View
7
Download
0
Category
Preview:
Citation preview
Department of Telecommunications
Telecom Engineering Center Khurshid Lal Bhavan, Janpath, New Delhi - 110011
Study Paper on IPv6 for Adhoc Networks
[Sensor N/w & RFID]
R. Saji Kumar Director, J.M.Suri DDG, I Division, Telecom Engineering Center, Department of
Telecommunications, New Delhi.
Abstract:
Till now connected devices did not become very popular because of the limitations of
connectivity, device identification/monitoring capabilities and IP address limitations. Various
protocols and standards developed for Wireless sensor networks, Active RFID based
identifications and IPv6 for low power devices has enabled millions of devices to start
communicating over the IP world.
The different standards which came up in this area include ITU-T X.1311 for Sensor Networks,
Sensor interface standards based on IEEE 1451, Wireless Interface Protocols like Wi-Fi, Bluetooth
& Zigbee and 6LoWPAN based on IEEE 802.15.4. The main objective is to discuss in detail about
the IEEE 1451 and 6LoWPAN standards.
Many devices have been developed based on these interface standards which has opened the
way for Machine to Machine Communications and immense possibilities in the new era of the
Internet of Things.
Key words:
Wireless Networks, Infrastructure Mode, Adhoc Mode, Wireless Sensor Networks, RFID
Networks, Wi-Fi, Bluetooth, Zigbee, IEEE 1451, 6LoWPAN, Machine to Machine Communications,
Internet of Things
1. Introduction:
With the increase in popularity of internet and IP, devices are also becoming IP enabled. The major
challenges for moving to an era of connected devices are connectivity, sensor technologies, device
identification and addressing. Wireless is becoming a de facto connectivity method because of the
easiness of connectivity and mobility. Sensor technologies have also advanced by integrating IP and
Wireless features. Device identification could be achieved through RFID techniques. Having a huge
address space required to be provided to each and every device, IPv6 is giving a boost to this area.
This has given rise to a new area of machine to machine communication and internet of things
which are possible through the IP enabled devices. This paper is an attempt to address these issues
by explaining the concepts and underlying standards.
A block schematic of various techniques involved is given below.
Approaching Era of connected devices …..
Major Requirements for
Connectivity
Wired Wireless
Infrastructure Adhoc
Wireless Adhoc
Sensor Networks
Wireless Mesh
Networks
Mobile Adhoc
Networks
Sensors
Wired
Ubiquitous
Wireless Networks are categorized as those working in the Infrastructure mode and those in Adhoc
mode. Infrastructure mode devices communicate to a master device like the base station
point. Hence direct line of sight connectivity with the base station is a must.
devices can communicate among themselves
all devices with the base station or access point or the Gateway
the devices increase but there is no need
Wireless Sensor Network is a major application area of the wireless adhoc networks.
Two major protocols used are IEEE 1
wireless sensor networks and 6Lo
sensor networks to communicate over IPv6, as the protocol is simple and having low throughput
because of the reduced header size. The Architecture describe
and 6LoWPAN is given below.
Machine to Machine Communication [M2M]
communicate directly like remote temperature monitoring etc. IP and wireless technologies have
been adopted in the M2M communications. However with the popularization of Internet and the
Approaching Era of connected devices …..
Major Requirements for
Connected Devices
Identification Addressing
RFID
Semi-
Passive
Passive
Active
IPv4 IPv6
Wireless Adhoc
Sensor Networks
Applications on
Low Throughput
Simple
Standard
Version
Sensors
Wireless
Ubiquitous Adhoc
are categorized as those working in the Infrastructure mode and those in Adhoc
mode. Infrastructure mode devices communicate to a master device like the base station
. Hence direct line of sight connectivity with the base station is a must. In adhoc mode, the
devices can communicate among themselves and hence there is no need for direct line of sight for
all devices with the base station or access point or the Gateway. In adhoc mode the complexity of
the devices increase but there is no need for ensuring direct line of sight with the base station.
Wireless Sensor Network is a major application area of the wireless adhoc networks.
IEEE 1451 which describes about the application of Active RFID in
and 6LoWPAN based on IEEE 802.15.4. 6LoWPAN enabled the wireless
sensor networks to communicate over IPv6, as the protocol is simple and having low throughput
because of the reduced header size. The Architecture described in this paper based in IE
Machine to Machine Communication [M2M] relates to the technologies that allow devices to
communicate directly like remote temperature monitoring etc. IP and wireless technologies have
been adopted in the M2M communications. However with the popularization of Internet and the
are categorized as those working in the Infrastructure mode and those in Adhoc
or access
In adhoc mode, the
and hence there is no need for direct line of sight for
In adhoc mode the complexity of
for ensuring direct line of sight with the base station.
describes about the application of Active RFID in
PAN enabled the wireless
sensor networks to communicate over IPv6, as the protocol is simple and having low throughput
d in this paper based in IEEE 1451
the technologies that allow devices to
communicate directly like remote temperature monitoring etc. IP and wireless technologies have
been adopted in the M2M communications. However with the popularization of Internet and the
sensor technologies, the scope of M2M has been widen and the technology has been adopted in all
segments of day to day life for any place, any time, anything connectivity and is named as Internet
of Things.
2. Wireless Ad-hoc Networks:
A wireless adhoc network is a decentralized type of wireless network. The network
is adhoc because it does not rely on a preexisting infrastructure, access points in managed wireless
networks. Instead, each node participates in routing by forwarding data for other nodes, and so the
determination of which nodes forward data is made dynamically based on the network
connectivity.
Wireless adhoc networks can be further classified by their application:
• Mobile adhoc networks (MANET)
• Wireless mesh networks (WMN)
• Wireless Adhoc sensor networks (WASN)
A mobile adhoc network (MANET) is a self-configuring infrastructure less network of mobile
devices connected by wireless. Each device in a MANET is free to move independently in any
direction, and will therefore change its links to other devices frequently. Each must forward traffic
unrelated to its own use, and therefore be a router.
A wireless mesh network (WMN) is a communications network made up of radio nodes organized
in a mesh topology. Wireless mesh networks often consist of mesh clients, mesh routers and
gateways. The mesh clients are often laptops, cell phones and other wireless devices while the
mesh routers forward traffic to and from the gateways which may, but need not, connect to the
Internet. Wireless mesh networks can be implemented with various wireless technology
including 802.11, 802.15, 802.16, cellular technologies or combinations of more than one type.
Adhoc Wireless Sensor Network is described further in this paper.
Adhoc Network Routing Protocol: Being adhoc in nature, the Adhoc networks require special
routing protocols. It is a standard that controls how nodes decide which way
to route packets between computing devices in a mobile ad hoc network. In ad-hoc networks,
nodes are not familiar with the topology of their networks. Instead, they have to discover it. The
various routing protocols used in Adhoc networks are classified as follows:
Table-driven (Pro-active) routing: This protocol maintains a list of destination addresses for
routing. [Eg. OLSR, BATMAN, DSDV, IARP, HSR, WAR etc]
Reactive (on-demand) routing: This protocol finds a route on demand by flooding the network
with Route Request packets. [AODV, DSR etc]
Flow-oriented routing: This protocol finds a route on demand by following present flows and
unicast consecutively when forwarding data for a new link. [IERP, SSR etc]
Hybrid (both pro-active and reactive) routing: This protocol combines the advantages of proactive
and of reactive routing. The routing is initially established with some proactively prospected routes
and then serves the demand from additionally activated nodes through reactive flooding. [HWMP,
ZRP etc]
Hierarchical routing: This protocol, the choice of proactive and of reactive routing depends on the
hierarchic level where a node resides. [CBRP, FSR etc]
Multicast routing: This protocol does routing by multicast of all the packets. [MRMP, LAM etc]
3. Wireless Sensor Networks:
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors
to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to
cooperatively pass their data through the network to a main location.
Each such sensor network node has typically several parts: a radio transceiver with an
internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for
interfacing with the sensors and an energy source
The topology of the WSNs can vary from a simple star network to an advanced multi-hop wireless
mesh network.
A Wireless Sensor Network [WSN] is classified into two types, the ubiquitous sensor network (USN)
and Wireless Adhoc Sensor Networks [WASN].
A Ubiquitous Sensor Network (USN) [ITU-T X.1311] consists of three parts: a sensor network
consisting of a large number of sensor nodes, a base station (also known as a gateway) interfacing
between the sensor networks and an application server, and the application server controlling the
sensor node in the sensor network or collecting the sensed information from the sensor nodes in
the sensor network.
USN can be an intelligent information infrastructure of advanced e-Life society, which delivers user-
oriented information and provides knowledge services to anyone, anytime, anywhere and wherein
information and knowledge are developed by detecting, storing, processing, and integrating the
situational and environmental information gathered from sensor tags and/or sensor nodes affixed
to anything. Since there are many security and privacy threats in transferring and storing
information in the USN, appropriate security mechanisms may be needed to protect against those
threats in the USN.
The main features of the USN are as follows:
• Sensor nodes are deployed densely in a wide area or a hostile context.
• Sensor nodes are vulnerable to failure.
• The communication from the base station (BS) to the sensor node would be of the broadcast
type or point-to-point type.
• A sensor node has limited power, computational capacity, and memory.
• A sensor node may not have global identification.
• Mobility of nodes
• Heterogeneity of nodes
• Scalability to large scale of deployment
• Ability to withstand harsh environmental conditions
• Ease of use
Wireless adhoc sensor network [WASN] consists of a number of sensors spread across a
geographical area. Each sensor has wireless communication capability and some level of
intelligence for signal processing and networking of the data.
Standards and specifications:
Several standards are currently either ratified or under development by organizations and
standardization bodies for wireless sensor networks. The IEEE focuses on
the physical and MAC layers; the Internet Engineering Task Force works on layers 3 and above.
There are also several non-standard, proprietary mechanisms and specifications.
Predominant standards commonly used in WSN communications include Wireless-HART, IEEE
1451, ZigBee / 802.15.4, ZigBee IP, 6LoWPAN
4. RFID Networks:
Radio-frequency identification (RFID) is the use of a wireless non-contact system that uses radio-
frequency electromagnetic fields to transfer data from a tag attached to an object, for the
purposes of automatic identification and tracking.
Basically there are three types of tags: active tags, semi-passive tags, and passive tags. Active tags
and semi-passive tags contain an energy source, normally a battery. Passive tags contain no power
source and must convert energy from the RF signal provided by the interrogator in order to
operate the on-board electronic chip. The tag is able to send back data stored on the chip.
Basic components of an RFID System are given below:
5. Integrated RFID Sensor Networks:
The RFID tags being used at present in the supply chain indicate what a product is, but do not
reveal any information about conditions that the product has encountered throughout its passage
along the supply chain.
IEEE 1451 is a smart transducers interface standards. The standard covers communication
protocols, Transducer Electronics Data Sheet [TEDS] formats, Reader standards, Wireless Interface
standards and RFID system communication protocol. The goal of these standards is
• To provide network-independent and vendor-independent transducer (sensor or actuator)
interfaces.
• To provide a standardized format for transducer electronic data sheets (TEDS) that contain
manufacturer-related data for transducers.
• To support a general model for transducer data, control, timing, configuration, and calibration.
• To allow transducers to be installed, upgraded, replaced, or moved with minimal effort.
• To eliminate error-prone manual entry of data and system configuration steps – thus achieving
‘‘plug-and-play’’ capability.
• To allow wired or wireless sensor data to be moved seamlessly to/from the network or host
system.
IEEE 1451.5 is a transducer interface standard. Its main objective is to provide data-level
interoperability for sensors and actuators by combining the benefit of the TEDS and the adoption
of existing popular wireless communication protocols in the standard. Some possible wireless
protocols are IEEE 802.11x – the Wi-Fi (Wireless Fidelity) standard, IEEE 802.15.1 – the Bluetooth
standard, and IEEE 802.15.4 – the ZigBee standard.
If sensors and possibly actuators can be integrated into RFID tags and the interrogators in a manner
that meets the goals of the IEEE 1451 suite, the needs of current RFID systems for cold chains could
be met and new applications of RFID would be enabled.
The association of IEEE 1451 with RFID system is given below.
A concept of integrating tag id’s to sensor integrated active RFID networks is given below:
6. Wireless Interface Protocols for Active RFID System:
The wireless interface protocols which could be adopted in the IEEE 1451 model are Wi-Fi, Zigbee,
Bluetooth or 6LoWPAN. They are briefly explained below.
Wi-Fi 802.11
Wi-Fi ID allows the devices to be located, and tracked using multiple WAPs. Wi-Fi ID is technically
an active RFID system that uses the 802.11 standard of air communication in the 2.45GHz
frequency spectrum. The two methods used to determine location are Radio Signal Strength
Information (RSSI) and Time Difference Of Arrival (TDOA). RSSI measures the signal strength and is
suited for both tight indoor environments and outdoors. TDOA measures the time of arrival of the
tag's signal from multiple readers at the same time and is better for outdoor or large open indoor
environments where multiple readers can get clear line of sight the tags at the same time.
Following are the benefits of using Wi-Fi for Active RFID
• Wi-Fi-based Active RFID systems utilize standard Wi-Fi (802.11) technology as a
communications protocol, enabling customers to utilize WLAN access points (APs) as Active
RFID “readers”.
• Lower infrastructure, installation cost
• Customers can use their existing or new WLAN infrastructure as a reader network.
• Expensive single-purpose RFID readers can be avoided.
• Faster deployment and installation
• Faster ROI from existing WLAN
Zigbee
ZigBee is a low-cost, low-power, wireless mesh network standard. ZigBee operates in the industrial,
scientific and medical (ISM) radio bands; Data transmission rates vary from 20 to 900 kbps. The low
cost allows the technology to be widely deployed in wireless control and monitoring applications.
Low power-usage allows longer life with smaller batteries.
ZigBee builds upon the physical layer and medium access control defined in IEEE 802.15.4 for low-
rate WPANs. The four main components of the Zigbee standards are the network layer, application
layer, ZigBee device objects (ZDOs) and manufacturer-defined application objects which allow for
customization and favor total integration.
The ZigBee network layer natively supports both star and tree typical networks, and generic mesh
networks. Mesh networking provides high reliability and more extensive range.
Basic Zigbee bit rate of 250 kb/s is adequate for transferring data in an RFID system. With multiple
sensors, each sensor forms a node on the network, sending or receiving data to and from any other
nodes. This enables the nodes to form a mesh or an ad hoc network that can self-configure and
self-heal, maximizing reliability and minimizing the cost of network deployment and maintenance.
Bluetooth
Bluetooth is a wireless technology standard for exchanging data over short distances in
the ISM band from 2400–2480 MHz from fixed and mobile devices, creating personal area
networks (PANs) with high levels of security.
Bluetooth uses frequency-hopping spread spectrum. It usually performs 800 hops per second,
with Adaptive Frequency-Hopping (AFH) enabled.
Bluetooth uses Near Field Communication (NFC) Technology, enabling a user to hold two devices
together at a very short range to complete the pairing process. It has Lower Power Consumption
and Improved Security using six-digit passkey. Bluetooth devices have the ability to work as a slave
or a master in an adhoc network. The three types of Bluetooth network configurations are
• Single point-to-point (Piconet) which consists of one master and one slave device.
• Multipoint (Piconet) topology combines one master device and up to seven slave devices in an
ad hoc network.
• Scatternet: A Scatternet is a group of Piconets linked via a slave device in one Piconet which
plays master role in other Piconet.
7. Requirement of IPv6 in Wireless Sensor Networks:
Any device used to connect to the Internet requires an Internet Protocol (IP) address, a unique
identifier that enables it to communicate with other devices on the network. This means that
everything from laptops and smartphones, through to Internet enabled TVs and refrigerators needs
an IP address. With the ever-increasing number of new devices being connected to the Internet,
there is a need for more addresses than IPv4 can accommodate.
On 3 February 2011, in a ceremony in Miami, the Internet Assigned Numbers Authority (IANA)
assigned the last batch of five /8 address blocks to the Regional Internet Registries, officially
depleting the global pool of completely fresh blocks of addresses. Each /8 address block represents
approximately 16.7 million possible addresses, for a total of over 80 million potential addresses
combined. APNIC was the first RIR to exhaust its regional pool on 15 April 2011, except for a small
amount of address space reserved for the transition to IPv6.
IPv6 uses 128-bit addresses, allowing for 2128, or approximately 3.4×1038 addresses — more
than 7.9×1028 times as many as IPv4, which uses 32-bit addresses. IPv4 allows for only
4,294,967,296 unique addresses worldwide (or less than one address per person alive in 2012), but
IPv6 allows for around 4.8×1028 addresses per person — a number unlikely to ever run out.
8. IPv6 over Low power Wireless Personal Area Networks (6LoWPAN):
6LoWPAN is an acronym of IPv6 over Low power Wireless Personal Area Networks. 6LoWPAN is the
name of a working group in the Internet area of the IETF.
The 6LoWPAN concept originated from the idea that "the Internet Protocol could and should be
applied even to the smallest devices," and that low-power devices with limited processing
capabilities should be able to participate in the Internet of Things.
The 6LoWPAN group has defined encapsulation and header compression mechanisms that allow
IPv6 packets to be sent to and received from over IEEE 802.15.4 based networks. The base
specification developed by the 6LoWPAN IETF group is RFC 4944. The features include basic
Encapsulation, efficient representation of packets less than ~100 bytes, first approach to stateless
Header Compression, fragmentation (map 1280 byte MTU to < 128 bytes), datagram tag/Datagram
offset, mMesh forwarding, identify Originator/Final Destination etc
The 6LoWPAN group within the IETF uses the IEEE 802.15.4 standard to provide the lower layer
elements of this wireless network wireless sensor network. The 6LoWPAN group has then defined
the encapsulation and compression mechanisms that enable the IPv6 data to be carried of the
wireless network.
The 6LoWPAN technology is an approach to the development of a wireless sensor network; there
are incompatibilities between IPv6 format and the formats allowed by IEEE 802.15.4. These
differences are overcome within 6LoWPAN and this allows the system to use basic 802.15.4 as a
layer.
In order to send packet data, IPv6 over 6LowPAN, it is necessary to have a method of converting
the packet data into a format that can be handled by the IEEE 802.15.4 lower layer system.
IPv6 requires the maximum transmission unit (MTU) to be at least 1280 bytes in length. This is
considerably longer than the IEEE802.15.4's standard packet size of 127 octets which was set to
keep transmissions short and thereby reduce power consumption.
To overcome the address resolution issue, IPv6 nodes are given 128 bit addresses in a hierarchical
manner. The IEEE 802.15.4 devices may use either of IEEE 64 bit extended addresses or 16 bit
addresses that are unique within a PAN af
group of physically co-located IEEE802.15.4 devices.
6LoWPAN comprises routers (6LRs) and hosts. Hosts only talk to routers.
hosts in mesh-under no direct host
Network Architecture: The network architecture of 6LoWPAN is given in the figure below.
There can be three modes of operation namely Simple, Extended or Adhoc modes. Simple LoWPAN
consists of only one Edge Router in the LoWPAN network.
connected to the Internet over a backhaul link. Extended LoWPAN has multip
LoWPAN, which share the same IPv6 prefix and a common backbone link. Multiple LoWPANs can
overlap each other. 6LoWPAN does not require an infrastructure to operate, but may also operate
as an Ad hoc LoWPAN. In this topology, one rout
router, implementing two basic functionalities: unique local unicast address (ULA) generation
[RFC4193] and handling 6LoWPAN Neighbor Discovery registration functionality. From the LoWPAN
Node point of view the network operates just like a Simple LoWPAN, except the prefix advertised is
an IPv6 local prefix rather than a global one, and there are no routes outside the LoWPAN.
Protocol Stack: The 6LoWPAN protocol stack is given below.
The important issues to be addressed while adopting IPv6 over IEEE 802.15.4 structure are Frame
compression, Routing methods, Fragmentation and
addresses that are unique within a PAN after devices have associated. There is also a PAN
located IEEE802.15.4 devices.
6LoWPAN comprises routers (6LRs) and hosts. Hosts only talk to routers. Routers may redirect to
no direct host-host communication in route-over
The network architecture of 6LoWPAN is given in the figure below.
There can be three modes of operation namely Simple, Extended or Adhoc modes. Simple LoWPAN
consists of only one Edge Router in the LoWPAN network. A LoWPAN Edge Router is typically
connected to the Internet over a backhaul link. Extended LoWPAN has multiple edge routers in the
LoWPAN, which share the same IPv6 prefix and a common backbone link. Multiple LoWPANs can
overlap each other. 6LoWPAN does not require an infrastructure to operate, but may also operate
. In this topology, one router must be configured to act as a simplified edge
router, implementing two basic functionalities: unique local unicast address (ULA) generation
[RFC4193] and handling 6LoWPAN Neighbor Discovery registration functionality. From the LoWPAN
the network operates just like a Simple LoWPAN, except the prefix advertised is
an IPv6 local prefix rather than a global one, and there are no routes outside the LoWPAN.
The 6LoWPAN protocol stack is given below.
o be addressed while adopting IPv6 over IEEE 802.15.4 structure are Frame
compression, Routing methods, Fragmentation and Autoconfiguration techniques to be adopted.
ter devices have associated. There is also a PAN-ID for a
Routers may redirect to
The network architecture of 6LoWPAN is given in the figure below.
There can be three modes of operation namely Simple, Extended or Adhoc modes. Simple LoWPAN
A LoWPAN Edge Router is typically
le edge routers in the
LoWPAN, which share the same IPv6 prefix and a common backbone link. Multiple LoWPANs can
overlap each other. 6LoWPAN does not require an infrastructure to operate, but may also operate
er must be configured to act as a simplified edge
router, implementing two basic functionalities: unique local unicast address (ULA) generation
[RFC4193] and handling 6LoWPAN Neighbor Discovery registration functionality. From the LoWPAN
the network operates just like a Simple LoWPAN, except the prefix advertised is
an IPv6 local prefix rather than a global one, and there are no routes outside the LoWPAN.
o be addressed while adopting IPv6 over IEEE 802.15.4 structure are Frame
Autoconfiguration techniques to be adopted.
Frame Compression: Generally IPv6 header is 320 Bytes long. However for 6LoWPAN as per
IEEE802.15.4, the header size has been reduced to 40 Bytes to fit it within the 127Byte total frame
length. The 6LoWPAN header as per IEEE 802.15.4 is given below.
Here also, the bytes available for the Payload are only 54 Bytes which is very less as compared to
the frame size. In order to counter this frame compression techniques are employed where in the
difference in the header between consecutive frames is only transmitted. The compressed frame
structure is given below.
The 6LoWPAN compression format was initially defined in RFC4944 while it is updated and recently
published as RFC6282 – ‘Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based
Networks’. RFC4944 Features are basic LoWPAN header format, HC1 (IPv6 header) and HC2 (UDP
header) compression formats, Fragmentation & reassembly, Mesh header feature and Multicast
mapping to 16-bit address space. The additional features of RFC6282 are new HC (IPv6 header) and
NHC (Next-header) compression, support for global address compression, support for IPv6 option
header compression and support for compact multicast address compression.
6LoWPAN Routing: Depending on the layer where the routing is applied the protocols are classified
into two different categories: Mesh-under and route-over. The first uses the MAC address and 16
Bit short ad-dress (layer 2 address) respectively to forward packets, the latter uses the IP
addressing (layer 3) for it. It is detailed in the figure below.
Fragmentation: Fragmentation provides a basis to subdivide a large packet into several smaller
ones. The procedure is apparently necessary in case of the 6LoWPAN because one IPv6 packet can
be up to 1280 bytes long, but the maximal packet size in IEEE 802.15.4 is only127 bytes. In mesh-
under networks the fragments are routed to the destination node, not until they are assembled.
Route-over networks however transmit each fragment only to the next hop. There all fragments
are assembled and the complete packet is analyzed to determine the next destination node. Thus
in route-over networks each hop has to store all fragments and must therefore have enough
resources available.
Auto configuration: Auto configuration describes the autonomous generation of a complete IPv6
address. It mainly uses the Neighbor Discovery Protocol (NDP). The messages used such as Router
Advertisement, Router Solicitation und Neighbor Solicitation are addressed to multicast addresses.
Thus in the mesh-under network which represents a single IP link all nodes inside the network have
to be provided with the message. This in turn floods the network and impairs the bandwidth
considerably. In the route-over networks, since each hop represents an IP router, the multicast
becomes a broadcast for all nodes in the radio range. This admittedly limits the network load. In
order to resolve this issue, multicast addresses are replaced by adequate unicast addresses. This
will be implemented by the expended application of the border router. It knows the addresses of
all nodes inside the network; at the same time it
the LoWPAN. So nodes do not send a multicast for duplicate address detection, but
to the border router.
While there are many forms of wireless networks including wireless sensor networks,
addresses an area that is currently not addressed by any other system, i.e. that of using IP, and in
particular IPv6 to carry the data.
The overall system is aimed at providing wireless internet connectivity at low data rates and with a
low duty cycle.
9. Machine to Machine Communications:
The development of different sensor technologies and integration with the communication
technologies have paved the way for various devices becoming intelligent or ‘SMART’ and started
communicating to a remote machine or host.
that allow both wireless and wired systems to communicate with other devices of the same ability.
M2M uses a device (such as a sensor or meter) to capture an
inventory level, etc.), which is relayed through a
an application that translates the captured event into
need to be restocked). Such communication was originally accomplished by having a remote
network of machines relay information back to a central hub for analysis, which would then be
rerouted into a system like a personal computer.
The M2M System shall be able to allow communication between M2M Applications in the Network
and Applications Domain, and the M2M Device or M2M
communication means, e.g. SMS, GPRS and IP Access.
However, modern M2M communication has expanded beyond a one
changed into a system of networks that transmits data to personal appliances. A Connected Object
may be able to communicate in a peer
M2M System should abstract the underlying network structure including any network addressing
mechanism used, e.g. in case of an IP based network the session establish
when static or dynamic IP addressing is used. The expansion of IP networks across the world has
made it far easier for M2M communication to take place and has lessened the amount of power
and time necessary for information to be comm
allow an array of new business opportunities and connections between consumers and producers
in terms of the products being sold.
Architecture of M2M is given below.
all nodes inside the network; at the same time it represents the interface to the network outside of
the LoWPAN. So nodes do not send a multicast for duplicate address detection, but sends
While there are many forms of wireless networks including wireless sensor networks, 6LoWPAN
addresses an area that is currently not addressed by any other system, i.e. that of using IP, and in
The overall system is aimed at providing wireless internet connectivity at low data rates and with a
Machine to Machine Communications:
The development of different sensor technologies and integration with the communication
technologies have paved the way for various devices becoming intelligent or ‘SMART’ and started
communicating to a remote machine or host. Machine to machine (M2M) refers to technologies
that allow both wireless and wired systems to communicate with other devices of the same ability.
(such as a sensor or meter) to capture an event (such as temperature,
inventory level, etc.), which is relayed through a network (wireless, wired or hybrid) to
that translates the captured event into meaningful information (for example, items
need to be restocked). Such communication was originally accomplished by having a remote
rmation back to a central hub for analysis, which would then be
rerouted into a system like a personal computer.
The M2M System shall be able to allow communication between M2M Applications in the Network
and Applications Domain, and the M2M Device or M2M Gateway, by using multiple
communication means, e.g. SMS, GPRS and IP Access.
However, modern M2M communication has expanded beyond a one-to-one connection and
changed into a system of networks that transmits data to personal appliances. A Connected Object
may be able to communicate in a peer-to-peer manner with any other Connected Object. The
M2M System should abstract the underlying network structure including any network addressing
mechanism used, e.g. in case of an IP based network the session establishment shall be possible
when static or dynamic IP addressing is used. The expansion of IP networks across the world has
made it far easier for M2M communication to take place and has lessened the amount of power
and time necessary for information to be communicated between machines. These networks also
allow an array of new business opportunities and connections between consumers and producers
in terms of the products being sold.
Architecture of M2M is given below.
represents the interface to the network outside of
sends a unicast
6LoWPAN
addresses an area that is currently not addressed by any other system, i.e. that of using IP, and in
The overall system is aimed at providing wireless internet connectivity at low data rates and with a
The development of different sensor technologies and integration with the communication
technologies have paved the way for various devices becoming intelligent or ‘SMART’ and started
rs to technologies
that allow both wireless and wired systems to communicate with other devices of the same ability.
(such as temperature,
(wireless, wired or hybrid) to
(for example, items
need to be restocked). Such communication was originally accomplished by having a remote
rmation back to a central hub for analysis, which would then be
The M2M System shall be able to allow communication between M2M Applications in the Network
Gateway, by using multiple
one connection and
changed into a system of networks that transmits data to personal appliances. A Connected Object
peer manner with any other Connected Object. The
M2M System should abstract the underlying network structure including any network addressing
ment shall be possible
when static or dynamic IP addressing is used. The expansion of IP networks across the world has
made it far easier for M2M communication to take place and has lessened the amount of power
unicated between machines. These networks also
allow an array of new business opportunities and connections between consumers and producers
The Device and Gateway Domain is compose
through a Gateway. The Network Domain is composed of the Access Network, Core network, M2M
Service Capabilities, M2M applications and M2M Management Functions.
10. Internet of Things:
With the increase in popula
communications has expanded beyond the Machine communications domain to a new era where
the application ranges from home networking, urban applications, environment, water, metering,
security, retail, logistics, industry, agriculture, Animal husbandry, health etc. This is termed the
INTERNET OF THINGS. In the Internet of Things paradigm (IoT) , everything of value will be on the
network in one form or another. Radio Frequency IDentification
technologies will give rise to this new standard, in which information and communication are
invisibly embedded in the environment around us. Everyday objects, such as cars, coffee cups,
refrigerators, bathtubs, and more advanced
services will be in each other’s interaction range and will communicate with one another. Large
amounts of data will circulate in order to create smart and proactive environments that will
significantly enhance both the work and leisure experiences of people. Smart interacting objects
that adapt to the current situation without any human involvement will become the next logical
step to people already connected anytime and anywhere.
With the growing presence
ubiquitous information and communication networks is already evident nowadays. However, for
the Internet of Things vision to successfully emerge, the computing criterion will need to go beyond
traditional mobile computing scenarios that use smart
connecting everyday existing objects and embedding intelligence into our environment.
Today, developments are rapidly under way to take this phenomenon an important
embedding short-range mobile transceivers into a wide array of additional gadgets and everyday
items, enabling new forms of communication between people and things, and between things
themselves. A new dimension has been added to the worl
technologies (ICTs): from anytime, anyplace connectivity for anyone, we will now have connectivity
for anything
Connections will multiply and create an entirely new dynamic network of networks
Things. The Internet of Things is neither science fiction nor industry hype, but is based on solid
technological advances and visions of network ubiquity that are zealously being realized
The Device and Gateway Domain is composed of the M2M Device which connects directly or
through a Gateway. The Network Domain is composed of the Access Network, Core network, M2M
Service Capabilities, M2M applications and M2M Management Functions.
With the increase in popularity of Internet and Internet connected devices, the scope of M2M
communications has expanded beyond the Machine communications domain to a new era where
the application ranges from home networking, urban applications, environment, water, metering,
y, retail, logistics, industry, agriculture, Animal husbandry, health etc. This is termed the
In the Internet of Things paradigm (IoT) , everything of value will be on the
network in one form or another. Radio Frequency IDentification (RFID) and sensor network
technologies will give rise to this new standard, in which information and communication are
invisibly embedded in the environment around us. Everyday objects, such as cars, coffee cups,
refrigerators, bathtubs, and more advanced, loosely coupled, computational and information
services will be in each other’s interaction range and will communicate with one another. Large
amounts of data will circulate in order to create smart and proactive environments that will
nce both the work and leisure experiences of people. Smart interacting objects
that adapt to the current situation without any human involvement will become the next logical
step to people already connected anytime and anywhere.
With the growing presence of Wi-Fi and 3G wireless Internet access, the evolution toward
ubiquitous information and communication networks is already evident nowadays. However, for
the Internet of Things vision to successfully emerge, the computing criterion will need to go beyond
traditional mobile computing scenarios that use smart-phones and portables, and evolve into
connecting everyday existing objects and embedding intelligence into our environment.
Today, developments are rapidly under way to take this phenomenon an important
range mobile transceivers into a wide array of additional gadgets and everyday
items, enabling new forms of communication between people and things, and between things
themselves. A new dimension has been added to the world of information and communication
technologies (ICTs): from anytime, anyplace connectivity for anyone, we will now have connectivity
Connections will multiply and create an entirely new dynamic network of networks
The Internet of Things is neither science fiction nor industry hype, but is based on solid
technological advances and visions of network ubiquity that are zealously being realized
d of the M2M Device which connects directly or
through a Gateway. The Network Domain is composed of the Access Network, Core network, M2M
rity of Internet and Internet connected devices, the scope of M2M
communications has expanded beyond the Machine communications domain to a new era where
the application ranges from home networking, urban applications, environment, water, metering,
y, retail, logistics, industry, agriculture, Animal husbandry, health etc. This is termed the
In the Internet of Things paradigm (IoT) , everything of value will be on the
(RFID) and sensor network
technologies will give rise to this new standard, in which information and communication are
invisibly embedded in the environment around us. Everyday objects, such as cars, coffee cups,
, loosely coupled, computational and information
services will be in each other’s interaction range and will communicate with one another. Large
amounts of data will circulate in order to create smart and proactive environments that will
nce both the work and leisure experiences of people. Smart interacting objects
that adapt to the current situation without any human involvement will become the next logical
Fi and 3G wireless Internet access, the evolution toward
ubiquitous information and communication networks is already evident nowadays. However, for
the Internet of Things vision to successfully emerge, the computing criterion will need to go beyond
phones and portables, and evolve into
connecting everyday existing objects and embedding intelligence into our environment.
step further, by
range mobile transceivers into a wide array of additional gadgets and everyday
items, enabling new forms of communication between people and things, and between things
d of information and communication
technologies (ICTs): from anytime, anyplace connectivity for anyone, we will now have connectivity
Connections will multiply and create an entirely new dynamic network of networks – an Internet of
The Internet of Things is neither science fiction nor industry hype, but is based on solid
technological advances and visions of network ubiquity that are zealously being realized
11. Applications of RFID and Wireless Sensor Networks:
Important Applications of RFID and Wireless Sensor Networks include Urban Applications,
Environmental Applications, Water, Metering, Security, Emergency, Retail, Logistics, Industrial,
Agriculture, Animal Farming, Home and Health etc which are tabulated below.
Urban Applications:
Smart Parking Monitoring of parking spaces availability in the
city.
Magnetic field
Structural health Monitoring of vibrations and material
conditions in buildings, bridges and historical
monuments.
Crack detection, crack
propagation, accelerometer,
linear displacement
Noise Urban Maps Sound monitoring in bar areas and centric
zones in real time.
Microphone
Traffic Congestion Monitoring of vehicles and pedestrian levels to
optimize driving and walking routes
Magnetic field
Smart Lighting Intelligent and weather adaptive lighting in
Street lights
Light sensor (LDR), actuator
relay
Waste management Detection of rubbish levels in containers to
optimize the trash collection routes
Ultrasound sensor (measure
capacity)
Intelligent
Transportation
Systems
Smart Roads and Intelligent Highways with
warning messages and diversions according to
climate conditions and unexpected events like
accidents or traffic jams
Magnetic field, crack sensor,
water and ice detection
sensors
Environment:
Forest Fire
Detection
Monitoring of combustion gases and
preemptive fire conditions to define alert
zones
CO, CO2, temperature,
humidity
Air Pollution Control of CO2 emissions of factories,
pollution emitted by cars and toxic gases
generated in farms
NO2, SH2, CO, CO2,
Hydrocarbons, Methane
(CH4)
Landslide and
Avalanche
Monitoring of soil moisture, vibrations and
earth density to detect dangerous patterns in
Crack detection, crack
propagation, accelerometer,
Prevention land conditions linear displacement, soil
moisture
Earthquake Early
Detection
Distributed control in specific places of
tremors
Accelerometer
Water:
Water Quality Study of water suitability in rivers and the sea
for fauna and eligibility for drinkable use
PH, dissolved oxygen,
turbidity
Water Leakages Detection of liquid presence outside tanks and
pressure variations along pipes
Liquid flow sensor
River Floods Monitoring of water level variations in rivers,
dams and reservoirs
Level sensor (switch),
ultrasound sensor
Metering:
Smart Grid Energy consumption monitoring and
management
Current and voltage sensors
Tank Level Monitoring of water, oil and gas levels in
storage tanks and cisterns.
Level sensor (switch),
ultrasound sensor (capacity
measurement)
Photovoltaic
Installations
Monitoring and optimization of performance
in solar energy plants
Current and voltage sensors
Water Flow Measurement of water pressure in water
Transportation systems
Liquid flow sensor
Silos Stock
Calculation
Measurement of emptiness level and weight
of the goods
Ultrasound sensor (capacity
measurement), load cells
Security & Emergencies:
Perimeter Access
Control
Access control to restricted areas and
detection of people in non-authorized areas.
PIR (infrared), hall effect
(windows, doors),
RFID and NFC tags
Liquid Presence Liquid detection in data centers, warehouses
and sensitive building grounds to prevent
break downs and corrosion
Water detection sensor
Radiation Levels Distributed measurement of radiation levels in
Nuclear power stations surroundings to
generate
Leakage alerts.
Geiger Muller tube (Beta and
Gamma) [ β, γ ],
ultraviolet sensor (UVA, UVB)
Explosive and
Hazardous Gases
Detection of gas levels and leakages in
industrial environments, surroundings of
chemical factories and inside mines.
O2, H2, CH4, Isobutane,
Ethanol
Retail:
Supply Chain
Control
Monitoring of storage conditions along the
supply chain and product tracking for
traceability purposes.
RFID and NFC tags
NFC Payment Payment processing based in location or
Activity duration for public transport, gyms,
theme parks, etc.
RFID and NFC tags
Intelligent Shopping
Application
Getting advices in the point of sale according
To customer habits, preferences, presence of
allergic components for them or expiring
dates.
RFID and NFC tags
Smart Product
Management
Control of rotation of products in shelves and
warehouses to automate restocking processes
Weight sensor (load cell),
RFID and NFC tags
Logistics:
Quality of Shipment
Conditions
Monitoring of vibrations, strokes, container
openings or cold chain maintenance for
insurance purposes.
Light, temperature,
humidity, impact, vibrations,
accelerometer
Item Location Search of individual items in big surfaces like
warehouses or harbours
RFID and NFC tags
Storage
Incompatibility
Detection
Warning emission on containers storing
inflammable goods closed to others containing
explosive material.
O2, H2, CH4, Isobutane,
Ethanol,
RFID and NFC tags
Fleet Tracking Control of routes followed for delicate goods
like medical drugs, jewels or dangerous
merchandises.
GPS
Industrial control:
M2M Applications Machine auto-diagnosis and assets control Voltage, vibration,
accelerometer, current
Indoor Air Quality Monitoring of toxic gas and oxygen levels
inside chemical plants to ensure workers and
goods safety.
CO, CO2, NH3, NO2, SH2, CO,
CO2, O3
Temperature
Monitoring
Control of temperature inside industrial and
medical fridges with sensitive merchandise.
Temperature, humidity,
pressure
Ozone Presence Monitoring of ozone levels during the drying
meat process in food factories
Ozone (O3)
Indoor Location Asset indoor location by using active (zigbee)
and passive tags (RFID/NFC).
Passive tags (RFID+NFC) +
Active tags (ZigBee,
Wifi, Bluetooth)
Vehicle Auto-
diagnosis
Information collection from canbus to send
real time alarms to emergencies or provide
advice to drivers.
Voltage, vibration,
accelerometer, current
Agriculture:
Wine Quality
Enhancing
Monitoring soil moisture and trunk diameter in
Vineyards to control the amount of sugar in
grapes
And grapevine health
Soil temperature / moisture,
leaf wetness, atmospheric
pressure, solar radiation
(PAR), trunk diameter
Green Houses Control micro-climate conditions to maximize
the production of fruits and vegetables and its
quality.
Soil temperature / moisture,
leaf wetness, atmospheric
pressure, solar radiation
(PAR), trunk diameter
Golf Courses Selective irrigation in dry zones to reduce the
water resources required in the green.
Soil moisture
Meteorological
Station Network
Study of weather conditions in fields to
forecast ice formation, rain, drought, snow or
wind changes.
Anemometer, wind vane,
pluviometer
Compost Control of humidity and temperature levels in
alfalfa, hay, straw, etc. To prevent fungus and
Other microbial contaminants.
Humidity, soil moisture, soil
temperature
Animal Farming:
Offspring Care Control of growing conditions of the offspring
in animal farms to ensure its survival and
health.
CH4, SH2, NH3, temperature,
humidity
Animal Tracking Location and identification of animals grazing
in open pastures or location in big stables.
Passive tags (RFID+NFC) +
Active tags (ZigBee,
Wifi, Bluetooth)
Toxic Gas Levels Study of ventilation and air quality in farms
and detection of harmful gases from
excrements
CH4, SH2, NH3, temperature,
humidity
Homes:
Energy and Water
Use
Energy and water supply consumption
monitoring to obtain advice on how to save
cost and resources.
Current and voltage sensors,
liquid flow sensor
Remote Control
Appliances
Switching on and off remotely appliances to
avoid accidents and save energy.
Actuator relay
Intrusion Detection
Systems
Detection of windows and doors openings and
Violations to prevent intruders.
PIR (infrared), hall effect
(windows, doors)
Art and Goods
Preservation
Monitoring of conditions inside museums and
art warehouses.
Temperature, humidity,
pressure, O2
Health:
Fall Detection Assistance for elderly or disabled people living
Independent.
Accelerometer
Medical Fridges Control of conditions inside freezers storing
Vaccines, medicines and organic elements.
Light, temperature,
humidity, impact, vibrations,
accelerometer
Sportsmen Care Vital signs monitoring in high performance
Centers and fields
ECG, pulse, accelerometer,
respiration
Patients
Surveillance
Monitoring of conditions of patients inside
Hospitals and in old people’s home.
ECG, pulse, accelerometer,
respiration
Ultraviolet
Radiation
Measurement of UV sun rays to warn people
not to be exposed in certain hours.
Ultraviolet sensor (UVA,
UVB)
12. Conclusion:
The IEEE 1451 standards for sensor networks integrating RFID methods and 6LoWPAN standards for
IPv6 over low power wireless networks have opened immense possibility of Internet of Things
applications possible over the Wireless IP domain. Utilization of Adhoc mode of communication also
helps in avoiding the requirement of line of sight requirement from the Gateway for the connected
sensor devises.
IEEE 1451 describes in detail the sensor interfacing requirements where as the 6LoWLAN standards
developed over the 802.15.4 standards defines the use of IPv6 for such networks. Even though, the
requirement of IPv6 for these devices is undisputed, the limitations in usage of IPv6 for such low power,
low throughput systems have been removed through the 6LoWPAN standards.
These standards have boosted the usage of IP networking and sensor technologies to be used for
immense applications of day to day life which can change the standards of living in the future days.
Glossary of Terms:
1451: IEEE 1451 standard for Smart transducer interface for sensors and actuators
802.15.4: IEEE 802.15.4-standard, applicable to low-rate wireless Personal Area Network
6LoWPAN: IPv6 over Low power Wireless Personal Area Networks
ADC: Analog to Digital Converter
AFH: Adaptive Frequency Hoping
APNIC: Asia Pacific Network Information center
BS: Base Station
BT: Bluetooth
DAC: Digital to Analog Converter
DIO: Digital Input/Output
GPS: Global Positioning System
IETF: Internet Engineering Task Force
M2M: Machine to machine
MAC: Medium Access Control layer
MTU: Maximum Transfer Unit
NCAP: Network Capable Application processor
NDP: Neighbor Discovery Protocol
NFC: Near Field Communication
PAN: Personal Area Network
PHY: OSI model layer 1: The physical layer defines electrical and physical specifications for
devices. It defines the relationship between a device and a transmission medium
including the layout of all hardware components.
RFID: Radio Frequency Identification
RSSI: Radio Signal Strength Information
TDOA: Time Difference Of Arrival
TEDS: Transducer Electronic Data Sheet
TIM: Transducer Interface Module
UDP: User datagram Protocol
ULA: Unicast Local Address
USN: Ubiquitous Sensor Networks
WSN: Wireless Sensor Networks
MANET: Mobile adhoc networks
WMN: Wireless mesh networks
WASN: Wireless Adhoc sensor networks
WPAN: Wireless Personal Area Network
XDCR: Transducer or Sensor or Actuator
ZB: Zigbee
ZDO: Zigbee Device Object
References:
1. IEEE 1451 - IEEE Standard for a Smart Transducer Interface for Sensors and Actuators
2. IEEE 802.15 – IEEE standards for wireless personal area networks
3. ITU-T X.1311 - Secure applications and services – Ubiquitous sensor network security
Recommended