Sie sind auf Seite 1von 57

IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO.

1, FIRST QUARTER 2018 39

A Critical Analysis of Research Potential,


Challenges, and Future Directives in Industrial
Wireless Sensor Networks
Mohsin Raza, Student Member, IEEE, Nauman Aslam, Member, IEEE, Hoa Le-Minh, Member, IEEE,
Sajjad Hussain, Member, IEEE, Yue Cao , Member, IEEE,
and Noor Muhammad Khan, Senior Member, IEEE,

Abstract—In recent years, industrial wireless sensor net- I. I NTRODUCTION


works (IWSNs) have emerged as an important research theme
NDUSTRIES have always been under continuous improve-
with applications spanning a wide range of industries includ-
ing automation, monitoring, process control, feedback systems,
and automotive. Wide scope of IWSNs applications ranging from
I ments since the very beginning of the industrial era. This
gradual improvement is undoubtedly the outcome of continu-
small production units, large oil and gas industries to nuclear ous technology development in this field, which has kept the
fission control, enables a fast-paced research in this field. Though industries on its toes, looking for new methods for improve-
IWSNs offer advantages of low cost, flexibility, scalability, self- ment of productivity and operational efficiency. More recently
healing, easy deployment, and reformation, yet they pose certain
limitations on available potential and introduce challenges on the continuous quality improvement has become the only
multiple fronts due to their susceptibility to highly complex mean to survive in the industrial race [1]. The past few years
and uncertain industrial environments. In this paper, a detailed have resulted in vast expansion in industries. This expansion
discussion on design objectives, challenges, and solutions, for equipped the industries with the latest technology at hand, to
IWSNs, are presented. A careful evaluation of industrial systems, develop self-sufficient, spontaneous and computerized work
deadlines, and possible hazards in industrial atmosphere are dis-
environments. Moreover, with the successful incorporation of
cussed. This paper also presents a thorough review of the existing
standards and industrial protocols and gives a critical evaluation advance automation and process control, the productivity and
of potential of these standards and protocols along with a detailed products’ quality has greatly improved [2]. These improve-
discussion on available hardware platforms, specific industrial ments, though highly impressive yet add high complexity to
energy harvesting techniques and their capabilities. This paper the industrial processes and in some cases even challenge the
lists main service providers for IWSNs solutions and gives insight sufficiency of existing technologies to cope with these rapid
of future trends and research gaps in the field of IWSNs.
changes.
Index Terms—Automation, IEEE802.15.4e, energy harvest- With the evolution of industries, new dimensions of research
ing, IWSNs, ISA100.11a, MAC, TDMA, WirelessHART, WSNs, have surfaced. In recent years, the IWSNs have emerged as
Zigbee, 6LoWPAN, CSMA/CA, Castalia, Fieldbus, Ethernet,
mesh, tree, star, bus, flat architecture, hierarchical, security, an efficient and cost effective solution for industrial automa-
congestion, Wi-Fi, Bluetooth, UWB, wasp mote, re-mote, open- tion and process control [3]–[6]. The advantages offered by
mote, SunSPOT, OMNeT++, MF, MiXiM, OPNET, gradient, flat, IWSNs have appeared to be a reason good enough to per-
proactive routing, data centric, PV, VLC, IoT, cognitive sensor suade many industries to its adoption, especially in low data
networks, 6lo WG, OpenWSN. rate applications [7]–[9]. One of the major factors contribut-
ing to the popularity of IWSNs is its low installation cost [10].
Compared to the cabling and maintenance costs of wired net-
works (up to e4337 per meter [11]), the wireless networking
Manuscript received January 26, 2017; revised July 21, 2017; accepted
September 16, 2017. Date of publication October 4, 2017; date of current technologies offer a very small cost in fraction of a euro
version February 26, 2018. The work was supported by the Northumbia for per meter of wireless connectivity. Apart from the cost,
University Newcastle and Erasmus Mundus cLINK exchange Programme. the scalable nature of IWSNs make it an ideal candidate
(Corresponding author: Yue Cao.)
M. Raza and H. Le-Minh are with the Department of Mathematics, for present as well as future dynamic industrial environ-
Physics and Electrical Engineering, Northumbria University, Newcastle ments [12]–[15]. Furthermore, IWSNs offer many advantages,
upon Tyne NE1 8ST, U.K. (e-mail: mohsinraza119@gmail.com; including flexibility, self-organization, low cost of installation,
hoa.le-minh@northumbria.ac.uk).
N. Aslam and Y. Cao are with the Department of Computer and Information localized processing, interoperability and easy deployment.
Sciences, Northumbria University, Newcastle upon Tyne NE1 8ST, U.K. Despite these significant benefits of the technology, it suffers
(e-mail: nauman.aslam@northumbria.ac.uk; yue.cao@northumbria.ac.uk). from constrained communication range, small memory, delay,
S. Hussain is with the Department of Electronic and Nanoscale
Engineering, University of Glasgow, Glasgow G12 8QQ, U.K. (e-mail: limited bandwidth, reliability issues, limited battery capacity,
sajjad.hussain@glasgow.ac.uk). security threats and interconnectivity issues [16]. Among all
N. M. Khan is with the Department of Electrical Engineering, Capital the afore-mentioned factors, while some favor the adoption
University of Science and Technology, Islamabad 44000, Pakistan (e-mail:
noor@ieee.org). of IWSNs in many applications, others open new research
Digital Object Identifier 10.1109/COMST.2017.2759725 challenges to be dealt with [17]–[19].
1553-877X © 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
40 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

Past few years have been very productive in addressing on advancements in these domains. To justify the contri-
many challenges presented by IWSNs. The main develop- bution of the paper, some recently published key research
ments witnessed until 2012 were carefully transformed to articles, surveys and studies are thoroughly evaluated and
the IEEE Wireless Personal Area Network (WPAN) standard main contribution of the published papers are highlighted in
802.15.4e [20], primarily targeting the industrial applications. comparison to this paper. For the evaluation purposes main
Most of the amendments listed in this standard further improve strengths and weaknesses of the published research are thor-
the long chain of existing WPAN standards, [21]–[23], for oughly discussed. Apart from this, in reference to earlier
industrial applications. Many industrial solutions based on surveys published, Table I is formulated to present the con-
these standards also emerged. Some significant contributions tribution of this paper in comparison to other review papers.
included, Zigbee, WirelessHART, ISA100.11a, 6LoWPAN Out of the nineteen selected surveys, nine are published in
Wia-PA and Optimization of Communication for Ad hoc IEEE C OMMUNICATION S URVEYS AND T UTORIALS in the
Reliable Industrial network (OCARI) [24]–[29]. Moreover, years from 2010 to 2016, five are published in IEEE trans-
research and development, during past three years, has sig- actions and IEEE Magazines, three in Elsevier journals and
nificant impact in improving the IWSNs credibility for pro- two in other journals. A brief description of contributions and
cess control and automation. A keen and persistent trend shortcomings of these surveys and research articles are listed
in research developments was witnessed in these years, as follows.
resulting in significant improvements in MAC protocols, Gungor and Hancke [16] make pioneer contribution in
network layer optimizations, energy harvesting techniques the field, and present an overview of IWSNs highlighting
and incorporation of new technologies in industrial wireless challenges and technical approaches in IWSNs. The paper dis-
networks [11], [30], [31]. cusses challenges in IWSNs in comparison to design goals.
These significant research developments in IWSNs have Paper also discusses the wireless standards and protocols and
given new heights to this market, resulting in a momentous rise briefly touches energy harvesting. However, in this paper MAC
in its projected value ranging from $944.92 million to $3.795 layer developments are not discussed. Furthermore, most of the
Billion in coming years [32], [33]. However, it is also expected discussed topics cover a brief description and lack compre-
that the projection would highly depend on the research trends hensive details about the research.As the paper was published
and significance of improvements one witnesses in upcom- in 2009, there is abundance of improvements which address
ing years. To cope with the projected market trends, satisfy the needs of communication optimization, priority systems
demands of more sophisticated industrial applications and to and appropriate traffic segmentation in industrial environments
meet the crucial deadlines in highly sensitive industrial atmo- which are proposed afterwards and hence cannot be part of the
sphere, a dedicated research targeting reliability, real-time data discussion in this paper. The presented standards and indus-
delivery, incorporation of modular design and interoperability trial protocols have also seen a significant change in terms of
in IWSNs is much needed. channel access and hence new issues have developed which
The rest of the paper is organized as follows: Section II could not have been part of the discussion earlier.
discusses the main contributions of the paper. Section III cate- Somappa et al. [19] present an industrial perspective of
gorizes industrial Systems and traffic generated in these system WSNs and discuss its applications in industrial environments.
according to priority requirements. It also lists deadlines for The paper discusses emerging challenges and expectations in
selected industrial processes and discusses the failure conse- IWSNs and lists expected operation of different layers. A brief
quences. Section IV gives an overview of IWSNs. Section V discussion on the standards and protocols is also provided.
covers the design objectives and main challenges in IWSNs. However, the paper gives a direct approach to the possible
Section VI discusses the existing work, standards and indus- problems and offers very limited information on classification
trial protocols for IWSNs. Section VII gives overview of of various protocols with notable footprint. Some of the key
available industrial motes and their technical specifications. It research areas in IWSNs including energy harvesting, WSN
also lists the IWSNs based solution providers for automation platforms, available radios and potential technologies are not
and process industry. Section VIII discusses MAC layer opti- discussed due to the scope of the paper.
mizations and research developments over the years. Network Al Agha et al. [25] discuss various WSN protocols and
Layer developments are discussed in Section IX. Energy har- standards and give an insight on the suitability of these stan-
vesting techniques for IWSNs are discussed in Section X. dards in industrial environments. The paper also provides a
Good practices and design solutions in IWSNs are discussed detailed discussion on the OCARI technology and lists its
in Section XI. Section XII gives an insight of future research specifications, suitability and network topology. However, the
directions in IWSNs. Finally, Section XIII concludes the paper did not mention any information on the research devel-
discussion and gives final remarks. opments and proposed protocols over the years. The scope of
To give better understanding of flow of the paper, the the paper is limited and some prominent aspects like industrial
taxonomy of the paper is represented graphically in Fig. 1. requirements, IWSN platforms, energy harvesting, industrial
deadlines, MAC developments etc. are not included.
Akhtar and Rehmani [34] present an introduction of WSNs
II. K EY C ONTRIBUTIONS and give a detailed discussion on the energy harvesting
This paper provides a detailed description of IWSNs and techniques in WSNs. The renewable energy resources are
its relevant areas of research and offers a wider perspective discussed in detail however, the discussion is limited in
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 41

Fig. 1. Flow of the paper.

terms of broader perspective of IWSNs and no information Huang et al. [35] discuss in detail the various MAC layer
on industrial requirements, MAC developments, challenges developments in WSNs and discuss the IEEE standards and
and design goals, standards and research developments is well known protocols in conventional and industrial WSNs.
presented. However, the paper does not specifically target IWSNs and
42 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

TABLE I
C OMPARISON OF T HIS PAPER W ITH OTHER S URVEYS AND R EVIEW PAPERS

provide a generalized discussion on WSNs. The paper also harvesting sensor nodes. The papers discuss the potential of
does not discuss the primary challenges in IWSNs, process various energy harvesting techniques for wireless motes and
control requirements, energy harvesting, IWSN platforms and provide application areas in WSNs. However, as the scope
noteworthy technologies for future IWSNs. of the papers suggest, the discussion is limited and does not
Baronti et al. [36] present a survey of WSN protocols and provide an insight into the industrial requirements and energy
standards and discuss the operation of the selected OSI lay- harvesting potential of various techniques in accordance with
ers. However, the discussion only focuses on Carrier Sense the industrial applications. Furthermore, the papers offer little
Multiple Access (CSMA) based communication which is not information regarding the broader perspective of IWNs and
suitable for majority of industrial applications. Furthermore, key research areas in IWSNs are not part of the papers under
the scope of the paper is limited in terms of providing consideration.
a broader perspective of the research areas and limits the Zhao [39] present a survey on use of WSNs in indus-
discussion to a specific domain in WSNs. trial automation and process control. The paper presents an
Suriyachai et al. [37] present MAC layer development overview of different WSN communication technologies, and
for mission critical applications over the years. The paper discusses the possible challenges and solutions. However, the
does not take into consideration the industrial standards and discussion provided in the paper does not offer a consoli-
other research areas in IWSNs including process control dated information on IWSNs and fails to discuss the primary
requirements, IWSN platforms, industrial standards, energy IEEE and industrial standards. The paper also does not provide
harvesting etc. any discussion on the role of MAC layer given its signif-
Sudevalayam and Kulkarni [38], Prasad et al. [45], icance in IWSNs. Other key areas in IWSNs are also not
Ku et al. [46], and Lu et al. [47] present a survey of energy discussed.
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 43

Doudou et al. [40] present a detailed discussion on the lists the key application areas of IWSNs for industrial
latency issues of asynchronous MAC protocols for delay sen- environments.
sitive networks. The paper presents a classification of MAC • Provides a division of network traffic involved in IWSNs
protocols and provides a comprehensive discussion on the into logical levels. The traffic types (levels) are defined
latency issues in MAC. However, due to the scope of the based on the critical nature, time deadlines and reliability
paper the discussion lacks a detailed survey of technologies requirements for each of the targeted application areas
and research areas in IWSNs. and industrial systems. Furthermore, practical examples
Christin et al. [41] discuss suitability of WSNs for industrial from industrial processes are presented with the time
automation. The paper discusses different wireless standards deadlines, reliability, and security requirements
including Bluetooth and WPAN for communication in IWSNs. • A detailed review of key IEEE standards and industrial
The paper also discusses some of the industrial standards in protocols and their suitability for industrial applications is
IWSNs and highlights their key characteristics. However, the provided. A taxonomy of significant developments, infor-
scope is limited and the potential of WSN technology and its mation of standards and industrial protocols, development
suitability in industrial applications is not discussed in detail. of wireless motes, market trends, IWSN market value and
Furthermore, some of the key research areas including energy expected futuristic technologies for IWSNs is presented
harvesting, IWSN platforms, MAC developments and the Time along with the time information.
Division Multiple Access (TDMA) based communication in • A taxonomy of MAC protocols to categorize differ-
IWSNs is beyond the scope of this paper. ent MAC based developments is presented along with
Flammini et al. [42] discuss the suitability of wired and the classification of significant MAC protocols. The
wireless sensor networks in industrial applications. The paper classification is based on the application area, channel
briefly discusses Ethernet and fieldbus protocols. The paper access scheme, frequency channels, priority scheduling
also discusses the potential of WSNs in industrial applications and latency information.
and possible challenges. However, the paper does not cover • A taxonomy of Routing protocols is presented to cate-
any industrial standards, MAC layer developments, and wire- gorize different network layer developments. Each sub-
less communication technologies. Some other key research category of routing protocols is thoroughly discussed and
areas in IWSNs like IWSN motes and energy harvesting are flagship routing protocols for each category are listed.
not discussed as well. • The hardware architecture of wireless motes, techni-
Demirkol et al. [43] and Bachir et al. [44] present survey cal specifications and radio details of selected motes
and developments in MAC protocols, however, in [43] the are presented. Some significant IWSNs based solutions
MAC protocols are not thoroughly analysed and paper fails to providing companies are also discussed.
offer a suitable MAC layer protocol classifications. In [44] • The main energy sources in industrial environments are
a detailed discussion on the MAC protocols can be found discussed. Different energy harvesting techniques are
however, the paper does not offer substantial insight in the reviewed and categorized. The life cycle and energy spec-
industrial requirements for MAC protocols and fails to relate ifications of energy harvesting techniques, usable and
the discussion in industrial perspective. Furthermore, both the reusable batteries and super capacitors are listed.
papers lack a detailed discussion on the IWSNs and its various • Extensive research challenges, design objectives and
significant research aspects. design solutions for IWSNs are presented.
Islam et al. [49] survey the suitability of WSN in factory • Possible future research themes and technologies for
automation. The paper discusses the possible challenges and industrial networks including Internet of Things (IoT),
reliability issues of WSNs in industrial environments. Paper Visible Light Communication (VLC), Cognitive Radio
also presents the security issues in using IWSNs. A brief Sensor Networks (CRSNs), deterministic networks and
discussion on selected industrial standards is also provided. long life IWSNs are presented.
However, paper lacks comprehensive background of IWSNs
and does not cover any details on categorization of indus-
trial applications, time deadlines, requirements, MAC layer
III. C RITICAL NATURE OF I NDUSTRIAL E NVIRONMENTS
developments, hardware specifications, mote details, energy
AND T RAFFIC D EADLINES
harvesting and potential technologies for IWSNs.
In this paper, substantial effort has been made to, firstly A. Industrial Systems
present a through review of up-to-date IWSN technology; sec- IWSNs offer services to specific range of applications,
ondly provide critical analysis and summary of exiting works, which are significantly different from the traditional WSNs.
and thirdly highlight potential research areas and articulate sig- Therefore, based on the specific application characteristics,
nificant research challenges Main contributions of the paper Quality of Service (QoS), latency and security requirements,
are listed as under. the industrial systems are classified [19]. According to the
• The paper covers a detailed review of IWSNs, presents International Society of Automation (ISA), the industrial sys-
IWSN architecture, discusses its strengths and limitations, tems can be distributed into six classes [50], [51]. This
provides an insight on ongoing transition from WSNs to classification is based on the nature of application, standard
IWSNs and wired networks to wireless networks, presents operating procedure, access schemes, reliability, and latency
significant wired and wireless protocols and standards and requirements. These systems are listed as under.
44 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

1) Safety/Emergency Systems: Safety/emergency systems These categories are defined on the basis of critical nature of
handle issues of greater significance and of critical nature. For information, reliability, time constraints, medium access con-
such systems, action on the developed situations, are required trol and channel access pattern. These traffic types are listed
in matter of milliseconds. Any added delay can contribute to in most critical to least critical order.
unwanted complications. Fire alarms, leakage of poisonous 1) Safety/Emergency Traffic: The safety or emergency traf-
gases and emission of radiations are some of the examples of fic is the traffic of highest priority, if mishandled, may threaten
emergency systems. a human life or incur damages to a plant. It is usually asyn-
2) Close Loop Regulatory Control Systems: Close loop chronous in nature and rarely triggers due to anomalies and
regulatory systems require a periodic feedback for smooth hazards such as risk of explosion or severe electrical surges
running of the processes. Such systems include both sensor etc. Due to the sensitive nature of this traffic category, high
and actuator elements where a continuous feedback from the reliability is expected and fail-safe link is established with
sensors is needed to maintain the desired response of the actu- multiple contingencies [54]. This type of traffic has highest
ation part. Usually the time bounds between sensing values priority and usually prioritized over the rest of the traffic. The
and making the desired corrections using actuators, based on time and reliability constraints of such industrial network traf-
the sensed values, are very low. Some examples of close loop fic require careful modelling along with the prioritized access
regulatory systems include autonomous cars or piloted drive, to communication channel [50].
motion adaptation for conveyor belt movements and affiliated 2) Regulatory Control Traffic: The traffic originated from
robotics etc. the systems running close loop regulatory control contribute
3) Close Loop Supervisory Systems: Close loop super- significantly in density of IWSNs network traffic. There are
visory systems also provide a feedback control like the two primary reasons: the sampling rate of the sensors involved
regulatory systems, except, these systems are asynchronous in in regulatory control is much higher and the information gen-
nature and a feedback mechanism is established when certain erated by these systems is periodic. The regulatory control
thresholds are violated. Since, these systems are less critical traffic has much higher significance compared to other traffic
in nature compared to the regulatory control systems, there- types [51], except emergency, due to the strict bounds of the
fore, time and reliability bounds are more relaxed. Examples close loop systems. Furthermore, such control systems try to
of close loop supervisory control include slow changing and minimize the dead-time between two consecutive communica-
less critical processes like temperature control of a furnace or tions to optimize the performance of the close loop systems.
boiler etc. Any negligence or delay in regulatory control traffic at net-
4) Open Loop Control Systems: The open loop control work layer can lead to the safety or emergency trigger, which
systems implement human operated process control. These enhances the importance of this traffic. Since the regulatory
systems, instead of automated analysis, rely on human inter- control traffic, poses synchronous information load, therefore,
vention, where the operator after analysing the sensed data, it occupies constant bandwidth. Failure in communication may
takes the necessary action. lead to the instability of the process control, therefore high
5) Alerting Systems: In industries, alerting systems usually reliability of such traffic is ensured [50], [54]
provide feedback of the sequential processes where regular or 3) Supervisory Control Traffic: The supervisory control
prompt feedback is established as a surety mechanism. Such traffic is quite similar to regulatory control traffic except, it
systems offer tracking mechanism with regular feedbacks for is asynchronous in nature. In this case, localized processing is
different stages of the processes. In some cases, event-based incorporated to identify if the specified thresholds are violated
alerting is also established. in any manner. Based on the initial conditions (if the sensed
6) Information Gathering Systems: Information gathering values are within specified thresholds or not), the priority to
systems are used to collect sensor reading regarding non- traffic is assigned [367]. The behaviour of supervisory con-
actionable processes. The data gathering is targeted to provide trol traffic can be related to emergency traffic, however, due
the pattern observations over long period of time, which can to less critical nature of applications at hand supervisory con-
serve as a baseline for the future changes and implementing trol traffic, depending on the conditions, is either modelled as
long term plans. These systems and information gathered in regulatory control traffic [50], [366] (for value beyond criti-
similar systems is typically non-critical in nature and therefore, cal thresholds) or asynchronous alerting traffic [54] (for value
the data accumulation phases can span days. The accumulated within the critical thresholds). Since the importance of this
data by information gathering systems usually undergoes a type of traffic is dependent on the critical nature of informa-
computer based diagnosis to devise the improvement plans on tion, therefore, the critical and non-critical categories are dealt
the basis of data analysis. separately. In critical case the information is regularly reported
from sensory data to control centre and requires higher level
of reliability whereas for the less critical case asynchronous
B. Traffic Types in Industrial Systems communication is established with less stringent reliability
A number of researches [30], [52]–[54] have categorized conditions.
traffic in industrial environments in a number of groups 4) Open Loop Control Traffic: It is termed as a low
depending on the type and critical nature of the traffic. In risk control traffic with relatively relaxed time and reliability
this paper, the traffic in an industrial setup, in reference to bounds [12], [50]. Since the failure in one or more commu-
presented industrial systems, is categorized in six groups. nications won’t have a significant impact on the implemented
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 45

TABLE II
T RAFFIC C ATEGORIES AND A FFILIATED ATTRIBUTES IN I NDUSTRIAL W IRELESS S ENSOR N ETWORKS [30], [50], [52]–[54]

process control due to slow changing nature of the target con- and priority of this traffic is increased otherwise a relatively
trol systems, therefore reliability is not as important as in case lower reliability assurance is needed and occasional failures
of emergency and regulatory systems. IWSNs in such sys- in packets communications dont cause major problems [51].
tems mainly report the information of less critical nature to This category of industrial communication is more related to
the control unit where an operator analyses the output [54]. emergency traffic in behaviour however, its intrinsic properties
One example of such control is the frequency component are very much different from emergency traffic. In case of
of legacy hydroelectric generation units. As the frequency anomalies the priority level of this traffic can be considered
changes occur as a function of output load on the system so on the similar levels of that of supervisory control traffic.
these changes are relatively slow. Based on the feedback from 6) Monitoring Traffic: Monitoring traffic is mostly catego-
the sensory elements, sampled frequency values are presented rized as single way traffic as it is used to monitor the status of
to operator, who decides whether an increase or decrease the processes having relatively less significance in the control
in water valve opening is needed to regulate the frequency and automation [50], [54]. In most cases, the information col-
of generated electric power. Since it is a human dependent lected in monitoring systems, assist in the formation of future
response system, it can have unaccounted delays which are suggestions for system upgrades and improvements. The occa-
only affordable because of the less critical nature of this traf- sional packet failures are common in such systems and hence
fic [54]. In such cases, very occasional actions are expected demand lower reliability bounds [54].
in response to the information received. Nevertheless, the Traffic types discussed in this subsection along with the
accumulation of readings from the sensors follows a periodic priority requirements, time constraints, reliability and medium
behaviour. access schemes, are represented in Table II.
5) Alerting Traffic: Alerting traffic follows a relatively low
duty cycle where the amount of information communicating
over the IWSNs is very much limited [50]. The frequency C. Critical Industrial Deadlines and Failure Consequences
of communication can only be increased if certain anomalies The above discussion categorizes the types of the traffic
occur. In case the information becomes critical the reliability in an industrial environment, to define the priority levels,
46 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

TABLE III
T YPICAL E ND - TO -E ND D ELAY AND U PDATE R EQUIREMENTS FOR I NDUSTRIAL P ROCESSES [17], [41], [56], [57]

time deadlines, class of control systems and relative medium operational temperature of pressurized flammable gases. The
access schemes. In critical cases, a delay in conveying sensed former is much more variation tolerant than the later as for
information can result in damage to the equipment, may lead fractional distillation some significant temperature variations
to an explosion or threat to a human life. Therefore it is can increase the level of impurities in different distilled oil
important to properly identify different traffic types origi- products, which is undesirable but not hazardous. However, in
nated in a system to affiliate right level of importance to each case of dealing with pressurized flammable gases, the temper-
traffic type. Although, the specification of needs and catego- ature variations are much more sensitive and can even cause
rization of information in different types is step towards the fire. Therefore, in dealing with flammable gases, more frequent
right direction yet there is a lot of work needed in modeling feedback is desirable. This example also signifies the need for
the algorithms and establishing priority as well as reliability priority of one information type over the other, as a manda-
constraints acceptable to the control and automation com- tory part of wireless communication link for timely actions
munity [55]. Moreover, the full potential of IWSNs must on critical processes. The presented information in Table III,
be exploited to offer a better solution than the existing, to gives an overview of possible deadlines in industrial environ-
meet the deadlines set forth for industrial process control, and ments, however, an application specific evaluation of different
automation. sensors is needed to better classify the significance of a
Some of such requirements for different industrial equip- particular sensing process, consequences of failure in its com-
ment are listed in Table III. As Shown in Table III, even a munication and system type to which this sensing operation
particular sensing application has a broad range of parame- belongs.
ters attached to it. For instance, considering the temperature Apart from the time deadlines and frequency of commu-
sensing in close loop control, a wider range of update fre- nication of individual nodes, the battery-operated nature of
quency is affiliated as represented in Table III. The reason IWSNs also affiliates a suitable value to lifetime of these
is much more dependent on the core process and applica- nodes. Longer battery life ensures an uninterrupted opera-
tion area for which the temperature sensing is considered. tion of the processes and reduction in the maintenance cost.
To justify the variations, consider two application scenarios Recommendations for the desired battery lifetime of the sen-
where in one case the temperature sensing is used in frac- sor nodes in different industrial applications are presented in
tional distillation of crude oil and the other involves the Table III, whereas a detailed discussion on the suitability of
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 47

various available batteries and energy harvesting techniques is


presented in Section X.
The importance of information communicated for the reg-
ulation of an industrial process can vary significantly within
an industrial plant. Depending on the type of application at
hand, and nature of its severity, it must be shielded from the
intruders and cyber threats. Since, the external intervention can
raise significant issues in the control of processes; a suitable
protection from external threats must be implemented.
Unlike the wired networks where the intruders need to be
physically connected to the networks, the wireless networks
are much more susceptible to security threats, thus requiring
more suitable security techniques [351]. The main security
criteria for evaluation include confidentiality, integrity, authen-
ticity and availability [56], [348]. The importance of these
factors can be changed based on the application at hand. In the
industrial environments information security has been consid-
ered an integral part of the standardization and is given higher
preference for more critical applications [81]. With the rise in
possible security threats, IWSNs appears to be more vulnera- Fig. 2. Industrial Wired and Wireless Network technologies and
ble to information tampering, node control, denial of service, Standards [16], [23], [26]–[29], [36], [78]–[88].
flooding, radio interference, eavesdropping and traffic analy-
sis [36], [41], [348] and hence require appropriate security and
data encryption. A recommendation on security requirements control valves, proximity sensors, accelerometers, encoders,
for different applications is presented in Table III, whereas monitoring and control devices. Some of the significant devel-
a detailed description of security features implemented in opments in the fieldbus systems offering complete protocol suit
IWSNs are listed in Section IV-D5. include PROFIBUS, CAN, P-Net, Interbus, SwiftNet, Fieldbus
H1, and WorldFIP.
2) Ethernet: High data rates and larger bandwidth
IV. I NDUSTRIAL W IRELESS S ENSOR N ETWORKS
offered by Ethernet qualifies it to serve as a backbone
A. Wired and Wireless Networks in Industrial Environments of the industrial networks. Industrial Ethernet received
The communication networks established in industrial envi- wide acceptance for communication among Programmable
ronments can be broadly divided in two categories, wired Logic Controllers (PLC) and Supervisory Control And Data
and wireless. However, the strong interference experienced in Acquisitions (SCADA) with TCP/IP enabled interlinking [42].
industrial environment along with high performance demands Furthermore, the switch-based architecture, remote diagno-
make industrial solutions very challenging. It is for the same sis, and self-configuring tools of Ethernet offer significant
reason; wired solutions were preferred over wireless in the improvement over the fieldbus networks. Therefore, the use
last decade. Many wired solutions were proposed to offer of Ethernet at field level appeared to be a promising solu-
high-speed communication, deterministic reliability, and real tion to the interconnectivity problem [74] between high-level
time delivery [42]. The wired communication networks in (Ethernet) and low-level (Fieldbus) networks [75]. However,
the industries were designed to target four specific objec- an accurate priori delay estimation for effective operation of
tives [56] which included real-time assurance, guaranty for supervisory control is imperative, therefore, the uncertainty in
functional safety, guaranty for security and centralized super- industrial Ethernet must be addressed. Later, to improve the
visory control of decentralized processes. Further requirements suitability of Ethernet on field level, Real Time Ethernet (RTE)
included the ability of remote commissioning and maintenance was introduced [76] which used TDMA based channel access
of distributed automation systems. Over the years many wired scheme for improved reliability and predictable delays. Use of
standards and technologies were introduced to meet the strin- TDMA resulted in the synchronization issues, which were later
gent real-time and reliability requirements of the industrial addressed in IEEE1588 standard [77]. Over the years some
processes. These wired network developments can broadly be significant Ethernet based developments include High Speed
classified in the fieldbus systems and Ethernet systems. Ethernet (HSE), CC-LINK IE, EtherCAT and Sercos III.
1) Fieldbus: Fieldbus systems have played a significant part Although, the wired networks offered modest data rates
in the industrial automation for a long time resulting in stan- and reliability but failed in offering scalability, cost effi-
dardization of numerous technologies such as [72] and [73]. ciency and efficient network deployment. All these factors
Due a number of desirable characteristics such as determinis- forced the researchers to look into wireless communication
tic behaviour, lesser sensitivity to electrical noise, simplified solution for industrial automation. Cost efficiency, flexibil-
connectivity and ability to operate over long distance, field- ity and self-healing abilities of IWSNs among many oth-
bus networks are widely used in the industrial environment to ers vouched its suitability for wider industrial application
connect field level equipment including motors, transmitters, domains.
48 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

Fig. 3. A Typical Industrial Wireless Sensor Networks Setup [69].

Suitability of IWSNs resulted in formation of many research the primary research focuses in IWSNs are reliability, real-
groups leading to various industrial and IEEE standards. time data delivery and deterministic network designs. In some
Some of the industrial protocols and standards include IEEE cases, IWSNs also need a long network lifetime to synchro-
802.15.4 and IEEE 802.15.4e, Zigbee, WirelessHART and nize the maintenance of wireless networks with the industrial
ISA100.11a. A more detailed discussion can be found in equipment. Though the lifetime requirements highly depend
Section VI, whereas a graphical representation of the exist- on industrial applications, yet the technological improvements
ing industrial wired and wireless network communication in industrial sector has significantly increased the maintenance
standards and protocols are shown in Fig. 2. and life cycles of industrial equipment which is no less than
a challenge for IWSNs to meet with.
B. WSNs and IWSNs
WSNs are a type of networks with spatially distributed C. IWSNs Applications
autonomous devices working collaboratively to offer a variety At present, IWSNs are used in wide variety of applica-
of monitoring applications [57]. These autonomous devices, tions. Some of the applications include, monitoring, open-loop
referred as nodes, serve as a the most appropriate technol- and close-loop control of processes, and emergency response
ogy to monitor large physical environments [60]. Each node systems. A few of these scenarios are listed as under.
in WSNs has a small range in tens of meters and information 1) Area Monitoring: One of the most common applications
from source to destination (Gateway) is transmitted in multi- of the IWSNs is area monitoring. Such monitoring in indus-
hop fashion [61]. This collaborative nature of WSNs allows trial areas may involve sampling of some basic parameters of
the flexibility of adding new nodes to the network and operate interest, like temperature, pressure etc. The primary objective
in different network topologies [62], [63]. of the sensors in similar scenario is to accumulate data over a
The transformation of WSNs from non-critical monitor- period of time and relay the data to the destination using the
ing [64] applications to highly critical process control, automa- established network. Such monitoring networks offer informa-
tion and real time decision making [65]–[68], pushed this tion over extended periods of time which can be used for the
technology to limits. Highly sensitive nature of industrial computer based analysis and future improvement and recom-
processes and plants add many constraints which are still mendations [60]. Similar networks can be used in the industry
a challenge for WSNs. Moreover, since most of the indus- for slow changing processes where no direct action is required.
trial environments have transformed into highly dynamic and 2) Air/Water Quality and Waste Monitoring: The pollu-
vibrant processes, typical WSNs are no longer suitable to serve tants from the industries cause environmental degradation and
as a solution. severe problems for living systems. To keep check of the pol-
IWSNs are a special domain of WSNs which particularly lutants in air IWSNs play a significant role. To evaluate air
targets industrial applications [70], [71]. A typical representa- pollution levels and proportion of dangerous gases in the atmo-
tion of IWSNs is presented in Fig. 3. The working principle of sphere, large scale wireless networks are formulated. These
IWSNs is quite similar to that of WSNs. However, the need for extended networks with a variety of sensors offer improved
strict timing deadlines, reliability constraints and critical nature accuracy.
of industrial applications makes IWSNs an entirely different Like air, it is of utmost importance that the water quality is
research domain. As the industrial applications may involve regularly checked so that the accurate records of the impurities,
close loop control systems and critical processes automation, added in water, are maintained. For such purposes, wireless
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 49

nodes are used to accumulate the data over time to provide properly. There is also a need of extensive measures to be
the updated information on the water condition in the nearby implemented to counter the uncertainties of wireless medium
lakes, rivers etc [164], [165]. Moreover, with the sensor nodes of communication [338].
deployed and permanent monitoring stations established, accu- 8) Emergency Response in Industries: Another emerging
rate data can be collected. Deployment of the sensor nodes application area for the IWSNs is the flawless communi-
also cuts the burden of manual readings. Water wastes also cation establishment of highly critical information. Since
contribute greatly to the surface as well as underground water the consequences of delay and penalty of failure is much
which if accurately evaluated can present a number of ways higher, this particular field desires a relatively flawless oper-
to implement remedies. ation of IWSNs in terms of reliability and relative time
3) Machine Health Monitoring: IWSNs have also been bounds [347]. Although, IWSNs offer great potential for this
used to evaluate the machinery condition. Sensor nodes are area of application, however, it is still a long way from
deployed to evaluate conditions of various potentially impor- perfection.
tant machinery parts and to evaluate the need for machinery
maintenance [317]. The use of IWSNs also allow the feedback
of the rotatory parts in machines which were once inaccessible D. IWSN Architecture
using wired networks. Over the years, a gradual rise in the implementation of
4) Structural Monitoring: IWSNs are also used to sense IWSNs can be seen. Due to consistent research efforts dur-
the movement and material binding of the structures. A rel- ing recent years, the present architecture can be characterized
atively higher vibration is observed, especially where large into several attributes. The performance of IWSNs is mainly
scale machinery is used. The use of sensor networks helps the influenced by hardware, network topology, channel access
engineers to monitor such structures in much detail and any schemes, network architecture, data collection, interconnectiv-
deterioration in the structure, overtime, can be identified. The ity, and security schemes. Therefore, the suitability of IWSNs
use of IWSNs allow better monitoring of foundations, reduced in different applications is mainly determined from the selec-
costs of regular visits, better data collection and improved data tion and choice of these attributes. Each selection of IWSNs
storage facilities. Monitoring of vibration and stress vulnerable scheme, whether it is used for critical or non-critical appli-
structures using wireless technology helps in taking simul- cations offer some benefits but also pose certain limitations.
taneous reading of load, pressure and stress which not only Therefore, in application specific design, it is very important
accurately formulates the status of the structure under differ- to have a careful selection of suitable attributes. Some of the
ent conditions but also builds a database necessary for the key influencing factors are discussed below.
future structure improvements [315], [316]. 1) Nodes/Motes: Each network in IWSNs is formed with
5) Disaster Prevention: Extension of the industries to min- individual nodes, primarily equipped with a processing unit,
ing, underwater structures and critical areas where higher radio, memory, sensor board and battery. In certain spe-
chances of disaster exist, need careful and time to time eval- cific applications, the individual nodes may be equipped
uation to identify any recently developed threats. Under such with energy harvesters, dual radios or multiple processors to
circumstances, IWSNs offer means of regular data accumula- offer off-the-shelf benefits [37], [89], [90]. Objective for such
tion to identify any threats present [315]. IWSNs also play key variations may include network lifetime extension, diversity,
role in the mines where a certain proportion of gases is main- multithreading etc. [38], [91], [92]. A general architecture
tained and in case of any failure, actuators (suction pumps for of wireless node is presented in Fig. 10, whereas a detailed
extracting harmful gases) are instantly activated to avoid any discussion on wireless nodes can be found in Section VII.
hazards. 2) Network Topology: In IWSN architecture, the network
6) Sensor and Actor Networks: Wireless Sensor and Actor topology greatly influences the target application areas. Any
Networks (WSANs) offer a framework for distributed sens- IWSN may have a variety of network topologies with each
ing and feedback based control of processes [314]. Since the offering a different blend of characteristics. Nodes within a
wireless medium is used to establish connection between the network are more generally connected in star, mesh and tree
sensors, control center and actuators therefore two data streams topology [364]. However some other topologies including ring,
(Uplink:from sensors to control center and Downlink: from bus, grid and circular are also sometime considered [364].
control center to actuators) are maintained. As more network Some variants of the above topologies like tier1 and split-tier1
elements are involved in such applications, more extensive and are also sometime considered [93], [94].
carefully modelling of the network is needed. Since the pro- • Mesh topology (as represented in Fig. 4 (a)) provides bet-
cess control is implemented using sensory data therefore such ter reliability and connectivity in case of larger networks
networks are time sensitive and need efficient and timely data but offers extended delay as a consequence of allowing
routing. multiple links to gateway and flexibility to opt most sta-
7) Industrial Automation and Feedback Control: The incor- ble route for information communication [355]. In this
poration of IWSNs in industrial automation brings many ben- topology, each node is connected to multiple nodes which
efits, however the critical nature of the processes in such envi- allows the networks to offer improved reliability along
ronments demands strict time and reliability bounds [17], [41]. with self-healing abilities [356].
Certain assurances on packet reception and reliability must • Tree topology (represented in Fig. 4 (b)) offers dedicated
also be provided for feedback control systems to operate links which allows less information overhead [357]. Each
50 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

Fig. 4. Layered view of the Hierarchical architecture in IWSNs. Layer 1: Representation of sensor nodes affiliated with cluster-heads in a clustered network,
Layer 2: Virtual representation of Cluster-heads connection with the gateway (a) Mesh Network Representation, (b) Tree Network Representation, (c) Star
Topology Representation.

nodes communication takes fixed number of hops to reach geographical attributes are hard to find in industrial
the destination which adds deterministic behaviour to the environment [363], [364].
communication. Tree topology offers gradient informa- • Grid topology partitions the network into non-overlapping
tion field which limits the information packets straying square grids of the same size. Each grid accommodates
from the path [358]. However, this topology is link depen- one working node at a time. For grids with multiple
dent and failure in key linking nodes can affect large nodes, the grid activity is handled by grid-head which
network branches. Furthermore, in time sensitive indus- collects data from the grid. The routing in this topology
trial applications, the use of extended branches is not is performed in grid by grid manner [364], [365].
feasible due to added delay. 3) Channel Access Schemes: In IWSNs two channel
• Star topology (represented in Fig. 4 (c)) offers direct access schemes, TDMA and CSMA/CA, derived from IEEE
access to the gateway which gives great improvement in 802.15.4 [23] and IEEE 802.15.4e [20] standards are com-
the real-time data delivery however, on the other hand, monly used. In TDMA based channel access, the nodes follow
reliability starts suffering with the increase in number of a time slotted access for data communication. The nodes
connected nodes especially in contention based channel are synchronized using synchronization beacons and each
access schemes [359], [360]. node is scheduled to communicate in a pre-specified time-
• Bus topology considers symmetric connection to all the slot [20], [199]. In this way, a guaranteed channel access
nodes in the network and information is broadcasted onto is ensured. The TDMA based channel access is well suited
the network. All nodes in the network can see all the for periodic communications needed in regulatory control and
communications but only the intended recipient receives open loop control. However, TDMA poses limits to the instant
the message. Bus topology is easy to install however, communication ability of a node with the gateway.
congestion control and security of information are major In CSMA/CA based channel access, the opportunistic com-
issues [361], [364]. munication is established where depending on availability of
• Ring topology forms a circular ring of nodes. Each channel, a node attempts to communicate [23]. Since no dedi-
node in the ring topology is connected to exactly two cated bandwidth is specified for a node, a guaranteed channel
nodes where each communication in the ring can either access cannot be ensured. CSMA/CA based schemes also suf-
be clockwise or anti-clockwise [362], [364]. The ring fer from reliability issues as the number of connected nodes
increases the chances of failure as a disconnection in are increased.
the ring can result in the failure of entire system. Hybrid channel access schemes are also introduced where
Furthermore, the security and congestion issues are more the contention based (CSMA/CA) and slotted (TDMA) chan-
prominent. nel access schemes are adaptively used, to improve overall
• Circular topology formulates circular sensing area with performance of the network [10], [233], [236].
sink at the centre. The nodes are deployed with uni- The details of TDMA based channel access schemes are pre-
form density and network can span a large area. The sented in Section VI-B2 and Section VIII-A2, a detailed dis-
topology can accommodate widespread sensing nodes cussion regarding CSMA/CA based access schemes and stan-
capable of forming multi-hop network. The commu- dards can be found in Sections VI-B1 and VIII-A1 whereas the
nication from the sensor nodes to the sink can be discussion related to hybrid channel access schemes is further
single-hop or multi-hop depending on the sensing node's continued in Section VIII.
distance from the sink and transmission range. The cir- 4) Network Architecture: Network architecture also serves
cular topology is easy to establish and maintain however, as a decisive factor in performance of IWSNs. Network
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 51

Fig. 5. Industrial Wireless Sensor Network Architecture. (a) Flat architecture with multi-hop communication to Sink, (b) Distributed control implementation
with cluster-head based localized decisions for reduced delay and improved security.

architecture may be flat or hierarchical, but the choice is whereas in second step the accumulated date is forwarded
mainly influenced by the requirements of the application. The to gateway/control center.
following discussion summarizes the key features of each 5) Security: IWSNs inherently possess security issues and
architecture type. due to its wireless nature, the regular wired network secu-
• Flat architecture offers traditional benefits of low com- rity protocols do not offer sufficient protection desired in
plexity and is suitable for small networks. However, as such networks [351]. IWSNs are vulnerable to malicious
the network starts to expand, the delay starts becoming attacks such as information tampering, interference, flood-
unbearable. Furthermore, to handle the multi-hop com- ing, denial of service and eavesdropping [36], [41], [348]. It
munication, the control overhead and data relay path is for the same reason, security is considered as a manda-
selection information in term of routing tables and other tory attribute of industrial protocols and standards. To address
path selection mechanism overstress the network. In addi- the security threats, multilayer security functions are intro-
tion to this, in flat architecture certain nodes become duced. To improve the security in IWSNs countermeasures
stress points or bottle neck for the network performance. such as data encryption, cryptographic key establishment,
A representation of flat architecture is shown in Fig. 5(a). frame protection, key rotation and device management are
• Hierarchical architecture on the other hand offer quick implemented to ensure data integrity and industry grade
access to the critical information and keeps the clusters security [19], [39], [349].
small enough to avoid traffic overload. On the down side, The higher stakes in industry encourages use of multi-
hierarchical architecture adds extra complexity where layer security. It is for the same reason security is an integral
each node must be affiliated with suitable cluster head part of well-known industrial standards for IWSNs. Security
and failure in doing so may induce longer time delays related features of some of the well-known industrial pro-
and compromised reliability. A hierarchical architecture tocols and standards are listed as follows whereas a more
is represented in Fig. 4, where layered view is used to detailed discussion on these standards is presented later in
present the connectivity of the nodes. As it can be seen Section VI-C.
in the figure, at layer 1, the sensor nodes are connected to WirelessHART offers a secure networking solution where
cluster-head and information from the nodes is collected security is implemented in both MAC and Network Layers.
at cluster-head in timely fashion. Layer 2 represents the Message Integrity Check (MIC) is implemented to ensure hop
upper hierarchy of connections in the hierarchical archi- by hop data integrity whereas end to end data integrity is
tecture, where the cluster-heads are connected to the ensured at network layer. Security is ensured by security man-
control center/Gateway. The communication in the rep- ager application which handles security services. It is also
resented scenario is a two step process where in the first responsible for generation of security keys. WirelessHART
step the sensor data is accumulated at the cluster-head also uses 128-bit AES encryption for added security [19], [81].
52 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

In ISA100.11a, security manager is implemented which systems also use event-based triggers to initiate communi-
is responsible for authentication, generation, distribution and cation of sensory data in case of violation of a threshold;
storage of the security keys. ISA100.11a also ensures end however, in this case the communication is established for
to end security [81]. The security features in ISA100.11a longer duration with periodic feedback.
are similar to WirelessHART, however, unlike WirelessHART, The on-demand communication is established in cases
security features in ISA100.11a are optional and can be where the communication from a particular sensor node is
disabled to offer more flexibility, improve overall network requested by the coordinator or sink [354]. This can occur if
efficiency and boost battery life where security is not the sensor data from particular node or a system is desired or a
mandatory. particular node communication has failed, therefore, a request
In Zigbee, different levels of security are implemented. for transmission of data can be generated.
To offer a secure communication, frame integrity check is 7) Interconnectivity: A variety of applications in IWSNs
performed. Key based entity authentication is also imple- may need a suitable interconnectivity mechanism with the
mented to ensure the authenticity of the nodes. On the network existing fieldbus and Ethernet standards. Moreover, certain
layer, active network key is implemented to offer network applications may need access to IP and the Internet. These
layer authentication [352]. Further to aforementioned features, factors definitely steer the choice of suitable industrial solu-
symmetric cipher is used to protect data from unauthorized tions. Although, Zigbee, 6LoWPAN and wirelessHART are
access [352]. Like ISA100.11a and WirelessHART, Zigbee some of the examples offering distinct blend of interconnec-
defines Trust Center which serves the purpose of a security tivity options in wide range of automation and supervisory
manager. control industry [39], yet the connectivity to fieldbus elements
In 6LoWPAN, Time Slotted Channel Hopping (TSCH) is still a challenge.
is implemented for efficient multi-hop communications in
IWSNs. With security feature enabled in frame control,
6LoWPAN additionally adds security control, frame counter E. Congestion in IWSNs
and key identifier for secure communication and protec- In most IWSN applications, communication is bounded
tion from replay attacks. Furthermore, a 32, 64 or 128 bits by strict time and reliability constraints. These strict bounds
Message Integrity Code (MIC) is used to enable encryption of make IWSNs more vulnerable to congestion problems. In net-
data [353]. On the network layer, to provide integrity, authen- work communications, congestion causes considerable delay,
ticity, and confidentiality for IP datagrams, Authentication packet loss, energy wastage and uncertainty. The congestion is
Header (AH) and Encapsulating Security Payloads (ESP) are mostly attributed to un-coordinated transmission of informa-
added [353]. tion, simultaneous data reporting and buffer overflow [431].
6) Data Collection: In the industrial environments, the sta- To overcome the problems of congestion various researches
ble operation of the processes is dependent on the effective have been documented in the literature.
communication of sensory data to control centre. Depending Congestion in the network is minimized using conges-
on the wide variety of applications in industrial environments, tion control policies and congestion control mechanisms.
the data collection mechanism can change. The communica- Congestion control policies are usually termed as open-
tion for data collection in the industrial environments can be loop congestion control as these policies dictate certain rules
divided in three categories, namely periodic, event-based and regarding retransmission of packets, packet acknowledgments
on-demand communication, where each of these categories and discarding packets [432]. The effective implementation
target a particular type of industrial system. of congestion control policies reduces the overall network
In periodic communication mode, the data is communicated overhead and limit excessive transmissions in the network.
in regular intervals, handled by TDMA or slotted channel However, the policies cannot ensure run-time congestion min-
access, ensured for the efficient process control [20], [209]. imization. To address the dynamic congestion issues and to
Periodic data communication is most suitable for regulatory minimize congestion adaptively, congestion control mecha-
control system and open loop control systems. Furthermore, nisms are defined. Congestion control mechanisms use con-
some of the monitoring systems also implement loosely gestion detection like channel load, buffer overflow etc. to
bounded periodic data communication tolerant to time varia- detect and locate congestion in IWSNs [433]. With the use
tions in delivery of information. The periodic communication of TDMA based communication in IWSNs, the congestion
is scheduled at the start of the network and the cycle is from neighbouring nodes is significantly reduced. However,
repeated by sensor nodes which are responsible to transmit due to the limited capacity of the network, the packet in-flow
data regularly [224]. from the upstream nodes may be exceeding the threshold. In
The event-based communication depends on the commu- such cases, congestion control mechanisms implement conges-
nication of data that takes into consideration the critical tion notification for upstream nodes to counter the congestion
circumstances and sends data in case of occurrence of an problem [434].
event [224]. In industrial applications, the event can be pro- Different congestion detection techniques and congestion
grammed as a violation of a particular threshold or occurrence notification mechanisms are presented in Fig. 6. The fig-
of emergency circumstances, which need to be reported. This ure also presents congestion control policies and conges-
type of data communication is usually preferred in emergency tion control mechanisms to address the congestion issues
systems [347] and alerting systems. The supervisory control in IWSNs. Further discussion regarding these categories
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 53

Fig. 6. Congestion in IWSNs.

and congestion control on the whole, can be found • Ensuring predictable delay and latencies (Mandatory
in [431]–[436]. condition for effective regulatory and supervisory control)
• Managing congestion free communication
• Accurate time synchronization
V. IWSN S D ESIGN O BJECTIVES AND C HALLENGES • Real-time assurance
The development in IWSNs over the years is influenced by • Security of information
certain design objectives. However, the achievement of these • Modular design for improved scalability
design objectives is affected by certain limitations of IWSNs. • Interoperability with existing infrastructure
The primary design objectives and possible design challenges • Prioritized communication
in IWSNs are listed as follows. The above-listed objectives offer best practices for extended
network life time, reliability of communication, an appro-
priate priori information of delay for efficient regulatory
A. Design Goals and Objectives
and supervisory control, a scalable network offering mod-
In IWSNs, continuous research has provided much wanted ular design for more flexibility, improved security features,
improvements in past few years. It is because of the efforts jitter minimization, surety of real-time communication for
of many individuals and some joint ventures that IWSNs sensitive processes and proper priority affiliation to different
have recently witnessed much wider acceptability in several traffic types for timely and precedence based communi-
industrial applications. Due to a broad scope of the poten- cation. The design goals, research developments and lim-
tial applications of IWSNs and with rising challenges, certain itation in achieving these design objectives are presented
design objectives need to be considered. in Table IV. Whereas, certain other challenges offering
Wireless links in industrial automation, whether it is for notable deterrent in achieving these objectives are listed in
emergency communication, process control, feedback systems, Section V-B.
altering or monitoring networks, requires certain performance
and reliability assurances. To fulfil these requirements using
IWSNs, certain design goals and objectives must be set forth. B. Design Challenges
Although, design objectives are very much linked to individual The collaborative nature of IWSNs enables this technology
applications, their requirements, and targeted industrial sys- to bring many off the shelf advantages, however, there are
tems, yet the design goals and objectives for different cases certain bounds to the benefits offered by IWSNs especially
are listed as under. when coping with harsh environments. These bounds give rise
• Efficient resource (battery, processing power, memory, to certain research challenges as well. The major challenges
bandwidth etc.) usage in the present IWSNs are as under.
54 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

TABLE IV
G OALS AND O BJECTIVES : L IMITATIONS AND R ESEARCH D EVELOPMENTS

(Continued)

1) Resource Constraint: IWSNs do serve as a cost-effective applications yet it also adds cap to the resources of the
and efficient solution to the industrial automation and pro- tiny wireless motes [17], [19], [49]. Resource constraints
cess control. Although, the low cost and reduced complexity in IWSNs can be divided into six different sections
of the IWSNs offer a suitable solution for the industrial as below.
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 55

TABLE IV
C ONTINUED

• Battery: IWSNs are equipped with limited battery. The For instance, thermal analysis of installed machines and
battery issue is even more critical where the motes are interior sensor placement in large synchronous generation
inaccessible due to critical nature of the application. units need long lasting battery to make the most of these
56 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

inaccessible motes. For most of the cases in IWSNs the • Half duplex communication: Till present, almost all of
motes are designed to last longer with the inbuilt ability the motes available in the market offer half duplex com-
to preserve battery where possible. This property espe- munication [101], [102]. This attribute of the motes,
cially helps in applications where replacing a mote is used for industrial applications, adds need to use coop-
more effective than replacing battery of an existing mote. erative nature of communication along with better syn-
However, not much improvements can be seen in enhanc- chronization. Certain mechanisms have been proposed
ing the existing energy sources (Lithium-Ion, Alkaline, to overcome the half duplex nature of the available
Zinc-air etc.), thus, leaving the only solution to increase motes like CSMA/CA with exponential back off but
the size of the battery which is not an efficient alternate. still it poses serious limitations to the practical use
Hence the battery capacity becomes a major bottle neck of motes.
for most of the cases where motes cannot be used to full 2) Energy Consumption and Network Lifetime: As dis-
potential to achieve extended features [95], [96]. cussed earlier, battery capacity per unit volume remains almost
• Communication range: IWSNs suffer from limited range static over the years. some improvements presented over time
especially in harsh industrial environments. The com- are either restrained by cost factor or instability of battery
munication range for wireless sensor motes can extend material in industrial atmosphere. Therefore, the smart energy
from 10m to 300m depending on the severity of reflec- consumption and means to efficiently optimize the energy
tion, refraction, diffraction, multipath, interference and usage of the motes has been thoroughly investigated. However,
fading [141], [152], [172]. The short range, where at one while the energy efficiency is achieved using transmission
instance adds to the lifetime of the network, it also affects power control, energy efficient routing, sleep scheduling, or
the real-time delivery of the data to destination. Hence, localized processing, there is no benchmarking and most of the
gives rise to the need of efficient routing algorithms in accomplished work is questionable due to lack of its authen-
multi-hop communication. ticity in harsh environments. Since the use of IWSNs in some
• Bandwidth: For the IWSNs, a dedicated band specified inaccessible industrial environment signifies the need of effi-
for industrial, scientific and medical (ISM) applications cient energy utilization to offer extended network lifetime to
is used. This band is reserved internationally for the use of cope with the long-lasting lifetime of the industrial equip-
radio frequency (RF) energy for industrial, scientific and ment, a thorough evaluation of existing research in stringent
medical purposes. Where this dedicated band provides industrial environments is much needed.
scope for low cost industrial communication, it also lim- 3) Time Constraint: Time deadlines are one of the most
its the band access as well. Most of the radios available, critical parameters in an industrial automation and process
operate at 2.4GHz, with an accessible frequency band- control, where slight delays can cause severe damages to
width of 73MHz. This frequency bandwidth is divided in the equipment, spoil an entire lot under production, or can
eleven channels [97]. The technology offers a data rate of even cause threat to human life. Delay can be even more
250kbps which, for some of the applications in industrial critical for sensitive processes under observation like nuclear
domain, serve as a bottleneck. The industrial applications plants. In any industrial setup, a whole system is devised to
using 868MHz and 915MHz instead of 2.4 GHz suffer extract the critical information from various individual pro-
even lower data rates [97]. cesses and establish a control system to make critical runtime
• Memory storage: Limited memory in IWSNs offers a decisions. For all close loop control systems, a particular
major challenge [98], [99]. Even with some of the latest time deadline is of imminent importance and functionality of
motes in market, memory still remains a constraint. the control system depends on the real-time delivery of this
Though increase in memory is not one of the tough tasks information.
yet it comes with an additional cost, especially for the In IWSNs the real-time data delivery appears to be a
applications requiring a large number of motes. With the major challenge due to limited range and susceptibility to
limited memory capacity, the scope of more sophisti- the harsh industrial interference, humidity, multipath, dust and
cated algorithms is restricted [99], [100]. A more efficient highly caustic environments [16]. Therefore, if the IWSNs are
memory allocation and optimized memory utilization is opted as an alternate for wired networks this aspect must be
expected to improve most of the existing technology thoroughly evaluated and verified.
without additional cost. 4) Interference, Reliability, and Bit Error Rate: In any
• Processing capability: The rapid improvements in the industrial environment, interference is one of the inherited
Micro Electro Mechanical Systems (MEMS) enable the problems and usually appears as a major challenge in IWSNs.
present-day chips, the processing capability of several Interference is relatively high in industrial setups due to high
hundreds of MHz at a relatively low cost. But in IWSNs noise, electromagnetic radiations, multipath distortion, humid-
low clocks are preferred. Only reason that justifies this ity, dust and dynamic atmosphere. All these factors contribute
adoption in the field of IWSNs is the fact that with high to relatively reduced range, distorted and noisy transmission,
processing capabilities, the chip becomes more power frequency selective fading and non-reliable links, eventually
hungry and results in early depletion of the battery. To resulting in extended packet delay and high packet loss ratio.
avoid such high power consumption and to extend the net- To offer a reliable communication without violating criti-
work life, the motes are mostly low clocked and hence cal deadlines, the impact of interference cannot be ignored.
offer ability to run only low complexity algorithms [99]. Transmission power control [106] and optimal communication
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 57

power adjustment algorithms along with certain other strate- 8) Data Redundancy: In IWSNs, data redundancy is usu-
gies can be considered as a source of contention and inter- ally exploited to achieve better reliability. However, beyond
ference avoidance within the local area networks [103]–[105], certain bounds, the redundancy becomes a source of qual-
none the less the issue needs to be addressed properly. ity degradation. Mostly the redundancy is modeled as a static
For more critical processes, the data received from differ- aspect of a protocol [117], [118]; however, there is a need to
ent carefully placed sensors to sample the critical information treat redundancy as a dynamic aspect, which is directly linked
serves as a marker to identify the stability of the process. to communication overhead and link capacity.
Moreover, the CSMA/CA based channel sensing and col- 9) Scalability: Scalability is one of the most important
lision avoidance schemes can ensure the reliability up to attributes of the IWSNs. The emphasis on this aspect is even
certain extent but with the increased traffic, the reliability greater for industrial applications due to the ever-changing
starts to suffer [107], [108]. Also some parameters including industrial environment. Although the use of IWSNs as a solu-
the Link Quality Indicator (LQI) and Radio Signal Strength tion for industrial processes inherently offers flexibility to the
Indicator (RSSI) are considered as the identifiers for the link changes in the existing processes yet the scalability stands as
quality and reliability yet they may be deceptive [109]. Bit a major hurdle. It is observed that an increase in the network
error rate, on the other hand offers more reliable evaluation size results in computational and communication overhead,
of performance of the communication in digital wireless link. which becomes unbearable for the wireless nodes and hence
However, achieving a bit error rate of the order supported by the process fails to cope with the increased demand.
the wired networks is a major challenge due to uncertainty in 10) Network Topology: Careful selection of network topol-
wireless channels. Usually the bit error rate is carefully defined ogy is very important as it has notable impact on the intrinsic
based on the needs of the process along with acceptable levels properties and performance of the network. In literature,
of error. many topologies were listed with their benefits and weak-
5) Variable Link Capacity: IWSNs operate at relatively nesses. Some of these topologies include star, mesh, tree,
low data rate with an upper cap of 250 kbps with only circular, grid, ring, bus, tier-1 network topology, split tier-1
few exceptional high data rate schemes. The achievable data network topology and linear topology [364]. In some cases,
rates in reality are relatively less due to congestion, inter- star topology (extended as multi directional split tier-1 topol-
ference, high distortion noise, multipath distortion and syn- ogy) and hierarchical topology (a multi-level star topology)
chronization overhead. Moreover, contrary to general assump- were considered. Some adaptive and static schemes were
tions, the link capacity is not constant rather it depends on introduced to improve the performance of industrial wireless
the channel conditions. The changing link capacity forces networks [119], [120]. It is known that all these topolo-
the researchers to model the link with ability to provide gies have certain effects on the various performance metrics
connectivity between source and destination with certain including the reliability, real-time data delivery, bit rate and
traffic carrying capacity along with the implementation of complexity. However, to establish a direct relationship of per-
counter measures for the imminent uncertainty in wireless formance metrics with a topology under investigation, still
links. needs extensive evaluation.
6) Synchronization: The evolution of IWSNs for industrial 11) Security: IWSNs, whether used in critical or non-
applications enforced the need of reliable data communication. critical industrial application, is always vulnerable to security
It was the basic reason why most of the industrial applica- threats [121], [122]. The security threats may be active or
tions of WSNs have seen a dramatic shift from CSMA/CA passive. To overcome the threats of the external interference
based channel access schemes to Time Division Multiple and to block malicious information, the need for sophisti-
Access (TDMA). The use of TDMA ensured a higher per- cated encoding schemes and malicious information identi-
centage of contention free channel access to the source/sensor fiers is inevitable. Moreover, some hardware based security
nodes in IWSNs. However, it also gives rise to the need schemes [123] may assist in ensuring better security features
of proper synchronization among the wireless motes in the for industrial applications.
network. 12) Coexistence: In the past few years significant improve-
7) Sleep Scheduling: With TDMA in place, efficient sleep ments in the existing structure of IWSNs have been wit-
scheduling algorithms can exponentially enhance the lifetime nessed. In all these years with various researches carried
of the network. At the same time, for any industrial plant, out, different domains of IWSNs were targeted. From all
information has great significance and missing critical infor- the significant improvements whether they included net-
mation can be catastrophic. Hence, advanced mechanisms work layer, MAC layer or PHY layer, the only attribute of
are needed to provide a proper scheduling with alternate these researches remained ambiguous was the coexistence of
paths in place to carry critical information. Moreover, other these improvements. Although these improvements in dif-
mechanisms must be exploited to offer extended network ferent layers and aspects of IWSNs emerged in form of
lifetime without undermining the performance of the net- standardization [20], [81], [139], however, still the there is
work. Though a great contribution in this aspect has been much room for improvement. For all the algorithms defined,
witnessed [110]–[116], yet the sleep scheduling for hybrid whether they target routing, MAC restructuring, sleep schedul-
access schemes are not much optimized and though these ing, transmission power control or any other, the evaluation
schemes offer better performance yet fail to provide good of collective enhancement of these achievements is still a
energy efficiency and sleep scheduling [10]. challenge [368].
58 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

13) Information Priority Scheduling: All the information communication. This feature of IWSNs permits the flexibil-
in industrial applications can be divided into multiple cate- ity to add new sources and allows coping with the structural
gories based on the critical nature of the information. It has changes in industrial plants without changing the existing
always been a challenge to optimize the flow of informa- structure of IWSNs. The feature adds flexibility to the network,
tion and prioritize the critical information due to the existing however, it is also a challenge to establish a good communica-
MAC layer structure in the baseline standards. Some schedul- tion link between source and destination without overloading a
ing algorithms were proposed [10], [30], [54] to prioritize the particular path and ensuring timely delivery of the information
information but priority scheduling still remains a challenge to the control unit.
in an industrial atmosphere. The listed challenges and limitations encourage extensive
14) Contention Free Medium Access: Contention free research in IWSNs. In order to overcome these challenges
medium access remains one of the most considerable attributes and to achieve the design objectives and goals in IWSNs,
in any industrial environment. This served as a primary rea- prominent contributions have been made. Sections VI–XI
son for the changes in the industrial standards for WPAN discuss some of such contributions and important research
from CSMA/CA to TDMA. With the use of TDMA, current developments in IWSNs.
standards offer guaranteed access to the medium in the spec-
ified slots. However, the problem is not completely resolved VI. P OTENTIAL S TANDARDS FOR
as retransmissions still use contention based channel access IWSN S C OMMUNICATION
schemes. For retransmission, the latest industrial standards use This section discusses different standards potentially suit-
shared slots [20], with contention based access to the slot. All able for IWSN. The discussion is divided in three sub-sections.
the sources with lost packets use CSMA/CA based scheme Section VI-A discusses the less relevant wireless standards
with exponential back off to gain access to the shared slot, which could be and have been used for limited applications in
which once again pose challenge of maintaining collision free WSNs. Section VI-B discusses more relevant WSN standards
medium access [20]. including IEEE802.15.4 and IEEE802.15.4e which discuss
15) Energy Harvesting: In the past few years, no signifi- Physical and MAC specifications. Section VI-C focuses on the
cant improvements in the existing batteries have been made. industrial protocols and standards which defined upper layers
For longer network lifetime, the solution emerges from either of the protocol stack using IEEE802.15.4 or IEEE802.15.4e
bigger battery attachment or efficient battery utilization. One as a baseline.
other trend has also been seen where the energy harvest- Wireless networks, have gained much popularity in this
ing schemes are used to offer extended network lifetime. decade with many notable improvements in wireless indus-
However, the energy harvesting techniques in IWSNs need trial solutions. Significant reduction in individual mote price,
further evaluation. improvement in processing and communication capabilities,
16) Mote Size and Protective Casing: With the recent development of protocols to facilitate communication and
development in the fabrication of sophisticated printed circuit overcome interference are some of the improvements one can
boards and nano-technology at hand, the size of the motes witness. All these improvements, especially the development
can be significantly reduced, yet the battery remains a major of industrial wireless communication standards and protocols,
contributor in size of the mote. Moreover, the energy har- assisted in wide scale implementation of IWSNs in industry.
vesting schemes can also add to the size of the mote. With A detailed review of the wireless technologies, standards and
certain frequency bands (868MHz and 915MHz) still in use industrial protocols for IWSNs are listed as follow.
for industrial automation and process control, the antenna The wireless technologies that fall in the domain of WPAN
size also contributes significantly in increased mote size and are standardized by 802.15, a working group of IEEE. There
dimensions. are ten different groups working in 802.15, where each address
Apart from this, the harsh industrial environments encour- certain aspects in standardization of WPAN.
age the use of suitable protective casing for sensitive equip- 1) IEEE 802.15.1 covers Bluetooth technology which is
ment. Any equipment used in the industry is needed to be discussed in detail in Section VI-A1.
tested for the critical conditions, that it will go through during 2) IEEE802.15.2 addresses the coexistence issue in multi-
its operation on an industrial floor. Same is the case with the ple devices operating in ISM band. A related discussion
wireless sensor motes, which need to survive in harsh indus- is presented in Section XII-F.
trial environments. Any design of casing for these motes may 3) IEEE802.15.4 addresses the low datarate WPAN and
need to withstand, hot and cold climate, excessive heat, rapid plays a vital role in defining Physical and MAC
temperature fluctuations, corrosion, humidity, fumes, fungus, layer specifications for low rate and low power net-
vibration, pressure and radiations. Hence, design of casing works including low-rate WPAN standard for industrial
for the wireless motes has great significance and must not automation and process control. Further details can be
be considered lightly. Unfortunately, this particular area lacks found in Section VI-B.
substantial research to assist in low weight, low cost and 4) IEEE802.15.5 addresses the issues of interoperability
reliable casings for harsh environments. and scalability of wireless mesh networks in both low
17) Multi-Hop Communication: One of the primary rea- and high rate WPAN. A more detailed discussion regard-
sons for opting IWSNs for industrial applications was the ing interoperability in low-rate WPAN can be found in
inherited ability of these networks to establish multi-hop Section XII.
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 59

Apart from these, other WPAN group focuses are listed as established in a piconet where one master device can exist
follows. per piconet with one or more slave devices. A slave device
5) IEEE802.15.3 covers high-rate WPAN (suitability issues can only establish a point to point link with the master, and
in industries due to high power requirements and unnec- can be put in the standby mode to improve energy efficiency.
essarily high data rates compared to low data generated In a piconet, a master clock synchronization is also estab-
by sensors) lished. Multiple overlapping piconets form a scatternet where
6) IEEE802.15.6 covers Body Area Networks (short range, one device can be part of multiple piconets. However, a device
unsuitable for industries) can work as a master in only one piconet. Bluetooth devices
7) IEEE802.15.7 covers Visible Light offer a communication range of up to 100m, however, mostly
Communication (VLC) (Lack of existence of infras- the preferable communication range is up to 10m [130].
tructure and suitability to broader range of applications Use of Bluetooth offers improved security, cost efficiency
in industries) and reduced energy consumption, however, the intrinsic prop-
8) IEEEP802.15.8 addresses peer to peer and infrastructure erties of Bluetooth limit the maximum number of connected
less communication (Fewer application that fall in this nodes in a network. In earlier versions, only eight nodes
category in industrial automation and process control) could connect to an interface, hence affecting the suitability
9) IEEE P802.15.9 addresses Key Management of Bluetooth in realistic industrial networks. With the intro-
Protocol (KMP) duction of Bluetooth 4.0, some of the constraints are relaxed.
10) IEEE P802.15.10 addresses issues in routing in dynami- However, the master-slave interconnection in Bluetooth lacks
cally changing wireless networks (A less likely scenario flexibility and increases the protocol complexity. Furthermore,
due to the presence of static environments in industry) Bluetooth does not offer any support for mesh network-
The focuses of 802.15 groups listed in (5)-(10) are out of ing and fails to provide suitable mechanism for multi-hop
the scope of this paper. However, some details regarding communication, a core aspect of majority of the indus-
possible developments regarding IWSNs can be found in trial wireless networks. Apart from these scatternet based
Section IV-D5, discussing security and local key manage- multi-hop networks are inefficient and unsuitable for dense
ment, Section VI-A3 discussing UWB as high-rate WPAN and industrial networks [130], [132], [133]. The lack of flexibil-
Section XII-E covering potential of VLC in IWSN. ity, support for limited nodes, master-slave link establishment,
Furthermore, some other suitable standards apart from low- increased complexity and lack of multi-hop communication
rate WPAN used in IWSNs under special circumstances support are some of the issues, which affect the suitabil-
including Bluetooth, Wi-Fi and Ultra-Wide Band (UWB), are ity of Bluetooth based solutions for fast paced and dynamic
also discussed. Whereas, more concerned area in WPAN stan- industrial networks [130], [131].
dards, low-rate WPAN, i.e., IEEE802.15.4 and IEEE802.15.4e 2) Wi-Fi: Based on IEEE 802.11standard, with possible
are discussed in greater detail. variations of 802.11 (a/b/e/g/n/p/ac ... ay) [124]–[128], Wi-Fi
offers a high data-rate using the frequency band of 2.401GHz
to 2.473GHz. Use of Wi-Fi allows large number of nodes,
A. Selected Wireless Technologies and Standards which improves the possibility for scalable networks. The
Many wireless technologies were considered to fulfil the network is formed using a centralized device to offer high
needs of industrial applications. In all the technologies, tested data rates over short distances [131]. Several components
for industrial wireless solutions, the aim was to benefit in IEEE802.11 architecture interact to provide support for
from the free unlicensed ISM band dedicated for indus- station mobility. A primitive cell consisting on mobile or
trial, scientific and medical ISM purposes. Wi-Fi, Ultra-Wide fixed stations, is formed using Wi-Fi technology, referred as
Band (UWB), and Bluetooth are three main technologies other Basic Service Set (BSS) based on which IEEE802.11 employs
than the IEEE802.15.4 based variants with potential to han- independent basic service set (IBSS) and extended service
dle the industrial applications while utilizing the dedicated set (ESS) network configurations [130]. IEEE 802.11 allows
band. A brief discussion on benefits and shortcomings of these formation of ad-hoc networks where the stations can com-
three technologies are listed as follows, while IEEE802.15.4, municate without any Access Point (AP). An extended form
IEEE802.15.4e and industrial adaptation of these WPAN stan- of network can also be achieved using multiple BSS where
dards are discussed in detail in Sections VI-B and VI-C the interconnection is established using Wireless Distribution
respectively. System (WDS) [130]. However, WDS also has some dis-
1) Bluetooth: Based on IEEE 802.15.1 standard, Bluetooth advantages including throughput cut down for each WDS
offers energy efficiency apart from low cost modules. In repeating hop, and elimination of rotated encryption key sup-
Bluetooth, seventy-nine channels are available with each offer- port. Furthermore, Wi-Fi modules are relatively expensive and
ing a bandwidth of 1MHz to support high data rates [129]. consume more energy as compared to Zigbee and Bluetooth,
Bluetooth devices use universal short-range radio link with fre- which affect the suitability of Wi-Fi in battery operated net-
quency hopping spread spectrum (FHSS). FHSS ensures the works [130]. With high power consumption, the lifetime of
security with the facility to access currently unoccupied chan- the IEEE802.11 networks is severely compromised, increas-
nels. The protocol offers two connectivity topologies, piconet ing maintenance and replacement costs. The short lifetime
and scatternet [130]. Every piconet is formed by a Bluetooth expectancy of IEEE 802.11 assisted networks also incurs
device working as a master. The master-slave connection is unscheduled off times in the regular operation of industrial
60 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

processes. Apart from these, high-speed data communication


is not always desired, especially when the information is
more vulnerable to interception due to high power transmis-
sion. Another issue that was noted in Wi-Fi networks was
high multipath interference due to reflection of signals from
the walls and other obstacles in indoor industrial environ-
ments [131]. Furthermore, increasing the number of devices
in a single Wi-Fi connection, also affects the signal strength
of the individual devices [131].
3) UWB: In UWB the information is communicated using
very short pulses emitted in periodic sequence using radio
frequency. Due to the use of impulses, UWB signal can be
defined as an instantaneous spectral occupancy signal [134]. Fig. 7. Power consumption for Wi-Fi and UWB in comparison of
UWB has wide band of 500MHz with achievable data rates of Zigbee [130].
110Mbps [130]. Due to high achievable data rates, the UWB
is termed as high-rate WPAN, also referred as IEEE802.15.3.
UWB can be used in short-range applications and precise B. IEEE WPAN for WSNs/IWSNs
localization [132]. Due to the short range communication capa- IEEE WPAN standards offer a baseline for different work-
bilities, UWB is used in indoor applications with high data ing groups, covering details of the Physical and MAC layer.
rate requirements. High data rate in UWB) is suitable to assist Based on the specifications of IEEE 802.15.4 [21] and
multiple video and multimedia streams for indoor applica- 802.15.4e [20] ZigBee Alliance , ISA100 wireless compli-
tions. Apart from this, UWB can fit in to short range cable ance institute, HART communication foundation and other
replacement such as a wireless alternate for USB 2.0 and groups have defined protocols with upper layer specifica-
IEEE1394 [130]. tions like ZigBee, WirelessHART, ISA100.11a, 6LoWPAN
The standardization and further developments of UWB and MiWi [27]–[29], [137].
include IEEE P802.15.3a, IEEE 802.15.3b, IEEE 802.15.3c 1) IEEE 802.15.4: The standard offers specification of
along with ongoing developments for amendment 3d for the Physical and MAC layer for low power, low cost, low
IEEE 802.5.3. IEEE P802.15.3a operates in the frequency speed and energy efficient communication within the nearby
band of 3.1GHz to 10.6 GHz with fractional band- devices. The technology targets long life self-configurable
width of 20% with the transmission range of 5m and networks with the ability of autonomous operation. The
dynamic power range of 80 dB [135]. The improvements standard describes Physical and MAC layer architecture, func-
are targeted at imaging and multimedia communications. tional overview, frame formats, management services, secu-
IEEE802.15.3b improves 2003 standard by adding interop- rity operations, modulation schemes, transmission power, RF
erability to MAC along with some other features like MAC requirements and quality metrics.
layer management entity, logical link control and added con- Physical layer specifications provide frequency require-
tention periods in frame. IEEE802.15.3c targeted millimetre ments, RF details, modulation schemes, spreading parameters,
wave based amendments in the Physical layer operating transmission power, channel details and assignment of UWB
at a frequency of 57-64GHz with a communication range channels. It also specifies the recommended receiver sensi-
of 10m [136]. tivity and link quality measure along with the channel state
Majority of the improvements introduced in the UWB tar- assessment. Details of some of the Physical layer parameters
get high-speed short-range communication which fail to align are listed in Table V.
with the requirements of industrial applications. More suit- The MAC layer handles the access to the physical
able standards like IEEE 802.15.3 and IEEE 802.15.3b can channel including generation of beacons, synchronization
at best serve as a supporting technology for IWSNs. Thus mechanism to the generated beacons, motes association
leaving UWB for industrial applications where the distance and disassociation to PAN. It also manages the assur-
is relatively small with a need of extremely high data rate ance of contention free medium access by implementing
requirements. Furthermore, a relatively higher power require- CSMA/CA mechanism, support for device security, han-
ment and ability to connect to eight motes at most, limit the dling guaranteed time slot mechanism and reliable link
scope of use of UWB for wide industrial market. High peak assurance between the MAC entities [23]. In addition,
energy pulses also makes data more vulnerable to security the MAC layer controls the operating conditions of the
attacks [134]. motes by nominating them either as full-function device
To give a quantitative comparison of power consumption or reduced-function device. Full-function device can switch
of UWB and Wi-Fi, in comparison to tradition WSN, the between a coordinator (a node which controls and coor-
power consumption of CC2430 (Zigbee), CX53111 (Wi-Fi) dinates a network) and a sensing device (a node which
and XS110 (UWB) are presented in Fig. 7. The power con- sense data and relay information in the network) whereas
sumption for transmission and reception of these modules is the reduced-function device only works as a simple sens-
same due to the longer duration of active listening period ing device. The MAC layer also defines the layout of
compared to shorter transmission period [130]. the superframe with the details of inter-frame separation,
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 61

TABLE V
P HYSICAL L AYER PARAMETERS OF IEEE 802.15.4 S TANDARD [23]

Contention Access Period (CAP) and contention Free with Direct Sequence Spread Spectrum (DSSS) and TDMA
Period (CFP). synchronized channel access mechanism. The protocol offers
2) IEEE 802.15.4e: The amendments in the existing WPAN high reliability by incorporating the suggested modifications
standard IEEE 802.15.4 were focused on enhancing the suit- in IEEE 802.15.4e [138] along with channel hopping for
ability of existing standard for critical industrial applications of enhanced security. It also supports the addressing of up to
IWSNs. Thus, IEEE 802.15.4e mainly targets the real-time and 216 devices.
reliability constraints in IWSNs. Some notable changes were Link layer addressing is sufficiently large, enabling around
introduced in the existing standard including the use of TDMA 65000 devices within a single network but the network size
based channel access in IEEE 802.15.4e that replaced the is limited by the power consumption and latency issues.
CSMA/CA based access technique. This change offers guaran- Nevertheless the WirelessHART also lacks in interoperability
teed access to the channel to improve reliability. The changes and fails compatibility to IP based devices and Internet.
introduced in new standard mainly targeted MAC layer with 2) ZigBee: ZigBee, a protocol based on the IEEE 802.15.4
the inclusion of synchronization beacons for synchronization and developed by ZigBee Alliance offers a modest data rate of
in new TDMA based access scheme. For retransmissions, 250kbps [130]. It has sixteen channels each with a bandwidth
shared slots are used which follow the CSMA/CA based access of 2 MHz and an ability to connect 65000 devices at once.
scheme with exponential back off (same mechanism is used in These specifications allow the formation of mesh networks
IEEE 802.15.4 during regular channel access schemes where with single and multi-hop communication. ZigBee mainly
the transmitter waits for random slots of time before retrans- focuses on low cost and low power solution for extended
mission, if the channel is busy). The modified standard also lifetime and improved deployment and maintenance cost.
includes the structural amendments in the security header and It is one of the most widely used standards with over
control field. 70 million ZigBee devices installed worldwide [28]. Based on
the IEEE 802.15.4, ZigBee provides upper layer specifications
for a wide variety of applications. Currently, Zigbee Alliance, a
C. Selected Industrial Standards for WSNs/IWSNs non-profit open group offers three solutions referred as ZigBee
Based on IEEE 802.15.4 and IEEE 802.15.4e many indus- PRO, ZigBee RF4CE and ZigBee IP. Apart from a relatively
trial protocols were formed to address the delicate nature and wider variety of solutions, ZigBee nodes are capable of con-
versatility of the industrial applications. Some of these proto- necting in mesh, star and tree topologies which further enhance
cols are listed as under. The listed protocols use Physical and the scope of its applications in industrial environment. Apart
MAC layer specifications of either IEEE 802.15.4 or IEEE from this, a special feature in ZigBee PRO (ZigBee Green)
802.15.4e and extend their own upper layers model. allows battery less nodes to integrate with the networks, thus
1) WirelessHART: WirelessHART is the technology solu- providing flexibility of greener technology.
tion in IWSNs, based on HART communication proto- ZigBee, on the other hand, uses CSMA/CA scheme for
col developed by HART Communication Foundation [81]. channel access which reduces its scope for time constraint
With the built-in support for multiple IWSN topologies, and reliability critical industrial applications. Furthermore the
WirelessHART offers solutions for monitoring, automation exponential back-off mechanism triggered in case of chan-
and process control for industrial applications. WirelessHART nel unavailability introduces unwanted delay, which is not
is widely accepted for industrial automation and process appreciated in time constraint industrial applications. Some of
control with over 30 million HART devices installed world- the overlapping channels in ZigBee and Wi-Fi also introduce
wide [26]. The protocol is based on IEEE 802.15.4 standard unwanted interference in the presence of Wi-Fi.
62 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

TABLE VI
S ELECTED I NDUSTRIAL P ROTOCOLS AND S TANDARDS [20], [23], [27]–[29], [137], [141]

Fig. 8. Protocol Stack Structure for selected Industrial Standards [81], [138], [140].

3) ISA100.11a: ISA100.11a is a wireless network solu- 4) 6LoWPAN: 6LoWPAN is a IPV6 based low power wire-
tion by ISA100 Wireless Compliance Institute. ISA100.11a less personal area network [139], [140]. 6LoWPAN offers the
targets monitoring, automation and process control applica- benefit of interfacing directly with other IP devices or existing
tions in industrial setup. A notable architectural resemblance is IP networks. It also inherits the security, architecture, network
found in ISA100.11a and WirelessHART. For instance, the use management and transport layer protocols from the existing
of 2.4GHz operational frequency, implementation of TDMA structure. The use of IPV6 enables the 6LoWPAN devices to
based synchronized access and channel hopping functions in readily embed in the existing wired industrial Ethernet setup.
upper Data Link sub-layer are some of the many similarities in To ensure low power operation, the superframe is divided
these two protocols. However, Network and Transport layer of into active and inactive regions where the coordinator can
ISA100.11a are derived from 6LoWPAN [138], which allows go into low power or sleep mode to conserve energy. Low
the use of IPv6 addressing in this standard. power listening mode is also included to further improve the
The MAC sub-layer uses CSMA/CA mechanism for the energy efficiency. To provide security from external attacks,
channel access. However, retransmissions can benefit from the protocol incorporates 128-bit AES. To extend the scope
frequency, time and spatial diversity. An optional implementa- of 6LoWPAN, the ability to interact with MAC devices is
tion of IEEE 802.15.4, CSMA/CA based exponential back-off included which enables the 6LoWPAN devices to integrate
mechanism is also available. It also allows implementation of with other IEEE802.15.4 based devices.
TDMA based channel access and channel hopping with ARQ On the other hand, in 6LoWPAN, the channel access and
interference suppression mechanism. reliability are a bit compromised with the use of CSMA/CA
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 63

TABLE VII
S ALIENT F EATURES OF P ROTOCOL S TACK OF S ELECTED I NDUSTRIAL S TANDARDS

based channel access. To initiate transmission, the devices have battery and probable extensions for energy harvesting and pro-
to compete for the channel access using CSMA/CA based tective packaging. On the software end the software platform,
mechanism which adds uncertainty. Moreover, the protocol developer tool and simulators provide substantial support. All
support low data rates ranging from 20 to 250 kbps. these factors contribute equally and serve as a decisive factor
A brief overview of the selected industrial protocols is pre- in adoption of a particular mote for certain process con-
sented in Table VI whereas the protocol stack of the above trol application. For instance, a process, which requires lot
mentioned industrial protocols and responsibilities of differ- of different sensors and high sampling rates, may demand a
ent layers in the protocol stack are presented in Fig. 8 and mote with more flexible external sensor attachment options
Table VII respectively. and a relatively wide band communication standard. Some
The technological developments in the past few years, other applications may demand connectivity to a relatively
whether it involves hardware platforms or standardization of larger network, which may disqualify certain Bluetooth, based
access schemes, leaves a significant impact on improving cred- wireless modules [148].
ibility of IWSNs. A review of the milestones achieved in last Industrial motes are application specific which allow a low
two decades is presented in Fig. 9. It pinpoints the main power, efficient and delay sensitive solution. Furthermore,
contributions and milestones achieved in hardware platform most of the industrial solutions are reinvented with modu-
design, standards and industrial protocols. Although, a more lar based solutions, where the radio requirements, processing
detailed description of the milestones represented in taxonomy needs, temperature tolerance, moisture resistivity, memory
in Fig. 9 can be found in Sections VI, VII, and XII, yet the requirements, interoperability and channel access schemes are
taxonomy presents broader perspective of significant events in specifically modelled to offer a low cost effective solution,
the past. The taxonomy also gives a fair insight in the future fully optimized for the application at hand. As an exam-
market value of IWSNs and potential of future technologies ple, if a particular industrial application requires an 8-bit,
in industrial applications. 4 MHz processor, capable of executing 1 Million Instructions
Per Second (MIPs) to sense, sample, synchronize and com-
municate information, there is no point of adding a 32 bit
VII. IWSN P LATFORMS , F IELD -T RIALS ,
architecture working at 48 MHz, and processing 30 MIPS:
S IMULATORS AND S ERVICE P ROVIDERS
one, it will add additional cost to the solution (more critical
A. Industrial Motes and Available Radios for larger number of deployments), two, it will consume more
Wireless sensor motes used for industrial applications are power, being running on higher clocks, three, more heat is
equipped with a processor, memory, sensor board, radio, produced and affiliated heat dissipation issues arise.
64 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

Fig. 9. Taxonomy of Wireless Motes, Standards, Industrial Protocols, IWSNs Market value & Projections and Future Industrial Technologies [20]–[23],
[26]–[29], [128], [129], [141], [144]–[147].

For industrial automation and process control many com- flexible solution design, targeting mainstream industrial appli-
mercial solutions are available along with some research cations. Some of the motes and radio modules designed for
initiatives to fill the gaps. All these works focus on more industrial automation are listed as follows. Please note that
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 65

each of discussed motes, radios and System on Chip (SoC) is a SoC from Texas Instruments operating at 2.4 GHz
are labelled with M (Mote), R (Radio) or SoC. band. It is fully compatible with IEEE 802.15.4 and pro-
1) WirelessHART Compliant Solutions for Industrial vides both 6LoWPAN and Zigbee implementations on the
Automation: higher layers [156].
• LTC5800 (SoC): LTC5800 is designed by dust networks • Re-Mote (M): Re-Mote from Zolertia also uses
to achieve a high reliability of the order up to 99.999% CC2538 [156] and hence possesses similar features as the
to minimize the risk in the industrial applications. The OpenMote. However, Re-Mote is particularly optimized
LTC5800 based motes are wirelessHART compatible and for the IoT [157]. Apart from this, Re-mote also features
offers time synchronized network-wide scheduling, per CC1200 [158] for 868/915 MHz band communications
transmission frequency hopping, network wide reliabil- which is facilitated by multi-band antenna.
ity and low power operation [149]. LTC5800 belongs to • Z1 (M): Z1 by Zolertia is designed to target both commer-
Eterna family of SoC, which provides a scalable, reliable, cial and industrial applications. To offer full compliance
energy efficient and robust networking solution. to IEEE802.15.4 and 6LoWPAN, Z1 is equipped with
• LTP5900-WHM (M): LTP5900-WHM features CC2420 and MSP430 radios It also provides support for
ARM Cortex-M3 32-bit microprocessor which runs TinyOS and Contiki [159].
WirelessHART, enabling it to form mesh networks All these motes are suitable for small scale industrial mesh
with self-healing ability. The physical and MAC layer networking. With the increase in the number of nodes the oper-
are adopted from IEEE802.15.4 and IEEE802.15.4e ation is significantly compromised. Therefore, these motes are
respectively where encryption and authentication is also not suitable for critical processes especially if a large num-
ensured [150]. It includes temperature and drift compen- ber of sensor motes need regular communications within a
sation for real-time network synchronization. Frequency specified time.
hopping and reliability optimization is ensured. Apart 3) XYR 6000 (ISA100.11a Compliant (SoC)): XYR 6000
from this, smart networking technology allows LTP5900 are developed by Honeywell as a replacement to seamlessly
to form self-healing mesh networks. expensive wired links, especially for where using wired links
The core communication in the WirelessHART based solutions are either too costly, time consuming, inaccessible or the
listed above is very similar and only minor changes are intro- instrumentation schemes are frequently changing. XYR 6000
duced. All these solutions offer good reliability and scalable implements IEEE802.15.4 Physical layer and IEEE802.15.4e
modular design however, do suffer from interoperability issues. MAC layer. These modules are integrated in Honeywell
2) Zigbee and 6LoWPAN Compliant Solutions: OneWireless network and are compliant with ISA100.11a. The
• Kinetis KW2xx (M): Panasonic Kinetis KW2xx series gateway is capable to communicate with up to 100 nodes
implements SMAC and Thread. Thread [151] being an within a given time. The gateway and associated nodes also
IPv6 mesh networking protocol developed by indus- offer IEEE802.11b/g interface for improved interoperability.
try leading technology companies, offers better inter- XYR 6000 also offer end to end industry security, multispeed
connectivity, Over The Air Programming (OTAP) and monitoring, reliability, improved performance, and ruggedness
support for multiple IDEs and Real Time Operating for industrial hazardous environments [160].
Systems (RTOS). Some of the Kinetis KW2xx includes 4) Wi-Fi/Bluetooth Enabled Motes:
ARM Cortex-M4, 32-bit microprocessors which also • RN1810/RN1810E (SoC): RN1810 is created by
implements IEEE802.15.4 [152]. KW21Z, being on the Microchip and it incorporates an on-board TCP/IP
low end uses Cortex-M0 to enable energy efficient oper- networking stack, 2.4GHz transceiver, cryptographic
ation. The application areas of Kinetis KW2xx in indus- accelerator, real-time clock, RF power amplifier and
tries include climate control, safety access control and power management subsystem. The module is capable
security [151]. of providing data rates of up to 2Mbps with an extended
• JN517x series (M): JN517x series by NXP supports range of 400 meters [161]. The SPI interface allows the
Zigbee 3.0, which bridges the gap between the MAC module to integrate with Microchip PIC microcontroller
devices and IoT by offering suitable interconnectivity. It family.
is also compatible with Thread and IEEE802.15.4 [153]. • muRata Com 6M (SoC): It is a TIs WL1271L chipset
• Ember EM35x (SoC): Silicon Labs Ember EM35x ARM based module which provides Bluetooth 4.0, Bluetooth
SoCs are Integrated with Zigbee. The use of ARM Low Energy (BLE) and IEEE802.11b/g/n connectivity.
Cortex-M3 based Zigbee SoCs are used which offer bet- muRata Com6M integrates with TIs OMAP, DaVinci and
ter energy efficiency and improved performance. AES Integra to offer extended features.
128 encryption is also implemented for improved secu- • Intel Mote (IMote) and IMote2 (M): The design of IMote
rity [154]. is optimized to offer improved performance, bandwidth
• OpenMote (M): OpenMote follows modular approach efficiency, low power operation and cost effectiveness. It
where CC2538, OpenBase and battery are connected includes an ARM7 core and IEEE802.15.1 (Bluetooth)
together to offer extended performance [155]. Although compatible radio. To improve the connection-oriented
openMote is more research oriented solution yet the use Bluetooth nature, network formation and maintenance
of CC2538 in OpenMote offers many of the shelf benefits algorithms are optimized with the adoption of scatter-
and is found in many industrial applications as well. It net [162], [163].
66 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

TABLE VIII
T ECHNICAL S PECIFICATIONS OF S ELECTED M OTES [166]–[170]

TABLE IX
R ADIO S PECIFICATIONS OF S ELECTED M OTES [171]–[174]

These modules offer high data rates which enables them to


offer high speed data links. While there are many traditional
applications of these modules, the common industrial applica-
tions where these modules can be seen, include, supervisory
control, high speed data bridging, monitoring, vibration and
chemical sensing.
5) Waspmote (M): While not particularly designed for only
industrial automation, waspmote has certain features which
make the waspMote more appealing for the industrial envi-
ronments. Use of Waspmote for smart water sensing and air
quality monitoring are specifically the applications of inter-
est [164], [165]. The demonstration of âĂŸsmart water sensor
using Waspmote uses the peripheral sensors to measure water
quality parameters, like dissolved ion content, oxygen lev-
els, conductivity and pH [164]. New generation of Waspmotes
launched by Libelium, provides open source platform for wire-
less sensor which now integrates 60 different sensor probes to Fig. 10. IWSN Mote Hardware Architecture.
facilitate the gas quality monitoring and evaluation of NO2,
CO2, CO and other harmful gases levels in different industrial
environments [165]. The modular approach used in Waspmote and development, smart cities, lighting control etc. Some of
also offers a number of radio technologies including, WiFi, the prominent motes with technical specifications and radio
Zigbee, 802.15.4, Bluetooth, NFC and 3G, to choose from details [16], [55] are listed in Table VIII and Table IX respec-
for extended applications and improved operability [165]. The tively. Whereas a generalized architecture of WSNs/IWSNs
new generation also supports OTAP for flexible and remote Hardware Platform is presented in Fig. 10. It is also worth
operations. noticing that the hardware attributes of WSNs and IWSNs
6) Some Significant Secondary Research Motes and are quite similar since the physical layer, radio specifications,
WSN/IWSN Platforms: Apart from the motes listed above, processing, storage and hardware features are almost the same
there is a wide variety of wireless motes available in the however, some of the application specific attributes of IWSN
market or developed by the researchers for diverse applica- motes are listed as follows.
tions. All these solutions offer suitable variety to meet a wide 1) TDMA/guaranteed channel access/time synchronization/
range of applications including home automation, research packet scheduling/link heterogeneity
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 67

2) Priority based channel access for emergency and regu- specially built cases to withstand temperature of up to 1000◦
latory control centigrade [442].
3) Data integrity check/ Encryption, symmetric key cryp- 3) OneWireless EHM Case Study: Loch Rannoch: Loch
tography (AES-128, key management, frame protection) Rannoch is a double-hull oil tanker, capable of transporting
4) QoS assurance/ Multi-hop network support/Fault 130,000 tons. It is used for transporting oil from storage ves-
tolerance sel to an oil processing terminal in the North Sea [442]. Due
5) Explicit congestion notification to the large size of Loch Rannoch, manual monitoring is not
6) upstream/downstream reliability/ loss recovery a viable option. Further, to this, the purpose of the monitor-
7) Implicit and explicit congestion notification ing system was to ensure safety of the employees, protection
Apart from these, motes are designed to withstand harsh indus- of the on-board assets, improvement in tankers capacity and
trial environments where the operation under high temperature proactive management of maintenance schedules. The listed
or pressure may be required. objectives were achieved using OneWireless [443] based wire-
less network solution where a highly redundant network was
formed to overcome the poor channel conditions on the tanker.
B. Field-Trials The implementation of WSN in Loch Rannoch resulted in
IWSN is emerging as a cost efficient and effective net- increased uptime, time efficiency and reduced cost [442].
working solution for industrial automation. A number of cases 4) Dust Networks, Wafer Manufacturing in California,
have been presented where compliance with international stan- USA: Semi-conductor wafer manufacturing units use deli-
dards is ensured using IWSNs. Some of such field-trials for cate processes for the production of high quality wafers. On
industrial automation are presented as follows. the same time, to maximize uptime, and overall yield of the
1) Polibol (Smart Factory Solution in Zaragoza, Spain): processes, uninterrupted supply must be ensured.
Polibol is a manufacturing company which produces alu- At Linear technologies Silicon Valley fabrication unit,
minium laminated plastics and printed coils for food products over one hundred and seventy-five gas cylinders are used in
and consumer industry. It operates several production lines the wafer manufacturing process [444]. In this facility, an
that incur automation of critical processes including control unplanned interruption in the gas supply can cause signifi-
of air temperature, gas monitoring and ensuring authorized cant financial loss and an unplanned delay in the supply to
gas concentration levels. Since, Polibol manufactures flexible the customers. Use of wired networks was not possible due to
food packaging, it must follow demanding health legislation the presence of concrete walls and lack of AC sockets. Wi-Fi
and food hygiene [437]. To ensure the compliance with inter- was also not a suitable option due to the channel distortion
national standards and FDA regulations, a high level of quality and high interference [444].
control must be established throughout the production. To ensure the uninterrupted operation of the wafer manu-
Recently, Polibol has introduced Libelium’s Waspmote and facturing plant, IWSN based automation and feedback control
Meshlium based IWSN solution to ensure high level of system is adopted. Linear Technology used a SmartMesh
automation in one of the production facilities in Zaragoza, IP WSN to streamline manufacturing operations, monitoring
Spain. Libelium’s Waspmote based sensor network is used to gas cylinder levels to proactively schedule replenishment and
monitor the air temperature in pipes and around the print- ensure uninterrupted supply. SmartMesh IP embedded wire-
ing machines, and carbon dioxide concentration in working less mesh networks worked effectively with a reported data
areas in real-time [438]. Whereas Meshlium serves as an IoT reliability of up to 99.99999% along with ultra-low power
gateway that connects Libelium wireless network to Microsoft requirements [444], [445].
Azure cloud [439], [440]. Libelium’s Waspmote and Meshlium
based IWSN ensures real-time data communication. IWSN
based real-time process control not only improves quality of C. Network Simulators
the products but also reduces the maintenance costs. The researchers and industries widely use network simula-
2) Honeywell (Nucor Steel in Tuscaloosa, Alabama): tors to evaluate the performance of developed scenarios with
Honeywell is one of the leading services provider in automa- certain level of accuracy. Use of simulators in WSNs, cuts
tion and process control industry. The use of IWSNs in the down the initial cost and give viable insight on performance
automation, monitoring and feedback control systems, has of wireless ad-hoc networks before the actual deployment.
resulted in several economic benefits along with improved Various network simulators are currently available. Some of
safety. Implementation of wireless transmitters to monitor the prominent network simulation and evaluation tools are
the furnace temperature at Nucor Steel in Tuscaloosa (Nucor discussed as follows.
Corporation is largest steel manufacturer in U.S.) is one 1) NS2/NS3: Network simulator, NS2 is a discrete event
such project which resulted in increasing production by 15 simulator which offers OTcl script and C++ based tool to eval-
percent [441]. uate performance of wired and wireless networks. NS2 offers
Primary objective was to improve the process operations suitable support to develop new and customizable libraries
by effectively establishing instantaneous temperature feedback and include extensive features in the existing package [446].
from one of the furnace, previously not being monitored. The customizable nature of NS2 makes it suitable for net-
The wireless solution was provided by Honeywell using the work performance evaluation in WSNs. The NS2 framework
wireless nodes mounted on the cooling circuits protected by allows definition of new packet headers and packet tracers
68 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

TABLE X
C OMPANIES O FFERING S ERVICES IN IWSN S [175]–[184]

for improved debugging. Third party extensions in NS2 can to end solution provider for application, infrastructure and
also be easily incorporated ns2miracle. Over the years vari- network monitoring [454]. OPNET is a network simula-
ous WSN standards and protocols have been implemented and tion tool capable of simulating heterogeneous networks
evaluated using NS2 [448]. However, the use of OTcl causes while running various simulation protocols simultaneously.
large overhead, resulting from the OTcl interfacing with C++ OPNET also provides support for WSNs and allows net-
and OTcl interpreter. To improve the overall efficiency of NS2, work customization and scalability. zigbee based networks
and to overcome its limitations, NS3 was introduced, however, are supported in this simulator along with customization
the lack of back compatibility in NS3 restricts the integration options for zigbee coordinator, zigbee router and zigbee end
of the WSN based framework and libraries already developed devices [455]. Furthermore, mobile device can be included in
for NS2 [449]. the network and several network parameters can be evaluated
2) OMNeT++: OMNeT++ is a C++ based framework at global, network or node level.
used for developing network simulators. With the use of 4) QualNet: QualNet communications simulation platform
OMNeT simulation library, many network simulation pack- offers a testing, and training package which allows imple-
ages have been developed [450]. The evaluation of WSN mentation of real-world networking scenario. It mimics real
based network is supported by some of the extension pack- communication network and offers authentic and reliable net-
ages developed using OMNeT++. Some examples of OMNeT work behaviour. The software provides a graphical design for
based WSN supported extension packages include Mobility the effective network formation with click and drag facilities
Framework (MF), Castalia [451] and MiXiM. and stack customization options [456]. Simulator also provides
Castalia is widely used in the research community for sim- statistical graphing tools which is used to formulate reports and
ulation of general purpose WSN, Body Area Networks (BAN) produce customized graphs using the simulation data received
and low power networks [452]. Use of Castalia in WSNs is from the network analyzer [456]. Support for wireless ad-hoc
limited to generally static networks where the mobile-element sensor networks is included where global parameters can be set
based network preferably use MF or MiXiM. Castalia provides to IEEE802.15.4 radio and IEEE802.15.4 MAC for the entire
support for wide range of platforms and allows to evaluate network [457]. Network parameters are customizable and per-
their performance under various circumstances. The perfor- formance of the network can be visualized and evaluated using
mance of the network can be evaluated based on several simulators 3D visualizer and network analyzer [457].
parameters using interactive simulation.
MF and MiXiM, are simulators for wireless and mobile
networks, developed using OMNeT++ simulation engine. D. Industrial Services Providers
Mixim itself was a merger of four simulator including MF, Due to the high cabling deployment and maintenance cost,
Mac Simulator, Positif Framework and ChSim. Many other it is expected that the IWSNs will see a great boost in the
models and projects have also been integrated in MiXiM. As near future [32], [33]. It is the primary reason, why many lead-
the MiXiM inherited all the features of MF and other mobile ing industrial process control and automation service providers
networking frameworks, therefore, it provides substantial sup- have started investing in IWSN based industrial solutions. With
port in formulation and evaluation of various wireless and the prediction of IWSNs market soaring as high as $3.795
mobile network scenarios [453]. Billion by end of year 2017 [33], many new wireless solu-
3) OPNET: Optimized Network Engineering tions for industrial automation and process control have been
Tool (OPNET) is currently a part of Riverbed, an end launched. This trend, adopting IWSNs for industrial solutions,
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 69

can be observed in several renowned companies offering ser- a desirable trait for longer lifetime but the efficient com-
vices in the automation and process control. A significant munication between the nodes and congestion control are
number of such companies have started offering industrial major challenges. Communication challenges present in asyn-
wireless networks based solutions to establish communica- chronous MAC protocols are suitably resolved in synchronous
tion links between the central control unit and the industrial protocols but in these protocols channel congestion and colli-
equipment. Table X presents a list of key companies offering sion avoidance remains an issue. Slotted schemes resolve the
services in industrial monitoring and control systems using issue of channel congestion but channel utilization in such
IWSNs. cases is relatively low. The Multichannel schemes take ben-
efit of full potential of wireless motes by implementing both
VIII. MAC L AYER O PTIMIZATION TDMA and Frequency Division Multiple Access (FDMA) to
AND MAC S CHEMES improve the channel capacity. Apart from these classifications,
there are many protocols that target MAC layer optimization
Over the years many solutions for IWSNs were also pro-
in both TDMA based and CSMA/CA based channel access
posed by the research community. These proposed schemes
schemes.
involved improvements in reliability, real-time operability, net-
In our classification, the MAC protocols are distributed
work life enhancement and deterministic network formation.
in: Contention (CSMA/CA) based schemes, TDMA based
Most of these researches focused on MAC layer optimiza-
schemes, multi-channel schemes and priority enabled schemes.
tion, primarily because MAC layer handles two most important
Each of these is listed as follows.
tasks, controlling nodes access to the wireless medium and
1) Contention Based MAC Protocols: CSMA/CA based
managing the use of radio. Efficient channel access improves
medium access protocols fail to offer deterministic behavior
both reliability and real-time data delivery and offers better
which compromises their effectiveness in critical industrial
congestion control, whereas efficient use of radio improves
applications [189]. Hence, industrial applications with less
network lifetime [35]. In this section, a detailed review of
stringent deadlines can only be suitable for CSMA/CA based
MAC protocols is presented to offer insight of current research
medium access protocols. In [190], Markov chains are used
trends in MAC optimization for IWSNs.
to model relations of packet transmission, packet delay, and
energy consumption. Using this model, a distributed adap-
A. Classification of MAC Protocols and IWSN tive algorithm is derived to minimize power consumption
MAC Developments along with improving packet reception probability and delay
During the last few years the design objectives of MAC constraints. Tang et al. [207] present a predictive wakeup
protocols have experienced a significant change [186]. Earlier mechanism in asynchronous duty cycling to reserve energy.
researches sacrificed throughput and reliability for extended Schurgers et al. [206] present a sparse topology and energy
network lifetime [43], [185]. However, for IWSNs, the energy management technique which wakes the radio from deep
efficiency in MAC protocols has become a secondary objec- sleep state without the use of low power radio. Some other
tive, where the network can no longer rely on best effort data contention based schemes include [191]–[195].
delivery services [37]. Furthermore, to provide an extensive classification of the
To label the MAC layer developments according to indus- MAC protocols, in the MAC taxonomy presented in Fig. 11,
trial application requirements, an extended taxonomy of MAC the contention based schemes are classified in six categories
protocols is created. The taxonomy labels noteworthy MAC namely: A) low duty cycle with extended lifetime, B) con-
developments according to their suitable application area in tention based low latency schemes, C) periodic contention
industry. The taxonomy of MAC protocols is presented in based sustainable networks, D) contention based bounded
Fig. 11, which categorizes MAC based developments with deadtime communication, K) Throughput enhancement using
respect to channel access scheme, target application area, contention based multichannel access and L) delay sensitive
latency, reliability bounds and single channel and multichan- multichannel emergency access. The labels A, B, C, D, K and
nel attributes. Furthermore, a classification of MAC protocols L are same as used in the taxonomy to maintain symmetry.
is also represented in Table XI which classifies notable MAC The contention based MAC protocols falling in any of these
protocols based on communication priority, latency and area categories are presented in Table XI along with other attributes
of application. of these protocols.
Over the time a large number of MAC protocols are being a) Summary and insights: In IWSNs, contention based
presented and one can find an exhaustive list of such pro- channel access schemes has very limited use in the pro-
tocols in [35], [37], [40], [44], [187], and [188]. In [188] cess control due to the non-deterministic nature. However,
MAC protocols are classified in four categories. The clas- the CSMA/CA allows the nodes, freedom to communicate
sification is based on the medium access methods, hence whenever needed and hence serves as a suitable mechanism
categorizing MAC protocols in to random, periodic, slot- to offer improved network lifetime in non-critical monitoring
ted and hybrid access schemes. In [35] the MAC protocols and data accumulation applications. Over the years plenty of
are also classified in four categories namely asynchronous, CSMA/CA based MAC protocols have been introduced. The
synchronous, slotted and multi-channel. Each of these cate- primary target as observed was to extend the network lifetime
gories has their own significance and offer unique benefits. by introducing suitable sleep mechanism. Since this commu-
Asynchronous protocols can run on very low duty cycle, nication offered nodes to wake-up only when transmission
70 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

Extended Taxonomy for MAC Protocols.


Fig. 11.
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 71

TABLE XI
S ALIENT F EATURES OF S ELECTED MAC P ROTOCOLS

was necessary so the protocols like STEM, STEM-B [203], Another and less frequently used attribute of CSMA/CA
PW-MAC [102] offered a suitable solution for monitoring based MAC protocols was suitable reduction in the com-
applications. munication delay in the less congested networks. Some
72 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

MAC Schemes like schemes like SIFT [217], Q-MAC [222], requirements of open loop control applications. Furthermore,
D-MAC [219], T-MAC [220] exploited this attribute to offer these two schemes (ALERT and T-Opt)where work in single
low latency in communication delay. Nonetheless, due to the channel, can also benefit from the multichannel, which can be
contention based access, the deterministic behaviour can still exploited to communicate to a larger number of nodes in a
not be ensured. To incorporate deterministic behaviour, slotted given time. The other TDMA based protocols which intro-
(B-MAC [52]) and scheduled (CC-MAC [204]) CSMA were duce priority based communication are discussed in detail
also proposed. in Section VIII-A4 due to the overlapping nature of these
2) TDMA Based MAC Protocols: TDMA based MAC schemes.
protocols serve more efficiently in ensuring reliability and 3) Multi-Channel MAC: Use of multichannel in TDMA
latency bounds. It is for the same reason, TDMA based based MAC protocols enables improved medium utilization
MAC protocols are considered more suitable for industrial and offer extended features in IWSNs. In last couple of years
applications. However, TDMA based schemes do require a notable trend in multichannel MAC solutions can be seen.
time synchronization and optimal TDMA scheduling is a Zhao et al. [203] present multichannel, TDMA based source
NP-hard problem [101], [196]. Ergen and Varaiya [196] aware scheduling scheme for static networks. The algorithm
have proposed two heuristic algorithms to solve the sched- benefits from multiple channels but fails to guarantee relia-
ule minimization problem and ensured packet delivery. bility. Dobslaw et al. [102] extended the ShedEx scheme to
Authors have also evaluated upper bounds for these sched- multichannel scenario by introducing scalable integration in
ules as a function of total packets generated in the network. existing scheme. Authors also claim to cut latencies around
Shen et al. [197] and Yan et al. [198] further improved the 20% in TDMA schedules from ShedEx. Chen et al. [204]
results in [196] and showed how their work outperforms [196]. propose a Regret Matching based Channel Assignment algo-
Shen et al. [197] considered harsh dynamic environment but rithm (RMCA), to reduce multichannel overhead. In this paper
failed to offer guaranteed data reliability. Yan et al. [198] authors investigated multichannel transmissions and used sim-
improved reliability in harsh control environments and formed ulations and hardware implementation to demonstrate perfor-
hypergraph to increase scheduling flexibility. Moreover, two mance improvements and complexity reductions respectively.
schemes were also presented in this paper namely dedi- An analytic approach to model and analyze multiple channels
cated scheduling and shared scheduling and were applied is presented in [52]. The affirmation of model accuracy is
to wireless sensor and control networks for performance established from numerical and simulation results. Moreover,
evaluation. Another TDMA based scheme, ShedEx is intro- multi-level priority for packet transmission sequence is also
duced in [101]. This paper extends the concept of reliability established.
improvement by repeating most rewarding slots along Other multichannel schemes categorized from K to P, in
with a scheduling algorithm to guarantee certain specified MAC taxonomy, Fig. 11, are listed in Table XI along with the
reliability. salient features of these protocols.
With respect to the taxonomy presented in Fig. 11, the a) Summary and insights: Use of multiple channels in
TDMA based schemes are further divided in five subcategories IWSNs offer notable benefits including diversity, throughput
(labelled E, F, G, M and N) depending on suitability for spe- enhancement, network scalability, optimized scheduling, on
cific area of application. The TDMA based protocols classified demand channel access and improved network control infor-
in these subcategories are listed in Table XI. mation. Since, in an industrial process, multiple applications
a) Summary and insights: The implementation of can co-exist, the use of multiple-channels can introduce appro-
TDMA based communication was introduced to ensure guar- priate control in handling diverse data using parallel data
anteed channel access, hence eliminating the uncertainty intro- streams. Apart from this, hybrid schemes with both TDMA
duced by CSMA/CA based channel access schemes. One such and CSMA/CA based channel access, to support diverse traf-
examples is the modification of IEEE802.15.4 for industrial fic types, can be facilitated in parallel without introducing
applications in the form of IEEE802.15.4e which introduces conflicts. RL-MMAC [241] and DSME [20] are two hybrid
TDMA based communication. Since the incorporation of schemes which benefit from multiple channels to facilitate
TDMA reduces the uncertainty in WSNs, it can be used for the diverse traffic types. Both schemes facilitate both periodic
control application which require periodic feedback. It is worth and on-demand communication. DSME particularly focuses
noticing that IEEE802.15.4e LLDN [20] offers a suitable on improving the data rates and hence often compromises the
solution for regulatory and supervisory control applications. delay constraints. RL-MMAC on the other hand offers low
TDMA-MAC [199] is another protocol which ensures low latency. MMSN [217], Y-MAC [219], DMC [239] are some
latency using TDMA based communication to support feed- of the CSMA/CA based multiple channel schemes which due
back control systems. However, some other protocols using to the presence of longer delay between the consecutive trans-
TDMA might not be suitable for control applications due to missions limits their scope for low latency process control.
the introduction of long delay among two communications of Whereas Hy-MAC [220], T-opt [203], ALERT [202] and some
an individual node. Therefore, protocols like LMAC [200], others introduce TDMA based channel access for collision free
LEACH [201] and LEACH-C [201], although using TDMA, communication for more sensitive traffic.
are only suitable for monitoring applications. Multi-channel 4) Priority Enabled MAC Protocols: In most of the indus-
TDMA schemes like ALERT [202] and T-Opt coverage [203] trial processes, generated information in some cases is more
offer suitable reliability and latency assurance to meet the critical than the rest hence should be prioritized above the
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 73

rest of the communication. The priority based communica- earlier on case to case basis, in general, the presented clas-
tion in IWSNs facilitates the communication of high priority sification can be broadly distributed in single channel and
traffic by providing adaptive channel access. Some of the pro- multi-channel schemes, with further distribution of contention
posed work in this domain includes [30], [52]–[54], [205]. based, slotted and hybrid access schemes. Further subdivi-
De Moraes and Silva [52] presented a priority enabled MAC sion in contention based, slotted and hybrid schemes maps
to prioritize messages with high information content. The to a particular application domain, dealing with one of the
protocol supports deadline requirements for feedback control six industrial systems, discussed in Section II-A. The MAC
systems but assumes full duplex communication which is not taxonomy also lists the objectives of WSNs and IWSNs and
true in IWSNs. A priority enhanced MAC protocol for criti- defines the bounds on key parameters.
cal industrial applications is presented in [54]. In this protocol The protocols listed in Table XI, are classified using the pre-
the traffic in an industrial communication network is divided sented MAC taxonomy to evaluate their suitability in IWSNs.
in four groups and the protocols allows the high priority traf- For instance, MAC protocols including STEM [206], PW-
fic to overtake the low priority traffic bandwidth. The paper MAC [207], CC-MAC [208], B-MAC [209], SyncWUF [210],
presents performance analysis and evaluation of the proto- TrawMAC [211], TICER [211], S-MAC [54], DS-MAC [214]
col through experimental implementation. In [30], a priority and few others can be used in the monitoring applica-
enabled MAC is defined in which priority is assigned on the tions. However, out of the above listed protocols, STEM,
basis of arbitration frequency allocated to individual users. The STEM-B and PW-MAC are more suitable for the applica-
protocol is evaluated using discrete time Markov chain model tions with asynchronous communication requirements whereas
and guaranteed access of the highest priority user is assured. almost all of the rest are suitable for periodic monitoring
A classification of certain other priority enabled MAC applications. Similarly, LAMA [215], PriorityMAC [54] and
protocols is also presented in Table XI, where the priority EQ-MAC [216] offer prioritized access which make these pro-
mechanism along with the salient features of these protocols tocols suitable for the applications where the industrial system
is listed. is handling more than one type of traffic. Usually these pro-
a) Summary and insights: The diverse nature of indus- tocols are suitable for the systems dealing with supervisory
trial applications introduces a wide variety of sensory data control and alerting systems, where, depending on the traf-
to be accumulated at the control centre. Since various indus- fic type the priority is assigned. To diversify the monitoring,
trial processes run simultaneously in an industrial environment control, and emergency communication in IWSNs, multi-
and cannot be distributed geographically. Therefore, it is channel MAC schemes were also presented over the years.
much more obvious that communication link must relay data The multi-channel schemes like MMSN [217], TMCP [358]
from regulatory control, supervisory control, open-loop con- and Y-MAC [219] can be used in the asynchronous moni-
trol alerting and monitoring applications through the same toring applications with relatively larger networks. Whereas
wireless link. Under such circumstances, the priority based schemes like HyMAC [220] and FDP-MAC [221] can be put
communication offers a significant improvement in network in use for time sensitive applications. A detailed list of various
efficiency by communicating the traffic according to sensitivity multi-channel schemes, along with the protocol characteristics
levels. However, in IWSNs, the priority based communication and latency details are listed in Table XI.
is not thoroughly evaluated and very few protocols offer prior-
ity based communication. Nonetheless, the significance of the
priority based communication cannot be undermined. Priority IX. N ETWORK L AYER D EVELOPMENTS
based communication also increases the diversity of the net- Network layer plays an important role in real-time and reli-
work by allowing sensory data from different applications to able communication of information in IWSNs. A large number
be communicated to the control centre without affecting the of protocols have been proposed to meet routing requirements
critical processes thus improving the efficiency of the entire in diverse applications in conventional and industrial WSNs.
network. Over the years, routing protocols are proposed to improve cer-
tain key attributes of a network. Some of the key performance
metrics and network attributes optimized by routing include
B. Extended Classification of MAC Protocols network lifetime, latency, throughput, reliability, energy effi-
The taxonomy presented in Fig. 11, provides a much wider ciency, robustness Packet Reception Rate (PRR), scalability
and in-depth view of possible MAC layer developments, and and algorithm complexity [373], [375]. Extensive list of rout-
allows to classify different schemes presented over the years ing protocols addressing one or more of the listed performance
into one of the sixteen possible categories. The taxonomy metrics can be found in [280], [369]–[372], [374], and [375].
is developed to assist in the evaluation of the basic require- Routing protocols due to significant variations in the under-
ments of a protocol and its much accurate characterization into lay architecture and applications of IWSNs, can be clas-
one of various application areas in industrial environments. sified in multitude of ways. A few attempts have been
Furthermore, MAC protocols presented in research literature made to classify routing protocols based on significant
over time are also characterized into the categories specified by features and some of these classifications can be found
the MAC taxonomy. The classification of notable MAC proto- in [369], [370], [373]–[375]. In this section, an extended clas-
cols based on the presented taxonomy are listed in Table XI. sification of routing protocols is presented where the signifi-
Although, the classification of various protocols is discussed cance of various classes of routing protocols is discussed.
74 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

Fig. 12. Classification of Routing Protocols.

The extended classification of routing protocols is presented hence offering a suitable solution for time critical industrial
in Fig. 12. The overall classification of the routing protocols is applications. A classification of hierarchical routing protocols
divided in six sub-categories, where each of these categories can be found in [371] and [374] whereas some of the exam-
is discussed in detail. The created taxonomy of the routing ples of hierarchical protocols are: LEACH [382], TEEN [383],
where distributes the protocols into multiple categories, it also PEGASIS [384], APTEEN [385], MIMO [386], HPAR [387],
labels each subcategory with respect to performance metrics NHRPA [388] and DHAC [389].
to highlight the focus of the created category and its suitabil-
ity for different applications. In Fig. 12, colour coding is used C. Geographic
to label the routing subcategories in accordance with the per- Geographic or location based routing protocols use geo-
formance optimization parameters listed in the figure. Three graphical placement of nodes to evaluate optimum path for
performance optimization parameters are considered latency, routing. Usually these protocols rely on the built-in posi-
energy efficiency and scalability. Based on these performance tioning systems embedded in the nodes. With the knowledge
metrics and the potential of the routing subcategories each of accurate location of nodes geographical routing protocols
routing subcategory is appropriately labelled. formulate optimal path from source to destination, however,
the use of positioning systems in nodes adds to the cost
A. Flat and also limits the use of such protocols in covered loca-
In flat routing protocols, all nodes are assigned with equal tions. Some of the location based routing protocols include
role and functionality which reduces the overhead and offers TTDD [390], COUGAR [391], GEM [392], GEAR [393],
simplistic rules to manage entire networks [370]. The com- IGF [394], SELAR [395] and OGF [396].
plexity of such protocols is relatively low and they are
suitable for the data gathering applications. The flat architec- D. Gradient
ture reduces the network complexity, however, it also adds Gradient based routing protocols use gradient cost field
longer delay in larger networks. Some of the flagship routing establishment to route data from farther ends of the networks
protocols in this category include WRP [376], TBRPF [377], to the sink. The concept of gradient cost field establishment
TORA [378], Flooding [379], Gossiping [380] and ZRP [381]. is taken from a natural phenomenon where water flows from
higher grounds to the valley. Similarly, in gradient based rout-
B. Hierarchical ing protocols data propagates in a direction where it finds
Hierarchical routing protocols benefit from the versatility minimum cost. Each node maintains a routing table with at
of nodes in the network. The use of special purpose nodes least the information of one least cost neighbour. The cost
in the networks reduces the added delay in flat routing pro- field at each sensor node can be defined in terms of hop
tocols [371], [374]. Due to the hierarchical attributes of the count, energy consumption, delay, link quality, node energy
network, a fairly optimized low latency 2-hop communica- etc. Any one or a combination of above described parame-
tion can be established in the network, where the sensing ters can be used to establish Gradient cost model. In gradient
nodes relays information to cluster-head (a special purpose based routing, the cost field can be established as a function
node capable of communicating directly to sink) which then of any of the QoS attributes which can optimize the network
communicates this information to sink. Hierarchical routing for desired quality metric. Selection of right quality metric can
protocols due to their unique attributes, offer reduced delay, lead to an application specific and optimized routing solution.
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 75

Some of the flagship gradient based routing protocols include improved latency in data communication and can be used for
GBR [398], GRAB [117], GRACE [397], PC-GRACE [105], real-time data delivery. The basic requirements of low latency
SGF [399] and RRP [400]. in such protocols urges dissemination of periodic updates. The
periodic update messages disseminated throughout the network
E. Cluster Based Routing allows the path reestablishment in case of change in topol-
ogy [375]. Since frequent updates are required in proactive
In cluster based routing protocols the network is divided
routing protocols, the communication overhead is relatively
into clusters. Each cluster formulates a small network,
much higher. Some of the examples of proactive routing pro-
where one of the nodes in the cluster acts as a cluster-
tocols include 2-Tier data dissemination [412], SDG [413],
head/coordinator. This node is responsible for ensuring the
SPIN [414], CRP [415], Leach [382] and SOP [402].
affiliation of nodes in the cluster, accumulation of data from
these nodes and onward communication of the accumu-
lated information to the sink [370]. Due to the distributed
I. Reactive
solution, cluster-based approaches offer delay minimization,
redundancy reduction, robustness and efficient intra-cluster Reactive protocols in opposition to proactive protocols,
and inter-cluster communications among nodes. Some of establish on-demand communication and require very little
the cluster-based routing protocols include LEACH [382], information about the route at individual node level. Since
TEEN [383], PEGASIS [384], Re-cluster-LEACH [401], the intermediate nodes do not have to make routing deci-
SOP [402], CHR [403], and IDSQ [404]. sions therefore, there is no need to keep routing tables and
information of the neighbouring nodes [375]. Furthermore, the
F. Mobility Aware Routing overall efficiency of reactive protocols is relatively higher due
to less communication overhead. However, the lack of infor-
Mobility aware routing considers the time to time change mation of routing path and on-demand path establishment adds
in the position of the sink or certain mobile nodes and additional delay to the communication of data. This delay is
updates the routing paths accordingly. It is always hard to usually referred as path acquisition delay [375], [418]. Some of
ensure reliability, energy efficiency and communication over- the traditional reactive routing protocols include TEEN [383],
head minimization within the mobile networks. While some COUGAR [391], CADR [403], EAR [416] and RR [417].
routing protocols consider the scenario of mobile sink, oth-
ers do allow the mobile nodes to be part of the network.
For mobile sink based protocols although the sensors have J. Hybrid
to update the routing path however if sink movement is strate-
gically planned, it resolves sink hole problem (heavy use of Hybrid schemes benefit from both the features of proac-
sensors located around static sink) [371]. Some of the pro- tive and reactive routing protocols. The communication region
posed protocols to handle mobility in the networks include influences the use of proactive and reactive routing. Most of
MIP [405], IEMF [406], Joint mobility and routing [407], the hybrid protocols use proactive routing locally and reactive
DataMULEs [408], SEAD [409] and proxy tree-based data routing inter-locally [375]. Due to the optimal selection of
dissemination [410]. the routing, the hybrid protocols offer reduced latency, over-
head reduction and scalability within the network. Some of
the hybrid protocols include GBR [398], PEGASIS [384],
G. Multipath Routing
SPEED [419], MSRP [420], JARA [421] and APTEEN [385].
Multipath routing allows multiple streams of information
from source to sink. Multipath routing protocols exploit the
existing multi-paths in the network to offer improved relia- K. Query Based
bility of the data. Although multipath routing protocols are
In query based routing protocols the communication
less energy efficient and multiple copies of same data can
between the source and destination is initiated by a query
cause network congestion, however, accurate data reception
request circulated by the destination node. The destination
and reliability of the data significantly increased by imple-
node (sink) if needed circulates a request for a specific data
menting multipath routing. The path selection in multipath
(based on location or specific attributes of the sensed data).
routing is quite similar to single path routing where instead
Any node having the data of interest responds to the request
of the selection of single most suitable path, multiple paths
with appropriate sensory data. The query based data rout-
in order of their suitability are selected for routing of data.
ing algorithms minimize the unnecessary data communication
Some of the multipath routing protocols include GRAB [118],
thus avoiding flooding of data in the network resulting in
TBRPF [377], TORA [378], TTDD [390], MIMO [386] and
extended network lifetime [370]. The query based algorithms
HMRP [411].
are more suitable for delay tolerant applications due to the
added delay from query request to delivery of data. The
H. Proactive delay is further increased in reactive query based algorithms.
In proactive routing protocols, each node is aware of the Some of the query-based routing protocols include RR [417],
data flow path to the sink hence route discovery delay in such DD [422],COUGAR [391], ACQUIRE [423], SPIN-PP [424]
protocols is eliminated. This allows proactive protocols to offer and EQSR [425].
76 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

L. Data Centric P. Heterogeneous


In data-centric routing protocols, when a sensory data is Unlike homogeneous routing protocols, heterogeneous rout-
forwarded from the source node, the intermediate nodes can ing protocols are capable of handling more diverse networks.
perform the data aggregation in the original data packet. This Heterogeneous routing protocols takes in to consideration the
allows efficient aggregation of data and reduces the commu- versatility of the networks and are more suitable for networks
nication overhead. However, due to the manipulation in the with heterogeneous sensing nodes [370]. The heterogeneous
source packets, the identifiers can be altered due to which routing benefits from the special features of the nodes in the
the received information cannot be individually identified with network, where the nodes with extended battery, range, band-
respect to the sources. Some of the representative protocols in width can work as coordinator, cluster-head or aggregator to
this category include SPIN [414], COUGAR [391], RR [417], facilitate network management and efficient communication of
ACQUIRE [423], DD [422] and EAR [416]. information from primitive nodes. Some of the example of het-
erogeneous routing protocols include SOP [402], CHR [403],
IDSQ [404] and CADR [403].
M. Address Centric
Address-centric protocols differ from data-centric with Q. Coherent and Non-Coherent Routing
respect to data delivery mechanism. In address-centric rout-
In coherent data processing based routing protocols, the sen-
ing protocols data is transmitted individually from source to
sor nodes transmit the data with minimum processing. This
sink. The information from each sensor node is transmit-
type of routing poses minimum processing load on the sen-
ted independently to keep the identity of originating entity
sor nodes. The sensor nodes use primitive algorithms for time
intact. Unlike data-centric, this type of protocols gives rela-
stamping and redundancy reduction [375]. This allows nodes
tively higher importance to locality of the originating data.
with low processing specifications to work effectively without
Some of the address-centric protocols include dream [426],
overburdening them. In Non-coherent routing, the senor nodes
LAR [427], GRACE [397] and GRAB [118].
locally process the data and then it is forwarded to aggrega-
tors for onward processing. Data processing in non-coherent
N. Negotiation Based routing goes through three phases [375].
• Target detection, data collection and pre-processing
Negotiation based routing protocols use meta-data nego-
• Membership declaration
tiations to reduce the redundant transmissions [375]. These
• Central node election
protocols focus on energy efficiency and hence communication
In first phase the detection of an event, collection of events
is limited only to the occasions when requested. Negotiation
sensory data and pre-processing of data is completed. In the
based protocols usually follow a three-stage cycle for infor-
second phase, the node selects to participate in the cooperative
mation communication. In case of an event, sensor node
function and informs the neighbouring nodes. In last phase, a
advertises event based sensory information in first stage where
node is elected to perform further processing on the sensory
advertisement packet is broadcasted. Seeing the advertise-
information and apply more extensive compression, encryp-
ment packet, if any nodes requires the advertised data, it will
tion, and aggregation on the received information [370], [375].
send a request packet indicating its interest in the data. In
It is observed that the localized processing in non-coherent
the third stage the data is transmitted from the sensor node
processing based routing protocols offer better scalability and
to interested node completing three stage-cycle: ADV-REQ-
reduced delay compared to coherent processing based rout-
DATA [375]. Negotiation based protocols prioritize operational
ing. Examples of coherent and non-coherent processing based
efficiency and energy conservation at the cost of added delay
routing include SWE and MWE [429], [430].
and therefore can be used in monitoring applications. Some
of the selected negotiation based routing protocols include
SPIN [414], SPIN-PP, SPIN-RL [424], DD [422], VGA [428] X. E NERGY S OURCES AND E NERGY
and SAR [429]. H ARVESTING IN IWSN S
The current industrial equipment is developed to last for
months, even year(s) without a replacement or maintenance.
O. Homogeneous This advancement in technology allowed to cut down reg-
The routing protocols are sometimes divided based on the ular maintenance costs in industries. However, the network
nodes in the network. If all the nodes in the network are lifetime of IWSNs must also be improved in order to allow
same with respect to the hardware, size, battery, energy sup- smooth operation of the plant by avoiding battery replacements
ply, energy harvesting, radio and transmission powers, the and redeployment of nodes, until the regular maintenance
nodes are considered as homogeneous nodes [370]. The rout- of the equipment is called. Due to the extended lifetime
ing approaches used for homogeneous sensing networks are requirements, energy harvesting in IWSNs has gained much
referred as homogeneous routing protocols. Due to the similar importance. Many schemes are proposed that can add up
attributes of the nodes, homogeneous routing protocols treat in the lifetime of the network by harvesting energy from
all nodes equally. Some of the homogeneous routing proto- the available sources in the dynamic industrial environment.
cols include PEGASIS [384], TEEN [383], LEACH [382], A number of techniques can be used to capture energy.
COUGAR [391], SPIN [414], DD [422] and SPEED [419]. Photovoltaic (PV), wind, thermal, biochemical, vibrational,
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 77

Fig. 13. Energy harvesting techniques in IWSNs.

pressure, nuclear, microwave, magnetic resonances, and Radio A careful survey of lighting conditions in different regions
Frequency (RF) are some of the options for energy harvest- in the indoor industry floors and points of interest can give
ing techniques [38], [245]–[248]. The details of these energy a better estimate of energy harvesting potential in such
harvesting techniques and energy sources are listed as follows. environments [252], [253]. Indoor, although predictable, yet
is less effective, as the efficiency of the indoor PV harvesters
is reported to be reduced to one third [46]. The graphical
A. Radiant Energy representation of solar energy harvesters is presented in
Radiant energy plays a significant role in energy harvesters Fig. 13, whereas the details of energy harvesting potential of
and is one of the most widely used energy sources. Radiant solar harvesters are presented in Table XII.
energy harvesting can be divided into solar, RF and infrared. 2) RF: The RF based energy harvesting has gained much
1) Solar: A wide variety of applications use PV for out- attention in the last decade [47], [254]. With the exponential
door/indoor energy harvesting. Energy harvested by PV varies increase in the wireless communications, and countless sources
significantly, depending on the indoor and outdoor environ- transmitting electromagnetic radiations, RF energy harvesting
ment and lighting conditions. has become a definitive source for energy. Presently, the Wi-Fi
The use of solar/illumination for outdoor/indoor access points, cellular base stations, WiMAX communications,
applications in IWSNs has been used for variety of TV broadcasts, and radios are emitting large amount of energy
applications [38], [45], [249], [250]. Since the overall energy in the atmosphere.
requirements are relatively low in case of IWSNs, relatively The RF energy sources can be divided in two areas: near-
small size PVs can be used to meet the purpose. In some cases, field and far-field harvesting. The near-field wireless energy
for outdoor applications the hybrid photovoltaic/temperature harvesting targets the applications where the transmitter is
(PV/T) cells are also used to offer improved efficiency. For placed in close vicinity of the RF energy harvester, which har-
outdoor environments, the solar energy is termed as an infinite vests energy from the close range known transmitter. Since,
source of energy, but the energy harvested on different days in such cases, a predefined distance is maintained which
on different times with different weather conditions can vary makes such cases predictable and much more reliable. In the
tremendously [46], [251]. Hence, the energy harvested from near-field energy harvesting, the efficiency is reported to be
the solar cells is termed as uncontrollable and less predictable up to 80% [255]. In the far field, the energy is harvested
due to the randomness in its behaviour. The indoor light from the different wireless communications and broadcasts
harvesting, however, is usually more predictable as the taking place in the vicinity [47]. The energy is harvested
sources of illumination work during certain predefined hours. from the RF/microwave radiations using a wide band antenna
Furthermore, in industrial environments certain luminous or array of antennas. This received energy is then recti-
levels are maintained to ensure effective work environments. fied and transformed into power [48], [256]. It is considered
78 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

as a relatively consistent and sufficient source of energy in B. Heat Energy


the urban areas, however, its density per square cm reduces Heat energy is one of the sources that is available in abun-
significantly in the suburbs [46]. dance in the industrial environments and is therefore, termed
3) Infrared Energy: Infrared energy harvesting targets next as a significant contributor in energy harvesting systems. The
generation of the PVs to harness energy from the infrared radi- heat based energy harvesting relies on the heat energy pro-
ations emitted by the hot bodies. All hot bodies, as a power duced from the mechanical equipment, structures, friction,
dissipation mechanism, emit infrared radiations which carry a heating chambers, heating losses, even from the electrical
notable amount of energy. Harvesting energy from the infrared equipment [34]. The thermal energy harvesting systems rely
radiations offers an alternate to the solar power during night. on thermoelectric effect [257], where electrical energy is pro-
Furthermore, in the industrial environments, a lot of energy duced due to the temperature difference achieved between
is wasted in the form of infrared radiations which can be the two surfaces of different materials [258]. The principle
effectively transformed in to an untapped energy source. of transforming temperature difference between two surfaces
4) Summary and Insights: The primary objective of energy into voltage is also referred as Seebeck effect [246], [248].
harvesting in IWSNs is self-sustainability. Therefore, selec- Although the energy efficiency of the thermoelectric devices
tion of an energy harvesting scheme is essentially motivated is relatively low but such devices offer a relatively long life-
by the energy requirements of the sensor nodes. The energy time. Furthermore, thermoelectric energy harvesting is termed
consumption of nodes even with same hardware specifica- as a reliable energy source with relatively low maintenance.
tions, can change significantly depending on the frequency of 1) Summary and Insights: The miniature size of the ther-
communication, sleep scheduling and passive listening dura- mal system allows nodes to use heat energy harvesting in
tion. Therefore, there are no clear boundaries for suitability wide variety of industrial applications. The use of heat based
of application areas of a specific energy harvesting technique energy harvesting nodes are commonly used in the radia-
and can be used in diverse applications. Nonetheless, based tors and heated surfaces in industrial environments [38]. The
on the potential of various radiant energy sources and their use of thermoelectric charge is also common in the tem-
suitability to certain application areas some recommendations perature control applications where the thermoelectric energy
are provided as follows. harvesting powers the feedback communication of the nodes.
Solar is one of the readily available and most frequently Furthermore, the use of heat energy harvesting nodes is also
used energy harvesting schemes in IWSNs. Due to the abun- introduced in automotive industry where the engine heat and
dance of this resource, applications requiring more frequent exhaust waste are used to produce thermoelectric charge [34].
transmissions including regulatory and supervisory control can While the infrared energy harvesting nodes are not bounded
easily be powered up using PV based energy harvesting. Motes by the time of the day and sunshine like solar PVs and can
using solar based energy harvesting are equipped with a pri- work during the night time as well, yet the source is very lim-
mary rechargeable battery and follow the harvest-store-use ited and only serves for low duty cycle nodes with extended
model. It is also noted that the outdoor nature of solar energy sleep duration.
harvesting nodes encourages larger separation between the
nodes which requires more powerful radios. Some of the
solar powered energy harvesting nodes include Heliomote, C. Vibration Energy
Prometheus, Ambimax and sunflower [38]. Although solar Mechanical forces, found in abundance in industrial envi-
energy harvesting in IWSNs is widely used and is highly ronments, are great sources of energy and are widely accepted
suitable for outdoor applications, yet the uncertainty and in the industrial environments. Whether it is achieved through
dependence on the weather conditions make the source electrostatic, piezoelectric, or electromagnetic, [259], [260]
unpredictable. this energy resource can greatly impact the lifetime of the
RF based energy harvesting can serve a potential source of IWSNs. The electrostatic, electromagnetic, and piezoelectric
energy in near field region and can provide low cost long life devices transform the mechanical energy into electrical energy.
energy harvesting. However, RF energy harvesting produces The working principle of these devices is listed as under.
much lower power levels in the order of microwatts even in 1) Piezoelectric: The piezoelectric effect based devices use
the close vicinity of the cellular towers (15m-100m) hence, the piezoelectric material which under the influence of stress or
RF based energy harvesters are only suitable near transmission strain, are capable of producing electric charge. The produced
towers and wireless access points in industrial environments. charge is regulated to achieve a steady output. The piezo-
Infrared energy harvesting due to its dependence of low electric systems offer advantages of high output voltages and
energy wave emissions by hot bodies is more suited for capacitances but are relatively expensive and the coupling
industrial environments with plenty of hot bodies. Boilers, coefficient is also material dependent [257].
incinerators, furnaces, engines, and hot bodies can serve as 2) Electrostatic: The electrostatic energy harvesters use the
source of energy for the infrared based energy harvesting. relative motion between the plates of the variable capacitors
Since the infrared based energy harvesting offers limited to generate the electric current. In this method, the mechani-
energy therefore, it is suitable for applications with less fre- cal motion is used to cause the distance change between the
quent transmission requirements. For such energy harvesting electrodes of the capacitor. Hence resulting in voltage varia-
sources, it is also desirable to incorporate efficient power tion, thus, generating electric current in the connected circuit.
management schemes. Electrostatic systems offer high output voltages, adjustable
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 79

TABLE XII
P RIMARY BATTERY S OURCES AND E NERGY H ARVESTING T ECHNIQUES IN IWSN S [16], [31], [34], [267]–[270]

coupling coefficients, low capacitances and cost effective- small size of these harvesters the energy efficiency is relatively
ness [257]. On the down side, these devices are relatively small low [257].
and needs handling of micrometer dimensions. In general, vibration/motion energy produced from different
3) Electromagnetic: The electromagnetic energy harvesting uncontrollable/partially controllable processes, (wind, liquid
is one of the most widely used power generation mechanism, flow, stress, strain, vibrate etc.) can result in diverse energy
commonly used on the larger scales where the relative motion resources [261], [262]. The graphical representation of vibra-
in electromagnets and the windings induces electric current in tion energy harvesting is presented in Fig. 13, whereas the
the windings. The synchronous generators, induction genera- details of energy harvesting potential of these harvesters are
tors, permanent magnet generators are some of the examples presented in Table XII.
where electromagnetic induction is used for electrical power 4) Summary and Insights: Industrial environments are filled
generation. In electromagnetic induction, the rotational motion with the vibrations generated by a wide variety of oper-
achieved from wind, hydropower, gas and petrol engine is ations including rotation, drilling, pressure, kinetic energy
converted in the electric power. However, these structures and biomotion. The use of energy harvesting techniques to
are relatively large and are used to produce electrical energy scavenge energy from these sources is a common practice.
in hundreds of megawatts. For IWSNs, the electromagnetic Depending on the application and the node energy require-
energy harvesting has great significance as in industries mag- ments, a decision can be made on the possible energy
netic flux, rotational motion and magnetic fields are found in harvesting scheme.
abundance, which can easily be transformed in small scale The selection of the viable energy harvesting scheme
self-sustaining electromagnetic energy sources. Furthermore, depends on its suitability in a given application. For instance,
the electromagnetic energy harvesting sources offer high out- evaluation of rotational speed, magnetic flux and gener-
put currents, robustness, and long lifetime. However, due the ated heat in motors and generators require precise sensory
80 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

feedback. For such cases, sensor nodes are usually placed the hybrid schemes are demonstrated over the years including
on the rotor for accurate measurements. Since the sensor thermal-PV, PV-wind, biochemical-biomechanical [34], [45].
node is going through the rotational motion, hence the use of The use of the primary batteries, rechargeable batteries and
electromagnetic energy harvesters is more suitable. The elec- supercapacitors can be found in almost all the applications in
tromagnetic energy harvesting nodes produce notable energy IWSNs due to the non-suitability of battery less nodes (green
and can be used in a wide variety of applications. However,the nodes) for industrial automation and process control. Due to
use of permanent magnets in the electromagnetic energy har- the unique attributes of each of these battery sources, the pref-
vesters lose magnetic properties over time and can cause erence of the individual battery type can vary depending on the
reduction magnetic flux in turn reducing energy production system requirements. The rechargeable batteries are often used
capabilities with the passage of time. in combination with the energy harvesting techniques to offer
In the pressurized environments, use of piezoelectric energy longer network lifetime. The notable capacity of rechargeable
harvesting appears to be a more viable option. The piezoelec- batteries allows the use of less predictable energy harvesting
tric harvesting nodes although harvest plenty of power yet the techniques like solar so that the nodes can survive few days
material used in piezoelectric energy harvesters is relatively without recharge. However, one of the possible problems of
expensive. the rechargeable batteries is the effect on battery lifetime with
Since the vibrational energy harvesting nodes are capable frequent recharges.
of fulfilling required energy needs, there are no limitations Super capacitors on the other hand, offer much higher
on applications and communication of vibration based energy recharge cycles without significantly wearing out. However,
harvesting nodes if a suitable vibrational energy harvesting lower energy capacity limits the use of supercapacitors only
source is available. in combination with the predictable energy harvesting tech-
niques. The predictable attributes of the energy harvesting
schemes ensure a constant source of energy hence allowing
D. Hybrid Energy Resources the nodes to mostly operate based on the energy harvested.
In order to improve the performance of the energy harvest- However, to assist in the occasional variations in the energy
ing sources, primarily relying on single energy source, hybrid harvested and anomalies in harvesting systems are addressed
schemes are implemented. In certain cases, the certain energy with use of supercapacitors. More frequent energy harvest-
sources are intrinsically linked and can be efficiently utilized. ing schemes used in combination with supercapacitors include
The use of solar PVs along with thermal power harvesting vibrations and indoor solar harvesters.
offers one such scenario where the photons as well as the heat The permanent batteries are used in non-accessible and
of the sun is transformed in to electrical energy. It results in remote wireless networks. The use of under-water sensor
the improved efficiency per unit area. To employ multi-source nodes in dams for evaluation of water pH, impurities sedi-
harvesting, multiple harvesting modules are integrated in a sys- ments water flow-in dissolved oxygen and temperature sensors
tem [34]. A hybrid system using maximum power point solar serve as one such cases where the node lifetime lasts until the
PVs and wind is presented in [263]. The design of the hybrid battery dies out. Furthermore, in some applications where the
energy harvesters is presented in [264]. Some other example energy harvesting is not an option the permanent batteries are
of hybrid energy harvesters is presented in [261]. also used. In such cases the nodes are easily accessible and
The nuclear diode junction battery with long lasting ability a regular battery replacement cycles are scheduled to run the
can also serve as an alternate. The battery offers long life but processes smoothly.
relatively low power [265], [266].
Table XII lists some of the energy harvesting techniques
used and their expected potential contribution along with con- XI. G OOD P RACTICES AND D ESIGN
ventional primary battery specifications, supercapacitor details S OLUTIONS IN IWSN S
and rechargeable batteries. All these techniques add additional In IWSNs, continuous research has provided much wanted
lifetime to IWSNs fulfilling the basic requirements of the improvements in past few years. It is because of the efforts
extended lifetime. Apart from the energy harvesters, a suit- of many individuals and some joint ventures that IWSNs have
able electronic circuit with regulators, DC-DC converters and recently witnessed much wider acceptability in all sorts of
filtering is needed to feed the rechargeable batteries. Though industrial applications. Due to the broader scope of the poten-
in some cases battery-less operation is also opted for IWSNs, tial applications of IWSNs, it is becoming difficult to cope
where the energy-harvester serves as the primary source of with the rising challenges. In this section, to resolve prominent
energy yet it limits the coverage of the sensor nodes. challenges in IWSNs, certain practices are listed. Wherever
1) Summary and Insights: Use of the hybrid energy har- appropriate, existing research is discussed to overcome these
vesting nodes is relatively rare in industrial environments. One challenges, otherwise new directions for possible solutions are
of the primary reasons is the additional cost factor added to explored.
an individual node affecting the cost of the network signifi-
cantly, especially in case of larger networks. However, in some
cases where more frequent communications are required from A. Dynamic Priority Scheduling
the wireless sensor nodes deployed in remote or inaccessible The communication in Industrial processes is not usu-
area, hybrid schemes may be adopted. In the literature, some of ally limited to one particular class or industrial system. For
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 81

instance, an industrial process can be communicating emer- priority but also in terms of sampling rates and affordable
gency traffic, regulatory control traffic, alerting traffic and quantization error of the sensed information. Therefore, het-
monitoring traffic. In such processes, the multilevel prioritized erogeneous sensing, though rarely used, can make a significant
communication offers a better chance at effective communica- difference in reducing the load of stressed out networks by
tion optimization. Some of the priority based communication down scaling the number of bits used to represent an analog
protocols are listed in Section VIII-A4 and main strengths sensor value. The decision on when to reduce the precision
and weaknesses of these protocols are highlighted. However, of the sensed information is question of how significant the
a commonly observed trend is the use of pre-defined priorities sensed information is and will it affect the process outcome
for each industrial traffic type. Doing so, limits the response of or not.
communication protocol only to predefined states, and hence, This compels the researchers to optimize the information
its suitability to handle dynamic processes. Since the prior- preferences and allocate the resources accordingly in order to
ity of traffic in industrial networks can change on runtime, get the desired results. Thus, merging heterogeneous signals
depending on variations in sensor readings, the use of pre- and the allocation of non-uniform resources must primarily be
defined traffic priority may not be a suitable solution. Hence, considered in design.
the widely-proposed priority based MAC protocols for IWSNs
are inefficient in scenarios where certain variation in the exist- C. Data Fusion and Localized Processing
ing priority can occur. The examples of such cases include Data fusion is an important aspect of IWSNs and can be
Alerting systems, where violation in certain critical thresholds, greatly beneficial in harsh industrial applications. Localized
in runtime, may result in instability in plant’s operation. Under processing with efficient data fusion can greatly help in trans-
such circumstances the alerting system’s traffic priority should forming massive data into compressed critical information.
be increased due to its current critical nature. Similarly real- The localized processing also reduces the time delays between
time variation in supervisory control feedback also changes reading sensor values to controlling the actuators. If efficiently
the priority of the affiliated traffic and more regular feedback implemented, this process can help in eliminating some cru-
may be desired. cial constraints in IWSNs including data redundancy, time
Therefore, a more effective way to deal with processes constraint, network lifetime and even BER.
like these is by establishing dynamic priority, which could
prioritize in real-time. The concept behind dynamic priority D. Efficient Information Scheduling
scheduling is to form adaptive and evidence based decision
of which information is more critical and must be delivered Information scheduling plays a very important role in het-
on priority. Inclusion of dynamic priority scheduling meets the erogeneous industrial networks. In a system with different
challenges of time constraint and information priority schedul- processes integrated together, the sensed data originating
ing by efficiently sacrificing the bandwidth of low priority data from different sources may have very diverse time dead-
sources. lines, sampling rates, priority levels and failure consequences.
Some of the existing scheduling schemes presented over the
years are discussed in Section VIII-A2. Apart from this, the
B. Variable Sampling Rates and Heterogeneous Sensing IEEE802.15.4e discussed in Section VI-B2 also offers a base
The information generated in a plant is usually of critical platform which can be further enhanced to optimize schedul-
nature but its significance rises even more when it violates crit- ing. However, there is much more potential for improvement
ical thresholds. At such instances, it is imperative to observe where an efficient scheduling of information can resolve
status of such information more frequently. To do so, the many intrinsic problems of Synchronization, Sleep Scheduling,
design cannot rely on the static sampling rates rather it must Contention free medium access, Coexistence, reliability, inter-
adopt with the changing statistics of the information from ference and BER. Thus, where a good scheduler design is of
different sections of the plant. Hence, the incorporation of principal importance in TDMA based industrial communica-
variable sampling based on critical nature of information is tion standard, a poor scheduler may lead to violation of time
imperative for better industrial solution. In literature, no sig- constraints in harsh industrial environments.
nificant contributions can be found in this aspect. However,
the use of variable sampling rates, to compensate network E. Long Lifetime Assurance
loads and to trade-off between the frequently desired and A long network lifetime has much importance in IWSNs
less frequently desired information, can significantly improve especially in automation and process control applications.
the reliability of the network communication by effectively With the improving technologies, a great extension in the life-
managing bandwidth fluctuations and resource constraints. time of the industrial equipment has been witnessed. To cope
Heterogeneous sensing, is usually referred in similar mean- with this, energy harvesting techniques must be considered
ings as variable sampling. However, to establish a difference to offer extended lifetime of IWSN nodes, in comparison to
between the two, the heterogeneous sensing is used in sense that of the industry equipment. A detailed discussion is being
of quantization information and number of bits assigned to provided on various energy harvesting schemes, capacity of
the sensed information. As in IWSNs, it is of paramount the batteries and supercapacitors in Section X, yet, the prac-
importance that the information from different sources is dealt tical evaluation of these schemes in industrial environments
according to the nature of information, not only in sense of can lead to a more accurate time and capacity information
82 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

of various schemes discussed. Another interesting evaluation design offers more promise of fulfilling the desired objec-
would be to link the energy harvesting schemes with the power tives with minimum resources and lowest cost possible. In
consumption of various motes available in the market along Section VII-A, a detailed discussion on motes and radios avail-
with the use of low latency, reliable and energy efficient algo- able in the market can be considered to identify suitable motes
rithms [272], [273]. A thorough research in this domain may for required applications. Furthermore, some other key ele-
lead to a better estimate of the lifetime expectancy of IWSN ments need to be opted, based of application requirements
motes with different energy harvesting techniques. are listed in Section IV-D. With all the basic objectives cov-
ered, one may look further to optimize efficiency of the design
by incorporating transmission power control, sleep scheduling
F. Data Reliability, Time Synchronization and and energy harvesting for network lifetime improvement, dis-
Retransmission Scheduling tributed processing, linearization, effective memory mapping
Reliable data communication has great significance in and code optimization for resource efficient design and mod-
IWSNs and accuracy of each transmission is very important. ular approach, clustering, and hierarchical design for scalable
It is for the same reasons, retransmission is considered to solutions [274].
be very important to achieve the desired levels of QoS. In However, to propose a solution suitable for the application
this aspect, IEEE802.15.4e can serve as a good example as as well as to offer possible potential for future developments is
it offers interference free channel access. It also implements a challenging task. Apart from this an industrial solution based
Time Synchronized Channel Hopping (TSCH) for better reli- on WSNs is expected to be efficient and scalable. The IWSNs
ability. However, the desired Packet Reception Rate (PRR) not only have to adjust with the existing field-bus and Ethernet
could be a challenge due to some significant interference legacy solutions but also have to deal with the changing and
sources, intrinsic to the industrial environments. This is where ever expanding industrial structure. In such cases, modular
the desired QoS is compromised. However, to ensure a par- approach and hierarchical based solution is recommended for
ticular QoS at all times for certain communication types in the scalable architectures. Furthermore, it is recommended to
IWSNs, the retransmission scheduling can be used. The shared efficiently utilize the resources from implementing efficient
slots provided in IEEE802.15.4e can be used for this purpose, memory allocation algorithms to the sophisticated techniques
but the default retransmission uses a CSMA/CA based channel to prolong the network lifetime.
access during the shared slots which makes the reliability and
timely delivery of already delayed information questionable. XII. F UTURE R ESEARCH D IRECTIONS
In this aspect, very limited research can be found. The avail-
IWSNs offer a suitable alternate for the industrial monitor-
able research includes works in [10] and [54]. Yang et al. [10]
ing, automation and process control and it is expected that
try to improve the retransmission efficiency in TDMA based
the future investments in IWSNs will further increase. Apart
multihop IWSNs, using efficiently scheduling the shared slots.
from many appealing benefits, primary cause of market boost
In [54], a priority mechanism is defined which attempts to
in IWSNs is the significant price differences in wireless and
improve the QoS of high priority communication, by allowing
wired networks. However, there are still some concerns from
it to retransmit the failed communications of high significance
control and automation industry and experts of the field, high-
over the time slots assigned to lower priority communications,
lighting the QoS relate problems of the wireless technology.
hence offering better reliability. Further improvements are also
It is, therefore, foreseen that certain critical areas will receive
expected in this domain however it requires more investigation
significant amounts of attention in the future to cope with the
and research for optimized solutions.
QoS offered by the typical wired networks.
It is therefore predictable that the future research will try
G. Application Specific and Resource Efficient Design to compensate the lag in IWSNs to offer reliable commu-
nication in industrial applications with comparable quality
Careful observation of the parameters in a plant can give
metric values (BER, RSSI, data rate etc.) to that of the
insight of the suitable solutions for the selected applications. A
wired networks. Moreover, to meet the high data rate require-
prime solution in the field of IWSNs that can perfectly fit every
ments in higher hierarchy of IWSNs, other technologies like
application is a myth. Therefore, one cannot deny the need for
Visible Light Communication (VLC) [275], [276], Cognitive
an application specific design in IWSNs [16]. Apart from this,
Radios (CR) [277], [278] and IoT [279] will play an impor-
if the wireless nodes are used to develop a generalized solution
tant role. Main research streams in IWSNs to cope with the
which can work in a wide variety of applications, it might need
industrial demands are listed as under.
a lot of resources. For instance, if the nodes are developed to be
compatible with Zigbee, WirelessHART and 6LowPAN stan-
dards at once, it will require multiple radios and secondary A. Deterministic Network Formation
processing units. Keeping in view the maintenance, modifi- Since IWSNs are not yet considered as a mature technology
cations, deployment packaging, servicing, and unit costs, the in industrial automation and control, ensuring deterministic
solutions becomes unfeasible. Therefore, most of the applica- behavior in IWSNs will be receiving great significance in
tions tend to offer compatibility with a single communication the next few years. It is very important to offer deterministic
protocol where few special nodes can work as a gateway to behavior of IWSNs to assure proper working in harsh envi-
interconnect with other technologies. An application specific ronments and industrial processes. Despite a lot of work in
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 83

Physical, MAC and Network layer optimizations, still most of D. Industrial IoT
it needs to converge on a single platform to offer consolidated Industrial Internet of Things (IIoT) is a specific branch
solution in the formation of deterministic networks where one of IoT which addresses the communication and connectivity
could predict the operation with certainty. Moreover, the reli- issues in industrial environments and offers suitable solutions.
ability assurance in IWSNs will always be compared to the IIoT can improve interconnectivity, flexibility, scalability, time
existing wired solutions irrespective of the cost difference. efficiency, cost effectiveness, security, productivity and oper-
It is, therefore, needed to conduct dedicated research in this ational efficiency in the industries. IoT can also serve as
sensitive area. Though with the inclusion of TDMA, channel a platform to establish intelligent network of devices [281]
access reliability is certainly improved, yet the added delay which can interrelate data and processes to effectively estab-
needs to be carefully handled without sacrificing the deter- lish feedback control systems for industrial automation. The
ministic network architecture. Certain reliability, real-time research in use of IoT in industrial environments is increas-
delivery, scheduling and priority optimization protocols [30], ing exponentially with IIoT emerging as a main contender
[35], [37], [40], [52], [52]–[54], [61], [65], [65], [96], [107], in the field of wireless industrial automation [282]. Apart
[108], [192], [272], [273], [280] (Sections VI, VIII and IX from the contributions of research community in improving
provide sufficient information on the listed optimization pro- the operability of IoT in the industries, many dedicated hard-
tocols) are also defined. However, for most of the cases static ware modules and platforms are also introduced to support the
network architectures were investigated while most of the IoT based developments in the industrial environments. A list
practical applications demand dynamic and scalable network of various practical modules optimized for IoT are discussed
architecture for durable design. in Section VII-A.
The developments in IIoT aim at offering an accom-
plished technology capable of integrating heterogeneous sen-
B. Durable and Long Life IWSNs sors and systems. To maximize the operational efficiency
The extension in the lifetime of industrial equipment has and to offer extended benefits, use of multi-layer Service
forced the need for the energy harvesting techniques in Oriented Architecture (SOA), with some variations, is pro-
IWSNs. Moreover, some hard-to-access deployment points posed [282], [283]. Energy consumption, latency, extensibility,
(turbines, internal machinery/generators sensors etc.) urge the modularity, scalability, topology, throughput, security and
extensive lifetime of the wireless sensor nodes. By far, lit- safety are some of the key considerations shaping SOA [284].
erature lacks a thorough evaluation of energy harvesting For process control and automation applications, sensors and
techniques specifically targeting industrial environment, its actuators need to interact with the environment more fre-
energy generation potentials and presentation of application quently and may have real-time communication and response
specific energy harvesting techniques for industrial environ- requirements, hence an adaptive architecture is needed to
ments. A thorough evaluation of potential of energy harvesting dynamically interact with the environment. Furthermore, the
techniques with suitable blend of variety to cover the wide architecture should also support the heterogeneous and decen-
scope of industrial applications is very important. Such effort tralized operation of IoT. Therefore, SOA is considered an
will encourage further investigation in this area to unleash the appropriate approach to achieve interoperability between het-
full potential of IWSNs in industries. Apart from this, research erogeneous devices in a multitude of way [282], [285], [286].
on hybrid energy sources is very limited and if properly Some initiatives from the research community and standards
investigated can unlock infinite potential for future IWSNs. organizations have facilitated the adaptation of IoT in indus-
trial environments. 6LoWPAN is one such development which
targeted, IPv6 implementation over Low-power WPAN, details
C. Interoperability in IWSNs of which can be found in Section VI-C4. Details of some other
Interoperability and transformation of existing structure to developments and initiatives are listed as follows.
wireless with minimal variation in the existing setup will 1) OpenWSN: OpenWSN is an open-source project which
greatly help the transformation. Moreover, the need for wire- facilitates the implementation of IoT in time and reliability
less solutions with more flexibility and ability to embed in sensitive resource constrained networks. The free and open-
the existing wired networks is missed and is strongly desir- source implementation of the IoT oriented protocol stack and
able for potential improvements. Although some industrial development of debugging, support and integration tools in
protocols offer interoperability in IEEE802.15.4 and TCP/IP OpenWSN encourages rapid development in IoT centered
operated devices, yet it only accounts for the Ethernet based low power mesh networks [287], [288]. OpenWSN imple-
wired networks. Also the need for translation from full ments standards based protocol stack for IEEE802.15.4e Time
duplex (wired setup) to half duplex (wireless setup) is much Synchronized Channel Hopping (TSCH) based resource con-
needed. Apart from these, many wireless technologies are strained networks coupled with IoT standards like 6LowPAN
predicted to collaborate in industrial automation and pro- (the IPv6 protocol adaptation layer to IEEE802.15.4 net-
cess control. Unfortunately, scarcity of the radio band would works [289]), RPL (routing protocol for Low-Power Lossy
demand operation of various wireless technologies in over- Networks (LLN) [290]) and CoAP (a light-weight HTTP-
lapping spatio-temporal regions which demand expansion of alike application protocol [291]) to aid ultra-low power and
IWSNs to other technologies to assist in future industrial reliable mesh networking in Internet enabled WSN [287].
automation and process control. Use of IEEE802.15.4e TSCH MAC ensures suitability of
84 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

OpenWSN for time and reliability constrained industrial speed Ethernet [294]–[296]. Some other benefits of the tech-
networks. nology include the non-existence of interference among VLC
The developments in OpenWSN can be categorized in two and radio frequency based IWSNs as well as relatively higher
sub-projects, firmware and software. The firmware is written security compared to traditional technologies.
in standard C99 and GCC is used as a default compiler which
F. Cognitive Sensor Networks for Industrial Applications
enables compatibility of the firmware with AVR, ARM cor-
tex and MSP processor architectures [288]. OpenVisualizer, IWSNs use Industrial, Scientific and Medical (ISM) band,
the software sub-project, developed using Python, serves as a frequency spectrum utilized by many other technologies as
an Internet gateway and is responsible for IPv6 compression, well. The continuous increase in the use of wireless technolo-
network topology, routing, statistics and essential packet met- gies in various applications are and will be soon leading to
rics. In OpenWSN the flexibility is added using command overlapping wireless spectrum access where the opportunistic
line options which allow the users to combine toolchains, ker- spectrum access would be inevitable [277]. Examples of such
nals applications and board with single command line [288]. cases can be seen in Wi-Fi, Zigbee, Bluetooth and Wi-MAX,
Furthermore, the continuous integration servers provide open where all of these use overlapping spectrum [297]–[299]. To
IIoT service which allows end-users to build applications avoid the interference under similar circumstances, use of cog-
online. nitive sensor networks for opportunistic spectrum access may
2) 6lo WG: IPv6 over Networks of Resource-constrained be the only solution. Moreover, CR also offer a scope of
Nodes (6lo) Working Group replaces 6LoWPAN WG to bandwidth extension and multichannel utilization by oppor-
extend the IoT enabled and IPv6 supported protocol stack for tunistic tapping in unused spectrum which is otherwise not
wider range of radio technologies. It is an initiative by Internet usable in traditional IWSNs [278], [300]. Cognitive Radio
Engineering Task Force (IETF) where 6 lo WG is intended to Sensor Networks (CRSNs) are suitable for handling non-
provide suitable support for IoT and IPv6 to resolve intercon- linearly distributed sensors for reliable data delivery QoS
nectivity issues in primitive radio technologies. The primary under unfavorable propagation conditions [301].
objectives of 6lo is to facilitate IPv6 connectivity over resource Industrial and factory automation, process control and dis-
constrained networks with following characteristics [292]. tributed control systems are appealing more and more wireless
• Low power, processing and memory resources technologies [302], [303]. Although with the use of TDMA
• Strict upper bounds on state, code space and processing based channel access the channel congestion and collisions are
cycles greatly reduced, but the scheme is not very successful in guar-
• Optimization of energy and network bandwidth usage anteed channel access if multiple technologies are working
• Lack of some layer 2 services like complete device in same vicinity. CR, under such circumstances can assist in
connectivity and broadcast/multicast optimizing communication reliability along with the provision
The developments in 6lo aim at several radio technologies of interoperability among different technologies. Apart from
where the main areas of interest include [293] this, channel bonding in CRSNs should also be considered for
• Transmission of IPv6 packets over Digital Enhanced improved reliability and delay parameters. A survey of channel
Cordless Telecommunications (DECT) Ultra Low bonding CRSN is presented in [304]. There are also many pro-
Energy (ULE) tocols which have been refined over the years for Cognitive
• Transmission of IPv6 packets over Master-Slave/Token- radios and can be transformed for CRSNs. Cognitive radio
Passing (MS/TP) Networks protocols involving spectrum sensing, spectrum allocation and
• Transmission of IPv6 packets over Near Field spectrum handoff can be optimized for sensor networks to
Communication (NFC) offer better efficiency [305]. Apart from this, the cognitive
• Transmission of IPv6 packets over BLUETOOTH(R) radio power control mechanism offers extended network life-
Low Energy (BLE) time along with reduced interference [306]. Some of the exist-
• Transmission of IPv6 packets IPv6 Packets over DECT ing architectures (Spectrum pooling, CORVUS, IEEE802.22,
Ultra Low Energy DIMSUMnet, DRiVE, OverDRive, Nautilus [307], [308]) can
• Transmission of IPv6 packets IPv6 over Low-Power also be utilized to signify the benefits of cognitive sensor
Wireless Personal Area Networks (6LoWPANs) networks over traditional sensor networks.
• Transmission of IPv6 over MS/TP Networks All these benefits vouch for the cognitive sensor networks
• Transmission of IPv6 packets over ITU-T G.9959 as a potential technology in industrial automation and pro-
Networks cess control. Opportunistic spectrum access in cognitive radios
has been thoroughly evaluated and offers sufficient and well
E. IWSNs and VLC evaluated works in literature. All these developments can eas-
In industrial applications, Ethernet based standards offer ily be translated in IWSNs to offer improved performance
significant data rates in multiples of tens of megabits per sec- in industrial automation and process control applications
ond to handle high speed traffic. To handle large amounts of by assuring superior communication reliability and collision
data in higher hierarchies of the IWSNs, the IEEE 802.15.4 avoidance. However, use of cognitive sensor networks in
based industrial standards may not be able to offer suffi- industrial automation and process control is still in infancy
cient bandwidth and may need a different technology which and need to be further explored for analysis of this potential
could support high data rates. For such cases, VLC technol- technology in industrial applications. The security assurance
ogy can serve as a suitable replacement to the existing high in CRSN is also a main issue and still several challenges and
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 85

open research issues are remaining [309]. Some of the work R EFERENCES
in this particular aspect, as discussed earlier, [277], [300], [1] Y.-C. Chou, C.-H. Lu, and P.-L. Chang, “Using theory of constraints
[302], [303], [310]–[313], can serve as a baseline for devel- to find the problem about high level inventory in the aerospace indus-
oping the next generation CRSNs for monitoring applications, try,” in Proc. Technol. Manag. Glob. Econ. Growth (PICMET), 2010,
pp. 1–10.
emergency responses, process control and automation. [2] A. Z. Xu. (2014). 2020: Future Automation. [Online].
Available: http://www.controleng.com/single-article/2020-future-
XIII. C ONCLUSION automation/c33ed4679973dcb1ed2f53411520088d.html
[3] T. M. Chiwewe and G. P. Hancke, “A distributed topology control
IWSNs have shown great potential in improving the pro- technique for low interference and energy efficiency in wireless sen-
cesses and cost efficiency in industrial applications. However, sor networks,” IEEE Trans. Ind. Informat., vol. 8, no. 1, pp. 11–19,
many challenging factors still limit the performance of IWSNs Feb. 2012.
[4] M. Magno et al., “Extended wireless monitoring through intelligent
in extreme industrial environments. At present, the potential hybrid energy supply,” IEEE Trans. Ind. Electron., vol. 61, no. 4,
of IWSNs is limited by many factors. It is therefore necessary pp. 1871–1881, Apr. 2014.
to target the key limiting areas to exploit the full potential of [5] L. Palopoli, R. Passerone, and T. Rizano, “Scalable offline optimization
of industrial wireless sensor networks,” IEEE Trans. Ind. Informat.,
IWSNs. The research in past few years has pushed IWSNs vol. 7, no. 2, pp. 328–339, May 2011.
to the verge of wide acceptability in industrial automation [6] S. Shin, T. Kwon, G.-Y. Jo, Y. Park, and H. Rhy, “An experimental
and process control. Yet there is a need of further improve- study of hierarchical intrusion detection for wireless industrial sen-
sor networks,” IEEE Trans. Ind. Informat., vol. 6, no. 4, pp. 744–757,
ment in the areas including, reliability, real-time data delivery, Nov. 2010.
lifetime enhancement, security, localized processing, efficient [7] O. Kreibich, J. Neuzil, and R. Smid, “Quality-based multiple-
route selection, scalability, modular design, information aggre- sensor fusion in an industrial wireless sensor network for MCM,”
IEEE Trans. Ind. Electron., vol. 61, no. 9, pp. 4903–4911,
gation, data compression, interoperability and deterministic Sep. 2014.
network design. Any improvement in these areas would pro- [8] S. X. Ding, P. Zhang, S. Yin, and E. L. Ding, “An integrated design
mote IWSNs towards industrial applications, which could framework of fault-tolerant wireless networked control systems for
industrial automatic control applications,” IEEE Trans. Ind. Informat.,
affect the process control and automation industry on broader vol. 9, no. 1, pp. 462–471, Feb. 2013.
scales by providing low cost information from the entire plant, [9] M. Chen, “Reconfiguration of sustainable thermoelectric generation
adding to efficiency of the processes and introducing signifi- using wireless sensor network,” IEEE Trans. Ind. Electron., vol. 61,
no. 6, pp. 2776–2783, Jun. 2014.
cant cost reduction in the information collection and process
[10] D. Yang et al., “Assignment of segmented slots enabling reliable real-
control. time transmission in industrial wireless sensor networks,” IEEE Trans.
IWSNs introduce efficient means to communicate infor- Ind. Electron., vol. 62, no. 6, pp. 3966–3977, Jun. 2015.
mation within the industrial processes and have foreseeable [11] B. C. Villaverde, S. Rea, and D. Pesch, “InRout—A QoS aware route
selection algorithm for industrial wireless sensor networks,” Ad Hoc
future in industrial monitoring, process control and automa- Netw., vol. 10, no. 3, pp. 458–478, 2012.
tion. But applications of IWSNs are not limited to information [12] S. Misra, S. Goswami, C. Taneja, A. Mukherjee, and M. S. Obaidat,
communication. Rather, the technology enables IWSNs to “A PKI adapted model for secure information dissemination in indus-
trial control and automation 6LoWPANs,” IEEE Access, vol. 3,
embed intelligence in the industrial processes. With the abil- pp. 875–889, 2015.
ity to offer localized processing and decision making, each [13] T. Blevins, D. Chen, S. Han, M. Nixon, and W. Wojsznis, “Process
node, individually, and each network, collectively, can serve control over real-time wireless sensor and actuator networks,” in
Proc. IEEE 7th Int. Symp. Cyberspace Safety Security High Perform.
as an evolutionary technology for industries. Still IWSNs Comput. Commun. (HPCC CSS), New York, NY, USA, 2015,
are far from reaching the stated potential and need contin- pp. 1186–1191.
uous improvements as well as collaborative progress to reach [14] J. Cecílio, P. Martins, J. Costa, and P. Furtado, “State machine
model-based middleware for control and processing in indus-
potentially promising future. trial wireless sensor and actuator networks,” in Proc. 10th
In this review, an effort is made to present the IWSNs from IEEE Int. Conf. Ind. Informat. (INDIN), Beijing, China, 2012,
a different perspective. The paper offers a thorough survey pp. 1142–1147.
[15] Z. Yao, Y. Sun, and N. H. El-Farra, “Resource-aware scheduled con-
on IWSNs, and attempts to encompass sufficient and signif- trol of distributed process systems over wireless sensor networks,”
icant work in this field including the mote designs, radios, in Proc. Amer. Control Conf. (ACC), Baltimore, MD, USA, 2010,
protocols and standards, research contributions, developments pp. 4121–4126.
[16] V. C. Gungor and G. P. Hancke, “Industrial wireless sensor networks:
in energy harvesting and batteries, main industry contributors Challenges, design principles, and technical approaches,” IEEE Trans.
and primary industry requirements. The paper also evaluates Ind. Electron., vol. 56, no. 10, pp. 4258–4265, Oct. 2009.
the gaps in technology and the industrial requirements, which [17] J. Åkerberg, M. Gidlund, and M. Björkman, “Future research chal-
lenges in wireless sensor and actuator networks targeting industrial
could challenge the performance of IWSNs, and offers possi- automation,” in Proc. 9th IEEE Int. Conf. Ind. Informat. (INDIN),
ble way out to exploit full potential of IWSNs. It also gives Lisbon, Portugal, 2011, pp. 410–415.
an insight of future technologies and the trends that could be [18] F. Dobslaw, M. Gidlund, and T. Zhang, “Challenges for the use of
data aggregation in industrial wireless sensor networks,” in Proc.
observed in coexistence with IWSNs in future in automation IEEE Int. Conf. Autom. Sci. Eng. (CASE), Gothenburg, Sweden, 2015,
and process industries. pp. 138–144.
[19] A. A. K. Somappa, K. Ovsthus, and L. M. Kristensen, “An industrial
ACKNOWLEDGMENT perspective on wireless sensor networks—A survey of requirements,
protocols, and challenges,” IEEE Commun. Surveys Tuts., vol. 16, no. 3,
The authors would like to thank Northumbria University, pp. 1391–1412, 3rd Quart., 2014.
U.K. and Capital University of Science and Technology, [20] IEEE Standard for Local and Metropolitan Area Networks—Part 15.4:
Low-Rate Wireless Personal Area Networks (LR-WPANs)
Pakistan for facilitating the collaborative research and provi- Amendment 1: MAC Sublayer, IEEE Standard 802.15.4e-2012,
sion of research facilities. pp. 1–225, 2012.
86 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

[21] IEEE Standard for Information Technology—Local and Metropolitan [43] I. Demirkol, C. Ersoy, and F. Alagoz, “MAC protocols for wireless
Area Networks—Specific Requirements—Part 15.4: Wireless Medium sensor networks: A survey,” IEEE Commun. Mag., vol. 44, no. 4,
Access Control (MAC) and Physical Layer (PHY) Specifications for pp. 115–121, Apr. 2006.
Low Rate Wireless Personal Area Networks (WPANs), IEEE Standard [44] A. Bachir, M. Dohler, T. Watteyne, and K. K. Leung, “MAC essentials
802.15.4-2006, pp. 1–320, 2006. for wireless sensor networks,” IEEE Commun. Surveys Tuts., vol. 12,
[22] IEEE Standard for Information Technology—Telecommunications and no. 2, pp. 222–248, 2nd Quart., 2010.
Information Exchange Between Systems—Local and Metropolitan Area [45] R. V. Prasad, S. Devasenapathy, V. S. Rao, and J. Vazifehdan,
Networks Specific Requirements Part 15.4: Wireless Medium Access “Reincarnation in the ambiance: Devices and networks with energy
Control (MAC) and Physical Layer (PHY) Specifications for Low- harvesting,” IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 195–213,
Rate Wireless Personal Area Networks (LR-WPANs), IEEE Standard 1st Quart., 2014.
802.15.4-2003, pp. 1–670, 2003. [46] M.-L. Ku, W. Li, Y. Chen, and K. J. R. Liu, “Advances in energy
[23] IEEE Standard for Local and Metropolitan Area Networks—Part 15.4: harvesting communications: Past, present, and future challenges,” IEEE
Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE Commun. Surveys Tuts., vol. 18, no. 2, pp. 1384–1412, 2nd Quart.,
Standard 802.15.4-2011, pp. 1–314, 2011. 2015.
[24] T. Zhong, M. Zhan, Z. Peng, and W. Hong, “Industrial wireless [47] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks
communication protocol WIA-PA and its interoperation with foun- with RF energy harvesting: A contemporary survey,” IEEE Commun.
dation fieldbus,” in Proc. Int. Conf. Comput. Design Appl. (ICCDA), Surveys Tuts., vol. 17, no. 2, pp. 757–789, 2nd Quart., 2015.
Qinhuangdao, China, 2010, pp. V4-370–V4-374. [48] C. R. Valenta and G. D. Durgin, “Harvesting wireless power: Survey
[25] K. Al Agha et al., “Which wireless technology for industrial wire- of energy-harvester conversion efficiency in far-field, wireless power
less sensor networks? The development of OCARI technology,” IEEE transfer systems,” IEEE Microw. Mag., vol. 15, no. 4, pp. 108–120,
Trans. Ind. Electron., vol. 56, no. 10, pp. 4266–4278, Oct. 2009. Jun. 2014.
[26] (2016). WirelessHART Overview, H. C. Foundation. [Online]. [49] K. Islam, W. Shen, and X. Wang, “Wireless sensor network reli-
Available: http://en.hartcomm.org/hcp/tech/wihart/wireless_ ability and security in factory automation: A survey,” IEEE Trans.
overview.html Syst., Man, Cybern. C, Appl. Rev., vol. 42, no. 6, pp. 1243–1256,
[27] (2016). 6loWPAN Active Drafts. [Online]. Available: Nov. 2012.
https://datatracker.ietf.org/doc/search/?name=6loWPAN&activeDrafts [50] P. Zand, S. Chatterjea, K. Das, and P. Havinga, “Wireless industrial
=on&rfcs=on monitoring and control networks: The journey so far and the road
[28] (2016). Utility Industry, The ZigBee Alliance. [Online]. Available: ahead,” J. Sensor Actuator Netw., vol. 1, no. 2, pp. 123–152, 2012.
http://www.zigbee.org/what-is-zigbee/utility-industry/ [51] L. Zheng, “Industrial wireless sensor networks and standardizations:
[29] (2016). ISA-100 Wireless Compliance Institute, ISA-100 Wireless The trend of wireless sensor networks for process autometion,” in Proc.
Compliance Institute-Official Site of ISA100 Wireless Standard. SICE Annu. Conf., Taipei, Taiwan, 2010, pp. 1187–1190.
[Online]. Available: http://www.isa100wci.org/ [52] L. F. M. de Moraes and R. S. Silva, “Analysis of multichannel wireless
networks with priority-based polling MAC protocols,” in Proc. IFIP
[30] T. Zheng, M. Gidlund, and J. Åkerberg, “WirArb: A new MAC protocol
Wireless Days (WD), Rio de Janeiro, Brazil, 2014, pp. 1–6.
for time critical industrial wireless sensor network applications,” IEEE
Sensors J., vol. 16, no. 7, pp. 2127–2139, Apr. 2016. [53] M. Zheng, J. Lin, W. Liang, and H. Yu, “A priority-aware fre-
quency domain polling MAC protocol for OFDMA-based networks
[31] C. Viehweger, T. Keutel, and O. Kanoun, “Energy harvesting for wire-
in cyber-physical systems,” IEEE/CAA J. Autom. Sinica, vol. 2, no. 4,
less sensor nodes in factory environments,” in Proc. 11th Int. Multi
pp. 412–421, Oct. 2015.
Conf. Syst. Signals Devices (SSD), Castelldefels, Spain, 2014, pp. 1–4.
[54] W. Shen, T. Zhang, F. Barac, and M. Gidlund, “PriorityMAC: A
[32] (Dec. 2015). Industrial Wireless Sensor Networks Market priority-enhanced MAC protocol for critical traffic in industrial wire-
Worth $944.92 Million by 2020. [Online]. Available: less sensor and actuator networks,” IEEE Trans. Ind. Informat., vol. 10,
http://www.marketsandmarkets.com/PressReleases/wireless-sensor- no. 1, pp. 824–835, Feb. 2014.
network.asp
[55] L. Hou and N. W. Bergmann, “System requirements for industrial wire-
[33] (Dec. 2015). Industrial Wireless Sensor Networks Market Worth less sensor networks,” in Proc. IEEE Conf. Emerg. Technol. Factory
$3.795 Billion by 2017. [Online]. Available: https://docs.zoho.com/ Autom. (ETFA), Bilbao, Spain, 2010, pp. 1–8.
printpdf.do?docId=yjvcr1e55cfc490b7464194dea2a78611eb68
[56] P. Neumann, “Communication in industrial automation—What is going
[34] F. Akhtar and M. H. Rehmani, “Energy replenishment using renewable on?” Control Eng. Pract., vol. 15, no. 11, pp. 1332–1347, 2007.
and traditional energy resources for sustainable wireless sensor net- [57] J. Xia, C. Zhang, R. Bai, and L. Xue, “Real-time and reliability anal-
works: A review,” Renew. Sustain. Energy Rev., vol. 45, pp. 769–784, ysis of time-triggered CAN-bus,” Chin. J. Aeronaut., vol. 26, no. 1,
May 2015. pp. 171–178, 2013.
[35] P. Huang, L. Xiao, S. Soltani, M. W. Mutka, and N. Xi, “The evolu- [58] J. A. Falco, J. D. Gilsinn, and K. A. Stouffer, “IT security for
tion of MAC protocols in wireless sensor networks: A survey,” IEEE industrial control systems: Requirements specification and performance
Commun. Surveys Tuts., vol. 15, no. 1, pp. 101–120, 1st Quart., 2013. testing,” in Proc. NDIA Homeland Security Symp. Exhibit., 2004,
[36] P. Baronti et al., “Wireless sensor networks: A survey on the state of pp. 1–15.
the art and the 802.15.4 and ZigBee standards,” Comput. Commun., [59] K. Stouffer, J. Falco, and K. Scarfone, Guide to Industrial Control
vol. 30, no. 7, pp. 1655–1695, 2007. Systems (ICS) Security, document 800.82, NIST, Gaithersburg, MD,
[37] P. Suriyachai, U. Roedig, and A. Scott, “A survey of MAC protocols USA, 2011, p. 16.
for mission-critical applications in wireless sensor networks,” IEEE [60] I. F. Akyildiz and M. C. Vuran, Wireless Sensor Networks, vol. 4.
Commun. Surveys Tuts., vol. 14, no. 2, pp. 240–264, 2nd Quart., 2012. New York, NY, USA: Wiley, 2010.
[38] S. Sudevalayam and P. Kulkarni, “Energy harvesting sensor nodes: [61] D. Kumar, T. C. Aseri, and R. B. Patel, “Multi-hop communication
Survey and implications,” IEEE Commun. Surveys Tuts., vol. 13, no. 3, routing (MCR) protocol for heterogeneous wireless sensor networks,”
pp. 443–461, 3rd Quart., 2011. Int. J. Inf. Technol. Commun. Converg., vol. 1, no. 2, pp. 130–145,
[39] G. Zhao, “Wireless sensor networks for industrial process monitor- 2011.
ing and control: A survey,” Netw. Protocols Algorithms, vol. 3, no. 1, [62] S. K. Vuppala, A. Ghosh, K. A. Patil, and K. Padmanabh, “A scalable
pp. 46–63, 2011. WSN based data center monitoring solution with probabilistic event
[40] M. Doudou, D. Djenouri, and N. Badache, “Survey on latency issues prediction,” in Proc. IEEE 26th Int. Conf. Adv. Inf. Netw. Appl. (AINA),
of asynchronous MAC protocols in delay-sensitive wireless sensor net- Fukuoka, Japan, 2012, pp. 446–453.
works,” IEEE Commun. Surveys Tuts., vol. 15, no. 2, pp. 528–550, [63] A. Salhieh, J. Weinmann, M. Kochhal, and L. Schwiebert, “Power
2nd Quart., 2013. efficient topologies for wireless sensor networks,” in Proc. Int. Conf.
[41] D. Christin, P. S. Mogre, and M. Hollick, “Survey on wireless sensor Parallel Process., Valencia, Spain, 2001, pp. 156–163.
network technologies for industrial automation: The security and qual- [64] J. Hwang, C. Shin, and H. Yoe, “Study on an agricultural environment
ity of service perspectives,” Future Internet, vol. 2, no. 2, pp. 96–125, monitoring server system using wireless sensor networks,” Sensors,
2010. vol. 10, no. 12, pp. 11189–11211, 2010.
[42] A. Flammini, P. Ferrari, D. Marioli, E. Sisinni, and A. Taroni, [65] P. T. A. Quang and D.-S. Kim, “Enhancing real-time delivery of gradi-
“Wired and wireless sensor networks for industrial applications,” ent routing for industrial wireless sensor networks,” IEEE Trans. Ind.
Microelectron. J., vol. 40, no. 9, pp. 1322–1336, 2009. Informat., vol. 8, no. 1, pp. 61–68, Feb. 2012.
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 87

[66] W.-B. Pöttner, H. Seidel, J. Brown, U. Roedig, and L. Wolf, [92] Z. Pang, K. Yu, J. Åkerberg, and M. Gidlund, “An RTOS-
“Constructing schedules for time-critical data delivery in wireless based architecture for industrial wireless sensor network stacks with
sensor networks,” ACM Trans. Sensor Netw., vol. 10, no. 3, 2014, multi-processor support,” in Proc. IEEE Int. Conf. Ind. Technol. (ICIT),
Art. no. 44. Cape Town, South Africa, 2013, pp. 1216–1221.
[67] G. P. Hancke and V. C. Gungor, “Guest editorial special section [93] M. F. Khan, E. A. Felemban, S. Qaisar, and S. Ali, “Performance anal-
on industrial wireless sensor networks,” IEEE Trans. Ind. Informat., ysis on packet delivery ratio and end-to-end delay of different network
vol. 10, no. 1, pp. 762–765, Feb. 2014. topologies in wireless sensor networks (WSNs),” in Proc. IEEE 9th
[68] M. Erol-Kantarci and H. T. Mouftah, “Wireless multimedia sensor and Int. Conf. Mobile Ad Hoc Sensor Netw. (MSN), Dalian, China, 2013,
actor networks for the next generation power grid,” Ad Hoc Netw., pp. 324–329.
vol. 9, no. 4, pp. 542–551, 2011. [94] T. Instruments, What Is a Wireless Sensor Network, White Paper, 2012.
[69] (2015). Applications of Industrial Plant 3D Laser Scanning [95] T. O’donovan et al., “The GINSENG system for wireless monitoring
and Modeling. [Online]. Available: http://www.geomapres.com/ and control: Design and deployment experiences,” ACM Trans. Sensor
industry/engineering-verticals/ Netw., vol. 10, no. 1, pp. 1–40, 2013.
[70] J. Slipp et al., “WINTeR: Architecture and applications of a wire- [96] T.-L. Pham and D.-S. Kim, “Lossy link-aware routing algo-
less industrial sensor network testbed for radio-harsh environments,” in rithm for ISA100.11a wireless networks,” in Proc. 11th IEEE
Proc. 6th Annu. Res. Conf. Commun. Netw. Services (CNSR), Halifax, Int. Conf. Ind. Informat. (INDIN), Bochum, Germany, 2013,
NS, Canada, 2008, pp. 422–431. pp. 624–629.
[71] M. Wehner et al., “A trustworthy architecture for wireless industrial [97] W. Guo, W. M. Healy, and M. Zhou, “Impacts of 2.4-GHz ISM band
sensor networks: Research roadmap of EU TWISNet trust and secu- interference on IEEE 802.15.4 wireless sensor network reliability in
rity project,” in Proc. SysSec Workshop, Amsterdam, The Netherlands, buildings,” IEEE Trans. Instrum. Meas., vol. 61, no. 9, pp. 2533–2544,
2011, pp. 63–66. Sep. 2012.
[72] P. Gaj, J. Jasperneite, and M. Felser, “Computer communication [98] S. S. Rizvi and T.-S. Chung, “A survey of storage management in
within industrial distributed environment—A survey,” IEEE Trans. Ind. flash based data centric sensor devices in wireless sensor networks,” in
Informat., vol. 9, no. 1, pp. 182–189, Feb. 2013. Proc. 2nd Int. Conf. Commun. Syst. Netw. Appl. (ICCSNA), Hong Kong,
[73] T. Sauter, “The three generations of field-level networks—Evolution 2010, p. 1.
and compatibility issues,” IEEE Trans. Ind. Electron., vol. 57, no. 11, [99] M. Raza, G. Ahmed, N. M. Khan, M. Awais, and Q. Badar, “A com-
pp. 3585–3595, Nov. 2010. parative analysis of energy-aware routing protocols in wireless sensor
[74] J. Garcia et al., “Reconfigurable distributed network control system for networks,” in Proc. Int. Conf. Inf. Commun. Technol. (ICICT), Karachi,
industrial plant automation,” IEEE Trans. Ind. Electron., vol. 51, no. 6, Pakistan, 2011, pp. 1–5.
pp. 1168–1180, Dec. 2004.
[100] M. Li, J. Long, J. Yin, Y. Wu, and J. Cheng, “An efficient key
[75] M. Bertoluzzo, G. Buja, and S. Vitturi, “Ethernet networks for factory management based on dynamic generation of polynomials for het-
automation,” in Proc. IEEE Int. Symp. Ind. Electron., vol. 1. L’Aquila, erogeneous sensor networks,” in Proc. 2nd Int. Conf. Comput. Eng.
Italy, 2002, pp. 175–180. Technol. (ICCET), Chengdu, China, 2010, pp. V5-460–V5-464.
[76] M. Felser, “Real time Ethernet: Standardization and implementations,”
[101] F. Dobslaw, T. Zhang, and M. Gidlund, “End-to-end reliability-aware
in Proc. IEEE Int. Symp. Ind. Electron. (ISIE), Bari, Italy, 2010,
scheduling for wireless sensor networks,” IEEE Trans. Ind. Informat.,
pp. 3766–3771.
vol. 12, no. 2, pp. 758–767, Apr. 2016.
[77] J. C. Eidson and K. Lee, “Sharing a common sense of time,” IEEE
Instrum. Meas. Mag., vol. 6, no. 1, pp. 26–32, Mar. 2003. [102] M. Raza, G. Ahmed, and N. M. Khan, “Experimental evaluation of
transmission power control strategies in wireless sensor networks,”
[78] S.-L. Jämsä-Jounela, “Future trends in process automation,” Annu. Rev.
in Proc. IEEE Int. Conf. Emerg. Technol., Islamabad, Pakistan, 2012,
Control, vol. 31, no. 2, pp. 211–220, 2007.
pp. 1–4, doi: 10.1109/ICET.2012.6375498.
[79] D. Greenfield, Industrial Networks: Wired and Wireless,
AutomationWorld, Chicago, IL, USA, Nov. 2013. [103] W. Ikram, S. Petersen, P. Orten, and N. F. Thornhill, “Adaptive
multi-channel transmission power control for industrial wireless instru-
[80] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A
mentation,” IEEE Trans. Ind. Informat., vol. 10, no. 2, pp. 978–990,
survey on sensor networks,” IEEE Commun. Mag., vol. 40, no. 8,
May 2014.
pp. 102–114, Aug. 2002.
[81] S. Petersen and S. Carlsen, “WirelessHART versus ISA100.11a: The [104] A. ur Rehman Khan, S. A. Madani, K. Hayat, and S. U. Khan,
format war hits the factory floor,” IEEE Ind. Electron. Mag., vol. 5, “Clustering-based power-controlled routing for mobile wireless sensor
no. 4, pp. 23–34, Dec. 2011. networks,” Int. J. Commun. Syst., vol. 25, no. 4, pp. 529–542, 2012.
[82] P. Danielis et al., “Survey on real-time communication via Ethernet in [105] M. Raza, G. Ahmed, and N. M. Khan, “Power control-based GRACE
industrial automation environments,” in Proc. IEEE Emerg. Technol. (PC-GRACE) routing protocol for wireless sensor networks,” J. Netw.
Factory Autom. (ETFA), Barcelona, Spain, 2014, pp. 1–8. Technol., vol. 5, no. 4, pp. 137–144, 2014.
[83] J.-D. Decotignie, “The many faces of industrial Ethernet [past [106] M. Raza, G. Ahmed, and N. M. Khan, “Experimental evaluation of
and present],” IEEE Ind. Electron. Mag., vol. 3, no. 1, pp. 8–19, transmission power control strategies in wireless sensor networks,” in
Mar. 2009. Proc. Int. Conf. Emerg. Technol. (ICET), Islamabad, Pakistan, 2012,
[84] G. Tapperson and T. A. Boyd, “Apparatus for providing non-redundant pp. 1–4.
secondary access to field devices in a distributed control system,” [107] K. Yu, M. Gidlund, J. Åkerberg, and M. Björkman, “Reliable real-time
Google Patents, US 5 793 963 A, 1998. routing protocol for industrial wireless sensor and actuator networks,”
[85] P. S. Hoon, Y. R. Huan, J. Berge, and B. Sim, “FoundationTM in Proc. 8th IEEE Conf. Ind. Electron. Appl. (ICIEA), Melbourne, VIC,
fieldbus high speed Ethernet (HSE) implementation,” in Proc. Australia, 2013, pp. 1895–1901.
IEEE Int. Symp. Intell. Control, Vancouver, BC, Canada, 2002, [108] K. Yu, Z. Pang, M. Gidlund, J. Akerberg, and M. Björkman,
pp. 777–782. “REALFLOW: Reliable real-time flooding-based routing protocol for
[86] K. D. Krivoshein, “Process control configuration system for use with industrial wireless sensor networks,” Int. J. Distrib. Sensor Netw.,
a profibus device network,” Google Patents, US 6 449 715 B1, 2002. vol. 10, p. 17, Jan. 2014.
[87] G. Prytz, “A performance analysis of EtherCAT and PROFINET IRT,” [109] F. Barać, M. Gidlund, and T. Zhang, “Ubiquitous, yet deceptive:
in Proc. IEEE Int. Conf. Emerg. Technol. Factory Autom. (ETFA), Hardware-based channel metrics on interfered WSN links,” IEEE
Hamburg, Germany, 2008, pp. 408–415. Trans. Veh. Technol., vol. 64, no. 5, pp. 1766–1778, May 2015.
[88] M. Felser, “Real-time Ethernet—Industry prospective,” Proc. IEEE, [110] G. Anastasi, M. Conti, and M. Di Francesco, “Extending the lifetime
vol. 93, no. 6, pp. 1118–1129, Jun. 2005. of wireless sensor networks through adaptive sleep,” IEEE Trans. Ind.
[89] M. J. Miller and N. H. Vaidya, “A MAC protocol to reduce sensor net- Informat., vol. 5, no. 3, pp. 351–365, Aug. 2009.
work energy consumption using a wakeup radio,” IEEE Trans. Mobile [111] A. J. Banu and R. Velayutham, “Secure communication in wire-
Comput., vol. 4, no. 3, pp. 228–242, May/Jun. 2005. less sensor networks using AES algorithm with delay efficient sleep
[90] L. Gu and J. A. Stankovic, “Radio-triggered wake-up capability for scheduling,” in Proc. Int. Conf. Emerg. Trends Comput. Commun.
sensor networks,” in Proc. IEEE Real Time Embedded Technol. Appl. Nanotechnol. (ICE-CCN), Tirunelveli, India, 2013, pp. 706–711.
Symp., Toronto, ON, Canada, 2004, pp. 27–36. [112] M. B. Llado, A. C. Vila, J. Lo Vetere, and A. M. Perez, “Cooperative
[91] S. Ji, Y. Li, and X. Jia, “Capacity of dual-radio multi-channel wire- multi-tree sleep scheduling for surveillance in wireless sensor net-
less sensor networks for continuous data collection,” in Proc. IEEE works,” in Proc. IEEE Mil. Commun. Conf. (MILCOM), San Diego,
INFOCOM, Shanghai, China, 2011, pp. 1062–1070. CA, USA, 2013, pp. 200–205.
88 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

[113] D. Diongue and O. Thiare, “ALARM: An energy aware sleep schedul- [131] V. Abinayaa and A. Jayan, “Case study on comparison of wireless
ing algorithm for lifetime maximization in wireless sensor networks,” technologies in industrial applications,” Int. J. Sci. Res. Publ., vol. 4,
in Proc. IEEE Symp. Wireless Technol. Appl. (ISWTA), Kuching, no. 2, pp. 1–4, 2014.
Malaysia, 2013, pp. 74–79. [132] M. Ehrlich, L. Wisniewski, and J. Jasperneite, “State of the art and
[114] J. H. Yoo and H. J. Kim, “Predictive target detection and sleep schedul- future applications of industrial wireless sensor networks,” in Proc.
ing for wireless sensor networks,” in Proc. IEEE Int. Conf. Syst. Man Kommunikation der Autom. (KommA), 2016, pp. 80–87.
Cybern. (SMC), Manchester, U.K., 2013, pp. 362–367. [133] C.-Z. Yang, C.-C. Chung, and C.-T. Lin, “On scatternet forma-
[115] P. Guo, T. Jiang, Q. Zhang, and K. Zhang, “Sleep scheduling for critical tion in Bluetooth networks using fuzzy logic,” in Proc. IEEE
event monitoring in wireless sensor networks,” IEEE Trans. Parallel Wireless Commun. Netw. Conf., Kowloon, China, 2007, pp. 3141–3146,
Distrib. Syst., vol. 23, no. 2, pp. 345–352, Feb. 2012. doi: 10.1109/WCNC.2007.580.
[116] L. Xueyan, C. Hongbin, Z. Feng, and L. Xiaohuan, “A range-based [134] P. Rawat, K. D. Singh, H. Chaouchi, and J. M. Bonnin, “Wireless sensor
sleep scheduling algorithm for desired area coverage in solar-powered networks: A survey on recent developments and potential synergies,”
wireless sensor networks,” in Proc. 6th Int. Conf. Wireless Commun. J. Supercomput., vol. 68, no. 1, pp. 1–48, 2014.
Signal Process. (WCSP), Hefei, China, 2014, pp. 1–6. [135] S. Promwong, B. Rankhamrat, T. Thavonsassanavong, and
[117] K. Jaffrès-Runser, C. Comaniciu, J.-M. Gorce, and R. Zhang, S. Chaiyapong, “Ultra wireless transmission waveform measure-
“U-GRAB: A utility-based gradient broadcasting algorithm for wire- ment with IEEE802.15.3a,” in Proc. 13th Int. Symp. Commun.
less sensor networks,” in Proc. IEEE Mil. Commun. Conf. (MILCOM), Inf. Technol. (ISCIT), Surat Thani, Thailand, 2013, pp. 647–651,
Boston, MA, USA, 2009, pp. 1–7. doi: 10.1109/ISCIT.2013.6645941.
[118] F. Ye, G. Zhong, S. Lu, and L. Zhang, “Gradient broadcast: A robust [136] S. Kato et al., “Single carrier transmission for multi-gigabit
data delivery protocol for large scale sensor networks,” Wireless Netw., 60-GHz WPAN systems,” IEEE J. Sel. Areas Commun., vol. 27, no. 8,
vol. 11, no. 3, pp. 285–298, 2005. pp. 1466–1478, Oct. 2009, doi: 10.1109/JSAC.2009.091016.
[119] H. W. Lin, L. Zhang, X. Hao, and T. Murata, “A wireless sensor [137] (2016). WirelessHART, HartComm Foundation. [Online]. Available:
network topology design method based on negotiable evolutionary http://en.hartcomm.org/main_article/wirelesshart.html
algorithm,” in Proc. 6th Int. Conf. Genet. Evol. Comput. (ICGEC), [138] F. Labeau, A. Agarwal, and B. Agba, “Comparative study of wireless
Kitakyushu, Japan, 2012, pp. 207–210. sensor network standards for application in electrical substations,” in
[120] M. Sultana, S. R. Mahmud, L. Ansari, and N. A. Khan, “Delaunay Proc. Int. Conf. Comput. Commun. Security (ICCCS), 2015, pp. 1–5.
triangulation and st-numbering in wireless sensor network topology,” in [139] G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, Transmission of
Proc. Int. Conf. Elect. Eng. Inf. Commun. Technol. (ICEEICT), Dhaka, IPv6 Packets Over IEEE 802.15.4 Networks, Internet Eng. Task Force,
Bangladesh, 2014, pp. 1–7. Fremont, CA, USA, 2007.
[121] I. Bahaddur, C. L. Triveni, and P. C. Srikanth, “Novel defense mech- [140] Z. Shelby and C. Bormann, 6LoWPAN: The Wireless Embedded
anism against data flooding attacks in ad hoc network,” in Proc. 4th Internet, vol. 43. New York, NY, USA: Wiley, 2011.
Int. Conf. Comput. Commun. Netw. Technol. (ICCCNT), Tiruchengode, [141] (2012). Zigbee PRO, Zigbee Alliance. [Online]. Available:
India, 2013, pp. 1–6. http://www.zigbee.org/zigbee-for-developers/network-
[122] A. Moh’d, N. Aslam, W. Phillips, and W. Robertson, “A dual-mode specifications/zigbeepro/
energy efficient encryption protocol for wireless sensor networks,” Ad [142] X. Zhang and K. G. Shin, “Enabling coexistence of heterogeneous
Hoc Netw., vol. 11, no. 8, pp. 2588–2604, 2013. wireless systems: Case for ZigBee and WiFi,” in Proc. 12th ACM Int.
[123] A. Moh’d, N. Aslam, W. Phillips, W. Robertson, and H. Marzi, “SN- Symp. Mobile Ad Hoc Netw. Comput., Paris, France, 2011, Art. no. 6.
SEC: A secure wireless sensor platform with hardware cryptographic [143] S. Lin, J. Liu, and Y. Fang, “ZigBee based wireless sensor networks
primitives,” Pers. Ubiquitous Comput., vol. 17, no. 5, pp. 1051–1059, and its applications in industrial,” in Proc. IEEE Int. Conf. Autom.
2013. Logistics, Jinan, China, 2007, pp. 1979–1983.
[124] ISO/IEC/IEEE International Standard—Information Technology— [144] ISA100.11a Historical Background, 6LoWPAN. Accessed: Apr. 2016.
Telecommunications and Information Exchange Between [Online]. Available: https://www.isa.org/store/products/product-
Systems—Local and Metropolitan Area Networks—Specific detail/?productId=118261, http://orbigo.net/2011/06/6lowpan-third-
Requirements— Part 11: Wireless LAN Medium Access Control (MAC) part-history-of-the-standard/?ckattempt=1
and Physical Layer (PHY) Specifications AMENDMENT 4, [145] (2008). WirelessHART, IEC Approval. [Online]. Available:
ISO/IEC/IEEE Standard 8802-11:2012/Amd.4:2015(E), pp. 1–430, http://hartcomm.org/hcf/news/pr2010/WirelessHART_approved_by
2015. _IEC.html
[125] Z. Shah, S. Rau, and A. Baig, “Throughput comparison of IEEE [146] (2015). IETF 6LoWPAN, Work Group Approval. [Online].
802.11ac and IEEE 802.11n in an indoor environment with interfer- Available: http://orbigo.net/2011/06/6lowpan-third-part-history-of-
ence,” in Proc. Int. Telecommun. Netw. Appl. Conf. (ITNAC), Sydney, the-standard/?ckattempt=1
NSW, Australia, 2015, pp. 196–201. [147] (2015). IWSN Global Market Stats. [Online]. Available:
[126] IEEE Standard for Information Technology—Telecommunications and http://www.prnewswire.com/news-releases/wireless-sensors-
Information Exchange Between Systems—Local and Metropolitan Area technologies-and-global-markets-300085922.html
Networks—Specific Requirements Part 11: Wireless LAN Medium [148] V. C. Gungor and G. P. Hancke, Industrial Wireless Sensor Networks:
Access Control (MAC) and Physical Layer (PHY) Specifications Applications, Protocols, and Standards. Boca Raton, FL, USA: CRC
Amendment 10: Mesh Networking, IEEE Standard 802.11s-2011, Press, 2013.
pp. 1–372, 2011. [149] LTC5800-WHM SmartMesh WirelessHART Node Wireless Mote
[127] IEEE Draft Supplement to Standard [for] Information Technology- Datasheet, DustNetworks, Hayward, CA, USA, 2013.
Telecommunications and Information Exchange Between Systems-Local [150] LTP5900-WHM SmartMesh WirelessHART Node Wireless Mote
and Metropolitan Area Networks-Specific Requirements—Part 11: Datasheet, DustNetworks, Hayward, CA, USA, 2014.
Wireless LAN Medium Access Control (MAC) and Physical [151] Thread Networking Protocol, NXP, Eindhoven, The Netherlands, 2016.
Layer (PHY) SpecifiCations: Supplement to IEEE Std 802.11-1999, [152] Kinetis KW2x Wireless MCUs Datasheet, NXP, Eindhoven,
IEEE Standard P802.11a/D7, p. 1, 1999. The Netherlands, 2015.
[128] IEEE Standard for Information Technology—Telecommunications and [153] JN517x, IEEE802.15.4 Wireless Microcontroller Datasheet, NXP,
Information Exchange Between Systems-Local and Metropolitan Area Eindhoven, The Netherlands, Nov. 2016.
Networks-Specific Requirements-Part 11: Wireless LAN Medium Access [154] EM35x System-on-Chip (SoC)/Network Co-Processor (NCP) for
Control (MAC) and Physical Layer (PHY) Specifications, IEEE ZigBee Datasheet, SiliconLabs, Austin, TX, USA, 2013.
Standard 802.11-1997, 1997. [155] OpenMote Devices, OpenMote, Granollers, Spain, Dec. 2016. [Online].
[129] IEEE Standard for Information Technology—Local and Metropolitan Available: http://www.openmote.com/
Area Networks—Specific Requirements—Part 15.1a: Wireless Medium [156] CC2538 Powerful Wireless Microcontroller System-on-Chip for
Access Control (MAC) and Physical Layer (PHY) Specifications for 2.4-GHz IEEE 802.15.4, 6LoWPAN, and ZigBee, Texas Instrum.,
Wireless Personal Area Networks (WPAN), IEEE Standard 802.15.1- Dallas, TX, USA, Apr. 2015.
2005, pp. 1–700, 2005. [157] RE-Mote. (2016). Zolertia Systems. [Online]. Available:
[130] J.-S. Lee, Y.-W. Su, and C.-C. Shen, “A comparative study of wire- http://zolertia.io/product/hardware/re-mote
less protocols: Bluetooth, UWB, ZigBee, and Wi-Fi,” in Proc. 33rd [158] CC1200 Low-Power, High-Performance RF Transceiver, Texas
Annu. Conf. IEEE Ind. Electron. Soc. (IECON), Taipei, Taiwan, 2007, Instrum., Dallas, TX, USA, Oct. 2014.
pp. 46–51, doi: 10.1109/IECON.2007.4460126. [159] (2016). Z1, Zolertia Systems. [Online]. Available: http://zolertia.io/z1
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 89

[160] XYR 6000 Wireless Input Transmitter Datasheet, Honeywell, [192] B.-Y. Shih, C.-J. Chang, A.-W. Chen, and C.-Y. Chen, “Enhanced MAC
Morris Plains, NJ, USA, 2010. channel selection to improve performance of IEEE 802.15.4,” Int. J.
[161] RN1810/RN1810E, 2.4 GHz IEEE 802.11b/g/n Wireless Module Innov. Comput. Inf. Control, vol. 6, no. 12, pp. 5511–5526, 2010.
Datasheet, Microchip, Chandler, AZ, USA, 2016. [193] M. D. Francesco, G. Anastasi, M. Conti, S. K. Das, and V. Neri,
[162] R. Kling, R. Adler, J. Huang, V. Hummel, and L. Nachman, “Intel “Reliability and energy-efficiency in IEEE 802.15.4/ZigBee sensor net-
mote: Sensor network technology for industrial applications,” in Proc. works: An adaptive and cross-layer approach,” IEEE J. Sel. Areas
SPOTS (IPSN), 2005, pp. 1–2. Commun., vol. 29, no. 8, pp. 1508–1524, Sep. 2011.
[163] Imote2, High-performance Wireless Sensor Network Node Datasheet, [194] S.-E. Yoo et al., “Guaranteeing real-time services for industrial wire-
Crossbow, San Jose, CA, USA, 2005. less sensor networks with IEEE 802.15.4,” IEEE Trans. Ind. Electron.,
[164] R. P. Narayanan, T. V. Sarath, and V. V. Vineeth, “Survey on motes vol. 57, no. 11, pp. 3868–3876, Nov. 2010.
used in wireless sensor networks: Performance & parametric analysis,” [195] N. Marchenko, T. Andre, G. Brandner, W. Masood, and C. Bettstetter,
Wireless Sensor Netw., vol. 8, no. 4, pp. 51–67, 2016. “An experimental study of selective cooperative relaying in industrial
[165] (2016). New Generation of Waspmote Sensor Nodes, Libelium. wireless sensor networks,” IEEE Trans. Ind. Informat., vol. 10, no. 3,
[Online]. Available: http://www.libelium.com/libelium-launches-new- pp. 1806–1816, Aug. 2014.
generation-of-waspmote-sensor-nodes/ [196] S. C. Ergen and P. Varaiya, “TDMA scheduling algorithms for wireless
[166] (2016). PD Marketing, Willow Technologies. [Online]. Available: sensor networks,” Wireless Netw., vol. 16, no. 4, pp. 985–997, 2010.
http://www.willow.co.uk/html/telosb_mote_platform.php [197] W. Shen, T. Zhang, M. Gidlund, and F. Dobslaw, “SAS-TDMA:
[167] Wireless Sensor Networks, MEMSIC Inc., Andover, MA, USA, 2016. A source aware scheduling algorithm for real-time communication in
[Online]. Available: http://www.memsic.com/wireless-sensor-networks/ industrial wireless sensor networks,” Wireless Netw., vol. 19, no. 6,
[168] (2016). SunSPOT Sensor Motes, SunSPOTWorld. [Online]. Available: pp. 1155–1170, 2013.
http://sunspotdev.org/ [198] M. Yan et al., “Hypergraph-based data link layer scheduling for reliable
[169] Digi Product Details, Digi Int., Minnetonka, MN, USA, 2016. [Online]. packet delivery in wireless sensing and control networks with end-to-
Available: http://www.digi.com/support/productdetail?pid=4357 end delay constraints,” Inf. Sci., vol. 278, pp. 34–55, Sep. 2014.
[170] (2016). JN5139-Z01-M/00R1T, NXP Semiconductors RF/IF and RFID. [199] C.-L. Chang and K.-Y. Ho, “Slot assignment for TDMA MAC in indus-
[Online]. Available: http://www.digikey.com/product-detail/en/JN5139- trial wireless sensor network,” in Proc. IEEE/ACIS 15th Int. Conf.
Z01-M%2F00R1T/616-1029-1-ND/1307268 Comput. Inf. Sci. (ICIS), Okayama, Japan, 2016, pp. 1–5.
[171] CC2480 2.4 GHz Zigbee Radio Datasheet, Texas Instrum., Dallas, TX, [200] L. F. W. Van Hoesel and P. J. M. Havinga, “A lightweight medium
USA, 2015. access protocol (LMAC) for wireless sensor networks: Reducing
[172] CC2420, 2.4 GHz IEEE 802.15.4/ZigBee-Ready RF Transceiver preamble transmissions and transceiver state switches,” presented at
Datasheet, Texas Instrum., Dallas, TX, USA, 2014. the 1st Int. Workshop Netw. Sens. Syst. (INSS), Tokyo, Japan, 2004,
[173] CC1000, Single Chip Very Low Power RF Transceiver Datasheet, Texas pp. 205–208.
Instrum., Dallas, TX, USA, 2009. [201] M. J. Handy, M. Haase, and D. Timmermann, “Low energy adap-
[174] nRF905, Sub 1-GHz RF Ultra Low Power Single Chip tive clustering hierarchy with deterministic cluster-head selection,” in
433/868/915 MHz Transceiver Datasheet, Nordic Semicond., Proc. 4th Int. Workshop Mobile Wireless Commun. Netw., Stockholm,
Trondheim, Norway, Jun. 2004. Sweden, 2002, pp. 368–372.
[175] (Dec. 2015). Emerson Technologies. [Online]. Available: [202] V. Namboodiri and A. Keshavarzian, “Alert: An adaptive low-latency
http://www.emersonindustrial.com/en-US/industries/Pages/industries. event-driven MAC protocol for wireless sensor networks,” in Proc. 7th
aspx Int. Conf. Inf. Process. Sensor Netw., St. Louis, MO, USA, 2008,
[176] (Dec. 2015). GE Industrial. [Online]. Available: http:// pp. 159–170.
www.geindustrial.com/products [203] J. Zhao, Y. Qin, D. Yang, and Y. Rao, “A source aware scheduling
[177] (Dec. 2015). ABB. [Online]. Available: http://www.abb.com/ algorithm for time-optimal convergecast,” Int. J. Distrib. Sensor Netw.,
ProductGuide/Alphabetical.aspx vol. 2014, pp. 1–12, Jan. 2014.
[178] (Dec. 2015). ENDRESS. [Online]. Available: http://www.uk. [204] J. Chen et al., “Dynamic channel assignment for wireless sensor
endress.com/en networks: A regret matching based approach,” IEEE Trans. Parallel
[179] (Dec. 2015). Siemens. [Online]. Available: http://www.siemens. Distrib. Syst., vol. 26, no. 1, pp. 95–106, Jan. 2015.
co.uk/entry/en/ [205] B. Andersson et al., “A scalable and efficient approach for obtain-
[180] (Dec. 2015). Yokogawa. [Online]. Available: http://www.yokogawa. ing measurements in CAN-based control systems,” IEEE Trans. Ind.
com/ Informat., vol. 4, no. 2, pp. 80–91, May 2008.
[181] (Dec. 2015). Yamatake. [Online]. Available: http://www.yamatake.co/ [206] C. Schurgers, V. Tsiatsis, S. Ganeriwal, and M. Srivastava, “Optimizing
[182] (Dec. 2015). Invensys. [Online]. Available: http://iom.invensys.com/ sensor networks in the energy-latency-density design space,” IEEE
EN/pages/home.aspx Trans. Mobile Comput., vol. 99, no. 1, pp. 70–80, Jan./Mar. 2002.
[183] (Dec. 2015). Mitsubishi Corporation. [Online]. Available: [207] L. Tang, Y. Sun, O. Gurewitz, and D. B. Johnson, “PW-MAC: An
http://www.mitsubishicorp.com/jp/en/index.html energy-efficient predictive-wakeup MAC protocol for wireless sen-
[184] (Dec. 2015). Honeywell. [Online]. Available: https://honeywell. sor networks,” in Proc. IEEE INFOCOM, Shanghai, China, 2011,
com/Pages/Home.aspx pp. 1305–1313.
[185] P. Naik and K. M. Sivalingam, “A survey of MAC protocols for sensor [208] M. C. Vuran and I. F. Akyildiz, “Spatial correlation-based collaborative
networks,” in Wireless Sensor Networks. Norwell, MA, USA: Kluwer medium access control in wireless sensor networks,” IEEE/ACM Trans.
Acad., 2004, pp. 93–107. Netw., vol. 14, no. 2, pp. 316–329, Apr. 2006.
[186] A. Roy and N. Sarma, “Energy saving in MAC layer of wireless [209] J. Polastre, J. Hill, and D. Culler, “Versatile low power media access
sensor networks: A survey,” in Proc. Nat. Workshop Design Anal. for wireless sensor networks,” in Proc. 2nd Int. Conf. Embedded Netw.
Algorithm (NWDAA), 2010, pp. 1–16. Sensor Syst., Baltimore, MD, USA, 2004, pp. 95–107.
[187] K. Kredo, II, and P. Mohapatra, “Medium access control in wireless [210] X. Shi and G. Stromberg, “SyncWUF: An ultra low-power MAC proto-
sensor networks,” Comput. Netw., vol. 51, no. 4, pp. 961–994, 2007. col for wireless sensor networks,” IEEE Trans. Mobile Comput., vol. 6,
[188] K. Langendoen, “Medium access control in wireless sensor networks,” no. 1, pp. 115–125, Jan. 2007.
in Medium Access Control in Wireless Networks, vol. 2. New York, [211] J. Ansari, X. Zhang, and P. Mähönen, “Poster abstract: Traffic aware
NY, USA: Nova Sci., 2008, pp. 535–560. medium access control protocol for wireless sensor networks,” in
[189] G. Anastasi, M. Conti, and M. Di Francesco, “A comprehensive anal- Proc. 3rd Eur. Conf. Comput. Syst. (EuroSys), 2008, pp. 1–2.
ysis of the MAC unreliability problem in IEEE 802.15.4 wireless [212] E.-Y. A. Lin, J. M. Rabaey, and A. Wolisz, “Power-efficient rendez-
sensor networks,” IEEE Trans. Ind. Informat., vol. 7, no. 1, pp. 52–65, vous schemes for dense wireless sensor networks,” in Proc. IEEE Int.
Feb. 2011. Conf. Commun., Paris, France, 2004, pp. 3769–3776.
[190] P. Park, P. Di Marco, C. Fischione, and K. H. Johansson, “Modeling [213] W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC pro-
and optimization of the IEEE 802.15.4 protocol for reliable and timely tocol for wireless sensor networks,” in Proc. IEEE 21st Annu. Joint
communications,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 3, Conf. Comput. Commun. Soc. (INFOCOM), New York, NY, USA,
pp. 550–564, Mar. 2013. 2002, pp. 1567–1576.
[191] S. He et al., “Maintaining quality of sensing with actors in wireless [214] P. Lin, C. Qiao, and X. Wang, “Medium access control with a dynamic
sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 9, duty cycle for sensor networks,” in Proc. IEEE Wireless Commun.
pp. 1657–1667, Sep. 2012. Netw. Conf. (WCNC), Atlanta, GA, USA, 2004, pp. 1534–1539.
90 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

[215] L. Bao and J. J. Garcia-Luna-Aceves, “A new approach to channel [236] M. Adamou, I. Lee, and I. Shin, “An energy efficient real-time medium
access scheduling for ad hoc networks,” in Proc. 7th Annu. