Next Article in Journal
Inhalation Injury Grading Using Transfer Learning Based on Bronchoscopy Images and Mechanical Ventilation Period
Previous Article in Journal
Terahertz Kerr Effect of Liquids
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cross-Layer MAC/Routing Protocol for Reliability Improvement of the Internet of Things

1
Department of Statistics, Duksung Women’s University, Seoul 01369, Republic of Korea
2
Department of Software, Duksung Women’s University, Seoul 01369, Republic of Korea
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(23), 9429; https://doi.org/10.3390/s22239429
Submission received: 17 October 2022 / Revised: 28 November 2022 / Accepted: 1 December 2022 / Published: 2 December 2022
(This article belongs to the Section Internet of Things)

Abstract

:
The IEEE 802.15.4 standard is recognized as one of the most successful for short-range low-rate wireless communications and is used in Internet of Things (IoT) applications. To improve the performance of wireless networks, interest in protocols that rely on interaction between different layers has increased. Cross-layer design has become an issue in wireless communication systems as it can improve the capacity of wireless networks by optimizing cooperation between multiple layers that constitute network systems. Power efficiency and network scalability must be addressed to spread IoT. In multi-hop networks, many devices share wireless media and are geographically distributed; consequently, efficient medium access control (MAC) and routing protocols are required to mitigate interference and improve reliability. Cross-layer design is a novel network design approach to support flexible layer techniques in IoT. We propose a cross-layer protocol for the MAC layer and routing layer to satisfy the requirements of various networks. The proposed scheme enables scalable and reliable mesh networking using the IEEE 802.15.4 standard and provides robust connectivity and efficient path discovery procedures. It also proposes a novel address-allocation technique to improve address-allocation methods that cannot support large sensor networks. Simulation results indicate that the proposed scheme could improve reliability and reduce end-to-end delay.

1. Introduction

The Internet of Things (IoT) is a system wherein many physical objects can be connected to the Internet using a wireless network. In this regard, different network architectures from heterogeneous communication technologies may be adopted depending on the nature of the services to be implemented (e.g., low data rate or high data rate), operational constraints (e.g., availability of external power sources), and coverage (e.g., long-range or short-range links). For example, if end-to-end communication is not possible due to power limitations and/or radio wave failures, mesh network and short-range communication technologies are preferred. In this case, multi-hop communication between devices can be used to pass information from the control center to the edge of the network. In this regard, the IEEE 802.15.4 standard [1] may be applied. Instead, star networks and long-distance communication techniques are preferred if direct and reliable links between the central hub and all nodes deployed in the coverage area are available. This topology can be adopted especially in most low-power wide-area networks (LPWANs) designed to interconnect battery-driven devices over long distances at low data rates.
These technologies can be used in a wide variety of applications related to buildings, industrial automation systems, health care, smart grids, and security [1,2]. A key concern of IoT is whether Internet protocol technology can be used in limited devices such as sensors and actuators. Devices used in IoT are devices with limited resources in memory, battery, bandwidth, and connectivity [3]. The Internet Engineering Task Force (IETF) formed a working group (WG) in 2013 and began standardizing activities to support the requirements of the IoT. As the IoT relates to various technologies, the IETF has working groups focused on four IoT areas—that is, the Internet, applications, routing, and security. Typically, there are low power wireless personal area network (6LoWPAN) WGs that have ended their current activities in the Internet area, constrained restful environments (CoRE) WG in the application area, routing over low-power and lossy networks (ROLL) WG in the routing area, and authentication and authorization for constrained environments (ACE) WG in the security area. The IETF WGs are actively working on standardizing IoT-based protocols to be used within low-power and lossy networks (LLNs) comprising wireless nodes with constraints in power and computing capacity.
Another key feature that IETF pays attention to in IoT standardization activities is allowing a wide range of “things” to use interoperable technologies to communicate with each other. Here, “things” range from built-in sensors to complex machines (e.g., cars) or even large infrastructure (e.g., bridges). Currently, deployable IoT stacks can easily configure many additional protocols, including protocols not designed for IoT or IETF (e.g., ISO Standard Message Queuing Remote Transport (MQTT) or IETF Standard HTTP). This is mainly due to the fact that IoT is important and suitable for various numbers of definitions, design visions, and deployments [4].
Recently, as research on smart cities, a national strategic project, has begun in earnest, the scope of application of IoT technology is expanding even more. One of the goals of the smart city concept is to monitor, control, and manage resources such as electricity. In this regard, the starting point for many current smart city implementations in Europe is the public lighting system [5,6]. In [7], the authors focus on the design of streetlight controllers to reduce power consumption and ultimately reduce public lighting costs.
There are studies that have adopted IEEE 802.15.4 technology in smart city scenarios. In [8], the authors discuss simulators for evaluating the performance of IEEE 802.15.4 and IEEE 802.11 when applied to such scenarios. In [9], the authors investigate the deployment of wireless sensor networks at road intersections in some of the world’s major cities. The authors show that the resulting graph is highly disconnected and comprises up to 25% isolated nodes, using propagation models corresponding to 2.4 GHz IEEE 802.15.4 technology and considering 52 city maps extracted from OpenStreetMap. One of the largest test beds related to smart cities is the Smart Santander [10], with approximately 3000 IEEE 802.15.4 devices deployed.
The effects associated with these applications are not limited to economic aspects, but are also the ability to construct and use capillary wireless networks that reach all locations with smart streetlights. Through this, the following new services can be provided.
Smart Parking: Real-time monitoring of parking lots (parking/user) [11,12,13,14,15,16,17,18]
Waste Management: Detecting waste levels in containers to optimize waste collection paths and schedules [19,20,21]
Air Quality: Air Pollution Monitoring [22,23,24,25]
Structural integrity: monitoring vibration and material conditions of buildings, bridges, and historical monuments [26,27,28]
Traffic monitoring and control: traffic jam detection and alternate path notification [29,30,31,32,33,34].
Recently, an Zigbee S2C module that expands the communication distance of Zigbee has been released. The Zigbee S2C has a range of 1.2 km and the Zigbee Pro S2C model is 3.2 km. The data transmission rate is 250 kbit/s for RF and the serial portion is 1 Mbit/s. There are 16 communication channels of Zigbee S2C and 15 communication channels of Zigbee Pro S2C [35]. The Zigbee S2C module is a very low-cost communication module suitable for streetlights installed at tens of meters apart.
Although existing Internet-related technologies on wireless network protocol can be applied to the IoT, many limitations have been expressed in technical applications as related applications have become remarkably diverse. In particular, various medium access control (MAC) and routing technologies have been proposed considering the IoT requirements. For example, IoT applications with low-power requirements use the IEEE 802.15.4 standard or associated extensions of it as the physical or media access control layer [36]. The IEEE 802.15.4 standard, a wireless personal area network (WPAN) standard, uses frequencies in the 2.4 GHz unlicensed band and has the advantage of being able to communicate at low power and low cost. Applications—such as building and industrial automation systems—use network technologies based on the IEEE 802.15.4 standard, such as ZigBee and WirelessHART. Recent market research shows that these standards account for approximately 50% of the building and industrial automation systems market [1]. By contrast, routing protocol technology still has no dominant solution. To address this problem, the IETF is working on standardizing routing protocols based on IEEE 802.15.4 MAC.
A crucial challenge for wireless MAC and routing protocols is to simultaneously satisfy the diverse network requirements of the IoT, interlayer interoperability, and standardization requirements [37]. In particular, the complex interactions between these MAC and routing layers must be considered in depth for critical IoT applications that have high-performance requirements, as traditional layer-separated research and development inevitably has many performance limitations [38]. For example, when the IoT is applied to a control system, the information at the source node must be delivered smoothly to the target node to ensure the stability of the overall control system. Consequently, performance measures such as the reliability, delay, and power consumption of the wireless network should be considered in depth. A fundamental consideration of the interaction between network layers is essential to satisfy these performance requirements.
Figure 1 shows the relationships between the MAC and routing layers using a block diagram. Information such as the topology of the application layer and the volume of traffic generated by the node becomes the input data to the entire system.
The network routing manager considers these system inputs and routing performance metrics to distribute traffic to the nodes in the network and forward data packets. Typical routing performance metrics include the end-to-end reliability, transmission latency, and overall network energy consumption. These routing performance metrics can be directly affected by the MAC technology because different MAC protocols exhibit different reliability, delay, energy consumption, and traffic congestion metrics for each link. Consequently, when MAC and routing layer technologies are designed independently in the feedback loop (Figure 1), it can be difficult to simultaneously satisfy various requirements such as reliability and delays.
High reliability and low latency transmission are very important factors in wireless sensor networks, and many studies are being conducted [39]. In a typical routing protocol that ensures reliability, a routing table with a calculated hop count is configured so that the shortest hop can be statistically selected. However, link failures, node mobility, and routing path changes make reliable data transmission difficult.
In this paper, we proposed a solution to support the reliability, scalability, and robustness of multi-hop IoT environments. We designed a MAC layer-based cross-layer protocol termed Topological Structure Mesh Routing (TSMR) protocol The proposed scheme provides robust connectivity and efficient route discovery procedures from the gateway to mobile and static leaves, and vice versa. Additionally, the proposed scheme provides fast and efficient association/reassociation procedures for the mobile nodes while limiting the impact of the signaling overhead to support the device’s mobility.

2. Background

2.1. Overview of the IEEE 802.15.4 Standard

The superframe structure of the IEEE 802.15.4 standard is shown in Figure 2. Superframes are divided into active and inactive sections. In addition, the active section consists of 16 slots, of which the beacon, which serves to synchronize nodes, is transmitted in the first time slot. It has a structure that can adjust the active and inactive parts by adjusting the beacon interval (BI) and the superframe duration (SD).
IEEE 802.15.4 MAC defines two access control methods—that is, competition-based unslotted CSMA/CA methods and hybrid-based beacon-enabled modes, which include slotted CSMA/CA and guaranteed time slot (GTS) allocation methods. When attempting to transmit a packet using the slotted CSMA/CA method, each node initializes four parameters—that is, the number of backoffs (NB) in the MAC layer, competing window length (CW), backoff exposure (BE), and retransmission number (RT).
The MAC layer generates a random number between units [0, 2BE–1], and waits until the generated backoff time ends. When the backoff time is over, the node monitors the channel state through clear channel assessment (CCA). If the CCA is idle, the node starts sending packets, and if the channel state becomes busy and the CCA fails, the MAC increases the NB and BE by one to the maximum values of macMaxCSMABackoffs and macMaxBE. If the BE value reaches macMaxBE, the maximum value is maintained until reset. If the NB value is greater than macMaxCSMABackoffs, the packet is discarded as a channel access failure. If not, the CSMA/CA algorithm uses a random number related to the backoff and repeats the process. If a node’s channel access is successful, it waits to transmit a packet and receives an ACK message. When the ACK corresponding to the transmitted packet is received, it can be considered that the packet has been successfully transmitted. If a packet is not received during a packet collision or ACK timeout, the RT variable increases one by one to the maximum value of macMaxFrameRetries. If the RT value is less than macMaxFrameRetries, the MAC initializes BE = macMinBE and repeats the CSMA/CA for channel reaccess.
IEEE 802.15.4 can use either 16-bit or 64-bit MAC addresses, mainly using a 16-bit short address system with low overhead, for identifying nodes within a wireless sensor network. The 64-bit extended unique identifier (EUI) provides a unique address system for sensor nodes. The advantage of the 16-bit short address is that it has less overhead when compressing the header. However, because it is not an address uniquely assigned to the sensor node, address duplication may occur, and the address may change due to link changes or network movement of the node. That is, network management is difficult by making individual discrimination and access of sensor nodes impossible in a wireless sensor network. The 64-bit EUI address allocation has a unique ID, and the address of the sensor node is maintained even when the link changes and moves, but the 64-bit address is used for header compression even in simple communication between sensors, so the overhead is larger than that of short address. In addition, EUI-based address generation does not provide a hierarchical concept address that can be used for hierarchical tree routing, which can be performed with low power–low memory resources. Therefore, it is necessary for the reliable and stable operation of wireless sensor networks to save limited resources of wireless sensor networks by reducing header size while maintaining existing addresses even when changing or moving links.

2.2. Related Work

The 6LoWPAN standard [40,41] proposes a routing technique with a hierarchical structure for 6LoWPAN (HiLow) [42], and the ZigBee [43] standard outlines the ZigBee tree routing (ZTR) structure. As network protocols with hierarchical structures allocate addresses with structural patterns to devices, complex calculations or processes are not required to establish the routing paths. Consequently, they are advantageous for networks consisting of devices with constrained resources.
The collection tree protocol (CTP) [44] is a routing protocol that considers unstable link quality and dynamically changing topologies in ad-hoc networks with low data rates. However, the CTP has the disadvantage of adding a network load by broadcasting periodic hello messages to check link quality and routing paths. Additionally, because it is a tree-based routing technique, data transfer from sensor nodes to sink nodes is possible, whereas other additional tasks are required for routing between neighboring nodes.
The link ordering-based data gathering protocol (LINKORD) [45], which works similarly to the CTP, proposed a new path cost function to prevent path construction that required more than the maximum number of transmissions allowed by the link layer. The proposed path cost function could construct a routing path with high throughput considering the data transmission probability and relative location of the link.
The general self-organized tree-based energy-balance routing protocol (GSTEB) [46] extends the life of the wireless sensor network (WSN) by balancing energy consumption. Tree-based routing techniques can reduce the resources required to establish and maintain the routing routes. However, for P2P traffic to communicate with adjacent nodes, tree-based routing techniques bypass packets through nearby nodes, which can create a bottleneck at the root peripheral node and reduce the packet transmission rate.
Efficient routing protocols for P2P traffic have also been proposed. The 6LoWPAN ad hoc-demand distance vector routing (LOAD) protocol [47] simplifies and optimizes the ad-hoc on-demand distance vector (AODV) routing protocol to suit the 6LoWPAN environment. Because the LOAD protocol performs routing path discovery immediately before data transmission, the algorithm can provide an almost optimal path for sending P2P traffic to neighboring nodes. The AODVjr protocol is a simplified version of the AODV protocol that is widely used in the Zigbee network routing algorithm, which reduces energy consumption and is easy to realize [48]. However, these algorithms are not suitable for resource-constrained devices because they generate many control packets for flood-based path discovery and consume considerable resources to maintain routing tables.
Shortcut tree routing (STR) algorithms [49,50,51] and enhanced hierarchical routing protocols (EHRPs) [52] are tree-based routing protocols that can efficiently transport P2P traffic. Instead of forwarding packets along the tree path, they can reduce hop distances by forwarding packets to nodes with the smallest remaining tree distance among the neighboring nodes. Enhanced STR (ISTR) [53] improves the P2P performance of STR by reducing hop counts and alleviating congestion using enhanced beacon frames and extended neighboring node tables. However, because they use tree topologies, when the tree structure is broken owing to link failure, they incorrectly predict the tree distance. Similarly, these tree-based routing protocols can affect the entire network if they fail along a path near the root.
The IPv6 routing protocol for low-power and lossy networks (RPL) is an IPv6 routing protocol under standardization in the ROLL WG of the IETF. RPL is designed for low-power and noisy network environments such as IEEE 802.15.4, power line communication, and supports a variety of routing metrics to accommodate the diverse requirements of several applications. To this end, functions corresponding to routing metrics and path optimization to achieve the requirements of each application were separated as objective function (OF), and the contents defined in the standard define general contents commonly used for various OFs [54]. There are many routing protocols that enhance RPL. In [55], the authors proposed a modification protocol to enable cluster trees in IEEE 802.15.4 to work efficiently with RPL. Based on this modified MAC layer, the authors used an opportunistic forwarding scheme [56] to extend the RPL capable of forwarding packets. Instead of always using the preferred parent, the node opportunistically forwards the packet through another parent as long as the sink path is better. In [57], the authors propose a proactive multipath load-balancing approach that seeks to achieve maximum life by equalizing traffic rates between nodes at the same distance in the local sink. In this algorithm, load balancing is performed through routing graphs generated by an Multi-class Multipath Routing Protocol (M2RPL) for low-power and lost networks. In [58], the authors proposed a multipath RPL (MRPL) algorithm to maximize network life and minimize total transmission costs. The algorithm proposed a novel heuristic load balancing mechanism (HeLD) to find the optimal traffic rate for each link and simultaneously equalize the rate of energy consumption between nodes of the same depth. In [59], the authors proposed a multipath routing protocol to provide efficient event packet forwarding in event-based wireless sensor networks using different mechanisms in the path-building and data-transfer phases. However, these multipath routing protocols only consider traffic flows to the sink, such as MP2P traffic. Accordingly, a bypass problem occurs during P2P communication, and packets converge around the sink.
Mesh-topology-based routing protocols offer promising techniques to overcome these reliability problems. Fault tolerance for a single-path failure can be achieved by maintaining both basic and alternative paths.
Wireless mesh networks have been considered promising access networks for next generation technology, providing better services and guaranteeing flexibility and robustness to different wireless network environments. The mesh network can take several paths from the source to the destination using the intermediate nodes within the network.
Riggio et al. [60] proposed a hybrid architecture that combined a WSN and a wireless mesh network (WMN). In [40], the sensor node only used resources (i.e., power) to implement sensing functions, whereas the mesh router collected encrypted data and then relayed the aggregated data to the sink, reducing the volume of traffic exchanged over the network and the resulting overall power consumption.
Muthukumaran et al. [61] proposed a distributed beacon scheduling-based MAC protocol for the IEEE 802.15.4 beacon mode. The proposed algorithm enabled low-power mesh networking through distributed beacon scheduling and was compatible with the IEEE 802.15.4 standard. Furthermore, the proposed scheme was able to improve the reliability of the IEEE 802.15.4 cluster-tree topology (which provided only a single communication path) by constructing a mesh topology.
The ISA 100 standard was designed to provide reliable and safe behavior in the field of system monitoring and control [62]. It defines the structure of networks, systems management, gateways, security managers, etc., for low-speed wireless connections to fixed, portable, and mobile devices that support limited power consumption conditions. The ISA 100 standard is fully compatible with the IEEE 802.15.4 standard, but it achieves similar results through simpler messages that use the data link layer subnet time shared as a security element without IEEE security.
Francesco et al. [63] proposed an adaptive access parameter tuning (ADAPT) algorithm based on analytical studies of the IEEE 802.15.4 standard. ADAPT is suitable for resource-constrained sensor nodes because of its low complexity, as it uses only local information on sensor nodes for network configuration and operation.
The IEEE 802.15.5 standard provides mesh capabilities for both high- and low-rate wireless personal area networks [64]. Low-rate meshes can be built on IEEE 802.15.4 MAC, with high-speed meshes being built on IEEE 802.15.3 MAC. The IEEE 802.15.5 standard provides basic mesh capabilities, including tree formation, address block allocation, and mesh routing. For low-rate sections, several important advanced features, including multicasting, power saving, and portability, have been presented. High-rate sections provide server-guided routing to support QoS provision. However, this standard involves changing the MAC superframe structure, which affects interoperability with the current MAC standard.
Silva et al. [65] proposed a methodology based on the automatic generation of fault trees to evaluate the reliability and availability of WSNs when permanent faults occurred in network devices. The proposed methodology supported all topologies, varying levels of redundancy, network reconfigurations, device importance, and arbitrary failure conditions. The proposed methodology was particularly suitable for the design and verification of WSNs when attempting to optimize the reliability and availability requirements.
In [66], the authors proposed a novel multi-path routing protocol method for event-driven WSNs that provided reliability, load balancing, and energy efficiency for routing paths. Furthermore, using residual energy as the main parameter for dynamic switching between two alternative paths, the algorithm could be deployed for the virtualization of WSNs.
Wei et al. [67] proposed a low-power grid-based cluster-routing algorithm for WSNs. A feature of the algorithm was that it configured nodes in the grid in a clustering manner. The clustering head was dynamically selected considering the energy consumption of the cluster node, before communicating with the base station through the relay node.
Shabani et al. [68] proposed a smart Zigbee/IEEE 802.15.4 MAC protocol for wireless sensor multi-hop mesh networks based on a beacon-enabled mode. The proposed algorithm could build a smart Zigbee/IEEE 802.15.4 MAC-based beacon-enabled mesh network while improving the performance of the network in terms of time delay, duty cycle, energy saving, and reliability.
Compared with existing studies, our proposed algorithm has the following characteristics: (1) The TSMR deals with the mobility of multi-hop WSNs based on the IEEE 802.15.4 standard, a still unresolved problem to the best of our knowledge. (2) The TSMR can find the optimal path with reduced computational overhead. (3) The TSMR provides an efficient and distributed address-allocation algorithm. (4) The TSMR improves the network reliability.

