2012
DOI: 10.1145/2367580.2367582
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight approach to online detection and classification of interference in 802.15.4-based sensor networks

Abstract: With a rapidly increasing number of devices sharing access to the 2.4 GHz ISM band, interference becomes a serious problem for 802.15.4-based, low-power sensor networks. Consequently, interference mitigation strategies are becoming commonplace. In this paper, we consider the step that precedes interference mitigation: interference detection. We have performed extensive measurements to characterize how different types of interferers affect individual 802.15.4 packets. From these measurements, we define a set of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
23
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(24 citation statements)
references
References 13 publications
1
23
0
Order By: Relevance
“…The publications of Hermans et al [33], Rensfelt et al [11], and Hermans et al [20] developing SoNIC are the most comparable to the algorithm presented here and since the latter publication is the most recent and best evaluated one, the authors will refer to it. Hermans et al [20] claim to detect the predominant source of interference in an office environment with 87%.…”
Section: Classification Resultsmentioning
confidence: 90%
“…The publications of Hermans et al [33], Rensfelt et al [11], and Hermans et al [20] developing SoNIC are the most comparable to the algorithm presented here and since the latter publication is the most recent and best evaluated one, the authors will refer to it. Hermans et al [20] claim to detect the predominant source of interference in an office environment with 87%.…”
Section: Classification Resultsmentioning
confidence: 90%
“…Alternatively, by sampling link quality and/or received signal strength values in combination with processing it has been shown to be possible to identify Wi-Fi signals using commodity ZigBee nodes [33] [34], to identify ZigBee signals using commodity Wi-Fi cards [35] or to detect Wi-Fi idle intervals to which ZigBee frame lengths and transmission intervals can be adapted [36]. Other state of the art coexistence techniques utilize e.g.…”
Section: Challenges To Identify and Correctly Classify The Presence Omentioning
confidence: 99%
“…Willig et al [3] use the Gilbert-Elliott model to describe IEEE 802.11 bit-error process in industrial environments, but the differences between the IEEE 802.11 and 802.15.4 Physical layers cast aside the validity of the conclusions for IEEE 802.15.4 radios [4]. In addition, the studies conducted in anechoic chambers [5] and isolated environments [6] exclude multipath propagation, a phenomenon present in every realistic setup.…”
Section: Related Workmentioning
confidence: 99%