The envisioned Internet of Things (IoT) will involve a massive deployment of objects connected through wireless cells. While commercial solutions are already available, the fundamental limits of such networks in terms of node density, achievable rates or reliability are not known. To address this question, this paper uses a large scale Multiple Access Channel (MAC) to model IoT nodes randomly distributed over the coverage area of a unique base station. The traffic is represented by an information rate spatial density ρ(x). This model, referred to as the Spatial Continuum Multiple Access Channel, is defined as the asymptotic limit of a sequence of discrete MACs. The access capacity region of this channel is defined as the set of achievable information rate spatial densities achievable with vanishing transmission errors and under a sum-power constraint. Simulation results validate the model and show that this fundamental limit theoretically achievable when all nodes transmit simultaneously over an infinite time, may be reached even with a relatively small number of simultaneous transmitters (typically around 20 nodes) which gives credibility to the model. The results also highlight the potential interest of non-orthogonal transmissions for IoT uplink transmissions when compared to an ideal time sharing strategy.
more »
« less
Through the Soil Long Range Wireless Power Transfer for Agricultural IoT Networks
Increasing the spatial and temporal density of data using networked sensors, known as the Internet of Things (IoT), can lead to enhanced productivity and cost savings in a host of industries. Where applications involve large outdoor expanses, such as farming, oil and gas, or defense, large regions of unelectrified land could yield significant benefits if instrumented with a high density of IoT systems. The major limitation of expanding IoT networks in such applications stems from the challenge of delivering power to each sensing device. Batteries, generators, and renewable sources have predominately been used to address the challenge, but these solutions require constant maintenance or are sensitive to environmental factors. This work presents a novel approach where conduction currents through soil are utilized for the wireless powering of sensor networks, initial investigation is within an 0.8-ha (2-acre) area. The technique is not line-of-sight, powers all devices simultaneously through near-field mechanics, and has the ability to be minimally invasive to the working environment. A theory of operation is presented and the technique is experimentally demonstrated in an agricultural setting. Scaling and transfer parameters are discussed.
more »
« less
- Award ID(s):
- 2226612
- PAR ID:
- 10437482
- Editor(s):
- Kuperman, Alon
- Date Published:
- Journal Name:
- IEEE Transactions on Industrial Electronics
- ISSN:
- 0278-0046
- Page Range / eLocation ID:
- 1 to 10
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Mobility tracking of IoT devices in smart city infrastructures such as smart buildings, hospitals, shopping centers, warehouses, smart streets, and outdoor spaces has many applications. Since Bluetooth Low Energy (BLE) is available in almost every IoT device in the market nowadays, a key to localizing and tracking IoT devices is to develop an accurate ranging technique for BLE-enabled IoT devices. This is, however, a challenging feat as billions of these devices are already in use, and for pragmatic reasons, we cannot propose to modify the IoT device (a BLE peripheral) itself. Furthermore, unlike WiFi ranging - where the channel state information (CSI) is readily available and the bandwidth can be increased by stitching 2.4GHz and 5GHz bands together to achieve a high-precision ranging, an unmodified BLE peripheral provides us with only the RSSI information over a very limited bandwidth. Accurately ranging a BLE device is therefore far more challenging than other wireless standards. In this paper, we exploit characteristics of BLE protocol (e.g. frequency hopping and empty control packet transmissions) and propose a technique to directly estimate the range of a BLE peripheral from a BLE access point by multipath profiling. We discuss the theoretical foundation and conduct experiments to show that the technique achieves a 2.44m absolute range estimation error on average.more » « less
-
NA (Ed.)In this paper, we present a method for decoding uplink messages in Internet of Things (IoT) networks that employ packet repetition. We focus on the Sigfox protocol, but our approach is applicable to other IoT protocols that employ message repetition. Our approach endeavors to enhance the reliability of message capture as well as the error rate performance at the base station. To achieve this goal, we propose a novel technique that capitalizes on the unique features of the IoT network’s uplink transmission structure. Through simulations, we demonstrate the effectiveness of our method in various scenarios, including single-user and multi-user setups. We establish the resilience of our approach under higher system loads and interference conditions, showcasing its potential to improve IoT network performance and reliability even when a large number of devices operates over limited spectrum. Our findings reveal the potential of the proposed method as a promising solution for enabling more dependable and energy-efficient communication in IoT Low Power Wide Area Networks.more » « less
-
In Internet of Things (IoT) applications requiring parameter estimation, sensors often transmit quantized observations to a fusion center through a wireless medium where the observations are susceptible to unauthorized eavesdropping. The fusion center uses the received data to estimate desired parameters. To provide security to such networks, some low complexity encryption approaches have been proposed. In this paper, we generalize those approaches and present an analysis of their estimation and secrecy capabilities. We show that the dimension of the unknown parameter that can be efficiently estimated using an unbiased estimator when using these approaches, is upper bounded. Assuming that an unauthorized eavesdropper is aware of the low complexity encryption process but is unaware of the encryption key, we show successful eavesdropping, even with a large number of observations, is impossible with unbiased estimators and independent observations for these approaches. Numerical results validating our analysis are presented.more » « less
-
There has been a booming demand for integrating Convolutional Neural Networks (CNNs) powered functionalities into Internet-of-Thing (IoT) devices to enable ubiquitous intelligent "IoT cameras". However, more extensive applications of such IoT systems are still limited by two challenges. First, some applications, especially medicine-and wearable-related ones, impose stringent requirements on the camera form factor. Second, powerful CNNs often require considerable storage and energy cost, whereas IoT devices often suffer from limited resources. PhlatCam, with its form factor potentially reduced by orders of magnitude, has emerged as a promising solution to the first aforementioned challenge, while the second one remains a bottleneck. Existing compression techniques, which can potentially tackle the second challenge, are far from realizing the full potential in storage and energy reduction, because they mostly focus on the CNN algorithm itself. To this end, this work proposes SACoD, a Sensor Algorithm Co-Design framework to develop more efficient CNN-powered PhlatCam. In particular, the mask coded in the Phlat-Cam sensor and the backend CNN model are jointly optimized in terms of both model parameters and architectures via differential neural architecture search. Extensive experiments including both simulation and physical measurement on manufactured masks show that the proposed SACoD framework achieves aggressive model compression and energy savings while maintaining or even boosting the task accuracy, when benchmarking over two state-of-the-art (SOTA) designs with six datasets across four different vision tasks including classification, segmentation, image translation, and face recognition. Our codes are available at: https://github.com/RICE-EIC/SACoD.more » « less