Next Article in Journal
A Robust, Enzyme-Free Glucose Sensor Based on Lysine-Assisted CuO Nanostructures
Previous Article in Journal
A Microfluidic DNA Sensor Based on Three-Dimensional (3D) Hierarchical MoS2/Carbon Nanotube Nanocomposites
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Interference-Robust Transmission in Wireless Sensor Networks

Department of Electrical and Computer Engineering and INMC, Seoul National University, Seoul 151-742, Korea
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(11), 1910; https://doi.org/10.3390/s16111910
Submission received: 19 August 2016 / Revised: 30 October 2016 / Accepted: 7 November 2016 / Published: 14 November 2016
(This article belongs to the Section Sensor Networks)

Abstract

:
Low-power wireless sensor networks (WSNs) operating in unlicensed spectrum bands may seriously suffer from interference from other coexisting radio systems, such as IEEE 802.11 wireless local area networks. In this paper, we consider the improvement of the transmission performance of low-power WSNs by adjusting the transmission rate and the payload size in response to the change of co-channel interference. We estimate the probability of transmission failure and the data throughput and then determine the payload size to maximize the throughput performance. We investigate that the transmission time maximizing the normalized throughput is not much affected by the transmission rate, but rather by the interference condition. We adjust the transmission rate and the transmission time in response to the change of the channel and interference condition, respectively. Finally, we verify the performance of the proposed scheme by computer simulation. The simulation results show that the proposed scheme significantly improves data throughput compared with conventional schemes while preserving energy efficiency even in the presence of interference.

1. Introduction

Recent advances in wireless communications and electronic device technology make it possible to realize low-power and low-cost wireless sensor networks (WSNs). The low cost of deployment of low-power WSNs can make various IoT services quite feasible [1]. However, low-power WSNs operating in unlicensed spectrum bands may seriously suffer from unavoidable co-channel interference generated by other radio systems (e.g., IEEE 802.11b/g/n wireless local area networks (WLANs)) [2,3,4,5]. It is of great concern to deploy low-power WSNs that can provide stable transmission performance in the presence of co-channel interference.
A number of techniques has been proposed for the coexistence of various radio systems operating in unlicensed spectrum bands. It is well recognized that WLAN is one of major interference sources that seriously hamper the operation of low-power WSNs [6,7]. A simple technique is to allocate WSN and WLAN devices spectrum resource orthogonal to each other or to exploit the utilization of white space with channel switching [8,9,10,11,12]. Recently, channel hopping mechanisms have been applied to low-power WSNs to mitigate the interference. For example, IEEE 802.15.4e deterministic synchronous multi-channel extension (DSME) employs a channel hopping and channel adaptation scheme for channel diversity [13]. Bluetooth low energy (BLE) employs an adaptive frequency hopping (AFH) mechanism [14]. However, these approaches may not be effective as the available spectrum is getting sparse due to the increase of active WLAN devices [15,16]. The performance of the AFH mechanism may considerably be degraded in the presence of multiple WLAN interference mainly due to its slow adaptation process [17]. Although WLAN devices employ a carrier sense multiple access with collision avoidance (CSMA/CA) scheme, they may not detect the presence of WSN signals whose transmission power is much lower than theirs [18]. As a consequence, they may continue the signal transmission even in the presence of low-power WSN signals, significantly deteriorating the operation of low-power WSNs. Some works have considered placing a special device to help low-power WSNs share a channel with WLANs. A special device, referred to as a signaler, may help other ZigBee devices to access the channel by sending a busy tone, forcing WLAN devices to defer their transmissions [18]. However, the coordination between the signaler and other ZigBee devices may be too complex, making it impractical in WLAN operation environments. Another special device, referred to as the arbitrator, can schedule the activity of ZigBee and WLAN devices through communication among them [19]. However, the scheduling may not be easy in dynamic interference environments, since it may require the arbitrator to re-initiate a spectrum scanning and re-allocate the parameters.
Some previous works have also considered performance improvement of low-power WSNs in the presence of co-channel interference. Two approaches, the collision-recovery and collision-avoidance approach, have mainly been considered. The collision-recovery approach mainly considers the use of forward error correction (FEC) techniques to mitigate the co-channel interference. For example, BuzzBuzz employs a Hamming(12,8) code-based FECscheme for ZigBee devices [20]. However, it may not be effective in dynamic interference environments. A real-time adaptive transmission (RAT) scheme makes WSN devices choose an appropriate FEC coding scheme to maximize the throughput [21]. However, these collision recovery schemes may not be effective unless the signal-to-interference-plus-noise ratio (SINR) is sufficiently high. Figure 1 illustrates the SINR of IEEE 802.15.4 in the presence of co-channel interference. Note that IEEE 802.15.4 requires a minimum SINR of 0.4 dB for the transmission of a 20-byte packet (refer to Appendix A). However, the SINR may not be high in practical operating environments, making the collision-recovery approach ineffective for reliable signal transmission.
The collision-avoidance approach mainly exploits white space to avoid co-channel interference. A dynamic rate adaptation and control for energy reduction (DRACER) scheme adjusts the transmission rate in response to the change of operating condition [22]. DRACER may reduce the probability of collision with the interference signal by transmitting packets at the highest rate. However, it does not consider the effect of the packet size in the presence of interference, yielding inefficient use of white space. A white space-aware frame adaptation (WISE) scheme considers the packet size control [15]. Modeling the idle period of interference as a Pareto-distributed random variable, WISE determines the packet size to maximize the throughput efficiency, while providing desired packet collision probability. However, it may need to periodically adjust the Pareto model through channel sensing, which may be a considerable overhead to low-power WSN devices. Another packet size control scheme, referred to as dynamic packet length control (DPLC), simply adjusts the packet size based on a transmission efficiency metric [23]. DPLC empirically determines the packet size after a number of packet transmissions. However, it may not properly work in the presence of time-varying interference. Moreover, these collision-avoidance schemes only consider the signal transmission at a fixed rate, which may not be efficient when the signal-to-noise ratio (SNR) is higher than that required for the rate. A payload size and transmission rate adjustment scheme was proposed for WLANs in slow fading channel environments [24]. However, it does not consider the presence of co-channel interference, making it impractical for application to low-power WSNs.
As a collision-avoidance approach, partial packet recovery (PPR) techniques were proposed to reduce the transmission of acknowledgment (ACK) packets. They partition a data packet into a number of smaller blocks and acknowledge the transmission of multiple data packets by a single recovery frame including a block map, which describes the status of all blocks [25,26,27,28]. The transmitter should retransmit all of the packets when the recovery frame is not received [25] or wait until it receives the recovery frame, while the receiver retransmits the recovery frame until it receives data packets [26,27,28]. The PPR techniques may severely suffer from frequent loss of recovery frames in practical operation environments. Moreover, they do not consider the waiting time when they evaluate the throughput and the energy consumption. The power consumption during the idle listening of WLAN and ZigBee devices is comparable to the power consumption during signal reception [29]. Moreover, these schemes only consider the transmission at a fixed rate.
In this paper, we consider the adjustment of the transmission rate and payload size to improve the transmission performance in the presence of co-channel interference. We consider the operation of low-power WSNs that can support the bulk transfer of large data (e.g., e-price tags [30], surveillance applications involving imaging/acoustics [31,32] and structural health monitoring [33,34]). Based on the probability of transmission failure and the data throughput, we determine the payload size to maximize the data throughput in the presence of interference. It is shown that the transmission time maximizing the normalized throughput is little affected by the transmission rate, rather mostly by the interference condition. We independently adjust the transmission time and the transmission rate to maximize the data throughput in response to the change of operation environments. Finally, we evaluate the performance of the proposed scheme by computer simulation.
The rest of this paper is organized as follows. Section 2 describes the WSN model in consideration. Section 3 analyzes the performance of WSN in the presence of co-channel interference. Section 4 describes the proposed scheme to improve the throughput performance in the presence of co-channel interference. Section 5 evaluates the performance of the proposed scheme by computer simulation. Finally, Section 6 concludes this paper.