3. Topological Structure Mesh Routing

Energy consumption is one of the major problems in wireless communication systems, including the IoT. To address this, the IEEE 802.15.4 standard improves energy efficiency through time synchronization using a beacon frame broadcast by a coordinator. The IEEE 802.15.4 standard defines two types of devices—that is, a full function device (FFD) and a reduced-function device (RFD). FFDs can operate in three modes—namely, the coordinator, router, and device modes. Additionally, FFDs can be network coordinators without restrictions on the network topology configuration and can communicate with all the equipment on the network. Conversely, RFDs operate only in device mode and can only participate in a limited form of star topology. Additionally, RFDs cannot act as network coordinators and can only communicate with the parent router.
The IEEE 802.15.4 standard defines only one-hop communication among adjacent devices. Therefore, to support multi-hop communication, it provides a cluster-tree topology in which most devices are FFDs. RFDs may be associated with a cluster-tree network as leaf nodes because they can only communicate with the parent router, or FFD. The cluster-tree topology is capable of low-power consumption while performing multi-hop communication. However, in a cluster-tree topology, the entire network may be shut down because of the departure of a few router devices. The IEEE 802.15.5 standard address-allocation method can assign a unique address to all nodes throughout the network, but the disadvantage is that it takes some time to form an initial network in a large network and does not properly respond to the dynamic addition and deletion of nodes. Moreover, the memory overhead for storing the addresses of all the nodes increases.
The ZigBee protocol, established by the ZigBee Alliance—a leading standardization organization on WSNs—provides a distributed address-allocation technique that sets up a balanced tree-based address area and then configures a tree topology to allocate addresses. Currently, the distributed address allocation scheme using the Zigbee standard Cskip starts with a maximum tree depth (Lm), a maximum number of children (Cm), and a maximum number of routers (Rm) specified in advance. This has the advantage of simplifying routing by using only address information without requiring a separate routing table or route search process while ensuring the uniqueness of the address when a new node enters the network. However, the ZigBee address allocation scheme cannot support asymmetric networks. This is because all devices in the tree network use the same network parameters of Cm, Rm, and Lm values, and therefore use the same Cskip. Moreover, the value of the maximum network depth (Lm) is often very difficult to select before actually forming a network. When applied to a large-scale network, the predetermined parameters of Cm and Rm cannot always meet the address allocation requirements, which results in some nodes not being able to obtain network addresses and becoming orphaned [69,70,71,72]. Additionally, owing to the use of a fixed topology, an orphan problem can occur that cannot be accessed because of the exhaustion of addresses of neighboring routers, even though sufficient address areas remain in the network. An address-allocation scheme for large-scale networks should be able to shorten the initial network formation time, avoid generating excessive traffic in the network, and effectively respond to the dynamic addition and removal of nodes.
If the destination node locates the subtree of an intermediate node, the routing protocol of the cluster-tree network should find the next-hop node for a given destination address without a routing table. However, the sender node does not know whether the destination is located nearby or is not within the subtree itself. Consequently, cluster-tree-based routing cannot find multi-path routes between the source and destination devices and cannot optimize the routing path.
Figure 3 shows the drawbacks of the cluster-tree-based routing protocol.
In Figure 3, the source transmits a data frame through the base station, although the destination is in the communication range of the source device. Additionally, when the mobile device moves to another cluster, it transmits the reassociation frame to the base station and allocates a new address from the base station. To address these drawbacks, we proposed a new MAC layer-based cross-layer protocol for mesh routing.

3.1. Address Assignment

This section describes the proposed address allocation mechanism. It is to find the best path to send the most important data frames in the network layer to the destination in a multi-hop network. In this paper, we propose efficient routing using (x, y, z) coordinate values. The TSMR can improve the energy efficiency used in each node by reducing the waste of address space compared to the standard method.
The network frame format established by the ZigBee Alliance uses a total of 16 bits of address space for FFD devices and can allocate a total of 65,536 nodes. However, in a wireless communication environment, the components for space must be fully considered, and if 65,536 allocated nodes are not met, it results in a waste of address space. To solve this problem, a 16-bit address block range can be allocated as much as necessary under the administrator’s authority, such as (8, 4, 4) or (4, 4, 4), to each of the (x, y, z) coordinate values. In the case of routing in a wireless communication environment, routing costs are required according to how many hops it passes. Therefore, it can be said that the smaller the number of hops within the limit of communication, the more efficient the routing technique.
Figure 4 illustrates the proposed address-allocation scheme. In Figure 4, the address of each device in the TSMR consists of a row ID, column ID, and leaf ID. The row and column IDs indicate the hop counts in the row and column directions from the base station [0.0.0], respectively. For example, the device with address [1.1.0] is the router located at a distance 1 hop in the row and column directions from the base station. In other words, the proposed address refers to the relative location of the base station. In the TSMR, the leaf IDs of both the base station and router are set to 0, and the leaf ID of the leaf node is arbitrarily allocated by each router. Using the proposed addressing scheme, the source device can transmit a data frame to its destination without the help of a routing table. The detailed address-allocation scheme is as follows:
  • For the first time, the base station that receives the association-request frames from the FFDs selects two devices with the best RSSI and allocates two addresses—that is, [1.0.0] and [0.1.0]. The two routers that receive the association-response frame, [1.0.0] and [0.1.0], from the base station join the base station PAN.
  • The device that receives the beacon frame from the two routers with addresses [1.0.0] and [0.1.0] transmits the association-request frame—including the RSSI value of each received beacon frame—to the two routers. The device receives the beacon frame from only one router—that is, the association-request frame—including the RSSI value of the received beacon frame to the router. The two routers [1.0.0] and [0.1.0] transmit the association-relay frame, including the information of the received association-request frames, to the base station. The base station that receives the association-relay frames from the two routers allocates a new address [1.1.0] to the device with the best RSSI value. Additionally, it selects the device with the best RSSI among the devices that transmit the association-request frame to the router [1.0.0] and allocates a new address [2.0.0] to the selected router. In the same manner, the base station allocates a new address [0.2.0] to the router.
  • Similarly, the base station selects the device with the best RSSI among devices that transmit the association-request frames to two routers [x.y.0] and [(x + 1).(y − 1).0] and allocates a new address [(x + 1).y.0] for the selected devices.
As mentioned above, each router allocates a leaf ID with a non-zero value to the leaf nodes, the leaf ID being determined by the order in which the router adds them. In the TSMR, the address to which the leaf node is assigned is determined by the address of the parent router, and the base station is not involved. Accordingly, the TSMR may reduce the burden of the base station due to address allocation and management.

3.2. Initial PAN Construction

In this study, we assumed that the base station was connected to a personal computer via a USB/serial link to connect with the external network and become the first personal area network (PAN) coordinator in the mesh network. The coordinator that joined the mesh network is referred to as the router. In the TSMR, the FFD can operate as a router or leaf node, whereas the RFD can only operate as a leaf node and is connected to the router.
Figure 5 shows the timing diagram to configure the mesh network by the base station and router in the TSMR. As shown in Figure 4, the base station collects the network information including PAN ID and channel, and it selects non-overlapped channel and ID as PAN ID and channel. Then, the base station broadcasts the beacon frame which includes the information of the selected channel and PAN ID to the adjacent PAN router. The router that receives the information of the selected channel and PAN ID performs passive scan. The router transmits the association request frame. When the router receives the association response frame from the base station, it configures the mesh network and communicates with neighbor devices.
The base station collects the network information—including the PAN ID and channel—and selects the non-overlapped channel and ID as the PAN ID and channel, respectively. It then broadcasts the beacon frame—which includes the information of the selected channel and the PAN ID—to adjacent routers. The router that receives the channel information and PAN ID selected by the base station performs a passive scan. If the channel selected by the base station does not overlap with the channel used by the adjacent PAN or device, the router transmits an association-request frame, the base station receiving the association-request frame during the predefined beacon interval (BI). When the base station receives the association-request frame, it determines the received signal strength indicator (RSSI) field in the association-request frame and compares the values of the RSSI fields received from other routers. The base station then allocates the superframe durations (SD) to the routers that transmit the association-request frame. In this case, it allocates the closer SD of the base station to the router with the higher RSSI value. Subsequently, the base station transmits the association response frame—which includes the information of the allocated SD—to the routers. When the router receives an association-response frame from the base station, it completes the initial PAN construction process.
Figure 6 shows the proposed association-request frame format.
In Figure 6, the device-type field is used to distinguish between the FFD and RFD. If the device is an FFD, it sets the device-type field to 1. If not, the device-type field is set to 0 to indicate an RFD. When the device receives power, it sets the power-source field to 1. If not, the power-source field is set to 0. If the device does not turn off the receiver to save power during the idle period, it sets the receiver to an idle state when the idle field is 1. If not, it sets the receiver to an active state when the idle field is 0. If the device can send and receive encrypted MAC frames, the security-capability field is set to 1. If not, it sets the security-capability field to 0. If the device wants to be assigned a short address after joining the PAN, it sets the allocate-address field to 1. If not, the allocate-address field is set to 0. The RSSI field indicates the RSSI value of the frame received from the base station or router.
Figure 7 shows the proposed association response frame format. In Figure 7, the network ID field indicates the MAC address of the router and consists of the row and column ID. The short-address field indicates the MAC address of the leaf device. The leaf-ID field refers to an ID assigned by the leaf node from the router, the leaf-ID fields of the base station and router being set to 0. If the base station is not able to associate the device with its PAN, the short-address field is set to 0xff, and the association status field contains the reason for association failure. If the base station or router can associate the device with its PAN, this field contains the short address that the device may use in its communications on the PAN until it is disassociated. A short-address field value equal to 0xfe indicates that the device has been successfully associated with a PAN but has not been allocated a short address. In this case, the device communicates with the PAN by using only its extended address.

3.3. Network Expansion into a Mesh Topology

Figure 8 shows the process of network expansion into a mesh topology using the TSMR.
In Figure 8, routers A and B are associated with the PAN constructed by the base station using the TSMR. After joining the PAN, the routers broadcast beacon messages periodically. Routers C and D, which are not yet associated with the network, receive beacon messages from routers A and B. On the receipt of the beacon message, router D transmits the association-request frame to router B, and router C transmits the association-request message to routers A and B. Router A transmits an association relay message that includes the information of the association-request message received from router C. Router B, which receives association-request frames from two or more routers, aggregates the association-request frames and transmits the association-relay frame to the base station. If the base station receives the association-relay frame, it selects the SD for the router during the inactive period and transmits the association-response frame. The base station selects the SD for the router based on the RSSI field included in the association relay frame or request frame. If the router receives the association response frame, it determines the short-address field in the association-response frame. If the short address field of the received association response frame is the same as its own address, the PAN router initiates communication on the assigned SD.
Figure 9 shows the format of the proposed association-relay frame.
In Figure 9, the parent-network ID field represents the network ID of the parent router that received the association-request frame and consists of the raw ID and the column ID. The short-address field indicates the MAC address of the device that transmits the association-request frame. The leaf ID field points to the address assigned to the leaf device. The RSSI field is set to the RSSI value measured when the router receives an association-request frame.
Figure 10 shows the data transactions of mesh networks configured using the TSMR. In Figure 10, base station BS broadcasts a beacon frame at the superframe starting point. The neighboring router synchronizes with the base station using a beacon frame received from the base station. The router then broadcasts beacon frames in the beacon intervals. All routers receive beacon frames from neighboring routers and determine whether data frames should be received from neighboring routers. If there is no data frame to receive from the neighboring router, the base station and the router switch to sleep mode during the corresponding SD to reduce energy consumption. In addition, to avoid data collisions and congestion, all routers transmit data frames to neighboring routers in the contention free period (CFP). In Figure 10, when Router A transmits data to Router D, Router A uses a beacon frame to notify Router D of the data transmission. Router D may receive the data frame from the CFP allocated by Router A. All routers except A and D switch to power-saving mode during that interval to reduce energy consumption. Router B broadcasts a beacon frame including CFP allocation information when transmitting a data frame to Router C. Router C receives the data frame from Router B during the allocated CFP using the Beacon frame received from Router B.

3.4. Routing

The TSMR is based on a simple routing strategy in which the next route in the path is selected based on a hop count using the new addressing scheme. The source device calculates the distance from it to the destination using the row and column ID. After calculating the distance, it selects the neighboring router with the closest distance between the source and destination devices and transmits the data frame to the selected router. The same process is repeated until the data frame is delivered to the destination device. The detailed routing method is as follows:
a.
The source device or routers that receive the data frame subtract their own address [R1.C1.0] from the address of the destination device [R2.C2.z] and include the calculation results in the frame header—that is, D1 = [(R2−R1),(C2−C1).z].
b.
The source device or router selects the neighboring router with the closest distance to the destination device and transmits the data frame to the selected router. For example, the distance between the current location and destination device is D1 = [(Rd1 = (R2−R1)).Cd1 = (C2−C1).z], and the distance between the neighboring router and the destination device is Dn(Rdn.Cdn.0). The source device or router selects the neighboring router with the address [(|Rdn|<=|Rd1|).(|Cdn|<=|Cd1|.n] and transmits the data frame to the selected router.
c.
If there are two neighboring routers satisfying the condition [(|Rdn|<=|Rd1|).(|Cdn|<=|Cd1|).n], the source device or router randomly selects the next router and transmits the data frame to the selected router.
d.
Whenever the data frame moves one hop to the next router, the router decreases the row ID or column ID of D1 by one, based on the direction of movement.
e.
Steps b–d are repeated until Rd1 = 0 and Cd1 = 0.
The benefits of the TSMR protocol can be summarized as follows: (i) because a multi-path route between the source device and the destination device exists, the link failure is not influenced in the entire network; (ii) because the control message for the routing protocol is unnecessary, the TSMR protocol can reduce its energy consumption and control overhead; and (iii) using Steps a and c, the traffic load in the network is distributed.

3.5. Handoff

To maintain connection with the network, the leaf device periodically checks the link quality with the parent router through the received beacon frame. If the RSSI of the current parent router is lower than the defined threshold (equivalent to −70 dB), the leaf device searches for another router with a higher RSSI. When a router with a higher RSSI exists, the device can participate in the new network by sending an association-request frame to the new router.
Figure 11 shows an example of the proposed handover procedure.
In Figure 11a, a mobile node [1.1.1] moves into the communication area of the router [1.0.0] and starts the handover process by sending a handover-request frame to the router [1.1.0]. Figure 12 shows the format of the proposed handover-request frame.
The router [1.1.0] that receives the handover-request frame allocates a new address [1.0.1] to the mobile node and broadcasts the handover-response frame to all neighboring nodes. Figure 13 shows the proposed handover-response frame structure.
The mobile node that receives the handover-response frame starts the data transmission process. The base station that receives the handover-response frame relays the received frame to the neighboring router [0.1.0].
In the TSMR protocol, because coordinators rebroadcast the received handover-response frame to share information regarding the movement of a mobile device, some intermediate routers can recognize the new address of the moved device. Consequently, the source device can transmit a data frame to the new destination through an intermediate router that obtains the new address of the moved destination device, although it does not recognize the handover of the destination device. Also, if there is no response from the leaf device, the router buffers the packet. Upon receiving the handover response frame, the buffered packets are forwarded to the router that sent the handover response frame, and the router transmits the packets that are forwarded to the newly subscribed leaf device. This process cannot completely prevent packet loss, but it can minimize loss.
When the router moves, it broadcasts a handover-notification frame to its leaf device. The leaf devices that receive it transmits dummy data to the router, and the router selects the leaf device with the highest RSSI to the new router. The selected device changes its leaf ID to zero, and the legacy router performs a handover process.

4. Performance Evaluation

We used the OMNeT++ simulator [73] to evaluate the performance of the TSMR. The common simulation parameters are summarized in Table 1, and we adopted the energy model of CC2630 [74]. The simulation model of the IEEE 802.15.4 in [75] is good since it provides several MAC layer service primitives, channel scan operations, beacon management functions, and WPAN management functions. Therefore, it has been used in several studies to evaluate the performance of the TSMR. In [75], it consisted of the following modules—that is, an application layer implementing the traffic generator, battery module, network module, and physical layer module. The environmental parameter settings were determined by adjusting the variables in the omnetpp.ini configuration file of the model. The simulations were conducted in beacon-enabled mode, and all packets required an ACK frame. The devices were placed randomly on a 1000 × 1000 m plane. The simulations were run for 1000 s, with the number of devices in the network being 400. For accuracy, the same configuration simulation was performed 20 times.
In this simulation, we compared the TSMR with the IEEE 802.15.4 [1], RPL [54], and MeshMAC [61] schemes. For mesh networking using the IEEE 802.15.4 standard, we applied the AODV routing protocol in the IEEE 802.15.4 non-beacon enable mode.
Figure 14 shows the energy consumption as a function of the number of source devices.
In this simulation, the transmission pair was randomly selected. For the IEEE 802.15.4 standard, devices participating in routing consume significant energy to establish and maintain routes. Therefore, the IEEE 802.15.4 standard provides the lowest energy performance. MeshMAC provides beacon scheduling techniques to reduce power consumption, and all devices operate in duty cycles. Therefore, the MeshMAC provides better energy performance than the IEEE 802.15.4 standard. However, since intermediate devices on the path simply forward data frames to the next hop device without a fixed path, even unnecessary devices participate in routing. Thus, many intermediate devices consume energy to relay the data frame to the destination. RPL transmits packets by bypassing the route, generating many control packets for flooding-based path discovery and topology maintenance, which can cause network congestion. Therefore, the RPL consumes more power than the TSMR. TSMR provides the best energy performance because it does not generate control packets for routing frames, and control packets for path maintenance do not occur except for packets for handover.
Figure 15 shows the delivery success ratio as a function of the number of source devices. The delivery success ratio represents the ratio of the number of packets successfully arriving at the destination among data packets generated by the source node. Thus, this performance indicator implies the reliability of the data packet. As the number of source devices increases, many devices generate a large amount of control packets to set and maintain routing paths. In addition, because they participate in routing protocols and transmit data packets, the delivery success ratio of the IEEE 802.15.4 standard decreases and the collision probability increases significantly. Because packets in the RPL tend to bypass the route, they are concentrated on nodes close to the route, resulting in transmission failures around the route. Especially for IEEE 802.15.4 and RPL, the gap is much wider than the mesh topology. This is because it transmits control packets in a flood manner for route discovery and generates many control packets to maintain the set path, resulting in network congestion and packet drop. However, since MeshMAC and TSMR do not generate control packets for routing and do not transmit control packets for routing, the probability of collision between the two protocols is lower than that of the other protocols. As a result, the delivery ratio of TSMR and MeshMAC is superior to that of the IEEE 802.15.4 standard and the RPL.
Figure 16 shows the end-to-end delay as a function of network size.
In this simulation, all leaf devices in the network transmit data every second. As the number of devices in the network increases, traffic in the network increases. In the IEEE 802.15.4 standard, devices on the routing path transmit many control packets to set and maintain paths, and since all devices on the network participate in competition for data transmission, devices on the routing path have limited opportunities for data transmission and increase the probability of data collision. The end-to-end delay in the RPL is clearly longer than the delay in the mesh topology because it causes a bypass problem in which packets are passed to the root along a predefined path until they reach a common ancestor or root.
Figure 17 illustrates the packet loss rate when the number of mobile leaf nodes is varied.
In this simulation, the mobile leaf device moves at a speed of 1 m/s. In Figure 17, the MeshMAC and RPL methods exhibit the worst performance because they do not consider the mobility of router devices. In the IEEE 802.15.4 standard, the device performs a path recovery process in the AODV protocol to reduce packet loss. TSMR experiences some packet loss during the handover process, but the impact of device mobility is minimal.
Figure 18 shows the control overhead according to the number of devices moving. In Figure 18, the control overhead represents the total number of packets used for route discovery. This overhead shows the degree of energy consumption of the protocol because control packets cause energy consumption of the device and shorten the network life. When the device moves, a large number of devices must send control packets and reset the path to find the moving device. Thus, as the number of mobile devices increases, more control overhead occurs. TSMR also shows that as the number of devices moving increases, the control overhead increases, but the control overhead decreases because the number of control packets for resetting the routing path can be reduced.

5. Conclusions

In this paper, we proposed an IEEE 802.15.4 MAC layer-based cross-layer protocol for mesh routing. The TSMR can provide robust connectivity and efficient route discovery procedures from the base station to mobile and static leaves, and vice versa. Additionally, the proposed scheme provides fast and efficient association/reassociation procedures for the mobile nodes while limiting the impact of the signaling overhead to support the device’s mobility. Finally, the TSMR can provide an efficient and distributed address-allocation algorithm and improve the network reliability. We evaluated the performance of the IEEE 802.15.4 standard, RPL, MeshMAC, and TSMR through simulation using realistic radio models. Simulation results indicate that the TSMR can improve reliability and reduce end-to-end delays. The proposed protocol could be directly applied with a small overhead to the current IEEE 802.15.4 systems.

Author Contributions

Conceptualization, J.-W.K.; methodology, J.-W.K., J.K., and J.L.; software, J.-W.K. and J.L.; vali-dation, J.-W.K. and J.L.; formal analysis, J.-W.K., J.K., and J.L.; investigation, J.-W.K. and J.L.; re-sources, J.-W.K.; data curation, J.-W.K., J.K., and J.L.; writing—original draft preparation, J.-W.K. and J.K.; writing—review and editing, J.L.; visualization, J.-W.K., J.K., and J.L.; supervision, J.K. and J.L.; project administration, J.K. and J.L.; funding acquisition, J.K. and J.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the MSIT, grant number 2021R1A4A5028907 and 2022R1A2C1009951.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

This research was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (grant number: 2021R1A4A5028907 and 2022R1A2C1009951).

Conflicts of Interest

The authors declare that they have no conflict of interest.

References

  1. Giusto, D.; Iera, A.; Morabito, G.; Atzori, L. The Internet of Things; Springer: Berlin/Heidelberg, Germany, 2010. [Google Scholar] [CrossRef]
  2. Routing over Low Power and Lossy Networks. Internet Engineering Task Force (IETF). Available online: https://datatracker.ietf.org/wg/roll/charter/ (accessed on 10 October 2022).
  3. Bormann, C.; Ersue, M.; Keranen, A. RFC7228–Terminology for Constrained-Node Networks. May 2014. Available online: https://tools.ietf.org/rfc/rfc7228.txt (accessed on 10 October 2022).
  4. Minerva, R.; Biru, A.; Rotondi, D. Towards a Definition of the Internet of Things (IoT). IEEE Internet Initiat. 2015, 1, 1–86. Available online: https://iot.ieee.org/images/files/pdf/IEEE_IoT_Towards_Definition_Internet_of_Things_Issue1_14MAY15.pdf (accessed on 10 October 2022).
  5. Karlicek, R.F. Smart lighting—Beyond simple illumination. In Proceedings of the 2012 IEEE Photonics Society Summer Topical Meeting Series, Seattle, WA, USA, 9–11 July 2012; pp. 147–148. [Google Scholar] [CrossRef]
  6. Castro, M.; Jara, A.J.; Skarmeta, A.F.G. Smart Lighting Solutions for Smart Cities. In Proceedings of the 2013 27th International Conference on Advanced Information Networking and Applications Workshops, Barcelona, Spain, 25–28 March 2013; pp. 1374–1379. [Google Scholar] [CrossRef]
  7. Al-Shabibi, L.; Jayaraman, N.; Vrindavanam, J. Automobile speed violation detection system using RFID and GSM technologies. Int. J. Appl. Inf. Syst. 2014, 7, 24–29. [Google Scholar] [CrossRef]
  8. Fernandez, P.; Jara, A.J.; Skarmeta, A.F.G. Evaluation Framework for IEEE 802.15.4 and IEEE 802.11 for Smart Cities. In Proceedings of the 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Taichung, Taiwan, 3–5 July 2013; pp. 421–426. [Google Scholar] [CrossRef]
  9. Faye, S.; Chaudet, C. Connectivity analysis of wireless sensor networks deployments in smart cities. In Proceedings of the 2015 IEEE Symposium on Communications and Vehicular Technology in the Benelux (SCVT), Luxembourg, Luxembourg, 24 November 2015; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  10. Sotres, P.; Santana, J.R.; Sánchez, L.; Lanza, J.; Muñoz, L. Practical Lessons From the Deployment and Management of a Smart City Internet-of-Things Infrastructure: The Smart Santander Testbed Case. IEEE Access 2017, 5, 14309–14322. [Google Scholar] [CrossRef]
  11. Geng, Y.; Cassandras, C.G. A new “Smart Parking” System Infrastructure and Implementation. Procedia Soc. Behav. Sci. 2012, 54, 1278–1287. [Google Scholar] [CrossRef] [Green Version]
  12. Lin, T.S.; Rivano, H.; Le Mouël, F. Performance comparison of contention- and schedule-based mac protocols in urban parking sensor networks. In Proceedings of the 2014 ACM International Workshop on Wireless and Mobile Technologies for Smart Cities—WiMobCity ’14; ACM Press: New York, NY, USA, 2014; pp. 39–48. [Google Scholar] [CrossRef] [Green Version]
  13. Lee, P.; Tan, H.P.; Han, M. A solar-powered wireless parking guidance system for outdoor car parks. In Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems—SenSys ’11, Seattle, WA, USA, 1–4 November 2011; ACM Press: New York, NY, USA, 2011; p. 423. [Google Scholar] [CrossRef]
  14. Lambrinos, L.; Dosis, A. Applying mobile and internet of things technologies in managing parking spaces for people with disabilities. In Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication—UbiComp ’13 Adjunct, Zürich, Switzerland, 8–12 September 2013; ACM Press: New York, NY, USA, 2013; pp. 219–222. [Google Scholar] [CrossRef]
  15. Vora, A.; Kumar, M.A.; Srinivasa, K.G. Low Cost Internet of Things based Vehicle Parking Information System. In Proceedings of the 6th IBM Collaborative Academia Research Exchange Conference (I-CARE) on I-CARE 2014, Bangalore, India, 9–11 October 2014; ACM Press: New York, NY, USA, 2014; pp. 1–4. [Google Scholar] [CrossRef]
  16. Sahfutri, A.; Husni, N.L.; Nawawi, M.; Lutfi, I.; Silvia, A.; Prihatini, E. Smart Parking Using Wireless Sensor Network System. In Proceedings of the 2018 International Conference on Electrical Engineering and Computer Science (ICECOS), Pangkal Pinang, Indonesia, 2–4 October 2018; pp. 117–122. [Google Scholar] [CrossRef]
  17. Grodi, R.; Rawat, D.B.; Rios-Gutierrez, F. Smart parking: Parking occupancy monitoring and visualization system for smart cities. In Proceedings of the Southeast Conference 2016, Norfolk, VA, USA, 30 March–3 April 2016; pp. 1–5. [Google Scholar] [CrossRef]
  18. Qadir, Z.; Al-Turjman, F.; Khan, M.A.; Nesimoglu, T. ZIGBEE Based Time and Energy Efficient Smart Parking System Using IOT. In Proceedings of the 2018 18th Mediterranean Microwave Symposium (MMS), Istanbul, Turkey, 31 October–2 November 2018; pp. 295–298. [Google Scholar] [CrossRef]
  19. Karthikeyan, S.; Rani, G.S.; Sridevi, M.; Bhuvaneswari, P.T.V. IoT enabled waste management system using ZigBee network. In Proceedings of the 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology (RTEICT), Bangalore, India, 19–20 May 2017. [Google Scholar] [CrossRef]
  20. Raaju, V.A.; Meeran, J.M.; Sasidharan, M.; Premkumar, K. IOT based smart garbage monitoring system using ZigBee. In Proceedings of the 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), Pondicherry, India, 29–30 March 2019. [Google Scholar] [CrossRef]
  21. Longhi, S.; Marzioni, D.; Alidori, E.; Di Buo, G.; Prist, M.; Grisostomi, M.; Pirro, M. Solid waste management architecture using wireless sensor network technology. In Proceedings of the 2012 5th International Conference on New Technologies, Mobility and Security (NTMS), Istanbul, Turkey, 7–10 May 2012. [Google Scholar] [CrossRef]
  22. Peng, C.; Qian, K.; Wang, C. Design and Application of a VOC-Monitoring System Based on a ZigBee Wireless Sensor Network. IEEE Sens. J. 2015, 15, 2255–2268. [Google Scholar] [CrossRef]
  23. He, Y.-H.; Geng, S.-Q.; Peng, X.-H.; Hou, L.-G.; Gao, X.-K.; Wang, J.-H. Design of outdoor air quality monitoring system based on ZigBee wireless sensor network. In Proceedings of the IEEE International Conference on Solid-State and Integrated Circuit Technology (ICSICT), Hangzhou, China, 25–28 October 2016; pp. 368–370. [Google Scholar] [CrossRef]
  24. Arroyo, P.; Lozano, J.; Suárez, J.I.; Herrero, J.L. Wireless Sensor Network for Air Quality Monitoring and Control. Chem. Eng. Trans. 2016, 54, 217–222. Available online: https://www.aidic.it/cet/16/54/037.pdf (accessed on 10 October 2022).
  25. Arroyo, P.; Lozano, J.; Suárez, J. Evolution of Wireless Sensor Network for Air Quality Measurements. Electronics 2018, 7, 342. [Google Scholar] [CrossRef] [Green Version]
  26. Wang, P.; Yan, Y.; Tian, G.Y.; Bouzid, O.; Ding, Z. Investigation of wireless sensor networks for structural health monitoring. J. Sens. 2012, 2012, 156329. [Google Scholar] [CrossRef] [Green Version]
  27. Torfs, T.; Sterken, T.; Brebels, S.; Santana, J.; Hoven, R.; Spiering, V.; Bertsch, N.; Trapani, D.; Zonta, D. Low power wireless sensor network for building monitoring. IEEE Sens. J. 2013, 13, 909–915. [Google Scholar] [CrossRef] [Green Version]
  28. Noel, A.B.; Abdaoui, A.; Elfouly, T.; Ahmed, M.H.; Badawy, A.; Shehata, M.S. Structural health monitoring using wireless sensor networks: A comprehensive survey. IEEE Commun. Surv. Tuts. 2017, 19, 1403–1423. [Google Scholar] [CrossRef]
  29. Tao, H.; Liu, W.; Ma, S. Intelligent transportation system for wireless sensor networks based on ZigBee. In Proceedings of the International Conference on Computer and Communication Technologies in Agriculture Engineering, Changdu, China, 12–13 June 2010; pp. 396–399. [Google Scholar] [CrossRef]
  30. Zhou, J.; Li, C.; Zhang, Z. Intelligent transportation system based on SIP/ZigBee architecture. In Proceedings of the IEEE International Conference on Image Analysis and Signal Processing (IASP), Wuhan, China, 21–23 October 2011; pp. 405–409. [Google Scholar] [CrossRef]
  31. Eren, H.; Pakka, M.H.; AlGhamdi, S.A.; Yue, Y. Instrumentation for safe vehicular flow in intelligent traffic control systems using wireless networks. In Proceedings of the IEEE International conference on Instrumentation and Measurement Technology (I2MTC), Minneapolis, MN, USA, 6–9 May 2013; pp. 1301–1305. [Google Scholar] [CrossRef] [Green Version]
  32. Roy, S.; Sen, R.; Kulkarni, S.; Kulkarni, P.; Raman, B.; Singh, L.K. Wireless across road: RF based road traffic congestion detection. In Proceedings of the 2011 Third International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, 4–8 January 2011; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  33. Horvat, G.; Šoštari’c, D.; Žagar, D. Using radio irregularity for vehicle detection in adaptive roadway lighting. In Proceedings of the MIPRO, 2012 35th International Convention, Opatija, Croatia, 21–25 May 2012; pp. 748–753. [Google Scholar]
  34. Balid, W.; Tafish, H.; Refai, H.H. Versatile real-time traffic monitoring system using wireless smart sensors networks. In Proceedings of the Wireless Communications and Networking Conference (WCNC), Doha, Qatar, 3–6 April 2016; pp. 1–6. [Google Scholar] [CrossRef]
  35. XBee S2C Module Pinout, Features & Datasheet. Available online: https://components101.com/wireless/xbee-s2c-modulepinout-datasheet (accessed on 10 October 2022).
  36. IEEE Std 802.15.4-2020; IEEE Standard for Low-Rate Wireless Networks. IEEE P802.15 Working Group: Piscataway, NJ, USA, 2020; pp. 1–800. [CrossRef]
  37. Park, P.; Khadilkar, H.; Balakrishnan, H.; Tomlin, C.J. High confidence networked control for next generation air transportation systems. IEEE Trans. Autom. Control 2014, 59, 3357–3372. [Google Scholar] [CrossRef] [Green Version]
  38. Park, P. Traffic generation rate control of wireless sensor and actuator networks. IEEE Commun. Lett. 2015, 19, 827–830. [Google Scholar] [CrossRef]
  39. Akkaya, K.; Younis, M. A survey on routing protocols for wireless sensor networks. Ad Hoc Netw. 2005, 3, 325–349. [Google Scholar] [CrossRef] [Green Version]
  40. Mulligan, G. 6LoWPAN WG. In the 4th Workshop on Embedded Networked Sensors; The 6LoWPAN Architecture. 2007, pp. 78–82. Available online: https://datatracker.ietf.org/doc/pdf/draft-williams-6lowpan-mob-03.pdf (accessed on 10 October 2022).
  41. Hui, J.; Thubert, P. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks. In IETF 6Lo WG. Available online: https://datatracker.ietf.org/doc/rfc6282/ (accessed on 10 October 2022).
  42. Kim, K.; Yoo, S.; Park, D.S.; Lee, J. Hierarchical Routing over 6LoWPAN (HiLow). In IETF Internet-Draft. 2007. Available online: https://datatracker.ietf.org/doc/html/draft-daniel-6lowpan-hilow-hierarchical-routing-01 (accessed on 10 October 2022).
  43. Sturek, D. ZigBee Alliance. Available online: https://csa-iot.org/ (accessed on 10 October 2022).
  44. Gnawali, O.; Fonseca, R.; Jamieson, K.; Moss, D.; Levis, P. Collection tree protocol. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys), Berkeley, CA, USA, 4–6 November 2009; pp. 1–14. [Google Scholar] [CrossRef] [Green Version]
  45. Radi, M.; Dezfouli, B.; Bakar, K.A.; Razak, S.A.; Lee, M. LINKORD: Link ordering-based data gathering protocol for wireless sensor networks. Computing 2015, 97, 205–236. [Google Scholar] [CrossRef]
  46. Han, Z.; Wu, J.; Zhang, J.; Liu, L.; Tian, K. A general self-organized tree-based energy-balance routing protocol for wireless sensor network. IEEE Trans. Nucl. Sci. 2014, 61, 732–740. [Google Scholar] [CrossRef]
  47. Kim, K.; Park, D.; Montenegro, G.; Yoo, S.; Kushalngar, N. 6LoWPAN ad Hoc on-Demand Distance Vector Routing (LOAD). In IETF Internet-Draft. 2007. Available online: https://datatracker.ietf.org/doc/html/draft-daniel-6lowpan-load-adhoc-routing-03 (accessed on 10 October 2022).
  48. Chakeres, I.D.; Klein-Berndt, L. AODVjr, AODV simplified. SIGMOBILE Mob. Comput. Commun. Rev. 2002, 6, 100–101. [Google Scholar] [CrossRef]
  49. Kim, T.; Hoon Kim, S.; Yang, J.; Yoo, S.-E.; Kim, D. Neighbor table based shortcut tree routing in ZigBee wireless networks. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 706–716. [Google Scholar] [CrossRef]
  50. Kwon, K.; Ha, M.; Kim, T.; Kim, S.; Kim, D. The stateless point to point routing protocol based on shortcut tree routing algorithm for IP-WSN. In Proceedings of the 3rd International Conference on the Internet of Things (IoT), Wuxi, China, 24–26 October 2012; pp. 167–174. [Google Scholar] [CrossRef]
  51. Hong, S.; Kim, D.; Ha, M.; Bae, S.; Park, S.; Jung, W.; Kim, J. SNAIL: An IP-based wireless sensor network approach to the internet of things. IEEE Wirel. Commun. 2010, 17, 34–42. [Google Scholar] [CrossRef]
  52. Ha, J.Y.; Park, H.S.; Choi, S.; Kwon, W.H. Ehrp: Enhanced hierarchical routing protocol for ZigBee mesh networks. IEEE Commun. Lett. 2007, 11, 1028–1030. [Google Scholar] [CrossRef]
  53. Liu, Y.; Qian, K. A novel tree-based routing protocol in ZigBee wireless networks. In Proceedings of the 8th IEEE International Conference on Communication Software and Networks (ICCSN), Beijing, China, 4–6 June 2016; pp. 469–473. [Google Scholar] [CrossRef]
  54. Winter, T.; Thubert, P.; Brandt, A.; Clausen, T.; Hui, J.; Kelsey, R.; Levis, P.; Pister, K.; Struik, R.; Vasseur, J.P.; et al. RPL: IPv6 Routing Protocol for Low Power and Lossy Networks. In IETF Roll WG. 2016. Available online: https://tools.ietf.org/html/rfc6550 (accessed on 10 October 2022).
  55. Pavkoivic, B.; Theoleyre, F.; Duda, A. Multipath opportunistic RPL routing over IEEE 802.15.4. In Proceedings of the 14th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami, FL, USA, 31 October–4 November 2011; pp. 179–186. [Google Scholar] [CrossRef]
  56. Biswas, S.; Morris, R. ExOR: Opportunistic multi-hop routing for wireless networks. In Proceedings of the Annual Conference of the Special Interest Group on Data Communication (SIGCOMM), Philadelphia, PA, USA, 22–26 August 2005; pp. 133–144. [Google Scholar] [CrossRef]
  57. Moghadam, M.N.; Taheri, H. Multi-class multipath routing protocol for low power wireless networks with heuristic optimal load distribution. Wirel. Pers. Commun. 2015, 82, 861–881. [Google Scholar] [CrossRef]
  58. Moghadam, M.N.; Taheri, H.; Karrari, M. Minimum cost load balanced multipath routing protocol for low power and lossy networks. Wirel. Netw. 2014, 20, 2469–2479. [Google Scholar] [CrossRef]
  59. Raid, M.; Dezfouli, B.; Bakar, K.A.; Razak, S.A.; Hwee-Pink, T. IM2PR: Interference-minimized multipath routing protocol for wireless sensor networks. Wirel. Netw. 2014, 20, 1807–1823. [Google Scholar] [CrossRef]
  60. Riggio, R.; Rasheed, T.; Sicari, S. Performance evaluation of a hybrid mesh and sensor network. In Proceedings of the IEEE Global Telecommunications Conference GLOBECOM, Houston, TX, USA, 5–9 December 2011; pp. 1–6. [Google Scholar]
  61. Muthukumaran, P.S.; de Paz, R.; Špinar, R.; Pesch, D. MeshMAC: Enabling mesh networking over IEEE802.15.4 through distributed beacon scheduling. In Proceedings of the First International Conference on Ad Hoc Networks (AdHocNets09), Niagara Falls, ON, Canada, 22–25 September 2009; pp. 561–575. [Google Scholar] [CrossRef]
  62. International Society of Automation. ISA100, Wireless Systems for Automation. Available online: https://www.isa.org/standards-and-publications/isa-standards/isa-standards-committees/isa100 (accessed on 10 October 2022).
  63. Di Francesco, M.; Anastasi, G.; Conti, M.; Das, S.K.; Neri, V. Reliability and energy efficiency in IEEE 802.15.4/ZigBee sensor networks: A cross-layer approach. IEEE J. Sel. Areas Commun. 2011, 29, 1508–1524. [Google Scholar] [CrossRef] [Green Version]
  64. Lee, M.J.; Zhang, R.; Zhu, C.; Park, T.R.; Shin, C.-S.; Jeon, Y.-A.; Lee, S.-H.; Choi, S.-S.; Liu, Y.; Park, S.-W. Meshing wireless personal area networks: Introducing IEEE 802.15.5. IEEE Commun. Mag. 2010, 48, 54–61. [Google Scholar] [CrossRef]
  65. Silva, I.; Guedes, L.A.; Portugal, P.; Vasques, F. Reliability and availability evaluation of wireless sensor networks for industrial applications. Sensors 2012, 12, 806–838. [Google Scholar] [CrossRef] [Green Version]
  66. Tran-Vinh, T.; Quynh, T.N.; Quynh, M.B.T. EMRP: Energy-aware mesh routing protocol for wireless sensor networks. In Proceedings of the International Conference on Advanced Technologies for Communications (ATC 2012), Hanoi, Vietnam, 10–12 October 2012; pp. 78–82. [Google Scholar] [CrossRef]
  67. Liu, W.; Wang, Z.; Zhang, S.; Wang, Q. A low power grid based cluster routing algorithm of wireless sensor networks. In Proceedings of the International Forum on Information Technology and Applications, Kunming, China, 16–18 July 2010; pp. 227–229. [Google Scholar] [CrossRef]
  68. Shabani, H.; Ahmed, M.M.; Khan, S.; Hameed, S.A.; Habaebi, M.H. Smart Zigbee/IEEE 802.15.4 MAC for wireless sensor multi-hop mesh networks. In Proceedings of the IEEE 7th International Power Engineering and Optimization Conference (PEOCO), Langkawi, Malaysia, 3–4 June 2013; pp. 282–287. [Google Scholar] [CrossRef]
  69. Pan, M.S.; Tsai, C.H.; Tseng, Y.C. The orphan problem in ZigBee wireless networks. IEEE Trans. Mob. Comput. 2009, 8, 1573–1584. [Google Scholar] [CrossRef]
  70. Giri, D.; Roy, U.K. Address borrowing in wireless personal area network. In Proceedings of the IEEE International Advance Computing Conference, (IACC 2009), Patiala, India, 6–7 March 2009; pp. 181–186. [Google Scholar] [CrossRef]
  71. Fang, M.Q.; Wang, J.; Xu, X.H. A preemptive distributed address assignment mechanism for wireless sensor networks. In Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing, (WICOM 2008), Dalian, China, 12–17 October 2008; pp. 1–5. [Google Scholar] [CrossRef]
  72. Yen, L.H.; Tsai, W.T. Flexible address configurations for tree-based ZigBee/IEEE 802.15.4 Wireless Networks. In Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, (AINA 2008), Okinawa, Japan, 25–28 March 2008; pp. 395–402. [Google Scholar] [CrossRef]
  73. Omnet++ Homepage [Online]. Available online: http://www.omnetpp.org (accessed on 10 October 2022).
  74. Texas Instruments. CC2630 Datasheet. 2015. Available online: http://www.ti.com/lit/gpn/cc2630 (accessed on 10 October 2022).
  75. Chen, F.; Dressler, F. A Simulation Model of IEEE 802.15.4 in OMNeT++. In Proceedings of 6th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze; KuVS: Aachen, Germany, 2007; pp. 35–38. [Google Scholar]
Figure 1. Modeling and design based on MAC and routing layer interaction.
Figure 1. Modeling and design based on MAC and routing layer interaction.
Sensors 22 09429 g001
Figure 2. The superframe structure of the IEEE 802.15.4 standard.
Figure 2. The superframe structure of the IEEE 802.15.4 standard.
Sensors 22 09429 g002
Figure 3. Drawbacks of the cluster-tree protocol.
Figure 3. Drawbacks of the cluster-tree protocol.
Sensors 22 09429 g003
Figure 4. Proposed network address-allocation scheme.
Figure 4. Proposed network address-allocation scheme.
Sensors 22 09429 g004
Figure 5. The timing diagram for constructing the PAN in the TSMR.
Figure 5. The timing diagram for constructing the PAN in the TSMR.
Sensors 22 09429 g005
Figure 6. Format of the proposed association-request frame.
Figure 6. Format of the proposed association-request frame.
Sensors 22 09429 g006
Figure 7. Format of the proposed association-response frame.
Figure 7. Format of the proposed association-response frame.
Sensors 22 09429 g007
Figure 8. Process of the proposed network expansion.
Figure 8. Process of the proposed network expansion.
Sensors 22 09429 g008
Figure 9. Format of the proposed association-relay frame.
Figure 9. Format of the proposed association-relay frame.
Sensors 22 09429 g009
Figure 10. Data flow of the mesh network configured using the TSMR.
Figure 10. Data flow of the mesh network configured using the TSMR.
Sensors 22 09429 g010
Figure 11. Example of the proposed handover procedure.
Figure 11. Example of the proposed handover procedure.
Sensors 22 09429 g011
Figure 12. The format of the proposed handover-request frame.
Figure 12. The format of the proposed handover-request frame.
Sensors 22 09429 g012
Figure 13. The proposed handover-response frame structure.
Figure 13. The proposed handover-response frame structure.
Sensors 22 09429 g013
Figure 14. Energy consumption of the network as a function of the number of source devices.
Figure 14. Energy consumption of the network as a function of the number of source devices.
Sensors 22 09429 g014
Figure 15. Delivery success ratio as a function of the number of source devices.
Figure 15. Delivery success ratio as a function of the number of source devices.
Sensors 22 09429 g015
Figure 16. End-to-end delay as a function of the network size.
Figure 16. End-to-end delay as a function of the network size.
Sensors 22 09429 g016
Figure 17. Packet loss ratio as a function of the number of mobile nodes.
Figure 17. Packet loss ratio as a function of the number of mobile nodes.
Sensors 22 09429 g017
Figure 18. Control overhead as a function of the number of mobile nodes.
Figure 18. Control overhead as a function of the number of mobile nodes.
Sensors 22 09429 g018
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParametersValue
Transmission power (dBm)3.5
Bandwidth2.8 MHz
Synchronization modeBeacon-enabled
Carrier sense sensitivity−85 dBm
Channel number11
IEEE 802.15.4 Header Length 22 bytes
Packet Size50 bytes
RX current consumption5.9 mA
TX current consumption9.1 mA
IDLE current consumption0.550 mA
Sleep current consumption0.001 mA
BO10
SO4
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kim, J.-W.; Kim, J.; Lee, J. Cross-Layer MAC/Routing Protocol for Reliability Improvement of the Internet of Things. Sensors 2022, 22, 9429. https://doi.org/10.3390/s22239429

AMA Style

Kim J-W, Kim J, Lee J. Cross-Layer MAC/Routing Protocol for Reliability Improvement of the Internet of Things. Sensors. 2022; 22(23):9429. https://doi.org/10.3390/s22239429

Chicago/Turabian Style

Kim, Jin-Woo, Jaehee Kim, and Jaeho Lee. 2022. "Cross-Layer MAC/Routing Protocol for Reliability Improvement of the Internet of Things" Sensors 22, no. 23: 9429. https://doi.org/10.3390/s22239429

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop