Adc Paper
Adc Paper
Adc Paper
December 3, 2018.
Digital Object Identifier 10.1109/ACCESS.2018.2879189
ABSTRACT The proliferation of embedded systems, wireless technologies, and Internet protocols have
enabled the Internet of Things (IoT) to bridge the gap between the virtual and physical world through
enabling the monitoring and actuation of the physical world controlled by data processing systems. Wireless
technologies, despite their offered convenience, flexibility, low cost, and mobility pose unique challenges
such as fading, interference, energy, and security, which must be carefully addressed when using resource-
constrained IoT devices. To this end, the efforts of the research community have led to the standardization
of several wireless technologies for various types of application domains depending on factors such as
reliability, latency, scalability, and energy efficiency. In this paper, we first overview these standard wireless
technologies, and we specifically study the MAC and physical layer technologies proposed to address
the requirements and challenges of wireless communications. Furthermore, we explain the use of these
standards in various application domains, such as smart homes, smart healthcare, industrial automation,
and smart cities, and discuss their suitability in satisfying the requirements of these applications. In addition
to proposing guidelines to weigh the pros and cons of each standard for an application at hand, we also
examine what new strategies can be exploited to overcome existing challenges and support emerging IoT
applications.
INDEX TERMS Internet of Things, IEEE 802.15.4, Bluetooth, Physical layer, Medium Access Control,
coexistence, mesh networking, cyber-physical systems, WSN, M2M
I. INTRODUCTION
The Internet of Things (IoT) [1] refers to the inter-networking
of everyday objects that are equipped with sensing, com-
putation, and communication capabilities. These networks
can collaboratively interact and perform a variety of tasks
autonomously. IoT promises to play a remarkable role in
diverse application domains, such as smart homes [2], med-
ical care [3], [4], industrial automation [5], [6], intelli-
gent transportation [7], [8], resource management [9], smart
cities [10], [11], and energy management [12], [13], as shown
in Figure 1. For example, in a smart home application,
based on user prescribed settings, different monitoring and
control tasks are carried out by smart sensors and actua-
tors, such as the heating control system, air-condition mon- FIGURE 1. Applications of IoT in different domains.
itoring, and fire alarms. Closely related to the IoT are
Machine-to-Machine (M2M) communication [14], Wireless
Sensor Networks (WSNs) [15], Wireless Personal Area Net- The entire vision of the IoT surrounds the concept of
works (WPANs) [16] Wireless Sensors and Actuators Net- communication among smart objects, enabling them to see,
works (WSANs) [17], [18], and Cyber-Physical Systems hear, think, act, and talk to one another to make smart deci-
(CPSs) [19], [20], which are application-dependent terms. sions. It fundamentally embeds intelligence into the objects
2169-3536 2018 IEEE. Translations and content mining are permitted for academic research only.
VOLUME 6, 2018 Personal use is also permitted, but republication/redistribution requires IEEE permission. 67893
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
A. Nikoukar et al.: Low-Power Wireless for the Internet of Things: Standards and Applications
FIGURE 9. BR/EDR, BLE, IEEE 802.15.4, and IEEE 802.11 sharing 2.4 GHz frequency band.
required. After that, it reverts to primary BR/EDR radio to would be free of noise. In Bluetooth v1.2, AFH added a
save power. technique that blacklists the channels based on traffic load as
good or bad channels. This minimizes the chance of collision
1) BR/EDR RADIO by only performing transmission in the good channels.
The radio operates on the 2.4 GHz ISM band at frequencies
between 2402 to 2480 MHz. It uses Gaussian Frequency 2) NETWORK TOPOLOGY
Shift Keying (GFSK) modulation with three output power In BR/EDR, devices communicate in a network called a
classes: class one has the maximum output power 100 mW piconet. A piconet is a star based topology, in which a node
and achieving communication range 100 m, class two and can only communicate with a central node called master and
class three support output power 2.4 mW and 1 mW, respec- the others are called slaves. In the master node, the built-in
tively. The communication range of class two and class clock is responsible for synchronizing master-slaves commu-
three is almost 10 m. Power classification improves energy nication. The slave nodes receive an inquiry message from
efficiency and avoids interference with other networks by the master node to identify the address and clock phase. With
reducing the communication range. For example, a few meter this information, the slave nodes can compute the channel
communication ranges satisfy the user requirement for Blue- hopping sequence to identify when and on what channel
tooth headphones and a smartphone. Lowering the signal to listen. The slaves can only initiate communication after
propagation range reduces noise for other wireless networks receiving permission from the master node. There are two
in the vicinity. The physical channel is subdivided into 1, types of slave nodes: active and parked. In a piconet, one
3, or 5 time slots; each time slot is 625 µs and Time Division master, up to seven active slaves, and up to 255 parked slaves
Duplex (TDD) provides full duplex transmission. In TDD, can coexist. Therefore, in order to address the active and
both the uplink and downlink can transmit information in the parked slaves, three and eight bits are required respectively.
same frequency by using a synchronized time interval which The master node continuously polls the active slaves to see if
resolves contention over the wireless channel. In BR/EDR, they have data to transmit. If an active slave does not respond
the frequency band is divided into 79 channels, and each to the polling for a long period, it loses its three-bit active
channel is 1 MHz wide. Figure 9(a) shows the channel assign- slave address and becomes a parked slave by obtaining an
ment of BR/EDR. The radio uses the Frequency Hopping eight-bit address. For the parked slaves to rejoin the network,
Spread Spectrum (FHSS) technique to avoid interference the master node periodically checks their status if they have
from any coexisting Bluetooth devices with other technolo- any data to transmit. If so, the master node reassigns the three-
gies that share the same frequency band. In the FHSS tech- bit active slave address.
nique, the radio switches the transmission channels 1600 Since each piconet uses its own frequency pattern that is
times per second; therefore, if a transmission encounters generated by the master node, it would be possible for several
noise on one channel, there is a chance that the next channel piconets to coexist. As shown in Figure 10, neighboring
FIGURE 11. Link controller state for BR/EDR designed for communication
piconets can join and construct a new network topology called establishment and power saving.
a scatternet. A scatternet is a combination of two or more
piconets through node sharing. With this, a slave can be
shared by two piconets, or it can be a master in one piconet in order to increase the probability of handshake at the same
and a slave in another. In this way, by combining piconets, time and the same channel. After receiving the ID packet,
Bluetooth can extend the number of nodes in the network. it replies in the inquiry response state with the Frequency
For example, in Figure 10, the nodes are organized into three Hop Synchronization (FHS) packet. The packet contains the
piconets: A, B and C. However, the piconets can communi- node’s address, the clock value, and value used for synchro-
cate with each other using the shared nodes. The shared node nization. After the devices are discovered and the packets
between piconets A and B switches the roles from a slave in A have been exchanged, the connection establishment sub-state
to a master in B and vice versa. On the other hand, the shared starts. This state is much faster than the inquiry state because
node in piconets B and C remain as a slave in both. both devices know each other’s frequency and clock infor-
mation. The previously discovering device changes to the
3) LINK CONTROLLER page state and becomes the master node while the discovered
Bluetooth does not support the OSI model or the TCP/IP device changes the state to page scanning and becomes the
protocol stack because it has its own MAC protocol for com- slave. After defining the roles, the connection state starts.
munication management called the link controller. Figure 11 The master polls the slaves and waits for the response from
shows the state diagram of the link controller in BR/EDR. the slaves. During the connection state, the device can be
There are three primary states: standby, connection, and park. in one of three modes: sniff, active and hold. In the active
The standby state is the default state that waits for the connec- mode, the master node keeps scheduling the slaves by trans-
tion event. It is designed to save power when the connection mitting POLL packets. The packet exchange stops in the
is not required. The connection state is when the BR/EDR hold mode, and the master and slave nodes get informed
radio turns on to discover devices in the vicinity and starts about the duration of time that they need to hold. The sniff
exchanging information if they are ready to communicate. mode is designed to save the battery. In this mode, during
Park mode is a deep sleep mode that helps to save power when the connection the device can be temporarily absent from the
the connection is not required for a long period. Only slaves piconet. For example, a device that is not operating, such as
can switch to this mode. They receive the synchronization a mouse or keyboard, puts itself in sniff mode and transitions
packet periodically, and, once received, they can then join the to the active mode when needed.
network whenever it is needed. Before switching from the
standby mode to the connection state, there are some sub- 4) LIMITATIONS OF BR/EDR
states such as Device Discovery and connection establish- Two major limitations of BR/EDR are high power consump-
ment. The connection establishment sub-state discovers the tion and lack of scalability. Although BR/EDR uses the
devices that are willing to initiate the connection. The Device standby state, parked mode, and effective duty cycling to save
Discovery sub-state has three sections. In the inquiry section, energy, these techniques are not enough to guarantee the low-
the device that attempt to initiate the connection hops among power consumption requirement of some IoT applications.
32 out of the 79 channels, which are known as the inquiry A major disadvantage of BR/EDR is high power con-
channels, and broadcasts ID packets. For channel hopping, sumption. This is because of continuous polling of the
it uses the built-in clock and pseudo-random numbers to slave nodes by the master node in the absence of data
generate the pattern. On the other side, the device that is to transmit. Many studies address this problem and pro-
about to become discoverable switches to the inquiry scan pose scheduling algorithms for polling the slave nodes
state and waits for the expected ID packets in the inquiry such as, [112], [113], and [114]. Chakraborty et al. [115]
channel. It listens for 1.28 s in every channel. It switches the proposed a solution for adaptive polling of slave nodes.
channels slower than the device that broadcasts the ID packet In their method, the master node polls the slave based
on the probabilistic scheduling estimation. This allows a response. On the receiving side, a TV or lamp acts only
the node to reduce power consumption by extending its as a receiver, waiting for a command to act. This results
standby time. Also, in [116], the performance of different in design simplification, yielding higher power efficiency.
scheduling algorithms, such as pure round-robin, gated In December 2013, SIG released the first update (v4.1) for
round-robin, and exhaustive round-robin for polling the the technology [126]. This update can be applied over the air,
slave nodes in BR/EDR have been evaluated using OPNET and no hardware change is required. In the first version of
simulator. BLE, the devices were only able to establish a connection as
The second reason behind the high power consumption master or slave. However, in the new update, the link layer
of BR/EDR is the scanning of a large number of chan- is redesigned and allows devices to switch their roles when
nels (32 channels) for Device Discovery. For example, needed. One year later, SIG made noticeable changes and
Duflot et al. [117] pointed out the issue and proposed a released version 4.2 [127]. In this new update, the actual
probabilistic model to scan the inquiry channels. They also payload size was increased from 27 Bytes to 251 Bytes.
analyzed the power consumption performance of Device Dis- Increasing the payload size while keeping the same packet
covery in the best and worst case scenarios. In [118], the effect format increased the throughput up to 2.6 times more. This
of Device Discovery complexity on power consumption has increase in the packet size also increased the feasibility of
been analyzed. They proposed the adaptive rendezvous proto- IPv6 support. Although version 4.2 does not support IPv6 in
col as a method of optimizing Device Discovery performance. the core specifications, IETF published RFC (7668) [128]
The lack of scalability and mesh networking are other to provide IPv6 support over BLE with the adaptation of
weaknesses of BR/EDR. This version of Bluetooth only sup- 6LoWPAN protocol stack. Bluetooth 5, introduced in Decem-
ports a maximum number of eight nodes, and slave nodes are ber 2016, is the latest version of BLE [129]. Its main aim is to
not able to connect to each other directly because of the star- overcome the limitations of the older versions by increasing
based topology. This standard has been primarily developed the range, size of advertisement payload, and throughput. The
for the scenarios in which a computer plays a master node extension in range provides indoor application coverage and
role, and a limited number of devices, such as a mouse, even enables building-to-building connectivity. In addition,
keyboard, and headset, are connected as slaves. Scatternet is advertisement extension was introduced in this version in
one of the most highlighted solutions for performing mesh order to increase the advertisement payload up to 8 times
networking and improving the scalability of BR/EDR. Scat- more by using data channels as secondary advertisement
ternet is a formation that is not natively supported by the core channels. This opened a new domain of applications for
specification, but there is a huge amount of research that pro- Bluetooth beacons. The last improvement was increasing the
poses scatternet-based solutions or improves on the scatternet data rate by doubling the modulation rate, also called BLE
formation. For example, Jedda et al. [119] mentioned the time high-speed mode. This mode helps lower power consumption
efficiency problem in scatternet formation and proposed an because of the shorter radio operation time that is needed
algorithm to solve this challenge. They also compared the for transmitting the same amount of data. It also improves
performance of other scatternet formation algorithms, such as the coexistence of the technology with other devices through
BlueStars [120] and BlueMesh [121]. In [122], the problem shorter occupancy of air time. An application of this mode is
with scatternet formation, specifically, was that the network over-the-air-update of IoT devices.
overhead was caused by an increased number of bridges that
were switching the piconets. This increases the probability 1) RADIO
of packet loss. Reference [123] analyzed the performance of As Table 4 shows, the general transmit power range in BLE
algorithms for Bluetooth scatternet formation namely, Blue- is between −10 dBm and 10 dBm. However, theoretically,
Trees [124], BlueStars and the BlueNet protocol [125], and version 5 supports output power up to 20 dBm. Similar to
revealed the problem of time-consuming Device Discovery the classic version, the PHY layer in BLE operates in the
in a scatternet network. In general, these works conclude that 2.4 GHz frequency band. In contrast to BR/EDR, it has
scatternet is not a reliable and robust solution for Bluetooth 40 channels, and each channel is 2 MHz wide. Among these
networking, specifically due to the discovery delay and rout- channels, there are three special channels called advertise-
ing challenges. ment channels. As shown in Figure 9(b), these channels are
placed in the center frequency of 2402 MHz, 2426 MHz,
B. BLUETOOTH LOW ENERGY (BLE) and 2480 MHz and are specified with a gray color. The
BLE, introduced by SIG in 2011, was created for low- reason for choosing these frequency centers is to avoid the
power wireless applications that did not require high through- most common cause of interference in the 2.4 GHz, which
put. To achieve low power consumption, the link layer, is IEEE 802.11b/g/n. Since IEEE 802.11 b/g/n channels are
PHY layer, and packet formats were redesigned. In addition, 22 MHz wide, they overlap. Therefore, the conventional tech-
while BR/EDR designed for only two-way communication, nique is to use only none-overlapping channels which are
BLE devices are capable of acting only as either a transmit- channel 1, 6, and 11. Thus, advertisement channels are strate-
ter or a receiver. For example, a remote control only needs gically located in places that have minimum interference
to transmit a short command, and it does not need to receive with non-overlapping channels in IEEE 802.11 b/g/n [130].
FIGURE 12. BLE link layer state has five states: Standby, Scanning,
Advertising, Initiating, and Connection.
FIGURE 14. Connected region and transitional region in BLE 5 long range.
implement audio transmission over BLE. Gentili et al. [152] 2.4 GHz frequency band being more crowded. Due to the
introduced BlueVoice and examined the feasibility of voice massive proliferation of IEEE 802.15.4 and IEEE 802.11 net-
transmission over BLE. They also mentioned the require- works, the possibility of interference would deteriorate
ments, such as using 64.3 kbps bandwidth to transmit voice application-specific QoS parameters. These networks exist in
quality of 16 kHz. In their experiment, they measure the large numbers today and operate in close proximity to a num-
power consumption, memory, and processing requirements. ber of application domains. Suitable interference avoidance
Another limitation is the lack of seamless IPv6 connectiv- solutions need to be adapted in order to maintain the required
ity in the core specification. This leads to a dependency of service.
BLE on other networks like Wireless Local Area Network As presented in Figure 9 the different wireless technologies
(WLAN) or LTE to translate the Bluetooth packets to IP pack- operating in the 2.4 GHz band. In Figure 9(a), BR/EDR is
ets [131], [153], [154]. For example, a BLE-enabled smart- operating between 2402 MHz to 2480 MHz. It divides the
watch is unable to transmit heartbeat information directly frequency into 79 (1 MHz wide) channels and uses AFH
to the Internet. It has to be done in two steps. First, this to avoid collisions. Figure 9(b) shows BLE, which has 40
information has to be forwarded to a smartphone. Then, channels that are 2 MHz wide and also uses AFH. The only
the smartphone converts the BLE packet to an IP packet to be difference is that the advertising channels (specified with
routable over the Internet and transmits it via WLAN or LTE. the gray color) have the responsibility of initiating the con-
nection in connectable mode, and they are not involved in
the frequency hopping. As mentioned in Table 4, to achieve
V. COEXISTENCE IN 2.4 GHZ SPECTRUM
longer coverage, the maximum transmit power in BLE 5 is
Wireless networks are susceptible to radio interference. The
increased from 10 dBm to 20 dBm, compared to the earlier
impact of interference becomes even more deteriorated if
version of BLE. Figure 9(c) shows channel assignment for
they operate in the same frequency band because it causes
the IEEE 802.15.4 standard. Channels from 1 to 10 for the
disruptive effects in the transmission [155]. Interference
868 −868.6 MHz and 902 −928 MHz bands are defined for
can cause packet loss, latency, jitter, false alarms, and
lower frequency ranges, whereas the channels from 11 to 26
synchronization errors [155]. All of these adverse effects,
are operating in 2.4 GHz band. Each channel is 2 MHz wide,
in particular, cause severe problems for mission-critical appli-
and the center of each channel is 5 MHz apart. Figure 9(d)
cations. As the 2.4 GHz band is unlicensed globally, many
depicts the channel assignment of the IEEE 802.11b stan-
technologies use this band for their devices throughout the
dard in the US. There are 11 channels, each 22 MHz wide.
world, thereby, making the band more crowded. In 2003,
These channels overlap with each other, and in the best case
the IEEE 802.15.2 task group [156] published standards for
scenario, we can only have three non-overlapping channels:
the coexistence of WPAN with other wireless networks. How-
channel 1, 6, and 11. However, the IEEE 802.11 standards
ever, raising awareness of the new techniques and technolo-
have several versions, and the channel assignment differs in
gies do not solve the entire coexistence issue.
some countries.
The problem of coexistence among BR/EDR, BLE,
IEEE 802.15.4, and IEEE 802.11 networks is causing
major difficulties in terms of delay and power consump- A. COEXISTENCE OF IEEE 802.15.4 AND IEEE 802.11
tion in IoT networks. The issue of coexistence has got- IEEE 802.11, more widely known as WiFi, is the ubiq-
ten further momentum due to the fact the emerging stan- uitous technology defining standards for WLANs. Today,
dards like WirelessHART, ISA100.11a, and IEEE 802.15.4e WiFi devices are everywhere, and they are causing
share the same license-exempted ISM band, resulting in the severe interference with IEEE 802.15.4 networks. Unlike
IEEE 802.15.4 devices, IEEE 802.11 devices operate at a channels. ISA100.11a employs adaptive frequency hopping
high transmit power, high data rate, and long range. Since using slow hopping, fast hopping, and a hybrid combination
they are unable to sense IEEE 802.15.4 devices, they create of both.
strong interference with them. In terms of channel bandwidth, Although these techniques avoid interference to some
both IEEE 802.15.4 and IEEE 802.11 channels are asym- extent, the rising penetration of these networks in different
metric, i.e., each IEEE 802.15.4 and IEEE 802.11 channel domains prompts the need for more advanced and sound
has bandwidth 5 MHz and 22 MHz, respectively. This causes interference avoidance techniques in order to help these
overlapping of the four IEEE 802.15.4 channels, as shown technologies coexist constructively. Especially for mission
in Figure 9. In most cases, IEEE 802.15.4 is vulnerable to critical applications, the issue of interference in a coexisting
interference [157], however, in certain cases, it does cause environment becomes more challenging due to the real-time
interference [158]. characteristics of these applications which always require
In order to improve network performance and support bounded latency and high throughput.
coexistence, these technologies inherently utilize specific The issue of coexistence between IEEE 802.15.4 and
techniques that help to promote coexistence. For example, IEEE 802.11a/b/g has been discussed in [157], [158],
IEEE 802.15.4 employs a number of inherent mechanisms and [160]. For instance, in [160], it is shown how
such as DSSS, CSMA/CA, CCA, low transmit power, low severely an IEEE 802.11 network can interfere with an
duty cycle, channel alignment, ED, and LQI as explained in IEEE 802.15.4 network and degrade its performance. This
Section III. DSSS promotes coexistence and protects against performance degradation can lead to adverse consequences
interference by spreading the signal to a wider frequency for application QoS requirements. For example, consider a
through chipping code. Chipping code is achieved by map- fire detection application based on IEEE 802.15.4. If there is
ping the bit pattern of the signal into a higher data rate bit a substantial packet loss due to massive IEEE 802.11 inter-
sequence. As the signal is spread over a larger bandwidth, ference, the fire extinguisher may not trigger within the
the narrowband interferer blocks a small overall percent- set latency bounds, leading to catastrophic consequences.
age of the signal. The receiver is able to easily recover the Angrisani et al. [155] experimentally studied the coexis-
signal [159]. CSMA/CA works on a ‘‘listen before talk’’ tence of ZigBee and WLAN. The experiment was con-
principle, where the transmitting devices PHY continuously ducted by varying different characteristics, such as packet
samples the channel and notifies the receiving device when it size, packet rate, and SINR, under different topologies. The
is clear to transmit. In this way, it is less likely to cause colli- authors confirmed that ZigBee and WLAN could coexist
sion and interference with other signals. The radio turnaround but to the detriment of packet loss rate and throughput.
time for IEEE 802.15.4 is 192 µs, while the turnaround time Guo et al. [161] conducted experimental tests to assess
of the DIFS (Distributed Interframe Space) of IEEE 802.11 is the interference from an IEEE 802.11 transmitter, Blue-
50 µs. This can cause IEEE 802.11 devices to easily preempt tooth transmitter, and microwave ovens sources on the link
the channel access while the IEEE 802.15.4 device is still in reliability of IEEE 802.15.4 devices. Through their results,
the process of radio state switching. Acknowledged transmis- the authors show that these interference sources (ISs) cause
sion and retries further ensure reliability, where the receiver significant packet error rate (PER). The value of PER varies
acknowledges a successful data reception. If the receiver does from 2% with no IS to an upward 25% depending upon the
not send an ACK in a stipulated time, the sender assumes distance between receiver, transmitter, and IS.
failure and retransmits data by using its retry limit. This
can be particularly useful when the IEEE 802.15.4 device B. COEXISTENCE OF BLUETOOTH WITH OTHER
is encountering interference when coexisting with Blue- WIRELESS TECHNOLOGIES
tooth. Bluetooth may interfere with the first transmission, After version 1.2, Bluetooth employed AFH with the pseudo-
but then it would hop to another channel. A retry helps random FH technique. As random frequency hopping suf-
the IEEE 802.15.4 device to make a successful transmis- fered from certain complications, such as repeating the trans-
sion on the second attempt. However, studies in [160] show mission in busy channels. Pust and Burda [162] performed a
that the timing mechanism employed in CCA mechanism of comparison between the FH and AFH mathematical models
IEEE 802.15.4 is much longer than that of IEEE 802.11 b/g, and proved that AFH has a better performance in avoiding
and it causes IEEE 802.15.4 to be in an adverse situation in interference. The basic idea of AFH is to classify the channels
terms of channel access competition. as good or bad channels. Nodes are only allowed to transmit
IEEE 802.15.4e TSCH mode uses channel hopping to in good channels. To avoid interference, AFH restricts trans-
promote coexistence. Every transmission happens on a dif- mission on busy channels by labeling them as bad channels.
ferent channel. This helps to further counter the effects Transmission in a good channel helps Bluetooth to estab-
of interference from other co-located networks. Likewise, lish a reliable connection and leave busy channels for other
WirelessHART utilizes channel hopping in combination with technologies. However, the number of channels should not
channel blacklisting to deal with interference effectively. be less than a specific number. Otherwise, the good chan-
With this method, a channel that is continuously causing nels would be more sensitive to interference. For example,
transmission problems is eliminated from the list of available in BR/EDR, the good channels can be reduced down to only
20 channels [163]. In AFH the device is not aware of the other 2.4 GHz (model dependent). Results show that the radiation
devices and their transmission status. In order to identify the from microwave ovens that operate in the vicinity of WSN
traffic condition in a channel for classification, there are two networks can cause up to 92% packet loss [171] in WSN.
main methods: Received Signal Strength Indication (RSSI) This increases further interference for wireless networking
and the Packet Error Rate (PER) [164]. Channel noise is devices in the 2.4 GHz band. Kim et al. [160] investigated
one of the factors which has an impact on signal strength. the coexistence of WLAN and ZigBee networks in the pres-
In the RSSI technique, the receiver side measures the signal ence of microwave ovens. The experimental results show
strength and informs the transmitter about the channel con- that the microwave oven is a dominant interferer and it
dition. On the other hand, in PER, the transmitter measures significantly increases ZigBee’s PER. Rondeau et al. [172]
channel noise based on the number of lost packets. In order analyzed the characteristics of microwave ovens and their
to update the channel map, the validity of classification needs effect on BR/EDR. The experimental results show that the
to be checked periodically. Apart from all of the benefits AFH mechanism enables BR/EDR to be able to tolerate a
of the AFH, there are also disadvantages to its use. For high level of interference at a distance of one meter.
instance, in order to check the channel quality over time, Cordless phones are available almost everywhere. Most of
AFH has to periodically scan and classify the channels, which them operate in the 2.4 GHz band like microwave ovens. They
increases the duty cycle. Moreover, reducing the number of use DSSS or FHSS to overcome interference and achieve
available channels may cause more sensitivity to interference. better voice quality. Generally, the DSSS method changes
Lee and Lee [165] simulated packet delivery ratio perfor- the channel manually, while the FHSS method automatically
mance in BR/EDR by combining AFH and adaptive transmit changes the channel. Similar to microwave ovens, the fre-
power. They considered an environment with IEEE 802.11b quency range and the technique used in these devices are
and a number of BR/EDR piconets. They compared the pro- model dependent, and there is no global standard for them.
posed method with the basic AFH in term of interference
mitigation in different distances. They showed that adaptively VI. Z-WAVE
controlling the transmit power significantly decreases the Z-wave is a low-power wireless technology that is specifi-
PER. Another study in [166] analyzed the impact of inter- cally designed for control applications in residential areas.
ference of other sources on BLE and ZigBee. The authors It supports full mesh networking. The technology was devel-
monitored the power consumption of BLE and ZigBee and oped by Zensys, which is a company for home automation
showed that BLE is more energy efficient in terms of the applications such as Heating, Ventilation, and Air Condi-
number of transmitted bytes per Joule. The study presented tioning (HVAC), Smart Lighting Control (SLC) and access
in [167] tested the performance of BLE. They analyzed the control [173]. The main feature of the Z-wave technology
probability of BLE network failure in different environments is that it operates in the sub-1 GHz band, which allows the
and presence of interference. The results showed that, with signal to avoid any interference with the 2.4 GHz working
the use of AFH, BLE has a lower probability of failure even technologies. Moreover, it has the advantage of full interoper-
in high interference. Bronzi et al. [168] presented the appli- ability with other z-wave enabled devices compared to other
cation of BLE for robust Inter-vehicular communications. wireless technologies. This means regardless of product type,
They examined the impact of IEEE 802.11g on BLE. The brand and manufacturer all Z-wave devices are able to join
experimental results showed that BLE can be a reliable solu- one network and help grow the mesh network. For example,
tion when compared to IEEE 802.11p if the high data rate is a BLE enabled thermostat from one company might not con-
not required. The performance of the advertisement channels nect to BLE smart sensor with other brand but in the Z-wave
in BLE was analyzed in [136]. Based on the experiment, network, all the devices are cooperating with one another. The
in a dense environment, authors claimed that when multiple standard is proprietary and is available under a non-disclosure
devices are scanning in the same channels, it is not feasible to agreement. The point-to-point communication range between
increase packet size to above 31 bytes for the advertisement nodes is about 30 meters.
channel. The PHY layer in Z-wave is designed for remote control
applications, where most of their requirements are just a
C. OTHER SOURCES OF INTERFERENCE single end-to-end message. For example, turning on and off a
Microwave ovens use electromagnetic waves in the 2.4 GHz light requires a very low data rate. The technology operates in
band. Although they are covered by a Faraday cage, the 908.42 MHz band in the US and the 868.42 MHz band in
there is still some leakage that occurs around the doors. Europe, employing the Frequency Shift Keying (FSK) modu-
These waves increase the motion in water molecules and lation. By operating in this band, Z-wave avoids collision in
heat up food [169]. According to the US Department of 2.4 GHz frequency band. The radio has a data rate of up to
Energy (DOE), more than 90% of houses have microwave 40 kbit/s [174].
ovens [170]. They also share the same spectrum and cause In the MAC layer, Z-wave uses the CSMA/CA. The re-
interference for networking devices based on WLAN, Blue- transmission technique is based on ACKs. There are two
tooth, and IEEE 802.15.4. Microwave ovens normally gener- types of Z-wave devices: controller and slaves. The controller
ate 60 dBm signal power and operate in a different range in has the responsibility of initiating the control commands and
sending them to other nodes. On the other hand, slave nodes TABLE 5. Worldwide availability of IEEE 802.11ah frequency range [177].
are responsible for replying and executing the commands. It is
also possible for the slave to forward the command to other
nodes. A Z-wave network can support 232 nodes, including
multiple controllers [175]. The controller node, which creates
the Z-wave network, becomes the primary controller. There
is only one central controller in a Z-wave network. The other
controllers are the secondary controllers. Controllers can
communicate with all the slaves. However, just the primary
controller can add and remove the nodes from the network.
Aside from the controller, there are some slave nodes in a provide a coverage range up to 1 km. However, employing all
Z-wave network that are only responsible for performing an the channels in different regions is not possible because of
action or routing the controller’s messages. the licensing limitations. Table 5 shows the global available
unlicensed bands in sub-1 GHz with Emitted Radiated Power
VII. 802.11AH (ERP) and Channel Bandwidth (CBW) [178].
WLAN is a worldwide available technology. However, this
technology suffers from a limited range and high power con- B. MAC LAYER
sumption, which are key elements in IoT. In October 2013, The IEEE 802.11ah MAC layer is designed to support scal-
IEEE P802.11-TASK GROUP AH [176] provided the stan- ability while keeping the power consumption low. Theoret-
dard specification over WLAN to overcome these limitations. ically, the standard is able to support up to 6000 nodes.
In the specification, MAC and PHY are inherited from IEEE In order to support this amount of connected nodes to a
802.11ac. Additionally, sub-1 GHz frequency operation is single AP, IEEE 802.11ah uses the Restricted Access Window
added to provide better coverage, obstacle penetration, and (RAW) mechanism. An AP defines RAW by first grouping
lower power consumption. As explained in Section V, most the clients. The RAW is a time slot assigned to a group and
of the wireless technologies opt for operating in the unli- the AP. The group is only allowed to communicate in that
censed 2.4 GHz band. This makes the frequency band more specified time slot window. In each group, nodes are compet-
and more crowded. Operating in sub-1 GHz is an advantage ing for channel access. Up to 64 slots are supported [179].
for IEEE 802.11ah to avoid interferes in the 2.4 GHz fre- In addition, IEEE 802.11ah introduced Target Wake Time
quency band. On the other hand, while technologies such as (TWT) to save power. TWT assigns access time to the clients
Bluetooth and ZigBee are targeting WPAN, IEEE 802.11ah that need to wake up and access the channel. Clients and the
aims for up to 1 km coverage to be used for applications AP exchange information about the channel access time and
in Low Power Wide Area Networks (LPWAN). Adaptation connection duration.
of IEEE 802.11ah in smart homes, wearables, agriculture
monitoring, animal tracking, industrial automation, and smart VIII. LoRa
cities eliminates many existing wireless communication limi- LoRa is a radio frequency transmission method for wide
tations. For example, a smartwatch can directly communicate area network applications. It was developed by Cycleo of
with an IEEE 802.11ah Access Point (AP) to transmit the Grenoble and acquired by Semtech [180]. It is a low-power
information without needing to connect to a smartphone, or a and low data rate technology that covers up to 10 kilometers
single AP in a smart building can manage all the connected for wireless communication. It operates in the sub-1 GHz
devices. spectrum and follows the previously mentioned unlicensed
band for every region in the world (see Table 5). The fre-
A. PHY LAYER quency band is divided into 8 or 15 channels, depending
As discussed above, IEEE 802.11ah, like IEEE 802.11ac, on the operation region. The transmission power is limited
employs Orthogonal Frequency Division Multiplexing from 2 to 14 dBm in Europe and from 5 to 20 dBm in
(OFDM) modulation in order to achieve high through- the U.S. LoRa has three bandwidth classes for communica-
put and more extended coverage among low-power wire- tion: 125, 250, and 500 KHz. Although high bandwidth has
less networks. The difference between IEEE 802.11ac and the advantage of high data rate, it consumes more energy,
IEEE 802.11ah is that the channel widths are ten times reduces the communication range, and increases the possibil-
clocked down. Instead of 20, 40, 80, and 160 MHz in ity of interference due to operating in the broader spectrum.
IEEE 802.11ac, IEEE 802.11ah uses 2, 4, 8, and 16 MHz in In LoRa, modulation is based on spread-spectrum techniques
addition to an extra 1 MHz channel to extend the range. The and a variation of Chirp Spread Spectrum (CSS). In par-
1 MHz and 2 MHz bandwidths are intended for applications ticular, it has the spreading factor (SF) of 7 to 12, which
that require low data rates and power, such as WSN. Further- represents the number of bits encoded per symbol. The larger
more, a new modulation and coding scheme, MCS10, has SF increases the transmission range in the expanse of higher
been designed for the 1 MHz channel. MCS10 is more reli- power consumption. The CSS does not distinguish the noise
able than the other modulation and coding schemes, and it can in the channel like DSSS or AFH, but it has the advantage
smart buildings to be controlled using these devices. Statis- scalable network architecture that incorporates reliability and
tics show that nearly 73% of people would like to receive adaptivity. ZigBee enables a variety of smart home applica-
smartphone alerts from their home security system [192]. tions by connecting the sensors and actuators. Additionally,
Compared to other low-power technologies, this availabil- ZigBee is a low-power wireless standard that allows the
ity along with lower-power consumption are advantages for battery to operate for several years. It can also run without a
BLE. As shown in Figure 18, it can be predicted that the battery by utilizing harvested energy. For example, a keychain
BLE market will surpass other technologies. BLE’s AFH flashlight gets its power by a simple push of a button.
algorithm and usage of advertising channels have reduced Internet connectivity is one of the significant characteris-
interference with most of the common operating wireless tics of an ideal wireless network for home automation appli-
technologies in the 2.4 GHz band, such as IEEE 802.11. cations. Although ZigBee natively does not support Internet
This feature makes BLE a suitable option for an environ- connectivity in the protocol stack, the 6LoWPAN technology
ment that is full of wireless devices that operate in that adopted the IPv6 connectivity based on the 802.15.4 stan-
band. The aforementioned features also help to reduce battery dard [47]. This adoption allows the nodes to be independent
consumption and provide reliability. By increasing the range of the translation gateway in order to access the Internet.
up to four times more in Bluetooth 5, the signals can cover Compared to Bluetooth, the main limitations of ZigBee-
an entire building. For example, the user is able to access based smart buildings are the lack of support by smartphones
the door lock from anywhere in the building. Another advan- and the low communication throughput. Similar to Bluetooth,
tage of BLE is the recently added mesh networking feature, there is an ample amount of research that has been done on
which increases the network scale, reliability, and coverage. the application of ZigBee in smart buildings [205] [206].
Countless amounts of research has been done on Bluetooth Zigbee also has products on the market that are used
applications in smart buildings [193]–[196]. For example, for smart building applications. Companies such as Con-
Putra et al. [197] compared the energy consumption of trol4 [207] and Phillips Hue [208] are designing their prod-
WiFi and BLE devices in smart home applications. The ucts based on ZigBee technology.
result showed the possibility of occupancy data transmission Thread is a recently developed wireless technology tar-
via BLE with 30% less battery consumption. Aside from geted for home automation. It is IPv6 enabled and sup-
academic publications on the application of BLE in smart ports mesh networking, thereby all devices can be addressed
buildings, there are some companies such as UniKey [198], locally or globally. Mesh networking support allows the
BOLT [199], and Emerson [200] that are working on home network to cover the entire building, and it improves the
automation devices based on Bluetooth. Beaconing is one of robustness of the network and avoids issues such as single
the unique features of BLE that is used in many applications, point of failure. SLC is one of the main applications of a
such as indoor positioning. For example, by tracking the users Thread network, and scalability is one of the requirements
inside the building, the AmI can perform desired actions for the SLC applications. A Thread network supports up to
like turning on or off the lights or playing one’s favorite 200 connected nodes. In addition, operating on MAC and
music [201]. As shown in the Figure 18, the Bluetooth bea- PHY layers of IEEE 802.15.4 allows the technology to get
con market will have the highest market compared to other the benefit of low-power consumption.
Bluetooth-enabled technologies in 2021. While Bluetooth In addition to Bluetooth and ZigBee, several proprietary
has its benefits, it does have some limitations that are asso- standards target building automation applications. Standards
ciated with it. For example, there is a lack of scalability such as Z-wave [209], INSTEON [210], and EnOcean are
support in BR/EDR and IPv6 connectivity in both BLE and particularly designed to meet the requirements in home
BR/EDR [202]. Incorporating other technologies with Blue- automation applications. Z-Wave specifically targets control
tooth will increase the demand. applications such as SLC and access control. A thermostat
ZigBee is another candidate for smart home applications. is one of the examples of these applications and has over
One of the major advantages of ZigBee is that as an open 2100 certified products. The products are supported by 600
global wireless standard, it provides the open source software companies like Intermatic [211], Hawking Technology [212],
stack for developers to freely access the network and appli- Wink [213], and Aeotec [214]. As previously mentioned in
cation layer. It employees mesh networking to eliminate the Section VI, Z-wave has the advantage of using the sub-
single point of failure and expand the reach of the network. 1 GHz frequency band. However, this can also be a disad-
Additionally, in the star topology in WLAN, sharing a single vantage when the products need to be distributed globally
node between a large numbers of connected devices has the and used in other countries that have different rules for
problem of increasing the delay in the entire network. The operating in the sub-1 GHz band. INSTEON Alliance was
ZigBee network supports more than 400 connected nodes, launched in 2005 by Smartlabs company [215]. The tech-
which will be necessary for the future of smart homes, based nology combined powerline and wireless mesh technology.
on the Gartner report’s prediction. With mesh networking Devices can support wireless technologies, wired technolo-
increasing the number of the devices, the robustness of the gies, or both. Wireless devices use FSK modulation and
network is also increasing due to redundancy and decentral- operate at 904 MHz with a data rate of 38.4 kb/s [216], [217].
ization [204]. A self-organizing network is optimal for a more INSTEON has applications in SLC, thermostats, smart
FIGURE 19. Comparison of major Bluetooth applications market predicted by 2021 (source: [203]).
sensors, and remote controls. EnOcean [218] is a wireless to the need to provide an advanced healthcare system for diag-
technology developed for smart homes and standardized by nosing, treating, and preventing disease. The desired system
the international standard ISO/IEC 14543-3-10 [219]. It aims must be inexpensive, accessible, harmless, reliable, and must
to use harvested power sources from the environment for not restrict the daily activities, mobility, or quality of life.
wireless technology [220]. Devices such as smart plugs, SLC, IoT, in combination with medical engineering, has the
and HVAC can be controlled by EnOcean. Like Z-wave and great potential to provide this system through wirelessly
INSTEON, it operates in the sub-1 GHz band with a data rate monitoring and recording medical data. Providing the Inter-
of up to 125 kbps. net connectivity allows the physician to monitor the health
condition of the patients. Thus, 41% of the IoT is marketed
for healthcare applications by 2025 [228]. There are a large
B. SMART HEALTHCARE number of researchers who are focusing on the cure, preven-
Improving the health quality for individuals prompts a need tion, and prediction of diseases using IoT and wireless tech-
to provide advanced systems for diagnosing, treating, and nologies [229]–[232]. In IoT-based healthcare systems, smart
preventing diseases. A robust healthcare system can be homes can replace hospitals, and bulky, attached-to-the-body
divided into two generally classified categories: prevention monitoring systems can be changed to tiny, implanted sen-
of illness and post illness monitoring. Monitoring the blood sors. Table 7 shows the QoS requirements for a wireless
pressure, Electrocardiogram (ECG), Electroencephalogram network, including the data rate, timeliness, acceptable error
(EEG), Electromyogram (EMG), glucose level, cholesterol rate, and required battery life.
level, pulse oximetry, and toxins in the body can help early- It is important to provide a platform that does not limit the
stage detection in order to prevent fatal diseases, such as can- normal activities and quality of life of patients. For example,
cer or heart attacks [221]. The rapidly increasing population bulky attached sensors that are connected to wires are hard
and longer life expectancies raise the importance of mech- to carry and restrict the mobility of a patient [25]. Besides,
anisms for children and elderly health monitoring, artificial providing Ambient Assisted Living (AAL) is important in
organ implementation and drug delivery. According to the monitoring health conditions. Smart homes or smart hospi-
World Health Organization (WHO), global life expectancy tals are examples of AAL. For instance, a smart home can
increased from 66.4 years in 2000 to 71.4 years in 2015 [222]. receive the information from the wearable sensors of the
As the global life expectancy is increasing, the size of the patient in order to manage the temperature. Wireless sensors
geriatric population is also increasing. The number of people can be placed inside or outside of the body as wearables.
over 60 years old increased from 607 million to 901 million These sensors can detect changes faster than highly equipped
by a 48% increase. Also, it is predicted that by 2030, this num- laboratories, especially for people who have a history of
ber will grow by 56% to 1.4 billion and reach to 2.1 billion cancer or other diseases which can be inherited. However,
in 2050 [223]. It is also clear that the risk of chronic diseases this constant monitoring leads to high battery consumption.
like neurological conditions, diabetes, heart diseases, and This increases the risk of nonavailability of these sensors
strokes increase with age. The other concern is the cost of in critical moments. Latency in bio-medical sensor applica-
healthcare, which can include hospitalization, home nursing, tions is soft real time. Normally, in critical scenarios such
and medicines. It is estimated that in the U.S., healthcare as during a heart attack, a few seconds of latency is still
expenses are more than $2 trillion annually [224]. This leads acceptable.
In [233], they implemented real-time and low-power ECG health records in the cloud. 6LoWPAN-based real-time health
and EEG Bluetooth based sensors. They introduced the com- monitoring is proposed in [244]. They tested the performance
pressed sensing method, which saves the battery up to 37.1% of ECG monitoring sensor data for remote healthcare using
more. In [234], the feasibility of applying dual mode Blue- a 6LoWPAN edge router. Doukas and Maglogiannis [245]
tooth in vital monitoring was analyzed. Authors implemented presented the cloud platform in which sensors are connected
the ARM CPU based sensors, such as ECG, body temper- to the Internet using 6LoWPAN technology.
ature, and motion sensors. Reference [235] reviewed the
available commercial Bluetooth-based healthcare devices in C. INDUSTRIAL AUTOMATION
the market, which are composed of sensors such as activ- During the last decade, wireless technology has been increas-
ity tracking, ECG, EEG, EMG, and glucose monitoring. ingly utilized in industries, leading to the Industrial Internet
A BLE-based ECG monitoring using a smartphone is imple- of Things (IIoT), where Industrial Wireless Sensor Networks
mented in [236], and the result shows that power consump- (IWSNs) play a central role of behaving like a digital skin for
tion is highly reduced. In addition to reducing power con- the IoT. IWSNs can monitor critical parameters and control
sumption, an equally important aspect of using sensors is industrial processes and then inform the industrial personnel
that the patient is being continuously monitored in both of this information promptly. IWSNs offer flexibility, self-
indoor and outdoor locations like their home, hospital, and organization, rapid deployment, and low-cost. They have
outside. Elderly patients are penitent when they feel that the ability to make processes autonomous, resulting in the
they are in danger and need to be continuously monitored. minimal human intervention [246] when compared to their
Reference [237] proposed a BLE-based indoor positioning wired counterpart. The shift from wired to the wireless net-
system for patients who have Alzheimer. works dramatically helps to reduce huge capital expenditures
There are several commercial products like wearable of installation and maintenance of wires. Moreover, wired
devices on the market. Jawbone [238], Apple Watch [239], networks are rigid and fixed in nature. This makes it difficult
Samsung Gear [240] and most of the smartwatches are using to adapt to changes in industrial environments. In addition,
Bluetooth and Wi-Fi technology to send the health sensor certain industrial applications require mobile robots, which
information. Heart rate monitoring with ECG, activity track- becomes a huge challenge with wired networks. However,
ing, sleep monitoring, and other forms of health data are wireless networks can easily support such mobility scenar-
implemented in these wearables. ios. Although IoT seems to revolutionize the industries, it is
However, Bluetooth is not the only low-power wireless only if it satisfies the strict requirements and challenges
technology for healthcare applications. ZigBee and 6LoW- that are put in place by the industrial applications. Such
PAN are other candidates in this area. In [241] and [242], challenges include: extremely high reliability, low latency,
ZigBee-based ECG and pulse oximetry sensors are imple- robustness, fault tolerance, massive scalability, interoperabil-
mented by the authors, and the results showed that ZigBee ity, and energy efficiency. Reliability against interference is
meets the QoS requirements for these healthcare applications. highly indispensable because industries encompass several
Coexistence is also important in healthcare applications due wireless networks, heavy machinery, and co-located com-
to the WiFi-enabled smartphones that are operating close to munication systems that can interfere with IWSNs [246].
the wireless technologies such as ZigBee. In [243], the impact This can negatively impact wireless connectivity and result
of WiFi near the ZigBee wearables has been analyzed. in link unreliability issues. Besides, most low-power wireless
Although 6LoWPAN and ZigBee share the same PHY standards operate in the ISM band which can make them
and MAC, the IPv6 capability of 6LoWPAN makes the highly vulnerable to interference. Certain applications in
devices addressable via the Internet. This allows for the industries, such as closed-loop control systems are extremely
opportunity to remotely monitor health conditions or keep delaying sensitive. They tend to require low latency so that the
TABLE 9. Industrial applications and their typical requirements (source: [18], [247]).
excellent, holistic discussion of IoT with respect to its archi- For instance, Gomez et al. [107] and Darroudi and
tecture, common standards, elements, technologies, infras- Gomez [264] review the BLE standard from a protocol stack
tructure protocols, applications, and market opportunities. point of view and research to provide a BLE mesh network,
It is more of a general overview of the various aspects respectively. On the other hand, surveys like [67], [265],
of IoT, however, it does not cover the in-depth technical and [266] only focus on IEEE 802.15.4 based standards.
details, pitfalls, and limitations of MAC protocols of low- Blanckenstein et al. [267] reviewed low-power transceivers
power standards. The survey paper in [258] provides a sound and suitability for each application. However, due to the
analysis of recent advances in IoT. The authors focus the novelty of technologies like BLE 5, they did not cover the
paper on the standardized protocol stack and examine the latest transceivers. Additionally, the survey only reviews the
IETF standardization efforts and protocols. The paper pro- hardware requirements for low-power networks.
vides a profound, technical discussion on the application,
MAC, routing and transport layers, as well as low-power XI. CONCLUSION
radio characteristics. However, it does not cover their appli- Emerging IoT applications impose several constraints in
cability and limitations in different IoT application domains. terms of reliability, timeliness, scalability, and energy effi-
The IoT survey paper in [256] examines the IETF current ciency. The purpose of our study was to provide a thor-
standards and protocols and explores open questions, limita- ough discussion about existing low-power wireless standards,
tions, opportunities, and future challenges. However, it dis- technologies, and protocols, and examine their suitability in
cusses only the defacto standards. Besides, some surveys diverse IoT application domains. We presented the require-
focus on a single IoT application and its requirements as ments of different applications such as smart healthcare,
well as the suitability of each wireless technology for it. For industrial automation, and smart cities, and analyzed the
example, Yuehong et al. [229] explored the application of IoT potentials of existing standards in meeting such requirements.
in health care. The study provides a general overview of a Our survey focused on the PHY and MAC layers because
system architecture for IoT-based smart health care. It is a they directly influence the aforementioned constraints. In our
general overview, and the specific requirements for applica- attempt to explore their suitability, we highlighted several
tions are not mentioned. Similarly, Domingo [260] studied drawbacks of the MAC protocols. We also discussed the
the research trend to improve the quality of life for individuals interference issue among the coexisting, low-power wireless
with disabilities. The study shows the possible solutions to networks, which is a major challenge that degrades the net-
overcome the limitations of some disabilities by using con- work performance for reliability and latency. We analyzed
nected sensors and positioning technologies. The adaptability how the inherent schemes employed by the standards cope
of optimal wireless technology for each scenario has been with the interference issues.
reviewed as well. The study lacks a larger pool of individuals Lastly, we presented the application domains of the IoT and
and ignores the challenge of providing a low-power network. the requirements for each scenario. Additionally, we intro-
In [261] WBANs for medical and non-medical applications duced the optimal wireless solution for each application
have been reviewed. The authors explained the uniqueness based on the demands.
of this network because of the high mobility and placement
ACKNOWLEDGMENT
of some sensors inside the human body. The scope of this
is limited to the WBANs, and challenges, such as the coex- (Ali Nikoukar and Saleem Raza contributed equally to this
istence of the wireless network, have not been taken into work.)
consideration. REFERENCES
As was mentioned earlier, smart homes are another poten- [1] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, ‘‘Internet of
tial application of IoT. Alaa et al. [262] reviewed the research Things (IoT): A vision, architectural elements, and future directions,’’
trend focusing on IoT-based smart homes. The study helps Future Generat. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, 2013.
[2] A. S. Crandall and D. J. Cook, ‘‘Smart home in a box: A large scale
researchers to find out the challenges and demands of the smart home deployment,’’ in Proc. Int. Conf. Intell. Environ., 2012,
desired smart homes. However, the study only classifies the pp. 169–178.
number of researchers and directions and does not explain the [3] Sensors Remind Doctors to Wash Up. Accessed: Jun. 3, 2018. [Online].
Available: https://www.ibm.com/blogs/research/2013/11/sensors-
technical specifications. remind-doctors-to-wash-up/
The study in [204] only focuses on home automation. [4] K. Michaelsen, J. L. Sanders, S. M. Zimmer, and G. M. Bump, ‘‘Over-
Raza et al. [263] reviewed the LPWAN for long-range coming patient barriers to discussing physician hand hygiene: Do patients
prefer electronic reminders to other methods?’’ Infection Control Hospital
communication networks such as SigFox and LoRaWAN. Epidemiol., vol. 34, no. 9, pp. 929–934, 2013.
They explained the available technologies of these networks [5] I. Ungurean, N.-C. Gaitan, and V. G. Gaitan, ‘‘An IoT architecture
and applications. Due to the operation of LPWAN in the sub- for things from industrial environment,’’ in Proc. Int. Conf. Commun.
(COMM), 2014, pp. 1–4.
1 GHz frequency and the requirement of having a different [6] C. Wang, Z. Bi, and L. D. Xu, ‘‘IoT and cloud computing in automation
unlicensed band for every country, these technologies are not of assembly modeling systems,’’ IEEE Trans. Ind. Inform., vol. 10, no. 2,
able to operate globally. pp. 1426–1434, May 2014.
[7] K. Dalal and P. Dahiya, ‘‘State-of-the-art in VANETs: The core of intel-
In contrast with single application surveys, some ligent transportation system,’’ IUP J. Elect. Electron. Eng., vol. 10, no. 1,
other reviews only explain a single wireless technology. pp. 27–39, 2017.
[8] F. Camacho, C. Cárdenas, and D. Muñoz, ‘‘Emerging technologies and [33] IPv6 Over Low-Power Wireless Personal Area Network (6LoWPAN) Pag-
research challenges for intelligent transportation systems: 5G, HetNets, ing Dispatch. [Online]. Available: https://rfc-editor.org/rfc/rfc8025.txt
and SDN,’’ Int. J. Interact. Des. Manuf., vol. 12, no. 1, pp. 327–335, 2017. [34] IPv6 Over Low-Power Wireless Personal Area Network (6LoWPAN) ESC
[9] J. Serra, D. Pubill, A. Antonopoulos, and C. Verikoukis, ‘‘Smart HVAC Dispatch Code Points and Guidelines. [Online]. Available: https://rfc-
control in IoT: Energy consumption minimization with user comfort editor.org/rfc/rfc8066.txt
constraints,’’ Sci. World J., vol. 2014, Jun. 2014, Art. no. 161874. [35] The European Telecommunications Standards Institute (ETSI). [Online].
[10] T. Gea, J. Paradells, M. Lamarca, and D. Roldan, ‘‘Smart cities as an Available: http://www.etsi.org/
application of Internet of Things: Experiences and lessons learnt in [36] One Machine-to-Machine communication (M2M). [Online]. Available:
Barcelona,’’ in Proc. Int. Conf. Innov. Mobile Internet Services Ubiqui- http://www.onem2m.org/
tous Comput., 2013, pp. 552–557. [37] The International Society of Automation (ISA). [Online]. Available:
[11] V. Scuotto, A. Ferraris, and S. Bresciani, ‘‘Internet of Things: Appli- http://www.isa.org/
cations and challenges in smart cities: A case study of IBM smart city [38] ISA100. [Online]. Available: https://isa100wci.org/
projects,’’ Bus. Process Manage. J., vol. 22, no. 2, pp. 357–367, 2016. [39] OpenWSN. Accessed: May 20, 2018. [Online]. Available:
[12] F. Shrouf and G. Miragliotta, ‘‘Energy management based on Internet https://openwsn.atlassian.net/wiki/display/OW/Home
of Things: Practices and framework for adoption in production manage- [40] X. Vilajosana, P. Tuset, T. Watteyne, and K. Pister, ‘‘OpenMote: Open-
ment,’’ J. Cleaner Prod., vol. 100, pp. 235–246, Aug. 2015. source prototyping platform for the industrial IoT,’’ in Proc. Int. Conf. Ad
[13] C.-F. Lai, Y.-X. Lai, L. T. Yang, and H.-C. Chao, ‘‘Integration of IoT Hoc Netw., 2015, pp. 211–222.
energy management system with appliance and activity recognition,’’ in [41] E. Baccelli, O. Hahm, M. Günes, M. Wahlisch, and T. C. Schmidt,
Proc. Int. Conf. Green Comput. Commun. (GreenCom), 2012, pp. 66–71. ‘‘RIOT OS: Towards an OS for the Internet of Things,’’ in Proc. IEEE
[14] Z. M. Fadlullah, M. M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, and Conf. Comput. Commun. Workshops (INFOCOM WKSHPS), Apr. 2013,
Y. Nozaki, ‘‘Toward intelligent machine-to-machine communications in pp. 79–80.
smart grid,’’ IEEE Commun. Mag., vol. 49, no. 4, pp. 60–65, Apr. 2011. [42] T. Watteyne et al., ‘‘OpenWSN: A standards-based low-power wire-
[15] F. L. Lewis, ‘‘Wireless sensor networks,’’ in Smart Environments: Tech- less development environment,’’ Trans. Emerg. Telecommun. Technol.,
nologies, Protocols, and Applications. Hoboken, NJ, USA: Wiley, 2004, vol. 23, no. 5, pp. 480–493, 2012.
pp. 11–46. [43] IPSO Alliance. Accessed: Jan. 29, 2018. [Online]. Available:
[16] D. Porcino and W. Hirt, ‘‘Ultra-wideband radio technology: Potential http://www.ipso-alliance.org/
and challenges ahead,’’ IEEE Commun. Mag., vol. 41, no. 7, pp. 66–74, [44] Bluetooth Special Interest Group. [Online]. Available: https://
Jul. 2003. www.bluetooth.com/
[17] I. F. Akyildiz and I. H. Kasimoglu, ‘‘Wireless sensor and actor net- [45] Bluetooth SIG Member Directory. Accessed: Apr. 23, 2018.
works: Research challenges,’’ Ad Hoc Netw., vol. 2, no. 4, pp. 351–367, [Online]. Available: https://www.bluetooth.com/membership-working-
Oct. 2004. groups/member-directory
[18] J. Åkerberg, M. Gidlund, and M. Björkman, ‘‘Future research challenges [46] IEEE Standard for Local and Metropolitan Area Networks—Part 15.4:
in wireless sensor and actuator networks targeting industrial automation,’’ Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1:
in Proc. Int. Conf. Ind. Inform. (INDIN), 2011, pp. 410–415. MAC Sublayer, IEEE Standard 802.15.4e-2012 (Amendment to IEEE
Standard 802.15.4-2011), Apr. 2012, pp. 1–225.
[19] E. A. Lee, ‘‘Cyber physical systems: Design challenges,’’ in Proc. Int.
[47] K. Gill, S.-H. Yang, F. Yao, and X. Lu, ‘‘A zigbee-based home automation
Symp. Object Component-Oriented Real-Time Distrib. Comput. (ISORC),
system,’’ IEEE Trans. Consum. Electron., vol. 55, no. 2, pp. 422–430,
2008, pp. 363–369.
May 2009.
[20] J. Lee, B. Bagheri, and H.-A. Kao, ‘‘A cyber-physical systems architec-
[48] F. Chen, T. Talanis, R. German, and F. Dressler, ‘‘Real-time enabled IEEE
ture for industry 4.0-based manufacturing systems,’’ Manuf. Lett., vol. 3,
802.15.4 sensor networks in industrial automation,’’ in Proc. Int. Symp.
pp. 18–23, Jan. 2015.
Ind. Embedded Syst., 2009, pp. 136–139.
[21] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash,
[49] M. reza Akhondi, A. Talevski, S. Carlsen, and S. Petersen, ‘‘Applications
‘‘Internet of Things: A survey on enabling technologies, protocols,
of wireless sensor networks in the oil, gas and resources industries,’’ in
and applications,’’ IEEE Commun. Surveys Tuts., vol. 17, no. 4,
Proc. IEEE Int. Conf. Adv. Inf. Netw. Appl., Apr. 2010, pp. 941–948.
pp. 2347–2376, 4th Quart., 2015.
[50] L. Sanchez et al., ‘‘SmartSantander: IoT experimentation over a smart
[22] N. Nandiraju, D. Nandiraju, L. Santhanam, B. He, J. Wang, and
city testbed,’’ Comput. Netw., vol. 61, pp. 217–238, Mar. 2014.
D. P. Agrawal, ‘‘Wireless mesh networks: Current challenges and future
[51] E. Jovanov, A. Milenkovic, C. Otto, and P. C. de Groen, ‘‘A wireless
directions of Web-in-the-sky,’’ IEEE Wireless Commun., vol. 14, no. 4,
body area network of intelligent motion sensors for computer assisted
pp. 79–89, Aug. 2007.
physical rehabilitation,’’ J. NeuroEng. Rehabil., vol. 2, no. 1, p. 6,
[23] T. Winter et al., RPL: IPv6 Routing Protocol for Low-Power and Mar. 2005.
Lossy Networks, document RFC 6550, Internet Requests for Comments, [52] J. Song et al., ‘‘WirelessHART: Applying wireless technology in real-
Mar. 2012. [Online]. Available: http://www.rfc-editor.org/rfc/rfc6550.txt time industrial process control,’’ in Proc. IEEE Real-Time Embedded
[24] H. Lasi, P. Fettke, H.-G. Kemper, T. Feld, and M. Hoffmann, ‘‘Industry Technol. Appl. Symp. (RTAS), Apr. 2008, pp. 377–386.
4.0,’’ Bus. Inf. Syst. Eng., vol. 6, no. 4, pp. 239–242, 2014. [53] Wireless Systems for Industrial Automation: Process Control and Related
[25] B. Dezfouli, M. Radi, and O. Chipara, ‘‘REWIMO: A real-time and Applications, document ISA-100.11a-2009, International Society of
reliable low-power wireless mobile network,’’ ACM Trans. Sensor Netw., Automation, 2009. [Online]. Available: https://www.isa.org/
vol. 13, no. 3, pp. 17:1–17:42, Aug. 2017. [54] B. Tuch, ‘‘Development of WaveLAN, an ISM band wireless LAN,’’
[26] IEEE Standard Association. Accessed: May 25, 2018. [Online]. Avail- AT&T Tech. J., vol. 72, no. 4, pp. 27–37, 1993.
able: http://standards.ieee.org/ [55] Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer
[27] IEEE Announces Virtual Reality (VR) and Augmented Reality (AR) (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-
Standards Projects in Advance of Participation at Augmented WPANs), IEEE Standard 802.15.4-2006, 2003.
World Expo. [Online]. Available: http://standards.ieee.org/news/ [56] I. F. Akyildiz and M. C. Vuran, Wireless Sensor Networks, vol. 4.
2017/ieee_p2408.html Hoboken, NJ, USA: Wiley, 2010.
[28] ZigBee. [Online]. Available: http://www.zigbee.org/ [57] S. Ray, I. Demirkol, and W. Heinzelman, ‘‘ADV-MAC: Analysis and opti-
[29] The Internet Engineering Task Force (IETF). [Online]. Available: mization of energy efficiency through data advertisements for wireless
https://www.ietf.org/ sensor networks,’’ Ad Hoc Netw., vol. 9, no. 5, pp. 876–892, Jul. 2011.
[30] Transmission of IPv6 Packets Over IEEE 802.15.4 Networks. [Online]. [58] E. Casilari, J. M. Cano-García, and G. Campos-Garrido, ‘‘Modeling of
Available: http://developer.radiusnetworks.com/2015/07/14/introducing- current consumption in 802.15.4/ZigBee sensor motes,’’ Sensors, vol. 10,
eddystone.html no. 6, pp. 5443–5468, 2010.
[31] Compression Format for IPv6 Datagrams Over IEEE 802.15.4-Based [59] L. Hou and N. W. Bergmann, ‘‘System requirements for industrial wire-
Networks. [Online]. Available: https://rfc-editor.org/rfc/rfc6282.txt less sensor networks,’’ in Proc. IEEE Conf. Emerg. Technol. Factory
[32] Neighbor Discovery Optimization for IPv6 Over Low-Power Wireless Autom. (ETFA), Sep. 2010, pp. 1–8.
Personal Area Networks (6LoWPANs). [Online]. Available: https://rfc- [60] H. Karl and A. Willig, Protocols and Architectures for Wireless Sensor
editor.org/rfc/rfc6775.txt Networks. Hoboken, NJ, USA: Wiley, 2007.
[61] M. Di Francesco, G. Anastasi, M. Conti, S. K. Das, and V. Neri, ‘‘Reliabil- [85] Wireless Networks for Industrial Automation-Process Automation
ity and energy-efficiency in IEEE 802.15.4/ZigBee sensor networks: An (WIA-PA). Accessed: Mar. 10, 2017. [Online]. Available:
adaptive and cross-layer approach,’’ IEEE J. Sel. Areas Commun., vol. 29, http://www.industrialwireless.cn/
no. 8, pp. 1508–1524, Sep. 2011. [86] T. Watteyne, A. Mehta, and K. Pister, ‘‘Reliability through frequency
[62] J. Mišić, S. Shafi, and V. B. Mišić, ‘‘Performance limitations of the diversity: Why channel hopping makes sense,’’ in Proc. 6th ACM
MAC layer in 802.15.4 low rate WPAN,’’ Comput. Commun., vol. 29, Symp. Perform. Eval. Wireless Ad Hoc, Sensor, Ubiquitous Netw., 2009,
nos. 13–14, pp. 2534–2541, 2006. pp. 116–123.
[63] S. Pollin et al., ‘‘Performance analysis of slotted carrier sense IEEE [87] T. Watteyne, J. Weiss, L. Doherty, and J. Simon, ‘‘Industrial
802.15.4 medium access layer,’’ IEEE Trans. Wireless Commun., vol. 7, IEEE802.15.4e networks: Performance and trade-offs,’’ in Proc.
no. 9, pp. 3359–3371, Sep. 2008. IEEE Int. Conf. Commun. (ICC), Jun. 2015, pp. 604–609.
[64] G. Anastasi, M. Conti, and M. Di Francesco, ‘‘A comprehensive analysis [88] T. Watteyne, M. Palattella, and L. Grieco, Using IEEE 802.15.4e Time-
of the MAC unreliability problem in IEEE 802.15.4 wireless sensor net- Slotted Channel Hopping (TSCH) in the Internet of Things (IoT): Problem
works,’’ IEEE Trans. Ind. Informat., vol. 7, no. 1, pp. 52–65, Feb. 2011. Statement, document RFC 7554, 2015.
[65] P. Park, C. Fischione, and K. H. Johansson, ‘‘Adaptive IEEE 802.15.4 pro- [89] Hart Communication Protocol. Accessed: May 3, 2018. [Online]. Avail-
tocol for energy efficient, reliable and timely communications,’’ in Proc. able: www.fieldcommgroup.org
ACM/IEEE Int. Conf. Inf. Process. Sensor Netw., Apr. 2010, pp. 327–338. [90] D. Christin, P. S. Mogre, and M. Hollick, ‘‘Survey on wireless sensor
network technologies for industrial automation: The security and quality
[66] A. Koubaa, M. Alves, and E. Tovar, ‘‘A comprehensive simulation
of service perspectives,’’ Future Internet, vol. 2, no. 2, pp. 96–125, 2010.
study of slotted CSMA/CA for IEEE 802.15.4 wireless sensor net-
[91] K. S. J. Pister and L. Doherty, ‘‘TSMP: Time synchronized mesh proto-
works,’’ in Proc. IEEE Int. Workshop Factory Commun. Syst., Jun. 2006,
col,’’ in Proc. PDCS, 2008, pp. 391–398.
pp. 183–192.
[92] IPv6 Over Low-Power Wireless Personal Area Networks (6LoWPANs):
[67] M. Khanafer, M. Guennoun, and H. T. Mouftah, ‘‘A survey of
Overview, Assumptions, Problem Statement, and Goals. Accessed: Dec.
beacon-enabled IEEE 802.15.4 MAC protocols in wireless sensor net-
12, 2017. [Online]. Available: https://tools.ietf.org/html/rfc4919
works,’’ IEEE Commun. Surveys Tuts., vol. 16, no. 2, pp. 856–876,
[93] Z. Shelby and C. Bormann, 6LoWPAN: The Wireless Embedded Internet,
2nd Quart., 2014.
vol. 43. Hoboken, NJ, USA: Wiley, 2011.
[68] K. Kredo, II, and P. Mohapatra, ‘‘Medium access control in wireless [94] J. W. Hui and D. E. Culler, ‘‘Extending IP to low-power, wireless per-
sensor networks,’’ Comput. Netw., vol. 51, no. 4, pp. 961–994, 2007. sonal area networks,’’ IEEE Internet Comput., vol. 12, no. 4, pp. 37–45,
[69] L. M. Feeney, M. Frey, V. Fodor, and M. Günes, ‘‘Modes of inter-network Jul./Aug. 2008.
interaction in beacon-enabled IEEE 802.15.4 networks,’’ in Proc. 14th [95] P. Thubert, T. Watteyne, R. Struik, and M. Richardson, An Architecture
Annu. Medit. Ad Hoc Netw. Workshop (MED-HOC-NET), Jun. 2015, for IPv6 Over the TSCH Mode of IEEE 802.15.4, document draft-ietf-
pp. 1–8. 6tisch-architecture-10, IETF Draft, Mar. 2015.
[70] Thread Group. Accessed: Dec. 20, 2017. [Online]. Available: [96] M. R. Palattella, N. Accettura, L. A. Grieco, G. Boggia, M. Dohler, and
http://www.threadgroup.org/ T. Engel, ‘‘On optimal scheduling in duty-cycled industrial IoT appli-
[71] New Wireless Mesh Standard Hatches From Google’s Nest. Accessed: cations using IEEE802.15.4e TSCH,’’ IEEE Sensors J., vol. 13, no. 10,
Nov. 15, 2017. [Online]. Available: http://linuxgizmos.com/new- pp. 3655–3666, Oct. 2013.
wireless-mesh-standard-hatches-from-googles-nest/ [97] J. Vasseur, N. Agarwal, J. Hui, Z. Shelby, P. Bertrand, and C. Chauvenet,
[72] T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Proto- ‘‘RPL: The IP routing protocol designed for low power and lossy net-
col Version 1.2, document RFC 5246, Internet Requests for Comments, works,’’ Internet Protocol for Smart Objects Alliance, San Diego, CA,
Aug. 2008. [Online]. Available: http://www.rfc-editor.org/rfc/rfc5246.txt USA, White Paper, Apr. 2011.
[73] E. Rescorla and N. Modadugu, Datagram Transport Layer Security [98] P. Thubert et al., RPL: IPv6 Routing Protocol for Low-Power and Lossy
Version 1.2, document RFC 6347, Internet Requests for Comments, Networks, document RFC 6550, 2012.
Jan. 2012. [Online]. Available: http://www.rfc-editor.org/rfc/rfc6347.txt [99] Z. Shelby, K. Hartke, and C. Bormann, The Constrained Application
[74] ZigBee, Thread Take Bigger Step Toward Reducing IoT Protocol (COAP), document RFC 7252 Internet Engineering Task Force,
Fragmentation. Accessed: Dec. 10, 2017. [Online]. Available: 2014.
http://www.fiercewireless.com/tech/zigbee-thread-take-bigger-step- [100] C. Bormann, A. P. Castellani, and Z. Shelby, ‘‘CoAP: An application
toward-reducing-iot-fragmentation protocol for billions of tiny internet nodes,’’ IEEE Internet Comput.,
[75] C. Talcott, ‘‘Cyber-physical systems and events,’’ in Software-Intensive vol. 16, no. 2, pp. 62–67, Mar./Apr. 2012.
Systems and New Computing Paradigms. Berlin, Germany: Springer, [101] Q. Wang, X. Vilajosana, and T. Watteyne, 6TiSCH Operation Sub-
2008, pp. 101–115. layer (6top), document draft-wang-6tisch-6top-sublayer-01, Internet-
[76] L. Yongfu, S. Dihua, L. Weining, and Z. Xuebo, ‘‘A service-oriented Draft, IETF, 2014.
architecture for the transportation cyber-physical systems,’’ in Proc. Chin. [102] J. C. Haartsen, ‘‘The bluetooth radio system,’’ IEEE Pers. Commun.,
Control Conf. (CCC), 2012, pp. 7674–7678. vol. 7, no. 1, pp. 28–36, Feb. 2000.
[77] L. Catarinucci et al., ‘‘An IoT-aware architecture for smart healthcare [103] Bluetooth 5 Evolution Will Lead to Widespread Deployments on
systems,’’ IEEE Internet Things J., vol. 2, no. 6, pp. 515–526, Dec. 2015. the IoT Landscape. Accessed: Jan. 23, 2018. [Online]. Available:
https://www.abiresearch.com/press/bluetooth-5-evolution-will-lead-
[78] IEEE Standard for Low-Rate Wireless Networks, IEEE Standard
widespread-deploym/
802.15.4-2015 (Revision IEEE Standard 802.15.4-2011), Apr. 2016,
[104] Bluetooth Core Specification SIG Version 1.1, Bluetooth SIG, Kirkland,
pp. 1–709.
Washington, DC, USA, Feb. 2001.
[79] D. Rodenas-Herraiz et al., ‘‘Current trends in wireless mesh sensor
[105] IEEE Standard for Telecommunications and Information Exchange
networks: A review of competing approaches,’’ Sensors, vol. 13, no. 5,
Between Systems—LAN/MAN—Specific Requirements—Part 15: Wire-
pp. 5958–5995, 2013.
less Medium Access Control (MAC) and Physical Layer (PHY) Speci-
[80] G. Patti, G. Alderisi, and L. L. Bello, ‘‘Introducing multi-level commu- fications for Wireless Personal Area Networks (WPANs), IEEE Standard
nication in the IEEE 802.15.4e protocol: The MultiChannel-LLDN,’’ in 802.15.1-2002, Jun. 2002, pp. 1–473.
Proc. IEEE Emerg. Technol. Factory Autom. (ETFA), Sep. 2014, pp. 1–8. [106] Gartner Says Worldwide Wearable Devices Sales to Grow 18.4 Percent
[81] A. Berger, M. Pichler, W. Haselmayr, and A. Springer, ‘‘Energy-efficient in 2016. Accessed: Apr. 2, 2018. [Online]. Available: http://www.gartner.
and reliable wireless sensor networks—An extension to IEEE 802.15.4e,’’ com/newsroom/id/3198018
EURASIP J. Wireless Commun. Netw., vol. 2014, no. 1, p. 126, 2014. [107] C. Gomez, J. Oller, and J. Paradells, ‘‘Overview and evaluation of blue-
[82] Using IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in the tooth low energy: An emerging low-power wireless technology,’’ Sensors,
Internet of Things (IoT): Problem Statement. Accessed: Apr. 12, 2018. vol. 12, no. 9, pp. 11734–11753, 2012.
[Online]. Available: https://tools.ietf.org/html/rfc7554 [108] N. Golmie, N. Chevrollier, and O. Rebala, ‘‘Bluetooth and WLAN coexis-
[83] K. Pister and L. Doherty, ‘‘Technical overview of time synchronized mesh tence: Challenges and solutions,’’ IEEE Wireless Commun., vol. 10, no. 6,
protocol (TSMP),’’ Dust Netw., Hayward, CA, USA, White Paper, 2006. pp. 22–29, Dec. 2003.
[84] D. Chen, M. Nixon, and A. Mok, ‘‘Why WirelessHART,’’ in Wire- [109] Bluetooth Core Specification SIG Version 2.0, Bluetooth SIG, Kirkland,
lessHART. New York, NY, USA: Springer, 2010, pp. 195–199. Washington, DC, USA, Nov. 2004.
[110] Bluetooth Core Specification SIG Version 3.0, Bluetooth SIG, Kirkland, [135] The New Beacon Format From Google. Accessed: Dec. 18, 2017.
Washington, DC, USA, Apr. 2009. [Online]. Available: https://www.rfc-editor.org/rfc/rfc4944.txt
[111] B. Subbusundaram and P. Jawaharlal, ‘‘System implementation of push- [136] A. F. Harris, III, V. Khanna, G. Tuncay, R. Want, and R. Kravets, ‘‘Blue-
ing DATA to handheld devices via Bluetooth high speed specification, tooth low energy in dense IoT environments,’’ IEEE Commun. Mag.,
version 3.0 + HS,’’ in Proc. Int. Conf. Wireless Commun. Netw. Mobile vol. 54, no. 12, pp. 30–36, Dec. 2016.
Comput. (WiCOM), Sep. 2010, pp. 1–4. [137] CC2640R2F Data Sheet. Accessed: Apr. 20, 2018. [Online]. Available:
[112] A. Capone, M. Gerla, and R. Kapoor, ‘‘Efficient polling schemes for http://www.ti.com/product/CC2640R2F/datasheet
Bluetooth picocells,’’ in Proc. IEEE Int. Conf. Commun. (ICC), vol. 7, [138] FR32BG12 Blue Gecko Bluetooth Low Energy SoC Family Data
Jun. 2001, pp. 1990–1994. Sheet. Accessed: Jan. 14, 2018. [Online]. Available: https://www.silabs.
[113] S. Garg, M. Kalia, and R. Shorey, ‘‘MAC scheduling policies for power com/documents/login/data-sheets/efr32bg12-datasheet.pdf
optimization in Bluetooth: A master driven TDD wireless system,’’ in [139] nRF52840. Accessed: Jan. 14, 2018. [Online]. Available:
Proc. IEEE 51st Veh. Technol. Conf. (VTC-Spring), Tokyo, Japan, vol. 1, http://infocenter.nordicsemi.com/pdf/nRF52840_PB_v1.0.pdf
May 2000, pp. 196–200. [140] nRF52832 Product Specification V1.3. Accessed: Jan. 14, 2018. [Online].
[114] I. Chakraborty, A. Kashyap, A. Rastogi, H. Saran, R. Shorey, and Available: http://infocenter.nordicsemi.com/pdf/nRF52832_PS_v1.3.pdf
A. Kumar, ‘‘Policies for increasing throughput and decreasing power [141] EM9304. Accessed: Jan. 14, 2018. [Online]. Available:
consumption in Bluetooth MAC,’’ in Proc. IEEE Int. Conf. Pers. Wireless http://www.emmicroelectronic.com/sites/default/files/public/products/
Commun., Dec. 2000, pp. 90–94. datasheets/9304-fs.pdf
[115] I. Chakraborty, A. Kashyap, A. Kumar, A. Rastogi, H. Saran, and [142] M. Collotta, G. Pau, T. Talty, and O. K. Tonguz, ‘‘Bluetooth 5: A concrete
R. Shorey, ‘‘MAC scheduling policies with reduced power consump- step forward toward the IoT,’’ IEEE Commun. Mag., vol. 56, no. 7,
tion and bounded packet delays for centrally controlled TDD wire- pp. 125–131, Jul. 2018.
less networks,’’ in Proc. IEEE Int. Conf. Commun., vol. 7, Jun. 2001,
[143] G. Pau, M. Collotta, and V. Maniscalco, ‘‘Bluetooth 5 energy management
pp. 1980–1984.
through a fuzzy-PSO solution for mobile devices of Internet of Things,’’
[116] D. Miorandi, A. Zanella, and G. Pierobon, ‘‘Performance evaluation of
Energies, vol. 10, no. 7, p. 992, 2017.
Bluetooth polling schemes: An analytical approach,’’ Mobile Netw. Appl.,
[144] P. Di Marco, P. Skillermark, A. Larmo, P. Arvidson, and R. Chirikov,
vol. 9, no. 1, pp. 63–72, 2004.
‘‘Performance evaluation of the data transfer modes in bluetooth 5,’’ IEEE
[117] M. Duflot, M. Kwiatkowska, G. Norman, and D. Parker, ‘‘A formal
Commun. Standards Mag., vol. 1, no. 2, pp. 92–97, Jul. 2017.
analysis of Bluetooth device discovery,’’ Int. J. Softw. Tools Technol.
Transf., vol. 8, no. 6, pp. 621–632, 2006. [145] nRF52840 Objective Prodcut Spesification v0.5.1. Accessed:
Jan. 14, 2018. [Online]. Available: http://infocenter.nordicsemi.
[118] F. Siegemund and M. Rohs, ‘‘Rendezvous layer protocols for Bluetooth-
com/pdf/nRF52840_OPS_v0.5.1.pdf
enabled smart devices,’’ Trends Netw. Pervas. Comput., vol. 7, no. 2,
pp. 91–101, 2003. [146] CC2564MODx Bluetooth Host Controller Interface (HCI) Module.
[Online]. Available: http://www.ti.com/lit/ds/symlink/cc2564moda.pdf
[119] A. Jedda, A. Casteigts, G.-V. Jourdan, and H. T. Mouftah, ‘‘Bluetooth
scatternet formation from a time-efficiency perspective,’’ Wireless Netw., [147] CC2640R2F Datasheet. Accessed: Jan. 15, 2018. [Online]. Available:
vol. 20, no. 5, pp. 1133–1156, 2014. http://www.ti.com/product/CC2640R2F/datasheet/specifications#
[120] C. Petrioli, S. Basagni, and M. Chlamtac, ‘‘Configuring BlueStars: Multi- SWRS158992
hop scatternet formation for Bluetooth networks,’’ IEEE Trans. Comput., [148] R. Draves, J. Padhye, and B. Zill, ‘‘Routing in multi-radio, multi-hop
vol. 52, no. 6, pp. 779–790, Jun. 2003. wireless mesh networks,’’ in Proc. 10th Annu. Int. Conf. Mobile Comput.
[121] C. Petrioli, S. Basagni, and I. Chlamtac, ‘‘BlueMesh: Degree-constrained Netw. (MobiCom), 2004, pp. 114–128.
multi-hop scatternet formation for Bluetooth networks,’’ Mobile Netw. [149] P. Zenker, S. Krug, M. Binhack, and J. Seitz, ‘‘Evaluation of BLE mesh
Appl., vol. 9, no. 1, pp. 33–47, 2004. capabilities: A case study based on csrmesh,’’ in Proc. Int. Conf. Ubiqui-
[122] C.-Y. Chang and H.-R. Chang, ‘‘Adaptive role switching protocol for tous Future Netw. (ICUFN), 2016, pp. 790–795.
improving scatternet performance in Bluetooth radio networks,’’ IEEE [150] Mesh Networking Specifications 1.0, Bluetooth SIG, Kirkland,
Trans. Consum. Electron., vol. 52, no. 4, pp. 1229–1238, Nov. 2006. Washington, DC, USA, Jul. 2017.
[123] S. Basagni, R. Bruno, G. Mambrini, and C. Petrioli, ‘‘Comparative per- [151] M. Baert, J. Rossey, A. Shahid, and J. Hoebeke, ‘‘The Bluetooth mesh
formance evaluation of scatternet formation protocols for networks of standard: An overview and experimental evaluation,’’ Sensors, vol. 18,
Bluetooth devices,’’ Wireless Netw., vol. 10, no. 2, pp. 197–213, 2004. no. 8, p. 2409, 2018.
[124] G. V. Zaruba, S. Basagni, and I. Chlamtac, ‘‘Bluetrees-scatternet for- [152] M. Gentili, R. Sannino, and M. Petracca, ‘‘Bluevoice: Voice communi-
mation to enable Bluetooth-based ad hoc networks,’’ in Proc. Int. Conf. cations over Bluetooth low energy in the Internet of Things scenario,’’
Commun. (ICC), vol. 1, 2001, pp. 273–277. Comput. Commun., vols. 89–90, pp. 51–59, Sep. 2016.
[125] Z. Wang, R. J. Thomas, and Z. Haas, ‘‘Bluenet—A new scatternet forma- [153] W. Yoon, K. Kwon, M. Ha, and D. Kim, ‘‘Transfer IPv6 packets over
tion scheme,’’ in Proc. Int. Conf. Syst. Sci., 2002, p. 9. Bluetooth low energy with ensuring emergency data transmission,’’ in
[126] Bluetooth Core Specification SIG Version 4.1, Bluetooth SIG, Kirkland, Proc. Int. Conf. Commun. Electron. (ICCE), 2016, pp. 136–141.
Washington, DC, USA, Dec. 2013. [154] H. Wang, M. Xi, J. Liu, and C. Chen, ‘‘Transmitting IPv6 packets over
[127] Bluetooth Core Specification SIG Version 4.2, Bluetooth SIG, Kirkland, Bluetooth low energy based on BlueZ,’’ in Proc. Int. Conf. Adv. Commun.
Washington, DC, USA, Dec. 2014. Technol. (ICACT), 2013, pp. 72–77.
[128] IPv6 Over Bluetooth(R) Low Energy. Accessed: May 10, 2018. [Online]. [155] L. Angrisani, M. Bertocco, D. Fortin, and A. Sona, ‘‘Experimental study
Available: https://tools.ietf.org/html/rfc7668 of coexistence issues between IEEE 802.11b and IEEE 802.15.4 wireless
[129] Bluetooth Core Specification SIG Version 5.0. networks,’’ IEEE Trans. Instrum. Meas., vol. 57, no. 8, pp. 1514–1523,
[130] P. Fuxjager, D. Valerio, and F. Ricciato, ‘‘The myth of non-overlapping Aug. 2008.
channels: Interference measurements in IEEE 802.11,’’ in Proc. Annu. [156] IEEE 802.15.2: Coexistence of Wireless Personal Area Networks With
Conf. Wireless Demand Netw. Syst. Services, 2007, pp. 1–8. Other Wireless Devices Operating in Unlicensed Frequency Bands.
[131] J. Nieminen et al., ‘‘Networking solutions for connecting Bluetooth low Accessed: Dec. 10, 2017. [Online]. Available: https://standards.ieee.org/
energy enabled machines to the Internet of Things,’’ IEEE Netw., vol. 28, findstds/standard/802.15.2-2003.html
no. 6, pp. 83–90, Nov. 2014. [157] A. Sikora and V. F. Groza, ‘‘Coexistence of IEEE802.15.4 with other sys-
[132] A. Nikoukar, M. Abboud, B. Samadi, M. Güneş, and B. Dezfouli, tems in the 2.4 GHz-ISM-band,’’ in Proc. IEEE Instrum. Meas. Technol.
‘‘Empirical analysis and modeling of Bluetooth low-energy (BLE) adver- Conf. (IMTC), vol. 3, May 2005, pp. 1786–1791.
tisement channels,’’ in Proc. 17th Annu. Medit. Ad Hoc Netw. Workshop [158] S. Pollin, I. Tan, B. Hodge, C. Chun, and A. Bahai, ‘‘Harmful coexistence
(Med-Hoc-Net), Jun. 2018, pp. 1–6. between 802.15.4 and 802.11: A measurement-based study,’’ in Proc.
[133] N. Gupta, Inside Bluetooth Low Energy. Norwood, MA, USA: Artech Int. Conf. Cogn. Radio Oriented Wireless Netw. Commun. (CrownCom),
House, 2016. 2008, pp. 1–6.
[134] iBeacons Bible 1.0. Accessed: Nov. 28, 2017. [Online]. Available: [159] Co-Existence of IEEE 802.15.4 at 2.4 GHz Application Note.
https://meetingofideas.files.wordpress.com/2013/12/ibeacons-bible-1- Accessed: Apr. 17, 2018. [Online]. Available: http://www.nxp.com/
0.pdf docs/en/application-note/JN-AN-1079.pdf
[160] S. M. Kim et al., ‘‘Experiments on interference and coexistence between [184] D. Niyato, L. Xiao, and P. Wang, ‘‘Machine-to-machine communications
ZigBee and WLAN devices operating in the 2.4 GHz ISM band,’’ in Proc. for home energy management system in smart grid,’’ IEEE Commun.
NGPC, 2005, pp. 15–19. Mag., vol. 49, no. 4, pp. 53–59, Apr. 2011.
[161] W. Guo, W. M. Healy, and M. Zhou, ‘‘Impacts of 2.4-GHz ISM band [185] Gartner Says a Typical Family Home Could Contain More Than 500
interference on IEEE 802.15.4 wireless sensor network reliability in Smart Devices by 2022. Accessed: May 14, 2018. [Online]. Available:
buildings,’’ IEEE Trans. Instrum. Meas., vol. 61, no. 9, pp. 2533–2544, http://www.gartner.com/newsroom/id/2839717
Sep. 2012. [186] Wireless Technologies for Home Automation. Accessed: Nov. 14,
[162] R. Pust and K. Burda, ‘‘Comparing performance of FH and AFH sys- 2017. [Online]. Available: https://www.abiresearch.com/market-
tems,’’ Int. J. Comput. Sci. Netw. Secur., vol. 10, no. 2, pp. 82–85, 2010. research/product/1015618-wireless-technologies-for-home-automation/
[163] O. A. Bamahdi and S. A. Zummo, ‘‘An adaptive frequency hopping [187] Gartner Says Smart Lighting Has the Potential to Reduce Energy Costs
techniquewith application to Bluetooth-WLAN coexistence,’’ in Proc. by 90 Percent. Accessed: Nov. 14, 2017. [Online]. Available: http://www.
Int. Conf. Netw., Int. Conf. Syst. Int. Conf. Mobile Commun. Learn. gartner.com/newsroom/id/3093717/
Technol. (ICNICONSMCL), 2006, p. 131. [188] Heating and Cooling No Longer Majority of U.S. Home
[164] B. Zhen, Y. Kim, and K. Jang, ‘‘The analysis of coexistence mechanisms Energy Use. Accessed: Dec. 20, 2017. [Online]. Available:
of Bluetooth,’’ in Veh. Technol.Conference, 2002. VTC Spring 2002. IEEE https://www.eia.gov/todayinenergy/detail.php?id=10271
55th, vol. 1. IEEE, 2002, pp. 419–423. [189] M. C. Bozchalui, S. A. Hashmi, H. Hassen, C. A. Canizares, and
[165] S.-H. Lee and Y.-H. Lee, ‘‘Adaptive frequency hopping and power control K. Bhattacharya, ‘‘Optimal operation of residential energy hubs in smart
based on spectrum characteristic of error sources in Bluetooth systems,’’ grids,’’ IEEE Trans. Smart Grid, vol. 3, no. 4, pp. 1755–1766, Dec. 2012.
Comput. Electr. Eng., vol. 36, no. 2, pp. 341–351, 2010. [190] Wireless Technologies for Home Automation. Accessed: Jul. 17,
[166] M. Siekkinen, M. Hiienkari, J. K. Nurminen, and J. Nieminen, ‘‘How 2018. [Online]. Available: https://www.abiresearch.com/market-
low energy is Bluetooth low energy? Comparative measurements with research/product/1015618-wireless-technologies-for-home-automation/
ZigBee/802.15.4,’’ in Proc. Int. Conf. Wireless Commun. Netw. Conf. [191] T. K. L. Hui, R. S. Sherratt, and D. D. Sánchez, ‘‘Major requirements for
Workshops (WCNCW), 2012, pp. 232–237. building smart homes in smart cities based on Internet of Things technolo-
[167] M. O. Al Kalaa, W. Balid, N. Bitar, and H. H. Refai, ‘‘Evaluating gies,’’ Future Gener. Comput. Syst., vol. 76, pp. 358–369, Nov. 2017.
bluetooth low energy in realistic wireless environments,’’ in Proc. IEEE [192] Making the Smart Home a Reality: Consumers Voice Their
Wireless Commun. Netw. Conf. (WCNC), Apr. 2016, pp. 1–6. Opinions. [Online]. Available: https://www.bluetooth.com/news/
[168] W. Bronzi, R. Frank, G. Castignani, and T. Engel, ‘‘Bluetooth low pressreleases/2015/03/30/making-the-smart-home-a-realityconsumers-
energy performance and robustness analysis for inter-vehicular commu- voice-their-opinions
nications,’’ Ad Hoc Netw., vol. 37, pp. 76–86, Feb. 2016. [193] M. Starsinic, ‘‘System architecture challenges in the home M2M net-
[169] Y. Kawahara, X. Bian, R. Shigeta, R. Vyas, M. M. Tentzeris, and work,’’ in Proc. Appl. Technol. Conf. (LISAT), 2010, pp. 1–7.
T. Asami, ‘‘Power harvesting from microwave oven electromagnetic
[194] N. Langhammer and R. Kays, ‘‘Performance evaluation of wireless home
leakage,’’ in Proc. ACM Int. Joint Conf. Pervas. Ubiquitous Comput.,
automation networks in indoor scenarios,’’ IEEE Trans. Smart Grid,
2013, pp. 373–382.
vol. 3, no. 4, pp. 2252–2261, Dec. 2012.
[170] Surveys of Microwave Ovens in U.S. Homes. Accessed: May 21, 2018.
[195] R. Ramlee, D. Tang, and M. Ismail, ‘‘Smart home system for disabled
[Online]. Available: https://eta.lbl.gov/publications/surveys-microwave-
people via wireless Bluetooth,’’ in Proc. Int. Conf. Syst. Eng. Tech-
ovens-us-homes
nol. (ICSET), 2012, pp. 1–4.
[171] K. R. Chowdhury and I. F. Akyildiz, ‘‘Interferer classification, channel
[196] R. Piyare and M. Tazil, ‘‘Bluetooth based home automation system
selection and transmission adaptation for wireless sensor networks,’’ in
using cell phone,’’ in Proc. Int. Symp. Consum. Electron. (ISCE), 2011,
Proc. IEEE Int. Conf. Commun., Jun. 2009, pp. 1–5.
pp. 192–195.
[172] T. W. Rondeau, M. F. D’Souza, and D. G. Sweeney, ‘‘Residential
[197] G. D. Putra, A. R. Pratama, A. Lazovik, and M. Aiello, ‘‘Comparison of
microwave oven interference on Bluetooth data performance,’’ IEEE
energy consumption in Wi-Fi and Bluetooth communication in a smart
Trans. Consum. Electron., vol. 50, no. 3, pp. 856–863, Aug. 2004.
building,’’ in Proc. Comput. Commun. Workshop Conf. (CCWC), 2017,
[173] M. B. Yassein, W. Mardini, and A. Khalil, ‘‘Smart homes automa-
pp. 1–6.
tion using Z-wave protocol,’’ in Proc. Int. Conf. Eng. MIS (ICEMIS),
Sep. 2016, pp. 1–6. [198] UniKey Smart Lock. Accessed: Jun. 13, 2018. [Online]. Available:
https://www.unikey.com/
[174] P. Amaro, R. Cortesão, J. Landeck, and P. Santos, ‘‘Implementing an
advanced meter reading infrastructure using a Z-wave compliant wireless [199] BOLT Smart Lock. Accessed: Jun. 13, 2018. [Online]. Available:
sensor network,’’ in Proc. Int. Youth Conf. Energetics (IYCE), 2011, https://lockitron.com/
pp. 1–6. [200] White-Rodgers Programmable—Universal Staging Thermostats.
[175] J. D. Fuller and B. W. Ramsey, ‘‘Rogue Z-wave controllers: A persistent Accessed: Jun. 13, 2018. [Online]. Available: http://www.
attack channel,’’ in Proc. IEEE 40th Local Comput. Netw. Conf. Work- emersonclimate.com/en-us/products/thermostats/pages/thermostats.aspx
shops (LCN Workshops), Oct. 2015, pp. 734–741. [201] E. Dahlgren and H. Mahmood, ‘‘Evaluation of indoor positioning based
[176] IEEE P802.11—TASK GROUP AH. Accessed: Oct. 20, 2017. [Online]. on Bluetooth smart technology,’’ M.S. thesis, Dept. Comput. Sci. Eng.,
Available: http://www.ieee802.org/11/Reports/tgah_update.htm Chalmers Univ. Technol., Göteborg, Sweden, 2014.
[177] T. Adame, A. Bel, B. Bellalta, J. Barcelo, and M. Oliver, ‘‘IEEE [202] S. Raza, P. Misra, Z. He, and T. Voigt, ‘‘Bluetooth smart: An enabling
802.11AH: The WiFi approach for M2M communications,’’ IEEE Wire- technology for the Internet of Things,’’ in Proc. Wireless Mobile Comput.,
less Commun., vol. 21, no. 6, pp. 144–152, Dec. 2014. Netw. Commun. (WiMob), 2015, pp. 155–162.
[178] S. Aust, R. V. Prasad, and I. G. M. M. Niemegeers, ‘‘IEEE 802.11ah: [203] Bluetooth 5, Beacon Technology and the Internet of Things Rethink-
Advantages in standards and further challenges for sub 1 GHz Wi-Fi,’’ in ing the Future. [Online]. Available: https://www.bluetooth.com/~/media/
Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2012, pp. 6885–6889. files/marketing/bluetooth5-rethinking-the-future.ashx?la=en
[179] M. Park, ‘‘IEEE 802.11ah: Sub-1-GHz license-exempt operation for the [204] C. Gomez and J. Paradells, ‘‘Wireless home automation networks:
Internet of Things,’’ IEEE Commun. Mag., vol. 53, no. 9, pp. 145–151, A survey of architectures and technologies,’’ IEEE Commun. Mag.,
Sep. 2015. vol. 48, no. 6, pp. 92–101, Jun. 2010.
[180] Semtech. Accessed: Jun. 19, 2018. [Online]. Available: [205] R. Craciunescu, S. Halunga, and O. Fratu, ‘‘Wireless zigbee home
https://www.semtech.com/ automation system,’’ in Advanced Topics in Optoelectronics, Microelec-
[181] LoRa Alliance. Accessed: Jun. 30, 2018. [Online]. Available: tronics, and Nanotechnologies. Bellingham, WA, USA: SPIE, 2015,
https://www.lora-alliance.org/ p. 925826.
[182] N. E. Klepeis et al., ‘‘The national human activity pattern survey [206] A.-C. Olteanu, G.-D. Oprina, N. Tapus, and S. Zeisberg, ‘‘Enabling
(NHAPS): A resource for assessing exposure to environmental pollu- mobile devices for home automation using zigbee,’’ in Proc. Int. Conf.
tants,’’ J. Exposure Sci. Environ. Epidemiol., vol. 11, no. 3, p. 231, 2001. Control Syst. Comput. Sci. (CSCS), 2013, pp. 189–195.
[183] Home Automation System Market Worth 79.57 Billion USD by [207] Control4 Smart Home Automation. Accessed: Apr. 19, 2018. [Online].
2022. Accessed: Jan. 13, 2018. [Online]. Available: http://www. Available: https://www.control4.com/
marketsandmarkets.com/PressReleases/home-automation-control- [208] Philips Hue. Accessed: Jun. 25, 2018. [Online]. Available:
systems.asp http://www2.meethue.com/
[209] Z-Wave Alliance. Accessed: Jun. 25, 2018. [Online]. Available: [236] B. Yu, L. Xu, and Y. Li, ‘‘Bluetooth low energy (BLE) based mobile
http://www.z-wave.com/ electrocardiogram monitoring system,’’ in Proc. Int. Conf. Inf. Autom.
[210] INSTEON. Accessed: Jun. 25, 2018. [Online]. Available: (ICIA), Jun. 2012, pp. 763–767.
http://www.insteon.com/ [237] H. T. Cheng and W. Zhuang, ‘‘Bluetooth-enabled in-home patient mon-
[211] Intermatic. Accessed: Jun. 25, 2018. [Online]. Available: itoring system: Early detection of Alzheimer’s disease,’’ IEEE Wireless
https://www.intermatic.com/ Commun., vol. 17, no. 1, pp. 74–79, Feb. 2010.
[212] Hawking Technology: High Performance Wireless Technology. Accessed: [238] Jawbone. Accessed: Jun. 20, 2018. [Online]. Available:
Jun. 25, 2018. [Online]. Available: http://hawkingtech.com https://jawbone.com/
[213] Wink. Accessed: Jun. 25, 2018. [Online]. Available: [239] Apple Watch Series 2. Accessed: May 11, 2018. [Online]. Available:
https://www.wink.com/ https://www.apple.com/apple-watch-series-2/
[214] Aeotec. Accessed: Jun. 25, 2018. [Online]. Available: https://aeotec.com/ [240] Samsung Gear: Smartwatches & Fitness Track-
ers. Accessed: Jul. 13, 2018. [Online]. Available:
[215] Smartlabs. Accessed: Jun. 25, 2018. [Online]. Available:
https://www.samsung.com/us/mobile/wearables/
http://www.smarthome.com/
[241] P. Frehill, D. Chambers, and C. Rotariu, ‘‘Using ZigBee to integrate med-
[216] INSTEON White Paper Compared. Accessed: Jun. 27, 2018.
ical devices,’’ in Proc. Int. Conf. IEEE Eng. Med. Biol. Soc., Aug. 2007,
[Online]. Available: http://cache.insteon.com/documentation/insteon_
pp. 6717–6720.
compared.pdf
[242] B. Kim, Y. Kim, I. Lee, and I. You, ‘‘Design and implementation of a
[217] INSTEON White Paper the Details. Accessed: Jun. 28, 2018. [Online]. ubiquitous ECG monitoring system using SIP and the ZigBee network,’’
Available: http://cache.insteon.com/documentation/insteon_details.pdf in Proc. Future Gener. Commun. Netw., vol. 2, 2007, pp. 599–604.
[218] EnOcean. Accessed: Apr. 12, 2018. [Online]. Available: [243] M. L. Huang and S.-C. Park, ‘‘A WLAN and ZigBee coexistence mech-
https://www.enocean.com/ anism for wearable health monitoring system,’’ in Proc. Int. Symp. Com-
[219] Information Technology—Home Electronic Systems (HES) mun. Inf. Technol., 2009, pp. 555–559.
Architecture—Part 3-10: Wireless Short-Packet (WSP) Protocol [244] F. Touati, R. Tabish, and A. B. Mnaouer, ‘‘Towards u-health: An indoor
Optimized for Energy Harvesting—Architecture and Lower Layer 6LoWPAN based platform for real-time healthcare monitoring,’’ in Proc.
Protocols, document ISO/IEC 14543-3-10:2012, 2012. [Online]. Int. Conf. Wireless Mobile Netw. Conf. (WMNC), 2013, pp. 1–4.
Available: https://www.iso.org/standard/59865.html [245] C. Doukas and I. Maglogiannis, ‘‘Bringing IoT and cloud computing
[220] J. Ploennigs, U. Ryssel, and K. Kabitzsch, ‘‘Performance analysis of the towards pervasive healthcare,’’ in Proc. Int. Conf. Innov. Mobile Internet
EnOcean wireless sensor network protocol,’’ in Proc. IEEE Conf. Emerg. Services Ubiquitous Comput., 2012, pp. 922–926.
Technol. Factory Autom. (ETFA), Sep. 2010, pp. 1–9. [246] V. C. Gungor and G. P. Hancke, ‘‘Industrial wireless sensor networks:
[221] L. Schwiebert, S. K. Gupta, and J. Weinmann, ‘‘Research challenges Challenges, design principles, and technical approaches,’’ IEEE Trans.
in wireless networks of biomedical sensors,’’ in Proc. Annu. Int. Conf. Ind. Electron., vol. 56, no. 10, pp. 4258–4265, Oct. 2009.
Mobile Comput. Netw. (MobiCom), 2001, pp. 151–165. [247] A. Frotzscher et al., ‘‘Requirements and current solutions of wireless
[222] Life Expectancy Data by WHO Region. Accessed: Feb. 19, communication in industrial automation,’’ in Proc. IEEE Int. Conf. Com-
2018. [Online]. Available: http://apps.who.int/gho/data/view. mun. Workshops (ICC), Jun. 2014, pp. 67–72.
main.SDG2016LEXREGv?lang=en/ [248] T. Lennvall, S. Svensson, and F. Hekland, ‘‘A comparison of Wire-
[223] United Nations Report: World Population Ageing. Accessed: Feb. lessHART and ZigBee for industrial applications,’’ in Proc. IEEE Int.
19, 2018. [Online]. Available: http://www.un.org/en/development/ Workshop Factory Commun. Syst., May 2008, pp. 85–88.
desa/population/publications/pdf/ageing/WPA2015_Report.pdf/ [249] M. Nixon, ‘‘A comparison of WirelessHART and ISA100.11a,’’ Emerson
[224] Healthcare Costs and U.S. Competitiveness. Accessed: Feb. 19, 2018. Process Manage., Round Rock, TX, USA, White Paper, 2012, pp. 1–36.
[Online]. Available: https://www.cfr.org/backgrounder/healthcare-costs- [250] Gartner Says Smart Cities Will Use 1.6 Billion Connected
and-us-competitiveness/ Things in 2016. Accessed: May 10, 2018. [Online]. Available:
[225] C. Cordeiro, Use Cases, Applications, and Requirements for Bans, docu- http://www.gartner.com/newsroom/id/3175418
ment IEEE 802.15-07-0564, 2007. [251] I. A. T. Hashem et al., ‘‘The role of big data in smart city,’’ Int. J. Inf.
[226] M. Patel and J. Wang, ‘‘Applications, challenges, and prospective in Manage., vol. 36, no. 5, pp. 748–758, 2016.
emerging body area networking technologies,’’ IEEE Wireless Commun., [252] K. Kientopf, S. Raza, S. Lansing, and M. Güneş, ‘‘Service management
vol. 17, no. 1, pp. 80–88, Feb. 2010. platform to support service migrations for IoT smart city applications,’’
[227] B. Zhen, M. Patel, S. Lee, E. Won, and A. Astrin, TG6 Technical in Proc. Int. Symp. Pers., Indoor, Mobile Radio Commun. (PIMRC),
Requirements Document (TRD), document IEEE P802. 15-08-0644-09- Oct. 2017, pp. 1–5.
0006, 2008. [253] K. Su, J. Li, and H. Fu, ‘‘Smart city and the applications,’’ in Proc.
IEEE Int. Conf. Electron., Commun. Control (ICECC), Sep. 2011,
[228] Y. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao, and M. Guizani, ‘‘Home
pp. 1028–1031.
M2M networks: Architectures, standards, and QoS improvement,’’ IEEE
[254] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi,
Commun. Mag., vol. 49, no. 4, pp. 44–52, Apr. 2011.
‘‘Internet of Things for smart cities,’’ IEEE Internet Things J., vol. 1, no. 1,
[229] Y. Yuehong, Y. Zeng, X. Chen, and Y. Fan, ‘‘The Internet of Things in
pp. 22–32, Feb. 2014.
healthcare: An overview,’’ J. Ind. Inf. Integr., vol. 1, pp. 3–13, Mar. 2016.
[255] I. Yaqoob, I. A. T. Hashem, Y. Mehmood, A. Gani, S. Mokhtar, and
[230] A. M. Rahmani et al., ‘‘Exploiting smart e-health gateways at the edge S. Guizani, ‘‘Enabling communication technologies for smart cities,’’
of healthcare Internet-of-Things: A fog computing approach,’’ Future IEEE Commun. Mag., vol. 55, no. 1, pp. 112–120, Jan. 2017.
Gener. Comput. Syst., vol. 78, pp. 641–658, Jan. 2017. [256] Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. McCann, and K. Leung,
[231] G. Muhammad, S. M. M. Rahman, A. Alelaiwi, and A. Alamri, ‘‘Smart ‘‘A survey on the IETF protocol suite for the Internet of Things: Stan-
health solution integrating IoT and cloud: A case study of voice pathology dards, challenges, and opportunities,’’ IEEE Wireless Commun., vol. 20,
monitoring,’’ IEEE Commun. Mag., vol. 55, no. 1, pp. 69–73, Jan. 2017. no. 6, pp. 91–98, Dec. 2013.
[232] M. A. Chowdhury, W. Mciver, and J. Light, ‘‘Data association in remote [257] I. Yaqoob et al., ‘‘Internet of Things architecture: Recent advances,
health monitoring systems,’’ IEEE Commun. Mag., vol. 50, no. 6, taxonomy, requirements, and open challenges,’’ IEEE Wireless Commun.,
pp. 144–149, Jun. 2012. vol. 24, no. 3, pp. 10–16, Jun. 2017.
[233] H. Mamaghanian, N. Khaled, D. Atienza, and P. Vandergheynst, ‘‘Com- [258] M. R. Palattella et al., ‘‘Standardized protocol stack for the Internet
pressed sensing for real-time energy-efficient ECG compression on wire- of (important) Things,’’ IEEE Commun. Surveys Tuts., vol. 15, no. 3,
less body sensor nodes,’’ IEEE Trans. Biomed. Eng., vol. 58, no. 9, pp. 1389–1406, 3rd Quart., 2013.
pp. 2456–2466, Sep. 2011. [259] S. Li, L. Xu, and S. Zhao, ‘‘The Internet of Things: A survey,’’ Inf. Syst.
[234] T. Suzuki, H. Tanaka, S. Minami, H. Yamada, and T. Miyata, ‘‘Wearable Frontiers, vol. 17, no. 2, pp. 243–259, 2015.
wireless vital monitoring technology for smart health care,’’ in Proc. Int. [260] M. C. Domingo, ‘‘An overview of the Internet of Things for people with
Symp. Med. Inf. Commun. Technol. (ISMICT), 2013, pp. 1–4. disabilities,’’ J. Netw. Comput. Appl., vol. 35, no. 2, pp. 584–596, 2012.
[235] T. Zhang, J. Lu, F. Hu, and Q. Hao, ‘‘Bluetooth low energy for wearable [261] S. Movassaghi, M. Abolhasan, J. Lipman, D. Smith, and A. Jamalipour,
sensor-based healthcare systems,’’ in Proc. IEEE Conf. Healthcare Innov. ‘‘Wireless body area networks: A survey,’’ IEEE Commun. Surveys Tuts.,
(HIC), Oct. 2014, pp. 251–254. vol. 16, no. 3, pp. 1658–1686, Jan. 2014.
[262] M. Alaa, A. A. Zaidan, B. B. Zaidan, M. Talal, and M. L. M. Kiah, ‘‘A ANGELINA POOLE received the bachelor’s
review of smart home applications based on Internet of Things,’’ J. Netw. degree in computer science and engineering from
Comput. Appl., vol. 97, pp. 48–65, Nov. 2017. Santa Clara University in 2018. She is currently
[263] U. Raza, P. Kulkarni, and M. Sooriyabandara, ‘‘Low power wide area pursuing the master’s degree in computer science
networks: An overview,’’ IEEE Commun. Surveys Tuts., vol. 19, no. 2, with the University of California at Los Angeles,
pp. 855–873, 2nd Quart., 2017. Los Angeles, CA, USA. At Santa Clara University,
[264] S.-M. Darroudi and C. Gomez, ‘‘Bluetooth low energy mesh networks: A she was a Research Assistant with the Internet
survey,’’ Sensors, vol. 17, no. 7, p. 1467, Jul. 2017.
of Things Laboratory under the supervision of
[265] R. T. Hermeto, A. Gallais, and F. Theoleyre, ‘‘Scheduling for
Dr. B. Dezfouli.
IEEE802.15.4-TSCH and slow channel hopping MAC in low power
industrial wireless networks: A survey,’’ Comput. Commun., vol. 114,
pp. 84–105, Dec. 2017.
[266] P. Baronti, P. Pillai, V. W. C. Chook, S. Chessa, A. Gotta, and
Y. F. Hu, ‘‘Wireless sensor networks: A survey on the state of the art and
the 802.15.4 and ZigBee standards,’’ Comput. Commun., vol. 30, no. 7,
pp. 1655–1695, 2007. MESUT GÜNEŞ received the M.Sc. equivalent
[267] J. Blanckenstein, J. Klaue, and H. Karl, ‘‘A survey of low-power diploma degree in computer science and the Ph.D.
transceivers and their applications,’’ IEEE Circuits Syst. Mag., vol. 15, degree from RWTH Aachen University, Germany,
no. 3, pp. 6–17, 3rd Quart., 2015. in 1998 and 2004, respectively. From 2004 to
2005, he was a Research Fellow at the Interna-
ALI NIKOUKAR received the master’s degree tional Computer Science Institute, Berkeley, CA,
in computer science from University Technol- USA. He was a Professor in distributed embedded
ogy Malaysia in 2014. He is currently pursu- systems at Freie Universität Berlin, Germany, from
ing the Ph.D. degree with the Communication 2007 and to 2014. From 2014 to 2016, he was a
and Networked Systems Research Group, Otto Professor in communication and networked sys-
von Guericke University Magdeburg, Magdeburg, tems at the University of Münster, Germany. He has been a Full Professor at
Germany (awarded by DAAD scholarship). His the Faculty of Computer Science, Otto von Guericke University Magdeburg,
research area mainly focuses on low-power wire- Magdeburg, Germany, since 2016. His research interests include distributed
less networks, in particular, the applications of communication systems, Internet of Things, wired and wireless computer
deep-learning in cognitive radio networks and the networks particularly wireless sensor networks, wireless mesh networks, and
Internet of things. mobile ad-hoc networks. He is involved in several national and international
research projects in the mentioned areas.