Next Article in Journal
Tutorial on the Use of Deep Learning in Diffuse Optical Tomography
Previous Article in Journal
Novel FPGA-Based Visual Stimulation Method for Eye Movement Analysis
Previous Article in Special Issue
Adaptive Scheduling for Time-Triggered Network-on-Chip-Based Multi-Core Architecture Using Genetic Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Ultra-Low Power Wireless Sensor Networks Based on Time Slotted Channel Hopping with Probabilistic Blacklisting

National Research Council of Italy (CNR–IEIIT), Corso Duca degli Abruzzi 24, I-10129 Torino, Italy
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(3), 304; https://doi.org/10.3390/electronics11030304
Submission received: 29 December 2021 / Revised: 13 January 2022 / Accepted: 17 January 2022 / Published: 19 January 2022
(This article belongs to the Special Issue Applications of Embedded Systems, Volume II)

Abstract

:
Devices in wireless sensor networks are typically powered by batteries, which must last as long as possible to reduce both the total cost of ownership and potentially pollutant wastes when disposed of. By lowering the duty cycle to the bare minimum, time slotted channel hopping manages to achieve very low power consumption, which makes it a very interesting option for saving energy, e.g., at the perception layer of the Internet of Things. In this paper, a mechanism based on probabilistic blacklisting is proposed for such networks, which permits to lower power consumption further. In particular, channels suffering from non-negligible disturbance may be skipped based on the perceived quality of communication so as to increase reliability and decrease the likelihood that retransmissions have to be performed. The only downside of this approach is that the transmission latency may grow, but this is mostly irrelevant for systems where the sampling rates are low enough.

Graphical Abstract

1. Introduction

Wireless sensor networks (WSNs) often include devices that are powered on batteries, especially when they are deployed in areas without a proper infrastructure. A primary requirement in these cases is to lower as much as possible the power consumption of such devices. Doing so brings two main benefits. First, the costs related to battery replacement, which also include the need for specialized personnel to physically access devices, decrease; it is worth noting that, sometimes, sensors can be located in places that are not very easy to reach. Second, the amount of exhausted batteries to be disposed of at the end of their life is proportionally reduced. Very simply, even a seemingly modest reduction in the power consumption by, say, 10 % , means that waste, which is likely to cause serious environmental pollution if not disposed of properly, is lowered to the same extent. It must be pointed out that also the solutions based on energy harvesting, including self-charging batteries [1], can definitely benefit from approaches aimed at saving energy.
The past decades have witnessed dramatic advances in low-power electronics, which made it possible to design and build smart objects and to enable the Internet of Things (IoT) [2]. Such objects are found at the border between the perception and network/transport layers in the IoT reference model, and their operations basically combine sensing and data transmission, usually toward a suitable middleware for subsequent processing in the Edge/Cloud. While a further reduction in power consumption is expected for them in the next years, some contributions can be hardly shrunk by acting only on the local processing platform (hardware, software, and operating system). This is the case of the energy required to transmit and receive signals over the air, exploiting, for instance, radio frequencies. In fact, decreasing the transmission power unavoidably makes the signals weaker against electromagnetic disturbance, consequently leading to a reduction in the packet delivery ratio, which may no longer fit the application requirements, undermining system reliability.
Modulation techniques adopted at the physical layer of the protocol stack in the recent solutions are typically very energy efficient, and are not likely to be improved further in the near future [3,4]. This means that other approaches are needed to save energy without impairing communication reliability, which operate at the medium access control (MAC) layer. One of the most popular techniques conceived to this purpose is time slotted channel hopping (TSCH) [5,6,7]. In this case, all motes are time synchronized and transmissions take place at predefined instants, which are known to all the participants of any communication. This implies that receivers are not requested to be always on. Instead, they can go to sleep until the time a message relevant to them is (potentially) expected. In simple words, TSCH manages to dramatically cut down power consumption on the receiving side by reducing the duty cycle. Other mechanisms, such as the deterministic and synchronous multi-channel extension (DSME), are basically aimed at the same purpose, although they do not require time synchronization [8].
Several proposals have been defined in the recent past that permit further saving. Some exploit a priori knowledge about future data exchanges. This is the case, for example, for cyclic data transfers, whose period can be inferred automatically and exploited to make receivers sleep for longer times. In [9], a simple mechanism is proposed for the MAC layer, termed listening suspension, which permits the transmitting side of a TSCH link to put the receiver to sleep for a given amount of time. The proactive reduction of idle listening (PRIL) [10,11] proposal generalizes such an approach, by exploiting information collected from different protocol layers in such a way as to tackle also multi-hop paths. Instead, other techniques operate explicitly at the upper protocol layers. For instance, in [12] two heuristics based on gravitational approaches were proposed for clustering and routing algorithms in WSNs, which rely on a fuzzy logic. In [13], the effects of inter-node distance and packet length on the network lifetime were analyzed, and it was found that, to cover a certain area, it is advisable to increase the packet length and to reduce the number of nodes.
One of the main TSCH strengths is channel hopping: in fact, while time slotting permits to prevent intra-network collisions and to increase energy efficiency, channel hopping makes transmission more robust against narrowband noise and external interference, which usually affects a limited number of frequencies among those that TSCH is allowed to use. For example, in the 2.4 GHz industrial, scientific, and medical (ISM) band, 16 channels, numbered from 11 to 26, are actually available. The transmission frequency typically hops among this set of channels according to a predefined sequence known by all motes. The automatic repeat request (ARQ) mechanism, which keeps retransmitting a frame until either the related acknowledgment frame (ACK) is received from the destination or the maximum number of transmission attempts, as given by the retry limit ( R L ) is exceeded, is layered atop TSCH. If the number of available channels and the slotframe size are selected in a suitable way, every subsequent retry is performed on a different channel, thus providing a very effective frequency diversity [14]. Generally speaking, the likelihood for transmission attempts in TSCH to take place on any of the different channels is, in the long term, approximately the same.
Including in TSCH, some mechanism that makes the usage of channels depend on their quality would lower, on average, the number of performed retries since good channels are used more often than bad ones. As a consequence, doing so could lower power consumption, improving at the same time reliability (the allowed number of attempts remains the same, but the likelihood for them to succeed increases). Generally speaking, blacklisting is a very popular mechanism that relies on the above idea. By temporarily excluding channels that suffer from high disturbance, the overall network performance typically improves. Most blacklisting techniques conceived for TSCH are aimed at improving the quality of communication, on either the network or a single link, which means achieving a higher packet delivery ratio (PDR) and lower latency. For example, in [15] the LABeL technique was proposed for the 6TiSCH protocol stack [6], which implements IPv6 over the TSCH mode of IEEE 802.15.4e. This approach exploits link-based adaptive blacklisting in order to improve reliability and responsiveness for industrial applications, where latency does definitely count.
In this paper, we consider quite different scenarios, where minimizing latency is not a primary requirement. Therefore, what we will actually do is trading responsiveness for power consumption. In particular, we do the following:
  • Our main goal is to reduce the amount of energy spent for exchanging frames over a TSCH link, even if this causes the communication latency to grow.
  • An equally important goal is not to worsen reliability, which means that the PDR on each link (and, consequently, over the network) must be, on average, as high as TSCH (or better).
  • In addition, we ask that situations where communication is prevented (or impaired) because the state seen by the involved motes is no longer coherent must be avoided: since the mechanism we propose operates on a per-link basis, there is no need to propagate any information about blacklisting to other motes, which prevents this kind of issue.
  • Finally, we pursue a very simple mechanism, as motes are very often provided with a limited amount of processing power and memory.
The paper is structured as follows: in Section 2 a brief introduction is provided about TSCH and blacklisting, whereas our adaptive approach is described in Section 3. Section 4 is aimed at evaluating the ability of moving average techniques to estimate the failure probability of channels, while a thorough performance evaluation of the proposed approach is provided in Section 5. Finally, in Section 6, some conclusions are drawn.

2. Improving TSCH through Blacklisting

Below, we focus on WSNs, which are used to reliable acquire information from sensors connected over the air [16]. Although we specifically consider TSCH, the proposed approach can be applied with some modification to other communication protocols as well. We assume that sampling periods are large enough, in the order of several minutes up to a few hours. What we demand is to reduce power consumption implied by frame exchanges to the bare minimum, leaving communication reliability (that is, the likelihood that a frame is eventually delivered to destination successfully) as high as conventional TSCH. We do not consider explicitly the option to bring modifications to the physical layer, including optimizations concerning the number and position of motes. In fact, such enhancements are usually independent from those brought to the MAC layer, and both can be adopted jointly to achieve the best results.

2.1. TSCH Basics

Basically, the TSCH medium access relies on time slotting. Frame exchanges are driven by a slotframe that repeats cyclically to which all motes must synchronize. The slotframe consists of a fixed number of slots, and every slot is wide enough to contain a maximal data frame, plus, if required, the related ACK. For instance, for OpenMote B devices running OpenWSN, the default slot duration is T slot = 20 ms. Scheduling of transmission opportunities in TSCH is achieved through a matrix made up of N C rows and N S columns, where N C is the number of physical channels over which frequency hops and N S is the number of slots in the slotframe. As said above, when operating in the 2.4 GHz band, N C is customarily set to 16. The default setup for the above platform foresees N S = 101 , which implies that the slotframe duration is 2.02 s, but this parameter can be easily changed.
Every dedicated link between a transmitter and a receiver mote is allocated one (or more) specific cells, each one identified by a pair S off , C off that represents its position in the TSCH matrix (slot and channel offsets, respectively). The channel used for transmission in the cell S off , C off is not fixed. Instead, it is calculated at runtime starting from index ( A S N + C off ) % N C , where “%” denotes the modulo operator and A S N is a 5-byte integer that represents the absolute slot number. A S N is initialized to 0 at network startup and is increased by one on every slot. By selecting N C and N S as prime numbers, consecutive transmissions on any link (and, in particular, retries for the same frame) take place on different channels [17], effectively enabling mixed time-frequency diversity.
A suitably designed bijective function, modeled as an array H, maps every above index onto a distinct physical channel c. In practice, c = H [ ( A S N + C off ) % | H | ] , where the size | H | of the hopping sequence is customarily set equal to N C . Doing so permits to increase communication robustness in those situations, where a number of frequencies may be affected at the same time by the same phenomenon [18]. This is the case of the traffic generated by nearby Wi-Fi devices: in fact, every single 20 MHZ Wi-Fi channel affects four adjacent TSCH channels. Higher pseudo-randomness in channel hopping better counteracts this kind of interference, irrespective of the actual (coprime) values chosen for N C and N S . The notation used throughout the text is summarized in Table 1.

2.2. Channel Blacklisting

The basic idea behind channel blacklisting techniques in TSCH is to change the hopping sequence H to prevent transmissions from occurring on poor quality channels. Unfortunately, this seemingly simple idea leads to a number of non-negligible issues when applied in practice. Performing channel evaluation once and for all at network startup is ineffective, as spectrum conditions are likely to vary over time (movement of motes and absorbing/reflecting obstacles, variations in the interfering traffic and electromagnetic noise, etc.). This means that spectrum conditions have to be repeatedly evaluated at runtime, exploiting adaptive approaches. This leads to the question about how evaluation has to be performed. Some approaches rely on the received signal strength indication (RSSI), which is readily available on the receiver side [19]. As an alternative, the failure probability on every channel can be estimated on the transmitting side as the ratio between the number of transmission attempts for which an ACK frame is received and the overall number of attempts performed by the mote [15], only considering cells mapped by TSCH on that particular channel.
A second aspect to be taken into account is how measurements about the spectrum conditions, carried out by a plurality of motes, are used to change the hopping sequence. Although many clever solutions have been proposed for this optimization problem [20,21,22], several constraints must be faced:
  • A small amount of energy must be spent by motes for computing the new hopping list, which means that both the complexity of the blacklisting algorithm and the number of additional messages needed to carry out its duties must be kept as low as possible.
  • The time taken to perform spectrum characterization, to evaluate the new optimal hopping sequence and to distribute it to the motes should be as low as possible, so that the ever-changing conditions of the wireless medium can be tracked effectively, yielding tangible improvements.
  • All other conditions met, a simple and robust mechanism, which is intrinsically stable and unlikely leads to oscillating or inconsistent behavior, is usually sought.
From an architectural point of view, several options are available. Centralized approaches, where a single node (typically, the gateway) collects measurements about the spectrum conditions from the motes and computes a new optimal global hopping sequence, are robust but slow, and may be ineffective. Distributed approaches leave the optimization burden to the motes, which have to communicate with neighbors to prevent clashes in channel reallocation (which would lead to collisions). Doing so permits to perform local optimizations, possibly exploiting channel re-use when links are located far away one from another. However, ensuring high robustness for dynamically changing environments could be quite troublesome in these cases, and may require a substantial number of control frames to be exchanged with nearby motes, which increase power consumption.
Concerning the specific way the hopping sequence H is dynamically updated, different solutions are possible. In the most general case, the size of the hopping list can be changed at runtime. Typically, it is shortened when a bad channel is discovered, which is removed from the list. Blacklisted channels are re-enabled when they are discovered to behave satisfactorily again. This approach has a non-negligible drawback: if, for any reason, coherence about H (as seen by motes) is lost, communication is prevented almost completely, because transmitters and receivers no longer agree on the channel to be used for any given A S N value. This is due to the fact that periodicity in channel pseudo-random selection depends on the hopping list size (according to the modulo operator), which is no longer fixed (motes only know that | H | N C ).
A more robust solution is to replace any bad channel with a good one (which is hence used more often), which leaves the length of the hopping sequence unchanged. In this case, if coherence is lost, communication is affected only on the replaced channels. In particular, collisions may take place whenever more than one mote in the same area is enabled to transmit in the same slot and on the same channel. If at most one mote is scheduled for transmission in the same slot (i.e., when no more than one link is defined in every column of the TSCH matrix), such an event cannot occur. The price to pay, in this case, is the low number of available links (limited by N S ), which decreases the maximum number of motes that can be connected to the network. On the other hand, if multiple motes are scheduled for transmission in the same slot on different channels (exploiting C off parameters), care has to be taken so that no two of them, as part of the update process for H involved by blacklisting, can select the same replacement channels, which would lead to collisions.
The simplest and most intrinsically robust blacklisting technique is to just skip transmission in those cells for which the quality of the related physical channel is deemed not good enough. For example, a threshold can be defined to this purpose. Since we are pursuing simplicity and robustness, this kind of approach will be specifically investigated.

