Next Article in Journal
Transformer Decoder-Based Enhanced Exploration Method to Alleviate Initial Exploration Problems in Reinforcement Learning
Previous Article in Journal
Perforated Concave Earplug (pCEP): A Proof-of-Concept Earplug to Improve Sound Localization without Compromising Noise Attenuation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Experimental Field Comparison of Wi-Fi HaLow and LoRa for the Smart Grid

1
Faculty of Science, Queensland University of Technology, Brisbane, QLD 4000, Australia
2
Cyber Security Cooperative Research Centre, Brisbane, QLD 4000, Australia
3
Faculty of Engineering, Queensland University of Technology, Brisbane, QLD 4000, Australia
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(17), 7409; https://doi.org/10.3390/s23177409
Submission received: 26 July 2023 / Revised: 17 August 2023 / Accepted: 22 August 2023 / Published: 25 August 2023
(This article belongs to the Section Internet of Things)

Abstract

:
IEEE 802.11ah, or Wi-Fi HaLow, is a long-range Internet of Things (IoT) communication technology with promising performance claims. Being IP-based makes it an attractive prospect when interfacing with existing IP networks. Through real-world performance experiments, this study evaluates the network performance of Wi-Fi HaLow in terms of throughput, latency, and reliability against IEEE 802.11n (Wi-Fi n) and a competing IoT technology LoRa. These experiments are enabled through three proposed network evaluation architectures that facilitate remote control of the devices in a secure manner. The performance of Wi-Fi HaLow is then assessed against the network requirements of various smart grid applications. Wi-Fi HaLow offers promising performance when compared to rival technology LoRa. This study is the first to evaluate Wi-Fi HaLow in an authentic experimental way, providing performance data and insights that are not possible through simulation and modelling alone. This work provides the basis for further evaluation and implementation of this emerging technology.

1. Introduction

The smart grid continues to modernise and improve the traditional power grid of the last century through the introduction and use of modern wired and wireless communication technologies. This bi-directional transmission of energy and supporting data are critical to energy security and a complete transition to renewable energy. It enables improvements in areas such as reliability, diagnosis of faults, demand management, energy efficiency, smart metering, and consumer convenience [1]. When discussing such essential critical infrastructure and the integration of data networks into a vital asset such as the electricity grid, network performance and cybersecurity are crucial factors that must be considered.
The recent IEEE 802.11ah standard marketed as Wi-Fi HaLow [2] promises to offer long-range data links and lower power consumption in the sub-GHz bands. There have been numerous studies examining the performance of Wi-Fi HaLow; however, due to the fact that there were no devices in existence, these studies were all theoretical in nature.
This study examines Wi-Fi HaLow in the context of the smart grid. It does this through authentic, real-world testing of the first available Wi-Fi HaLow module, the Silex technology SX-NEWAH based on the NRC7292 chipset from Newracom [3]. The performance of this new module is examined comparatively against IEEE 802.11n (Wi-Fi n) and LoRa, a competing long-range sub-GHz Internet of Things (IoT) communication technology. Our work contributes network architecture designs to support the evaluation of IoT technology securely. The data obtained from these experiments provide valuable insights that are not available through simulated experiments.

1.1. Research Scope

Our research aims to validate the performance of Wi-Fi HaLow devices in terms of throughput and reliability at varying physical distances. The performance is compared against Wi-Fi n and LoRa. This is done through a one-to-one connection, with one device acting as a gateway and another acting as a client. The impact that security mechanisms can make on network throughput was also in the scope of this study.
Validating the scalability of the technology was not in the scope of our research project. Network performance was the only consideration for this study. Other performance metrics, such as power consumption, were out of scope.
The maximum coverage distance of LoRa has already been studied at length in previous studies. The maximum coverage range of the performance experiments in this study was 1000 m. This distance is in line with the expected range of Wi-Fi HaLow.

1.2. Research Questions and Objectives

This study will address the following research questions:
  • How can we securely conduct authentic performance testing of IoT technologies at varying distances with minimal resources?
  • How does Wi-Fi HaLow perform in a real-world setting, compared with alternative technologies, and do increased security measures impact performance adversely?
  • Is Wi-Fi HaLow a suitable technology choice for smart grid applications?
These research questions will be addressed by realising the following objectives:
  • Design and implement a network performance evaluation architecture for Wi-Fi HaLow, Wi-Fi n, and LoRa.
  • Conduct experiments on the selected technologies to determine their real-world performance in terms of throughput and packet loss across various distances.
  • Examine the requirements of applications in the smart grid and determine if Wi-Fi HaLow meets those requirements.

1.3. Our Contribution

The main contributions of our research are:
1.
The currently available performance figures for Wi-Fi HaLow are theoretical in nature, creating a clear gap in the research. This work provides real-world performance data of the new Wi-Fi HaLow technology obtained using newly available Wi-Fi HaLow hardware. Researchers and network designers can use these data to determine the suitability of Wi-Fi HaLow for various applications.
2.
Secure network architectures that can be used to evaluate IoT devices so that data can be collected and settings can be remotely changed without needing specialised hardware or software and with minimal human resources.
3.
An analysis of newer IoT transmission technologies, compared and contrasted with each other and Wi-Fi n, with a focus on Wi-Fi HaLow and its suitability in smart grid applications.

1.4. Paper Structure

The remainder of this paper is structured as follows:
  • Section 2: Provides critical background information on Wi-Fi HaLow, LoRa, and the smart grid. A survey of the previous work related to Wi-Fi HaLow performance evaluation will then be presented.
  • Section 3: Presents the three secure network architectures used to conduct this study’s performance measurement experiments. The methodology is outlined, including the hardware and software resources needed to reproduce the experiments.
  • Section 4: Demonstrates the results obtained from each of the conducted performance experiments as they relate to Wi-Fi HaLow, Wi-Fi n, and LoRa.
  • Section 5: Discusses the interesting and insightful observations taken from the performance experiments. Smart grid use cases for the evaluated technology are then discussed.
  • Section 6: Summarises this work’s key findings, the study’s limitations, and some key areas for future work.

2. Related Work

This section will first discuss important and relevant background information about Wi-Fi HaLow, LoRa, and the smart grid. Background information will then be provided for the ChaCha20-Poly1305 Authenticated Encryption with Associated Data (AEAD) algorithm, which is used later in this work. Previous work concerned with the performance evaluation and analysis of Wi-Fi HaLow will then be outlined.

2.1. Wi-Fi HaLow

IEEE 802.11ah is a new Wi-Fi technology also known as Wi-Fi HaLow. It operates in the unlicensed sub-GHz frequency band with a configurable channel width of between 1 and 16 MHz [4]. The standard requires that all devices support 1 MHz and 2 MHz channel widths at a minimum, with support for 4, 8, and 16 MHz channel widths optional [5]. It operates in a star topology with a predicted coverage range of around 1 km and data rates of up to 78 Mbps [4]. It can theoretically support up to 8192 devices per access point. This fact and its long range make Wi-Fi HaLow an ideal candidate to underpin IoT networks such as smart metering in the Neighbourhood Area Network [4].
With a large number of supported devices per access point, mechanisms must be included to improve media contention and network scalability resulting in fewer potential collisions. This is achieved through improved media access control methods. Wi-Fi HaLow consists of a mechanism called Restricted Access Window (RAW). This mechanism allows restricted access to uplink transmissions by creating time slots for various groups of nodes to transmit [6].
Short-range Wi-Fi solutions are not typically suitable for IoT deployment due to high power consumption. Wi-Fi HaLow includes a mechanism to increase the sleep time of client devices known as Target Wake Time (TWT). TWT allows the client to know during which time period they will have access to the media. This allows the client to sleep until that time occurs, resulting in a reduction in power consumption [7].
Due to its use in IoT networks, Wi-Fi HaLow has had to become more efficient than its standard Wi-Fi counterparts. As a result, media access control headers have been shortened to a maximum length of 24 bytes by removing header fields such as the ID, quality of service, and high throughput fields [4,7]. The data that were previously included in these fields have been relocated to the physical layer [7]. In addition, it also has improvements that allow faster pairing between devices and access points through two mechanisms [4]:
1.
Centralised Authentication Control—The number of end devices that can send authentication requests at any one time is limited. The access point broadcasts a message that contains a threshold value. When end devices want to authenticate with the access point, they generate a random number. If this number is smaller than the threshold value received from the access point, it will wait until the next broadcast message is received.
2.
Distributed Authentication Control—The access point maintains various beacon intervals that contain numerous control slots. An end device can randomly select a beacon and slot. If the end device is unsuccessful in its attempt to authenticate, it will attempt authentication later using a different beacon interval and slot.
In addition to adjusting the channel width, the performance of Wi-Fi HaLow can be further tuned through the use of varying Modulation Coding Schemes (MCS). These schemes (MCS0–MCS10) alter the modulation used and the code rate. Altering the MCS can change the expected throughput and the amount of redundant data that is sent to increase network resilience [8].
Wi-Fi HaLow has many potential use cases. Some use cases identified in the literature include implementation in the smart grid, in wireless sensor networks, smart agriculture, and as a way to extend existing wireless networks [9].
Wi-Fi HaLow is compatible with the latest security scheme for Wi-Fi, known as Wi-Fi Protected Access 3 (WPA3). WPA3 provides a greater level of protection against brute force attacks. It does this through a mechanism known as the Simultaneous Authentication of Equals (SAE) [10]. This involves a four-way exchange of authentication frames based on the dragonfly key exchange method [11]. In addition, open networks also benefit from the protection of confidentiality [12] through an enhanced version of open Wi-Fi networks called Opportunistic Wireless Encryption (OWE) [10]. Instead of data being exchanged between the station (client device) and the access point unencrypted, OWE allows message confidentiality based on short-term keys, which are derived from the public keys of the station and access point by way of the Elliptic Curve Diffie–Hellman (ECDH) algorithm [10].

2.2. LoRa

LoRa is a proprietary modulation technology developed and maintained by Semtech [13]. As with Wi-Fi HaLow, it operates in the sub-GHz unlicensed band. LoRa falls into the Low Power Wide Area Network (LP-WAN) category, transmission technologies that can operate over large distances with minimal power requirements [14]. LoRa has a maximum ideal coverage range of around 10 km [15,16,17]. LoRa operates using a Chirp Spread Spectrum (CSS) modulation and Frequency Shift Keying (FSK) [18]. This CSS enables LoRa to function over large distances and be resilient to noise and interference [19].
The network performance of LoRa can be customised by tuning a set of parameters to balance the needs of a given use case. These parameters can be altered to affect throughput, provide increased reliability, and improve the coverage range [20]. The main parameters that can be adjusted are Bandwidth (BW), Spreading Factor (SF), and Code Rate (CR). A lower spreading factor will provide faster throughput at the expense of maximum transmission range, with a higher bandwidth having the same effect [21,22]. Modifying the code rate can provide extra redundancy in the transmitted data to improve the resilience of the transmission while reducing throughput [21].
Due to the large coverage range and customisable configuration options, LoRa has found many use cases. Sendra et al. [23] proposed a system to monitor water quality to detect polluted water caused by agricultural run-off. They implemented a prototype network and conducted real-world performance experiments to evaluate the network performance. Singh et al. [24] proposed a LoRa-based system to monitor soil quality and weather in a precision agriculture setting. Through a real-world implementation, they demonstrated a more cost-effective solution compared to current commercially available products. Odongo et al. [25] proposed a smart grid fault monitoring system based on LoRa. In their work, they implemented their proposed system on a real power network and demonstrated its successful application.
LoRa is commonly paired with a protocol called LoRaWAN. LoRaWAN is a media access control protocol. It operates in a star topology and relies on various servers to process data and convert the traffic into IP-based traffic for further use and processing [26]. LoRaWAN is not in scope for this study.
More recently, LoRa has now been made available in a 2.4 GHz version. It is based on the same modulation scheme as its sub-GHz predecessor, so it maintains its resilience to interference and noise [27]. Being a 2.4 GHz technology, it is not subject to duty cycle limitations that can impact the frequency of transmission with LoRa. It can operate with a higher maximum throughput of around 250 Kbps [28]. This study will include only the sub-GHz version of LoRa, as it is a more comparable technology to Wi-Fi HaLow, both operating in the sub-GHz spectrum.

2.3. Smart Grid

The smart grid enables the bi-directional transmission of both energy and data to more efficiently and effectively monitor faults, manage demand, improve energy efficiency, and allow various forms of automation such as smart metering applications [1]. The smart grid also allows distributed energy resources such as solar panels and battery systems to be integrated into existing power systems [29].
The smart grid communication networks can be divided into three more specific domains [30]:
1.
Home Area Network (HAN): The network that is used to manage and control smart devices within the home. These smart devices may also interface with the smart meter to enable more accurate and meaningful usage data. These networks are typically wireless in nature.
2.
Neighbourhood Area Network (NAN): This network is commonly formed by a group of smart meters within a close geographical area. This network transmits metering data and control information to and from the provider. These networks are typically wireless but can be wired.
3.
Wide Area Network (WAN): The WAN provides the connection from the HAN and NAN to the provider. The data transferred through the WAN can include the metering data from the NAN and monitoring and control data from substations. This network also facilitates the stability and functionality of the wider power grid. These networks have high bandwidth and low latency requirements, with wired solutions being favoured.

2.4. ChaCha20-Poly1305 AEAD

This section will provide background information on the ChaCha20-Poly1305 AEAD algorithm. This algorithm was used to provide data confidentiality and integrity to the prototype LoRa network later in this paper.
ChaCha is a 256-bit stream cipher first proposed by Daniel Bernstein in 2008. It is a modification of his previous Salsa cipher designed to provide better performance and greater resistance to cryptanalysis [31]. The algorithm is typically referred to as ChaCha8, ChaCha12, or ChaCha20, with the number denoting how many rounds are performed in the execution of the algorithm. A single round of ChaCha consists of 48 operations. These operations include 16 additions, 16 XORs, and 16 constant-distance rotations using 32-bit words [31].
Poly1305, similar to ChaCha, was also created by Daniel Bernstein. It was initially proposed as a message authentication code that could be used with the Advanced Encryption Standard (AES) cipher and was named Poly1305-AES. Poly1305-AES works by computing a 16-byte authentication tag of a given message using a symmetric key known to the message sender and receiver [32]. It uses a 16-byte nonce, which can be known but must never be reused under any circumstances [32].
In 2016 Langley et al. from the Internet Engineering Task Force (IETF) proposed the ChaCha20-Poly1305 cipher suite to be used in the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols [33]. This proposal was supported by Google, who had previously integrated this cipher into TLS in the Chrome browser [34]. ChaCha20-Poly1305 proved to be faster on resource-constrained devices than AES-GCM [34].
In our previous research, the speed and efficiency of ChaCha20 has been demonstrated to exceed the performance of AES on multiple resource-constrained devices [35]. Previously, we created an authentication protocol based on ChaCha20-Poly1305 [36]. That work also examined the network performance of LoRa 2.4 GHz networks using our proposed AEAD scheme. The study concluded that minimal additional latency was introduced compared to unencrypted network traffic.

2.5. Wi-Fi HaLow Performance Evaluations

Verhoeven et al. [37] conducted a comparative performance simulation study of Wi-Fi HaLow, LoRaWAN, and NB-IoT (Narrowband IoT). They used the ns-3 network simulator to compare the performance of these technologies in a variety of smart cities and smart agriculture applications. In addition, they compared several metrics relating to reliability. The overall findings from the study are that each of the three technologies has different strengths. Wi-Fi HaLow was found to offer the best throughput, NB-IoT was found to be the most reliable, and LoRaWAN provided the best coverage.
Taramit et al. [38] evaluated the network performance of Wi-Fi HaLow-based networks with a particular focus on the RAW mechanism. They created mathematical models to assess the effect that different factors, such as the number of clients and the contention time, had on the network performance. Through their extensive simulations, they determined that it is critical to consider various factors, such as the location of the stations, the density, and the number of available RAW slots. Their work provides others with knowledge to create scheduling algorithms for Wi-Fi HaLow networks. This study focuses on a specific area of the Wi-Fi HaLow network, the RAW mechanism.
Similarly, the research conducted by Taramit et al. [39] also examines channel access related to the RAW mechanism. They proposed a channel allocation scheme that they validated through network simulations. Numerous other studies also focused primarily on the RAW mechanism [40].
Šljivo et al. [41] examined the RAW mechanism and the Traffic Indication Map (TIM) segmentation features of Wi-Fi HaLow to determine if they had an impact on performance for TCP/IP traffic. They specifically examined the effect on scalability energy usage and latency. They evaluated the performance during video streaming scenarios using several IP-based cameras. Through ns-3-based simulations, they determined that Wi-Fi HaLow is a feasible technology for video streaming, with an upper limit of 20 cameras for low-quality video streams.
Aleksandrovs-Moisejs et al. [42] evaluated Wi-Fi HaLow using a combination of virtual machines, the ns-3 network simulator, and Linux docker containers. They devised experiments to measure the number of client stations the network could optimally handle. They were able to successfully simulate 256 stations at a bandwidth of 1 MHz and 2 MHz. The maximum throughput achieved with these 256 stations was 581 Kbps. While this work considers the scalability of Wi-Fi HaLow, it is limited by the simulation platform and hardware constraints.
Brenes and Marín-Raventós [43] evaluated various wireless networking technologies in the context of smart agriculture. They compared various IoT networking technologies such as LoRa, Sigfox, Wi-Fi HaLow, and LTE-M (Long Term Evolution for Machines). Through their evaluation of the features and benefits of each technology, they concluded there is no one best technology, and multi-technology solutions are needed to fulfil the needs of smart agriculture projects. Furthermore, they expressed a need to evaluate Wi-Fi HaLow due to its compatibility with other IP-based technologies leading to a simplified network architecture. Our work builds upon Brenes and Marín-Raventós’ work by providing a real-world evaluation of the Wi-Fi HaLow technology.
Badihi et al. [44] conducted a review of Wi-Fi HaLow. They modelled the network performance, in particular, the downlink performance of the UDP protocol at a bandwidth of 1 MHz and 2 MHz. They found that Wi-Fi HaLow is a suitable choice for controlling IoT actuator devices. They also found that lower latency communications can come at the expense of power consumption. Our study builds upon this work by also evaluating the performance of Wi-Fi HaLow using UDP communications through genuine performance measurement experiments.
Ahmed et al. [45] conducted a study that compared the features, benefits, and performance of Wi-Fi HaLow to IEEE 802.15.4. They concluded that Wi-Fi HaLow is favourable to IEEE 802.15.4 in terms of coverage, throughput, and association time. However, they also determined that IEEE 802.15.4 is more conservative with power consumption under high network traffic conditions. Their results were obtained through various simulations.
Domazetović et al. [8] modelled the performance of Wi-Fi HaLow devices to determine the transmission range that the technology can provide. Through their various mathematical models, they determined that using the MCS10 scheme, a maximum possible range of approximately 1.5 km could be achieved.
Soares and Carvalho [46], through modelling, analysed the performance of the Wi-Fi HaLow network. They examined the throughput across RAW slots. They compared the results of the model with those from an ns-3 simulation and found their mathematical model produced results consistent with the simulation.
There is a clear gap in the research, with theoretical and simulation-based approaches being the favoured research methods. Whilst these studies contribute to the research in the Wi-Fi HaLow space, it is equally important to have studies that address the actual performance of Wi-Fi HaLow. Our research addresses this gap in the literature by providing network architectures for real performance evaluation experiments, as well as real results of Wi-Fi HaLow performance, compared and contrasted with Wi-Fi n and LoRa technologies.

3. Materials and Methods

Three test bed environments were constructed to evaluate and measure the three transmission technologies’ performance. It was critical that access between the transmitter and receiver devices was maintained remotely so that configuration could be changed between tests. The configuration could be remotely updated, and the devices could be reset if needed. There were situations where the devices were not in range, so a secondary LTE (Long Term Evolution) connection was used with associated security measures. As the requirements and configurations of the devices used in the tests were different, so too were the supporting test bed topologies. This section will discuss the required resources, the test bench setup, and the method followed during the device evaluation process.

3.1. Required Resources

Several resources, both hardware and software, were used throughout these experiments. A full list of requirements to evaluate all three technologies is provided in this section.

3.1.1. Hardware Requirements

This is the hardware used to build the test benches used in this paper. This is the total list of components. When constructing a test bench for just one of the technologies discussed in this paper, some components can be omitted.
  • 2 × laptops (one with an Ethernet interface and cable). The laptops used in this study were Dell Latitude 7400 laptops with an Intel Core i7-8665U processor, 16 GB DDR-4 2666 MHz RAM, and 512 GB NVMe SSD.
  • 2 × LTE Modem with SIM card and carrier subscription and USB cables
  • 2 × Silex SX-NEWAH-EVK-US IEEE 802.11ah Evaluation Kits (includes a Raspberry Pi and the Wi-Fi HaLow chipset, SD cards and drivers).
  • 2 × Mini-USB B to USB-A cables to power 802.11ah radios.
  • 2 × ESP32-based microcontroller devices with attached SX1276 LoRa sub-GHz chipsets and USB cables.
  • 2 × 900 MHz half-wave dipole antennas with a gain of 0 dBd (0 dB over a dipole). These antennas were used with the Wi-Fi HaLow and the LoRa devices.
  • 2 × Geecol Realtek 8812BU-based USB Wi-Fi adapters. These adapters are dual-band IEEE 802.11 ac. The adapter was set to IEEE 802.11 b/g/n mode, and the 5 GHz band was disabled. Testing of 5 GHz Wi-Fi was out of the scope of this study. External 2.4 GHz dipole antennas with a 2.8 dBi gain were attached to the adapters. The adapters’ transmission power was left at its default setting of 22 dBm.
  • 1 × portable power bank with USB-C to USB-C cable
The specific hardware requirements as they pertain to each of the three tested technologies can be seen in the architecture diagrams:

3.1.2. Software Requirements

This software was used to build the test benches used in this paper. As with the hardware, this is the total list of software. Some software may not be required if just one of the test benches is being constructed.
  • Microsoft Windows 10/11.
  • Raspberry Pi OS 32-bit (preinstalled on the SX-NEWAH-EVK-US).
  • Visual Studio Code v1.81 with the PlatformIO extension.
  • SSH (Secure Shell) client software.
  • OpenVPN clients for Linux and Windows.
  • Cloud services for Virtual Private Network (VPN) deployment (Amazon Web Services was used for this study).
Other essential resources include the SX-NEWAH Host driver specification sheet (available on request from Silex Technology).

3.2. Test Bench General Security Concept

This section outlines the general security concepts to ensure secure device management. You can find the specific test bench architecture for each of the three technologies detailed in Section 3.4, Section 3.6 and Section 3.8.
As mentioned previously, remote access needed to be maintained at all times with the access point to facilitate altering the configuration or resetting the devices in case of errors. It is important to consider the security implications of accessing devices across the Internet. It was important to ensure confidentiality so credentials were not compromised and integrity to ensure control was maintained.
Figure 1 shows the flow of data between the user, the end device, and the access point before security measures were implemented. In this configuration, the user is accessing the Access Point and the End Device via Microsoft Remote Desktop Protocol (RDP) or SSH. Whilst this would work for remote access purposes, having these services exposed to the Internet is a security risk.
Figure 2 shows the flow of data between the user, the end device, and the access point with security measures in place. In this configuration, the user still accesses the access point via RDP and SSH. This time, a VPN server is used to create a secure encrypted tunnel over the Internet. Implementing the tunnel allows confidentiality and integrity to be maintained. The user can access the end device directly through a local connection, so it is not required to be a VPN participant. The user and the access point both authenticate to the VPN server using certificates issued to each participant before the network deployment.

3.3. Location

The performance measurement experiments were all conducted at the same physical location. A large parkland location, Minnippi Park in Brisbane, Australia, was chosen for the performance experiments. This location provided a mix of direct line of sight and a moderate level of environmental obstructions such as trees. A map of the area can be seen in Figure 3.

3.4. Wi-Fi HaLow Test Bench Architecture

The network architecture used for evaluating Wi-Fi HaLow can be seen in Figure 4. The network consists of two SX-NEWAH-EVK-US devices. The device on the left acts as the access point, while the device on the right is in the role of a station. The blue dashed line represents the Wi-Fi HaLow network connection. The access point device was left in a stationary position throughout the testing, while the station device was moved around to points of various distances from the access point. A portable power bank powered the access point device, while the station device was powered from a laptop via a USB connection.
In the interest of efficiency, it was important that control of the access point could be maintained remotely. This was achieved by implementing a secondary LTE network. An LTE modem was connected directly to the access point, and another LTE modem was connected to the laptop. The brown lines represent the connections in this network.
It was important not only to maintain control of the access point remotely but to ensure this was done in a secure manner. Therefore, a virtual network was created to facilitate a secure encrypted connection and to overcome the limitations of Carrier-grade NAT (Network Address Translation) imposed by the LTE network provider. This network consisted of an OpenVPN access server deployed in the cloud. Certificates were issued from the OpenVPN server to the access point and the laptop to allow them to authenticate with the OpenVPN server. An OpenVPN client was installed on both the access point and the computer.
Finally, an SSH server was running on both the access point and the station. In addition, the laptop was running an SSH client to access both of these devices for data collection and control purposes. The connection to the station was achieved through a direct local Ethernet connection between the laptop and the station. The connection to the access point was via the OpenVPN tunnel.

3.5. Wi-Fi HaLow Experiments and Methods

Numerous tests were conducted on the Wi-Fi HaLow devices designed to measure the maximum real-world performance that could be expected. The areas of interest of this study were expected throughput, packet loss, and latency. These were measured using a variety of experiments.
The first set of experiments was designed to determine whether there was a significant difference in throughput experienced between WPA3-secured networks vs. open OWE networks. This experiment set was also designed to measure the maximum expected throughput of Wi-Fi HaLow in ideal conditions. The devices were placed in close proximity to each other in an indoor environment. The throughput was then measured using the iperf utility [47], which is a commonly used network testing tool. Iperf has the ability to create TCP or UDP data streams to measure the throughput of a network. UDP packets were used to measure, as UDP has a lower overhead than TCP. This would allow us to measure the maximum expected throughput more accurately. Iperf ran in server mode on the access point and listened for a connection from the station. Three sequences of experiments were conducted, each lasting 60 s in duration. The results were obtained by averaging the results of each of the three experiments.
The second set of experiments was designed to measure the performance that can be expected from Wi-Fi HaLow at varying distances and to see the relationship between throughput and distance. These experiments were conducted with WPA3 security enabled. Similarly to the first set of experiments, iperf was used in the same configuration. The access point device was left in a stationary position, while the station device was moved to different locations of varying distances.
The third set of experiments was designed to measure the packet loss experienced across various physical distances. Iperf was again used in the same configuration as the above tests. In this set of experiments, ICMP (Internet Control Message Protocol) packets were also sent of varying sizes, being 64, 128, and 255 bytes. In total, 3 sets of 20 pings were sent for the ICMP tests, and the failure rate was captured and averaged.

3.6. Wi-Fi n Test Bench Architecture

The network architecture used for evaluating Wi-Fi n can be seen in Figure 5. The network consists of two Microsoft Windows-based laptop computers. One machine acted as the access point, while the other served as a station. The access point was left in a fixed position. Each laptop had a USB Wi-Fi adapter and was fitted with an external antenna. The internal Wi-Fi adapter and Bluetooth radios on each laptop were disabled to minimise the risk of signal interference. A channel scan was performed to determine if other surrounding devices may cause interference. Channel 11 was selected for testing, as there was minimal interference detected. The default channel width of 20 MHz was used. Multiple-Input Multiple-Output (MIMO) was not used, as there was only a single antenna for the access point and the station.
Similar to the previous Wi-Fi HaLow test bench, it was important that remote access could be maintained so that relevant settings could be updated or devices could be reset in case of an error. Again, in the same configuration as the HaLow test bench, an LTE modem was used at both the station and the access point to facilitate a secure cloud-based VPN connection. This time, RDP was used as the means to control the access point device remotely. This was to ensure that control could be maintained if the devices were out of range and prevent RDP traffic from using the test network and potentially impacting the experiment results.

3.7. Wi-Fi n Experiments and Methods

For the first set of experiments, the throughput was measured with iperf in the same configuration as the HaLow devices. However, as Wi-Fi n is not designed to be used as a long-range protocol, the testing was limited to a smaller range of 50, 100, and 200 m distances.
The second set of experiments was, again, focused on expected packet loss. Similar to Wi-Fi HaLow, ICMP and UDP packet loss were measured using the same tools and methods.

3.8. LoRa Test Bench Architecture

The network architecture used for evaluating LoRa can be seen in Figure 6. In this test bench, there are two Semtech SX1276 LoRa transceivers connected to ESP32 microcontrollers. The LoRa SX1276 was set to operate at a frequency of 915 MHz. As with the two Wi-Fi test benches, one LoRa device acts as the access point and remains in a stationary position, while the other device serves as a station and is moved to various distances from the access point for the purposes of the performance experiments. Each LoRa device had an external antenna of the same specification as the Wi-Fi HaLow devices. The LoRa devices were each connected to a Microsoft Windows-based laptop computer.
As in the previous tests with Wi-Fi HaLow and Wi-Fi n, it was important that remote control of the devices could be maintained. Again, the same VPN cloud infrastructure was used. RDP was used to remotely change the LoRa device parameters when required through a code upload from VSCode with PlatformIO extensions. Much of the changing of the parameters was automated where possible.

3.9. LoRa Experiments and Methods

With LoRa-based devices, there is an extensive amount of combinations of parameters that can be tuned to manipulate the throughput, coverage, and data integrity. The most commonly used bandwidths (125 kHz, 250 kHz, and 500 kHz) and spreading factors (SF7–SF12) were selected for the experiments. Each of these combinations of spreading factor and bandwidth was combined with four different code rates (4/5, 4/6, 4/7, and 4/8). The same packet sizes used in the ICMP tests for the Wi-Fi devices were used for all the experiments with the LoRa devices. Those sizes were 64, 128, and 255 bytes.
LoRa does not have any security measures in its default state. As we did not want to involve the complexities and potential overhead of LoRaWAN, we chose to adapt a ChaCha20-Poly1305-based AEAD protocol we proposed in our previous research [36]. This protocol relies on a three-way key establishment process based on the ISO/IEC 11770-2 Key Establishment Mechanism 6 [48]. The packet structure used can be seen in Figure 7. This protocol was proposed for LoRa 2.4 GHz-based networks but has been adapted to function on the LoRa sub-GHz platform. As with Wi-Fi HaLow, we measured the throughput that could be achieved by the LoRa device both with and without security before conducting any coverage testing.
The algorithm for sending the plaintext packets can be seen in Algorithm 1. This algorithm builds the LoRa packet and transmits it. It takes the 5-byte device IDs of the sender D 1 and the receiver D 2 and a 5-byte command M as inputs. With this overhead of 15 bytes, a variable length payload/data field P is inserted to ensure the total packet size is 64, 128, or 255 bytes. This information is then passed to the LoRa transmitter L t and sent. This whole process is timed to calculate the throughput.
Algorithm 1 Process for Sending a Plaintext LoRa Packet
Require: 
  
D 1 {The device ID of the source}
D 2 {The device ID of the destination}
M {Command header field}
P {A payload of size 240, 113, or 49 bytes}
L t {LoRa transmitter object}
1: 
L t .transmit( D 1 | | D 2 | | M | | P )
The algorithm for sending the encrypted and tagged packets can be seen in Algorithm 2. As in the previous algorithm, it also takes the device IDs D 1 and D 2 and the command field M as inputs. The algorithm also requires a 256-bit session key K and an initialisation vector/nonce I of 64 bits. A variable length payload/data field P is used to ensure the total packet size of 64, 128, or 255 bytes. The ChaCha20-Poly1305 algorithm C is then passed to K and I. D 1 and D 2 are then passed to the C as authenticated data. M and P are converted to ciphertext C t by C. C then computes an authentication tag. L t is then passed to D 1 | | D 2 | | I | | C t | | T for transmission. This entire process is timed, and the throughput is calculated.
Algorithm 2 Encryption and Tagging Process for Sending a LoRa Packet
Require: 
  
K { 0 , 1 } 256 {32-byte session key}
I { 0 , 1 } 64 {8-byte initialisation vector}
D 1 {The device ID of the source}
D 2 {The device ID of the destination}
M {Command header field}
P {A payload of size 216, 89, or 25 bytes}
C t {empty variable to hold ciphertext}
C {A ChaChaPoly1305 object}
T {Empty variable to hold authentication tag}
L t {LoRa transmitter object}
1: 
C.clear()
2: 
C.setKey() K
3: 
C.setIV() I
4: 
C.addAuthData() D 1 , D 2
5: 
C t C .encrypt( M | | P )
6: 
T C .computeTag()
7: 
L t .transmit( D 1 | | D 2 | | I | | C t | | T )
As LoRa does not have to rely on maintaining a connection with the access point, the approach taken to the experiments slightly differed with LoRa compared to the Wi-Fi technologies. With the first set of experiments, we measured the maximum rate the device could construct the package and then successfully transmit it with no receiving device. This was measured with the AEAD protocol and in plaintext transmission with no security measures.
The packet loss rate was then measured from the fixed transmitter to the mobile receiver. The packet loss of LoRa was measured up to a distance of 1000 m. LoRa has the potential for greater coverage than 1000 m, however, the purpose of this study is to compare LoRa with the new Wi-Fi HaLow technology, not push LoRa to its coverage limits. The maximum range of LoRa has previously been well studied.

4. Results

4.1. Wi-Fi HaLow

The results in Figure 8 show that Wi-Fi HaLow has a performance disadvantage when using WPA3 compared with OWE. The results show a maximum average throughput of up to 4985 Kbps. While there is a measurable difference in performance, the impact on performance when using WPA3-PSK security measures vs. an open OWE network is negligible. The largest impact is shown in the 2 MHz bandwidth with a 248 Kbps difference in favour of OWE.
The results in Figure 9 show the throughput that was achieved at various distances. The technology can provide coverage up to around 1 km. The results show that the throughput drops significantly after the 200 m mark.
The results in Figure 10 show the measured packet loss. The results show substantial packet loss figures at the 500 m mark, with very significant packet loss at 700 m and 1000 m. This set of tests also captured the latency experienced in milliseconds (ms) with the round-trip of successful pings. The latency results can be seen in Table 1.

4.2. Wi-Fi n

The results in Figure 11 show the measured throughput of Wi-Fi n at various distances. The results show a significant drop in throughput between 100 m and 200 m. Wi-Fi n, as a short-range technology, would have minimal practical application beyond the 200 m distance. The packet loss demonstrated by Wi-Fi n was relatively low, even at 200 m, despite the significant reduction in throughput that was observed. The packet loss results can be seen in Table 2.

4.3. LoRa

Table 3 shows the throughput of plaintext LoRa and LoRa with the custom AEAD security scheme. The results are shown for each SF, BW, and CR combination with 64, 128, and 255 byte packet sizes.
We have selected one SF (SF7) with a packet size of 64 bytes to display as a graph, as the amount of data present for LoRa is extensive. All other SFs and packet sizes follow a consistent trend when comparing the AEAD protocol with no security measures. As shown in Figure 12, there is no discernible impact on the throughput when comparing the encrypted/authenticated packets and the plain-text packets. This indicates that the LoRa transmitter is the bottleneck, with encryption and tagging having no noticeable impact on performance.
The results from the LoRa packet loss experiments can be seen in Table 4. This table shows the packet loss results at a distance of 1000 m between the access point and the end device. The average packet loss across different packet sizes and distances can be seen in Figure 13. The packet loss demonstrated by LoRa is consistently low, showing the resilience of LoRa, despite the interrupted line of sight by environmental factors. From our testing, the worst packet loss result is at 1000 m with a maximum packet size of 255 bytes. Still, the total packet loss is low at 1.6%.

5. Discussion

There were concerns that Wi-Fi HaLow demonstrated a steep and significant performance drop as the distance from the access point increased. In addition, we had concerns that nearby high-voltage transmission lines near the original testing location may cause unforeseen effects. Therefore, to confirm our initial findings, further tests were conducted on the Wi-Fi HaLow technology at a different site. This site had a clear line of sight between all the testing locations and the access point. The map of the second testing location can be seen in Figure 14.
Interestingly, the throughput was inconsistent with the tests conducted at the first location, with some combinations of distance and bandwidth performing worse and others performing better. This could be due to other interfering factors not being present at the first location as the first location is further away from housing. However, what remains consistent is a significant drop in throughput when the distance increases. This can be observed in Figure 15.
An interesting observation with Wi-Fi HaLow is the higher bandwidth does not always translate to a better throughput result. After a distance of 100 m, the 2 MHz bandwidth consistently provides a higher throughput when compared with 4 MHz.
We observed a mixed result when looking at the ICMP vs. UDP packet loss results. The tests using iperf with UDP tend to send as many packets as possible in the given time. The ping packets sent via the ICMP protocol do not saturate the connection to the same degree as the UDP testing. At a bandwidth of 1 MHz, smaller, more infrequent transmissions, such as those generated using ping, seem to perform substantially better when compared with faster-paced UDP transmissions. The results are not as clear at other distances and bandwidths. For example, at a distance of 500 m, UDP performs more reliably than ICMP at a bandwidth of 2 MHz and 4 MHz.
In both variations of Wi-Fi, it is interesting to note that, as demonstrated by the results of this study, low throughput does not necessarily indicate high packet loss. This low throughput and low packet loss could be attributed to Wi-Fi having retransmission capability at layer two, which the experiments would not capture. This is also supported by the sharp increase in latency observed in the Wi-Fi HaLow results when the distance increases to 500 m from the access point.
This work has examined Wi-Fi HaLow in a real-world setting. It is important to reinforce that one of this work’s technical contributions was to highlight the difference between real-world performance and theoretical performance. Table 5 shows the Wi-Fi HaLow 50 m throughput test results. These three tests were all executed with an MCS 7, which uses the 64-QAM modulation scheme. A significant difference is shown between the theoretical data rate and the actual measured performance. In particular, the 4 MHz bandwidth test could only reach 35% of the theoretical performance.
There are many limitations with the currently available Wi-Fi HaLow devices. Wi-Fi HaLow chipsets have only recently become available for purchase. Currently, the bandwidth is limited to a maximum of 4 MHz rather than the maximum of 16 MHz defined in the IEEE 802.11ah standard. As newer devices and chipsets become available, further testing should occur at all bandwidths to examine if the quality of the newer chipsets and drivers increases and what performance can be achieved using higher bandwidths.
This study did not examine the scalability of any of the tested technologies. Whilst LoRa and Wi-Fi n have been available for some time, and scalability has been well studied, Wi-Fi HaLow has not. It would be particularly interesting to see if Wi-Fi HaLow can meet its theoretical support of 8192 devices per access point and what practical effect this would have on network performance. Whilst numerous studies identified in Section 2 did discuss scalability, all were based on simulations.
During our Wi-Fi HaLow experiments, it was noted that the station would often lose the connection to the access point. Often numerous connection attempts would have to be made in order to execute the tests successfully. This warrants further investigation in the future to determine what the expected stability of Wi-Fi HaLow should be and what main factors contribute to this perceived instability. Some potential causes include signal degradation or device/driver instability.
At a distance of 200 m, the limits of Wi-Fi n coverage start to be reached. It is an interesting observation that under the testing conditions, Wi-Fi n still maintains a lead in terms of throughput when compared with Wi-Fi HaLow. Based on the currently available chipsets for Wi-Fi HaLow, it may be prudent to continue to use standard Wi-Fi solutions to cover distances under 200 m so that a higher level of network performance is maintained.
Through our testing, we have demonstrated that current Wi-Fi HaLow solutions have a maximum useful range at around the 1 km mark. LoRa has been shown in various studies [50,51,52] to consistently reach distances far in excess of this. Wi-Fi HaLow has established itself as a more ’medium range’ solution. Our testing showed LoRa can reach speeds of up to 20.4 Kbps. Wi-Fi HaLow at a distance of 1 km in our initial testing performed significantly worse, with a maximum throughput achieved of only 3.55 Kbps. However, we demonstrated a maximum throughput of 141 Kbps with a direct line of sight. This would indicate that LoRa would be the preferred technology choice in less-than-ideal situations at significant distances.
Due to the medium-range nature of the coverage of Wi-Fi HaLow, it could find use within the HAN and NAN in the context of the smart grid. However, Wi-Fi HaLow would not be suitable for WAN applications, as the coverage distance could not support these applications. An evaluation of the suitability of Wi-Fi HaLow, Wi-Fi n, and LoRa in some common HAN and NAN scenarios can be seen in Table 6. Wi-Fi n does not possess the range required for NAN applications. LoRa has potential suitability in both HAN and NAN applications; however, its throughput capabilities are on the lower end of the use case requirements. Wi-Fi HaLow has a potential application in several of these HAN and NAN scenarios; however, it does not offer sufficient levels of network bandwidth to support more demanding applications such as distribution automation.

6. Conclusions

This study has presented a real-world analysis of the performance of Wi-Fi HaLow. This has been presented comparatively with competing IoT transmission technologies. The performance was evaluated not only against LoRa but also against Wi-Fi n technology. Furthermore, network architectures were introduced that were used to evaluate these technologies that provided the ability to set up prototype networks for evaluation purposes, enabling secure remote access and management. Through the discussion in this paper, we determined some potential use cases for Wi-Fi HaLow in smart grid applications.
For the most part, Wi-Fi HaLow was found to offer a higher throughput when compared with LoRa. For use cases that require transmission over 1 km with no line of sight, Wi-Fi HaLow has been demonstrated to have shortcomings, with LoRa performing significantly better with a higher degree of reliability.
For both LoRa and Wi-Fi, it has also been demonstrated through this study that implementing security measures such as WPA3 for HaLow and an AEAD scheme for LoRa is easily achieved. While these schemes have a measurable impact on the network’s throughput, the effect is negligible.
This study has also demonstrated that with a coverage distance of 200 m or less, it may be preferable to use standard Wi-Fi solutions instead of Wi-Fi HaLow.
A limitation of this study was that scalability was not considered. Whilst there are claims that Wi-Fi HaLow can support thousands of station devices per access point, this has not been validated in any real-world studies to date. This should be considered in future work. Another limitation was due to only one Wi-Fi HaLow device being commercially available; it is difficult to determine if any shortcomings found in the performance are due to the particular set of devices used or are inherent to the Wi-Fi HaLow technology. This study allowed the devices to choose the most appropriate MCS. In future work, it may be beneficial to measure each MCS independently to see if more optimal performance can be achieved. As more devices become commercially available, this is another area where future work could occur. In the future, Wi-Fi HaLow should also be evaluated for its tolerance to environmental interference.

Author Contributions

Conceptualization, L.K., V.L., M.M. and G.W.; experiments and validation, L.K.; writing, L.K.; supervision, V.L., M.M. and G.W. All authors have read and agreed to the published version of the manuscript.

Funding

The work has been supported by the Cyber Security Research Centre Limited, whose activities are partially funded by the Australian Government’s Cooperative Research Centres Programme.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kabalci, Y. A survey on smart metering and smart grid communication. Renew. Sustain. Energy Rev. 2016, 57, 302–318. [Google Scholar] [CrossRef]
  2. Wi-Fi Alliance. Wi-Fi Alliance Introduces Low Power, Long Range Wi-Fi HaLow. Available online: https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-low-power-long-range-wi-fi-halow (accessed on 31 May 2023).
  3. Silex Technology. SX-NEWAH—Industry’s First 802.11ah Wi-Fi Solution for IoT Devices. Available online: https://www.silextechnology.com/connectivity-solutions/embedded-wireless/sx-newah (accessed on 31 May 2023).
  4. Tian, L.; Santi, S.; Seferagić, A.; Lan, J.; Famaey, J. Wi-Fi HaLow for the Internet of Things: An up-to-date survey on IEEE 802.11ah research. J. Netw. Comput. Appl. 2021, 182, 103036. [Google Scholar] [CrossRef]
  5. ISO/IEC/IEEE. ISO/IEC/IEEE 8802-11:2018/Amd.2:2019(E); International Standard–Information technology–Telecommunications and information exchange between systems—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2: Sub 1 GHz License Exempt Operation; IEEE: New York, NY, USA, 2019. [Google Scholar] [CrossRef]
  6. Ali, M.Z.; Mišić, J.; Mišić, V.B. Performance evaluation of heterogeneous IoT nodes with differentiated QoS in IEEE 802.11ah RAW mechanism. IEEE Trans. Veh. Technol. 2019, 68, 3905–3918. [Google Scholar] [CrossRef]
  7. Rayes, A.; Salam, S. IoT Protocol Stack: A Layered View. In Proceedings of the Internet of Things from Hype to Reality; Springer: Berlin/Heidelberg, Germany, 2019; pp. 93–138. [Google Scholar]
  8. Domazetović, B.; Kočan, E.; Mihovska, A. Performance evaluation of IEEE 802.11ah systems. In Proceedings of the 24th IEEE Telecommunications Forum (TELFOR), Belgrade, Serbia, 22–23 November 2016; pp. 1–4. [Google Scholar]
  9. Farhad, A.; Pyun, J.Y. Resource Management for Massive Internet of Things in IEEE 802.11ah WLAN: Potentials, Current Solutions, and Open Challenges. Sensors 2022, 22, 9509. [Google Scholar] [CrossRef] [PubMed]
  10. Kwon, S.; Choi, H.K. Evolution of Wi-Fi protected access: Security challenges. IEEE Consum. Electron. Mag. 2020, 10, 74–81. [Google Scholar] [CrossRef]
  11. Chatzoglou, E.; Kambourakis, G.; Kolias, C. How is your Wi-Fi connection today? DoS attacks on WPA3-SAE. J. Inf. Secur. Appl. 2022, 64, 103058. [Google Scholar] [CrossRef]
  12. Reddy, B.I.; Srikanth, V. Review on wireless security protocols (WEP, WPA, WPA2 & WPA3). Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2019, 5, 28–35. [Google Scholar] [CrossRef]
  13. Semtech. LoRa Technology Overview. Available online: https://www.semtech.com/lora (accessed on 19 May 2023).
  14. Sanchez-Iborra, R.; Cano, M.D. State of the art in LP-WAN solutions for industrial IoT services. Sensors 2016, 16, 708. [Google Scholar] [CrossRef]
  15. Campo, G.D.; Gomez, I.; Calatrava, S.; Martinez, R.; Santamaria, A. Power distribution monitoring using LoRa: Coverage analysis in suburban areas. In Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, Madrid, Spain, 14–16 February 2018; pp. 233–238. [Google Scholar]
  16. Sanchez-Gomez, J.; Sanchez-Iborra, R.; Skarmeta, A. Transmission technologies comparison for IoT communications in smart-cities. In Proceedings of the GLOBECOM 2017—IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar]
  17. Seye, M.R.; Gueye, B.; Diallo, M. An evaluation of LoRa coverage in Dakar Peninsula. In Proceedings of the 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 3–5 October 2017; pp. 478–482. [Google Scholar]
  18. De Almeida, I.B.F.; Chafii, M.; Nimr, A.; Fettweis, G. Alternative chirp spread spectrum techniques for LPWANs. IEEE Trans. Green Commun. Netw. 2021, 5, 1846–1855. [Google Scholar] [CrossRef]
  19. Thomas, A.; Eldhose, N. Performance evaluation of chirp spread spectrum as used in LoRa physical layer. In Proceedings of the 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), Pondicherry, India, 29–30 March 2019; pp. 1–6. [Google Scholar]
  20. Magrin, D.; Centenaro, M.; Vangelista, L. Performance evaluation of LoRa networks in a smart city scenario. In Proceedings of the 2017 IEEE International Conference on communications (ICC), Paris, France, 21–25 May 2017; pp. 1–7. [Google Scholar]
  21. Zorbas, D.; Papadopoulos, G.Z.; Maille, P.; Montavont, N.; Douligeris, C. Improving LoRa network capacity using multiple spreading factor configurations. In Proceedings of the 25th IEEE International Conference on Telecommunications (ICT), Saint-Malo, France, 26–28 June 2018; pp. 516–520. [Google Scholar]
  22. The Things Network. Spreading Factors. Available online: https://www.thethingsnetwork.org/docs/lorawan/spreading-factors/ (accessed on 19 May 2023).
  23. Sendra, S.; Parra, L.; Jimenez, J.M.; Garcia, L.; Lloret, J. LoRa-based network for water quality monitoring in coastal areas. Mob. Netw. Appl. 2022, 1–17. [Google Scholar] [CrossRef]
  24. Singh, D.K.; Sobti, R.; Jain, A.; Malik, P.K.; Le, D.N. LoRa based intelligent soil and weather condition monitoring with internet of things for precision agriculture in smart cities. IET Commun. 2022, 16, 604–618. [Google Scholar] [CrossRef]
  25. Odongo, G.Y.; Musabe, R.; Hanyurwimfura, D.; Bakari, A.D. An efficient LoRa-enabled smart fault detection and monitoring platform for the power distribution system using self-powered IoT devices. IEEE Access 2022, 10, 73403–73420. [Google Scholar] [CrossRef]
  26. LoRa Alliance. What Is LoRaWAN Specification. Available online: https://lora-alliance.org/about-lorawan/ (accessed on 1 June 2023).
  27. Semtech. Semtech SX1280 Datasheet Rev3.2. Available online: https://www.semtech.com/products/wireless-rf/lora-24ghz/sx1280#download-resources (accessed on 1 June 2023).
  28. Andersen, F.R.; Ballal, K.D.; Petersen, M.N.; Ruepp, S. Ranging Capabilities of LoRa 2.4 GHz. In Proceedings of the 6th IEEE World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 2–16 June 2020; pp. 1–5. [Google Scholar]
  29. Shafiullah, D.; Vo, T.; Nguyen, P.; Pemen, A. Different smart grid frameworks in context of smart neighborhood: A review. In Proceedings of the 52nd IEEE International Universities Power Engineering Conference (UPEC), Heraklion, Greece, 28–31 August 2017; pp. 1–6. [Google Scholar]
  30. Ahmed, S.; Gondal, T.M.; Adil, M.; Malik, S.A.; Qureshi, R. A survey on communication technologies in smart grid. In Proceedings of the 2019 IEEE PES GTD Grand International Conference and Exposition Asia (GTD Asia), Bangkok, Thailand, 19–23 March 2019; pp. 7–12. [Google Scholar]
  31. Bernstein, D.J. ChaCha, a Variant of Salsa20. In Proceedings of the Workshop Record of SASC; Citeseer: Princeton, NJ, USA, 2008; Volume 8, pp. 3–5. Available online: https://www.google.com.hk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwiDtbLb4_aAAxWoaPUHHf19AG8QFnoECA8QAQ&url=https%3A%2F%2Fcr.yp.to%2Fchacha%2Fchacha-20080120.pdf&usg=AOvVaw1JHg0bKSsK9puKtgCN5GQr&opi=89978449 (accessed on 25 July 2023).
  32. Bernstein, D.J. The Poly1305-AES message-authentication code. In Proceedings of the International Workshop on Fast Software Encryption; Springer: Berlin/Heidelberg, Germany, 2005; pp. 32–49. [Google Scholar]
  33. Langley, A.; Chang, W.; Mavrogiannopoulos, N.; Strombergson, J.; Josefsson, S. RFC 7905: ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS); Internet Engineering Task Force (IETF): Fremont, CA, USA, 2016. [Google Scholar]
  34. Bursztein, E. Speeding Up and Strengthening HTTPS Connections for Chrome on Android. Available online: https://security.googleblog.com/2014/04/speeding-up-and-strengthening-https.html (accessed on 17 August 2023).
  35. Kane, L.; Chen, J.J.; Thomas, R.; Liu, V.; McKague, M. Security and performance in IoT: A balancing act. IEEE Access 2020, 8, 121969–121986. [Google Scholar] [CrossRef]
  36. Kane, L.; Liu, V.; McKague, M.; Walker, G.R. Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart Homes. IEEE Access 2022, 10, 93212–93230. [Google Scholar] [CrossRef]
  37. Verhoeven, R.; Kempinski, S.; Meratnia, N. Performance Evaluation of Wi-Fi Halow, NB-IoT and LoRa for Smart City Applications. In Proceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, Montreal, QC, Canada, 24–28 October 2022; pp. 17–24. [Google Scholar]
  38. Taramit, H.; Camacho-Escoto, J.J.; Gomez, J.; Orozco-Barbosa, L.; Haqiq, A. Accurate Analytical Model and Evaluation of Wi-Fi Halow Based IoT Networks under a Rayleigh-Fading Channel with Capture. Mathematics 2022, 10, 952. [Google Scholar] [CrossRef]
  39. Taramit, H.; Orozco-Barbosa, L.; Haqiq, A.; Escoto, J.J.C.; Gomez, J. Load-Aware Channel Allocation for IEEE 802.11ah-Based Networks. IEEE Access 2023, 11, 24484–24496. [Google Scholar] [CrossRef]
  40. Raeesi, O.; Pirskanen, J.; Hazmi, A.; Levanen, T.; Valkama, M. Performance evaluation of IEEE 802.11ah and its restricted access window mechanism. In Proceedings of the IEEE International Conference on Communications Workshops (ICC), Sydney, Australia, 10–14 June 2014; pp. 460–466. [Google Scholar]
  41. Šljivo, A.; Kerkhove, D.; Tian, L.; Famaey, J.; Munteanu, A.; Moerman, I.; Hoebeke, J.; De Poorter, E. Performance evaluation of IEEE 802.11ah networks with high-throughput bidirectional traffic. Sensors 2018, 18, 325. [Google Scholar] [CrossRef]
  42. Aleksandrovs-Moisejs, D.; Ipatovs, A.; Grabs, E.; Rjazanovs, D. Evaluation of a Long-Distance IEEE 802.11ah Wireless Technology in Linux Using Docker Containers. Elektron. Elektrotechnika 2022, 28, 71–77. [Google Scholar] [CrossRef]
  43. Brenes, J.A.; Marín-Raventós, G. When one wireless technology is not enough: A network architecture for precision agriculture using LoRa, Wi-Fi, and LTE. In Proceedings of the Intelligent Sustainable Systems: Selected Papers of WorldS4 2021; Springer: Berlin/Heidelberg, Germany, 2022; Volume 1, pp. 103–112. [Google Scholar]
  44. Badihi, B.; Del Carpio, L.F.; Amin, P.; Larmo, A.; Lopez, M.; Denteneer, D. Performance evaluation of IEEE 802.11ah actuators. In Proceedings of the 83rd IEEE Vehicular Technology Conference (VTC Spring), Nanjing, China, 15–18 May 2016; pp. 1–5. [Google Scholar]
  45. Ahmed, N.; Rahman, H.; Hussain, M.I. A comparison of 802.11ah and 802.15.4 for IoT. Ict Express 2016, 2, 100–102. [Google Scholar] [CrossRef]
  46. Soares, S.M.; Carvalho, M.M. Throughput analytical modeling of IEEE 802.11ah wireless networks. In Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2019; pp. 1–4. [Google Scholar]
  47. Dugan, J.; Elliott, S.; Mah, B.A.; Poskanzer, J.; Prabhu, K. iPerf—The Ultimate Speed Test Tool for TCP, UDP and SCTP. Available online: https://iperf.fr/ (accessed on 2 May 2023).
  48. ISO/IEC 11770-2:2018 IT; Security Techniques—Key Management—Part 2: Mechanisms Using Symmetric Techniques. International Organization for Standardization: Geneva, Switzerland, 2018.
  49. IEEE Std 802.11ah-2016 (Amendment to IEEE Std 802.11-2016, as Amended by IEEE Std 802.11ai-2016); IEEE Standard for Information technology–Telecommunications and information exchange between systems—Local and metropolitan area networks–Specific requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2: Sub 1 GHz License Exempt Operation; IEEE: New York, NY, USA, 2017; pp. 1–594. [CrossRef]
  50. Petajajarvi, J.; Mikhaylov, K.; Roivainen, A.; Hanninen, T.; Pettissalo, M. On the coverage of LPWANs: Range evaluation and channel attenuation model for LoRa technology. In Proceedings of the 14th IEEE International Conference on its Telecommunications (ITST), Copenhagen, Denmark, 2–4 December 2015; pp. 55–59. [Google Scholar]
  51. Seye, M.R.; Ngom, B.; Gueye, B.; Diallo, M. A study of LoRa coverage: Range evaluation and channel attenuation model. In Proceedings of the 1st IEEE International Conference on Smart Cities and Communities (SCCIC), Ouagadougou, Burkina Faso, 24–26 July 2018; pp. 1–4. [Google Scholar]
  52. Sanchez-Iborra, R.; Sanchez-Gomez, J.; Ballesta-Viñas, J.; Cano, M.D.; Skarmeta, A.F. Performance evaluation of LoRa considering scenario conditions. Sensors 2018, 18, 772. [Google Scholar] [CrossRef]
  53. Kuzlu, M.; Pipattanasomporn, M.; Rahman, S. Communication network requirements for major smart grid applications in HAN, NAN and WAN. Comput. Netw. 2014, 67, 74–88. [Google Scholar] [CrossRef]
  54. Tightiz, L.; Yang, H. A comprehensive review on IoT protocols’ features in smart grid communication. Energies 2020, 13, 2762. [Google Scholar] [CrossRef]
  55. Gungor, V.C.; Sahin, D.; Kocak, T.; Ergut, S.; Buccella, C.; Cecati, C.; Hancke, G.P. A survey on smart grid potential applications and communication requirements. IEEE Trans. Ind. Inform. 2012, 9, 28–42. [Google Scholar] [CrossRef]
Figure 1. The flow of device management traffic without security measures.
Figure 1. The flow of device management traffic without security measures.
Sensors 23 07409 g001
Figure 2. The flow of device management traffic with VPN security measures.
Figure 2. The flow of device management traffic with VPN security measures.
Sensors 23 07409 g002
Figure 3. Map of Minnippi Park located in the eastern suburbs of Brisbane, Australia, where the performance experiments were conducted on Wi-Fi HaLow, Wi-Fi n, and LoRa. Each measurement location is plotted as a distance from the stationary access point.
Figure 3. Map of Minnippi Park located in the eastern suburbs of Brisbane, Australia, where the performance experiments were conducted on Wi-Fi HaLow, Wi-Fi n, and LoRa. Each measurement location is plotted as a distance from the stationary access point.
Sensors 23 07409 g003
Figure 4. Network architecture diagram for the evaluation of Wi-Fi HaLow.
Figure 4. Network architecture diagram for the evaluation of Wi-Fi HaLow.
Sensors 23 07409 g004
Figure 5. Network architecture diagram for the evaluation of Wi-Fi n.
Figure 5. Network architecture diagram for the evaluation of Wi-Fi n.
Sensors 23 07409 g005
Figure 6. Network architecture diagram for the evaluation of LoRa.
Figure 6. Network architecture diagram for the evaluation of LoRa.
Sensors 23 07409 g006
Figure 7. Packet structure adopted from our previous study [36] to support secure LoRa communication.
Figure 7. Packet structure adopted from our previous study [36] to support secure LoRa communication.
Sensors 23 07409 g007
Figure 8. The throughput of Wi-Fi HaLow OWE vs. WPA3-PSK throughput.
Figure 8. The throughput of Wi-Fi HaLow OWE vs. WPA3-PSK throughput.
Sensors 23 07409 g008
Figure 9. The throughput of Wi-Fi HaLow at various distances and bandwidths.
Figure 9. The throughput of Wi-Fi HaLow at various distances and bandwidths.
Sensors 23 07409 g009
Figure 10. The packet loss percentage of Wi-Fi HaLow by distance, packet type, and bandwidth.
Figure 10. The packet loss percentage of Wi-Fi HaLow by distance, packet type, and bandwidth.
Sensors 23 07409 g010
Figure 11. The throughput of Wi-Fi n at various distances.
Figure 11. The throughput of Wi-Fi n at various distances.
Sensors 23 07409 g011
Figure 12. The throughput of LoRa (Kbps), no security vs. ChaCha20-Poly1305-based AEAD scheme at Spreading Factor 7 at various bandwidths and code rates.
Figure 12. The throughput of LoRa (Kbps), no security vs. ChaCha20-Poly1305-based AEAD scheme at Spreading Factor 7 at various bandwidths and code rates.
Sensors 23 07409 g012
Figure 13. The average packet loss of LoRa at varying distances and packet sizes.
Figure 13. The average packet loss of LoRa at varying distances and packet sizes.
Sensors 23 07409 g013
Figure 14. Map of Woody Point, located north of Brisbane, Australia, where the second validating performance experiments were conducted on Wi-Fi HaLow. Each measurement location is plotted as a distance from the stationary access point.
Figure 14. Map of Woody Point, located north of Brisbane, Australia, where the second validating performance experiments were conducted on Wi-Fi HaLow. Each measurement location is plotted as a distance from the stationary access point.
Sensors 23 07409 g014
Figure 15. The throughput of Wi-Fi HaLow at a second location was used to verify the significant and sudden performance drop observed in the original performance experiments.
Figure 15. The throughput of Wi-Fi HaLow at a second location was used to verify the significant and sudden performance drop observed in the original performance experiments.
Sensors 23 07409 g015
Table 1. The latency from successful round-trip pings recorded for Wi-Fi HaLow (ms).
Table 1. The latency from successful round-trip pings recorded for Wi-Fi HaLow (ms).
1 MHz2 MHz4 MHz
50 m10.168.748.38
100 m10.208.668.66
200 m10.4011.169.50
500 m60.6356.1575.52
700 m116.6296.0571.98
1000 m95.53N/AN/A
Table 2. Wi-Fi n packet loss at various distances, protocols, and packet sizes.
Table 2. Wi-Fi n packet loss at various distances, protocols, and packet sizes.
50 m100 m200 m
UDP000.21
ICMP 64 Bytes0010
ICMP 128 Bytes000
ICMP 255 Bytes005
Table 3. The throughput of LoRa in Kbps AEAD vs. no security measures with all spreading factors and common bandwidth and code rate combinations.
Table 3. The throughput of LoRa in Kbps AEAD vs. no security measures with all spreading factors and common bandwidth and code rate combinations.
Packet Size:64 Bytes128 Bytes255 Bytes
Security:AEADNo SecAEADNo SecAEADNo Sec
SF7500-4/517.06717.06718.96318.96320.40020.400
500-4/615.05915.05916.00016.00017.14317.143
500-4/713.12813.12813.83814.02714.78314.783
500-4/811.63611.63612.33712.33712.99412.994
250-4/58.6788.6789.4819.48110.20010.200
250-4/67.4207.4208.0638.0638.5718.571
250-4/76.4816.5646.9666.9667.3917.391
250-4/85.8185.8186.1696.1696.4976.497
125-4/54.3394.3394.7414.7635.1005.100
125-4/63.7103.7374.0314.0314.2864.286
125-4/73.2613.2613.4953.4953.6963.696
125-4/82.9092.9093.0843.0843.2483.254
SF8500-4/59.4819.48110.77910.77911.52511.525
500-4/68.1278.1279.1439.1439.6689.714
500-4/77.2117.2117.9387.9388.3618.361
500-4/86.4006.4007.0147.0147.3657.365
250-4/54.7414.7415.3895.3895.7635.763
250-4/64.0964.0964.5714.5714.8464.846
250-4/73.5803.5803.9693.9844.1894.189
250-4/83.2003.2003.5193.5193.6823.682
125-4/52.3702.3702.6952.6952.8812.885
125-4/62.0482.0482.2912.2912.4262.426
125-4/71.7961.7961.9881.9882.0942.094
125-4/81.6001.6001.7591.7591.8431.843
SF9500-4/55.2245.2246.0596.0596.5186.518
500-4/64.5314.5315.1465.1465.4995.499
500-4/74.0004.0004.4724.4724.7444.744
500-4/83.5563.5563.9543.9694.1804.180
250-4/52.6262.6263.0213.0213.2593.259
250-4/62.2652.2652.5732.5732.7492.749
250-4/71.9921.9922.2412.2412.3752.375
250-4/81.7841.7841.9811.9812.0902.090
125-4/51.3131.3131.5131.5131.6311.631
125-4/61.1331.1331.2861.2861.3751.375
125-4/70.9980.9981.1191.1191.1871.187
125-4/80.8900.8900.9910.9911.0461.046
SF10500-4/52.9262.9263.3253.3253.5483.554
500-4/62.5472.5472.8372.8372.9962.996
500-4/72.2462.2462.4732.4732.5892.592
500-4/82.0082.0162.1882.1882.2822.282
250-4/51.4671.4671.6621.6621.7771.777
250-4/61.2701.2741.4181.4181.4991.499
250-4/71.1231.1231.2351.2351.2961.296
250-4/81.0061.0061.0951.0951.1421.142
125-4/50.7340.7340.8320.8320.8890.889
125-4/60.6360.6360.7090.7090.7490.749
125-4/70.5620.5620.6180.6180.6480.648
125-4/80.5030.5030.5480.5480.5710.571
SF11500-4/51.5561.5561.7811.7811.9501.950
500-4/61.3541.3541.5221.5221.6461.648
500-4/71.1991.1991.3281.3281.4261.426
500-4/81.0761.0761.1771.1771.2561.256
250-4/50.7780.7790.8910.8910.9750.976
250-4/60.6770.6770.7610.7610.8240.824
250-4/70.6000.6000.6640.6640.7130.713
250-4/80.5380.5380.5890.5890.6280.628
125-4/50.3280.3280.3780.3780.4080.408
125-4/60.2830.2830.3220.3220.3440.344
125-4/70.2500.2500.2800.2800.2970.297
125-4/80.2230.2230.2480.2480.2610.261
SF12500-4/50.8300.8310.9600.9601.0581.058
500-4/60.7240.7240.8210.8210.8950.895
500-4/70.6420.6420.7170.7170.7750.775
500-4/80.5770.5770.6370.6370.6830.684
250-4/50.3660.3660.4160.4160.4520.452
250-4/60.3180.3180.3550.3550.3820.382
250-4/70.2810.2810.3090.3090.3300.330
250-4/80.2510.2510.2740.2740.2910.291
125-4/50.1830.1830.2080.2080.2260.226
125-4/60.1590.1590.1770.1770.1910.191
125-4/70.1400.1400.1540.1540.1650.165
125-4/80.1260.1260.1370.1370.1450.145
Table 4. Packet loss percentage of LoRa at a distance of 1000 m with all commonly used bandwidths, spreading factors, and code rates.
Table 4. Packet loss percentage of LoRa at a distance of 1000 m with all commonly used bandwidths, spreading factors, and code rates.
SF7SF8SF9SF10SF11SF12
64 Bytes125-4/5000000
125-4/6000000
125-4/7000500
125-4/8000000
250-4/5000005
250-4/6000000
250-4/7050000
250-4/8000000
500-4/5005000
500-4/6000000
500-4/7000000
500-4/8000000
128 Bytes125-4/5500500
125-4/6005500
125-4/7000500
125-4/8000500
250-4/50000100
250-4/6000050
250-4/7500050
250-4/8000050
500-4/5000005
500-4/6000005
500-4/7000000
500-4/8000005
255 Bytes125-4/50051000
125-4/61505500
125-4/7005500
125-4/8000500
250-4/5000550
250-4/6000550
250-4/70000100
250-4/8000050
500-4/5000055
500-4/6000005
500-4/7000005
500-4/8000005
Table 5. The actual throughput of Wi-Fi HaLow at a distance of 50 m compared with theoretical throughput.
Table 5. The actual throughput of Wi-Fi HaLow at a distance of 50 m compared with theoretical throughput.
BandwidthMCSModulationTheoretical Data Rate (Kbps) [49]Actual Data Rate (Kbps)Actual vs. Theoretical Data Rate %
1 MHz764-QAM3000214071%
2 MHz764-QAM6500439368%
4 MHz764-QAM13,500468035%
Table 6. Suitability of the tested technologies for HAN and NAN smart grid applications.
Table 6. Suitability of the tested technologies for HAN and NAN smart grid applications.
Use CaseBandwidthPayload SizeLatencyWi-Fi HaLowWi-Fi nLoRa
Advanced Metering Infrastructure including Electricity Meter Reading and Pricing Updates [53,54]10–500 Kbps100–2400 bytes15 s–4 hSuitableUnsuitableSuitable
Firmware Updates [53]Unspecified400–2000 kB<2 min–7 daysSuitableUnsuitableSuitable
Distribution Automation [53]100 Kbps–10 Mbps25–1000 bytes<4 sUnsuitableUnsuitableUnsuitable
Home Energy Management System/Home Automation [53,54,55]9.6–56 Kbps10–100 bytes2–15 sSuitableSuitableSuitable
Electric Vehicle to Grid and Charging [53,54,55]9.6–56 Kbps100–255 bytes<2 s–5 minSuitableSuitableSuitable
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kane, L.; Liu, V.; McKague, M.; Walker, G. An Experimental Field Comparison of Wi-Fi HaLow and LoRa for the Smart Grid. Sensors 2023, 23, 7409. https://doi.org/10.3390/s23177409

AMA Style

Kane L, Liu V, McKague M, Walker G. An Experimental Field Comparison of Wi-Fi HaLow and LoRa for the Smart Grid. Sensors. 2023; 23(17):7409. https://doi.org/10.3390/s23177409

Chicago/Turabian Style

Kane, Luke, Vicky Liu, Matthew McKague, and Geoffrey Walker. 2023. "An Experimental Field Comparison of Wi-Fi HaLow and LoRa for the Smart Grid" Sensors 23, no. 17: 7409. https://doi.org/10.3390/s23177409

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop