Interference Mitigation in WSN by Means of Directional Antennas and Duty Cycle Control
Interference Mitigation in WSN by Means of Directional Antennas and Duty Cycle Control
Interference Mitigation in WSN by Means of Directional Antennas and Duty Cycle Control
RESEARCH ARTICLE
ABSTRACT
Network spanning algorithms, such as ZigBee-native and Stojmenovič, constitute a crucial element in the wireless sensor
network design, by determining its potential for reliability and fault-tolerance. The interconnections between nodes have a
great impact on the radio interference level present in such a network and may create a serious electromagnetic compatibility
issue in some cases. It can be proved that the total interference incurred by a statistical node can be diminished in two ways:
either by using directional antennas or by setting an upper limit on the duty cycle of each network node. Copyright © 2010
John Wiley & Sons, Ltd.
KEYWORDS
sensor network; SNIR; interference; directional antennas
*Correspondence
Kamil Staniec, Institute of Telecommunications, Teleinformatics and Acoustics, Wroclaw University of Technology, Wroclaw, Poland.
E-mail: kamil.staniec@pwr.wroc.pl
Frequency (MHz) BW (MHz) Data rate (kbits/s) Receiver sensitivity (dBm) SNIR (dB) @1%PER
1482 Wirel. Commun. Mob. Comput. 2012; 12:1481–1492 © 2010 John Wiley & Sons, Ltd.
DOI: 10.1002/wcm
K. Staniec and G. Debita Interference mitigation in wireless sensor networks
4. STOJMENOVIC MINIMUM
SPANNING TREE ALGORITHM
Out of multiple concepts of modeling and building the
3. IEEE 802.15.4 (ZIGBEE) LOCAL WSN topology (as in Refs. [11,12]) some of the most pop-
MINIMUM SPANNING TREE ular ones are those described by Stojmenovič [13], initially
ALGORITHM intended for military applications. These include: MST,
LMST, relative neighbor graph (RNG), Gabriel’s graph
From the two general topologies for ZigBee networks intro- (GG), Delaunay triangulation (DT) and partital Delaunay
duced in Section 2 two further topologies can be derived, triangulation (PDT).
namely the mesh and tree, which gives altogether four The MST algorithm was chosen (for comparative pur-
possibilities regarding the network structure. The topology poses with LMST described in Section 3) as the most
determines the spanning method to be chosen by a designer, relevant to WSN design due to its outstanding energetic effi-
which in turn impacts the system functionality. The most ciency (a strategic parameter in WSN) and fault-tolerance.
commonly implemented methods for ZigBee are the min- The MST algorithm starts with the PAN coordinator
imum spanning tree (MST) and local MST algorithms broadcasting a beacon message heralding a new network
(LMST), optimal due to a low-computational complexity formation, which is to announce that a new network is about
and energetic efficiency (for more details see). Both are to be created. Soon after this broadcast the PAN coordina-
considered to be heuristic method for a fast network form- tor enters the listening mode to hear incoming response
ing. Out of these two, the LMST is more frequently used calls from nodes within the radio audible range. The suc-
since it allows to span the network without prior knowledge cessfully received calls are being collected for the duration
of the whole network state (although, as will be shown in of the, so-called, listen window which -- depending on the
Sections 8 and 9, both algorithms perform very similarly as manufacturer -- lasts for a few up to several seconds (val-
regards intra-network interference issues). ues experimentally measured by the authors with the use
Both methods have one feature in common -- it is the pres- of the Daintree Sensor Network Analyzer Software 100A,
ence of the PAN coordinator(s) to initiate the formation of Prof. Edition -- a commercial software for ZigBee networks
the network. In LMST (typical for ZigBee applications), analysis). Now, after forming connections to the PAN coor-
however, the formation process starts in a few points of dinator each connected node performs the same searching
the unorganized network independently (nodes 8, 17--19 routine to find nodes of its own neighbor set (further away
in Figure 3) -- several FFD’s start a network spanning from the PAN coordinator) and which have not connected
routine to create connections in a star-topology around to the PAN coordinator upon the primary broadcast. Those
themselves (hence ‘local’ in the algorithm name). Once all nodes that respond within the listen window are recruited
the local stars have been created, connections are made as neighbors. The procedure then continues throughout all
between these local individual stars to span the whole the nodes in the entire area until eventually the minimum
network. (global) spanning tree is formed (Figure 4).
Wirel. Commun. Mob. Comput. 2012; 12:1481–1492 © 2010 John Wiley & Sons, Ltd. 1483
DOI: 10.1002/wcm
Interference mitigation in wireless sensor networks K. Staniec and G. Debita
1484 Wirel. Commun. Mob. Comput. 2012; 12:1481–1492 © 2010 John Wiley & Sons, Ltd.
DOI: 10.1002/wcm
K. Staniec and G. Debita Interference mitigation in wireless sensor networks
S
SNIRk |[dB] = 10 log
N+ Ik
Fig. 7. General interference scenario for ZigBee. k
S
offers limited performance capabilities (low-data rates) and = 10 log (2)
only a single channel whereas 915 MHz band is unavailable kB · T · BW · NF + Im
M/(k)
for license-exempt applications in Europe.
Wirel. Commun. Mob. Comput. 2012; 12:1481–1492 © 2010 John Wiley & Sons, Ltd. 1485
DOI: 10.1002/wcm
Interference mitigation in wireless sensor networks K. Staniec and G. Debita
Fig. 8. An example of connections in a WSN (Stojmenovič Fig. 9. An example of connections in a WSN (ZigBee algorithm).
algorithm).
1486 Wirel. Commun. Mob. Comput. 2012; 12:1481–1492 © 2010 John Wiley & Sons, Ltd.
DOI: 10.1002/wcm
K. Staniec and G. Debita Interference mitigation in wireless sensor networks
8. ANALYSIS OF RESULTS --
ANTENNA BEAMWIDTH INFLUENCE
ON INTERFERENCE
Fig. 10. An example of interference mitigation with the use of
directive antennas in radio modules.
With the assumptions in previous sections in mind, multiple
simulations have been carried out to determine the influence
of the antenna beamwidth on the level of experienced inter-
ference. The number of nodes was varied from 10 to 90 and
for each case number, 10 random scenarios were generated
with Monte--Carlo distributed nodes. For every individual
node SNIR was found in each of the 10 scenarios and aver-
aged. The final value of SNIR as seen in Figures 13--15 was
calculated as the average across all the nodes in all scenarios
for a given number of M nodes. Such an averaging proce-
dure was intended to provide statistical robustness to results,
Fig. 11. The concept of antenna directivity switching: (a) packet otherwise -- a per-instance analysis might exhibit flickering
#1 transmission; (b) packet #2 transmission. variations stemming from random choices of neighbors in
Stojmenovič and ZigBee native algorithms (as described in
be involved since a given node picks one of the candidate Sections 3 and 4). A typical value of minimum SNIRmin
nodes (once for each packet transmission) randomly out of defined for ZigBee (according to Table II) was indicated as
its neighbor set (see Figure 11). Obviously, the beamwidth a horizontal dashed line.
control comes at some additional costs of complicating the It can be clearly seen that the SNIR changes non-linearly
transmission/reception module. However, as will be shown with a strong dependence of SNIR with the beamwidth. In
in Sections 8 and 9, the expected improvement in SNIR the 0◦ beamwidth case SNIR is only limited by the ther-
justifies both effort and cost. mal noise and some rudimentary interference from other
The final remark regarding the implementation of the nodes (due to 25 dB signal attenuation in their directions)
directional antennas concerns the antenna radiation pattern and the pathloss incurred by the desired signal. As seen in
(ARP) shape. Since its exact form usually differs by manu- Figures 13--15, regardless of the algorithm, SNIR crosses
facturer, a generic simplified approach has been proposed to its lower bound (5 dB) when the antenna beamwidth, under-
model ARP provided the 3 dB (boresight) angle is known, stood as the θ 3dB angle discussed in Section 7, reaches ca.
specified as θ 3dB in Figure 12. 180◦ (which means that antennas radiate over one half the
The θ 3dB angle is defined as the angle spread on which horizontal plane and attenuate signals in the other half,
edges the transmitted power with a given ARP reduces by according to Figure 12) for 10 nodes. Statistically, this case
3 dB. For the sake of simplicity a straight-line sectorization halves the total number of nodes M in the visible range
has been proposed (gray area in Figure 12b) with a vesti- of each node. Quite surprisingly, however, SNIR responds
gial reception of the back- and sidelobes lying outside the most rapidly when the number of nodes is increased from
Wirel. Commun. Mob. Comput. 2012; 12:1481–1492 © 2010 John Wiley & Sons, Ltd. 1487
DOI: 10.1002/wcm
Interference mitigation in wireless sensor networks K. Staniec and G. Debita
Fig. 14. Averaged SNIR versus antenna beamwidth for different In any case, however, Stojmenovič algorithm in the small
nodes densities - Stojmenovič algorithm (a large window). window mode behaves similarly to ZigBee native algorithm
in that they both perform slightly poorer than the large-
window Stojmenovič algorithm (i.e., a narrower beamwidth
is necessary to achieve the SNIR of 5 dB as compared to the
large window algorithm).
Figure 17, in turn, shows how the number of interfer-
ences changes with the antenna beamwidth. Obviously, for
omni-directional reception (360◦ case), the total number of
interferences equals M-2 since a given node cannot interfere
with itself or with the node it currently transmits to. It should
also be noticed that ZigBee and Stojmenovič algorithm do
not exhibit significant differences in the interference perfor-
mance despite different principles in the network structure
formation (refer to Sections 3 and 4).
1488 Wirel. Commun. Mob. Comput. 2012; 12:1481–1492 © 2010 John Wiley & Sons, Ltd.
DOI: 10.1002/wcm
K. Staniec and G. Debita Interference mitigation in wireless sensor networks
Wirel. Commun. Mob. Comput. 2012; 12:1481–1492 © 2010 John Wiley & Sons, Ltd. 1489
DOI: 10.1002/wcm
Interference mitigation in wireless sensor networks K. Staniec and G. Debita
1490 Wirel. Commun. Mob. Comput. 2012; 12:1481–1492 © 2010 John Wiley & Sons, Ltd.
DOI: 10.1002/wcm
K. Staniec and G. Debita Interference mitigation in wireless sensor networks
5. Hekmat R, Van Mieghem P. Interference power statis- and Wireless Communications (PWC) 2003, Sept. 23--
tics in ad hoc and sensor networks. Wireless Networks, 25, Venice (Italy), 2003, pp.590--600.
Springer: Springer Netherlands, vol. 14, no. 5, Oct. 2008, 18. Ramanathan R, Redi J, Santivanez C, Wiggins D, Polit
591--599. S. Ad hoc networking with directional antennas: a com-
6. Vakil S, Liang B. Balancing cooperation and interfer- plete system solution. IEEE Journal on Selected Areas
ence in wireless sensor networks. Proceedings of 3rd in Communications 2005; 23(3): 496--506.
IEEE Annual IEEE Communications Society Confer- 19. ElBatt T, Anderson T, Ryu B. Performance evalua-
ence on Sensor, Mesh and Ad Hoc Communications tion of multiple access protocols for ad hoc networks
and Networks (SECON), vol. 1, Sept. 2006, pp.198-- using directional antennas. Proceedings of IEEE Wire-
206. less Communications and Networking Conference
7. Mordachev V, Loyka S. Statistical properties of (WCNC), March 16--20, 2003, New Orleans (Louisiana),
electromagnetic environment in wireless networks, USA.
intra-network electromagnetic compatibility and safety. 20. Munari A, Rossetto F, Zorzi M. Cooperative cross layer
Proceedings of 20th International Symposium on EMC, MAC protocols for directional antenna ad hoc networks.
Sept. 13--17, Wrocław, 2010, pp.619--624. ACM Mobile Computing and Communications Review.
8. Tran-Xuan C, Koo I. An RSS-based localization scheme ACM: New York, NY, USA, 2008; 12 (2): 12--30.
using direction calibration and reliability factor informa- 21. CEPT, ERC Recommendation 70-03 Relating to the Use
tion for wireless sensor networks. KSII Transactions on of Short Range Devices (SRD), Annex 1: Non-specific
Internet and Information Systems 2010; 4(1): 45--61. Short Range Devices. Version of 16 October 2009.
9. Staniec K, Debita G. Antenna beamwidth control
for improving signal-to-noise ratio in wireless sensor
networks. Proceedings of 2010 14th International Con-
AUTHORS’ BIOGRAPHIES
ference on Intelligent Engineering Systems (INES), May
2010, pp. 103--107. Kamil Staniec, received his MSc
10. IEEE, IEEE Std 802.15.4TM -2006, Part 15.4: Wire- degree from Lodz Technical University
less Medium Access Control (MAC) and Physical layer (with honors) in 2001 and a PhD degree
(PHY) Specification for Low-Rate Wireless Personal from Wroclaw University of Technol-
Area Networks (WPANs). ogy (with honors) in 2006. Since 2006
11. Shooman ML. Reliability of Computer Systems and Net- he has been a scientist with Wroclaw
works -- Fault Tolerance, Analysis and Design, John University of Technology where he
is involved in research on the propa-
Wiley & Sons: 2002.
gation modeling and measurement in
12. Pióro M, Medhi D. Routing, Flow, and Capacity Design
indoor and mine environments. Apart from these issues,
in Communication and Computer Networks, Morgan he also coordinates the tele-information section in a multi-
Kaufmann Publishers: San Francisco, 2004. disciplinary project on sensors and detectors for monitoring
13. Stojmenovič I. Handbook of Sensor Networks -- Algo- factors hazardous to the environment (end of project in
rithms and Architectures, John Wiley & Sons: Ottawa, Dec. 2012), commissioned by the Polish Ministry of Sci-
2004. ence. His investigations in the project concern methods
14. Debita G, Staniec K. Reliable mesh network planning for reducing intra-network radio interference in wireless
with minimization of intra-system interference. Pro- sensor networks and improving their energetic efficiency.
ceedings of Broadband Communication, Information Since 2007 he has also been involved as a chief scientist
Technology & Biomedical Applications BROADBAND- with a project on the next-generation services and networks
where he has developed a deterministic model based on
COM’09, July 15--18, 2009, Wrocław, Poland, pp.
the ray launching for modeling the radiowaves propaga-
243--244.
tion in reverberation chambers, in both amplitude and time
15. Debita G, Staniec K. Algorithms for reliable networks domains.
deployment in mesh topology with flow control. Inter-
national Journal of Electronics and Telecommunications
2010; 56(1): 73--80. Grzegorz Debita, a graduate (MSc)
16. Jasani H, Yen K. Performance improvement using from Wroclaw University of Technol-
directional antennas in ad hoc networks. International ogy, Institute of Telecommunications,
Teleinformatics and Acoustics. He
Journal of Computer Science and Network Security
is currently employed at the Chair
2006; 6(6): 180--188.
of Radiocommunications and Tele-
17. Choudhury RR, Vaidya NH. Impact of directional anten- informatics where he is pursuing a
nas on ad hoc routing. Proceedings of IFIP Personal PhD dissertation (presently awaiting
Wirel. Commun. Mob. Comput. 2012; 12:1481–1492 © 2010 John Wiley & Sons, Ltd. 1491
DOI: 10.1002/wcm
Interference mitigation in wireless sensor networks K. Staniec and G. Debita
defense). His domain of research, in general, pertains reliability. Other topics of expertise include optimization
to the tele-information science systems design while his methods in radio systems for intra-network electromag-
main interest if focused on the application of planar netic compatibility and optimization of communication
graphs in wireless mesh networks with regard to their protocols.
1492 Wirel. Commun. Mob. Comput. 2012; 12:1481–1492 © 2010 John Wiley & Sons, Ltd.
DOI: 10.1002/wcm