2. System Model

As illustrated in Figure 2, we consider a star-topology WSN comprising a network coordinator and its child nodes located in an operation range of WLANs. The WSN employs a periodic frame structure for synchronous network operation and data communications, where the period of the frame and the length of the data communication interval are T period and T comm , respectively. The network coordinator transmits a beacon at the beginning of each frame for synchronized network operation. It allocates communication resources to a target node using a handshaking protocol during the network operation interval [35]. Non-target nodes may stay in sleep mode to minimize power consumption.
We assume that a transmitter node generates L bulk -bit data at each transaction. The L bulk -bit data is fragmented by a number of data packets each of which comprises a L-bit data payload ( L min L L max ) and signaling bits (e.g., packet header). The receiver confirms the packet reception by sending an ACK packet. The transmitter retransmits the data packet if it does not receive an ACK packet. We also assume that the transmission rate is adjustable according to the channel condition. Then, the packet transmission time with transmission mode m can be represented as:
T pkt , m L = L shr + L phr R base + L mhr + L R m
where L shr , L phr and L mhr are respectively the bit size of the synchronization header (SHR), the physical layer packet header (PHR) and the medium access control (MAC) layer packet header (MHR), R m ( R 1 , R 2 , . . . , R M Π ) denotes the transmission rate of MHR and data payload of transmission mode m and R base is the transmission rate of SHR and PHR ( R base Π ). We assume that R 1 < R 2 < < R M , and the ACK packet has no payload (i.e., L = 0 ).
A node with transmission mode m may experience packet loss when the received SNR, denoted by γ , is lower than a threshold γ ^ m and/or when the packet has collision with the interference signal. We assume that the SNR is unchanged during each packet transmission and randomly varies between the packet transmissions [36]. Then, the probability of transmission failure can be represented as:
p ˜ m L , γ = 1 - 1 - p m , c L 1 - p m , s L , γ
where p m , c and p m , s denote the probability of transmission failure due to the packet collision and low SNR, respectively. The probability of transmission failure due to SNR can be represented as:
p m , s = 1 - 1 - p fail sync γ , L shr 1 - b m , s γ L phr + L mhr + L
where p fail sync γ , L shr denotes the probability of synchronization failure at an SNR of γ when the SHR length is L shr (e.g., p fail sync γ , L shr for IEEE 802.15.4 communications is referred to in [37]) and b m , s γ denotes the bit error rate (BER) of transmission mode m at an SNR of γ . Note that p ˜ m is an upper bound of the packet error rate (refer to Appendix B).
The probability of transmission failure due to the packet collision can be calculated in terms of the channel occupancy of the interference signal. The channel occupancy of the WLAN signal can be characterized using a semi-Markov model [38,39]. The channel has two simple operation states, the busy and idle state, whose duration is described by the probability density function (PDF) f T busy t and f T idle t , respectively. The channel occupancy of the interference signal can be defined by:
ρ = τ busy τ busy + τ idle
where τ busy and τ idle denote the mean duration of the busy and the idle state, respectively. It can be shown that p m , c can be represented as:
p m , c = ρ p m , c | busy + 1 - ρ p m , c | idle
where p m , c | busy and p m , c | idle denote the probability of transmission failure due to the packet collision when the packet transmission is initiated in the presence and the absence of the interference signal, respectively. For a given probability of transmission failure, denoted by p ˜ m , c L , γ , the data throughput can be represented as:
S m L , γ = L 1 - p ˜ m , c L , γ T ˜ m L   [ bit / s ]
where T ˜ m denotes the data transaction time (i.e., the round trip time).
Define the bulk transfer delay D bulk by the sum of the access delay D acc and the transmission delay D tx . The access delay is the time difference between the start of an access attempt and the successful access. Then, it can be shown that:
D acc = 1 2 T period + 1 - p sync 1 - p sch T period + p sync + 1 - p sync p sch 1 - p sync 1 - p sch 2 T period + = 1 2 T period + 1 1 - p sync 1 - p sch T period
where p sync and p sch denote the failure probability of the frame synchronization and the scheduling, respectively. Note that a low-power WSN can maintain the frame synchronization robustly in the presence of co-channel interference [40]. The transmission delay is the time difference between the beginning of data transmissions and the end of all L bulk -bit data transmissions. Then, it can be shown that:
D tx = 1 1 - p sync L bulk T comm S ¯ T period
where S ¯ denotes the average data throughput. We maximize the average data throughput of low-power WSNs in the presence of co-channel interference by adjusting the transmission rate and the payload size, minimizing the transmission delay.

3. Transmission in the Presence of Interference

We estimate the probability of transmission failure and data throughput in the presence of interference and then determine the payload size maximizing the data throughput. We assume that a node transmits data packets without consideration of the channel condition and confirm the transmission by receiving an ACK packet. The data transaction time can be represented as:
T ˜ m = T pkt , m d a t a + T pkt , m a c k + 2 δ
where T pkt , m d a t a = T pkt , m L , T pkt , m a c k = T pkt , m 0 and δ denotes the time from the transmission to the reception state and vice versa. The probability of transmission failure due to the packet collision can be represented as:
p m , c = 1 - 1 - p m , c d a t a 1 - p m , c a c k
where p m , c d a t a and p m , c a c k denote the collision probability of data and ACK packets, respectively.
When a data packet is transmitted in the presence of interference, it may experience the collision with a probability of one (i.e., p m , c | busy = 1 ). Even when it is transmitted in the absence of interference, it may probabilistically experience the collision. Although a WLAN device transmits the signal after carrier sensing-based clear channel assessment (CCA) or energy-based CCA, it may not detect the presence of the signal transmitted by low-power WSN devices. The probability of packet collision can be represented as:
p m , c d a t a = ρ ; if   int .   source   can   detect   data   packets ρ + 1 - ρ   p m , c | i d l e d a t a ; otherwise
where p m , c | i d l e d a t a can be derived in what follows.
For given idle state length T idle and data packet transmission time T pkt , m d a t a , a packet collision may occur if a data packet is transmitted ( T idle - T pkt , m d a t a ) seconds after the beginning of the idle state. Let t d be the time difference between the beginning of the idle state and the presence of a new data packet (i.e., 0 t d T idle ). Assuming that the duration of the idle state is Pareto or exponentially distributed, it can be shown that:
p m , c | i d l e d a t a t d = Pr T idle < t d + T pkt , m d a t a | t d = 1 - t d t d + T pkt , m d a t a σ ; Pareto   dist . 1 - exp - τ idle - 1 T pkt , m d a t a ; exp .   dist .
where σ denotes the shape parameter of Pareto distribution. It can be seen that the probability depends on t d when the idle state is Pareto-distributed. When the idle state is exponentially distributed, Equation (11) can be rewritten as:
p m , c d a t a = ρ ; if   int .   source   can   detect   data   packets 1 - 1 - ρ exp - τ idle - 1 T pkt , m d a t a ; otherwise .
Similarly, it can be shown that the collision probability of an ACK packet after successful data packet transmission can be represented as:
p m , c a c k = 1 - exp - τ idle - 1 δ + T pkt , m a c k .
The probability of transmission failure due to the packet collision can be represented as:
p m , c L = 1 - 1 - ρ exp - L + α m R m τ idle
where α m is a constant indifferent from the payload size L and can be determined as:
α m = α m R m = 2 T base + L mhr d a t a + L mhr a c k R m + δ R m .
Here, T base = L shr + L phr L shr + L phr R base R base , L mhr d a t a and L mhr a c k respectively denote the MHR bit size of the data and the ACK packet.
It can be shown that the data throughput can be represented as:
S m L , γ = R m L L + β m 1 - ρ exp - L + α m R m τ idle 1 - b base , s γ L phr d a t a + L phr a c k 1 - b m , s γ L + L mhr d a t a + L mhr a c k
where β m = β m R m = α m + δ R m and b base , s denotes the BER of PHR transmission. Assuming that b base , s and b m , s are very low with the use of an appropriate transmission rate in the absence of interference, Equation (17) can be approximated as:
S m L , γ R m L L + β m 1 - ρ exp - L + α m R m τ idle .
Taking the derivative of Equation (18) with respect to L, i.e.,
S m L = - τ idle - 1 1 - ρ L + β m 2 exp - L + α m R m τ idle L 2 + β m L - β m R m τ idle
we can see that there exists a payload size that maximizes the data throughput. This implies a tradeoff between the packet transmission efficiency and the probability of transmission failure. The use of a smaller payload size may improve the robustness to interference, but it may also increase the signaling overhead, deteriorating the overall transmission efficiency.
The payload size maximizing the data throughput can be determined as:
L m - β m 2 + β m 2 2 + β m R m τ idle .
It can be seen that the payload size depends on the average idle period of interference, τ idle , and the transmission rate R m , as well. With β m = β m R m , Equation (20) can be rewritten as:
L m = - β m 2 + β m 2 2 + β m τ idle R m = T m R m
where T m denotes the payload transmission time that maximizes the data throughput. It can be shown that:
L m R m = T m + R m T m R m > > T m R m .
Since R m is typically large, Equation (22) implies that the sensitivity of the payload transmission time with respect to the transmission rate is much smaller than that of the payload size. Moreover, T m depends on β m . The sensitivity of β m with respect to the transmission rate is much smaller than that of β m . The transmission time can approximately be represented as:
T m v - β 2 + β 2 2 + β τ idle = T .
It can be seen that T depends on τ idle and not on the transmission rate. Note that the payload size L m depends on the transmission rate.

4. Proposed Transmission Scheme

Exploiting the above investigation, we consider the performance improvement of low-power WSNs in the presence of interference. We determine the initial payload size based on the interference characteristics estimated by Equation (20). Exploiting Equation (23), we adjust the transmission rate R and the transmission time T in response to the change of channel and interference condition, respectively. Algorithm 1 summarizes the proposed scheme.
Algorithm 1: Overall process of the proposed scheme
 1:
Initialize R R init using γ ˜
 2:
Initialize L L init using τ ˜ idle and R
 3:
L median L min , L , L max
 4:
T L L R R
 5:
Initialize I T 1 and S ˜ new , S ˜ old 0
 6:
while L bulk -bit data are not delivered do
 7:
for i = 1:W do
 8:
  Transmit a data packet with R and L
 9:
  if an ACK packet is received then
10:
    n fail 0
11:
    S ˜ new S ˜ new + T T T + β T + β
11:
   Update R using γ ˜
13:
    L median L min , R T , L max
14:
    T L L R R
15:
   else
16:
    n fail + +
17:
   if n fail > N fail then
18:
     R R 1
19:
     L median L min , R T , L max
20:
     T L L R R
21:
   end if
22:
  end if
23:
end for
24:
 Update T by Algorithm 2
25:
L median L min , R T , L max
26:
T L L R R
27:
end while
We initially determine the payload size by estimating the average idle period of interference. We define the interference estimation interval by the dedicated interval within the first data communication interval of a pair of scheduled nodes. With the use of an energy-type detector for the channel sensing, the transmitter node can estimate the channel occupancy of interference signal as:
ρ ˜ = 1 N s j = 1 N s I y j > λ
where I · is an indicator function, y j is the energy of the j-th received sample, λ is a threshold level and N s is the total number of samples for the measurement. It can be shown that the average busy period of interference can be estimated as:
τ ˜ busy = 1 N busy j = 1 N busy n busy , j T s
where N busy is the number of busy periods, n busy , j is the length of the j-th busy period and T s is the channel sensing interval. Finally, the average idle period of interference can be estimated as:
τ ˜ idle = τ ˜ busy 1 ρ ˜ - 1 .
As an example, when N s = 10 and T s = 320 us , assume that the result of channel sensing is {O,O,X,X,X,O,X,X,X,X}, where “O” and “X” denote the presence and the absence of interference, respectively. Then, it is estimated that the channel occupancy of interference signal is 0.3; the average busy period of interference is 480 usand the average idle period of interference is 1.12 ms, since N busy = 2 , n busy , 1 = 2 and n busy , 2 = 1 . The initial payload size can be determined as:
L init = - β m 2 + β m 2 2 + β m R m τ ˜ idle
where the initial transmission rate can independently be determined in what follows.
The transmitter node determines the transmission rate based on the estimated SNR. It determines the transmission rate of the next data packet based on the received signal strength (RSS) of the ACK packet received most recently. It can determine the initial transmission rate from the RSS of received packets. For an estimated SNR γ ˜ , it determines the transmission rate by the highest transmission rate R m that satisfies γ ˜ γ ^ m , where γ ^ m is the minimum SNR for transmission mode m, which can provide the desired packet error rate of p s with the use of maximum payload size in the absence of interference and can be represented by:
γ ^ m = b m , s - 1 1 - p s 1 1 L max L max .
Here, b m , s - 1 denotes the inverse function of b m , s . As described in Section 2, the packet loss can occur due to low SNR and/or packet collision. If the packet loss is mainly due to the low SNR, it may be desirable to decrease the transmission rate R. If it is mainly due to the packet collision, it may be desirable to decrease the transmission time T to reduce the collision probability.
Consider the case that the transmission failure consecutively occurs due to the packet collision, and the transmitter node decreases the transmission rate. Then, the transmission time will be increased, and thus, the packet collision problem may rather be exacerbated. This problem can be alleviated by adjusting the transmission rate and the transmission time together. If the number of consecutive transmission failures reaches a threshold N fail , the transmitter node reduces the transmission rate, while keeping the transmission time T unchanged. If the transmission rate is adjusted from R a to R b , it may be desirable to adjust the payload size from L a to L b as:
L b = R b T = R b L a R a .
It may be feasible for the transmitter node to adjust the transmission time T according to the interference condition, while adjusting the transmission rate according to the channel condition. The normalized throughput, defined by S ˜ = S m S m R m R m , can be estimated by:
S ˜ = T T + β i = 1 W I ACK   packet   is   received   for   the   i - th   data   packet
after performance measurement of W-packet transmission. Note that this metric is not affected by the adjustment of the transmission rate since it is normalized with respect to the transmission rate. After each W-packet transmission, the transmitter node updates the normalized throughput, say S ˜ new . Comparing S ˜ new with a previous one, say S ˜ old , it can adjust the transmission time T to increase the normalized throughput. Let Δ be the step size for the adjustment of transmission time and I T = ± 1 be a parameter indicating whether the transmission time was increased or decreased previously. If S ˜ new > η S ˜ old , where η 1 , it implies that the transmission time was effectively adjusted. In this case, it may be desirable to keep the adjustment. The transmitter node increases or decreases the transmission time by Δ according to I T . If S ˜ old > η S ˜ new , it implies that the previous adjustment was not effective, requiring the change of the sign of I T (i.e., I T - I T ). Then, the transmitter node adjusts the transmission time by I T Δ . Otherwise, the transmitter node does not adjust the transmission time. It may also be desirable to change the step size in consideration of the difference between S ˜ new and S ˜ old . If the difference is large, it may be desirable to use a larger step size to quickly adjust the transmission time. Algorithm 2 summarizes the adjustment of the transmission time.
Algorithm 2: Adjustment of transmission time
 1:
if S ˜ new > S ˜ old > 0 then
 2:
if S ˜ new > η 1 S ˜ old then
 3:
   T Δ 1 I T T
 4:
else if S ˜ new > η 2 S ˜ old then
 5:
   T T + I T Δ 2
 6:
end if
 7:
else
 8:
if S ˜ old > η 1 S ˜ new then
 9:
   T Δ 1 - I T T
10:
else if S ˜ old > η 2 S ˜ new then
11:
   T T - I T Δ 2
12:
end if
13:
I T - I T
14:
end if
15:
S ˜ old S ˜ new and S ˜ new 0

5. Performance Evaluation

We evaluate the performance of the proposed scheme by computer simulation using a lab-developed WSN simulator written in C++. Figure 3 depicts the simulator structure, which considers data transmission from the network coordinator to its child nodes in the presence of IEEE 802.11g WLAN interference signals [38,39] in a Ricean fading channel with a maximum Doppler frequency of f D [36]. For the performance evaluation, we use Monte Carlo simulation of 300 iterations, each of which runs 1 . 5 × 10 5 simulation time slots.
The simulation environment is summarized in Table 1, which is mainly based on the specification of the IEEE 802.15.4 PHY layer. For comparison, we also consider the performance of seven schemes; an IEEE 802.15.4 baseline scheme at a transmission rate of 250 Kbps with a fixed payload size, DRACER, which adjusts a transmission rate with a fixed payload size [22], DPLC, which adjusts a payload size at a fixed transmission rate of 250 Kbps [23], DRACER with DPLC that adjusts the transmission rate and the payload size by using DRACER and DPLC, respectively, a streaming data link layer scheme, which is a static PPR scheme referred to as Seda [25], a hybrid frame fragmentation scheme, which is a dynamic PPR scheme referred to as HiFrag [27], and a green frame fragmentation scheme, which is a combination of HiFrag and transmit power adaptation, referred to as GreenFrag [28]. The proposed scheme and DRACER use one of four transmission rates, 250, 500, 1000 and 2000 Kbps, by adjusting the spreading factor with an appropriate coding set, while using the same spectrum bandwidth as conventional IEEE 802.15.4 [22,41,42]. The transmission rate can be informed to the receiver using a start frame delimiter (SFD) without additional signaling overhead [22]. Considering application areas of WSNs, we assume that the maximum payload size is 1024 bytes, which is larger than that of the conventional IEEE 802.15.4 PHY layer (i.e., 127 bytes). Note that IEEE 802.15.4g, a recent amendment of IEEE 802.15.4, supports a maximum payload size of up to 2047 bytes with using almost the same PHY layer techniques as IEEE 802.15.4 [43].
Figure 4 depicts the data throughput according to data payload size when the channel occupancy of the interference signal, ρ, is zero and 0.2. The error bar represents the standard deviation of the simulation result. To observe the impact of the channel occupancy of interference signal on the performance, we assume that f D = 0 Hz . We also assume that the SNR is high enough so that the transmitter can employ all of the transmission rates. It can be seen that when ρ = 0 , the data throughput increases indifferently from the transmission rate as the payload size increases, which is mainly due to the decrease of the header signaling overhead. When ρ = 0 . 2 , however, there exists a payload size maximizing the data throughput at each transmission rate. It is mainly due to the fact that the use of a larger payload size may become more susceptible to the collision. It can also be seen that the analytical results agree very well with the simulation results.
Figure 5 depicts the energy consumption (in uJoule/bit) of the WSN transmitter and receiver according to the data payload size when ρ = 0 and 0.2, which is measured from the power consumption for the transmission and reception of all packets and the power consumption during idle listening (i.e., waiting a packet), as well. It can be seen that when ρ = 0 , the energy consumption somewhat decreases as the payload size increases mainly due to the increase of the throughput. Note that the energy consumption E = P a v g P a v g S S may increase as the payload size increases, where P a v g denotes the average power consumption. When ρ = 0 . 2 , however, there exists a payload size that minimizes the energy consumption, which is slightly different from the one that maximizes the throughput. This is mainly due to the fact that P a v g varies with the payload size. It can also be seen that the use of a higher transmission rate considerably reduces the power consumption, implying that the transmission rate should be adjusted according to the channel condition.
Figure 6 depicts the normalized throughput according to the transmission time. It can be seen that the normalized throughput and the optimum transmission time are quite affected by the channel occupancy of the interference signal, but little by the transmission rate. Note that the data throughput and the optimum payload size depend on the transmission rate. This property makes it desirable to adjust the transmission time according to the interference condition and the transmission rate according to the channel condition.
Figure 7 depicts the data throughput according to the channel occupancy of the interference signal when the SNR is 8 dB and the maximum Doppler frequency is 0.1 Hz, where the IEEE 802.15.4 baseline and DRACER use a fixed payload size of 300 or 1000 bytes, DPLC uses an initial payload size of 300 or 1000 bytes and adjusts it according to the performance and Seda, HiFrag and GreenFrag use their own frame structure proposed in their works, whereas the proposed scheme determines the initial payload size by estimating the average idle period of interference and then adjusts it according to the throughput performance. It can be seen that the IEEE 802.15.4 baseline provides very poor throughput performance even with the use of a large payload size (i.e., 300 or 1000 bytes) mainly due to the use of a low fixed transmission rate. It can also be seen that DRACER can improve the throughput performance by adjusting the transmission rate, but it may suffer from performance degradation with the use of a small fixed payload size in the absence of interference, which is mainly due to the transmission inefficiency, or with the use of a large fixed payload size in the presence of interference, which is mainly due to the increase of packet collision. We consider two DRACER schemes; DRACER I, which transmits packets at the highest rate regardless of transmission failure, and DRACER II, which adjusts the transmission rate in response to transmission failure. It was reported that these schemes are effective in an interference and a channel fading environment, respectively [22]. However, it can be seen that DRACER I and II make little difference on the transmission performance. This is mainly because they do not consider the effect of the payload size in the presence of interference, yielding inefficient use of white space. It can also be seen that DPLC can little improve the throughput performance even with the use of DRACER. This is mainly because it does not consider the effect of the transmission rate adjustment with a fixed step size of 10 bytes regardless of the transmission rate [23], yielding inefficient use of white space and slow adaptation of the payload size. It can also be seen that the proposed scheme significantly outperforms the other schemes by adjusting both the transmission rate and the transmission time in response to the change of interference and channel condition. It can also be seen that the PPR schemes (i.e., Seda, HiFrag and GreenFrag) may provide throughput improvement over the IEEE 802.15.4 baseline in the presence of co-channel interference. This is mainly because they partition the data packet into a number of small blocks and adapt the block size based on the transmission performance, which may provide robustness to co-channel interference. It can also be seen that they may outperform DPLC, which is mainly due to fast adaptation of the block size. However, PPR schemes may severely suffer from the presence of co-channel interference, mainly due to the frequent loss of recovery frames. It can also be seen that their performances are limited mainly due to the use of a low fixed transmission rate, fixed frame structure and small maximum payload size. It may not be easy for the PPR schemes to increase the maximum payload size and the transmission rate since the computational complexity may considerably increase as the number of blocks for the packet partitioning increases.
Figure 8 depicts the throughput according to the SNR when ρ = 0 and 0.2. Since DPLC does not provide noticeable performance improvement over the IEEE 802.15.4 baseline and DRACER, we hereafter consider the performances of the IEEE 802.15.4 baseline and DRACER for the clarity of description. It can be seen that DRACER can improve the performance of the IEEE 802.15.4 baseline by using a large payload size in the absence of interference and a small payload size in the presence of interference. However, there is no proposed strategy when to employ DRACER I and II and how to adjust the payload size together in the presence of interference and channel fading. It can also be seen that the proposed scheme can significantly improve the throughput performance by independently adjusting the transmission rate and the transmission time according to the interference characteristics and channel condition, respectively. It can be seen that GreenFrag provides poorer throughput performance than HiFrag, although GreenFrag is a combination of HiFrag and transmit power adaptation, where it uses a transmit power level of 0, −3, −7, −15 or −25 dBm. When GreenFrag confirms good transmission performance, it reduces the transmit power without consideration of the channel condition. This may cause a ping-pong effect, seriously deteriorating the throughput performance. In fact, GreenFrag may not work well unless the SNR is sufficiently high (e.g., >30 dB).
Figure 9 depicts the energy consumption (in uJoule/bit) according to the SNR when ρ = 0 and 0.2. The power consumption of GreenFrag is measured at various power levels [28]. It can be seen that the power consumption increases when the SNR decreases or the channel occupancy of the interference signal increases, which is mainly due to the increase of transmission failure. It can also be seen that the proposed scheme reduces the power consumption by adjusting the transmission rate and the transmission time. However, the gain in power consumption is somewhat marginal. It is mainly because the use of a larger payload size in the absence of interference may increase the data throughput and the average power consumption, as well.
Table 2 summarizes the transmission delay according to the SNR when ρ = 0 and 0.2, where T period = 983 . 04 ms , T comm = 0 . 5   T period and L bulk = 65 Kbytes . It can be seen that the transmission delay decreases when the SNR increases or the channel occupancy of the interference signal decreases, which is mainly due to the increase of the data throughput. It can also be seen that the proposed scheme and DRACER significantly outperform the other schemes, which is mainly due to the transmission rate adjustment. It can also be seen that the proposed scheme can reduce the transmission delay further than DRACER both in the absence and the presence of interference. This is mainly because the proposed scheme can adjust both the transmission rate and the payload size to maximize the data throughput in response to the change of operation environments.
Figure 10b,c depicts the throughput in the presence of the interference signal with ρ = 0 . 2 and a mobility of 3 km/h, as illustrated in Figure 10a, where the SNR slowly changes with a value of 35∼40 dB, but the SINR changes from −20 to 20 dB when the maximum transmission rate is limited to 2 Mbps and 250 Kbps, respectively. Figure 10b depicts the performance of the proposed scheme and DRACER since they outperform the other schemes. It can be seen that DRACER I outperforms DRACER II, which is mainly because it keeps the highest rate indifferently from the transmission failure. When the SNR is not high enough to employ the highest rate, however, DRACER I may not outperform DRACER II (as shown in Figure 7). It can also be seen that the proposed scheme outperforms DRACER I and II by adjusting both the transmission rate and the payload size, maximally exploiting the white space of the interference signal. The performance gap between the proposed scheme and DRACER I increases as the SNR decreases. Figure 10c depicts the performance of the proposed scheme without adjustment of the transmission rate, DPLC and the PPR schemes. It can be seen from Figure 10c that DPLC provides poor throughput performance, which is mainly due to the slow adaptation of the payload size. It can also be seen that the performance of PPR schemes is limited mainly due to the use of a fixed frame structure and small maximum payload size. It can also be seen that the proposed scheme outperforms the other schemes, which is mainly due to the fast adaptation of the payload size with a large maximum payload size. Note that it may not be easy for the PPR schemes to increase the maximum payload size since the computational complexity may considerably increase as the number of blocks for the packet partitioning increases.

6. Conclusions and Future Works

In this paper, we have considered the performance improvement of low-power WSNs in practical operation environments, where strong co-channel interference may exist. We have investigated the throughput performance of WSNs in the presence of interference and then designed a transmission scheme to maximize it. We have considered the adjustment of transmission rate and transmission time in response to the change of operation environments. The analytic and simulation results show that the proposed scheme significantly improves throughput, while preserving energy efficiency even in the presence of severe interference. For channel diversity, it may be helpful to use a dynamic channel hand-off mechanism (e.g., [40]). The proposed scheme can directly be applied to IEEE 802.15.4e DSME MAC [44] and 15.4g PHY-based [43] WSNs. It can also be applied to a tree or mesh topology with an appropriate link scheduling scheme that can provide robustness to collision between multiple communication links [45,46].

Acknowledgments

This work was supported by the ICT R&D program of MSIP/IITP, Republic of Korea (B0717-16-0025, Design of low-power wireless communication technology that supports massive number of devices in unlicensed spectrum band).

Author Contributions

Jin-Seok Han conceived of the main idea of this paper, performed the mathematical analysis and designed the overall architecture of the proposed scheme. The performance evaluations were conducted by Jin-Seok Han. Yong-Hwan Lee directed the academic research. The writing of the paper was completed by Yong-Hwan Lee.

Conflicts of Interest

The authors declare no conflict of interest. The founding sponsors had no role in the design of the study; in the collection, analyses or interpretation of data; in the writing of the manuscript; nor in the decision to publish the results.

Appendix A. Minimum SINR for IEEE 802.15.4 Communications

The minimum SINR to achieve a desired packet error rate of p s with the use of packet size L can be represented as:
γ ^ = b - 1 1 - p s 1 / L
where b denotes the BER and b - 1 denotes its inverse. The BER of IEEE 802.15.4 PHY can be represented as [35]:
b γ = 8 15 × 1 16 × k = 2 16 - 1 k 16 k e 20 γ 1 k - 1 .
Since the BER is a decreasing function of SINR, it can be seen that b γ has an inverse function. However, it may not be feasible to obtain the inverse function of (A2) in a closed form. A numerical method can be applied to approximately calculate (A1). Table A1 summarizes the minimum SINR according to the packet size L.
Table A1. Minimum SINRs for IEEE 802.15.4 communications.
Table A1. Minimum SINRs for IEEE 802.15.4 communications.
L20 Bytes40 Bytes60 Bytes80 Bytes100 Bytes120 Bytes
γ ^ 0.40 dB0.68 dB0.83 dB0.93 dB1.01 dB1.07 dB

Appendix B. Derivation of Equation (2)

It can be shown that the packet error rate (PER) without channel coding in the presence of interference can be represented as:
p = 1 - 1 - b γ SNR L pkt - L int 1 - b γ SINR L int
where b γ denotes the BER at an SNR of γ, γ SNR denotes the SNR in the absence of interference, γ SINR denotes the SINR in the presence of interference signal, L pkt denotes the bit size of a packet and L int L pkt denotes the number of bits colliding with the interference signal. Since L int can randomly be changed, the average PER can be represented as:
p ¯ = E L int p = 1 - 1 - p s E L int K L int
where p s = 1 - 1 - b γ SNR L pkt and K = 1 - b γ SINR 1 - b γ SINR 1 - b γ SNR 1 - b γ SNR . Note that 0 . 5 < K < 1 since 0 < b γ SNR < 0 . 5 , 0 < b γ SINR < 0 . 5 and b γ SNR < b γ SINR . Without information on the probability distribution function of L int , it may not be easy to calculate the expectation. For ease of calculation, define a random variable φ by:
φ = 1 ; L int = 0 0 ; L int > 0
It can be shown from φ K L int for all L int that:
p ˜ = 1 - 1 - p s 1 - p c 1 - 1 - p s E L int K L int = p ¯
where p c denotes the probability of transmission failure assuming that the packet transmission is failed whenever the collision occurs and equals 1 - E L int φ . The assumption may be valid if SINR is sufficiently low. Table B1 summarizes pairs of γ SINR and L int yielding K L int < 0 . 01 for IEEE 802.15.4 communications.
Table B1. Conditions making K L int < 0.01 for IEEE 802.15.4 communications.
Table B1. Conditions making K L int < 0.01 for IEEE 802.15.4 communications.
b γ SINR 0.010.10.20.30.40.44
γ SINR −2.5 dB−5.6 dB−7.5 dB−9.5 dB−12.5 dB−14.6 dB
L int 57.3 bytes5.5 bytes2.6 bytes1.6 bytes1.1 bytes<1 byte

References

  1. Wheeler, A. Commercial Applications of Wireless Sensor Networks Using ZigBee. IEEE Commun. Mag. 2007, 45, 70–77. [Google Scholar] [CrossRef]
  2. Sikora, A.; Groza, V. Coexistence of IEEE 802.15.4 with Other Systems in the 2.4 GHz-ISM-Band. In Proceedings of the 2005 IEEE Instrumentation and Measurement Technology Conference (ITMC), Ottawa, ON, Canada, 16–19 May 2005; pp. 1786–1791.
  3. Angrisani, L.; Bertocco, M.; Fortin, D.; Sona, A. Experimental Study of Coexistence Issues between IEEE 802.11b and IEEE 802.15.4 Wireless Networks. IEEE Trans. Instrum. Meas. 2008, 57, 1514–1523. [Google Scholar] [CrossRef]
  4. Guo, W.; Healy, W.M.; Zhou, M. Impacts of 2.4-GHz ISM band Interference on IEEE 802.15.4 Wireless Sensor Network Reliability in Buildings. IEEE Trans. Instrum. Meas. 2012, 61, 2533–2544. [Google Scholar] [CrossRef]
  5. Han, D.; Gnawali, O. Performance of RPL under Wireless Interference. IEEE Commun. Mag. 2013, 51, 137–143. [Google Scholar]
  6. Shin, S.Y.; Park, H.S.; Choi, S.; Kwon, W.H. Packet Error Rate Analysis of ZigBee under WLAN and Bluetooth Interferences. IEEE Trans. Wirel. Commun. 2007, 6, 2825–2830. [Google Scholar] [CrossRef]
  7. Yuan, W.; Wang, X.; Linnartz, J.-P.M.G.; Niemegeers, I.G.M.M. Coexistence Performance of IEEE 802.15.4 Wireless Sensor Networks Under IEEE 802.11b/g Interference. Wirel. Pers. Commun. 2011, 68, 281–302. [Google Scholar] [CrossRef]
  8. Musaloiu-E, R.; Terzis, A. Minimising the Effect of WiFi Interference in 802.15.4 Wireless Sensor Networks. Int. J. Sens. Netw. 2008, 3, 43–54. [Google Scholar]
  9. Xu, W.; Trappe, W.; Zhang, Y. Defending Wireless Sensor Networks from Radio Interference through Channel Adaptation. ACM Trans. Sens. Netw. 2008, 4, 1–34. [Google Scholar] [CrossRef]
  10. Yi, P.; Iwayemi, A.; Zhou, C. Developing ZigBee Development Guideline under WiFi Interference for Smart Grid Applications. IEEE Trans. Smart Grid 2011, 2, 110–120. [Google Scholar] [CrossRef]
  11. Han, J.S.; Kim, H.S.; Bang, J.S.; Lee, Y.H. Interference Mitigation in IEEE 802.15.4 Networks. In Proceedings of the 2011 IEEE Global Telecommunications Conference (GLOBECOM), Houston, TX, USA, 5–9 December 2011; pp. 1–5.
  12. Tytgat, L.; Yaron, O.; Pollin, S.; Moerman, I.; Demeester, P. Analysis and Experimental Verification of Frequency-Based Interference Avoidance Mechanisms in IEEE 802.15.4. IEEE/ACM Trans. Netw. 2015, 23, 369–382. [Google Scholar] [CrossRef]
  13. Jeong, W.; Lee, J. Performance evaluation of IEEE 802.15.4e DSME MAC protocol for wireless sensor networks. In Proceedings of the 2012 First IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things (ETSIoT), Seoul, Korea, 18 June 2012; pp. 7–12.
  14. Gomez, C.; Oller, J.; Paradells, J. Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology. Sensors 2012, 12, 11734–11753. [Google Scholar] [CrossRef]
  15. Huang, J.; Xing, G.; Zhou, G.; Zhou, R. Beyond Co-Existence: Exploiting WiFi White Space for ZigBee Performance Assurance. In Proceedings of the 18th IEEE International Conference on Network Protocols (ICNP), Kyoto, Japan, 5–8 October 2010; pp. 305–314.
  16. Sha, M.; Hackmann, G.; Lu, C. Real-World Empirical Studies on Multi-Channel Reliability and Spectrum Usage for Home-Area Sensor Networks. IEEE Trans. Netw. Serv. Manag. 2013, 10, 56–69. [Google Scholar] [CrossRef]
  17. Lee, S.H.; Kim, H.S.; Lee, Y.H. Mitigation of Co-Channel Interference in Bluetooth Piconets. IEEE Trans. Wirel. Commun. 2012, 11, 1249–1254. [Google Scholar] [CrossRef]
  18. Zhang, X.; Shin, K.G. Cooperative Carrier Signaling: Harmonizing Coexisting WPAN and WLAN Devices. IEEE/ACM Trans. Netw. 2013, 21, 426–439. [Google Scholar] [CrossRef]
  19. Hou, J.; Chang, B.; Cho, D.K.; Gerla, M. Minimizing 802.11 Interference on ZigBee Medical Sensors. In Proceedings of the Fourth International Conference on Body Area Networks (BodyNets), Los Angeles, CA, USA, 1–3 April 2009; pp. 1–8.
  20. Liang, C.J.M.; Priyantha, N.B.; Liu, J.; Terzis, A. Surviving Wi-Fi Interference in Low Power ZigBee Networks. In Proceedings of the 8th ACM International Conference on Embedded Networked Sensor Systems (SenSys), Zurich, Switzerland, 3–5 November 2010; pp. 309–322.
  21. Guo, P.; Cao, J.; Zhang, K.; Liu, X. Enhancing ZigBee Throughput under WiFi Interference Using Real-Time Adaptive Coding. In Proceedings of the 2014 IEEE International Conference on Computer Communications (INFOCOM), Toronto, ON, USA, 27 April–2 May 2014; pp. 2858–2866.
  22. Lanzisera, S.; Mehta, A.M.; Pister, K. Reducing Average Power in Wireless Sensor Networks through Data Rate Adaptation. In Proceedings of the 2009 IEEE International Conference on Communications (ICC), Dresden, Germany, 14–18 June 2009; pp. 1–6.
  23. Dong, W.; Chen, C.; Liu, X.; He, Y.; Liu, Y.; Bu, J.; Xu, X. Dynamic Packet Length Control in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 2014, 13, 1172–1181. [Google Scholar] [CrossRef]
  24. Chouldhury, S.; Gibson, J.-D. Payload Length and Rate Adaptation for Multimedia Communications in Wireless LANs. IEEE J. Sel. Areas Commun. 2007, 25, 796–807. [Google Scholar]
  25. Ganti, R.K.; Jayachandra, P.; Luo, H.; Abdelzaher, T.F. Datalink Streaming in Wireless Sensor Networks. In Proceedings of the 4th ACM International Conference on Embedded Networked Sensor Systems (SenSys), Boulder, CO, USA, 1–3 November 2006; pp. 209–222.
  26. Shaowail, A.; Elrasad, A.; Meer, A.; Daghistani, A.; Jamshaid, K.; Shihada, B. iFrag: Interference-Aware Frame Fragmentation Scheme for Wireless Sensor Networks. ACM J. Wirel. Netw. 2014, 20, 2019–2036. [Google Scholar] [CrossRef]
  27. Meer, A.; Daghistani, A.; Shihada, B. An Energy Efficient Hybrid Interference-Resilient Frame Fragmentation for Wireless Sensor Networks. In Proceedings of the IEEE 26th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Hong Kong, China, 30 August–2 September 2015; pp. 1024–1029.
  28. Daghistani, A.; Khalifac, A.B.; Showaila, A.; Shihadaa, B. Green Partial Packet Recovery in Wireless Sensor Networks. J. Netw. Comput. Appl. 2015, 58, 267–279. [Google Scholar] [CrossRef]
  29. Zhang, X.; Shin, K.G. E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks. IEEE Trans. Mob. Comput. 2012, 11, 1441–1454. [Google Scholar] [CrossRef]
  30. Kim, H.S.; Cho, H.; Lee, M.S.; Paek, J.; Ko, J.G.; Bahk, S. MarketNet: An Asymmetric Transmission Power-Based Wireless System for Managing e-Price Tags in Markets. In Proceedings of the 13th ACM International Conference on Embedded Networked Sensor Systems (SenSys), Seoul, Korea, 1–4 November 2015; pp. 281–294.
  31. Chebrolu, K.; Raman, B.; Mishra, N.; Valiveti, P.K.; Kumar, R. BriMon: A Sensor Network System for Railway Bridge Monitoring. In Proceedings of the 6th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), Breckenridge, CO, USA, 17–20 June 2008; pp. 2–14.
  32. Werner-Allen, G.; Lorincz, K.; Welsh, M.; Marcillo, O.; Johnson, J.; Ruiz, M.; Lees, J. Deploying a Wireless Sensor Network on an Active Volcano. IEEE Internet Comput. 2012, 10, 18–25. [Google Scholar] [CrossRef]
  33. Kim, S.; Pakzad, S.; Culler, D.; Demmel, J.; Fenves, G.; Glaser, S.; Turon, M. Health Monitoring of Civil Infrastructures Using Wireless Sensor Networks. In Proceedings of the 6th ACM/IEEE International Symposium on Information Processing in Sensor Networks (IPSN), Cambridge, MA, USA, 25–27 April 2007; pp. 254–263.
  34. Paek, J.; Chintalapudi, K.; Cafferey, J.; Govindan, R.; Masri, S. A wireless sensor network for structural health monitoring: Performance and experience. In Proceedings of the 2nd IEEE Workshop on Embedded Networked Sensors (EmNetS-II), Sydney, Australia, 30–31 May 2005; pp. 1–9.
  35. IEEE SA-802.15.4-2006-IEEE Standard for Information technology-Local and metropolitan area networks-Specific requirements-Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (WPANs). Available online: https://standards.ieee.org/findstds/standard/802.15.4-2006.html (accessed on 10 November 2016).
  36. Punnoose, R.-J.; Nikitin, P.-V.; Stancil, D.-D. Efficient Simulation of Ricean Fading within a Packet Simulator. In Proceedings of the IEEE 52nd Vehicular Technology Conference (VTC), Boston, MA, USA, 24–28 September 2000; pp. 764–767.
  37. Ramachandran, I.; Roy, S. On the impact of clear channel assessment on mac performance. In Proceedings of the 2006 IEEE Global Telecommunications Conference (GLOBECOM), San Francisco, CA, USA, 27 November–1 December 2006; pp. 1–5.
  38. Geirhofer, S.; Tong, L.; Sadler, B. Cognitive Medium Access: Constraining Interference Based on Experimental Models. IEEE J. Sel. Areas Commun. 2008, 26, 95–105. [Google Scholar] [CrossRef]
  39. Glaropoulos, I.; Luna, A.-V.; Fodor, V.; Papadopouli, M. Closing the Gap between Traffic Workload and Channel Occupancy Models for 802.11 Networks. Ad Hoc Netw. 2014, 21, 60–83. [Google Scholar] [CrossRef]
  40. Han, J.S.; Kim, T.H.; Lee, Y.H. Robust Transmission of the IEEE 802.15.4 Signal in the Presence of Co-Channel Interference. In Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, China, 7–10 April 2013; pp. 53–58.
  41. Atmel AT86RF231. Available online: http://www.atmel.com/devices/at86rf231.aspx (accessed on 10 November 2016).
  42. Qin, F.; Mitchell, J.E. Performance Estimation of Adaptive Spreading Code Length for Energy Efficient WSN. In Proceedings of the 7th Conference on Wireless Advanced (WiAD), London, UK, 20–22 June 2011; pp. 81–84.
  43. IEEE SA-802.15.4g-2012: IEEE Standard for Local and Metropolitan Area Networks-Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 3: Physical Layer (PHY) Specifications for Low-Data-Rate, Wireless, Smart Metering Utility Networks. Available online: http://standards.ieee.org/findstds/standard/802.15.4g-2012.html (accessed on 10 November 2016).
  44. IEEE SA-802.15.4e-2012: IEEE Standard for Local and Metropolitan Area Networks-Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1: MAC sublayer. Available online: http://standards.ieee.org/findstds/standard/802.15.4e-2012.html (accessed on 10 November 2016).
  45. Jin, X.; Zhang, Q.; Zeng, P.; Kong, F.; Xiao, Y. Collision-free multichannel superframe scheduling for IEEE 802.15.4 cluster-tree networks. Int. J. Sens. Netw. 2014, 15, 246–258. [Google Scholar] [CrossRef]
  46. Lee, W.; Hwang, K.; Jeon, Y.; Choi, S. Distributed Fast Beacon Scheduling for Mesh Networks. In Proceedings of the 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), Valencia, Spain, 17–22 October 2011; pp. 727–732.
Figure 1. signal-to-interference-plus-noise ratio (SINR) of IEEE 802.15.4 in the presence of co-channel interference.
Figure 1. signal-to-interference-plus-noise ratio (SINR) of IEEE 802.15.4 in the presence of co-channel interference.
Sensors 16 01910 g001
Figure 2. A star-topology WSN in a synchronized operation mode.
Figure 2. A star-topology WSN in a synchronized operation mode.
Sensors 16 01910 g002
Figure 3. WSN simulator structure.
Figure 3. WSN simulator structure.
Sensors 16 01910 g003
Figure 4. Throughput according to the payload size. (a) When ρ = 0; (b) When ρ = 0.2.
Figure 4. Throughput according to the payload size. (a) When ρ = 0; (b) When ρ = 0.2.
Sensors 16 01910 g004
Figure 5. Energy consumption according to the payload size.
Figure 5. Energy consumption according to the payload size.
Sensors 16 01910 g005
Figure 6. Normalized throughput according to the transmission time.
Figure 6. Normalized throughput according to the transmission time.
Sensors 16 01910 g006
Figure 7. Throughput according to the change of interference. (a) When L = 300 bytes; (b) When L = 1000 bytes.
Figure 7. Throughput according to the change of interference. (a) When L = 300 bytes; (b) When L = 1000 bytes.
Sensors 16 01910 g007
Figure 8. Throughput according to the SNR. (a) When ρ = 0; (b) When ρ = 0.2.
Figure 8. Throughput according to the SNR. (a) When ρ = 0; (b) When ρ = 0.2.
Sensors 16 01910 g008
Figure 9. Energy consumption according to the SNR. (a) When ρ = 0; (b) When ρ = 0.2.
Figure 9. Energy consumption according to the SNR. (a) When ρ = 0; (b) When ρ = 0.2.
Sensors 16 01910 g009
Figure 10. Transmission performance in the presence of mobile interference source. (a) Simulation scenario (without any shadowing); (b) Throughput according to time when the maximum R is 2 Mbps; (c) Throughput according to time when the maximum R is limited to 250 Kbps.
Figure 10. Transmission performance in the presence of mobile interference source. (a) Simulation scenario (without any shadowing); (b) Throughput according to time when the maximum R is 2 Mbps; (c) Throughput according to time when the maximum R is limited to 250 Kbps.
Sensors 16 01910 g010aSensors 16 01910 g010b
Table 1. Simulation parameters. SHR, synchronization header; PHR, physical layer packet header; MHR, MAC layer packet header; CCA, clear channel assessment.
Table 1. Simulation parameters. SHR, synchronization header; PHR, physical layer packet header; MHR, MAC layer packet header; CCA, clear channel assessment.
ParametersValues
SHR and PHR sizes ( L shr , L phr ) 5 bytes, 1 byte
MHR size of data and ACK ( L mhr d a t a , L mhr a c k ) 9 bytes, 5 bytes
Transmission rate of SHR and PHR ( R base ) 250 Kbps
Transmission rate of MHR and payload ( R ) 250/500/1000/2000 Kbps
(variable rate transceiver structure)[22,41,42]
Path loss modelChannel model in [35]
Transmit power0 dBm
Turnaround time ( δ ) 192 us
Channel sensing interval ( T s ) 320 us
Total data size ( L bulk ) 65 Kbytes
Power consumption during transmission49.9 mW
Power consumption during reception56.5 mW
Power consumption in the idle mode1.2 mW
Transmission failure threshold ( N fail ) 3
Payload adjustment threshold ( η ) 1.2
Step size ( Δ 1 , Δ 2 ) 2 (no unit), 320 us
Window size ( W ) 10
Payload size limit ( L min , L min ) 20 bytes, 1024 bytes
Period of the frame ( T period ) 983.04 ms
Length of the data communication interval ( T comm ) 491.52 ms
Simulation time slot40 us
Maximum Doppler frequency ( f D ) 0.1 Hz
WLAN packet length ( τ busy ) 2 ms
WLAN idle state distributionExponential
WLAN CCA typeCarrier sensing
WLAN transmit power17 dBm
Table 2. Transmission delay according to the SNR when ρ = 0 and 0.2 (unit: s). DRACER, dynamic rate adaptation and control for energy reduction; HiFrag, hybrid frame fragmentation scheme.
Table 2. Transmission delay according to the SNR when ρ = 0 and 0.2 (unit: s). DRACER, dynamic rate adaptation and control for energy reduction; HiFrag, hybrid frame fragmentation scheme.
SNR2 dB2 dB6 dB6 dB12 dB12 dB
ρ 00.200.200.2
DRACER I (300 B)5.919.03.97.02.03.0
DRACER I (1000 B)6.946.02.911.01.03.0
DRACER II (300 B)6.917.03.97.02.03.0
DRACER II (1000 B)5.961.12.914.01.03.0
15.4 baseline (300 B)7.934.15.928.14.924.0
15.4 baseline (1000 B)7.9690.45.9396.84.9396.8
Seda8.819.06.916.05.914.0
HiFrag8.818.06.915.05.914.0
GreenFrag13.820.012.815.011.814.0
Proposed scheme5.914.02.06.01.03.0

Share and Cite

MDPI and ACS Style

Han, J.-S.; Lee, Y.-H. Interference-Robust Transmission in Wireless Sensor Networks. Sensors 2016, 16, 1910. https://doi.org/10.3390/s16111910

AMA Style

Han J-S, Lee Y-H. Interference-Robust Transmission in Wireless Sensor Networks. Sensors. 2016; 16(11):1910. https://doi.org/10.3390/s16111910

Chicago/Turabian Style

Han, Jin-Seok, and Yong-Hwan Lee. 2016. "Interference-Robust Transmission in Wireless Sensor Networks" Sensors 16, no. 11: 1910. https://doi.org/10.3390/s16111910

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop