You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/347978711

Scheduling in IEEE 802.15.4e Time Slotted Channel Hopping: A Survey

Conference Paper · October 2020


DOI: 10.1109/UEMCON51285.2020.9298043

CITATIONS READS
5 521

4 authors:

Sarra Hammoudi Abdelhak Bentaleb


Université Mohamed El Bachir El Ibrahimi de Bordj Bou Arréridj Concordia University Montreal
15 PUBLICATIONS 128 CITATIONS 62 PUBLICATIONS 1,212 CITATIONS

SEE PROFILE SEE PROFILE

S. Harous Zibouda Aliouat


University of Sharjah University Ferhat Abbas Setif 1
228 PUBLICATIONS 2,058 CITATIONS 131 PUBLICATIONS 1,432 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Abdelhak Bentaleb on 25 May 2021.

The user has requested enhancement of the downloaded file.


Scheduling in IEEE 802.15.4e Time Slotted
Channel Hopping: A Survey
Sarra Hammoudi∗ , Abdelhak Bentaleb§ , Saad Harous¶ , and Zibouda Aliouat‡
∗ University of Mohamed El Bachir El Ibrahimi, § National University of Singapore,
¶ United Arab Emirates University, ‡ Ferhat Abbas Setif 1 University

sarra.hammoudi@univ-bba.dz, bentaleb@comp.nus.edu.sg, harous@uaeu.ac.ae, zaliouat@univ-setif.dz

Abstract—Time Slotted Channel Hopping (TSCH, termed also cations, such as process automation, equipment and process
Time Synchronized Channel Hopping) is one of the medium monitoring, oil and gas industry, food and beverage products,
access control modes that is defined in IEEE 802.15.4e standard. chemical products, pharmaceutical products, and water waste
TSCH plays a vital role in the development of the Internet
of Things (IoT) applications such as smart city, smart home, treatments [1] [3] [8].
and smart factory. For reliable communications, it leverages TSCH applies multi-channel communication by exploiting
time slotted channel together with time slotted access capabil- 16 non-overlapping channels in the 2.4 GHz band [9]. It
ities. Moreover, it serves deterministic low-power mesh network achieves reliable communications thanks to channel hopping
deployed for critical applications with high reliability and low technique. Channel hopping is a very efficient technique that
latency. However, it suffers from problems that may seriously
deteriorate the system performance. As an attempt to identify the is used to rapidly switch transmitting radio signals among
scheduling technique problems, in this paper, we first presents several frequency channels, and thus, reduces multi-path fad-
an overview on existing scheduling techniques, rules, and their ing and interference issues [7]. TSCH has been adopted
challenges in TSCH-enabled IoT applications, and second, we by two essential standard technologies in wireless networks:
study some recent emerging scheduling-based proposals that ISA100.11a [10] and Wireless-HART [11], to service in-
benefit from intelligent and machine learning techniques to avoid
such scheduling problems. Therefore, increase the efficiency of dustrial applications with high throughput and efficiency.
the IoT applications. This survey inspires researchers to create 6TiSCH [12] is another interesting standard protocol by In-
a reliable TECH communications for critical IoT applications. ternet engineering task force (IETF) to serve IoT communica-
Index Terms—IEEE 802.15.4e, TSCH, Internet of Things, tions. It represents the key enabler of the further integration of
Wireless Sensor Networks, Scheduling IPv6 in industrial standards and the convergence of operational
technology with information technology. To achieve this, it
I. I NTRODUCTION combines the IEEE 802.15.4e TSCH capabilities with IPv6
The Internet of Things (IoT) is enabled by the proliferation for low-power and lossy networks (RPL) routing protocol.
of smart sensors and actuators, radio frequency identification, Therefore, it enables low-power wireless technology for the
cloud computing, and the emergence of new appropriate Industrial Internet of Things (IIoT) [12] [13]. TSCH has many
protocols and technologies that allow the communication every deployment topologies such as star topology, tree topology,
time and everywhere [1]. The IoT provides smart and seamless partial or mesh topology [3].
services to the end user without human intervention nor any Despite the growth potential of TSCH mode, the TSCH
interruption [2]. The authors in [1] define the IoT as follows: scheduling faces many problems. The latter are mainly related
”The Internet of Things is a set of heterogeneous connected to the shared link nature of TSCH scheduling, full collision
devices that collaborate with the Internet of services via the that occurs at the network boostrap, conflict links problem
communication protocols. The communication protocols are etc. This survey attempts to identify these problems and help
importantly dedicated to the IoT devices’ constraints. Mainly, readers (or implementer) in solving them, and thus, creating
this collaboration aims to offer services needed by the end a reliable TSCH communications. We also reviews some of
user. The IoT’s services are largely deployed and have the full the emerging scheduling solutions that use intelligent machine
potential to cover diverse domains.”. learning techniques for better and reliable network.
The IEEE 802.15.4e standard [3] is developed to overcome We note that in state-of-the-art there are only few published
the limitations of IEEE 802.15 such as unbounded delay and surveys that try to address scheduling issues for IoT in general
absence of channel diversity, which might be detrimental for and only fewer for TSCH. This survey differs from the other
the user experience in various applications such as video surveys in highlighting the artificial intelligence solutions in
streaming [4]–[6]. The IEEE 802.15.4e presents time slotted creating a reliable TSCH scheduling. It also highlights the
(or synchronized) channel hopping (TSCH) mode dedicated main TSCH scheduling requirements, so the researchers avoid
for wireless sensor devices [7] with tiny resources (e.g., beforehand the common problems while designing the TSCH
computation resources, low power, etc.). This mode is the most scheduling.
practical media access control (MAC) sub-layer protocol as it The remainder of the paper is organized as follows. Sec-
is well-designed to be implemented in IoT’s critical appli- tion 1 describes the TSCH mode. Section 2 outlines the

978-1-7281-9656-5/20/$31.00 ©2020 IEEE

0331

Authorized licensed use limited to: National University of Singapore. Downloaded on May 25,2021 at 07:59:16 UTC from IEEE Xplore. Restrictions apply.
n0
PAN Slot Frame Size Slot Frame Size
Coordinator
Time Slots

Time Slot 3

Time Slot 3
Time Slot 0

Time Slot 1

Time Slot 2

Time Slot 0

Time Slot 1

Time Slot 2
0 1 2 3 4
n1 n2
n3 → n 1 n7 → n 5
Channels Offsets

0
n8 → n 6 n8 → n 6

1 n5 → n 2 n5 → n 2
n3 n4 n5 n6

2 n2 → n 0 n4 → n 1 n2 → n 0
ASN: 0 1 2 3 4 5 6 7
n7 n8

Fig. 2. TSCH slot frame [16].


Fig. 1. Scheduling process in IEEE 802.15.4e TSCH [16].

can change its frequency (denoted by F req) randomly from


main problems of TSCH scheduling. Section 3 discusses existing frequency band in TSCH following this formula [3]:
the essential rules to construct an efficient TSCH scheduling
for critical applications. The recent related work based on  
intelligent and machine learning techniques, that contribute to F req = F (ASN + ChannelOffset) mod NChannels , (1)
create a reliable MAC layer on TSCH while solving some of Where ChannelOffset, ASN, NChannels , and F are the
the scheduling problem, are detailed in Section 4. Section 5 identification of a channel, the absolute slot number, the
concludes the work. total number of allowable channels, and the lookup function,
respectively. We note that NChannels can be less than 16 when
II. IEEE 802.15.4 E TSCH M ODE
some channels are subjected to external interference.
TSCH benefits from the capabilities of time slotted ac- Table I explains the main equations of TSCH in the schedul-
cess, multiple channels, and channel hopping to increase the ing process.
network throughput and reduce the packets’ latency. TSCH
scheduling consists of a matrix of cells (or links), each link is C. TSCH Network Formation
defined by a channel offset and a time slot. A link can be either TSCH uses logical link control (LLC) approach to control
dedicated or shared. Fig.1 shows an example of TSCH network how the network is formed, i.e., how a new node joins the
with a tree topology (right) with a possible link schedule in network, how existing nodes advertise their presence in the
a scheduling table (left). As depicted in Fig. 1, a dedicated network, etc. LLC requires enhanced beacon (EB) frames
link (e.g., link [0,4]) allows only one communication to be which are transmitted periodically by all nodes for the network
arranged, while a shared link (e.g., link [1,3]) allows more advertisement. EB frames contain the necessary information
than one transmission to be scheduled [3] [14] [15]. for the network advertisement like channel hopping, time slot,
synchronisation, and slot frame information. New nodes that
A. TSCH Slot Frame are joining the network listen first for any EB transmission
A slot frame [3] consists of a set of time slots that is by nearby nodes. Once these nodes receive the EB frame,
repeated continuously in each cycle of time. The TSCH uses they synchronize to the slot frame of the network, and hence,
the slot frame to ensure synchronized network connection. completing their joining procedure. The EB frame informs
Each slot is assigned to the network nodes in dedicated or the new nodes about the shared cell position for network
shared manner [14] [17]. Fig. 2 shows an example of a slot bootstrapping. The shared cell allows all broadcast traffic and
frame in TSCH. During the network creation, TSCH defines bootstrapping (i.e, joining) unicast traffic to be transmitted
a time slot, so-called absolute slot number (ASN), which is following a slotted aloha mechanism [3] [13] [15] [16].
initialized to zero, and then it increments by one at each The Broadcast traffic refers to EB frames and routing proto-
time slot as follows: ASN = (k × S + t). k is the slot col overhead. The 6TiSCH defines RPL as a routing protocol,
frame cycle, S is the slot frame size, and t is the slot offset. that is determined for multi-hop transmission. For constructing
For each time slot t, the set of available channels will be an upward routing, the RPL uses DODAG information object
assigned pseudo-randomly and the scheduling table tells which (DIO) packets for creating a directed acyclic graph. Once
neighbor node to communicate with and on which channel nodes joint the network, they start transmitting EBs and DIOs
offset. A time slot is an enough period of time (is typically 10 in the slotted aloha shared cell [13].
ms long) [17] [18] for transmitting a MAC frame, receiving
an acknowledgement packet following a successful packet D. TSCH Scheduling Main Constraints
reception, packet processing, radio turnaround, and security Links in IEEE 802.15.4e networks are half duplex [3]. This
procedure [15] [17]. means a node cannot transmit and receive during the same time
slot, and receive from multiple nodes during the same time slot
B. TSCH Channel Hopping even if the transmission is on different frequency bands [19].
By default, scheduling in TSCH specifies the frequency and This problem introduces conflict links problem such as links
time slots for each link of a node. For each time slot, a node [1,0] and [2,0] depicted in Fig. 1.

0332

Authorized licensed use limited to: National University of Singapore. Downloaded on May 25,2021 at 07:59:16 UTC from IEEE Xplore. Restrictions apply.
TABLE I
TSCH MAIN EQUATIONS

Equations Explanation
K: Slot frame cycle
ASN = (k × S + t) S: Slot frame size
t: Slot offset

  ASN: Absolute Slot number


F req = F (ASN + ChannelOffset) mod NChannels F : Lookup function
ChannelOffset: Channel offset
NChannels : Total number of allowable channels

the network’s throughput and the end-to-end packet delay


(network latency) [18] [21].
• A node should not receive and transmit at the same time
n7 n5 n6 n8
slot; a scheduled TSCH should be free from conflicting
links [19].
• The hidden nodes problem should be stamped out by
exploiting different channels during the same time slot or
Fig. 3. Hidden nodes problem in IEEE 802.15.4e TSCH use different time slots on the same frequency band [19].
. • The critical packets should be delivered to their desti-
nation (hop-to-hop or end-to-end) within the appropriate
deadline (the countermeasures should be applied before
In TSCH, shared links allow more than one communication the deadline) [15] [19].
to share the same link. The hidden node problem occurs when • The maximization of parallel transmissions during each
two pairs of sender-receiver nodes are scheduled in the same time slot as much as we can [19].
link and the receiving nodes belong to the same (or with some • The EBs transmission cells should be scheduled such
overlap in their ranges) range of each other while the sending that these cells should minimize the joining time of new
nodes are out of the range of each other. Sending packets at the nodes and without creating collisions [22]. The proposed
same time slot and on the same frequency alters the received solution that should be taken into consideration is fixing
signal quality as described in previous studies [18] [19]. Fig. 3 the number of EB transmission cells in the scheduling
illustrates the hidden node problem described above. according to the number of the advertising nodes in
As mentioned in Section II-C, EB frames are essential for which:
network advertisement. The scheduling of EB transmissions 1) The collisions created by EB packet are minimized
influences on the joining time of new nodes, and the power as much as possible, and the joining time of new
consumption of both advertising nodes and new joining nodes. nodes is reduced [22].
Because the shared link (designed for transmitting EBs) allows 2) The number of EB cells will not influence on the
all neighboring nodes to transmit EBs at the same time, network communication cells [22].
collisions most probably occur. Another interesting problem
arises during the network advertisement phase, when more III. R EVIEW OF E MERGING S CHEDULING T ECHNIQUES IN
nodes join the network, the EBs and DIOs packets start IEEE 802.15.4 E TSCH
crowding the slotted aloha cell, which prevents new nodes Ke Shi et al. [19] introduced a centralized MAC sub-
to join the network [13]. layer scheduling scheme for TSCH networks with a mesh
topology. The proposed scheme focuses on scheduling mul-
E. TSCH Scheduling Requirements
tiple concurrent periodic flows in real-time. To provide more
To ensure a reliable scheduling in TSCH mode, the proposed chances to transmit high-priority flows during each time slot,
scheduling techniques [1] should take into consideration the a maximum matching algorithm is utilized to find conflict-
following rules: free links. As for the frequency allocation, a graph coloring
• Exploitation of multi-channel and channel-hopping capa- is implemented to make final selected links interference free.
bilities for better channels allocation [20]. The proposed solution is implemented and compared to other
• Allocation of network bandwidth resources to nodes existing algorithms. Simulation results show enhancements in
should be according to the requirement of data traf- terms of the deadline satisfaction ratio with a similar radio
fic [20]. duty cycle.
• Adjustment of the number of time slots per-slot frame Mei Meng et al. [20] proposed a matching scheduling
in which the slot frame size will not influence negatively algorithm (MSA) that selects a set of non-conflicting nodes

0333

Authorized licensed use limited to: National University of Singapore. Downloaded on May 25,2021 at 07:59:16 UTC from IEEE Xplore. Restrictions apply.
according to a matching rule. The MSA comprises of a set exclusion (LME). Mutual exclusion is executed to prohibit
of cycles . During the first cycle, the non-conflicting nodes colliding nodes from sharing a common channel at the same
are marked by a deep color and the appropriate links of time. To achieve this goal, when sender-receiver nodes assign a
the selected nodes are arranged in the first time slot. Once new communication link, a receiver node notifies its neighbors
the first cycle terminates, the colored nodes are removed about the reserved cells.
from the tree and the scheduling table is updated by adding Kieu-Ha Phung et al. [29] presented reinforcement learn-
the first time slot information. During the second cycle, the ing (RL) based scheduling solution to ensure traffic-adaptive
update of the scheduling table is built based on the same schedule for every node. The mechanism solves the prob-
coloring mechanism executed on the updated tree. Therefore, lem of increasing traffic demand from the already existing
in each new cycle a new time slot is exploited. The same nodes or additional data traffic from the new joined nodes.
authors improved the initial algorithm MSA by suggesting an The proposed solution also achieves collision-free parallel
optimized scheduling algorithm (OSA). The main idea of OSA transmissions over different channels, and thus, provides high
is that at each new cycle, it first colors the non-conflicting leaf throughput and high delivery ratio. It also meets the energy
nodes to minimize the latency time of transmitting data. When efficiency requirements of nodes.
the number of cycles increases, the number of time slots in The authors in [25] proposed a Q-learning MAC protocol
the slot frame increases as well, which increases the packet (QL-MAC). QL-MAC adjusts the active period and the radio
latency. sleeping period based on the prediction of data traffic and
The authors in [13] focused on the bootstrapping protocol neighboring nodes’ transmission state. It enables the self-
that authorizes a new node to join the network. They adopt a adjustment of the duty cycle of wireless sensors networks
Bayesian Broadcast Algorithm proposed in [23] to adjust the (WSN) nodes.
probability of transmission of EB, DIO, and bootstrap frames A self-organising RL approach for scheduling the wake-up
in order to reduce the contention and stabilize slotted Aloha. cycles of nodes in a WSN is proposed in [26]. The learning
Advertisement time slot partitioning (ATP) is proposed process authorizes nodes to compete for the radio channel
in [22] to increase the EB transmissions without increasing to desynchronize so that collisions and radio interference are
advertisement cells and decreasing the network bandwidth reduced. The wake-up schedules of forwarding nodes (that
resources for network’s communication. The key purpose of construct the path to the final destination) need to communi-
ATP technique is to reduce the EB packet’s size, and also, cate for increasing the network throughput. In order to avoid
the considerable amount of unexploited time (e.g., frame radio interference and packet losses, neighboring nodes are
acknowledgement) by omitting the advertisement slot. Since desynchronised.
the EB size is reduced, the packet transmission time (denoted Orchestra is a node-based scheduling mechanism proposed
by macTsMaxTx) in the advertisement cells is replaced by the in [28]. The scheduling table is built based on a the random-
maximum transmission time of an EB (denoted by macEBTx). ization of a hash function. This technique is keen on assigning
ATP scheme increases the EB transmissions as it divides each a unique cell for reception or transmission when the size of
time slot into sub-slots; a sub-slot is a compressed time slot the slot frame is larger than the number of deployed nodes. It
version that allows the transmission of only one EB. defines three types of slot frame: broadcast-, BE-, and unicast-
A full collision phenomenon can be generated from EB slot frames. In Orchestra, channel offset zero is assigned for
transmitted by neighbors of a node. This type of collisions EB slot frame, channel offset one is arranged for broadcast
between EBs can seriously affect the energy consumption of slot frame, and channel offset two is exploited by unicast slot
nodes and network’s performance. The proposed EB schedul- frame.
ing methods in the literature are based on randomness, the Autonomous link-based cell scheduling algorithm (ALICE),
authors in [9] have shown that creating the EB transmission designed for RPL routing, is proposed in [27]. It uses multi-
schedule based on randomness may lead to a probability ple channels simultaneously without additional overhead. It
(denoted by P) of full collisions (i.e., P(full collision in a exploits traffic direction operations, routing, and slot frame to
single cell) + P(full collision in multiple cells)). To solve this prevent downstream and upstream from altering each other.
problem, the authors proposed a collision-free advertisement ALICE scheme shows an enhancement in terms of end-to-end
scheduling (CFAS). Each advertiser autonomously performs latency, RPL parent changes, radio duty-cycle, and reliability
EB scheduling without negotiating with its neighbors. On compared to the Orchestra.
one hand, CFAS completely eliminates collisions either when Table II classifies and summarize the discussed scheduling
nodes are fixed or mobile. On the other hand, when the techniques according to methods applied for building EB and
number of advertisers increases, this may lead to the increase performing scheduling process.
of advertisement cells in the slot frame. This last problem is Table III summarizes the advantages and drawbacks of the
solved by integrating the ATP technique to the CFAS. discussed techniques.
The authors in [24] improved the distributed scheduling
algorithms to create efficient TSCH schedules along RPL IV. C ONCLUSION AND F UTURE W ORK
routes. The proposed scheme limits the allocation of identical TSCH exploits time slot channel operation capability with
cells to colliding nodes. The idea is based on local mutual time slotted medium access. The time slotted channel access

0334

Authorized licensed use limited to: National University of Singapore. Downloaded on May 25,2021 at 07:59:16 UTC from IEEE Xplore. Restrictions apply.
TABLE II
S CHEDULING TECHNIQUES IN TSCH. RL: REINFORCEMENT LEARNING ALGORITHMS , MA: MATCHING ALGORITHMS , CA: COLORING ALGORITHMS ,
BN: BAYESIAN NETWORKS , OIA: OTHER INTELLIGENT ALGORITHMS , C/D: C ENTRALIZED /D ECENTRALIZED MAC PROTOCOL , F: HIGHLY FLEXIBLE TO
TOPOLOGY CHANGES , SD: SENSED DATA TRAFFIC , EB: E NHANCED B EACON .

Proposals Techniques Topology C/D SD/EB scheduling


Ke Shi et al. [19] MA & CA mesh C SD
Meng, Mei, et al. [20] MA & CA mesh D SD
Vučinić, M., et al. [13] BN RPL D EB
Rivest, R. [23] BN - D EB
Karalis, A. [22] OIA - C EB
Apostolos Karalis et al. [9] OIA mobile topology D EB
Ali Fahs et al. [24] OIA RPL D EB
Savaglio, Claudio,. et al. [25] RL D F SD
Mihaylov, Mihail, et al. [26] RL Tree D SD
Kim, S., et al. [27] OIA Tree/RPL D SD
Simon Duquennoy et al. [28] OIA RPL D SD
Kieu-Ha Phung et al. [29] RL Tree D SD

TABLE III
A DVANTAGES AND DRAWBACKS OF SCHEDULING TECHNIQUES IN TSCH

Techniques Advantages AND drawbacks


Ke Shi et al. [19] Prioritizes critical flows
Ensures collision-free links
Meng Mei, et al. [20] Suffers from increased time delay and number of
(MSA) channels when the network size increases.
Meng Mei, et al. [20] (OSA) Reduces packets latency compared to MSA
Apostolos Karalis [22] Exploits bandwidth resources
Increases EB transmissions without influencing the data traffic
Apostolos Karalis et al. [9] (CFAS) Ensures a collision-free advertisement scheduling
Ali Fahs et al. [24] Provides collision free links
Mihaylov, Mihail, et al. [26] Reduces collisions and radio interference
Simon Duquennoy et al. [28] Suffers from the hidden node problem
(orchestra) Does not exploit the bandwidth resources
Kim, Seohyang, et al. [27] Outperforms orchestra in terms of: reliability, end-to-end latency,
RPL parent changes and radio duty-cycle

Kieu-Ha Phung et al. [29] Provides high throughput and high delivery ratio
Meets the energy efficiency requirements of nodes

nature allows TSCH to ensure efficient critical applications V. ACKNOWLEDGEMENT


performance, that are deployed in harsh environments. Chan-
nel hopping mode mitigates multi-path fading and external This research work is partial supported by UAEU/UPAR
interference with other devices (e.g., WIFI devices) on the 2.4 Grant 31T102-UPAR -1- 2017.
GHz frequency band. However, the scheduling in TSCH has
some serious problems that should be addressed. In this survey, R EFERENCES
we exposed TSCH scheduling mode on channel hopping MAC [1] S. Hammoudi, Z. Aliouat, and S. Harous, “Challenges and research
for low power wireless networks. We highlighted the main directions for internet of things,” Telecommunication Systems, vol. 67,
scheduling problems of TSCH and the main requirements that no. 2, pp. 367–385, 2018.
[2] M. A. Rahman and A. T. Asyhari, “The emergence of internet of things
should be ensured to realise highly reliable communications. (iot): Connecting anything, anywhere,” 2019.
We also discussed recent emerging scheduling techniques [3] “Ieee standard (2015) ieee standard for low-rate wireless networks,”
that is based on intelligent algorithms for reliable and better IEEE Std 802.15.4 TM-2015, 2015.
network performance. [4] A. Bentaleb, B. Taani, A. C. Begen, C. Timmerer, and R. Zimmermann,
“A survey on bitrate adaptation schemes for streaming media over http,”
Based on TSCH scheduling main constraints and TSCH IEEE Communications Surveys & Tutorials, vol. 21, no. 1, pp. 562–585,
scheduling requirements described in section II-D and II-E, 2018.
[5] A. Bentaleb, A. C. Begen, R. Zimmermann, and S. Harous, “Sdnhas:
we aim to create a new, efficient scheduling technique based An sdn-enabled architecture to optimize qoe in http adaptive streaming,”
on reinforcement learning algorithms to fulfill all TSCH IEEE Transactions on Multimedia, vol. 19, no. 10, pp. 2136–2151, 2017.
requirements and respect all its constraints. The next proposed [6] A. Bentaleb, A. C. Begen, and R. Zimmermann, “Sdndash: Improving
qoe of http adaptive streaming using software defined networking,” in
TSCH schedule will essentially respect the harsh environments Proceedings of the 24th ACM international conference on Multimedia,
constraints to convey critical packets before the deadline. pp. 1296–1305, 2016.

0335

Authorized licensed use limited to: National University of Singapore. Downloaded on May 25,2021 at 07:59:16 UTC from IEEE Xplore. Restrictions apply.
[7] S. Hammoudi, S. Harous, and Z. Aliouat, “External interference free sensor networks: A complete design and performance evaluation,” Ad
channel access strategy dedicated to tsch,” in 2018 IEEE International Hoc Networks, vol. 26, pp. 88–102, 2015.
Conference on Electro/Information Technology (EIT), pp. 0350–0355,
IEEE, 2018.
[8] I. L. BRIEF, “Internet of things,” 2019.
[9] A. Karalis, D. Zorbas, and C. Douligeris, “Collision-free advertisement
scheduling for ieee 802.15. 4-tsch networks,” Sensors, vol. 19, no. 8,
p. 1789, 2019.
[10] ANSI/ISA, “Ansi/isa-100.11a-2011 wireless systems for industrial au-
tomation: Process control and related applications.,” 2011.
[11] IEC, “Industrial communication networks wireless communication net-
work and communication profiles wirelesshart.,” 2010.
[12] X. Vilajosana, T. Watteyne, T. Chang, M. Vučinić, S. Duquennoy, and
P. Thubert, “Ietf 6tisch: A tutorial,” IEEE Communications Surveys &
Tutorials, 2019.
[13] M. Vučinić, T. Watteyne, and X. Vilajosana, “Broadcasting strategies
in 6tisch networks,” Internet Technology Letters, vol. 1, no. 1, p. e15,
2018.
[14] R. Teles Hermeto, A. Gallais, and F. Theoleyre, “On the (over)-reactions
and the stability of a 6tisch network in an indoor environment,” in
Proceedings of the 21st ACM International Conference on Modeling,
Analysis and Simulation of Wireless and Mobile Systems, pp. 83–90,
2018.
[15] S. Hammoudi, Z. Aliouat, and S. Harous, “Enhanced time-slotted
channel hopping,” Transactions on Emerging Telecommunications Tech-
nologies, p. e3638, 2018.
[16] D. De Guglielmo, S. Brienza, and G. Anastasi, “Ieee 802.15. 4e: A
survey,” Computer Communications, vol. 88, pp. 1–24, 2016.
[17] N. T. Javan, M. Sabaei, and V. Hakami, “Ieee 802.15. 4. e tsch-based
scheduling for throughput optimization: A combinatorial multi-armed
bandit approach,” IEEE Sensors Journal, vol. 20, no. 1, pp. 525–537,
2019.
[18] S. Hammoudi, S. Harous, Z. Aliouat, and L. Louail, “Time slotted
channel hopping with collision avoidance,” International Journal of Ad
Hoc and Ubiquitous Computing, vol. 29, no. 1-2, pp. 85–102, 2018.
[19] K. Shi, L. Zhang, Z. Qi, K. Tong, and H. Chen, “Transmission schedul-
ing of periodic real-time traffic in ieee 802.15. 4e tsch-based industrial
mesh networks,” Wireless Communications and Mobile Computing,
vol. 2019, 2019.
[20] M. Meng, Z. Yujun, Z. Dadong, and C. Fan, “Scheduling for data trans-
mission in multi-hop ieee 802.15. 4e tsch networks,” Mobile Networks
and Applications, vol. 23, no. 1, pp. 119–125, 2018.
[21] J.-H. Kwon, E.-J. Kim, J. Park, Y. Lim, Y.-S. Kim, and D. Kim, “Impact
of slotframe length on end-to-end delay in ieee 802.15. 4 tsch network,”
in 2019 IEEE International Conference on Consumer Electronics-Asia
(ICCE-Asia), pp. 111–112, IEEE, 2019.
[22] A. Karalis, “Atp: A fast joining technique for ieee802. 15. 4-tsch
networks,” in 2018 IEEE 19th International Symposium on” A World of
Wireless, Mobile and Multimedia Networks”(WoWMoM), pp. 588–599,
IEEE, 2018.
[23] R. Rivest, “Network control by bayesian broadcast,” IEEE Transactions
on Information Theory, vol. 33, no. 3, pp. 323–328, 1987.
[24] A. J. Fahs, R. Bertolini, O. Alphand, F. Rousseau, K. Altisen, and
S. Devismes, “Collision prevention in distributed 6tisch networks,” in
2017 IEEE 13th International Conference on Wireless and Mobile
Computing, Networking and Communications (WiMob), pp. 1–6, IEEE,
2017.
[25] C. Savaglio, P. Pace, G. Aloi, A. Liotta, and G. Fortino, “Lightweight
reinforcement learning for energy efficient communications in wireless
sensor networks,” IEEE Access, vol. 7, pp. 29355–29364, 2019.
[26] M. Mihaylov, Y.-A. Le Borgne, K. Tuyls, and A. Nowé, “Decentralised
reinforcement learning for energy-efficient scheduling in wireless sen-
sor networks,” International Journal of Communication Networks and
Distributed Systems, vol. 9, no. 3-4, pp. 207–224, 2012.
[27] S. Kim, H.-S. Kim, and C. Kim, “Alice: autonomous link-based cell
scheduling for tsch,” in Proceedings of the 18th International Conference
on Information Processing in Sensor Networks, pp. 121–132, 2019.
[28] S. Duquennoy, B. Al Nahas, O. Landsiedel, and T. Watteyne, “Orchestra:
Robust mesh networks through autonomously scheduled tsch,” in Pro-
ceedings of the 13th ACM conference on embedded networked sensor
systems, pp. 337–350, 2015.
[29] K.-H. Phung, B. Lemmens, M. Goossens, A. Nowe, L. Tran, and
K. Steenhaut, “Schedule-based multi-channel communication in wireless

0336

Authorized licensed use limited to: National University of Singapore. Downloaded on May 25,2021 at 07:59:16 UTC from IEEE Xplore. Restrictions apply.
View publication stats

You might also like