Comparison of Wireless Technologies Used in a Smart Home

Total Page:16

File Type:pdf, Size:1020Kb

Comparison of Wireless Technologies Used in a Smart Home Master of Science in Electrical Engineering with emphasis on Telecommunication Systems June 2017 Comparison of Wireless Communication Technologies used in a Smart Home: Analysis of wireless sensor node based on Arduino in home automation scenario Oleh Horyachyy Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden This thesis is submitted to the Faculty of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Electrical Engineering with emphasis on Telecommunication Systems. The thesis is equivalent to 20 weeks of full time studies. Contact Information: Author(s): Oleh Horyachyy E-mail: [email protected] University advisor: Prof. Kurt Tutschku Department of Computer Science and Engineering Faculty of Computing Internet : www.bth.se Blekinge Institute of Technology Phone : +46 455 38 50 00 SE-371 79 Karlskrona, Sweden Fax : +46 455 38 50 57 __________________________________________________________________________________ Abstract Context. Internet of Things (IoT) is an extension of the Internet, which now includes physical objects of the real world. The main purpose of Internet of Things is to increase a quality of people’s daily life. A smart home is one of the promising areas in the Internet of Things which increases rapidly. It allows users to control their home devices anytime from any location in the world using Internet connectivity and automate their work based on the physical environment conditions and user preferences. The main issues in deploying the architecture of IoT are the security of the communication between constrained low-power devices in the home network and device performance. Battery lifetime is a key QoS parameter of a battery-powered IoT device which limits the level of security and affects the performance of the communication. These issues have been deepened with the spread of cheap and easy to use microcontrollers which are used by electronic enthusiasts to build their own home automation projects. Objectives. In this study, we investigated wireless communication technologies used in low-power and low-bandwidth home area networks to determine which of them are most suitable for smart home applications. We also investigated the correlation between security, power consumption of constrained IoT device, and performance of wireless communication based on a model of a home automation system with a sensor node. Sensor node was implemented using Arduino Nano microcontroller and RF 433 MHz wireless communication module. Methods. To achieve the stated objectives of this research following methods were chosen: literature review to define common applications and communication technologies used in a smart home scenario and their requirements, comparison of wireless communication technologies in smart home, study of Arduino microcontroller technology, design and simulation of a part of home automation project based on Arduino, experimental measurements of execution time and power consumption of Arduino microcontroller with RF 433 MHz wireless module when transmitting data with different levels of security, and analysis of experimental results. Results. In this research, we presented a detailed comparison of ZigBee, WiFi, Bluetooth, Z-Wave, and ANT communication technologies used in a smart home in terms of the main characteristics. Furthermore, we considered performance, power consumption, and security. A model of a home automation system with a sensor node based on Arduino Nano was described with sleep management and performance evaluation. The results show that the battery lifetime of Arduino in a battery-powered sensor node scenario is determined by the communication speed, sleep management, and affected by encryption. Conclusions. The advanced communication strategy can be used to minimize the power consumption of the device and increase the efficiency of the communication. In that case, our security measures will reduce the productivity and lifetime of the sensor node not significantly. It’s also possible to use symmetric encryption with smaller block size. Keywords: Arduino microcontroller, home automation system, Internet of Things, power consumption __________________________________________________________________________________ Acknowledgements I would like to express my heartfelt gratitude to my supervisor Prof. Dr. Kurt Tutschku for the guidance, patience and continuous support throughout my thesis. I would like to extend my sincerest thanks and appreciation to Anders Carlsson for his continuous support, constant and timely advice and assistance. It wouldn’t have been possible to finish this thesis without their support, motivation, and encouragement. I would like also thank Maryna Yevdokymenko, Helen Tkachova, Stepan Voytusik, Volodymyr Sokolov, and Oksana Yevsieieva for their motivation and encouragement, pieces of advice, and useful feedback. I would like to thank my wonderful family and friends for their emotional support, prayers, and constant encouragement throughout my entire program. ii __________________________________________________________________________________ List of Figures Figure 3.1: Structure of smart home......................................................................................... 18 Figure 3.2: An example of smart home .................................................................................... 19 Figure 4.1: Low-cost RF 433 MHz modules ............................................................................ 39 Figure 4.2: Home automation model ........................................................................................ 41 Figure 5.1: Setup of experiment 2 ............................................................................................ 44 Figure 5.2: Setup of experiment 3 ............................................................................................ 45 Figure 5.3: Duty cycle and energy consumption of a battery-powered device ........................ 47 Figure 5.4: Execution time of encryption and decryption of one block of AES algorithm in Arduino ............................................................................................................................. 49 Figure 5.5: Relationship between encryption time and transmission rate of wireless module ............................................................................................................................... 49 Figure 5.6: Increasing of the encryption time for 6000 bps transmission speed ...................... 50 Figure 5.7: Comparison of transmission time for the plain text and encrypted message ........ 51 Figure 5.8: Transmission efficiency ......................................................................................... 51 Figure 5.9: Comparison of measurement results of current for different sleep modes ............ 53 Figure 5.10: Current consumption of Arduino Nano microcontroller over time using sleep mode when sending 4 bytes of data in plain text or using encryption .............................. 53 Figure 5.11: Comparison of energy consumption of Arduino Nano when sending 4 bytes of data on data rate 3000 bps using sleep mode. Considered time period equals 300 ms .... 54 Figure 5.12: Battery lifetime for 5 minutes period ................................................................... 55 Figure 5.13: Battery lifetime for a period of 300 ms depending on encryption, sleep management, and communication speed .......................................................................... 55 iii __________________________________________________________________________________ List of Tables Table 1.1: Aims and objectives of the research ......................................................................... 3 Table 3.1: Parameters of IoT devices ....................................................................................... 15 Table 3.2: Classification of IoT devices by constraints ........................................................... 16 Table 3.3: Typical IoT devices ................................................................................................. 17 Table 3.4: Comparison of wireless communication technologies ............................................ 25 Table 3.5: Recommendations for selecting wireless technology for smart home applications ....................................................................................................................... 30 Table 4.1: Mapping of aims and objectives to research questions and research methodology ..................................................................................................................... 35 Table 4.2: Comparison of different Arduino boards ................................................................ 38 Table 5.1: Cu rrent consumption during the data transmission ................................................. 52 Table 5.2: Current consumption during the sleeping at different sleep modes ........................ 52 iv __________________________________________________________________________________ List of Abbreviations 4G………… 4th Generation of mobile HTTP……... Hypertext Transfer Protocol telephony HVAC…….. Heating, Ventilation and Air 6LoWPAN... IPv6 over Low power WPAN Conditioning AC……........ Air Conditioner IDE……….. Integrated Development ACL………. Access Control List Environment ADC………. Analog-to-Digital Converter IEEE………. Institute of Electrical and AES……….. Advanced Encryption Standard Electronics
Recommended publications
  • Internet of Things Network Study
    Internet of Things Network Study By Masters in Embedded and Cyber-Physical Systems Research Advisor Dan Cregg Team members Ta-Yu Chiu Neha Sadhvi Yidi Fan Ricky Yang Contents 1.Thesis Statement 3 2. Introduction 3 3. Objectives 3 4. Equipment and Devices 3 5. Network Protocols in Study 4 6. Testing Environment 6 7. Number of devices under Test 6 8. Network Layer Frequency 6 9. Physical Layer Frequency 6 10. Test Setup 7 11. Results 8 12. Constraints 13 13. Conclusion 14 14. References 14 15. Acknowledgements 15 16. Contacts 15 1.Thesis Statement As the use of smart embedded devices grows in our daily life, current networking technologies are expected to be strained beyond their original intent. Consumers face unacceptable performance as nodes are increased and network bandwidth is consumed in physically constraining environments. Various network types and use cases, thus, are explored to determine current failure points in common IoT home smart devices. 2. Introduction At the time of this report, there has been an unprecedented uptake in the use of ‘smart’ devices in the home. The introduction of voice recognition platforms such as Google Home and Amazon Alexa has fueled the use of small, inexpensive, connected sensing and control devices. Controls for Heating and Air Conditioning have been popular, as well as various sensors for doors, windows, etc.. Perhaps the most pervasive has been the acceptance of these types of systems for lighting control. Due to the sheer number of nodes available in a home, lighting nodes to be controlled is very large. This research will focus on various types of network technologies with the goal of physically simulating small to large sets of devices to determine acceptable response time.
    [Show full text]
  • Smart Grid Communications Protocols
    Communications Overview Communications Overview the number of modems and concen- Each segment is interconnected trators needed to cover the entire through a node or gateway: a An electricity grid without adequate system can dramatically reduce infra- concentrator between the WAN and communications is simply a power structure costs. At the same time, NAN and an e-meter between the “broadcaster.” It is through the the selected technology must have NAN and HAN. Each of these nodes addition of two-way communications enough bandwidth to handle all data communicates through the network that the power grid is made “smart.” traffic being sent in both directions with adjacent nodes. The concentrator Communications enables utilities to over the grid network. aggregates the data from the achieve three key objectives: intel- meters and sends that information ligent monitoring, security, and load Communications networks to the grid operator. The e-meter balancing. Using two-way communi- and protocols collects the power-usage data of the cations, data can be collected from home or business by communicating Communications in the smart grid sensors and meters located through- with the home network gateway or can be broken into three segments. out the grid and transmitted directly functioning as the gateway itself. to the grid operator’s control room. Wide area network (WAN) covers Each segment can utilize different This added communications capabil- long-haul distances from the communications technologies and ity provides enough bandwidth for command center to local neighbor- protocols depending on the trans- the control room operator to actively hoods downstream. mission environments and amount manage the grid.
    [Show full text]
  • Wireless Home Automation Networks: a Survey of Architectures and Technologies
    GOMEZ MONTENEGRO LAYOUT 5/18/10 11:46 AM Page 92 CONSUMER COMMUNICATIONS AND NETWORKING Wireless Home Automation Networks: A Survey of Architectures and Technologies Carles Gomez and Josep Paradells, Technical University of Catalonia ABSTRACT USE CASES AND MAIN FEATURES OF Wireless home automation networks com- WHANS prise wireless embedded sensors and actuators that enable monitoring and control applications WHANs enable a variety of use cases, as illus- for home user comfort and efficient home man- trated in Fig. 1. A non-exhaustive list of exam- agement. This article surveys the main current ples is provided below and emerging solutions that are suitable for Light control: A new light can be controlled WHANs, including ZigBee, Z-Wave, INSTEON, from any switch, which reduces the need for new Wavenis, and IP-based technology. wired connections. Lights can also be activated in response to a command from a remote con- INTRODUCTION trol. Furthermore, they can be turned on auto- matically when presence and luminance sensors In recent years, wireless sensor and actuator net- detect that people are in a poorly illuminated works have gained high momentum, receiving room. significant attention from academia, industry, Remote control: Infrared technology has been and standards development organizations. One used for wireless communication between a of the primary application domains of this tech- remote control and devices such as TVs, HiFi nology is home automation. Wireless home equipment, and heating, ventilating, and air con- automation networks (WHANs) enable monitor- ditioning (HVAC) systems. However, infrared ing and control applications for home user com- requires line-of-sight (LOS) and short-distance fort and efficient home management.
    [Show full text]
  • Key Infection: Smart Trust for Smart Dust
    Key Infection: Smart Trust for Smart Dust Ross Anderson Haowen Chan Adrian Perrig University of Cambridge Carnegie Mellon University Carnegie Mellon University [email protected] [email protected] [email protected] Abstract and building safety. As sensor networks become cheaper and more commoditised, they will become attractive to Future distributed systems may include large self- home users and small businesses, and for other new appli- organizing networks of locally communicating sen- cations. sor nodes, any small number of which may be sub- A typical sensor network consists of a large number of verted by an adversary. Providing security for these small, low-cost nodes that use wireless peer-to-peer com- sensor networks is important, but the problem is compli- munication to form a self-organized network. They use cated by the fact that managing cryptographic key ma- multi-hop routing algorithms based on dynamic network terial is hard: low-cost nodes are neither tamper-proof and resource discovery protocols. To keep costs down and nor capable of performing public key cryptography effi- to deal with limited battery energy, nodes have fairly min- ciently. imal computation, communication, and storage resources. In this paper, we show how the key distribution problem They do not have tamper-proof hardware. We can thus ex- can be dealt with in environments with a partially present, pect that some small fraction of nodes in a network may be passive adversary: a node wishing to communicate securely compromised by an adversary over time. with other nodes simply generates a symmetric key and An interesting example of a sensor network technology sends it in the clear to its neighbours.
    [Show full text]
  • Wi-Fi Hotspot 500 Kit Extend Your Wi-Fi Anywhere in Your Home
    Wi-Fi Hotspot 500 Kit Extend your Wi-Fi anywhere in your home The Wi-Fi Home Hotspot 500 Kit offers high performance Homeplug powerline adaptor and a Wi-Fi Home Hotspot designed to increase the range of your broadband in the home. Wi-Fi doesn't reach? Use your home's power sockets to create a secure Wi-Fi Hotspot. Need high-speed internet all over your home? Ideal for streaming HD / 3D TV or online gaming via an ethernet cable. Want great performance and reliability? Extend your broadband to any wired or wireless device in the house. Main Features • Uses your home’s electrical wiring to extend your broadband network anywhere in the house • Simple push-button Wi-Fi connection set-up with hotspot • Works with all broadband providers • Two Ethernet ports for multiple wired devices • Link with other HomePlug AV powerline adaptors • N300 wireless technology • AV500 powerline technology • Compatible with AV200 technology devices • Up to 500 Mbps for smooth multiple HD / 3D streaming • Secure wireless network – no configuration necessary • Pass-through socket • Works out of the box Product Data Sheet – Wi-Fi Home Hotspot 500 Kit Issue: Version 1.1 Specification subject to change without prior notice Product Specification System requirements Lights • Works with any operating system • Hotspot: Wireless (Red & Green), Power, Other features Data, Ethernet 1-2 (Green) • Extender Flex: Power, Ethernet (Green) • Guest Hotspot with its own key Data (Tri-colour) • Web configuration interface • Easy pull-out wireless settings card Buttons Security • Hotspot:
    [Show full text]
  • Evaluation of Mobile Wimax and Intelligent Video for Enhanced Rail Transit Safety
    SharpRAIL: Evaluation of Mobile WiMAX and Intelligent Video for Enhanced Rail Transit Safety Report Number FTA-MD-26-7132-08.1 June 2008 DISCLAIMER NOTICE This document is disseminated under the sponsorship of the United States Department of Transportation, Federal Transit Administration, in the interest of information exchange. The United States Government assumes no liability for the contents or use thereof. The United States Government does not endorse products or manufacturers. Trade or manufacturers' names appear herein solely because they are considered essential to the contents of the report. Form Approved OMB No. 0704-0188 REPORT DOCUMENTATION PAGE Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June, 2008 Final Report, April 2007-January 2008 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS SharpRAIL: Evaluation of Mobile WiMAX and Intelligent Video for Enhanced Rail Transit Safety MD-26-7132-00 6. AUTHOR(S) Santosh Kesavan, Eddie Wu and William Toeller 8. PERFORMING ORGANIZATION 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) REPORT NUMBER VT Aepco Inc 555 Quince Orchard Road, Suite 488 Gaithersburg, MD 20878 9.
    [Show full text]
  • Shared Sensor Networks Fundamentals, Challenges, Opportunities, Virtualization Techniques, Comparative Analysis, Novel Architecture and Taxonomy
    Journal of Sensor and Actuator Networks Review Shared Sensor Networks Fundamentals, Challenges, Opportunities, Virtualization Techniques, Comparative Analysis, Novel Architecture and Taxonomy Nahla S. Abdel Azeem 1, Ibrahim Tarrad 2, Anar Abdel Hady 3,4, M. I. Youssef 2 and Sherine M. Abd El-kader 3,* 1 Information Technology Center, Electronics Research Institute (ERI), El Tahrir st, El Dokki, Giza 12622, Egypt; [email protected] 2 Electrical Engineering Department, Al-Azhar University, Naser City, Cairo 11651, Egypt; [email protected] (I.T.); [email protected] (M.I.Y.) 3 Computers & Systems Department, Electronics Research Institute (ERI), El Tahrir st, El Dokki, Giza 12622, Egypt; [email protected] 4 Department of Computer Science & Engineering, School of Engineering and Applied Science, Washington University in St. Louis, St. Louis, MO 63130, 1045, USA; [email protected] * Correspondence: [email protected] Received: 19 March 2019; Accepted: 7 May 2019; Published: 15 May 2019 Abstract: The rabid growth of today’s technological world has led us to connecting every electronic device worldwide together, which guides us towards the Internet of Things (IoT). Gathering the produced information based on a very tiny sensing devices under the umbrella of Wireless Sensor Networks (WSNs). The nature of these networks suffers from missing sharing among them in both hardware and software, which causes redundancy and more budget to be used. Thus, the appearance of Shared Sensor Networks (SSNs) provides a real modern revolution in it. Where it targets making a real change in its nature from domain specific networks to concurrent running domain networks. That happens by merging it with the technology of virtualization that enables the sharing feature over different levels of its hardware and software to provide the optimal utilization of the deployed infrastructure with a reduced cost.
    [Show full text]
  • An Analysis of IEEE 802.16 and Wimax Multicast Delivery
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2007-09 An analysis of IEEE 802.16 and WiMAX multicast delivery Staub, Patrick A. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/3203 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS AN ANALYSIS OF IEEE 802.16 AND WIMAX MULTICAST DELIVERY by Patrick A. Staub September, 2007 Thesis Advisor: Bert Lundy Second Reader: George Dinolt Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED September 2007 Master’s Thesis 4. TITLE AND SUBTITLE An Analysis of IEEE 802.16 and WiMAX 5. FUNDING NUMBERS Multicast Delivery 6. AUTHOR(S) Patrick A. Staub 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks
    1 Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH Networks ∗ XIA CHENG, JUNYANG SHI, and MO SHA , State University of New York at Binghamton, USA Industrial networks typically connect hundreds or thousands of sensors and actuators in industrial facilities, such as manufacturing plants, steel mills, and oil refineries. Although the typical industrial Internet of Things (IoT) applications operate at low data rates, they pose unique challenges because of their critical demands for reliable and real-time communication in harsh industrial environments. IEEE 802.15.4-based wireless sensor-actuator networks (WSANs) technology is appealing for use to construct industrial networks because it does not require wired infrastructure and can be manufactured inexpensively. Battery-powered wireless modules easily and inexpensively retrofit existing sensors and actuators in industrial facilities without running cables for communication and power. To address the stringent real-time and reliability requirements, WSANs made a set of unique design choices such as employing the Time-Synchronized Channel Hopping (TSCH) technology. These designs distinguish WSANs from traditional wireless sensor networks (WSNs) that require only best effort services. The function-based channel hopping used in TSCH simplifies the network operations at the cost of security. Our study shows that an attacker can reverse engineer the channel hopping sequences and graph routes by silently observing the transmission activities and put the network in danger of selective jamming attacks. The cracked knowledge on the channel hopping sequences and graph routes is an important prerequisite for launching selective jamming attacks to TSCH networks. To our knowledge, this paper represents the first systematic study that investigates the security vulnerability of TSCH channel hopping and graph routing under realistic settings.
    [Show full text]
  • 25 Years of Bluetooth Technology
    future internet Article 25 Years of Bluetooth Technology Sherali Zeadally 1,*, Farhan Siddiqui 2 and Zubair Baig 3 1 College of Communication and Information, University of Kentucky, Lexington, KY, 40506, USA 2 Department of Mathematics and Computer Science, Dickinson College, Carlisle, PA 17013, USA 3 School of Information Technology, Deakin University, Geelong 3216, Victoria, Australia * Correspondence: [email protected] Received: 12 August 2019; Accepted: 2 September 2019; Published: 9 September 2019 Abstract: Bluetooth technology started off as a wireless, short-range cable replacement technology but it has undergone significant developments over the last two decades. Bluetooth radios are currently embedded in almost all computing devices including personal computers, smart phones, smart watches, and even micro-controllers. For many of us, Bluetooth is an essential technology that we use every day. We provide an insight into the history of Bluetooth and its significant design developments over the last 25 years. We also discuss related issues (including security) and Bluetooth as a driving technology for the Internet of Things (IoT). Finally, we also present recent research results obtained with Bluetooth technology in various application areas. Keywords: bluetooth; internet of things; low-energy; mesh; networking; protocol; security 1. Introduction The Bluetooth radio technology was developed by L. M. Ericsson in 1994. The standard is named after the King of Denmark, Harald Blaatand (“Bluetooth”). Major mobile phone manufacturers and technology providers comprising IBM, Nokia, Intel, Ericsson, and Toshiba created the Bluetooth Special Interest Group (SIG). The aim of the group was to invent an open specification for wireless technologies of short range. Bluetooth SIG continues to oversee the Bluetooth technology today.
    [Show full text]
  • Components Selection Guide for Bluetooth® Low Energy
    Application Guide Components Selection Guide for Bluetooth® Low Energy Optimize designs, reduce time to market Ceramic Capacitors RF Inductors Power Inductors Timing Devices Bluetooth® Low Energy (BLE) is the next generation Bluetooth® release since version 4.0. Its low power consumption feature makes the BLE a popular choice across many applications. Knowledge of selecting the appropriate peripheral components greatly reduces design time and improves efficiency. System on Chip Power Inductor Battery DC/DC Antenna (Li/Coin Battery) Converter Wireless Ceramic Processor Communication Capacitor Memory (2.4GHz) RF Inductor Timing Devices Sensor Block diagram / Peripheral components Market / applications • IoT devices: Beacon, sensing device with wireless communication • Healthcare: Medical IoT devices, insulin pen, continuous glucose monitoring (CGM), medical tester, portable and personal devices • Industrial: Factory automation (FA), item tracking, monitoring Content Ceramic capacitors .................................. 3 Crystal units ............................................... 7 Ceramic capacitors .................................. 4 MEMS resonators ..................................... 8 RF inductors ............................................... 5 Design tools ................................................ 9 Power inductors ........................................ 6 Global locations ..................................... 10 2 Contents are subject to change without notice. © November 2020 Murata Manufacturing Co., Ltd. • BLE Component
    [Show full text]
  • Industrial Iot Monitoring: Technologies and Architecture Proposal
    sensors Article Industrial IoT Monitoring: Technologies and Architecture Proposal Duarte Raposo 1,* , André Rodrigues 1,2 , Soraya Sinche 1,3 , Jorge Sá Silva 1 and Fernando Boavida 1 1 Centre of Informatics and Systems of the University of Coimbra, Coimbra 3030-290, Portugal; [email protected] (A.R.); [email protected] (S.S.); [email protected] (J.S.S.); [email protected] (F.B.) 2 Polytechnic Institute of Coimbra, ISCAC, Coimbra 3040-316, Portugal 3 DETRI, Escuela Politécnica Nacional, Quito 170517, Ecuador * Correspondence: [email protected]; Tel.: +351-239-790-000 Received: 12 September 2018; Accepted: 16 October 2018; Published: 21 October 2018 Abstract: Dependability and standardization are essential to the adoption of Wireless Sensor Networks (WSN) in industrial applications. Standards such as ZigBee, WirelessHART, ISA100.11a and WIA-PA are, nowadays, at the basis of the main process-automation technologies. However, despite the success of these standards, management of WSNs is still an open topic, which clearly is an obstacle to dependability. Existing diagnostic tools are mostly application- or problem-specific, and do not support standard-based multi-network monitoring. This paper proposes a WSN monitoring architecture for process-automation technologies that addresses the mentioned limitations. Specifically, the architecture has low impact on sensor node resources, uses network metrics already available in industrial standards, and takes advantage of widely used management standards to share the monitoring information. The proposed architecture was validated through prototyping, and the obtained performance results are presented and discussed in the final part of the paper. In addition to proposing a monitoring architecture, the paper provides an in-depth insight into metrics, techniques, management protocols, and standards applicable to industrial WSNs.
    [Show full text]