3. Adaptively Shaping the Capacity of Channels

Measuring channel quality and disabling transmission completely when it falls below a given threshold is probably not the best solution, since intervention is not gradual but abrupt. Moreover, when a channel is disabled, its quality is not assessed any longer, and it cannot be easily reintegrated. For this reason, a pseudo-probabilistic approach is defined. The adaptive channel capacity shaping(ACCS) solution we are proposing operates on a per-link basis, and consists in selectively tuning the amount of transmission opportunities provided on every physical channel based on the related quality of communication. To put it simple, if the quality of a channel is high, every cell mapped on that channel will be available for transmission (and will be used, provided that the related link has a pending frame to be sent). Conversely, the lower the quality of the channel, the lower the chance that a cell mapped on it can be actually used.
As depicted in Figure 1, the ACCS operation can be described through a number of blocks, which (in line of principle) are implemented only on the transmitting side of the link.

3.1. Channel Quality Estimation

The estimator block is aimed at measuring, for any given link, how good every physical channel is. In the simple implementation we are considering here, the sender checks the outcome of every confirmed transmission attempt performed on link to estimate at runtime the failure probability ϵ , c on every channel c. To simplify descriptions, a single link is considered in the following, so that the streamlined notation ϵ c can be used. It coincides with the probability that, for a single transmission attempt (either the initial attempt or one of the retries) on channel c, the related ACK frame is not received. When several cells in the slotframe are allocated for transmission toward the same destination (over-provisioning), the related statistics can be gathered together. This is not possible for frames targeted to different destinations, even if they are scheduled in the same cell (e.g., for downlinks), as the physical propagation path for them is likely not the same. For the sake of simplicity, the term link will be used in the following to denote the communication between a specific source mote and a specific destination mote. Since the ACCS mechanism operates on a per-link basis, only the destination is needed to identify the link in each sender node.
Let i denote the most recent transmission attempt performed on channel c, and let ϕ c ( i ) be the related outcome (either 0 for success or 1 for failure). A simple moving average (SMA) can be used to estimate the failure probability at time t i
ϵ ^ c ( i ) = 1 M j = 0 M 1 ϕ c ( i j ) ,
where M is the number of past samples to be stored by the estimator block per link and per channel, e.g., using a circular buffer. Although using SMA to obtain ϵ c from ϕ c samples resembles a finite impulse response (FIR) low-pass filter, they are not exactly the same. In fact, frame transmissions in WSNs are typically periodic, but retries are not. However, if the spectrum dynamics are slow enough, the ability of SMA to track its variations adequately is not impaired significantly.
As an alternative, an exponential moving average(EMA) can be exploited. In this case,
ϵ ^ c ( i ) = α ϕ c ( i ) + ( 1 α ) ϵ ^ c ( i 1 ) , ϵ ^ c ( 0 ) = 0 ,
where ϵ ^ c ( i 1 ) denotes the previous ϵ c estimate. This approach resembles the one used to evaluate the retransmission timer in TCP [23], and is conceptually based on a first-order infinite impulse response (IIR) low-pass filter (the same considerations made above apply).

3.2. Disturbance Discretization

The output ϵ ^ c of the estimator block, which in embedded devices can be expressed as a fixed-point value in the range [ 0 , 1 ] , is first fed into a quantizer block with N Q quantization levels to convert it to an integer q c . In our case,
q c = min ( ϵ ^ c · N Q , N Q 1 ) ,
so that q c [ 0 , N Q 1 ] . In particular, q c = 0 denotes a good quality channel, whereas q c = N Q 1 denotes a very poor quality channel (including the case when all transmissions performed on c fail and ϵ ^ c = 1 , e.g., in the presence of a narrowband jamming signal).
Non-linear laws for converting ϵ ^ c to q c are also possible, but we did not consider them here. We set N Q = 9 , so that the link quality (in terms of the disturbance level) can be encoded on four bits only. Finer discretization on a larger number of levels just achieved marginal improvements.

3.3. Channel Capacity Shaping

Disturbance levels for all channels, defined by the set q k k [ 11 , 26 ] , are finally fed as input to a shaper block. Let c be the channel used by TSCH for transmitting in the current slot (in every slot, at most one link is enabled for transmission on any given mote). The purpose of the shaper is to selectively skip part of the cells by choking every channel of the considered link to a fraction 1 q c / N Q of the whole capacity based on its quality. To this extent, an integer quantity q is defined in the shaper, evaluated as q = A S N % N Q . It is important that N Q , N C , and N S are prime numbers. This means that, by considering any N Q consecutive cells of the same link whose transmission is set to happen on channel c, all of them are characterized by different q values. Moreover, the related sequence of q values repeats itself every N Q such cells, i.e., every N Q · N C · N S slots. In a real implementation, a bijective function Q should be additionally applied, that is, q = Q [ A S N % N Q ] , so that the q values seemingly hop in a truly random way across all the values in the range [ 0 , N Q 1 ] .
The q c value is interpreted by the shaper as the number of cells of the link, by considering those mapped on channel c, to be skipped every N Q cells. To determine if the current cell associated to channel c has to be skipped, the very simple test q < q c is performed. The net effect is a pseudo-random culling of the transmission opportunities, driven by the disturbance level. As an example, Figure 2 shows, for every possible value of q c (each one taking one column in the rightmost part of the figure), the sequence of cells skipped for channel c, under the assumption that (a) N S = 101 and N C = 16 (which means that the link transmits on the same channel every 1616 slots); (b) N Q = 9 ; (c) the cell is located at S off = 1 ; and, (d) C off is such that channel c is selected for transmission (through H) for A S N = 1 and after every multiple of 1616 slots, that is, H [ ( 1 + C off ) % 16 ] = c . A very simple Q mapping is defined to obtain q . As can be easily seen, when q c = 0 (on the left) no cells are skipped, whereas when q c = N Q 1 = 8 (on the right), only one cell out of N Q consecutive ones is available for transmission on the link. In between, a linear law (better, a staircase) relates the fraction of skipped cells and the failure rate for any given channel, hence achieving smooth operations. Other heuristics are clearly possible.

