2018
DOI: 10.1002/ett.3494
|View full text |Cite
|
Sign up to set email alerts
|

Simulating 6TiSCH networks

Abstract: 6TiSCH is a working group at the IETF, which is standardizing how to combine IEEE802.15.4 time‐slotted channel hopping (TSCH) with IPv6. The result is a solution that offers both industrial performance and seamless integration into the Internet and is therefore seen as a key technology for the Industrial Internet of Things. This article presents the 6TiSCH simulator, created as part of the standardization activity, and which has been used extensively by the working group. The goal of the simulator is to benchm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
55
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2
1

Relationship

4
4

Authors

Journals

citations
Cited by 70 publications
(55 citation statements)
references
References 23 publications
0
55
0
Order By: Relevance
“…We implement both per-hop reassembly and fragment forwarding on the 6TiSCH Simulator 1 [9]. This simulator is being maintained by the 6TiSCH working group, and implements the full behavior of the 6TiSCH stack.…”
Section: Simulation Settingsmentioning
confidence: 99%
“…We implement both per-hop reassembly and fragment forwarding on the 6TiSCH Simulator 1 [9]. This simulator is being maintained by the 6TiSCH working group, and implements the full behavior of the 6TiSCH stack.…”
Section: Simulation Settingsmentioning
confidence: 99%
“…Our simulation campaign relies on the 6TiSCH Simulator [27] that was created as part of the standardization activity, and which has been used extensively by the 6tisch working group. Our simulation study involves two nodes trying to communicate while an attacker is trying to selectively jam the radio channels.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…The slotframe consists in 101 timeslots whose duration is 15 ms each. The packet delivery ratio over the link varies over time, in accordance with the Pister-Hack model [27]. Considered wireless links are configured with a minimum packet delivery ratio of 0.95, in order to clearly identify the impact of attacks.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…The 6TiSCH Simulator [3] is developed to accelerate research and development of 6TiSCH related technology, including scheduling algorithms 1 . The simulator implements the full behavior of the 6TiSCH protocol stack.…”
Section: Introductionmentioning
confidence: 99%
“…https://people.eecs.berkeley.edu/~pister/290Q/09sp/09sp%20hw3.htm3 As an online addition to this paper, Mercator is available at https://github. com/openwsn-berkeley/mercator under an open-source BSD.4 https://github.com/keomabrun/k7…”
mentioning
confidence: 99%