You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

26 July 2017

Exploiting Concurrent Wake-Up Transmissions Using Beat Frequencies

,
and
1
Department of Microsystems Engineering – IMTEK, Laboratory for Electrical Instrumentation, University of Freiburg, Georges-Koehler-Allee 106, 79110 Freiburg, Germany
2
Department of Computer Science – IIF, Computer Networks and Telematics, University of Freiburg, Georges-Koehler-Allee 51, 79110 Freiburg, Germany
*
Author to whom correspondence should be addressed.
This article belongs to the Section Sensor Networks

Abstract

Wake-up receivers are the natural choice for wireless sensor networks because of their ultra-low power consumption and their ability to provide communications on demand. A downside of ultra-low power wake-up receivers is their low sensitivity caused by the passive demodulation of the carrier signal. In this article, we present a novel communication scheme by exploiting purposefully-interfering out-of-tune signals of two or more wireless sensor nodes, which produce the wake-up signal as the beat frequency of superposed carriers. Additionally, we introduce a communication algorithm and a flooding protocol based on this approach. Our experiments show that our approach increases the received signal strength up to 3 dB, improving communication robustness and reliability. Furthermore, we demonstrate the feasibility of our newly-developed protocols by means of an outdoor experiment and an indoor setup consisting of several nodes. The flooding algorithm achieves almost a 100% wake-up rate in less than 20 ms.

1. Introduction

Recently, more and more wireless sensor networks [1,2,3,4,5] have been deployed with low-power wake-up receivers. They listen permanently to the wireless channel, but have a marginal and constant power consumption. Only when a wake-up receiver detects a valid wake-up message does it activate the sensor node. Sensor nodes with wake-up receivers are no longer bound to a fixed duty-cycling, but are able to communicate whenever necessary, for example directly following a sensor read-out or when several sensor readings are accumulated into a large transmission package. Consequently, low-power wake-up receivers can greatly reduce the power consumption of wireless sensor nodes, as investigated for example in [6].
However, due to the limitations introduced by the low- to ultra-low-power consumption, the sensitivity of wake-up receivers is usually lower than that of state-of-the-art radio transceivers. In the cases of fading channels, it can happen that a wireless sensor node becomes out-of-reach of any other sensor node, for example due to fading simply caused by changes in the environment or in the network topology that increase path losses. In these cases, a sensor node might become temporarily or permanently disconnected from the wireless sensor network, although it is still alive. Figure 1 shows this scenario where Node-3 is out of the wake-up range of either Node-1 or -2 due to an outage of Node-4.
Figure 1. Node-3 is out of the wake-up range due to an outage of Node-4.
To improve the reliability and to reduce packet losses, some existing network protocols [7] use concurrent packet transmissions that interfere in a constructive way. The feasibility of concurrent transmissions is demonstrated mainly in the area of IEEE 802.15.4-compliant radios. The IEEE 802.15.4 protocol maps four-bit symbols to 32-bit pseudo-noise sequences that have a length of 0.5 µs at 868 MHz. In order to achieve constructive interferences, this imposes a time constraint of 0.5 µs, which is not easily accomplished.
In this article, we present a novel communication protocol to send wake-up messages by purposefully-interfering signals of two or more wireless sensor nodes, which produce the wake-up signal as the beat frequency of superposed slightly out-of-tune carriers. We investigate the method theoretically and demonstrate its feasibility with the help of several experimental setups. The rest of the article is structured as follows. In Section 2, we briefly introduce the principles of concurrent transmissions, as well as wake-up receivers that use on-off keying-modulated wake-up messages. Furthermore, we introduce the main features of Zippy [8], a flooding protocol that is based on concurrently-transmitted wake-up packets. Then, we investigate concurrent wake-up messages theoretically in Section 3 followed by two newly-introduced communication protocols that are based on concurrent wake-up messages in Section 4. In Section 5, we present the experimental results and conclude our article in Section 6.

3. Concurrent Wake-Up Message

As introduced above, one of the major challenges of ultra-low power wake-up receivers is their low sensitivity. Due to this, they are susceptible to signal outages caused by fading channels, and their input signal quickly goes below their sensitivity threshold. As shown in the previous Section 2, constructive interference can improve the reliability of transmissions.
When two senders transmit the same message simultaneously to a common receiver, constructive or destructive interference can happen. Constructive interference helps the common receiver detect a message and improves the reliability of the transmission [14]. Considering the example given in Figure 6, Node-1 and Node-2 simultaneously send a wake-up message to Node-3 to achieve constructive interference.
Figure 6. Node-1 and Node-2 send a concurrent wake-up to Node-3.

3.1. Two Concurrent Senders

In case of two concurrently-sent wake-up packets, a possible and probable existing phase-shift ϕ of one of the signals has to be considered. There will be a superposed signal y ( t ) of the form of Equation (1):
y ( t ) = A 1 e j ω 1 t + A 2 e j ω 1 t = ( A 1 + A 2 ) e j ω 1 t
with A 1 and A 2 C such that A 1 = r 1 e j ϕ 1 and A 2 = r 2 e j ϕ 2 with r 1 , r 2 R are the signal amplitudes and ϕ 2 ϕ 1 the phase shift between the two signals. Furthermore, ω 1 = 2 π f 1 is the angular frequency of the two superposed sinusoidal waves. However, due to the periodicity of the sinusoidal signals, a destructive interference will take place in the range of 2 / 3 π < ϕ 2 ϕ 1 < 4 / 3 π , which will finally lead to an unreliable communication.
The superposed signal y ( t ) as introduced in Equation (1) above is the sum of two sinusoidal signals having the same frequency f 1 . The following Equations (2) and (3) show the same sum of two sinusoidal functions having different frequencies f 1 and f 2 , but highlight different aspects. Equation (2) expresses y ( t ) as the sum of two sinusoidal functions with angular frequencies ω 1 = 2 π f 1 and ω 2 = 2 π f 2 :
y ( t ) = A 1 e j ω 1 t + A 2 e j ω 2 t .
By replacing ω 2 = ω 1 + ( ω 2 ω 1 ) , Equation (2) can be rewritten to achieve Equation (3):
y ( t ) = e j ω 1 t ( A 1 + A 2 e j ( ω 2 ω 1 ) t ) .
From Equation (3), it can be seen that the amplitudes A 1 and A 2 of the original sinusoidal signals are preserved by the addition. By expressing ω 1 as ω 1 = ω ¯ Δ ω and ω 2 as ω 2 = ω ¯ + Δ ω and by replacing Δ ω with ( ω 2 ω 1 ) / 2 and substituting ω ¯ with ( ω 1 + ω 2 ) / 2 , it can be seen that the summation generates two new frequencies that we here call f c and f b . The first frequency, f c , equals ( f 1 + f 2 ) / 2 , and the second frequency, f b , equals ( f 2 f 1 ) / 2 . The lower frequency f b is called the beat, as it appears on the left side in Figure 7, which illustrates the spectrum resulting from the sum of frequencies f 1 and f 2 of y ( t ) . According to Equation (3), f c is just between f 1 and f 2 . Equation (3) also shows that a phase-shift ϕ of one of the high-frequency signals is a phase-shift of the beat signal, but no destructive interference between A 1 and A 2 takes place.
Figure 7. Spectrum of the sum of two sinusoidal functions having frequencies f 1 and f 2 and the resulting carrier and beat frequencies f c and f b , respectively.
With the help of Equation (3), we just demonstrated that a low-frequency signal can be generated by adding two sinusoidal signals with f 1 and f 2 . Now, assume that a wake-up receiver listens on a certain frequency f w , for example 125 kHz, for incoming messages. From the discussion above, it follows that f w can be generated by adding two sinusoidal signals with frequencies f 1 and f 2 that are just separated about the right amount from each other. In the example above, with f w = 125 kHz, this would be 125 kHz, since the envelope detector, as long as it consists of two diodes, doubles the frequency during rectification. By switching the f 1 and f 2 transmitting radios synchronously on and off, frequency f b can be further on-off keying-modulated to achieve a certain required wake-up pattern. Changing only one of the frequencies f 1 or f 2 according to a certain timing, f b can be frequency-shift keying modulated.
Considering Figure 6, Node-1 and Node-2 are usually in an ultra-low-power listening state. To successfully generate a concurrent wake-up message, synchronization of both nodes has to be achieved prior to sending of f 1 and f 2 . Synchronization can be achieved for example by triggering on the wake-up message that is sent by Node-1 to wake up Node-2 or by utilizing the wake-up acknowledgment transmitted by Node-2. The latter method is implemented in this work, as will be discussed in Section 4.
Figure 8 depicts Equation (3) graphically, with the horizontal axis representing the real part and the vertical axis representing the imaginary part of y ( t ) . It can be seen that there exist generally two cases: (a) | A 1 | = | A 2 | and (b) | A 1 | > | A 2 | . The case | A 1 | < | A 2 | is the same as Case (b), which may be achieved by reordering A 1 and A 2 in Equation (3). Furthermore, it can be deduced from the two graphs (a) and (b) in Figure 8 that the beat signal has an amplitude of A 2 and A 1 resembles an offset that shifts the beat signal from the origin.
Figure 8. (a) A 1 = A 2 ; (b) A 1 > A 2 .
Figure 9 visualizes Equation (3) in the time domain; f c = ( f 1 + f 2 ) / 2 is shown as the black curve, and f b is visualized in red. In Figure 9a, the two sinusoidal signals have equal amplitudes A 1 = A 2 = 1 , and in Figure 9b, the amplitudes are A 1 = 0.7 > A 2 = 0.4 . In both figures, the resulting beat ( f b ) has amplitude 2 A 2 . The amplitude discrepancy between f b and f c visible in Figure 9b shows the offset generated by A 1 . Please note that the signals plotted in Figure 9a,b were obtained from frequencies f 1 = 868 MHz and f 2 = 868.125 MHz, although f c appears to have a lower frequency in the plots, which is due to massive undersampling that was done for reasons of illustration.
Figure 9. (a) Beat for equal amplitudes A 1 = 1 and A 2 = 1 ; (b) beat for A 1 = 0.7 > A 2 = 0.4 .
Figure 10 depicts the same wake-up signal as it appears at the input of the wake-up receiver after envelope detection. As discussed above, the signal has amplitude 2 A 2 and frequency 2 f b . Figure 10b also illustrates the DC-offset of A 1 A 2 on the wake-up signal in accordance with the expectations from Equation (3).
Figure 10. (a) Envelope for equal amplitudes A 1 = 1 and A 2 = 1 ; (b) envelope for A 1 = 0.7 > A 2 = 0.4 .
As introduced in Section 2.2, wake-up receivers usually listen to the wireless channel in the kilohertz range, with a data rate of several kilobits per second. Consequently, timing constraints are in the µs range. As the wake-up signal appears at the receiver like any other wake-up signal, there are no additional components required, and the same hardware can be used to modulate and demodulate the beat signal.

3.2. More than Two Concurrent Senders

In a wireless sensor network, it is probable that more than two senders are in wake-up range, and the superposition of more than two sinusoidal waves can occur. In Section 3.1 above, we discussed that it is possible to transmit a wake-up message from two concurrent senders having frequencies f 1 and f 2 = f 1 + f w / 2 and amplitudes A 1 and A 2 . The results obtained in Section 3.1 demonstrate that the amplitude of the larger signal, for example A 1 , generates a constant offset on the wake-up signal. Consequently, if a third node has the same frequency as the node with the lower amplitude, the wake-up signal can be increased, as shown by Equation (4), which enhances Equation (3) by a third sinusoidal signal with amplitude A 3 and with frequency f 2 :
y ( t ) = e j ω 1 t ( A 1 + ( A 2 + A 3 ) e j ( ω 2 ω 1 ) t ) .
The signal y ( t ) expressed by Equation (4) is graphically reported in Figure 11. Note that the amplitudes in Plots (a) and (b) are A 1 = 0.8 , A 2 = 0.1 and A 3 = 0.4 . The frequencies in (a) are f 1 = 868 MHz, f 2 = 868.125 MHz and f 3 = 868 MHz. In this case, where f 3 = f 1 and A 1 + A 3 > A 2 , the amplitude A 3 of the third node adds to the DC-offset, but not to the beat. In Figure 11b, the frequencies are f 1 = 868 MHz, f 2 = 868.125 MHz and f 3 = 868.125 MHz. In this case, A 3 adds to the beat and increases its amplitude.
Figure 11. Envelopes for A 1 = 0.8 , A 2 = 0.1 and A 3 = 0.4 . In (a), f 1 = 868 MHz, f 2 = 868.125 MHz and f 3 = 868 MHz; in (b), f 1 = 868 MHz, f 2 = 868.125 MHz and f 3 = 868.125 MHz.
However, due to inaccuracies of the crystal oscillators, frequency f 3 of the third node will always be slightly different from f 2 or f 1 . The utilized radio crystals often have an accuracy of 10 to 40 ppm in the kilohertz range, and Equation (4) has to be rewritten. Using ω 1 = ω ¯ Δ ω , ω 2 = ω ¯ + Δ ω and ω 3 = ω ¯ + α Δ ω , we get:
y ( t ) = e j ω ¯ t ( A 1 e j Δ ω t + A 2 e j Δ ω t + A 3 e j α Δ ω t )
where α indicates the frequency offset of the third node. Equation (5) indicates that the frequency offset of the third node generates an additional beat (in the lower kilohertz range) that might disturb the wake-up signal. Additionally, the phase of the third node is probably shifted, compared to that of the other nodes, and destructive interference can occur. Due to these limitations, each additional node will likely generate additional frequencies and offsets that make an undisturbed wake-up signal more unlikely, although several wake-up receivers [20,21] have a built-in automatic gain control unit that can help to mitigate this effect.
By expanding Equation (3) by an additional pair of nodes sending at 2 π f 3 = ω 3 and 2 π f 4 = ω 4 , we get Equation (6):
y ( t ) = e j ω 1 t ( A 1 + e j ( ω 2 ω 1 ) t ( A 2 + e j ( ω 3 ω 2 ) t ( A 3 + A 4 e j ( ω 4 ω 3 ) t ) ) )
Considering Equation (6) reveals that four concurrently sending nodes generate the desired superposed beat frequencies in case f 2 f 1 = f 4 f 3 . There is also an additional frequency generated by the offset of frequencies f 3 f 2 . This offset is present due to oscillator inaccuracies. By setting f 3 f 2 purposefully in the MHz-range, these effects can be reduced, as the additional beats will also be in the MHz range and will be low-passed by the envelope detector. What is left are the inaccuracies of f 4 f 3 not being exactly f 2 f 1 .
Equation (6) indicates that n nodes can generate n / 2 beat wake-up frequencies. However, due to frequency inaccuracies, there will be superposed additional frequencies. Furthermore, mitigating the destructive interferences of the beats needs to be considered, which could be achieved by randomizing the frequencies of node pairs similar to the concept introduced in Zippy [8], although randomizing on the node level, not on the bit level.
Figure 12a,b visualizes exemplary beats on the real and imaginary axis. Figure 12a visualizes two sinusoidal signals with frequencies f 1 and f 2 = f 1 + Δ f and with amplitudes A 1 = 1 and A 2 = 0.6 . It can be seen that the amplitude of the first signal is larger than that of the second, in accordance with Equation (3) and Figure 8. Figure 12b graphically depicts four sinusoidal signals with frequencies f 1 , f 2 = f 1 + Δ f , f 3 = α f 1 and f 4 = f 3 + Δ f as given in Equation (6). Here, the amplitudes were A 1 = 1 , A 2 = 0.6 , A 3 = 0.3 , A 4 = 0.2 . The figure demonstrates the additional frequencies as expected from the discussion above.
Figure 12. Beats visualized on the real and imaginary axis. (a) Two sines at f 1 and f 2 = f 1 + Δ f ; (b) four sines with f 1 , f 2 = f 1 + Δ f , f 3 = α f 1 and f 4 = f 3 + Δ f .
Figure 13 visualizes amplitudes A over the number of nodes n for concurrently-sending nodes as calculated by MATLAB. The black solid curves are the averaged amplitudes Y ( n ) for n sinusoidal signals (transmitted by n nodes) all having the same frequency f, a random phase-shift ϕ n , amplitude A = 1 averaged over i = 100 runs, as calculated by:
Y ( n ) = 1 i 1 i 1 n m a x ( A sin ( f + ϕ n ) )
where the function m a x ( ) extracts the magnitude of the amplitude of each sinusoidal signal. The black dashed curve shows Y ( 15 ) , exemplary for one sample run. The black dotted curve depicts the expectation value E ( Y ( n ) ) . Assume the phases ϕ and amplitudes a of the sums of n sinusoidal signals are normally distributed random variables with μ = 0 and σ 2 = n / 2 . Then, R = ϕ 2 + a 2 is Rayleigh distributed with E ( R ) = σ π / 2 . From σ = n / 2 follows E ( Y ( n ) ) = π n / 4 .
Figure 13. Simulated and expected amplitude achieved by concurrently-sending nodes.
The red solid curve shows Y b ( n ) calculated with Equation (7), but each second signal had frequency f + Δ f to generate beat frequencies according to Equation (3). All signals had a random phase-shift ϕ n and amplitudes A = 1 and were averaged over i = 100 runs. The red dashed curve depicts the result of one exemplary run ( Y b ( 15 ) ), and the red dotted curve illustrates the expectation value E ( Y b ( n ) ) = π n / 2 . The expectation value E ( Y b ( n ) ) increased by a factor of two as the variance σ 2 of the beat amplitudes also increased by a factor of two.
Figure 13 does not consider frequency inaccuracies originating from the crystal oscillators, but it demonstrates the advantage of concurrent wake-up signals.

3.3. Performance Simulation

To evaluate the advantage of concurrent wake-up transmissions of two nearby nodes, we calculated the Friis free-space transmission equation [26] for two different output powers. As the transmission range is additionally affected by multi-path propagation effects like reflection, scattering and diffraction, the simulation included multi-path fading effects to calculate the expected wake-up range [27]. Figure 14 visualizes received signal strength over distance from receiver to sender. During the simulation, the sender and receiver were placed 1.2 m above the ground. The black curve illustrates the expected signal strength for a sending power of 0 dBm and the blue curve for a sending power of 3 dBm. Antenna gain was assumed to be 1.5 dBi in each case. The dashed line shows an exemplary sensitivity threshold of a wake-up receiver at 51 dBm. The curves clearly show the advantages of additional sending power. The wake-up range increases from approximately 20 m to 25 m, and local minima are much less severe. The simulation results will be compared to a free-space measurement in Section 5.3.
Figure 14. Simulated received signal strength over distance for a transmit power of 0 and 3 dBm.

4. Concurrent Wake-Up Protocol Design

This section presents two prototype network protocols that we developed using concurrent wake-up messages based on beat frequencies. The first subsection introduces a prototype algorithm that can be used to integrate concurrent wake-up messages into existing network protocols, in order to increase their reliability or to decrease the required sending power. The second subsection introduces a prototype wake-up flooding mechanism based on concurrent wake-up messages to achieve a quick and reliable waking up of several sensor nodes.
Throughout this section, we use the abbreviation WUC for a wake-up call and CWUC for a concurrent wake-up call generated by two senders by exploiting the beat frequency.

4.1. Integration into Existing Routing Protocols

Depicted in Figure 15 is a protocol design to demonstrate the feasibility of concurrent wake-up calls and to provide a means to integrate concurrent wake-up calls into existing solutions. To begin a concurrent wake-up, Node-1 sends a single wake-up call (WUC) to Node-2 that acknowledges (ACK) the successful reception. Node-1 then transmits a request (REQ) for a concurrent wake-up message to Node-2 embedding the address of Node-3. Upon reception of this dedicated request, indicated by a special bit in the radio packet, Node-2 changes its carrier frequency for the transmission period of the concurrent wake-up packet. Based on the timing of this handshaking, Nodes-1 and 2 send the concurrent wake-up call (CWUC) to Node-3. After Node-3 detects the valid wake-up call, it is ready to receive data from Node-1. Finally, Node-3 acknowledges the data reception.
Figure 15. Overview of the concurrent wake-up protocol. Here, we use the abbreviation WUC for a wake-up call, CWUC for a concurrent wake-up call, ACK for the wake-up acknowledgment and REQ for the concurrent transmission request.
In this example, we assumed a scenario similar to that visualized in Figure 1, where Node-3 is out of wake-up range. Alternatively, this scheme could also be used when wake-up messages reach Node-3 with low reliability, only. Both cases could be detected by Node-1, for example, by comparing the number of send wake-up calls to the number of successfully-received wake-up calls. In the case of low wake-up reliability, Node-1 could request Node-2 to transmit a concurrent wake-up message to increase its reliability.
A thorough performance analysis of this approach, including comparisons to existing direct transmission-based approaches, is clearly out of the scope of this work, the goal of which is to demonstrate the feasibility of concurrent wake-up calls based on beat signals. However, we expect beat transmissions to be more effective as the occupied bandwidth is reduced by removing the high data-rate on-off keying modulation. Furthermore, the approach increases the probability of successful wake-up transmissions, which directly leads to a performance gain, especially in fast-fading or noisy environments. This basic concurrent wake-up scheme can be integrated into existing routing protocols, like CTP-WUR (Collection Tree Protocol - Wake-up Receiver) [28], T-ROME [6], ALBA-WUR (Adaptive Load-Balancing Algorithm - Wake-up Receiver) [29] or others, such as [4,30,31].

4.2. Concurrent Wake-Up Flooding

Wake-up messages are usually energy-expensive and require a certain amount of time to be sent. In the cases of large wireless sensor node deployments, waking up of all sensor nodes can, as such, pose a considerable amount of energy and time with respect to the wireless sensor network. However, waking up of all nodes is required for example during the initialization phase of a wireless sensor node deployment or more generally required for network configuration tasks and in cases when data need to be pulled out of a complete network. In such cases, it is possible to use flooding algorithms, as they provide a tool to quickly broadcast messages throughout a complete wireless sensor network.
This section introduces a concurrent wake-up flooding protocol similar to Zippy as introduced by Sutton et al. in [8] and as reviewed in Section 2.3. In comparison to Zippy, our newly-developed protocol uses both radios, the main and the wake-up radio. The main radio is used to transmit the on-off keying-modulated wake-up calls (WUC), the concurrently-transmitted wake-up calls (CWUC) and the synchronization (SYNC) messages.
Figure 16 schematically illustrates the concurrent wake-up flooding protocol. An initiator Node a starts the flooding by sending a WUC. Each receiver node of this seed turns its radio on and listens to the wireless channel for a SYNC packet. Based on the timing provided by the SYNC packet, the nodes transmit a CWUC using the beat frequencies. The initiator retransmits the SYNC packet after each CWUC, in order to provide timing information to the newly-awoken nodes. The algorithm finishes at a predefined maximum number of CWUCs.
Figure 16. Overview of the concurrent wake-up flooding protocol. Here, we use the abbreviation WUC for a wake-up call, SYNC for the synchronization message sent by the initiator and CWUC for a concurrent wake-up call.
To the authors’ best knowledge, the herein proposed algorithm is the first concurrent wake-up flooding algorithm that supports address encoding in wake-up packets, which is a clear advantage over Zippy, as it removes virtually all occurrences of false wake-ups [6]. Furthermore, the strength of the beat signal increases due to the concurrency, as shown in the previous Section 3, which leads to a more robust and reliable wake-up reception. Synchronizing on the main radio signals provides improved timing, as well as low latencies, especially in larger network deployments where we expect our proposed algorithm to outperform Zippy.

5. Experimental Results

In this section, we present the results of the experiments that we performed to verify the assumptions made above. For the experiments, we utilized wireless sensor nodes as visualized in Figure 17a. Figure 17b illustrates the block diagram of the sensor node schematically. The antenna switch connects in an ultra-low-power listening state the antenna to the low-frequency wake-up receiver AS3932. After detecting a valid wake-up message, the AS3932 awakens the EFM32 microcontroller from the deep sleep state. The microcontroller controls the antenna switch and connects the CC1101 communication transceivers to the antenna to be ready to transmit or receive communication messages.
Figure 17. (a) Photo of the prototype sensor node used in this work. (b) Schematic of the sensor node.
In combination with the passive demodulator and the 125-kHz wake-up receiver AS3932, the wireless sensor node has a wake-up sensitivity of around 51 dBm. Supplied at 3 V, it has a power consumption of less than 10 µW in ultra-low-power listening state. The AS3932 supports several data rates in the range from 1024 to 8192 bits per second. In the communication mode, the node has a sensitivity of around 100 dBm, depending on the data rate.

5.1. Expected Concurrency of Two Senders

To further analyze the concurrency of the wake-up packets, we took the time delays between two concurrent packet transmissions. As the receiver and transmitter have different internal tasks to perform after packet transmission and to prepare to send a wake-up packet, we inserted several nop() cycles to adjust the wake-up packets in time. Figure 18 plots the occurrences over delta time t d in µs. We used a Gaussian fit of the form y = a exp ( ( x x 0 ) 2 / ( 2 s 2 ) ) to evaluate mean t d = 1.4 µs and standard deviation s = 3.1 µs. The results of Figure 18 show that this method achieves a timing that is sufficient to send concurrent wake-up packets using the beat-frequency at a data rate of 8192 kbps as required by the wake-up receiver that we used in this work.
Figure 18. Distribution of time offsets between two concurrent wake-up packets.

5.2. Concurrent Wake-up Signals

Figure 19 shows exemplary concurrent wake-up signals taken at a receiver node. The figures show normalized signal amplitudes over time for the cases of (a) two, (b) four and (c) six concurrent senders. As the signal amplitude is strongly connected to the distance between sender and receiver, the signal amplitudes are normalized to the range from zero to on, in all cases. The single wake-up packet is transmitted in the time period from 0 to 6 ms. After approximately 10 ms, the synchronization packet is transmitted, and the concurrent wake-up packets are transmitted in the time period from 14 to 20 ms. Nodes-1 to -6 sent at an output power of 0 dBm and were placed approximately at a distance of 1 m around the receiver. Nodes-1 and -2 sent with 868 and 868.125 MHz, Nodes-3 and -4 with 866 and 866.125 MHz and Nodes-5 and -6 with 865 and 865.125 MHz.
Figure 19. Normalized signal amplitudes received in the case of (a) two, (b) four and (c) six concurrent senders.
It can be seen that in the case of two senders, the signal shape of the concurrent wake-up packet follows the shape as expected in Section 3.1. The beat frequency with amplitude A 2 is on top of a DC-offset generated by the amplitude A 1 A 2 . In the cases of four and six concurrent senders, the signal follows the same shape, but also includes additional low frequencies that are probably caused by offsets of the 125 kHz, as discussed in Section 3.2. However, although the signal amplitudes are not constant over the duration of the wake-up packet, the receiver is able to detect them as valid wake-up messages. To further analyze the impact of additional nodes and to investigate the concept of frequency randomization, further tests are required that will be the subject to our future research.

5.3. Free-Space Transmission

To verify the concurrent wake-up, we performed two test setups in free space. The first setup consisted of a single sender and receiver, both at a height of about 1.2 m. The second test consisted of three sensor nodes. Two nodes, placed at a distance x = 1 m from each other, sent a concurrent wake-up message. The third node received the concurrent wake-up calls. Both tests consisted of 500 wake-up messages that were sent with a transmit power of 0 dBm. The receiver was placed at different distances d in the range from 1 to 50 m and counted each successfully-received wake-up message. Figure 20 shows schematically the experimental setups.
Figure 20. Schematics of the experimental setups for (a) single wake-up and (b) concurrent wake-up.
Figure 21 depicts the number of successfully-received wake-up packets over distance. The black dashed curve illustrates the single sender case, and the red curve visualizes the data for the concurrent wake-ups. Both curves correspond well to the simulated free-space transmissions reported in Figure 14, although the local minimum was located at around a 15-m distance for the single wake-up calls and according to the simulation was located at a distance around 8 m. This discrepancy could be caused by a differing ground reflection coefficient from simulation to experiment. The receiver successfully detected each single wake-up message (black curve) until a distance of around 20 m, then the wake-up rate decreased to zero at 30 m. Between 30 and 35 m, the receiver started again to successfully detect wake-up messages that probably originated from additional multipaths generated by surrounding trees or buildings.
Figure 21. Number of successfully-received wake ups over distance between sender and receiver for single and concurrent wake-ups.
The red solid curve in Figure 21 visualizes the amount of successfully-received wake-up messages for the concurrent wake-up calls. The wake-up range increased as expected. Additionally, the minimum at around a 15-m distance to the senders did not exist. The receiver successfully detected each concurrent wake-up call up to a distance of around 25 m. Then, the number of received packets decreased, but not to zero, and increased again at around a 30-m distance. Located at distances of 40 and 45 m were two additional maxima that probably also originated from additional multipath propagations due to scattering effects of surrounding trees, buildings, etc.

5.4. Concurrent Wake-Up Protocol

To verify the protocol described in Section 4.1, we enhanced the T-ROME protocol [6] by the concurrent wake-up scheme described in Section 4.1 and implemented it on three wireless nodes to verify its performance. The nodes were placed similarly to the scenario depicted in Figure 1. Node-2 could receive wake-up messages from Node-1, but was not able to receive them from Node-3. Node-2 had data to be sent to Node-3.
Figure 22 visualizes the states (send or receive) of the three nodes. Node-2 started to send a wake-up call (WUC) to Node-3, which did not respond as it was not in wake-up range. Then, Node-2 woke up Node-1 and sent it a concurrent wake-up request, including the address of Node-3. Node-1 acknowledged (ACK) the reception of the concurrent wake-up request (REQ), and based on this acknowledgment, both nodes (1 and 2) sent a concurrent wake-up call to Node-3. Finally, Node-3 verified the wake-up address that was included in the wake-up call and started the handshaking procedure, as introduced in [32], followed by data communication from Node-2 to Node-3.
Figure 22. Visualization of the states (send and receive) of Nodes-1, -2 and -3 over time during the described concurrent wake-up protocol. The data were taken with the help of a logic-analyzer. Here, we use the abbreviations LBT for listen-before-talk, WUC for a wake-up call, WACK for the wake-up acknowledgment, REQ for the concurrent transmission request, REQ ACK for the request acknowledgment, CWUC for a concurrent wake-up call and ACK for the data acknowledgment.

5.5. Concurrent Wake-Up Flooding

To demonstrate the feasibility of the concurrent wake-up approach utilizing more than two simultaneously-transmitting nodes in a more realistic environment, we implemented the wake-up flooding algorithm as introduced in Section 4.2. We performed an indoor test consisting of several wireless sensor nodes as depicted in Figure 23. The initiator (Node-1), started to broadcast a seed wake-up packet. All nodes (Nodes-2, -3, -4 and -5) that received this seed packet woke up and listened for the synchronization message transmitted directly after the seed packet by the initiator. Based on the timing of the synchronization packet, the nodes then transmitted concurrent wake-up packets on different center frequencies as introduced in Section 3.2. Figure 24 visualizes the timing of the wake-up flooding algorithm. As can be seen, the nodes wake up after around 20 ms and are ready to receive data.
Figure 23. Deployed wireless sensor network to analyze the wake-up flooding algorithm.
Figure 24. Timing of the wake-up flooding algorithm.
Table 1 lists the frequencies that were utilized by the nodes during the flooding experiment. The third row in Table 1 indicates the type of sensor node during the flooding test, and the last two rows report the amount of sent and received wake-up packets. Types could either be initiator, sender or receiver. The initiator initiated the flooding, and the sender nodes retransmitted the wake-up packets. The receiver nodes were placed in the building at different places where they had no direct link to the initiator, except for Node-5. At each node, we counted the number of successfully received wake-ups.
Table 1. Frequencies used by the nodes during the flooding test setup.
As reported in Table 1, all nodes had a high wake-up packet reception ratio of almost 100%. As Node-5 could receive all seed wake-up calls, as well as the following concurrent wake-up messages, it woke up 1000 times.

6. Conclusions

In this article, we presented a novel communication approach by exploiting purposefully- interfering out-of-tune signals of two or more wireless sensor nodes, which produce the wake-up signal as the beat frequency of superposed carriers. We discussed the theoretical approaches of wake-up messages generated from beat frequencies for the first time and demonstrated their suitability to improve wake-up robustness and reliability. We experimentally verified the theoretical approaches and developed two novel network protocols that apply this technique. First, we developed a simple and highly reliable algorithm that includes concurrent wake-ups into existing protocols. We achieved a quick and reliable dissemination of wake-up messages in a large wireless sensor network, by designing a novel flooding protocol based on concurrent wake-up transmissions. We implemented the algorithms and verified their performance experimentally with the help of an outdoor test setup and an indoor deployment. The tests confirmed the expected gain of up to 3 dB for two concurrent senders and nearly 100% wake-up rates in less than 20 ms achieved by the flooding protocol. Our future research will further investigate the presented protocols and compare their performance to direct transmission-based approaches.

Acknowledgments

The article processing charge was funded by the German Research Foundation (DFG) and the University of Freiburg in the funding program Open Access Publishing.

Author Contributions

All authors contributed to the main idea of this paper. Christian Schindelhauer and Timo Kumberg designed the algorithms and experiments. Timo Kumberg wrote the article, and Leonhard Reindl supervised the overall research work, critically evaluated and revised the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hoflinger, F.; Gamm, G.U.; Albesa, J.; Reindl, L.M. Smartphone remote control for home automation applications based on acoustic wake-up receivers. In Proceedings of the 2014 IEEE International Instrumentation and Measurement Technology Conference (I2MTC), Montevideo, Uruguay, 12–15 May 2014; pp. 1580–1583. [Google Scholar]
  2. Bannoura, A.; Höflinger, F.; Gorgies, O.; Gamm, G.U.; Albesa, J.; Reindl, L.M. Acoustic Wake-Up Receivers for Home Automation Control Applications. Electronics 2016, 5, 4. [Google Scholar] [CrossRef]
  3. Kumberg, T.; Tannhaeuser, R.; Schink, M.; Schneid, S.; Koenig, S.; Schindelhauer, C.; Reindl, L. Wireless wake-up sensor network for structural health monitoring of large-scale highway bridges. In Proceedings of the Second International Conference on Performance-based and Life-cycle Structural Engineering (PLSE 2015), Brisbane, QLD, Australia, 9–11 December 2015; pp. 1393–1401. [Google Scholar]
  4. Gamm, G.U.; Reindl, L.M. Smart metering using distributed wake-up receivers. In Proceedings of the 2012 IEEE International Instrumentation and Measurement Technology Conference, Graz, Austria, 13–16 May 2012; pp. 2589–2593. [Google Scholar]
  5. Kumberg, T.; Kokert, J.; Younesi, V.; Koenig, S.; Reindl, L. Wake-up transceivers for structural health monitoring of bridges. In Proceedings of the SPIE Smart Structures and Materials + Nondestructive Evaluation and Health Monitoring, Las Vegas, NV, USA, 15 April 2016; p. 98041S. [Google Scholar]
  6. Kumberg, T.; Schink, M.; Reindl, L.; Schindelhauer, C. T-ROME: A Simple and Energy Efficient Tree Routing Protocol for Low-Power Wake-up Receivers. Ad Hoc Netw. 2017. [Google Scholar] [CrossRef]
  7. Ferrari, F.; Zimmerling, M.; Thiele, L.; Saukh, O. Efficient network flooding and time synchronization with glossy. In Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks, Chicago, IL, USA, 12–14 April 2011; pp. 73–84. [Google Scholar]
  8. Sutton, F.; Buchli, B.; Beutel, J.; Thiele, L. Zippy: On-Demand Network Flooding. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, Seoul, Korea, 1–4 November 2015; pp. 45–58. [Google Scholar]
  9. Whitehouse, K.; Woo, A.; Jiang, F.; Polastre, J.; Culler, D. Exploiting the capture effect for collision detection and recovery. In Proceedings of the Second 2005 IEEE Workshop onEmbedded Networked Sensors (EmNetS-II), Sydney, QLD, Australia, 31 May 2005; pp. 45–52. [Google Scholar]
  10. Son, D.; Krishnamachari, B.; Heidemann, J. Experimental study of concurrent transmission in wireless sensor networks. In Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, Boulder, CO, USA, 31 October–3 November 2006; pp. 237–250. [Google Scholar]
  11. Dutta, P.; Musaloiu-e, R.; Stoica, I.; Terzis, A. Wireless ACK collisions not considered harmful. In Proceedings of the 7th ACM Workshop on Hot Topics in Networks (HotNets-VII), New York, NY, USA, 6–7 October 2008; pp. 1–6. [Google Scholar]
  12. Callaway, E.; Gorday, P.; Hester, L.; Gutierrez, J.A.; Naeve, M.; Heile, B.; Bahl, V. Home networking with IEEE 802. 15. 4: A developing standard for low-rate wireless personal area networks. IEEE Commun. Mag. 2002, 40, 70–77. [Google Scholar] [CrossRef]
  13. Yuan, D.; Hollick, M. Let’s talk together: Understanding concurrent transmission in wireless sensor networks. Proceedings of 2013 IEEE 38th Conference on Local Computer Networks (LCN), Sydney, NSW, Australia, 21–24 October 2013; pp. 219–227. [Google Scholar]
  14. Wang, Y.; He, Y.; Mao, X.; Liu, Y.; Li, X.Y. Exploiting constructive interference for scalable flooding in wireless networks. IEEE/ACM Trans. Netw. 2013, 21, 1880–1889. [Google Scholar] [CrossRef]
  15. Wang, Y.; Liu, Y.; He, Y.; Li, X.Y.; Cheng, D. Disco: Improving packet delivery via deliberate synchronized constructive interference. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 713–723. [Google Scholar] [CrossRef]
  16. Doddavenkatappa, M.; Chan, M.C.; Leong, B. Splash: Fast Data Dissemination with Constructive Interference in Wireless Sensor Networks. In Proceedings of the 10th USENIX Symposium on Networked System Design and Implementation, Lombard, IL, USA, 2–5 April 2013; pp. 269–282. [Google Scholar]
  17. Yu, S.; Wu, X.; Wu, P.; Wu, D.; Dai, H.; Chen, G. Cirf: Constructive interference-based reliable flooding in asynchronous duty-cycle wireless sensor networks. In Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, 6–9 April 2014; pp. 2734–2738. [Google Scholar]
  18. Rao, V.S.; Koppal, M.; Prasad, R.V.; Prabhakar, T.; Sarkar, C.; Niemegeers, I. Murphy loves CI: Unfolding and improving constructive interference in WSNs. In Proceedings of the IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; pp. 1–9. [Google Scholar]
  19. Escobar, A.; Cruz, F.J.; Garcia-Jimenez, J.; Klaue, J.; Corona, A. RedFixHop with channel hopping: Reliable ultra-low-latency network flooding. In Proceedings of the 2016 Conference on Design of Circuits and Integrated Systems (DCIS), Granada, Spain, 23–25 November 2016; pp. 1–4. [Google Scholar]
  20. Gamm, G.U.; Kostic, M.; Sippel, M.; Reindl, L.M. Low–power sensor node with addressable wake–up on–demand capability. Int. J. Sens. Netw. 2012, 11, 48–56. [Google Scholar] [CrossRef]
  21. Kumberg, T.; Tannhaeuser, R.; Gamm, G.U.; Reindl, L.M. Energy improved wake-up strategy for wireless sensor networks. In Proceedings of the Sensors and Measuring Systems 2014, ITG/GMA Symposium. Nuremberg, Germany, 3–4 June 2014; pp. 1–6. [Google Scholar]
  22. Magno, M.; Benini, L. An ultra low power high sensitivity wake-up radio receiver with addressing capability. In Proceedings of the 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Larnaca, Cyprus, 8–10 October 2014; pp. 92–99. [Google Scholar]
  23. Kumberg, T.; Tannhaeuser, R.; Reindl, L. Using antenna diversity to improve wake-up range and probability. In Proceedings of the PIERS 2015, Prague, Czech Republic, 6–9 July 2015. [Google Scholar]
  24. Blanckenstein, J.; Klaue, J.; Karl, H. A Survey of Low-Power Transceivers and Their Applications. IEEE Circuits Syst. Mag. 2015, 15, 6–17. [Google Scholar] [CrossRef]
  25. Oller, J.; Demirkol, I.; Casademont, J.; Paradells, J.; Gamm, G. U.; Reindl, L. Has time come to switch from duty-cycled MAC protocols to wake-up radio for wireless sensor networks? IEEE/ACM Trans. Netw. 2016, 24, 674–687. [Google Scholar] [CrossRef]
  26. Rappaport, T.S. Wireless Communications: Principles and Practice; Prentice Hall PTR: Upper Saddle River, NJ, USA, 1996; Volume 2. [Google Scholar]
  27. Kvaksrud, T.I. Range Measurements in an Open Field Environment; Design Note DN018; Texas Instruments: Dallas, TX, USA, 2008. [Google Scholar]
  28. Basagni, S.; Petrioli, C.; Spenza, D. CTP-WUR: The collection tree protocol in wake-up radio WSNs for critical applications. In Proceedings of the 2016 International Conference on Computing, Networking and Communications (ICNC), Kauai, HI, USA, 15–18 February 2016; pp. 1–6. [Google Scholar]
  29. Spenza, D.; Magno, M.; Basagni, S.; Benini, L.; Paoli, M.; Petrioli, C. Beyond duty cycling: Wake-up radio with selective awakenings for long-lived wireless sensing systems. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Kowloon, Hong Kong, China, 26 April–1 May 2015; pp. 522–530. [Google Scholar]
  30. Chen, L.; Warner, J.; Heinzelman, W.; Demirkol, I. MH-REACH-Mote: Supporting multi-hop passive radio wake-up for wireless sensor networks. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 6512–6518. [Google Scholar]
  31. Ait Aoudia, F.; Gautier, M.; Berder, O. OPWUM: Opportunistic MAC protocol leveraging wake-up receivers in WSNs. J. Sens. 2016. [Google Scholar] [CrossRef]
  32. Kumberg, T.; Reindl, L.; Moharrami, M.; Schindelhauer, C. Improving the Performance of the Cross-Layer Wake-Up Routing Protocol T-ROME. In Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 26–30 June 2017; pp. 780–785. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.