3.4. Effects of Choking on Latency

An important property of the above approach is that, for any given link, at least one cell is always left enabled out of every N Q subsequent ones. In fact, provided that N S and N Q are prime, by considering any N Q -adjacent cells allocated to the link, they are characterized by different values of q (and thus q ) drawn in the range [ 0 , N Q 1 ] . Even in the most unfavorable case when q k = N Q 1 , k [ 11 , 26 ] (that is, choking takes place to the maximum extent on all channels), the cell, among the N Q considered ones, for which q = N Q 1 is not skipped. This means that the transmission latency in ACCS cannot grow more than N Q times with respect to TSCH, that is, it is upper bounded by
d max = N Q · ( 1 + R L ) · N S · T slot = N Q · ( 1 + R L ) · T sf .
For example, if NS = 101, Tslot = 20 ms, RL = 15, and NQ = 9, then latency cannot exceed 290.88 s. As a consequence, if packet transmissions on any link to (or from) the root are spaced by at least 5 min, then the transmission of every new packet with ACCS starts for sure after the previous one is delivered (or dropped, if the retry limit is exceeded), causing no queuing in intermediate relay motes.
When the sampling periods of applications are large enough, so that the above assumption holds on average, the size of the queues remains typically low enough. In such conditions, buffer overrun never occurs, and ACCS is not likely to bring any negative effects on communication reliability.

3.5. Normalization to the Best Channel

The above mechanism considers every channel separately. While achieving the most saving for what concerns the ability to reduce the number of transmission attempts, doing so has some drawbacks. For example, let us analyze the case when all available channels are affected by a non-negligible amount of disturbance. In this case, all q k values selected by ACCS are strictly greater than 0, which means that every channel is choked. However, skipping some cells on a bad channel is pointless if all the other channels are equally bad, since no improvements can be expected in this case from choking.
The above phenomenon can be tackled by considering the relative levels of disturbance among channels in the place of absolute ones. To keep this “normalization” as simple as possible (we should not forget that it must be implemented on motes with very low processing power), we decided to modify the set of values used by the shaper block for chocking channels, we now term q k , by subtracting the minimum q min among them. In particular, for channel c,
q c = q c min k ( 11 , . . . , 26 ) q k .
This means that every such value is displaced by an offset (the same for all channels of a link), which is evaluated dynamically in such a way that no cells are skipped on the best channel(s), irrespective of the related quality. For example, if the least disturbed channel suffers from a failure probability equal to 30 % , all other channels for which ϵ ^ c is close to the lower bound 0.3 will not be choked in any way, and the amount of skipped cells increases progressively as disturbance grows higher.
As we will see, normalization permits to lower the ACCS latency in a consistent way, although conventional TSCH remains the fastest option, as no transmission opportunities are ever skipped, not even on very bad channels, and a residual probability to succeed is likely to exist for them. On the other hand, the ability to decrease power consumption may be slightly impaired by normalization, since the choking of very bad channels is less pronounced than when conventional ACCS (without normalization) is used, meaning that a larger fraction of attempts will fail.

3.6. Receiver Side

The above mechanism is conceived to operate on the transmitting side of the link only, and the benefits it brings consist in reducing the number of retries, since attempts on bad channels are often skipped. On the receiving side, idle listening occurs every time a cell remains unused because either there is no frame pending for transmission or the cell is skipped by ACCS. Since the fraction of used cells on a link only depends on the frame generation rate and the average number of retries, which, in turn, is related to the disturbance level and not on choking (that can simply defer part of the transmission opportunities), we can state that ACCS does not affect power consumption on the receiver side of the link. Idle listening is a known problem of TSCH, which can be faced by mechanisms like listening suspension performed at the MAC layer and, more in general, PRIL.
So that the maximized saving can be achieved concerning energy consumption, the receiver can be kept synchronized with the transmitter for what concerns the channel-chocking mechanism. In particular, every time the transmitter computes a new q c estimate for a link, its value can be sent to the receiver so that it can disable listening in those cells that will be skipped. While reducing power consumption on the receiver side, this approach may suffer from non-negligible issues when, for whatever reason, coherence is lost and the values of q c seen by the transmitter and the receiver differ. In this case, in fact, the receiver can be mistakenly down at the time the transmitter is sending a frame, hence reducing the number of available attempts per frame and, in turn, the communication reliability. Making the above technique reliable without increasing appreciably the amount of information exchanged between the two sides of a link is an open question that will be faced in future works.

4. Channel Estimation

Preliminary experiments were performed aimed at evaluating the ability of moving averages to filter the outcomes of transmission attempts and to satisfactorily estimate the failure probability on every channel of a link. The two solutions described above were considered, that is, SMA and EMA. The former is parameterized by the number M of past samples to be averaged, whereas the latter by weight α . A quite generic way to describe the wireless spectrum of a link, and in particular of every single channel c, is to model it through a finite number of states, each one characterized by a certain quality of communication. In every state, transmission attempts are modeled as Bernoulli trials characterized by the related failure probability ϵ c . Transitions between states take place from time to time due to variations in the amount of interference and noise. This resembles a generalization of the Gilbert–Elliot model that relies on two or more states.
By resorting to simulation, the performance of SMA and EMA was evaluated for a specific ϵ c variation pattern. For simplicity, we modeled channel c for a given link using four states, characterized by ϵ c equal to 0.1 , 0.9 , 0.3 , and 0.7 , respectively. Transitions between states, in this order, took place every 100 transmission attempts on that channel. As an exception, the system stayed in the third state, corresponding to ϵ c = 0.3 , for 200 attempts. In other words, in the simulations we modeled ϵ c as a specific piecewise constant function. Assuming N C = 16 , N S = 101 , T slot = 20 ms, and that a pending frame is always ready to be sent, implies that attempts on any channel c (and hence, ϕ c ( i ) samples describing their outcomes) are spaced by about 32 s. This means that in the above sample disturbance pattern, the time that the environment remained (mostly) stable between subsequent variations was at least 50 min. Realistically, the spectrum can be satisfactorily described by referring to the cyclicity of human activities over the day (morning, afternoon, evening, and night), which are characterized by slower dynamics (several hours).
In Figure 3 the original ϵ c ( i ) pattern (solid line), as well as the ϵ ^ c ( i ) estimates computed through SMA and EMA, are plotted for a disturbance pattern including 1000 samples. For SMA we selected M = 12 , while for EMA we set α = 0.12 (they will be shown to be optimal values). The sequence ( ϕ c ( i ) ) of transmission outcomes is not shown in the figure, as it visually bears little information (it is just a random sequence of one thousand Boolean values). As can be qualitatively observed, filters are able to track satisfactorily the failure probability, with some delay. Moreover, jitters appear, whose presence can be easily observed when the failure probability is stuck at a fixed value, because of the Bernoulli process we employed to model attempts. Increasing M or decreasing α lowers jitters, but makes filters unable to track spectrum variations promptly. An optimal value can be determined for filter parameters, which depends on the dynamics of disturbance.
To quantitatively evaluate the effect of parameters on filtering, simulations were run by repeating our basic disturbance pattern 200 times (that is, by considering 100,000 transmission attempts overall). In every run, the root mean square error (RMSE) between ϵ c and ϵ ^ c was calculated for different values of α and M. Results are reported in Table 2. As can be seen, optimal parameter values actually exist that, for the specific sample disturbance pattern we considered, minimize RMSE. In fact, when the cutoff frequency of the low-pass filter is too high, variability of the Bernoulli process causes high jitters (and errors) on the estimated ϵ ^ c . Conversely, when it is set too low, variations in ϵ c are not tracked promptly enough, making any mechanism that relies on them (such as ACCS) temporarily ineffective.
Whatever the case, once the parameters of the filter are suitably set, a reduction in the dynamics of disturbance leads to a better estimation. Interestingly, a range of values exists for every parameter, centered around the optimum, where RMSE does not vary appreciably. We will not investigate this aspect further, since we are not interested in obtaining the best estimation for ϵ c according to RMSE. In theory, what should be looked for is a filter that provides the best results for the metrics we consider for assessing ACCS communication performance. In reality, we just need a coarse analysis to find the filter parameters that offer a reasonably low RMSE. Selecting a non-optimal filter just makes ACCS behavior worse, which means that the results reported in the analysis below are pessimistic under this respect. This is not a limiting factor, as the exact dynamics of the spectrum are seldom available in advance.

