giacalone
Abstract:
UAVs are increasingly appearing in swarms or formations to leverage cooperative behavior, forming flying ad hoc networks. These UAV-enabled networks can meet several complex mission requirements and are seen as a potential enabler for many of the emerging use-cases in future communication networks. Such networks, however, are characterized by a highly dynamic and mobile environment with no guarant…
▽ More
UAVs are increasingly appearing in swarms or formations to leverage cooperative behavior, forming flying ad hoc networks. These UAV-enabled networks can meet several complex mission requirements and are seen as a potential enabler for many of the emerging use-cases in future communication networks. Such networks, however, are characterized by a highly dynamic and mobile environment with no guarantee of a central network infrastructure which can cause both connectivity and security issues. While wireless mesh networks are envisioned as a solution for such scenarios, these networks come with their own challenges and security vulnerabilities. In this paper, we analyze the key security and resilience issues resulting from the application of wireless mesh networks within UAV swarms. Specifically, we highlight the main challenges of applying current mesh technologies within the domain of UAV swarms and expose existing vulnerabilities across the communication stack. Based on this analysis, we present a security-focused architecture for UAV mesh communications. Finally, from the identification of these vulnerabilities, we discuss research opportunities posed by the unique challenges of UAV swarm connectivity.
△ Less
Submitted 12 July, 2021;
originally announced August 2021.
-
A Self-Configurable Grou** Method for Integrated Wi-SUN FAN and TSCH-based Networks
Authors:
Xinyu Ni,
Michael Baddeley,
Nan Jiang,
Yichao **
Abstract:
Recent applications in large-scale wireless mesh networks (WSN), e.g., Advanced Metering Infrastructure (AMI) scenarios, expect to support an extended number of nodes with higher throughput, which cannot be sufficiently supported by the current WSN protocols. Two prior protocols, Wi-SUN Field Area Network (Wi-SUN FAN) and IETF 6TiSCH standards, are popularly used that are respectively based on asy…
▽ More
Recent applications in large-scale wireless mesh networks (WSN), e.g., Advanced Metering Infrastructure (AMI) scenarios, expect to support an extended number of nodes with higher throughput, which cannot be sufficiently supported by the current WSN protocols. Two prior protocols, Wi-SUN Field Area Network (Wi-SUN FAN) and IETF 6TiSCH standards, are popularly used that are respectively based on asynchronous Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) and IEEE 802.15.4 Time Scheduled Channel Hop** (TSCH). However, the former one with CSMA/CA can be prone to the Hidden Node Problem (HNP) that leads to a degradation of reliability, while the latter one with TSCH avoids HNP by using synchronously scheduling but requires massive control signalling that degrades the upper-bound of throughput. Accordingly, this paper tackles the challenge of how to improve the upper-bound of throughput without loss of reliability. To do so, we first present an in-depth evaluation of reliability and throughput between the two existing standards via system-level simulation. We then propose a self-configurable grou** (SCG) method to cluster nodes without using location information of each node. This SCG method eliminates around 99\% HNP in CSMA/CA, thus greatly improves its reliability with maintaining the relatively high upper-bound of throughput. Our results show that the SCG method almost doubles the network throughput compared with both 6TiSCH and Wi-SUN FAN in heavy traffic scenarios, while providing extremely high reliability of more than 99.999\%.
△ Less
Submitted 9 August, 2021;
originally announced August 2021.
-
Embedded vs. External Controllers in Software-Defined IoT Networks
Authors:
Miheer Kulkarni,
Michael Baddeley,
Israat Haque
Abstract:
The flexible and programmable architectural model offered by Software-Defined Networking (SDN) has re-imagined modern networks. Supported by powerful hardware and high-speed communications between devices and the controller, SDN provides a means to virtualize control functionality and enable rapid network reconfiguration in response to dynamic application requirements. However, recent efforts to a…
▽ More
The flexible and programmable architectural model offered by Software-Defined Networking (SDN) has re-imagined modern networks. Supported by powerful hardware and high-speed communications between devices and the controller, SDN provides a means to virtualize control functionality and enable rapid network reconfiguration in response to dynamic application requirements. However, recent efforts to apply SDN's centralized control model to the Internet of Things (IoT) have identified significant challenges due to the constraints faced by embedded low-power devices and networks that reside at the IoT edge. In particular, reliance on external SDN controllers on the backbone network introduces a performance bottleneck (e.g., latency). To this end, we advocate a case for supporting Software-Defined IoT networks through the introduction of lightweight SDN controllers directly on the embedded hardware. We firstly explore the performance of two popular SDN implementations for IoT mesh networks, $μ$SDN and SDN-WISE, showing the former demonstrates considerable gains over the latter. We consequently employ $μ$SDN to conduct a study of embedded vs. external SDN controller performance. We highlight how the advantage of an embedded controller is reduced as the network scales, and quantify a point at which an external controller should be used for larger networks.
