TY - GEN
T1 - Dynamic link adaptation based on coexistence-fingerprint detection for WSN
AU - Nicolas, Charbel
AU - Marot, Michel
PY - 2012/10/5
Y1 - 2012/10/5
N2 - Operating in the ISM band, the wireless sensor network (WSN) risks being interfered by other concurrent networks. Our concerns are the technologies that do not perform listening before transmission such as Bluetooth, and the ones that do not detect other technologies due to their channel sensing techniques like WiFi. To overcome this issue a WSN node should be able to identify the presence of such technologies. This will allow deducing the characteristics of the generated traffic of these technologies, and thus the behavior of the channel can be predicted. These predictions would help to trigger adequate reactions as to avoid or synchronize with the concurrent networks. Many works exist on link adaptation, but they concern blind adaptations which are unintelligent and solve momentarily the problem that may reappear over time. In this paper, we perform several experiments on a real testbed to categorize the model of the bit errors in corrupted received packets. These experiments are performed under different conditions of channel noise and interferences. This allows us to identify each corruption pattern as a fingerprint for the interfering technology. Then we propose the Fingerprint Identification Mechanism (FIM) to identify on the fly the source of the corruption. With an implementation on Tmote Sky motes using Tinyos1.x, We demonstrate the use of FIM for link adaptation in a coexistence environment. Our mechanism led to throughput improvements of 87%-100% depending on the transmission rate and channel quality.
AB - Operating in the ISM band, the wireless sensor network (WSN) risks being interfered by other concurrent networks. Our concerns are the technologies that do not perform listening before transmission such as Bluetooth, and the ones that do not detect other technologies due to their channel sensing techniques like WiFi. To overcome this issue a WSN node should be able to identify the presence of such technologies. This will allow deducing the characteristics of the generated traffic of these technologies, and thus the behavior of the channel can be predicted. These predictions would help to trigger adequate reactions as to avoid or synchronize with the concurrent networks. Many works exist on link adaptation, but they concern blind adaptations which are unintelligent and solve momentarily the problem that may reappear over time. In this paper, we perform several experiments on a real testbed to categorize the model of the bit errors in corrupted received packets. These experiments are performed under different conditions of channel noise and interferences. This allows us to identify each corruption pattern as a fingerprint for the interfering technology. Then we propose the Fingerprint Identification Mechanism (FIM) to identify on the fly the source of the corruption. With an implementation on Tmote Sky motes using Tinyos1.x, We demonstrate the use of FIM for link adaptation in a coexistence environment. Our mechanism led to throughput improvements of 87%-100% depending on the transmission rate and channel quality.
KW - Coexistence
KW - Coexistence detection
KW - Collision fingerprint
KW - Error patterns
KW - Link adaptation
UR - https://www.scopus.com/pages/publications/84866900470
U2 - 10.1109/MedHocNet.2012.6257128
DO - 10.1109/MedHocNet.2012.6257128
M3 - Conference contribution
AN - SCOPUS:84866900470
SN - 9781467320399
T3 - 2012 the 11th Annual Mediterranean Ad Hoc Networking Workshop, Med-Hoc-Net 2012
SP - 90
EP - 97
BT - 2012 the 11th Annual Mediterranean Ad Hoc Networking Workshop, Med-Hoc-Net 2012
T2 - 11th Annual Mediterranean Ad Hoc Networking Workshop, Med-Hoc-Net 2012
Y2 - 19 June 2012 through 22 June 2012
ER -