• No results found

Enhancement of the Contention Access Period for Reducing Energy Consumption of Industrial Internet of Things Based on IPv6

N/A
N/A
Protected

Academic year: 2021

Share "Enhancement of the Contention Access Period for Reducing Energy Consumption of Industrial Internet of Things Based on IPv6"

Copied!
11
0
0

Loading.... (view fulltext now)

Full text

(1)

7

Enhancement of the Contention Access Period for Reducing Energy

Consumption of Industrial Internet of Things Based on IPv6

Yousuf Ruduan Hussein1 and Salah Elfaki Elrofai2

1 Sudan University of Science &Technology, College of Computer Science& Information Technology 2Sudan University of Science &Technology, Electronics Engineering School

yousuf01980@gmail.com Received: 03/01/2020

Accepted:23/02/2020

Abstract - Industrial Internet of Things (IIoT) is an emerging technology in recent years, which is widely utilized for control, manage the manufacturing environment, and monitor production lines in the smart factories. The IPv6 has enabled the use of many IIoT devices, so these devices consume large amounts of energy. Many research efforts were made in this area aimed to improve power consumption and performance. This paper proposed the Contention Access Period Reduction Medium Access Control protocol (CAP Reduction MAC protocol) for reducing the CAP duration size based on IEEE 802.15.4e. The proposed MAC protocol leads to reduce the CAP portion. Thus the number of time slots, which assigned to the network nodes will decrease. Moreover, this paper intends to estimate the performance of IIoT devices in terms of energy consumption, throughput, and delay time through an analysis of their respective ways of operation running the Contiki Operating System (OS). To validate the proposed protocol, different experiments are conducted based on the Cooja simulator. The proposed protocol can be reduced the overall energy consumption with up to 64.14 %, decreases the delay by 33.7 %, and increases throughput by 63.0 %.

Keywords: IIoT, IPv6, IEEE 802.15.4e, Industry 4.0, Superframe, CAP, and Cooja.

صلختسملا ءايشلأل يعانصلا تنرتنلإا (IIoT) ةريخلأا تاونسلا يف ةئشان ةينقت يه ةرادإو مكحتلل عساو قاطن ىلع اهمادختسا متي يتلاو ، .ةيكذلا عناصملا يف جاتنلإا طوطخ ةبقارمو عينصتلا ةئيب لاا رادص سداسلا تنرتنلإا لوكوتورب ( IPv6 ) نكم لا مادختسا نم ريثك نم ةزهجأ IIoT ، زهجلاا نم ريبكلا ددعلا اذه ي ة كلهتس ةقاطلا نم ةريبك تايمك ةيثحبلا دوهجلا نم ديدعلا لذب مت . ةقاطلا كلاهتسا نيسحت فدهب لوكوتورب ةقرولا هذه تحرتقا .ءادلأاو ةرتف ليلقتل سفانتلا ل لوصول ( CAP ) ةقبط يوتسم ىلع لوكتوري ل لوصولا ( لاصتلاا طسو MAC ) ىلإ اًدانتسا رايعم . IEEE 802.15.4e يدؤي لا لوكوتورب ىلإ حرتقملا ةرتف ليلقتل سفانتلا ل لوصول ( CAP ) ضفخنيس يلاتلابو ددع نامزا وتلا لصا ةزهجلأ ةصصخملا ةكبشلا ةزهجأ ءادأ ريدقت ىلإ ةقرولا هذه فدهت ، كلذ ىلع ةولاع . ةكبش IIoT ةقاطلا كلاهتسا ثيح نم و ةيجاتنلإاو ماظنب لمعت يتلا اهب ةصاخلا ليغشتلا قرط ليلحت للاخ نم ريخأتلا كيتنوك ي .(Contiki) حرتقملا لوكوتوربلا ةحص نم ققحتلل يكاحم ىلع ًءانب ةفلتخم براجت ءارجإ متي ، اجوك .(Cooja) ىلإ لصت ةبسنب يلكلا ةقاطلا كلاهتسا ضيفخت حرتقملا لوكوتوربلل نكمي 64.14 ةبسنب ريخأتلا للقيو ، ٪ 33.7 ةبسنب ةيجاتنلإا ديزيو ، ٪ 63.0 ٪ . 1. Introduction

IIoT [1] is an emerged technology that enhances

production efficiency through analyzing the big data by collecting the sensing data in the smart factory [2]. IIoT is the base for a new level of

organization and management of industrial value chains and enables highly flexible and resource-saving production as well as enhanced individualization of products at the cost of mass production.

The foundations of IIoT are cyber-physical systems (CPS), which are computing platforms that monitor and control physical processes. CPS

enables condition monitoring, structural health monitoring, remote diagnosis, and remote control of production systems in real-time. IIoT is an emerging technology. It can transform industrial companies' environments into a new concept known as smart factories [3], which considered as

the basis of CPS that dynamically organizes and optimizes production processes concerning resource-utilization as the costs, availability, material, and labor based on data generated and collected by the underlying CPS, even across company boundaries.

(2)

8 Also in the smart factories, smart products know their own all an identity, history, specification, documentation, and control their production process. [4].

The architecture of the IIoT networks is composed of several layers. The first layer has various components such as sensors or intelligent devices for data acquisition. The second layer for communications techniques. And the third layer used for big data analytics [5]. The definition of IIoT

leads to a new industrial concept called Industry 4.0

[6]. Industry 4.0 [7] refers to the next stage in the

evolution of the organization and control of the IIoT components, which connected through communications protocols. There are different kinds of communication protocols proposed for the IIoT network [8].

In order to establish an IIoT network over the Internet, which required Internet Protocol (IP) addresses. IIoT uses IPv6 protocol for communication between things to collect and exchange data within the existing IIoT infrastructure due to has a very large address space

[9].

Communication protocols of IIoT systems have many technical challenges; one of the most critical issues is energy consumption, which exists. In the context of IoT sensors used in the IIoT domain, there are different methods have been proposed for improving the energy consumption based on medium access control (MAC) layer’s protocols. The most popular MAC layer communication protocols are IEEE 802.15.4 and IEEE 802.15.4e. IEEE 802.15.4 was released by the IEEE Working Group officially in May 2003 to meets the wireless communication requirements, such as low data rate, low cost, low-power consumption, and short-range communication [10].

Furthermore, this protocol also modified to meet the critical requirements of IoT applications [11].

IEEE 802.15.4e amendment was published in 2012, for enhancing the functionalities of the IEEE 802.15.4-2011 protocol [12], and makes it support

industrial market. [13]. Both MAC protocols were

defined as the superframe structure, and the nodes use the carrier sense multiple access with collision avoidance (CSMA/CA) as a channel access mechanism.

Many articles were introduced a detailed explanation of the superframe structure [14], [15], [16],

[17], [18], [19], [20], and [6]. The superframe structure

consists of an Active Period and the optional an

Inactive Period. In the Inactive Period, the device enters the sleep state to save energy.

The Active Period which is divided into 16 equal-long time slots, contains three phases that are Beacon, Contention Access Period (CAP), and Contention Free Period (CFP). The length of each superframe is equal to the number of the time slots of the CAP, and the time slots of the CFP and other parameters are all set by the coordinator, which broadcasting them to the network [18].

However, there are many research studies introduced for improving performance-based superframe structure, either on the IEEE 802.15.4 or the IEEE 802.15.4e. This study proposed a CAP reduction MAC protocol for enhancing energy consumption based on the superframe structure. The proposed CAP reduction MAC protocol can reduce energy consumption, packet delay time, and maximize throughput for IEEE 802.15.4, and IEEE 802.15.4e MAC protocols. The proposed CAP reduction protocol was evaluated through extensive measurements under the Cooja simulator.

The contributions of this paper are: Firstly, a comprehensive overview of the IEEE 802.15.4e standard was provided based on the time-critical MAC behaviors, with emphasis on power harvesting issues. Secondly, a new MAC protocol was proposed for reducing the CAP period based superframe structure, which enhances the performance of the IIoT systems. Thirdly, the proposed protocol can give more power-efficient and high performance. Fourthly, the proposed protocol can reduce the costs due to the reduction of the number of devices attached to the sensor board.

The rest of the paper is structured as follows. Related work was discussed in section 2. Section 3 provides an overview of the IEEE 802.15.4e MAC Modes. The proposed CAP Reduction MAC Protocol was discussed in section 4. Section 5 introduces the Performance Evaluation and a more thorough discussion of the benefits of the proposed protocol. Finally, conclusions and future work were discussed in section 6.

2. Related Works

According to the superframe structure, this paper introduced a detailed discussion of the methods that have been proposed to decrease the energy consumption, based on MAC protocols for IoT devices used in IIoT applications. These methods can divide into two parts. methods related to IEEE

(3)

9 802.15.4 and the methods also based on the IEEE 802.15.4e MAC protocol.

Methods based on IEEE 802.15.4

Several previous works for MAC protocols are proposed based on IEEE 802.15.4, which mainly focused on energy consumption [22], [18], [19].

Superframe Scheduling Algorithm was presented based on the IEEE 802.15.4 standard in order to coordinators grouping and improve QoS support in WSN [10].

This algorithm can group the coordinators that have the same features, simultaneously send and receive a beacon frame, and can be active in the same period. [21] provided a dynamic CFP allocation for

allowing more CFP allocations than IEEE 802.15.4. The CFP allocation is added, and the duration of CFP is variable due to the dynamic CFP allocation. The CAP and CFP are fixed in each superframe, the length of CFP is also variable, but some slots of CAP duration were added to GTSs in the CFP duration.

A node-grouping superframe-division MAC protocol based on the IEEE802.15.4 MAC protocol was introduced for maximizing the network performance [18]. The study introduced by [19] gives

the Hidden-Node Avoidance Mechanism for WSNs for decreasing energy consumption and delay time. The main idea of this mechanism is to use part of the CAP for the Group Access Period (GAP). As observed, the duration of the minimum superframe must be guaranteed for the CAP in each superframe. [20] offered an approach for improving

network delay based on the superframe structure that assumed in the 802.15.4 protocol.

In this approach, the PAN coordinator allows the other network nodes to reserve a dedicated time slot to satisfy the bandwidth and latency requirements via a TDMA method. These slots called guaranteed time slots (GTS). Each node requires at least two GTSs, one for receive acknowledgments, and another for transmitting data. These contiguous time slots form a Contention Free Period (CFP), which is placed at the end of the active period of the superframe. Moreover, this approach is the CFP at the beginning of the active portion. All the previous works focus on legacy MAC protocol for maximizing performance, while little attention has been devoted, so far, to reducing superframes based on the IEEE 802.15.4e MAC protocol.

Methods based on IEEE 802.15.4e

A low-power multi-hop data frame transmission scheme based on the IEEE 802.15.4e MAC

protocol was presented by [21] for reducing energy

consumption from the transmission frame in the smart utility network (SUN). This scheme can aggregate the frames to address the bottleneck challenges on SUN, the periodical broadcasting of the beacon has been omitted. Also, a relatively short active period without a CFP is selected to reduce unintended reception during the active period.

This scheme can be assisted in reducing energy-based superframes structure. The study introduced by [17] is described as the superframe structure based

on the IEEE 802.15.4e MAC communication protocol. The superframe includes only an active period. This approach can reduce power consumption by decrease the number of CAP periods that save energy, and the first superframe of each multi-superframe uses the CAP. The remaining of the superframes inside the multi-superframe structure is treated as a CFP.

A similar mechanism has been used in the previous works based on the CAP portion in the context of the superframe structure. This paper proposed a new MAC protocol for reducing energy consumption based IEEE 802.15.4e MAC protocol. The proposed scheme can reduce the CAP size by increasing the superframe order (SO).

3. An Overview of the IEEE 802.15.4e MAC Standard

IEEE 802.15.4e MAC standard protocol uses a rigid slot structure for both centralized and distributed scheduling to realize a high energy efficiency [23]. It defined five types of MAC

protocols modes based on domain of applications, namely Time Slotted Channel Hopping (TSCH) [24],

the Low Latency Deterministic Network (LLDN)

[25], Deterministic and Synchronous Multi-channel

Extension (DSME), Low Latency Deterministic Network(LLDN), Radio Frequency Identification (RFID Blink), and the Asynchronous Multi-Channel Adaptation (AMCA) [26]. This paper will

focus on the TSCH, DSME, and LLDN MAC modes of the IEEE 802.15.4e protocol, due to having more time-critical applications.

TSCH MAC Mode

The IEEE802.15.4e 2015 TSCH is designed to provide high reliability, low-power consumption, which is suited to constrain of IIoT devices [27].

TSCH supports several functionalities such as more flexibility, ease of use, short network delay [28], and

ultra-low power MAC [29], [30], [28]. Also, this

(4)

10 topologies, as well as multi-hop communication. It was developed for process automation, process control, equipment monitoring. Also, it is robustly candidate technology for Industry 4.0 [28].

DSME MAC Mode Protocol

IEEE 802.15.4e DSME MAC mode protocol was developed for IoT to provide and support industrial environments, multi-hop networks, and healthcare applications [32]. By exploiting both time and

frequency was multiplexing, it allows a very efficient allocation of available resources; it is running only in beacon-enabled mode, it keeps devices synchronized utilizing timing information embedded in periodic Enhanced Beacons [16]. Also,

the DSME protocol is used for providing various functionalities such as a multi superframe structure, a CAP, and Contention Free Period (CFP) for network communications [33], each

multi-superframe structure includes multiple superframes. The length of the superframe is fixed to 16-time slots [26] .

LLDN MAC Mode Protocol

The LLDN mode can be scattered in a star topology, where a central node is responsible for the network management. The sensors continually exchange messages with the coordinator following a TDMA structure [25]. The LLDN support several

applications in the industry that require deterministic systems to ensure low delay data aggregation services according to the standard [34].

LLDN superframe consists of a beacon slot,

management time slots, and

macLLDNnumTimeSlots of equal duration. 4. Proposed CAP Reduction MAC Protocol This paper was focused on the following assumptions: First, the sensors after CAP reduction should be covering the same area, which included the sensors before it reduced. Second, the number of time slots for smart sensors using CAP should be sufficient, as observed; a one-time slot is assigned to a specific device. Once the time slot assigned to the device, the device exclusively occupies the slot every superframe, whether it sends or not. Also, the IEEE 802.15.4e provides support for a multi-superframe. The CAP is fixed to eight-time slots during which the nodes should stay awake. The superframe duration, including an active and inactive period that can be configured through two important performance metrics, such as a Superframe Order (SO) and Beacon Order (BO). The network coordinator defines the superframe structure by a Beacon Interval (BI), which defined

as the time between two consecutive beacons and a Superframe Duration (SD), which is an active duration of the superframe. The values of BO and BI are related as follows [18] ;

for 0 ≤ BO ≤ 14 (1) BI = ⍺ x 2BO

symbols (2) Where ⍺ is an aBaseSuperframeDuration, it is defined as the number of symbols representing a superframe, when the SO is equal to zero. Besides, the SO defines the duration of the active period, including the beacon frame. The values of SO and SD represented by the following equations:

for 0 ≤ SO ≤ BO ≤ 14 (3) SD = ⍺ x 2SO

symbols (4) Therefore, in the case of 2.4 GHz, the value of SD = 15:36 x 2SO ms with a BI = 15:36 x 2BO ms.

The IIoT network deploys star topology, and the base station may control and manage a massive amount of nodes that require more energy. To solve the IIoT challenges that are mentioned above, a new CAP reduction MAC protocol for reducing the CAP size per superframe was proposed. The proposed protocol can reduce the CAP duration by increasing the SO. When the CAP was reduced, the number of devices allocated to the CAP duration is minimized. Simultaneously, it maximizes the bandwidth.

Figure 1: Superframe Structure of the proposed Protocol.

For the CAP reduction MAC protocol, this paper provides a mechanism for devices to channel access. This mechanism also uses a slotted CSMA/CA mechanism for channel access to transmit periodic data during the CAP.

This work uses the modified method as that introduced by [35] for CAP portion reduction. In this

protocol, the length of the CAP is changed according to the SO values. If the value of SO is in the range of 0 to 2, the CAP size is equal to 8-time slots, where the time slots are similar to that proposed in IEEE 802.15.4, which provides one superframe structure and IEEE 802.15.4e. Besides, the value of SO is in the range of 3 to 5. In this case, the CAP length is equal to 4-time slots, as depicted in Figure 1. SO values change according to the

(5)

11 network performance. The following steps present how the proposed protocol can change the values of SO; this operation is quite the same as that study provided by [36].

Step 1: The coordinator will start to assets the total delay each node suffered so far along with the number of packets received from that node at that moment.

Step 2: The coordinator can then estimate nodes' average end to end delay, which will be its performance criteria according to which SO value shall dynamically change. Experiments revealed that the most reasonable number of packets after which the checking process is done by coordinator is 5;

Step 3: The coordinator is checking process is done every five packets. According to the results achieved,

Step 4: The coordinator decides if it should increase SO. In other words, if the new estimated average delay is checked to be worse than that of the previously calculated one, then the coordinator shall increase SO value. Otherwise, do-nothing. Step 5: If SO increased, its value should not exceed that of BO value, and if so, it shall reset to the original SO value and return the overall process, as illustrated in Figure 2.

Figure 2: New Mechanism for Changes SO Values.

5. Performance Evaluation

The performed evaluation process was dividing into three subsections, first introduced the experimental setup, the second section discusses

the experiment's measurements, and finally, practically shows actual experimental results of a Cooja simulator over Zolertia Z1 and Tmote Sky sensors, analytically show the performance improvements of the proposed protocol.

Table 1 shows the basic simulation settings for all simulations, which utilized in the Cooja simulator. To reduce power consumption, two simulations with different seeds were conducted for each scenario and average values were adopted as the results.

Experiment Setup

To evaluate the performance of this work, different experiments were conducted operated under Windows 10 Service Pack 3 operating system (64 bits), processor core i3, RAM 4 GB running over VMware 12 player Linux, Ubuntu 16.04. The proposed protocol can reduce the number of CAP duration, so timeslots that allocated to the nodes are reduced according to CAP reduction. One timeslot dedicated to one node for sending data to the coordinator and receive data from the neighboring sensors. The proposed scheme was set the SO value to 5 in order to determine the number of sensors allocated to CAP, if SO is equal to 5, then the number of sensors is equal to 8 nodes.

TABLE 1:IMPORTANT COOJA SIMULATOR

PARAMETERS. Parameter Value OS Contiki OS 2.7 Microcontroller MSP430 Transceiver CC2420 Wireless Channel model UDGM

MAC Model ContikiMAC IP Address IP v6

Topology Star Simulation Area 100m2

Number of Nodes Scenario A 8 nodes, Scenario B 16 nodes Sensor node platform Z1 and Sky Motes

SO value 5

Simulation Time 30 minutes

The proposed protocol implemented within Contiki OS (version 2.7), the compilation was done under two sensors nodes are sky and Z1 based on radio chipsets, CC2420 micro-controller, and IPv6. These sensors randomly deployed in the area of 100m2.. All experiments run under the Cooja

simulator. Cooja is a simulator for IIoT nodes, which allows emulating the real hardware platforms. Cooja is running under Contiki OS

(6)

12 concentrating on network behavior. Cooja is capable of simulating wireless sensor networks without any particular mote. Cooja supported several standards such as uIPv6 stack. One of the propagation models provides by Cooja is Unit Disk Graph Medium (UDGM) and it takes the ideal transmission range disk in which motes inside the transmission disk receive data packets and motes outside the transmission disk do not get any packet

[37] .

The nodes were scattered in a star topology, in order to prevent multi-hop counts. To emulate the work two scenarios are used, 8 nodes were used in scenario A and 16 nodes also used in scenario B. Each scenario was simulated two times for measuring energy consumption, throughput, and packet delay. Figures in section 5.3 show the differentiation of these scenarios. Hint, scenario A is a proposed protocol and scenario B is IEEE 802.15.4e standard.

Simulation Measurements

Through these experiments, there are different measurements have been done: energy consumption, throughput, and network delay. Energy Consumption

The methodology to measure energy consumption by the industrial devices in the network is the necessary adaptations to the Contiki OS. Energy consumption was measured in two scenarios. The scenario A for the average of the energy consumption for each sensor node that consisting of 8 of Z1 and Sky motes and scenario B also included in table 2, which consists of 16 of Z1 and Sky motes. The total energy (ET ) consumption by every

node was computed according to equation 5. ET = ECPU + ELPM + ERX +ETX (5)

Where the ECPU refers to the energy

consumption by the CPU of the node.

Low Power Mode (LPM) refers to the energy used when the sensor in the idle state. RX is the listening energy required when the sensor is ready to receive the data packet from its neighbor nodes.

TABLE 2:AVERAGE ENERGY CONSUMPTION.

Nodes/ Parametrs Z1 Sky

No. of Nodes 8 16 8 16 Tx Energy 0.168 0.437 0.064 0.156 Rx Energy 0.473 1.133 0.410 0.602 LPM Energy 0.162 0.159 0.153 0.151 CPU Energy 0.046 0.135 0.361 0.364 Avg. Energy Consumption 0.849 1.864 0.987 1.306

TX is a transmit energy, refers to the energy needed by the sensor to send the data packet to its neighboring. In the scenario A, the average energy consumption of the values of Tx, Rx, LPM, and CPU of each a sensor node, including the sink node, was reduced by 1.015 mW.

Throughput

The throughput of the IIoT system was measured as that formed in figure 4a, figure 4b, figure 4c, and figure 4d with experimental evaluation, and two scenarios can be modeled in this experiment under specific duration time, that as represented in Table 3.

TABLE 3:THROUGHPUT.

Nodes/Parameters No. of Nodes Throughput

Z1 8 49 Packets

16 30 Packets

Sky 8 202 Packets

16 161 packets

Network Delay

Table 4 illustrates the various values for the packet delay of the IIoT nodes in two simulation scenarios (in NanoSecond).

TABLE 4: THE PACKET DELAY.

Nodes/Par ameters

No. of

Nodes Packet Delay

Z1 8 10094 NanoSecond

16 15196 NanoSecond

Sky 8 2880 NanoSecond

16 12013 NanoSecond

Simulation Results and Discussion

After measuring energy consumption, throughput, and packet delay of the IIoT network in two scenarios were illustrated in figure 3, figure 4, and figure 5.

In these simulations, all these nodes were periodically sent data to the destination node. Energy Consumption

The energy usage measurement with the Cooja simulator was based upon four parameters: CPU Power, LPM Power, Listening Power, and Transmit Power. The results of the sizes of the parameters of the node are provided by Figure 3a and Figure 3b (Scenario A) and Figure 3c to Figure 3d (Scenario B), respectively.

Based on that tests of the node parameters (Sensors) (Figure 3a and figure 3b), therefore there is a significant difference of values of an average

(7)

13 energy consumption between scenario A and scenario B, in which the values in scenario A is 0.849 mW and scenario B is 1.864 mW (Z1).

(a)

(b)

(c)

(d)

Figure 3: Energy Consumption by (a) 8 Z1 (b) 16 Z1, (c) 8 Sky, (d) 16 Sky.

In addition to the costs of the average energy consumption with Sky mote in two scenarios are 0.987mW and 1.306 mW, as illustrated in Figure 3c and figure 3d. Figure 3a shows an average power consumption for all these nodes. Among all these parameters, CPU is the most energy-efficient. This is due to that CPU consumes the least amount of energy in its active and sleep modes.

Figure 3b shows an average power consumed by 16 nodes of Z1. As observed the Rx parameter is more energy consumption than other parameters. Figure 3c shows an average of power consumed by eight nodes of Sky, through these parameters, the Tx is more energy conservation, and still, it consumes only about 0.064 mW. Figure 3d shows an average of power consumed by 16 nodes of Sky. In this case, the Rx has got a higher power consumption. Throughput

Throughput is measured by continuously sending data packets from peripheral nodes to the base station. The number of successfully transmitted packets is recorded without losing data. The measurement of performance in this work can be presented as the following figures. In these experiments, the throughputs were measured, and the duration of time is kept at 30 minutes.

(a)

(8)

14 (c)

(d)

Figure 4: Throughput of (a) 8 Z1, (b) 16 Z1, (c) 8 Sky, (d) 16 Sky.

Four independent tests were done using different types of sensor nodes. Figure 4a, figure 4b, figure 4c, and figure 4d are depicted the variation of the throughputs for different packets were received by the sink node. Figure 4a, figure 4b, figure 4c, and figure 4d show the new scheme that has a much higher throughput than that represented in scenario B. Figure 4a shows the throughput of 8 nodes of Z1. Packet Latency Time

Packet latency time is computed according to the elapsed time between the frame generation from a given node and its reception by the router. The plots provided by Figure 5a to Figure 5d are illustrated the delay times for transmitting packets in two scenarios.

The proposed protocol gives an optimal packet delay time, which is equal to the value of 10094 Nanosecond. However, all experiments can observe that the delays are approaching to zero seconds, as formed in the following figures. Figure 5a shows the packet delay of eight nodes of Z1.

From the four figure 5a, figure 5b, figure 5c, and figure 5d it is clear that our proposed scheme outperforms the scenario B. This is due mainly to the fact that the scenario B has a much higher delay as scenario A. The threshold factor of the acceptable limits for these parameters is not definite and is a trade-off between energy consumption and performance.

(a)

(b)

(c)

(d)

Figure 5: Packet Delay of (a) 8 Z1, (b)16 Z1, (c) 8 Sky, (d)16 Sky.

As observed, the testbed was installed based on the Cooja simulator, where the different scenarios also are deployed. Energy consumption for different experiments was measured according to that demonstrated in Table 2. Various parameters, such as CPU, LPM, Tx, and Rx, are taken into account.

(9)

15 The energy consumption by Z1 in scenario A was compared to the energy consumption in scenario B. Figure 3a to Figure 3b illustrated that the proposed protocol significantly reduces energy consumption in an industrial network, increases throughput as formed in figure 4a and figure 4b, and decreases the network latency (Table 4).

Moreover, there are different experiments were conducted, analyzed, and then evaluated the performance of Z1 and Sky motes as a popular sensor platform for IIoT applications. The results of energy consumption for Sky mote are given separately in Figure 3c, due to the comparatively significant difference from Z1. From Figure 3a and Figure 3c, Sky mote is more consumed energy in scenario A compared with Z1. For all scenarios, the CPU and Rx are significantly larger energy consumption.

On the other hand, Z1 is using less energy on the CPU state. Our measurements confirm that Z1 achieves the best energy efficiency. RX scenarios

of Z1 use noticeably more power since they have to send ACK messages and receive packets. Regarding scenario B, as shown in Figure 3b and figure 3d. Overall, the energy consumption of Z1 is much higher than that of Sky mote.

This can be explained by the high listen to the platform and active CPU energy from Sky mote, which required optimizing the behavior of its microcontroller, either in hardware or software platforms. For all, the measurements show slightly higher energy consumption for RX scenarios, due to

higher CPU utilization. On the other aspect, the CPU energy consumption of Sky mote is higher than that of Z1 in the same scenario.

For all three parameters, the energy consumption minimized with the reduced number of nodes, because the number of sensors connected to the sensor board is reduced. The proposed protocol that is applied in scenario A has the highest throughput as compared to scenario B as represented in Figure 4a, figure 4b, figure 4c, and figure 4d due to the hops count of the network, which increases the packet delay. As shown in Table 4, the proposed protocol also obtained less packet delay. From the above figures can be observed. The sky is less delay time than that in the Z1 mote (scenario A). However, in scenario B, the Sky is higher delay time due to having retransmission and number of hops.

Most of the energy is spent listening, and more fine-tuning of CPU could further reduce the throughput

and decrease the network delay. Several mechanisms for saving energy are yet to be defined, and many existing techniques are to be revised in literature. They focus on analyzing energy aspects of specific MAC protocol in terms of packet reception, packet loss, idle, and wakeup. The CAP reduction MAC protocol has very high chances to widely apply in industrial applications due to having various advantages over many other existing techniques.

6. Conclusion and Future Work

One of the most critical issues of the IIoT system is power consumption. To reducing energy dissipation and improve performance, this paper proposed a new MAC protocol to enhance the performance of IIoT systems based on the superframes of the IEEE 802.15.4e MAC standard. Simulation testbed using commercially available Sky and Z1Motes with Contiki 2.7 was designed for evaluating the performance of the proposed scheme.

Validation of the proposed protocol by using the Cooja simulator testbed shows that the proposed scheme gives an average reduction in power consumption compared to IEEE 802.15.4e. As observed that the proposed scheme achieves average delay reduction. Moreover, it is obtained high throughput. Two types of smart sensors were compared based on different simulations.

Also, this works presented two scenarios focusing on various properties of IIoT systems, we have investigated the behavior of the IIoT sensors and contribute to the development of better solutions in this domain. The proposed protocol can significantly assist in the development of optimization techniques to improve the IIoT networks operational efficiency. Future Work aimed to investigate the performance of the proposed mechanism in the real testbed.

References

[1] Liao, Y., Loures, E.D.F.R., and Deschamps, F., (2018) “Industrial Internet of Things: A systematic literature review and insights”. IEEE Internet of Things Journal, 5(6), 4515-4525.

[2] Boccadoro, P., Barile, M., Piro, G. and Grieco, L.A., (2016), September”Energy consumption analysis of TSCH-enabled platforms for the Industrial-IoT” . In 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI), 1-5.

[3] Shrouf, F., Ordieres, J. and Miragliotta, G., (2014), “Smart factories in Industry 4.0: A review of the concept and of energy management approached in production

(10)

16

based on the Internet of Things paradigm”. In 2014 IEEE international conference on industrial engineering and engineering management , 697-701.

[4] Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A. and Kikiras, P., (2015) “On the security and privacy of Internet of Things architectures and systems”. In 2015 International Workshop on Secure Internet of Things (SIoT), 49-57.

[5] Rio R, (2015) “Optimize Asset Performance with Industrial IoT and Analytics”, Dedham, MA 02026 USA, 1 - 6.

[6] Bloom, G., Alsulami, B., Nwafor, E. and Bertolotti, I.C., (2018) “ Design patterns for the industrial Internet of Things”. In 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), 1-10. [7] Wang, S., Wan, J., Li, D. and Zhang, C., (2016) “Implementing smart factory of Industrie 4.0: an outlook. International Journal of Distributed Sensor Networks”, 12(1), 1-10.

[8] Hahm, O., Baccelli, E., Petersen, H. and Tsiftes, N., (2016) “Operating systems for low-end devices in the internet of things: a survey”. IEEE Internet of Things Journal, 3(5), 720-734.

[9] El Ksimi, A., Leghris, C. and Khoukhi, F. (2016) “ Minimizing energy consumption in IPv6 for Small Objects Network”. IEEE, In 5th International Conference on Multimedia Computing and Systems (ICMCS), 332-336.

[10] Jianming C., Yan X., (2010) “The Study of Superframe duration scheduling with coordinator grouping for Zigbee Cluster-Tree WSNs”, IEEE. Computer Society, 748-752.

[11] Sahoo, P., Pattanaik, S. and Wu, S.L., (2017) “A reliable data transmission model for the IEEE 802.15. 4e enabled wireless sensor network under wifi interference. Sensors”, 17( 6), 1-18.

[12] IEEE std. 802.15.4e, Part. 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendament 1: MAC sublayer, (2012), IEEE Computer Society, 1-225. [13] Jeong, W.C. and Lee, J., (2012) “Performance evaluation of IEEE 802.15. 4e DSME MAC protocol for wireless sensor networks”. In 2012 The First IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things (ETSIoT), 7-12.

[14] Choudhury, N., Matam, R., Mukherjee, M. and Shu, L., (2018) “Beacon synchronization and duty-cycling in IEEE 802.15. 4 cluster-tree networks: A review”. IEEE internet of things journal, 5(3), 1765-1788.

[15] Mavromatis, A., Papadopoulos, G.Z., Fafoutis, X., Elsts, A., Oikonomou, G. and Tryfonas, T., (2016) “Impact of guard time length on IEEE 802.15. 4e TSCH energy consumption”. In 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), 1-3.

[16] Capone, S., Brama, R., Ricciato, F., Boggia, G. and Malvasi, A., (2014) “Modeling and simulation of energy-efficient enhancements for IEEE 802.15. 4e

DSME”. In Wireless Telecommunications Symposium (WTS), 1-6.

[17] Nikoukar A., Raza S., Poole A., Mesut Günes M, Dezfouli B, (2018) “Low-Power Wireless for the Internet of Things: Standards and Applications”, IEEE. Translations, 67893-67926.

[18] Ma G., Shen C, and Chen B., (2012) “A Node-Grouping Superframe-Division MAC Protocol for Smart Home Based on IEEE802.15.4 Protocol, Social Informatics and Telecommunications Engineering”, 125–136.

[19] Koubâa, A., Severino, R., Alves, M. and Tovar, E., (2009) “Improving quality-of-service in wireless sensor networks by mitigating hidden-node collisions”. IEEE Transactions on Industrial Informatics, 5(3) , 299-313. [20] El Gholami, K., Hou, K.M. and Elkamoun, N., (2012) “Enhanced superframe structure of the IEEE802. 15.4 standard for real-time data transmission in the star network”. International Journal of Computer Applications, 51(15), 26-32.

[21] Nikoukar A., Raza S., Poole A., Günes M., Dezfouli B., (2018) “Low-Power Wireless for the Internet of Things: Standards and Applications”, IEEE. Translations, 67893-67926.

[22] Seo, Y.S., Kim, D.Y. and Cho, J., (2010). A dynamic CFP allocation and opportunity contention-based WBAN MAC protocol. IEICE transactions on communications, 93 (4), 850-853.

[23] Aijaz, A. and Aghvami, A.H., (2015) “Cognitive machine-to-machine communications for Internet-of-Things: A protocol stack perspective”. IEEE Internet of Things Journal, 2(2), 103-112.

[24] Guglielmo, D., Al Nahas, B., Duquennoy, S., Voigt, T. and Anastasi, G., (2016) “Analysis and experimental evaluation of IEEE 802.15. 4e TSCH CSMA-CA algorithm”. IEEE Transactions on Vehicular Technology, 66(2), 1573-1588.

[25] Bitencort, F. Vasques, and P. Portugal, R. Moraes, (2016) “SAS: Slot Allocation Scheme for the IEEE 802.15.4e LLDN mode”, IEEE , 4713- 4718.

[26] Juc, I., Alphand, O., Guizzetti, R., Favre, M. and Duda, A., (2016) “Energy Consumption and Performance of IEEE 802.15. 4e TSCH and DSME”. In 2016 IEEE Wireless Communications and Networking Conference, 1-7.

[27] Chang, T., Tuset-Peiro, P., Vilajosana, X. and Watteyne, T., (2016) “OpenWSN & OpenMote: Demo'ing a complete ecosystem for the industrial internet of things”. In 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), 1-3.

[28] Minet, P., Khoufi, I. and Laouiti, A., (2017) “Increasing reliability of a TSCH network for the industry 4.0”. In 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), 1-10.

[29] Vilajosana, X., Wang, Q., Chraim, F., Watteyne, T., Chang, T. and Pister, K.S., (2013) “ A realistic energy

(11)

17

consumption model for TSCH networks”. IEEE Sensors Journal, 14( 2), 482-489.

[30] Chen, S., Sun, T., Yuan, J., Geng, X., Li, C., Ullah, S. and Abdullah Alnuem, M., (2013) “Performance Analysis of IEEE 802.15. 4e Time Slotted Channel Hopping for Low-Rate Wireless Networks”. KSII Transactions on Internet & Information Systems, 7(1), 1-21.

[31] Dhondge, K., Shorey, R. and Tew, J., (2016) “ Hola: Heuristic and opportunistic link selection algorithm for energy efficiency in industrial internet of things (iiot) systems”. IEEE, 8th international conference on communication systems and networks (COMSNETS), 1-6.

[32] Sahoo, P., Pattanaik, S. and Wu, S.L., (2017) “A novel IEEE 802.15. 4e DSME MAC for wireless sensor networks. Sensors”, 17(1), 1-25.

[33] Kurunathan, H., Severino, R., Koubâa, A. and Tovar, E., (2018) “An Efficient Approach to Multisuperframe tuning for DSME networks”.

ACM/IEEE International Conference on Information Processing in Sensor Networks, pp. 162-163.

[34] Sahoo, P., Pattanaik, S. and Wu, S.L., (2017). Design and analysis of a low latency deterministic network MAC for wireless sensor networks. Sensors, 17(10), 1-24.

[35] Bhosale V., and Ladhe S., (2018) “Survey on Beacon-Enabled IEEE 802.15.4 MAC Mechanisms”, International Journal of Applied Engineering Research, 13( 6), 3725-3737.

[36] Salayma M., Mardini W., Khamayseh Y., and Yasin B. M., (2013) “Optimal Beacon and Superframe Orders in WSNs FUTURE COMPUTING”, The Fifth International Conference on Future Computational Technologies and Applications, 49-55.

[37] Mehmood, T., (2017) “Cooja network simulator: Exploring the infinite possible ways to compute the performance metrics of iot based smart devices to understand the working of iot based compression & routing protocols”. arXiv preprint arXiv 1712.08303, 1-7.

References

Related documents

In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data

There are infinitely many principles of justice (conclusion). 24 “These, Socrates, said Parmenides, are a few, and only a few of the difficulties in which we are involved if

First, we estimated a model of the Chilean economy using monthly data from January 1991 to December 2000, including as endogenous variables the EMBI spread, the output gap,

Communicate with patients, families, communities, and other health professionals in a responsive and responsible manner that supports a team approach to the maintenance of health

The Nominating Committee suggests for Chairman of District IV, the name of

potential sources of support for completing the Teaching Event on a scale of 1 (not very helpful) to 5 (very helpful), including other credential candidates, university

security interest in the current year's Crop(s) and proceeds therefrom and in the production insurance payments and Business Risk Management Program payments (the “Security”) of

Recognition and elaboration of cross-sections and structural schemes of zones with folds and associated foliations. - Second day: Puig Culip