Ietf 6tisch: A tutorial
The IETF IPv6 over the TSCH mode of IEEE802. 15.4 e (6TiSCH) working group has
standardized a set of protocols to enable low power industrial-grade IPv6 networks. 6TiSCH …
standardized a set of protocols to enable low power industrial-grade IPv6 networks. 6TiSCH …
IEEE 802.15. 4e: A survey
Several studies have highlighted that the IEEE 802.15. 4 standard presents a number of
limitations such as low reliability, unbounded packet delays and no protection against …
limitations such as low reliability, unbounded packet delays and no protection against …
ALICE: Autonomous link-based cell scheduling for TSCH
Although low-power lossy network (LLN), at its early stage, commonly used asynchronous
link layer protocols for simple operation on resource-constrained nodes, development of …
link layer protocols for simple operation on resource-constrained nodes, development of …
A realistic energy consumption model for TSCH networks
X Vilajosana, Q Wang, F Chraim… - IEEE Sensors …, 2013 - ieeexplore.ieee.org
Time slotted channel hop** (TSCH) is the highly reliable and ultra-low power medium
access control technology at the heart of the IEEE802. 15.4 e-2012 amendment to the …
access control technology at the heart of the IEEE802. 15.4 e-2012 amendment to the …
Clock synchronization over IEEE 802.11—A survey of methodologies and protocols
Just like Ethernet before, IEEE 802.11 is now transcending the borders of its usage from the
office environment toward real-time communication on the factory floor. However, similar to …
office environment toward real-time communication on the factory floor. However, similar to …
OpenMote: Open-source prototy** platform for the industrial IoT
This paper introduces OpenMote, the latest generation of Berkeley motes. OpenMote is a
open-hardware prototy** ecosystem designed to accelerate the development of the …
open-hardware prototy** ecosystem designed to accelerate the development of the …
LiKe: Lightweight certificateless key agreement for secure IoT communications
Certificateless public-key cryptography (CL-PKC) schemes are particularly robust against
the leakage of secret information stored on a trusted third party (TTP). These security …
the leakage of secret information stored on a trusted third party (TTP). These security …
A precise synchronization method for future wireless TSN networks
Time-sensitive networking (TSN) is the most promising time-deterministic wired
communication approach for industrial applications. To extend TSN to “IEEE 802.11” …
communication approach for industrial applications. To extend TSN to “IEEE 802.11” …
Tsch and 6tisch for contiki: Challenges, design and evaluation
Synchronized communication has recently emerged as a prime option for low-power critical
applications. Solutions such as Glossy or Time Slotted Channel Hop** (TSCH) have …
applications. Solutions such as Glossy or Time Slotted Channel Hop** (TSCH) have …
From best effort to deterministic packet delivery for wireless industrial IoT networks
Wireless industrial networks require reliable and deterministic communication. Determinism
implies that there must be a guarantee that each data packet will be delivered within a …
implies that there must be a guarantee that each data packet will be delivered within a …