You are currently viewing a new version of our website. To view the old version click .
Telecom
  • Article
  • Open Access

10 June 2025

Adaptive Slotframe Allocation with QoS and Energy Optimization in 6TiSCH for Industrial IoT Applications

,
and
Department of Electrical and Electronics Engineering, Dr. Vishwanath Karad MIT World Peace University, Pune 411038, India
*
Author to whom correspondence should be addressed.

Abstract

Industry 4.0 has transformed manufacturing and automation by integrating cyber–physical systems with the Industrial Internet of Things (IIoT) for real-time monitoring, intelligent control, and data-driven decision making. The IIoT increasingly relies on IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) to achieve reliable, low-latency, and energy-efficient industrial communications. The 6TiSCH protocol stack integrates scheduling and routing to optimize transmissions for resource-constrained devices, enhancing Quality of Service (QoS) in IIoT deployments. This paper proposes an innovative adaptive and cross-layer slotframe allocation technique for 6TiSCH networks, dynamically scheduling cells based on node hop distance, queue backlog, predicted traffic load, and link quality metrics. By dynamically adapting to these parameters, the proposed method significantly improves key QoS metrics, including end-to-end latency, packet delivery ratio, and network lifetime. The mechanism integrates real-time queue backlog monitoring, link performance analysis, and energy harvesting awareness to optimize cell scheduling decisions proactively. The results demonstrate that the proposed strategy reduces end-to-end latency by up to 32%, enhances PDR by up to 27%, and extends network lifetime by up to 10% compared to state-of-the-art adaptive scheduling solutions.

1. Introduction

In the Industrial Internet of Things (IIoT) network, hundreds of ultra-low power, resource-constrained smart, and self-configured sensor nodes interact with each other over a short distance []. These interoperable nodes are equipped for manufacturing, processing, and monitoring tasks in the industrial automation sectors, such as the automobile industry, oil industry, waste management, forestry fire prevention, and others. The IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) Medium Access Control (MAC), an enhancement over basic IEEE 802.15.4, was the key technology for low-power multi-hop Wireless Sensor Network (WSN) applications []. However, the harsh environmental conditions in the industry pose significant challenges in wireless communication, demanding robust and predictable performance. Latency, battery lifetime [], Packet Delivery Ratio (PDR), throughput, and reliability serve as significant performance indicators for ensuring seamless communication under high traffic loads and external noise. Productivity and safety are the main objectives in IIoT networks that need strict resource provisions, as compared to consumer IoT []. To address these challenges in IIoT, several industrial communication protocols are being proposed. These protocols enable time synchronization by segmenting the slotframe into time slots and reducing external interference through channel hopping. They have demonstrated the ability to maintain Quality of Service (QoS) in networks while ensuring ultra-low power consumption.
Devices within a TSCH network rely on a shared communication schedule, typically represented as a matrix where each cell corresponds to a unique coordinate defined by a specific time offset and channel offset. The matrix row represents channel offsets, and the column represents time offsets as shown in Figure 1. It uses the channel hopping mechanism to reduce the interference and multipath fading effect. The timeslot duration is made to be sufficiently long to allow the transmission of a packet to a neighboring node and the reception of its acknowledgment. Figure 1 also shows the basic slotframe structure for Enhanced Beacon (EB) and application data.
Figure 1. TSCH schedule and slotframe structure for RPL control message, enhanced beacon transmission, and application data illustrating time and channel offsets.
The operational channel frequency f c h a n n e l for communication is determined from the channel offset as
f c h a n n e l   = A S N + c h a n n e l O f f s e t   %   c n u    
where A S N is the Absolute Slot Number, and c n u   is a number of channel offsets used. A limitation of the IEEE 802.15.4e TSCH standard is that it does not comprise rules for creating and managing the schedule in WSNs. Various standardization groups are developing innovative solutions to integrate industrial automation with Internet services. They standardize an architecture for the IIoT, allowing every device in the industry to interact globally. This paper introduces a novel Adaptive and Autonomous Schedule (AAS) for 6TiSCH networks, which dynamically adjusts transmit/receive (Tx/Rx) cells based on traffic demands and link PDR. The cell locations are determined using the MAC addresses of the sender and receiver nodes, along with their hop distances from the root. Additionally, the slotframe segment size is adapted according to the node count at a specific hop distance. This approach significantly reduces end-to-end latency, improves PDR, and extends network lifetime. The rest of the paper is organized as follows: Section 2 discusses the background, Section 3 explores the related work, Section 4 introduces the proposed scheduling algorithm, Section 5 focuses on the analytical model, performance evaluation is discussed in Section 6, and the paper is concluded in Section 7.

2. Background

The IPv6 over the TSCH mode of IEEE 802.15.4e (6TiSCH) protocol has been developed to integrate the IPv6 infrastructure with the underlying low-power IEEE 802.15.4e TSCH network [,]. It constructs and manages schedules based on TSCH network requirements, ensuring standardized communication between devices. For industrial Low-Power and Lossy Networks (LLNs) operating in a critical environment, it guarantees reliable, secured [], and deterministic operations []. The 6TiSCH uses an existing IPv6 upper stack that includes an IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) header compression layer, IPv6 Routing Protocol for LLNs (RPL), and Constrained Application Protocol (CoAP) lightweight application layer as shown in Figure 2.
Figure 2. Layered architecture of the 6TiSCH protocol stack, integrating the IEEE 802.15.4e TSCH MAC layer with IPv6 protocols like 6LoWPAN, RPL, and CoAP.
The wide deployment in industrial LLNs consists of a set of routers that are interconnected with resource-constrained devices. To meet routing requirements in such network scenarios, the RPL routing protocol has been developed []. It organizes the network into a Destination Oriented Directed Acyclic Graph (DODAG) with several source nodes and a root node. The LLN may consist of multiple DODAGs created for a network and may run multiple instances of RPL concurrently. It builds a DODAG network route by keeping less signal overhead and specifies an objective function that enables the QoS requirements for specific applications. RPL isolates routing optimization from packet processing and forwarding operations. Routing optimization aims to achieve bounded latency while satisfying given constraints. In RPL, each node selects its parent node based on the optimized path to ensure root reachability [].
6TiSCH defines the Operation Sublayer (6top), which enables distributed scheduling by negotiating the required number of cells between neighbors. It adds and/or removes cells within a slotframe as per traffic and topology needs. Additionally, it monitors the performance of each cell and relocates underperforming cells as needed. The 6P requests and responses are sent via Information Elements (IEs) that are encapsulated within the 6P packet. When a node sends an ADD REQUEST, it includes a list of required cells by specifying their [timeOffset, channelOffset] coordinates and the desired cell count. Upon receiving the ADD REQUEST, the neighbor node selects appropriate cells and replies with a RESPONSE containing the selected cell list. Cell negotiation is managed using either a 2-step or 3-step transaction. In the 2-step process, the sender directly selects cells for addition, deletion, or relocation. In the 3-step process, the receiver responds with a list of selected cells after evaluating the request. Any node can initiate a DELETE request to remove an allocated cell from the schedule.
Various 6TiSCH Scheduling Functions (SFs) are being developed to ensure deterministic operations in dynamic IIoT networks. These are broadly categorized based on their cell allocation approaches, which include centralized, distributed, and autonomous. The centralized schedulers rely on a single central unit to generate and manage the schedule for the entire network. This approach is well-suited for networks with fixed traffic patterns and low node density. However, the centralized mechanism becomes ineffective in dynamic network topologies with high node density and unstable data traffic []. The distributed scheduling approach utilizes cell negotiation to allocate cells between node pairs based on traffic and topology requirements. Both centralized and distributed schedulers experience signal overhead in dynamic networks. In contrast, the autonomous scheduling approach is becoming more attractive due to its low signal overhead and improved QoS []. It avoids both cell negotiation and centralized schedule management; instead, it uses the node’s MAC addresses to allocate cells within a slotframe. Furthermore, a hybrid approach can be adopted for specific application requirements by combining multiple scheduling techniques.
In a dense network, heavy non-periodic traffic causes network congestion, leading to packet loss. In such scenarios, delivering packets to their destination within a deterministic time becomes more challenging. While retransmissions can address packet failures, they also increase end-to-end latency []. Consequently, an adaptive SF is becoming more appropriate for managing data packets based on their criticality level and efficiently allocating resources in multi-hop networks.

4. Proposed Adaptive Scheduling Technique

We propose a novel adaptive and autonomous scheduling technique for the network with non-periodic traffic patterns. Like ALICE, the proposed scheme utilizes node addresses to generate the schedule autonomously. The novelty of the proposed scheme lies in its dynamic allocation of Tx cells based on key network metrics such as queue backlog, link PDR, and hop count. Furthermore, the algorithm employs slotframe segmentation to ensure successive segment allocation for each link along the end-to-end communication path, thereby enhancing transmission efficiency and reliability. Moreover, by estimating the total number of transmissions required for nodes at a given hop distance, the scheme dynamically adjusts the slotframe segment size in accordance with the number of nodes and their respective hop distances. A data collection mesh network containing 60 nodes is considered for analysis, representing a typical scenario in IIoT applications. For simplicity, Figure 3 shows a partial network structure of 14 nodes. RPL converts the mesh topology into a tree structure, where the root node acts as the sink for data packets transmitted by its descendant nodes. In such a configuration, nodes situated closer to the root experience significantly higher traffic loads, as they are responsible for forwarding packets generated by their respective subtrees. The end-to-end latency in packet transmission is mainly affected by the number of slotframes required to forward a packet to its destination. The proposed technique utilizes the node’s hop count to schedule cells within the slotframe, allocating a dedicated segment for all links at a specific hop distance in the RPL tree. This slotframe segmentation approach significantly reduces end-to-end latency by ensuring packet delivery within a single slotframe. Additionally, by minimizing contention probability, the technique enhances both the PDR and overall transmission reliability.
Figure 3. 6TiSCH data collection mesh network represented as an RPL tree with varying hop distances and traffic loads.
Given a maximum hop distance, H , in the network, the slotframe is partitioned into H segments of variable lengths, as illustrated in Figure 4. Cells for each link between nodes at a specific hop distance are allocated within the designated segment of the slotframe. The number of cells scheduled for a particular link is determined by the packet count in the sender’s queue. Let c h i l d ( k ) denote the set of child nodes of node k , and P r e c ( i ) represent the number of packets received from a child node i . If the number of packets generated at sender node k is denoted as P g e n ( k ) , then the total number of packets P k at node k is given by
P k = P g e n ( k ) + i c h i l d k P r e c i
Figure 4. Proposed adaptive and autonomous scheduling slotframe structure using segmentation scheme for 6TiSCH networks.
Under ideal conditions with 100% link-layer PDR, a single transmission is sufficient for successful delivery. However, when the PDR is lower, retransmissions are required. If A k l denotes the average number of transmissions required per packet over the link ( k l ) , which is the reciprocal of the average link-layer PDR, represented by P D R k l . Accordingly, the total number of transmissions D T k over the link can be expressed as
D T k = A k l · P k
Each node is assigned a specific segment for cell allocation. The total number of available cells within any segment is constrained by the segment length and the number of channel offsets. Although a segment in a longer slotframe offers more available cells, it can adversely impact end-to-end transmission latency. The pending packet count in the sender’s queue determines the number of cells scheduled for a given link. However, in dense networks with high traffic, overprovisioning cells equal to the queue size may lead to cell collisions and increased energy consumption. Hence, to ensure the minimum collision and packet drop with optimal slotframe length, the number of Tx cells B T k l allocated to node k is computed as the floor of the logarithm of the transmission traffic D T k .
B T k l =   log 2 D T k   + 1
Node k allocates Tx cells using its own MAC address along with address of the receiver node l , and allocates Rx cells based on its own MAC address and those of its child nodes. The sender node k communicates the number of scheduled Tx cells to the receiver node l via a reserved field in the packet header. To minimize end-to-end latency, each node allocates Rx cells within one segment and Tx cells in the immediately following segment. If the hop count of the sender node k is h , the Tx cells are allocated in the H h t h   segment of the slotframe.
Let n h denote the node density at hop distance, h . The total number of cells, B h , allocated for all links between the sender nodes, n h , and their respective parent nodes, l , within the corresponding segment is given by
B h = k n h B T k l
This approach adapts the number of scheduled cells based on the pending packets in a node’s queue and the corresponding link-layer PDR. However, the number of allocated cells increases logarithmically rather than linearly, thereby preventing overprovisioning and reducing contention.
Furthermore, to minimize end-to-end latency and improve slotframe utilization, we propose the use of variable-length slotframe segments for links at different hop levels. By utilizing available channel offsets, C n u , the minimum size of a slotframe segment is determined by ensuring sufficient allocation of Tx/Rx cells for nodes at hop distance, h , as given by
L h s m i n n h C n u + log 2 ( H h + 1 )
A larger slotframe segment is assigned to RPL levels with higher node density. Moreover, nodes located closer to the root typically handle greater traffic than other nodes, often resulting in buffer overflows. To mitigate this, segment sizes are increased for nodes nearer to the root. Taking into account the higher traffic at lower hop distances, the segment size is computed as the ceiling value derived from node density, the number of available channel offsets, and the logarithm of the hop distance. On the contrary, links at higher hop distances are assigned smaller segment lengths. The minimum slotframe length, S F m i n , is determined as the sum of the lengths of all segments.
S F m i n = h = 1 H L h s m i n
The time offset for each cell is determined using a hash function applied to the addresses of the sender and receiver. According to ( 4 ) , B T k l cells are scheduled for the link ( k l ) , where the time offset of the i t h cell within a segment of size L h s given by
t o k l i = t o + d = ( h + 1 ) H L d s ,     h = 1   t o   H 1   t o   ,     h = H    
where t o = h a s h ( k M A C + i ) + l M A C % L h s for i = 0 ,   1 , , ( B T k l 1 ) , k M A C and l M A C are MAC addresses of node k and l , respectively.
The hash function used to determine the time offset ensures that cell allocation is uniformly distributed across the segment by combining sender and receiver MAC addresses along with segment length. This uniform distribution minimizes the collision among multiple nodes within the same segment. Additionally, since the hash function depends on unique MAC pairs, it avoids overlap across dissimilar links. The use of a modulo operator with the segment length ensures that cell allocation remains within the same segment.
As derived in ( 5 ) , the proposed AAS strategy schedules B h unique cells within the H h t h   segment for all links connecting sender nodes at hop distance h to their respective parent nodes. To accommodate the high traffic generated by nodes one hop away from the root, segment 0 can be utilized additionally alongside the last segment. This strategy provides an extra opportunity for such nodes to forward packets without causing interference with pre-allocated transmissions. By using this segmentation approach, cells are scheduled in consecutive segments according to the node’s hop distance from the root. The minimal-length slotframe segment is determined based on the number of pending packets in the transmission queues and the number of active links at a given level of the RPL DODAG tree. In this work, the traffic load is predicted by using the current queue backlog at each node along with the hop distance traffic generation in the RPL topology. Since nodes closer to the root experience higher traffic due to forwarding packets of their descendants, our algorithm assumes traffic increases proportionally as the hop distance to the root decreases. The collective traffic arriving at a node, from its children and itself, is an effective predictor of upcoming load. This estimated load impacts the number of cells allocated, using the logarithmic mapping in Equation (4) to scale scheduling based on queue occupancy and links PDR.
The channel offset for the application data packet is determined by using the sender’s MAC address and the total number of available channel offsets, as expressed by
c o u c k = h a s h k M A C % C n u + 1
The technique utilizes channel offsets 1 ,   2 , and 3 for application data. The channel offset for the EB frame is fixed at 0 , while for RPL it is set to 1 . The time offset for the EB frame is determined based on the sender’s MAC address, whereas the time offset for RPL remains constant at 0 .

5. Parameter Analysis

A mathematical analysis is conducted for key performance parameters, including end-to-end latency, contention probability, and network lifetime, as detailed below. These metrics are crucial for evaluating network performance in IIoT applications operating under stringent environmental conditions.

5.1. End-to-End Latency

In a 6TiSCH network, end-to-end latency in transmission depends on the slotframe size and the PDR of the links along the communication path from the source to the root node. Links with lower PDR values require more retransmissions, thereby increasing the overall latency. The end-to-end latency E L t in the proposed AAS approach, for a path of length P , is expressed as the summation of latencies introduced at each hop from the source node to the root and is determined as
E L t = h = 1 P T h + L h s + E T x h · S F P D R k l
where T h denotes the number of time slots between the Rx cell from a child and the Tx cell to the parent for a node k at hop distance h . E T x h represents the average number of retransmissions required at that hop, and P D R k l is the PDR of the link between node k and its parent l . In scheduling schemes such as Orchestra, ALICE, and A3, end-to-end latency is a function of the slotframe size. In contrast, the proposed AAS technique expresses latency solely as a function of the segment size L h s . When retransmissions are required, the latency increases by an amount equivalent to the slotframe size.

5.2. Contention Probability

Contention may arise in the network when insufficient Tx/Rx cells are scheduled, leading to overlapping transmission attempts. The probability of contention in transmission depends on the network traffic load and the number of scheduled cells within a slotframe. Assuming a timeslot duration of 10   m s and that each node generates one packet every I t   ms the traffic T r per slot can be expressed as T r = 10 / I t .
The average contention probability in the proposed AAS scheme over a slot is given by
P c o n t = 1 e T r
From (5), the total number of cells allocated for all nodes within a slotframe is
B = h = 1 H B h
When the total available cells in a slotframe are given as S F · c n u , of these, B cells are scheduled for data transmission and reception, over which the network traffic is distributed. The contention probability, P c o n t , can then be expressed as
P c o n t = 1 e T r · S F · C n u B
The network experiences higher contention when nodes handle heavy traffic, especially when the slotframe has a sparse distribution of cells. In the proposed technique, by adapting the optimal number of cells, the contention probability is reduced by a factor of B. This results in improved PDR and enhanced transmission reliability.

5.3. Network Lifetime

In a 6TiSCH network, the network lifetime is determined by the minimum lifetime of the nodes closest to the root. If the battery of such nodes is depleted, network connectivity is disrupted. A node’s lifetime is primarily influenced by its average energy consumption during each slotframe. In smaller slotframes, timeslots repeat more frequently, enabling higher transmission rates. However, this results in nodes remaining active more often, leading to increased energy consumption. Conversely, a larger slotframe size can cause higher latency and reduced PDR, as nodes have fewer transmission opportunities. Therefore, the slotframe size can be selected based on the critical performance parameters specific to the application’s requirements.
An energy consumption model based on real measurement has been used for the analysis []. It describes the energy consumed by every node in each type of cell. Taking the node’s initial energy of 10,157.4 × 10 6   μ c , average consumption is determined as the sum of the energy spent in every slot. A node in IEEE 802.15.4e TSCH consumes energy in 6 different types of time slots: 54.5   μ c in TxDataRxAck to send application data and receive an acknowledgment (ACK); 32.6   μ c in RxDataTxAck to receive data and sends back an ACK, 49.5   μ c in TxData to sends broadcast packet without an ACK; 22.6   μ c in RxData to receive without ACK; 6.4   μ c in Idle slot during which a node listens for data but does not receive any; and 0   μ c in a sleep slot, where the node’s radio remains turned off. Node’s lifetime l i f e ( n ) in a year is given as
l i f e n = E n · S F E c n · 3600 · 24 · 365
where E ( n ) is the initial energy of a node n in μ c , and E c ( n ) is the average energy consumed by the node during a slotframe in μ c . The minimum lifetime of any node, expressed in years, determines the network lifetime and is given by
N e t l i f e = min n N l i f e n
In energy-critical applications, longer network lifetime can be achieved by employing longer slotframes.