△ Less
Submitted 6 June, 2021;
originally announced June 2021.
-
6TiSCH++ with Bluetooth 5 and Concurrent Transmissions
Authors:
Michael Baddeley,
Adnan Aijaz,
Usman Raza,
Aleksandar Stanoev,
Yichao **,
Markus Schuß,
Carlo Alberto Boano,
George Oikonomou
Abstract:
Targeting dependable communications for industrial Internet of Things applications, IETF 6TiSCH provides mechanisms for efficient scheduling, routing, and forwarding of IPv6 traffic across low-power mesh networks. Yet, despite an overwhelming body of literature covering both centralized and distributed scheduling schemes for 6TiSCH, an effective control solution for large-scale multi-hop mesh netw…
▽ More
Targeting dependable communications for industrial Internet of Things applications, IETF 6TiSCH provides mechanisms for efficient scheduling, routing, and forwarding of IPv6 traffic across low-power mesh networks. Yet, despite an overwhelming body of literature covering both centralized and distributed scheduling schemes for 6TiSCH, an effective control solution for large-scale multi-hop mesh networks remains an open challenge. This paper addresses this with a novel approach that eliminates much of the routing and link-layer overhead incurred by centralized schedulers, and provides a robust mechanism for data dissemination synchronization within 6TiSCH. Specifically, we leverage the physical layer (PHY) switching capabilities of modern low-power wireless platforms to build on recent work demonstrating the viability of Concurrent Transmission (CT)-based flooding protocols across the Bluetooth 5 (BT 5) PHYs. By switching the PHY and MAC layer at runtime, we inject a BT 5-based CT flood within a standard IEEE 802.15.4 TSCH slotframe, thereby providing a reliable, low-latency scheme for 6TiSCH control messaging. We present an analytical model and experimental evaluation showing how our solution not only exploits the BT 5 high data-rate PHY layers for rapid data dissemination, but can also provide reliable 6TiSCH association and synchronization even under external radio interference. We further discuss how the proposed technique can be used to address other open challenges within the standard.
△ Less
Submitted 19 October, 2020;
originally announced October 2020.
-
Attributes affecting user decision to adopt a Virtual Private Network (VPN) app
Authors:
Nissy Sombatruang,
Tan Omiya,
Daisuke Miyamoto,
M. Angela Sasse,
Youki Kadobayashi,
Michelle Baddeley
Abstract:
A Virtual Private Network (VPN) helps to mitigate security and privacy risks of data transmitting on unsecured network such as public Wi-Fi. However, despite awareness of public Wi-Fi risks becoming increasingly common, the use of VPN when using public Wi-Fi is low. To increase adoption, understanding factors driving user decision to adopt a VPN app is an important first step. This study is the fi…
▽ More
A Virtual Private Network (VPN) helps to mitigate security and privacy risks of data transmitting on unsecured network such as public Wi-Fi. However, despite awareness of public Wi-Fi risks becoming increasingly common, the use of VPN when using public Wi-Fi is low. To increase adoption, understanding factors driving user decision to adopt a VPN app is an important first step. This study is the first to achieve this objective using discrete choice experiments (DCEs) to elicit individual preferences of specific attributes of a VPN app. The experiments were run in the United Kingdom (UK) and Japan (JP). We first interviewed participants (15 UK, 17 JP) to identify common attributes of a VPN app which they considered important. The results were used to design and run a DCE in each country. Participants (149 UK, 94 JP) were shown a series of two hypothetical VPN apps, varying in features, and were asked to choose one which they preferred. Customer review rating, followed by price of a VPN app, significantly affected the decision to choose which VPN app to download and install. A change from a rating of 3 to 4-5 stars increased the probability of choosing an app by 33% in the UK and 14% in Japan. Unsurprisingly, price was a deterrent. Recommendations by friends, source of product reviews, and the presence of in-app ads also played a role but to a lesser extent. To actually use a VPN app, participants considered Internet speed, connection stability, battery level on mobile devices, and the presence of in-app ads as key drivers. Participants in the UK and in Japan prioritized these attributes differently, suggesting possible influences from cultural differences.
△ Less
Submitted 15 August, 2020;
originally announced August 2020.
-
The Impact of the Physical Layer on the Performance of Concurrent Transmissions
Authors:
Michael Baddeley,
Carlo Alberto Boano,
Antonio Escobar-Molero,
Ye Liu,
Xiaoyuan Ma,
Usman Raza,
Kay Römer,
Markus Schuß,
Aleksandar Stanoev
Abstract:
The popularity of concurrent transmissions (CT) has soared after recent studies have shown their feasibility on the four physical layers specified by BLE 5, hence providing an alternative to the use of IEEE 802.15.4 for the design of reliable and efficient low-power wireless protocols. However, to date, the extent to which physical layer properties affect the performance of CT has not yet been inv…
▽ More
The popularity of concurrent transmissions (CT) has soared after recent studies have shown their feasibility on the four physical layers specified by BLE 5, hence providing an alternative to the use of IEEE 802.15.4 for the design of reliable and efficient low-power wireless protocols. However, to date, the extent to which physical layer properties affect the performance of CT has not yet been investigated in detail. This paper fills this gap and provides the first extensive study on the impact of the physical layer on CT-based solutions using IEEE 802.15.4 and BLE 5. We first highlight through simulation how the impact of errors induced by de-synchronization and beating on the performance of CT highly depends on the choice of the underlying physical layer. We then confirm these observations experimentally on real hardware through an analysis of the bit error distribution across received packets, unveiling possible techniques to effectively handle these errors. We further study the performance of CT-based flooding protocols in the presence of radio interference on a large-scale, and derive important insights on how the used physical layer affects their dependability.
△ Less
Submitted 28 May, 2020;
originally announced May 2020.
-
Demo: Closed-Loop Control over Wireless -- Remotely Balancing an Inverted Pendulum on Wheels
Authors:
Aleksandar Stanoev,
Adnan Aijaz,
Anthony Portelli,
Michael Baddeley
Abstract:
Achieving closed-loop control over wireless is crucial in realizing the vision of Industry 4.0 and beyond. This demonstration shows the viability of closed-loop control over wireless through a high-performance wireless solution. The closed-loop control problem involves remote balancing of a two-wheeled robot that represents an inverted pendulum on wheels.
Achieving closed-loop control over wireless is crucial in realizing the vision of Industry 4.0 and beyond. This demonstration shows the viability of closed-loop control over wireless through a high-performance wireless solution. The closed-loop control problem involves remote balancing of a two-wheeled robot that represents an inverted pendulum on wheels.
△ Less
Submitted 23 March, 2020;
originally announced March 2020.
-
Behavioural Macroeconomic Policy: New perspectives on time inconsistency
Authors:
Michelle Baddeley
Abstract:
This paper brings together divergent approaches to time inconsistency from macroeconomic policy and behavioural economics. Behavioural discount functions from behavioural microeconomics are embedded into a game-theoretic analysis of temptation versus enforcement to construct an encompassing model, nesting combinations of time consistent and time inconsistent preferences. The analysis presented in…
▽ More
This paper brings together divergent approaches to time inconsistency from macroeconomic policy and behavioural economics. Behavioural discount functions from behavioural microeconomics are embedded into a game-theoretic analysis of temptation versus enforcement to construct an encompassing model, nesting combinations of time consistent and time inconsistent preferences. The analysis presented in this paper shows that, with hyperbolic/quasihyperbolic discounting, the enforceable range of inflation targets is narrowed. This suggests limits to the effectiveness of monetary targets, under certain conditions. The paper concludes with a discussion of monetary policy implications, explored specifically in the light of current macroeconomic policy debates.
△ Less
Submitted 17 July, 2019;
originally announced July 2019.
-
Atomic-SDN: Is Synchronous Flooding the Solution to Software-Defined Networking in IoT?
Authors:
Michael Baddeley,
Usman Raza,
Aleksandar Stanoev,
George Oikonomou,
Reza Nejabati,
Mahesh Sooriyabandara,
Dimitra Simeonidou
Abstract:
The adoption of Software Defined Networking (SDN) within traditional networks has provided operators the ability to manage diverse resources and easily reconfigure networks as requirements change. Recent research has extended this concept to IEEE 802.15.4 low-power wireless networks, which form a key component of the Internet of Things (IoT). However, the multiple traffic patterns necessary for SD…
▽ More
The adoption of Software Defined Networking (SDN) within traditional networks has provided operators the ability to manage diverse resources and easily reconfigure networks as requirements change. Recent research has extended this concept to IEEE 802.15.4 low-power wireless networks, which form a key component of the Internet of Things (IoT). However, the multiple traffic patterns necessary for SDN control makes it difficult to apply this approach to these highly challenging environments. This paper presents Atomic-SDN, a highly reliable and low-latency solution for SDN in low-power wireless. Atomic-SDN introduces a novel Synchronous Flooding (SF) architecture capable of dynamically configuring SF protocols to satisfy complex SDN control requirements, and draws from the authors' previous experiences in the IEEE EWSN Dependability Competition: where SF solutions have consistently outperformed other entries. Using this approach, Atomic-SDN presents considerable performance gains over other SDN implementations for low-power IoT networks. We evaluate Atomic-SDN through simulation and experimentation, and show how utilizing SF techniques provides latency and reliability guarantees to SDN control operations as the local mesh scales. We compare Atomic-SDN against other SDN implementations based on the IEEE 802.15.4 network stack, and establish that Atomic-SDN improves SDN control by orders-of-magnitude across latency, reliability, and energy-efficiency metrics.
△ Less
Submitted 29 May, 2019; v1 submitted 19 December, 2018;
originally announced December 2018.
-
Evolving SDN for Low-Power IoT Networks
Authors:
Michael Baddeley,
Reza Nejabati,
George Oikonomou,
Mahesh Sooriyabandara,
Dimitra Simeonidou
Abstract:
Software Defined Networking (SDN) offers a flexible and scalable architecture that abstracts decision making away from individual devices and provides a programmable network platform. However, implementing a centralized SDN architecture within the constraints of a low-power wireless network faces considerable challenges. Not only is controller traffic subject to jitter due to unreliable links and…
▽ More
Software Defined Networking (SDN) offers a flexible and scalable architecture that abstracts decision making away from individual devices and provides a programmable network platform. However, implementing a centralized SDN architecture within the constraints of a low-power wireless network faces considerable challenges. Not only is controller traffic subject to jitter due to unreliable links and network contention, but the overhead generated by SDN can severely affect the performance of other traffic. This paper addresses the challenge of bringing high-overhead SDN architecture to IEEE 802.15.4 networks. We explore how traditional SDN needs to evolve in order to overcome the constraints of low-power wireless networks, and discuss protocol and architectural optimizations necessary to reduce SDN control overhead - the main barrier to successful implementation. We argue that interoperability with the existing protocol stack is necessary to provide a platform for controller discovery and coexistence with legacy networks. We consequently introduce μSDN, a lightweight SDN framework for Contiki, with both IPv6 and underlying routing protocol interoperability, as well as optimizing a number of elements within the SDN architecture to reduce control overhead to practical levels. We evaluate μSDN in terms of latency, energy, and packet delivery. Through this evaluation we show how the cost of SDN control overhead (both bootstrap** and management) can be reduced to a point where comparable performance and scalability is achieved against an IEEE 802.15.4-2012 RPL-based network. Additionally, we demonstrate μSDN through simulation: providing a use-case where the SDN configurability can be used to provide Quality of Service (QoS) for critical network flows experiencing interference, and we achieve considerable reductions in delay and jitter in comparison to a scenario without SDN.
△ Less
Submitted 29 May, 2019; v1 submitted 19 September, 2018;
originally announced September 2018.
-
Isolating SDN Control Traffic with Layer-2 Slicing in 6TiSCH Industrial IoT Networks
Authors:
Michael Baddeley,
Reza Nejabati,
George Oikonomou,
Sedat Gormus,
Mahesh Sooriyabandara,
Dimitra Simeonidou
Abstract:
Recent standardization efforts in IEEE 802.15.4-2015 Time Scheduled Channel Hop** (TSCH) and the IETF 6TiSCH Working Group (WG), aim to provide deterministic communications and efficient allocation of resources across constrained Internet of Things (IoT) networks, particularly in Industrial IoT (IIoT) scenarios. Within 6TiSCH, Software Defined Networking (SDN) has been identified as means of pro…
▽ More
Recent standardization efforts in IEEE 802.15.4-2015 Time Scheduled Channel Hop** (TSCH) and the IETF 6TiSCH Working Group (WG), aim to provide deterministic communications and efficient allocation of resources across constrained Internet of Things (IoT) networks, particularly in Industrial IoT (IIoT) scenarios. Within 6TiSCH, Software Defined Networking (SDN) has been identified as means of providing centralized control in a number of key situations. However, implementing a centralized SDN architecture in a Low Power and Lossy Network (LLN) faces considerable challenges: not only is controller traffic subject to jitter due to unreliable links and network contention, but the overhead generated by SDN can severely affect the performance of other traffic. This paper proposes using 6TiSCH tracks, a Layer-2 slicing mechanism for creating dedicated forwarding paths across TSCH networks, in order to isolate the SDN control overhead. Not only does this prevent control traffic from affecting the performance of other data flows, but the properties of 6TiSCH tracks allows deterministic, low-latency SDN controller communication. Using our own lightweight SDN implementation for Contiki OS, we firstly demonstrate the effect of SDN control traffic on application data flows across a 6TiSCH network. We then show that by slicing the network through the allocation of dedicated resources along a SDN control path, tracks provide an effective means of mitigating the cost of SDN control overhead in IEEE 802.15.4-2015 TSCH networks.
△ Less
Submitted 29 May, 2019; v1 submitted 18 September, 2018;
originally announced September 2018.