5. Communication Performance

An experimental campaign was carried out aimed to evaluate the effects of choking on communication performance, to understand if and under what conditions ACCS may bring any real benefits. A very simple program written in the C language was exploited to this extent, which simulates the behavior of a link with a single dedicated cell operated according to either the conventional TSCH mechanism, the conventional choking mechanisms, or the normalized chocking mechanism.

5.1. Metrics

Comparison relied on several metrics related to power consumption, responsiveness, and reliability. Concerning power consumption, we counted the number a j of attempts performed for every transmitted frame j. Both successfully delivered frames and those that were lost because the retry limit was exceeded were considered, since energy is consumed in either case. To better highlight the behavior of ACCS, the retry limit in our experiments was set to R L = 7 (that is, at most, 8 transmission attempts can be performed for any given frame before it is discarded). This value sits in between the values customarily set in TSCH for this parameter, that is, 3 (in the early literature) and 15 (in the current implementation). By using a suitable power consumption model, such as the ones described in [9,24], the overall energy spent for every frame transmission (all attempts included) can be easily evaluated. Below, we preferred to stick on the average number of transmission attempts per frame, and not on energy, because this value does not depend on the specific implementation of the mote and, in particular, of its radio transceiver. At any rate, these two values are related by a linear law. In particular, we calculated the mean value and standard deviation of the sequence ( a j ) of experimental samples, denoted μ a and σ a , respectively.
The second metric we took into account is the transmission latency, denoted d j , which is defined only for those frames that were successfully delivered to destination. A relevant contribution to the latency is the number of retries made to deliver the frame, which equals a j 1 . In fact, on every retry the latency increases by one slotframe T sf . Actually, when choking is active, also the skipped cells must be taken into account, whose number for frame j is denoted s j . Every frame transmission is additionally affected by a waiting time, due to the fact that slotframe repetition and actual sampling are typically not synchronized. Its contribution to the overall delay is not fixed, but is always upper bounded by the slotframe duration and, on average, it amounts to T sf / 2 [14]. We neglected delays due the communication stack in both the receiver and the transmitter, as well as propagation delays for signals over the air, because they do not depend on the communication protocol.
Since we are interested in the worst case, we considered a proper upper bound on latency by assuming that the maximum waiting time is always experienced. It can be expressed by rounding the number of slotframes, which elapse between the frame transmission request and the slot when the corresponding ACK frame is received from the destination to the next whole number. This upper bound can be expressed as δ ^ j T sf , where δ ^ j = a j + s j . For example, in the case that the frame is delivered at the first attempt and no cells are skipped, δ ^ j is equal to 1 (one slotframe). Statistics concerning δ ^ j were evaluated for every experiment, including the mean value μ δ ^ , the standard deviation σ δ ^ (which provides an indication about jitters), and the maximum value δ ^ max . Interestingly, the actual mean value for latency can be determined as μ d μ δ ^ T sf T sf / 2 , while for the worst-case latency d max δ ^ max T sf .
The latter metric is reliability, expressed as the fraction P L of frames that went lost because no acknowledgments were received while performing the allowed attempts. When ACK frames are repeatedly corrupted, chances are that a correctly received frame is considered failed by the transmitter. From a practical viewpoint this is not a problem, as neglecting this event simply makes our analysis slightly pessimistic.

5.2. Spectrum Model

For what concerns disturbance affecting communication, we assumed that transmission attempts are independent and can be modeled as Bernoulli trials. In particular, every channel c is characterized by a failure probability ϵ c . Thanks to the mixed time-frequency diversity in TSCH, this is usually a more than reasonable approximation (see [14]). As in the current OpenWSN implementation on OpenMotes B, we assumed that 16 channels are exploited by TSCH in the 2.4 GHz band, labeled from 11 to 26 according to [5].
To simplify the definition of experiments, we considered groups of four adjacent WSN channels (e.g., 11, 12, 13, and 14), and we set the failure probability for all the channels in every such group at the same value (for the example, ϵ 11 14 ). In other words, the spectrum seen by TSCH is completely characterized by the tuple ϵ 11 14 , ϵ 15 18 , ϵ 19 22 , ϵ 23 26 . Such an assumption does not imply any particular limitations on our analysis and is perfectly coherent with the interference generated by co-located 20 MHz channels in well-configured Wi-Fi networks tuned on channels 1, 5, 9, and 13.
In the following, we chose for ACCS a low-pass filter based on EMA, where α = 0.05 . Doing so provides an acceptable trade-off between responsiveness in tracking changes of the spectrum conditions and the ability to provide smooth results.
The values of the main parameters used in the experiments, concerning both the network protocol and the wireless environment are reported in Table 3.

5.3. Steady-State Analysis

Experiments were first performed in steady-state conditions, where the failure probability on every channel was set to a fixed value for the whole duration of the test. Three conditions were considered: the first mimics a mildly disturbed spectrum, described as ϵ 11 14 = 0.1 , ϵ 15 18 = 0.3 , ϵ 19 22 = 0.7 , and ϵ 23 26 = 0.1 . Instead, the second refers to a heavily disturbed spectrum, where failure probabilities were ϵ 11 14 = 0.9 , ϵ 15 18 = 0.3 , ϵ 19 22 = 0.7 , and ϵ 23 26 = 0.9 . These are clearly quite high values, but it must be remembered that the ACCS mechanism we are proposing is aimed explicitly at coping with such conditions. Finally, the third condition models the case when disturbance is negligible. In this case, ϵ 11 14 = ϵ 15 18 = ϵ 19 22 = ϵ 23 26 = 0.1 .
For each spectrum condition, three experiments were performed, considering conventional TSCH, ACCS, and normalized ACCS. Every experiment lasted for ten million cells. For a slot time equal to 20 ms, this means more than two days in the real world. We assumed that frames are sent by the application back to back. While this is not the way motes typically operate (in systems with slow dynamics, samplings are usually spaced by tens of minutes, and even hours), the results are not affected because of our hypothesis that attempts are statistically independent. The duration of the slotframe was set equal to 11 slots. Doing so increases the number of transmitted frames and improves the reliability of statistics. Results are reported in Table 4, where the upper, middle, and lower parts of the table refer to mild, heavy, and negligible interference conditions, respectively.
As can be seen in the middle part, where disturbance is objectively heavy, conventional TSCH features the shortest latency. However, more than three attempts per frame are performed on average in these conditions, which implies that the power consumption on the transmitter side is three times higher than when there is no disturbance at all (so that transmissions always succeed at the initial attempt). Reliability is only partially satisfactory, as 4.37 % of the frames are lost.
When choking is considered, the number of attempts per frame decreases noticeably (about two are needed, on average), and the same holds for power consumption (which means a 35 % reduction in the energy spent by the radio module of the transmitter). On the downside, latency increases sensibly, and is on average twice as much as TSCH. Even worse are jitters, as can be seen by observing the standard deviation of the latency, as well as its maximum value. As we said above, this is not a problem for the use cases we are considering. Unlike control loops with tight timing constraints (which, indeed, rely seldom on WSNs), latency is mostly irrelevant for applications that perform sensing, especially when timestamps associated to samples are taken on motes. The reliability of ACCS is much better than TSCH. In fact, by skipping bad channels, the fraction of dropped frames decreased by more than one order of magnitude.
When normalization was enabled for ACCS, the results we obtained sat in between the two above cases. In particular, power consumption increased by about 15 % over basic choking ( 25 % less than TSCH), but the mean and maximum latency, as well as the related standard deviation, were noticeably lower. Reliability was, again, noticeably better than TSCH, although not as much as in the previous case.
The very same behavior is observed in the upper part of the table, where the link suffered from mild disturbance on half of the channels. In this case, the differences between conventional and choked TSCH for what concerns power consumption and latency are less pronounced. As can be seen, normalization hardly has any noticeable effects on choking. This is because of the channels with the best quality (i.e., characterized by the lower disturbance). In fact, the failure probability estimated for them almost always led to a value for q min equal to (or near to) 0, which means that most of the times q c values were non-actually displaced by normalization. Interestingly, the ability to skip bad channels managed to improve reliability noticeably. In fact, the fraction of lost frames when choking is enabled decreased more than four times compared to TSCH.
Finally, in the lower part of the table, it can be observed that when disturbance is quite low, the effect of ACCS is barely noticeable: almost the same results as TSCH were obtained for power consumption, with a modest increase in the latency. This is because, with such a low level of disturbance, choking is performed infrequently. Having the same amount of disturbance on all channels did not help, as it makes selective choking useless. For the same reasons, normalization had no visible effect. These are desirable results, as in typical, benign conditions, ACCS basically retains the behavior of TSCH.
The results in Table 4 are presented as bar charts in Figure 4 to ease comparison among the different approaches. In particular, every plot refers to a specific quantity: the number of attempts (average and standard deviation), upper bound on latency (average, standard deviation, and worst case), and packet-loss ratio.

5.4. Transient Analysis

This experiment was aimed at determining whether or not making choking work on the estimated probability may bring tangible benefits when a dynamically changing environment is taken into account. As in the case above, the experiments lasted for ten million cells, and the failure probabilities for (groups of) channels were changed four times in this interval. Initially, ϵ 11 14 = 0.1 , ϵ 15 18 = 0.3 , ϵ 19 22 = 0.7 , and ϵ 23 26 = 0.1 . Then, the failure probabilities for all channels were progressively raised up to 0.9 , with the exception of ϵ 19 22 , that remained at 0.7 . This happened at cell 2,500,000 for ϵ 23 26 , at cell 5,000,000 for ϵ 11 14 , and at cell 7,500,000 for ϵ 15 18 , leading to four sub intervals.
The metrics defined above for steady-state analysis were evaluated again to compare TSCH and the two choking mechanisms (with and without normalization). In the latter cases, the choking mechanism was driven either by the real failure probability ϵ (the same we used to generate the outcomes of attempts, modeled as Bernoulli trials) or by the probability estimated by applying a low-pass filter on past outcomes. In particular, we opted again for the use of EMA by setting α = 0.05 . Results obtained when ACCS was driven directly by ϵ c values (and not by ϵ ^ c estimates) can be seen as benchmarks. In fact, doing so permitted to prevent the effects due to estimation errors (both jitters and slowness in tracking the failure probability in dynamical varying environments), which negatively affect ACCS behavior.
Results are reported in Table 5. As can be seen, even in the case when the disturbance level varied with time, ACCS managed to reduce the average number of retries (and hence, power consumption) at the expense of an increased latency. Moreover, it permitted, again, to reduce the number of lost frames, thus leading to better communication reliability. Additionally the effects of normalization on ACCS resemble the steady-state case.
Concerning comparison with the benchmarks based on true ϵ c values, we can observe that for the analyzed case, characterized by a slowly varying spectrum, working on ϵ ^ c estimates did not lower ACCS performance appreciably. Overall, we managed to increase the probability that frames are successfully delivered to destination and to save energy at the same time, which can be useful in several contexts where applications operate slowly (several tens of minutes between data exchanges); the main goal is extending the lifetime of motes.
The plots in Figure 5 and Figure 6 show the number of transmission attempts (that is related to power consumption) and the upper bound on latency (in slotframes), respectively, for conventional TSCH, ACCS, and normalized ACCS. A mobile average over 100 samples was applied to make plots smoother. Again, it can be seen that when disturbance increases, selectively skipping bad cells permits to lower, on average, the number of attempts.

6. Conclusions

Thanks to its MAC mechanism based on time slotting, TSCH achieves low duty cycles for the radio module of motes and, hence, reduced power consumption. At the same time, channel hopping lowers the probability that frames are lost consistently, therefore ensuring higher reliability. In this paper, a mechanism is described and evaluated that makes TSCH ultra-low power, and, hence, able to suit the needs of unattended distributed systems deployed without a fixed network infrastructure, including those that rely on the Internet of Things paradigm for, e.g., environmental monitoring, diagnostics of industrial plants, and smart agriculture, where a number of nodes are powered on batteries whose lifetime must last as long as possible.
This mechanism, which we termed ACCS, operates on a per-link basis and provides sort of a probabilistic blacklisting, where better quality channels are more likely to be used for transmission on links. First, ACCS evaluates the quality of all the channels of every link. Such quality can be profitably described by means of the failure probability computed from the fraction of attempts for which an ACK is received. Then, the capacity of every channel of any given link is separately choked, so that the lower its failure probability, the most it will be actually exploited for transmission attempts. From a practical point of view, cells allocated to the link are selectively skipped by means of a pseudo-probabilistic scheme, in such a way as to favor channels suffering from a low disturbance. Badly disturbed channels are nevertheless used at a reduced rate so that their quality can be still assessed.
The ACCS performance, in terms of reliability, power consumption, and latency, was evaluated by means of a very simple network simulator and compared to conventional TSCH. Results are quite encouraging, and show that both power consumption and reliability can be improved tangibly. The only downside is that transmission latency may increase sensibly, since part of the transmission opportunities are purposely skipped. However, when applications with slow timing requirements are taken into account, such as those devoted to collect information from a physical system (i.e., when control loops are not closed over the network), this is not a severe limitation. For example, when parameters are selected as in our experiments, ACCS never makes the latency grow more than nine times with respect to TSCH. Last but not least, the proposed mechanism is extremely simple, which has two advantages: first, a streamlined implementation is possible, which fits the scarce processing resources of motes, and second, good robustness is also expected, which means that the network behavior is unlikely to worsen because of rare and unexpected events.
Our future work will include a more thorough analysis of the effects of both the filtering technique and the choking strategy on communication performance.

Author Contributions

All authors, G.C., S.S., and A.V., contributed equally to the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
TSCHTime Slotted Channel Hopping
ACCSAdaptive Channel Capacity Shaping

References

  1. Flexible Self-Charging Battery under Development. Available online: https://www.advancedbatteriesresearch.com/articles/22081/flexible-self-charging-battery-under-development (accessed on 11 January 2022).
  2. Sethi, P.; Sarangi, S.R. Internet of Things: Architectures, Protocols, and Applications. J. Electr. Comput. Eng. 2017, 2017, 9324035. [Google Scholar] [CrossRef] [Green Version]
  3. Chen, Q.; Gursoy, M.C. Energy-efficient modulation design for reliable communication in wireless networks. In Proceedings of the 2009 43rd Annual Conference on Information Sciences and Systems, Baltimore, MD, USA, 18–20 March 2009; pp. 811–816. [Google Scholar] [CrossRef] [Green Version]
  4. Wen, M.; Cheng, X.; Yang, L. Optimizing the energy efficiency of OFDM with index modulation. In Proceedings of the 2014 IEEE International Conference on Communication Systems, Macau, China, 19–21 November 2014; pp. 31–35. [Google Scholar] [CrossRef]
  5. IEEE Std 802.15.4-2020 (Revision of IEEE Std 802.15.4-2015); IEEE Standard for Low-Rate Wireless Networks. IEEE: New York, NY, USA, 23 July 2020; pp. 1–800. [CrossRef]
  6. Vilajosana, X.; Watteyne, T.; Chang, T.; Vučinić, M.; Duquennoy, S.; Thubert, P. IETF 6TiSCH: A Tutorial. IEEE Commun. Surv. Tutorials 2020, 22, 595–615. [Google Scholar] [CrossRef]
  7. Scanzio, S.; Vakili, M.G.; Cena, G.; Demartini, C.G.; Montrucchio, B.; Valenzano, A.; Zunino, C. Wireless Sensor Networks and TSCH: A Compromise Between Reliability, Power Consumption, and Latency. IEEE Access 2020, 8, 167042–167058. [Google Scholar] [CrossRef]
  8. Juc, I.; Alphand, O.; Guizzetti, R.; Favre, M.; Duda, A. Energy consumption and performance of IEEE 802.15.4e TSCH and DSME. In Proceedings of the 2016 IEEE Wireless Communications and Networking Conference, Doha, Qatar, 3–6 April 2016; pp. 1–7. [Google Scholar] [CrossRef] [Green Version]
  9. Cena, G.; Scanzio, S.; Valenzano, A. Enabling Listening Suspension in the Time Slotted Channel Hopping Protocol. In Proceedings of the 2021 17th IEEE International Conference on Factory Communication Systems (WFCS), Linz, Austria, 9–11 June 2021; pp. 19–26. [Google Scholar] [CrossRef]
  10. Scanzio, S.; Cena, G.; Valenzano, A.; Zunino, C. Energy Saving in TSCH Networks by Means of Proactive Reduction of Idle Listening. In Ad-Hoc, Mobile, and Wireless Networks; Grieco, L.A., Boggia, G., Piro, G., Jararweh, Y., Campolo, C., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 131–144. [Google Scholar]
  11. Scanzio, S.; Cena, G.; Seno, L.; Valenzano, A. Robustness and Optimization of PRIL Techniques for Energy Saving in TSCH Networks. In Proceedings of the 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2021), Vasteras, Sweden, 7–10 September 2021; pp. 1–8. [Google Scholar] [CrossRef]
  12. Selvi, M.; Santhosh Kumar, S.V.N.; Ganapathy, S.; Ayyanar, A.; Khanna Nehemiah, H.; Kannan, A. An Energy Efficient Clustered Gravitational and Fuzzy Based Routing Algorithm in WSNs. Wirel. Pers. Commun. 2021, 116, 61–90. [Google Scholar] [CrossRef]
  13. Elwekeil, M.; Abdalzaher, M.S.; Seddik, K. Prolonging smart grid network lifetime through optimising number of sensor nodes and packet length. IET Commun. 2019, 13, 2478–2484. [Google Scholar] [CrossRef]
  14. Cena, G.; Demartini, C.G.; Ghazi Vakili, M.; Scanzio, S.; Valenzano, A.; Zunino, C. Evaluating and Modeling IEEE 802.15.4 TSCH Resilience against Wi-Fi Interference in New-Generation Highly-Dependable Wireless Sensor Networks. Ad Hoc Netw. 2020, 106, 102199. [Google Scholar] [CrossRef]
  15. Kotsiou, V.; Papadopoulos, G.Z.; Chatzimisios, P.; Theoleyre, F. LABeL: Link-based Adaptive BLacklisting Technique for 6TiSCH Wireless Industrial Networks. In Proceedings of the 20th ACM Int. Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems, Miami, FL, USA, 21–25 November 2017; ACM: New York, NY, USA, 2017; pp. 25–33. [Google Scholar] [CrossRef] [Green Version]
  16. Lazarescu, M.T. Design of a WSN Platform for Long-Term Environmental Monitoring for IoT Applications. IEEE J. Emerg. Sel. Top. Circuits Syst. 2013, 3, 45–54. [Google Scholar] [CrossRef] [Green Version]
  17. Khoufi, I.; Minet, P.; Rmili, B. Beacon Advertising in an IEEE 802.15.4e TSCH Network for Space Launch Vehicles. In Proceedings of the 7th European Conference for Aeronautics and Aerospace Sciences (EUCASS 2017), Milan, Italy, 3 July 2017. [Google Scholar]
  18. Zoppi, S.; Gürsu, H.M.; Vilgelm, M.; Kellerer, W. Reliable hopping sequence design for highly interfered wireless sensor networks. In Proceedings of the 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), Osaka, Japan, 12–14 June 2017; pp. 1–7. [Google Scholar] [CrossRef] [Green Version]
  19. Du, P.; Roussos, G. Adaptive time slotted channel hopping for wireless sensor networks. In Proceedings of the 2012 4th Computer Science and Electronic Engineering Conference (CEEC), Colchester, UK, 12–13 September 2012; pp. 29–34. [Google Scholar] [CrossRef] [Green Version]
  20. Kotsiou, V.; Papadopoulos, G.Z.; Chatzimisios, P.; Tholeyre, F. Is local blacklisting relevant in slow channel hopping low-power wireless networks? In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  21. Queiroz, D.V.; Gomes, R.D.; Fonseca, I.E.; Alencar, M.S.; Benavente-Peces, C. Channel Assignment in TSCH-based Wireless Sensor Networks Using Fuzzy Logic. J. Ambient. Intell. Humaniz. Comput. 2021. [Google Scholar] [CrossRef]
  22. Gomes, P.H.; Watteyne, T.; Krishnamachari, B. MABO-TSCH: Multihop and blacklist-based optimized time synchronized channel hopping. Trans. Emerg. Telecommun. Technol. 2018, 29, e3223. [Google Scholar] [CrossRef]
  23. Paxson, V.; Allman, M.; Chu, J.; Sargent, M. Computing TCP’s Retransmission Timer. RFC 2011, 6298, 1–11. [Google Scholar] [CrossRef] [Green Version]
  24. Vilajosana, X.; Wang, Q.; Chraim, F.; Watteyne, T.; Chang, T.; Pister, K.S.J. A Realistic Energy Consumption Model for TSCH Networks. IEEE Sens. J. 2014, 14, 482–489. [Google Scholar] [CrossRef]
Figure 1. Block diagram for ACCS (including optional normalization to the minimum): the MAC of TSCH is instructed whether to use or to skip every cell allocated to the link.
Figure 1. Block diagram for ACCS (including optional normalization to the minimum): the MAC of TSCH is instructed whether to use or to skip every cell allocated to the link.
Electronics 11 00304 g001
Figure 2. Sample sequence of cells skipped on channel c vs. quantized disturbance q c .
Figure 2. Sample sequence of cells skipped on channel c vs. quantized disturbance q c .
Electronics 11 00304 g002
Figure 3. Real and estimated (SMA/EMA) values of ϵ c vs. time (sample) i.
Figure 3. Real and estimated (SMA/EMA) values of ϵ c vs. time (sample) i.
Electronics 11 00304 g003
Figure 4. Performance indicators about communication for the different approaches (TSCH, ACCS, and normalized ACCS) in the three considered operating conditions (mild, heavy, and negligible disturbance).
Figure 4. Performance indicators about communication for the different approaches (TSCH, ACCS, and normalized ACCS) in the three considered operating conditions (mild, heavy, and negligible disturbance).
Electronics 11 00304 g004
Figure 5. Number of transmission attempts per frame vs. time (sample).
Figure 5. Number of transmission attempts per frame vs. time (sample).
Electronics 11 00304 g005
Figure 6. Frame transmission latency vs. time (sample).
Figure 6. Frame transmission latency vs. time (sample).
Electronics 11 00304 g006
Table 1. Summary about notation.
Table 1. Summary about notation.
QuantitySymbol
Slotframe size (in slots) N S
Time slot duration T slot
Slotframe duration T sf
Absolute slot number A S N
Slot offset in the TSCH matrix for a given cell S off
Number of channels N C
Hopping sequence H [ · ]
Channel offset in the TSCH matrix for a given cell C off
Number of quantization levels N Q
Function for making q pseudo-random Q [ · ]
Sampling windows width for SMA low-pass filterM
Aging factor (weight) for EMA low-pass filter α
Outcome for attempt i on channel c (fail. = 1, succ. = 0) ϕ c ( i )
Real failure probability for channel c ϵ c
Estimated failure probability for channel c ϵ ^ c
Quantized disturbance for channel c q c
Normalized quantized disturbance for channel c q c
Retry limit R L
Number of transmission attempts for frame j a j
Number of skipped cells for frame j s j
Transmission latency for frame j d j
Upper bound on d j (in slotframes) δ ^ j
Table 2. RMSE for ϵ c estimations with EMA and SMA filters ( ϵ ^ c EMA and ϵ ^ c SMA ).
Table 2. RMSE for ϵ c estimations with EMA and SMA filters ( ϵ ^ c EMA and ϵ ^ c SMA ).
EMASMA
α RMSE M RMSE
0.0500000.17910740.207358
0.1000000.14634480.163764
0.120000 *0.143827100.157549
0.1500000.14472612 *0.155372
0.2000000.152609160.157396
0.2500000.164097200.163598
0.3000000.177126320.190030
* optimum value for the considered configuration.
Table 3. Parameters used in the experiments (protocol and environmental).
Table 3. Parameters used in the experiments (protocol and environmental).
ParameterSymbolValue
Slotframe size (in slots) N S 11
Number of channels N C 16
Number of quantization levels N Q 9
Retry limit R L 7
Weight for EMA low-pass filter α 0.05
Failure probability (Wi-Fi interf. ch. 1) ϵ 11 14 0.1 */0.9 **/ 0.1
Failure probability (Wi-Fi interf. ch. 5) ϵ 15 18 0.3 */0.3 **/ 0.1
Failure probability (Wi-Fi interf. ch. 9) ϵ 19 22 0.7 */0.7 **/ 0.1
Failure probability (Wi-Fi interf. ch. 13) ϵ 23 26 0.1 */0.9 **/ 0.1
* mild; ** heavy; negligible disturbance conditions (steady-state analysis).
Table 4. Steady-state analysis (mild, heavy and negligible disturbance).
Table 4. Steady-state analysis (mild, heavy and negligible disturbance).
TechniqueDisturb.Tries (#)Latency (Slotframes)Losses
(avg)(std)(avg)(std)(worst)%
μ a σ a μ δ ^ σ δ ^ δ ^ max P L
Default TSCH 1.428590.505971.428530.5055680.0009
Choked norm.mild1.279020.326181.704650.88144110.0002
Choked 1.279010.326161.704840.88171110.0002
Default TSCH 3.185164.469102.965373.5665484.3656
Choked norm.heavy2.381242.515684.4797910.02960220.8030
Choked 2.082311.842476.0056019.19481320.3266
Default TSCH 1.111310.123931.111310.1239360.0
Choked norm. neglig. 1.111390.124241.163920.1860070.0
Choked 1.111390.124241.163920.1860070.0
Table 5. Transient analysis (disturbance grows as the time passes).
Table 5. Transient analysis (disturbance grows as the time passes).
TechniqueDisturb.Tries (#)Latency (Slotframes)Losses
(avg)(std)(avg)(std)(worst)%
μ a σ a μ δ ^ σ δ ^ δ ^ max P L
Default TSCH2.3267653.5776652.0902912.32930084.0014
Choked norm.estimat.1.9297752.8040462.7217005.020538223.1911
Choked norm.real *1.8665622.5975952.6656805.084163362.8788
Chokedestimat.1.5658691.2276353.14049018.018015670.7421
Chokedreal *1.5181781.0688923.06134019.575816620.5735
* experiments based on the real e value are only included as a term of reference.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Cena, G.; Scanzio, S.; Valenzano, A. Ultra-Low Power Wireless Sensor Networks Based on Time Slotted Channel Hopping with Probabilistic Blacklisting. Electronics 2022, 11, 304. https://doi.org/10.3390/electronics11030304

AMA Style

Cena G, Scanzio S, Valenzano A. Ultra-Low Power Wireless Sensor Networks Based on Time Slotted Channel Hopping with Probabilistic Blacklisting. Electronics. 2022; 11(3):304. https://doi.org/10.3390/electronics11030304

Chicago/Turabian Style

Cena, Gianluca, Stefano Scanzio, and Adriano Valenzano. 2022. "Ultra-Low Power Wireless Sensor Networks Based on Time Slotted Channel Hopping with Probabilistic Blacklisting" Electronics 11, no. 3: 304. https://doi.org/10.3390/electronics11030304

APA Style

Cena, G., Scanzio, S., & Valenzano, A. (2022). Ultra-Low Power Wireless Sensor Networks Based on Time Slotted Channel Hopping with Probabilistic Blacklisting. Electronics, 11(3), 304. https://doi.org/10.3390/electronics11030304

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop