2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2016
DOI: 10.1109/ipsn.2016.7460663
|View full text |Cite
|
Sign up to set email alerts
|

CrossZig: Combating Cross-Technology Interference in Low-Power Wireless Networks

Abstract: International audience—Low-power wireless devices suffer notoriously from Cross-Technology Interference (CTI). To enable coexistence , researchers have proposed a variety of interference mitigation strategies. Existing solutions, however, are designed to work with the limitations of currently available radio chips. In this paper, we investigate how to exploit physical layer properties of 802.15.4 signals to better address CTI. We present CrossZig, a cross-layer solution that takes advantage of physical layer i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(20 citation statements)
references
References 38 publications
0
20
0
Order By: Relevance
“…Those works focus on the following 4 directions: (i) interference cancellation [5,7,8,13,24,39,41] captures (crosstechnology) interference and remove it by using high power and high sampling-rate SDR. (ii) Corruption recovery retransmits the corrupted part whenever there exists interference [15] or makes Zig-Bee packets more robust via coding [22,26]. However, corruption recovery sacrifices spectrum and energy.…”
Section: Related Workmentioning
confidence: 99%
“…Those works focus on the following 4 directions: (i) interference cancellation [5,7,8,13,24,39,41] captures (crosstechnology) interference and remove it by using high power and high sampling-rate SDR. (ii) Corruption recovery retransmits the corrupted part whenever there exists interference [15] or makes Zig-Bee packets more robust via coding [22,26]. However, corruption recovery sacrifices spectrum and energy.…”
Section: Related Workmentioning
confidence: 99%
“…When the system also cannot be scheduled, SAA then reallocates slots to accelerate the transmission speed of unscheduled flows until the flows can be scheduled (lines 14-21). Finally, SAA updates l i and returns L the set of nodes that need to be replaced (lines [22][23]. The theorem is as follows.…”
Section: Saamentioning
confidence: 99%
“…As a solution, TIIM [13] extracts features from corrupted packets to quantify the interference conditions instead of identifying the interferer, thereby, the interference condition can be mapped to a specific mitigation technique. Nonetheless, TIIM does not present an implementation of these mitigation techniques; only in their follow up work, CrossZig [8], the authors have implemented an adaptive packet recovery and an adaptive FEC coding for this. All these solutions, however, are reactive, depending on the prevailing channel conditions, and do not aim to predict the white spaces through modeling, which is instead our goal in this paper.…”
Section: Related Workmentioning
confidence: 99%