Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 332-335.

• Network & Communication • Previous Articles     Next Articles

High Speed Joining Scheme Based on Channel Evaluation for IEEE 802.15.4e TSCH

XU Yong, ZHANG Xiao-rong, ZHU Yu-jun   

  1. School of Computer and Information,Anhui Normal University,Wuhu,Anhui 241000,China
  • Online:2019-06-14 Published:2019-07-02

Abstract: Time Slotted Channel Hopping (TSCH) is one of the access behavior techniques defined in the IEEE 802.15.4e standard.In TSCH mode,new nodes that want to join the network must listen to EBs containing network information,but the IEEE 802.15.4e standard does not give a broadcast policy related to EBs,and the broadcast policy of EBs isa key technology for new node quickly joining the network.For the decisive technology,although the current academic community has proposed many solutions,it relies heavily on network density,and does not consider the actual interference.To this end,the paper mainly studied the network formation process of TSCH in severe interference environment,and proposed a fast access scheme based on channel estimation (HSJCE).By designing a new slot frame structure and evaluating the channel quality,The new join node and synchronizer mechanisms were used to increase the number of EBs sent and select the best quality channel to send and listen to EBs.Experimental data and analysis have fully shown that the new join and synchronization mechanism greatly increases the probability for joining nodes successfully detecting EBs and does not depend on network density.Even in the case of severe congestion,HSJCE can provide shorter join time.

Key words: IEEE 802.15.4e, Internet of things, Network formation, Time-slotted channel hopping, Synchronization

CLC Number: 

  • TP393
[1] ISA,ISA100,Wireless systems for automation[EB/OL].ht-tp://www.isa.org/Community/SP100WirelessSystemsforAuto-mation.
[2] Highway Addressable Remote Transducer,a group of specifications for industrial process and control devices administered by the HART Foundation[EB/OL].http://www.hartcomm.org.
[3] IEEE 802.15.4e-2012.IEEE standard for local and metropolitan areanetworks.Part 15.4:Low-Rate Wireless Personal Area Networks (LRWPANs)amendment 1:MAC sublayer.https://ieeexplore.ieee.org/document/6161600.
[4] IEEE 802.15.4-2011.Low-Rate Wireless Personal Area Networks (LRWPANs),Standard for Information Technology Standard.Rapid.https://ieeexplore.ieee.org/document/6581828.
[5] GUGLIELMO D D,SEGHETTIA,ANASTASI G,et al.A performance analysis of the network formation process in IEEE 802.15.4e TSCH wireless sensor/actuator networks[C]∥Computers and Communication.IEEE,2014:3385-3391.
[6] VOGLI E,RIBEZZO G,GRIECO L A,et al.Fast join and synchronization schema in the IEEE 802.15.4e MAC[C]∥Wireless Communications and NETWORKING Conference Workshops.IEEE,2015:85-90.
[7] DUY T P,DINH T,KIM Y.A Rapid Joining Scheme based on Fuzzy Logic for Highly Dynamic IEEE[J].International Journal of Distributed Sensor Networks,2016,12(8):1482-1493.
[8] OJO M,GIORDANO S,PORTALURI G,et al.An energy efficient centralized scheduling scheme in TSCH networks[C]∥IEEE International Conference on Communications Workshops.IEEE,2017:570-575.
[9] KIM J Y,CHUNG S H,HA Y V.A fast joining scheme based on channel quality for IEEE802.15.4e TSCH in severe interference environment[C]∥Ninth International Conference on Ubiquitous and Future Networks.IEEE,2017:427-432.
[10] PENG D,ROUSSOS G.Adaptive time slotted channel hopping for wireless sensor networks[C]∥Computer Science and Electronic Engineering Conference.IEEE,2012:29-34.
[11] PALATTELA M R,ACCETTURA N,VILAJOSANA X,et al.Standardizedprotocol stack for the Internet of (important) thing[J].IEEE CommunSurv Tutor,2013,15:1389-1406.
[12] DUY T P,KIM Y H.An efficient joining scheme in IEEE 802.15.4e[C]∥International Conference on Information and Communication Technology Convergence.IEEE,2015:226-229.
[13] Berkeley’sopenwsn[EB/OL].http://openwsn.berkeley.edu
[1] ZHANG Yuan-yuan, QIN Ling. Efficient Access Control Scheme for Internet of Things Search Technology [J]. Computer Science, 2019, 46(8): 194-200.
[2] WANG Zhen, ZHOU Ying, HUANG Cheng-dong, MIAO Quan-qiang. Survey on Blockchain Solution for Big Data [J]. Computer Science, 2019, 46(6A): 6-10.
[3] ZHAO Ying, HOU Jun-jie, YU Cheng-long, XU Hao, ZHANG Wei. Study and Application of Industrial Big Data in Production Management and Control [J]. Computer Science, 2019, 46(6A): 45-51.
[4] WU Bin-feng. Design of IoT Middleware Based on Microservices Architecture [J]. Computer Science, 2019, 46(6A): 580-584.
[5] BAI Ruo-chen, PANG Chen-xin, JIA Jia, QIU Shu-guang, SHAO Jia, LU Xiao-jiao. Design of Cloud Platform for Energy Internet of Things Based on LPWAN Multi-protocol [J]. Computer Science, 2019, 46(6A): 589-592.
[6] ZHANG Guang-hua, YANG Yao-hong, ZHANG Dong-wen, LI Jun. Secure Routing Mechanism Based on Trust Against Packet Dropping Attack in Internet of Things [J]. Computer Science, 2019, 46(6): 153-161.
[7] LIU Zheng-hao, ZHANG Guang-quan. Distributed Knowledge Framework of IOT Software Based on WSAN and Its Implementation Strategy [J]. Computer Science, 2019, 46(1): 148-154.
[8] JIN Rui, LIU Zuo-xue. Synchronization Protocol of TDMA Ad hoc Network Based on Time Slot Alignment [J]. Computer Science, 2018, 45(6): 84-88,110.
[9] YANG Wei, HE Jie, WAN Ya-dong, WANG Qin. Security for Communication Protocols in Internet of Things:A Survey [J]. Computer Science, 2018, 45(12): 32-41.
[10] LI Dong-yue, YANG Gang, QIAN Bo. Research on Architecture of Internet of Things [J]. Computer Science, 2018, 45(11A): 27-31.
[11] DENG Zhao-kun, LU Yu-liang, ZHU Kai-long, HUANG Hui. Symbolic Execution Technology Based Defect Detection System for Network Programs [J]. Computer Science, 2018, 45(11A): 325-329.
[12] GAN Yong, WANG Kai, HE Lei. New Ownership Transfer Protocol of RFID Tag [J]. Computer Science, 2018, 45(11A): 369-372,392.
[13] ZHANG Shuai, XU Shun, LIU Qian, JIN Zhong. Cell Verlet Algorithm of Molecular Dynamics Simulation Based on GPU and Its Parallel Performance Analysis [J]. Computer Science, 2018, 45(10): 291-294, 299.
[14] XIA Jun, LIU Jun-fa, JIANG Xin-long, CHEN Yi-qiang. Incremental Indoor Localization for Device Diversity Issues [J]. Computer Science, 2018, 45(10): 69-77.
[15] WANG Pan-zao. Research on Software Development System of Internet of Things Terminal Equipment [J]. Computer Science, 2017, 44(Z6): 515-518.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[2] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105, 130 .
[3] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[4] CUI Yi-hui, SONG Wei, PENG Zhi-yong, YANG Xian-di. Mining Method of Association Rules Based on Differential Privacy[J]. Computer Science, 2018, 45(6): 36 -40,56 .
[5] HUANG Dong-mei, DU Yan-ling, HE Qi, SUI Hong-yun, LI Yao. Marine Monitoring Data Replica Layout Strategy Based on Multiple Attribute Optimization[J]. Computer Science, 2018, 45(6): 72 -75,104 .
[6] LI Jia-yi, ZHAO Yu, WANG Li. Network Representation Model Based on Multi-architectures and Text Fusion[J]. Computer Science, 2018, 45(7): 38 -41, 77 .
[7] XU Wen-hao, SHEN Hang and BAI Guang-wei. Link Burstiness-aware Opportunistic Routing Protocol in Wireless Networks[J]. Computer Science, 2018, 45(5): 83 -88 .
[8] WU Zhong-zhong, LV Xin and LI Xin. Query Probability Based Dummy Location Selection Algorithm[J]. Computer Science, 2018, 45(5): 143 -146, 162 .
[9] NIU Jiao-jiao, FAN Min, LI Jin-hai and YIN Yun-qiang. Knowledge Discovery Method for Heterogeneous Data Based on Concept Lattice[J]. Computer Science, 2017, 44(9): 62 -66 .
[10] ZHANG Wen-hua, ZHANG Ming-hui, GUO Yi-hao, LU Zhen-tai and LIU Ying. Fitting Accuracy Guided Registration for Diffusion Weighted Images[J]. Computer Science, 2018, 45(5): 243 -249 .