6. Performance Evaluation

The proposed AAS is implemented in the Contiki-NG operating system and evaluated using the Cooja simulator, which is a widely used tool for IIoT simulations [,]. A network of 60 nodes arranged in an 8 × 5   ( 800   m × 500   m ) grid is modeled, with one node designated as the root and the remaining as sources. A typical IIoT data collection scenario is considered, wherein the root node serves as the sink for all packets transmitted by the sources, with a maximum hop distance of 6 . The packet transmission and interference ranges are both set to 100   m . The simulation is carried out with varying packet intervals from 2 s to 15 s and slotframe size from 31 slots to 101 slots, representing realistic IIoT data collection patterns. To evaluate the proposed technique, key performance parameters such as average end-to-end latency, contention probability, PDR, and network lifetime were analyzed by varying the slotframe size and packet generation intervals.
As end-to-end latency tends to increase with slotframe size, smaller slotframes are preferable for time-critical applications. However, smaller slotframes lead to higher energy consumption, as nodes remain active more frequently within a shorter time span. Consequently, for energy-constrained applications, larger slotframes are more suitable, though at the cost of increased latency. Additionally, larger slotframes may lead to a reduction in PDR due to an increased contention probability. With fewer transmission opportunities available in such slotframes, packet queues tend to grow longer, thereby increasing the risk of packet drops.
The proposed scheduler minimizes end-to-end latency by ensuring the delivery of packets from source to destination within a single slotframe. An additional slotframe is required only in cases of retransmission. Cells are allocated in successive segments along the route from source to destination, with segment lengths dynamically adapted based on the number of nodes at each level and the traffic they handle. The effectiveness of the proposed AAS has been evaluated and compared with state-of-the-art scheduling approaches, including the node-based autonomous technique Orchestra, the link-based ALICE scheduler, and A3 integrated with ALICE, as illustrated in Figure 5.
Figure 5. End-to-end latency versus slotframe length.
Unlike these schedulers, AAS models latency as a function of segment length rather than slotframe length. The number of nodes determines the segment length at a given rank and the corresponding link PDR. Orchestra allocates a unique cell to each node within a slotframe, using the sender’s or receiver’s address. Similarly, ALICE assigns a unique cell to each link in the network. These schemes incur higher latency, as multiple slotframes are required for end-to-end packet delivery. In the worst-case scenario, a cell with time offset t o k l may be allocated for the link ( k l ) , while t o k l + 1 is allocated for the link ( j k ) . This hop-to-hop scheduling leads to a maximum delay of s l o t f r a m e l e n g t h 1 per hop. Consequently, the worst-case end-to-end latency over a path with hops, h , can approach h slotframes.
A3 partitions the slotframe into multiple zones based on the traffic load at each node. Initially, it assigns primary cells to every link using the ALICE allocation strategy. When the utilization of primary cells exceeds a predefined threshold, secondary cells are allocated to accommodate the increased traffic. However, the limitation of A3 is that it allocates primary cells anywhere within a slotframe. When the schedule relies solely on primary cells, the resulting latency is comparable to that of Orchestra. The inclusion of secondary cells in A3 helps reduce latency by providing nodes with additional opportunities to forward packets. As shown in Figure 5, the proposed AAS technique outperforms existing approaches across all slotframe sizes. At a slotframe size of 31 , the end-to-end latency achieved by AAS is 32 % lower than A3, 63 % lower than ALICE, and 75 % lower than Orchestra. For a slotframe with 101 timeslots, AAS exhibits 53 % lower latency than A3 and 67 % lower than ALICE. Overall, AAS consistently achieves the lowest end-to-end latency among the compared techniques.
Contention probability is evaluated across varying slotframe sizes and packet intervals. The traffic load on each timeslot was estimated based on the traffic generated by the node and the slot duration, as described in ( 11 ) . In larger slotframes with sparser cell distributions, high network traffic leads to increased contention due to the limited availability of cells per unit time. Figure 6 presents the contention probability for different scheduling techniques across multiple slotframe sizes, with a packet interval of 1   s . It is observed to be lower in AAS compared to other schedulers due to its adaptive cell allocation strategy, which enables more efficient resource utilization. At a slotframe size of 101 , the contention probability in AAS is 30 % lower than A3, 58 % lower than ALICE, and 71 % lower than Orchestra. In A3, contention is comparatively more due to the dispersion of primary and secondary cells across the slotframe. In Orchestra and ALICE, contention remains high as they schedule a single Tx cell in a slotframe for every node. Figure 7 shows the reduction in contention in AAS with increasing packet intervals. At a slotframe length of 31 timeslots, the contention is 72 % lower when the packet interval is 5   s compared to an interval of 0.5   s .
Figure 6. Contention probability versus slotframe length.
Figure 7. Contention probability versus slotframe length for different packet intervals.
The average end-to-end PDR of the network is the ratio of the total number of packets received by the sink to the total number of packets transmitted by the sender. PDR in a network is affected with the increasing slotframe size, as a lesser number of cells are available for transmission. The results in Figure 8 show the end-to-end PDR of AAS for a slotframe size of 59 timeslots, and packet intervals are varied from 2   s to 15   s . The PDR of the AAS is 27 % higher than A3 when the packet interval is set to 2   s ; however, it is 14 % higher than Orchestra and 11 % higher than ALICE when an interval is set to 10   s . PDR in Orchestra and ALICE is reduced due to the limited transmission opportunities within a slotframe. In the case of A3, transmission opportunity is increased by using multiple zones; however, for higher traffic conditions, PDR is dropped below AAS due to higher congestion probability. AAS assigns the cells within a specified segment as per traffic requirement and links PDR, resulting in a lower congestion problem.
Figure 8. PDR versus packet interval.
The life of the network is decided by the node with the highest energy consumption. Nodes consume energy during active slots, used for data transmission, reception, and acknowledgment. The entire network may go down if any node, specifically closer to the root, runs out of energy. Nodes in Orchestra consume energy in idle listening at most of the time, as every node has a single Tx cell and Rx cells per neighbor. However, in A3, the allocated cells are doubled when its utilization is above a threshold value, which leads to more energy consumption. The proposed AAS algorithm improves energy efficiency by adapting to traffic conditions, hop count, and link reliability. It avoids over-provisioning by allocating a logarithmic number of cells based on the estimated queue backlog, which significantly reduces idle listening and channel contention. Similarly, the slotframe segmentation based on hop distance ensures that nodes closer to the root, typically experiencing higher traffic accumulation, are allocated more communication resources, while other nodes save energy by operating with fewer active slots. Moreover, by incorporating link quality into the slot allocation strategy, AAS minimizes retransmissions due to poor links, further reducing unnecessary energy consumption. These mechanisms reduce radio-on time and improve duty-cycle performance, thereby extending the overall network lifetime. Experimental results demonstrate that AAS achieves lower energy consumption compared to other schemes like ALICE and A3.
Figure 9 illustrates the network lifetime for different slotframe lengths. The result shows that when a packet interval is set to 1   m i n and the slotframe of 101 timeslots, the network lifetime in AAS is 10 % higher than A3, 23 % higher than ALICE, and 64 % higher than Orchestra. Node’s energy consumption is higher for a shorter slotframe, as nodes wake up more frequently. It can be minimized by increasing the slot frame size. However, it is at the cost of higher end-to-end latency. For a smaller slotframe with higher traffic conditions, AAS consumes more energy, as it has more active cells for a short period than in the Orchestra. For simulation, we considered 60 nodes that represent a mid-scale industrial scenario, balancing complexity and real-world density. To evaluate the scalability of the proposed AAS mechanism, we conducted simulations using 40 node count, arranged in grid topologies of 6 × 5   ( 600   m × 500   m ) . The performance in terms of latency, PDR, and contention remains comparable, with AAS demonstrating its advantage over existing schedulers.
Figure 9. Network lifetime versus slotframe length.

7. Conclusions

This paper proposes a 6TiSCH adaptive slotframe allocation technique AAS for IIoT applications. This technique uses the node’s MAC addresses and hops distance from the root to schedule the cell within a slotframe. The number of cells to be scheduled is estimated by monitoring the pending packets in a queue and the PDR of the link. By scheduling optimal cells, AAS improves the end-to-end latency and network lifetime. Mathematical analysis shows the performance of the AAS technique over current schedulers. Results show that the end-to-end latency of the AAS is up to 63 % lower than the ALICE and 32 % lower than the A3. The PDR of AAS is 27 % higher than A3 for a packet interval of 2   s and 11 % higher than ALICE for a packet interval of 10   s . The network lifetime with the AAS is up to 23 % longer than ALICE and 10 %   longer than the A3 scheduler. The results demonstrate that the proposed technique outperforms the existing approaches in terms of end-to-end latency, PDR, and network lifetime. This technique will significantly improve IIoT network performance.

Author Contributions

Conceptualization, N.P., B.S.C. and P.D.K.; methodology, N.P., B.S.C. and P.D.K.; software, N.P., B.S.C. and P.D.K.; validation, N.P., B.S.C. and P.D.K.; formal analysis, N.P., B.S.C. and P.D.K.; investigation, N.P., B.S.C. and P.D.K.; resources, N.P., B.S.C. and P.D.K.; writing—original draft preparation, N.P.; writing—review and editing, N.P., B.S.C. and P.D.K.; visualization, N.P., B.S.C. and P.D.K.; supervision B.S.C. and P.D.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Rose, K.; Eldridge, S.; Chapin, L. The Internet of Things (IoT): An Overview. Int. J. Eng. Res. Appl. 2015, 5, 71–82. [Google Scholar]
  2. De Guglielmo, D.; Anastasi, G.; Seghetti, A. From IEEE 802.15.4 to IEEE 802.15.4e: A step towards the Internet of Things. Adv. Intell. Syst. Comput. 2014, 260, 135–152. [Google Scholar] [CrossRef]
  3. Askhedkar, A.R.; Chaudhari, B.S. Energy Efficient LoRa Transmission over TV White Spaces. Int. J. Inf. Technol. 2023, 15, 4337–4347. [Google Scholar] [CrossRef]
  4. Serror, M.; Hack, S.; Henze, M.; Schuba, M.; Wehrle, K. Challenges and Opportunities in Securing the Industrial Internet of Things. IEEE Trans. Ind. Inf. 2021, 17, 2985–2996. [Google Scholar] [CrossRef]
  5. Thubert, P. An Architecture for IPv6 Over the Time-Slotted Channel Hopping Mode of IEEE 802.15.4 (6TiSCH). IETF RFC 9030, 2021. Available online: https://www.rfc-editor.org/info/rfc9030 (accessed on 8 June 2023).
  6. Vilajosana, X.; Watteyne, T.; Chang, T.; Vucinic, M.; Duquennoy, S.; Thubert, P. IETF 6TiSCH: A Tutorial. IEEE Commun. Surv. Tutor. 2020, 22, 595–615. [Google Scholar] [CrossRef]
  7. Gupta, S.; Chaudhari, B.S.; Chakrabarty, B. Vulnerable network analysis using war driving and security intelligence. In Proceedings of the 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 26–27 August 2016; pp. 1–5. [Google Scholar] [CrossRef]
  8. Rao, A.; Chaudhari, B.S. Development of LoRaWAN based Traffic Clearance System for Emergency Vehicles. In Proceedings of the 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 7–9 October 2020; pp. 217–221. [Google Scholar] [CrossRef]
  9. Winter, T.; Pascal, T.; Brandt, A.; Jonathan, H.; Richard, K.; Philip, L.; Kris, P.; Rene, S.; Jean-Philippe, V.; Roger, A. RPL: IPv6 Routing Protocol for Low Power and Lossy Networks. IETF RFC 6550 2012. Available online: https://datatracker.ietf.org/doc/html/rfc6550 (accessed on 12 June 2023).
  10. Pister, K.; Phinney, T.; Thubert, P.; Dwars, S. Industrial Routing Requirements in Low-Power and Lossy Networks. IETF RFC 5673. 2009. Available online: https://www.rfc-editor.org/rfc/rfc5673 (accessed on 12 November 2023).
  11. Askhedkar, A.; Chaudhari, B.; Zennaro, M.; Pietrosemoli, E. TV white spaces for low-power wide-area networks. In LPWAN Technologies for IoT and M2M Applications; Elsevier: Amsterdam, Netherlands, 2020; pp. 167–179. [Google Scholar] [CrossRef]
  12. Vucinic, M.; Chang, T.; Skrbic, B.; Kocan, E.; Pejanovic-Djurisic, M.; Watteyne, T. Key performance indicators of the reference 6TiSCH implementation in internet-of-things scenarios. IEEE Access 2020, 8, 79147–79157. [Google Scholar] [CrossRef]
  13. Askhedkar, A.; Chaudhari, B.; Zennaro, M. Hardware and software platforms for low-power wide-area networks. In LPWAN Technologies for IoT and M2M Applications; Elsevier: Amsterdam, Netherlands, 2020; pp. 397–407. [Google Scholar] [CrossRef]
  14. Jin, Y.; Kulkarni, P.; Wilcox, J.; Sooriyabandara, M. A centralized scheduling algorithm for IEEE 802.15.4e TSCH based industrial low power wireless networks. In Proceedings of the IEEE Wireless Communications and Networking Conference, WCNC, Doha, Qatar, 3–6 April 2016. [Google Scholar] [CrossRef]
  15. Palattella, M.R.; Accettura, N.; Dohler, M.; Grieco, L.A.; Boggia, G. Traffic aware scheduling algorithm for reliable low-power multi-hop IEEE 802.15.4e networks. In Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, Sydney, Australia, 9–12 September 2012. [Google Scholar] [CrossRef]
  16. Daneels, G.; Spinnewyn, B.; Latré, S.; Famaey, J. ReSF: Recurrent Low-Latency Scheduling in IEEE 802.15.4e TSCH networks. Ad. Hoc Netw. 2018, 69, 100–114. [Google Scholar] [CrossRef]
  17. Morell, A.; Vilajosana, X.; Vicario, J.L.; Watteyne, T. Label switching over IEEE802.15.4e networks. Trans. Emerg. Telecommun. Technol. 2013, 24, 458–475. [Google Scholar] [CrossRef]
  18. Municio, E.; Latré, S. Decentralized broadcast-based scheduling for dense multi-hop TSCH networks. In Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, New York, NY, USA, 3–7 October 2016. [Google Scholar] [CrossRef]
  19. Kotsiou, V.; Papadopoulos, G.Z.; Chatzimisios, P.; Theoleyre, F. LDSF: Low-Latency Distributed Scheduling Function for Industrial Internet of Things. IEEE Internet Things J. 2020, 7, 8688–8699. [Google Scholar] [CrossRef]
  20. Juc, I.; Alphand, O.; Guizzetti, R.; Favre, M.; Duda, A. Stripe: A Distributed Scheduling Protocol for 802.15.4e TSCH Networks; [Research Report] RR-LIG-54; Laboratoire d’Informatique de Grenoble: Saint-Martin-d’Hères, France, 2017; p. 6. Available online: https://hal.inria.fr/hal-01585904 (accessed on 8 June 2023).
  21. Soua, R.; Minet, P.; Livolant, E. Wave: A distributed scheduling algorithm for convergecast in IEEE 802.15.4e TSCH networks. Trans. Emerg. Telecommun. Technol. 2016, 27, 557–575. [Google Scholar] [CrossRef]
  22. Elsts, A.; Kim, S.; Kim, H.-S.; Kim, C. An empirical survey of autonomous scheduling methods for TSCH. IEEE Access 2020, 8, 67147–67165. [Google Scholar] [CrossRef]
  23. Elsas, R.; Van Leemput, D.; Hoebeke, J.; De Poorter, E. 3MSF: A Multi-Modal Adaptation of the 6TiSCH Minimal Scheduling Function for the Industrial IoT. Sensors 2024, 24, 2414. [Google Scholar] [CrossRef]
  24. Duquennoy, S.; Al Nahas, B.; Landsiedel, O.; Watteyne, T. Orchestra: Robust mesh networks through autonomously scheduled TSCH. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, SenSys 2015, Seoul, Republic of Korea, 1–4 November 2015; pp. 337–350. [Google Scholar] [CrossRef]
  25. Kim, S.; Kim, H.-S.; Kim, C. Alice: Autonomous link-based cell scheduling for TSCH. In Proceedings of the 2019 Information Processing in Sensor Networks, IPSN 2019, Montreal, QC, Canada, 16–18 April 2019; pp. 121–132. [Google Scholar] [CrossRef]
  26. Rekik, S.; Baccour, N.; Jmaiel, M.; Drira, K.; Grieco, L.A. Autonomous and Traffic-aware Scheduling for TSCH Networks. Comput. Netw. 2018, 135, 201–212. [Google Scholar] [CrossRef]
  27. Kim, S.; Kim, H.-S.; Kim, C. A3: Adaptive Autonomous Allocation of TSCH Slots. in IPSN’ 21. In Proceedings of the 20th International Conference on Information Processing in Sensor Networks, Nashville, TN, USA, 18–21 May 2021. [Google Scholar]
  28. Jeong, S.; Paek, J.; Kim, H.-S.; Bahk, S. TESLA: Traffic-Aware Elastic Slotframe Adjustment in TSCH Networks. IEEE Access 2019, 7, 130468–130483. [Google Scholar] [CrossRef]
  29. Chang, T.; Vučinić, M.; Guillén, X.V.; Dujovne, D.; Watteyne, T. 6TiSCH minimal scheduling function: Performance evaluation. Internet Technol. Lett. 2020, 3, e170. [Google Scholar] [CrossRef]
  30. Hauweele, D.; Koutsiamanis, R.-A.; Quoitin, B.; Papadopoulos, G.Z. Thorough performance evaluation & analysis of the 6TiSCH minimal scheduling function (MSF). J. Signal Process. Syst. 2022, 94, 3–25. [Google Scholar] [CrossRef]
  31. Righetti, F.; Vallati, C.; Gavioli, A.; Anastasi, G. Performance Evaluation of Adaptive Autonomous Scheduling Functions for 6TiSCH Networks. IEEE Access 2021, 9, 127576–127594. [Google Scholar] [CrossRef]
  32. Pradhan, N.M.; Chaudhari, B.S.; Zennaro, M. 6TiSCH Low Latency Autonomous Scheduling for Industrial Internet of Things. IEEE Access 2022, 10, 71566–71575. [Google Scholar] [CrossRef]
  33. Pradhan, N.; Chaudhari, B.S. Chaudhari. Traffic-aware autonomous scheduling for 6TiSCH networks. Int. J. Comput. Appl. 2022, 44, 1039–1046. [Google Scholar] [CrossRef]
  34. Kurniawan, A. Practical Contiki-NG; Apress: New York, NY, USA, 2018. [Google Scholar] [CrossRef]
  35. Duquennoy, S.; Elsts, A.; Al Nahas, B.; Oikonomo, G. TSCH and 6TiSCH for contiki: Challenges, design and evaluation. In Proceedings of the 2017 13th International Conference on Distributed Computing in Sensor Systems, DCOSS 2017, Ottawa, ON, Canada, 5–7 June 2017; pp. 11–18. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.