-
BlueFlood: Concurrent Transmissions for Multi-Hop Bluetooth 5 -- Modeling and Evaluation
Authors:
Beshr Al Nahas,
Antonio Escobar-Molero,
Jirka Klaue,
Simon Duquennoy,
Olaf Landsiedel
Abstract:
Bluetooth is an omnipresent technology, available on billions of devices today. While it has been traditionally limited to peer-to-peer communication and star networks, the recent Bluetooth Mesh standard extends it to multi-hop networking. In addition, the Bluetooth 5 standard introduces new modes to allow for increased reliability. In this paper, we evaluate the feasibility of concurrent transmis…
▽ More
Bluetooth is an omnipresent technology, available on billions of devices today. While it has been traditionally limited to peer-to-peer communication and star networks, the recent Bluetooth Mesh standard extends it to multi-hop networking. In addition, the Bluetooth 5 standard introduces new modes to allow for increased reliability. In this paper, we evaluate the feasibility of concurrent transmissions (CT) in Bluetooth via modeling and controlled experiments and then devise an efficient network-wide data dissemination protocol, BlueFlood, based on CT for multi-hop Bluetooth networks.
First, we model and analyze how CT distorts the received waveform and characterize the Bit Error Rate of a Frequency-Shift Keying receiver to show that CT is feasible over Bluetooth. Second, we verify our analytic results with a controlled experimental study of CT over Bluetooth PHY. Third, we present BlueFlood, a fast and efficient network-wide data dissemination in multi-hop Bluetooth networks.
In our experimental evaluation, in two testbeds deployed in university buildings, we show that BlueFlood achieves 99.9% end-to-end delivery ratio with a duty-cycle of 0.4% for periodic dissemination of advertising packets of 38 bytes with 200 milliseconds intervals at 2 Mbps. Moreover, we show that BlueFlood can be received by off-the-shelf devices such as smartphones, paving a seamless integration with existing technologies.
△ Less
Submitted 24 April, 2021; v1 submitted 28 February, 2020;
originally announced February 2020.
-
Five-Nines Reliable Downward Routing in RPL
Authors:
Simon Duquennoy,
Joakim Eriksson,
Thiemo Voigt
Abstract:
After a decade of research in low-power data collection, reaching arbitrary nodes has received comparatively little attention. The leading protocol for low-power IPv6 routing, RPL, is no exception, as it is often studied in multipoint-to-point scenarios. As a result, downward routing (from root to node) is still notoriously difficult, holding back the emergence of Internet of Things applications t…
▽ More
After a decade of research in low-power data collection, reaching arbitrary nodes has received comparatively little attention. The leading protocol for low-power IPv6 routing, RPL, is no exception, as it is often studied in multipoint-to-point scenarios. As a result, downward routing (from root to node) is still notoriously difficult, holding back the emergence of Internet of Things applications that involve actuation. In this paper, we focus on achieving industrial-grade reliability levels (1e-5 failure rate) in downward routing with RPL. We make every packet count, and classify the different causes of packet loss. We show how to mitigate each source of packet loss, by (1) introducing a gradient metric that favors reliable links, (2) increasing neighborhood awareness for accurate link selection, and (3) ensuring a robust routing state maintenance and packet forwarding. We demonstrate RPL downward routing with loss rates in the order of 1e-5 in four different testbeds up to 352 nodes, in both sparse and dense settings. We also validate our solution on top of a low-power TSCH scheduler, and achieve sub-percent low duty cycles and a channel utilization of 0.07% at every node, spread over 16 channels.
△ Less
Submitted 6 October, 2017;
originally announced October 2017.
-
Towards Blockchain-based Auditable Storage and Sharing of IoT Data
Authors:
Hossein Shafagh,
Lukas Burkhalter,
Anwar Hithnawi,
Simon Duquennoy
Abstract:
Today the cloud plays a central role in storing, processing, and distributing data. Despite contributing to the rapid development of IoT applications, the current IoT cloud-centric architecture has led into a myriad of isolated data silos that hinders the full potential of holistic data-driven analytics within the IoT. In this paper, we present a blockchain-based design for the IoT that brings a d…
▽ More
Today the cloud plays a central role in storing, processing, and distributing data. Despite contributing to the rapid development of IoT applications, the current IoT cloud-centric architecture has led into a myriad of isolated data silos that hinders the full potential of holistic data-driven analytics within the IoT. In this paper, we present a blockchain-based design for the IoT that brings a distributed access control and data management. We depart from the current trust model that delegates access control of our data to a centralized trusted authority and instead empower the users with data ownership. Our design is tailored for IoT data streams and enables secure data sharing. We enable a secure and resilient access control management, by utilizing the blockchain as an auditable and distributed access control layer to the storage layer. We facilitate the storage of time-series IoT data at the edge of the network via a locality-aware decentralized storage system that is managed with the blockchain technology. Our system is agnostic of the physical storage nodes and supports as well utilization of cloud storage resources as storage nodes.
△ Less
Submitted 14 November, 2017; v1 submitted 22 May, 2017;
originally announced May 2017.