Computer Science ›› 2025, Vol. 52 ›› Issue (3): 318-325.doi: 10.11896/jsjkx.240700203

• Computer Network • Previous Articles     Next Articles

Study on MAC Protocol of LoRa Network Hidden Terminal Based on BTMA

WANG Hao1, CAI Yuhang2, CHEN Guojie2, WANG Lu2   

  1. 1 School of Computer Science,Wuhan University,Wuhan 430072,China
    2 College of Computer Science and Software Engineering,Shenzhen University,Shenzhen,Guangdong 518060,China
  • Received:2024-07-31 Revised:2024-10-28 Online:2025-03-15 Published:2025-03-07
  • About author:WANG Hao,born in 1997,Ph.D.His main research interest is narrowband IoT communication.
    WANG Lu,born in 1986,Ph.D,asso-ciate professor.Her main research interests include wireless comunication and mobile computing.

Abstract: The emergence of low power wide area network(LPWAN) technology allows for longer-distance communication while minimizing power consumption and reducing transmission costs.LoRa(long range) technology,as a standout in this field,is highlyfavored in both industrial and academic circles due to its long-range capabilities,low power consumption,high capacity,strong anti-interference,and high reception sensitivity.However,the widely used ALOHA-based LoRaWAN protocol in the industry struggles to effectively address severe data packet collisions resulting from the massive access of terminal devices to the LoRa network,as well as the hidden terminal problem caused by the LoRa CAD(channel activity detection) feature.This paper proposes a BTMA(busy tone multiple access)-based MAC protocol for LoRa networks,known as the BT-MAC protocol.This protocol leverages LoRa’s high reception sensitivity,with the gateway using “busy tone” beacons to inform each node of the gateway’s operational status,thereby reducing the transmission of invalid packets.Simultaneously,nodes maintain a logical channel matrix with “busy tone” information and local information.By employing an optimal channel selection algorithm,nodes select the best logical channel for transmission,reducing collisions among uplink data packets from end nodes.This effectively mitigates the hidden terminal problem and congestion in LoRa networks.A LoRa network MAC protocol testing platform is built to test the effectiveness of BT-MAC.Extensive concurrent experiments and energy consumption tests are conducted in both indoor and outdoor environments.The experimental results show that the throughput of the BT-MAC protocol is 1.6 times that of the LMAC-2 protocol and 5.1 times that of the ALOHA protocol.Additionally,its packet reception rate is 1.53 times that of the LMAC-2 protocol and 17.2 times that of the ALOHA protocol..The average energy consumption per packet is approximately 64.1% of that of the LMAC-2 protocol and 14.2% of that of the ALOHA protocol.

Key words: LoRa, MAC Protocol, BTMA, Hidden terminal, CAD

CLC Number: 

  • TN092
[1]LI ME L,MA Y Z.Current Situation and Suggestions for the Development of the Internet of Things Industry in China [J].Group Technology & Production Modernization,2021,38(3):42-46.
[2]LAVRIC A,PETRARIU A I,POPA V.Sigfox communication protocol:The new era of iot?[C]//2019 International Confe-rence on Sensing and Instrumentation in IoT Era(ISSI).IEEE,2019:1-4.
[3]SINHA R S,WEI Y,HWANG S H.A survey on LPWA technology:LoRa and NB-IoT[J].ICT Express,2017,3(1):14-21.
[4]VANGELISTA L,ZANELLA A,ZORZI M.Long-range IoTtechnologies:The dawn of LoRaTM[C]//Future Access Enablers for Ubiquitous and Intelligent Infrastructures.Cham:Springer,2015:51-58.
[5]LoRaAlliance.LoRaWAN1.1Specification[S/OL]//BrandinCo-urtFremont:LoRaAlliance,2017:1-101.https://loraalliance.org/resource-hub/lorawanr-specification-v11.
[6]ELETREBY R,ZHANG D,KUMAR S,et al.Empowering low-power wide area networks in urban settings[C]//Proceedings of the Conference of the ACM Special Interest Group on Data Communication.2017:309-321.
[7]DONGARE A,NARAYANAN R,GADRE A,et al.Charm:Exploiting geographical diversity through coherent combining in low-power wide-area networks[C]//2018 17th ACM/IEEE International Conference on Information Processing in Sensor Networks(IPSN).IEEE,2018:60-71.
[8]GADRE A,NARAYANAN R,LUONG A,et al.Frequencyconfiguration for low-power wide-area networks in a heartbeat[C]//Proceedings of the Symposium on Networked Systems Design and Implementation(NSDI).2020:339-352.
[9]VOIGT T,BOR M,ROEDIG U,et al.Mitigating inter-network interference in LoRa networks[J].arXiv:1611.00688,2016.
[10]HOU N N,ZHENG Y Q.CloakLoRa:A covert channel over LoRaPHY[C]//2020 IEEE 28th International Conference on Network Protocols(ICNP).IEEE,2020.
[11]POLONELLI T,BRUNELLI D,BENINI L.Slotted ALOHAoverlay on LoRaWAN:a distributed synchronization approach[C]//2018 IEEE 16th International Conference on Embedded and Ubiquitous Computing(EUC).IEEE,2018:129-132.
[12]LUCA B,AAMIR M,PATRIK Ö,et al.Energy efficiency ofslotted LoRaWAN communication with out-of-band synchronization[J].IIEEE Transactions on Instrumentation and Mea-surement,2021,70:5501211-1-5501211-11.
[13]PIYARE R,MURPHY A L,MAGNO M,et al.On-demand LoRa:Asynchronous TDMA for energy efficient and low latency communication in IoT[J].Sensors,2018,18(11):3718.
[14]RIZZI M,FERRARI P,FLAMMINI A,et al.Using LoRa forindustrial wireless networks[C]//IEEE 13th International Workshop on Factory Communication Systems(WFCS).2017:1-4.
[15]LV W.Research on ALOHA Anti-collision Algorithm and Data Security in LoRa Network [D].Chongqing:Chongqing University of Technology,2018.
[16]PHAM C.Investigating and experimenting CSMA channel access mechanisms for LoRa IoT networks[C]//2018 IEEE Wireless Communications and Networking Conference(WCNC).IEEE,2018:1-6.
[17]GAMAGE A,LIANDO J,GU C,et al.LMAC:Efficient carrier-sense multiple access for LoRa[J].ACM Transactions on Sensor Networks,2023,19(2):1-27.
[18]KOUVELAS N,RAO V S,PRASAD R V,et al.p-CARMA:Politely scaling LoRaWAN[C]//International Conference on Embedded Wireless Systems and Networks.2020:25-36.
[19]XU T,ZHAO M.A LoRaWAN-MAC protocol based on WSN residual energy to adjust duty cycle[C]//IEEE 40th International Conference on Distributed Computing Systems(ICDCS).2020:1415-1420.
[20]SUBBARAMAN R,GUNTUPALLI Y,JAIN S,et al.BSMA:Scalable LoRa networks using full duplex gateways[C]//Proceedings of the 28th Annual International Conference on Mobile Computing and Networking.2022:676-689.
[21]PHAM C,EHSAN M.Dense deployment of LoRa networks:Expectations and limits of channel activity detection and capture effect for radio channel access[J].Sensors,2021,21(3):825.
[22]HAXHIBEQIRI J,VAN DEN ABEELE F,MOERMAN I,et al.LoRa scalability:A simulation model based on interference measurements[J].Sensors,2017,17(6):1193.
[23]TAPPAREL J,AFISIADIS O,MAYORAZ P,et al.An open-source LoRa physical layer prototype on GNU radio[C]//2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications(SPAWC).IEEE,2020:1-5.
[1] LIU Yi, QI Jie. IRRT*-APF Path Planning Algorithm Considering Kinematic Constraints of Unmanned Surface Vehicle [J]. Computer Science, 2024, 51(9): 290-298.
[2] WANG Qian, HE Lang, WANG Zhanqing, HUANG Kun. Road Extraction Algorithm for Remote Sensing Images Based on Improved DeepLabv3+ [J]. Computer Science, 2024, 51(8): 168-175.
[3] SHAO Wenxin, YANG Zhibin, LI Wei, ZHOU Yong. Natural Language Requirements Based Approach for Automatic Test Cases Generation of SCADE Models [J]. Computer Science, 2024, 51(7): 29-39.
[4] DENG Ziwei, CHEN Ling, LIU Wei. Continuous Influence Maximization Under Independent Cascade Propagation Model [J]. Computer Science, 2024, 51(6): 161-171.
[5] XIN Yuanxia, HUA Daoyang, ZHANG Li. Multi-agent Reinforcement Learning Algorithm Based on AI Planning [J]. Computer Science, 2024, 51(5): 179-192.
[6] LI Yu, YANG Xiangli, ZHANG Le, LIANG Yalin, GAO Xian, YANG Jianxi. Combined Road Segmentation and Contour Extraction for Remote Sensing Images Based on Cascaded U-Net [J]. Computer Science, 2024, 51(3): 174-182.
[7] WANG Yao, LUO Junren, ZHOU Yanzhong, GU Xueqiang, ZHANG Wanpeng. Review of Reinforcement Learning and Evolutionary Computation Methods for StrategyExploration [J]. Computer Science, 2024, 51(3): 183-197.
[8] CHEN Pan, CHEN Hongmei, LUO Chuan. Academic Influence Ranking Algorithm Based on Topic Reputation and Dynamic HeterogeneousNetwork [J]. Computer Science, 2024, 51(3): 81-89.
[9] TANG Jianing, LI Chengyang, ZHOU Sida, MA Mengxing, SHI Yang. Autonomous Exploration Methods for Unmanned Aerial Vehicles Based on Deep ReinforcementLearning [J]. Computer Science, 2024, 51(11A): 231100139-6.
[10] WANG Yuchen, GAO Chao, WANG Zhen. Survey of Inferring Information Diffusion Networks [J]. Computer Science, 2024, 51(1): 99-112.
[11] YANG Heng, ZHU Yan. Analysis of Academic Network Based on Graph OLAP [J]. Computer Science, 2023, 50(6A): 220100237-5.
[12] WANG Tao, GUO Wushi, DENG Jian, CHEN Liang. Building Natural Language Interfaces for Distributed SCADA Systems Using Semantic Parsing [J]. Computer Science, 2023, 50(6A): 220300141-9.
[13] BAI Mingli, WANG Mingwen. Fabric Defect Detection Algorithm Based on Improved Cascade R-CNN [J]. Computer Science, 2023, 50(6A): 220300224-6.
[14] ZHANG Zelun, YANG Zhibin, LI Xiaojie, ZHOU Yong, LI Wei. Machine Learning Based Environment Assumption Automatic Generation for Compositional Verification of SCADE Models [J]. Computer Science, 2023, 50(6): 297-306.
[15] SHANG Yuye, YUAN Jiabin. Task Offloading Method Based on Cloud-Edge-End Cooperation in Deep Space Environment [J]. Computer Science, 2023, 50(2): 80-88.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!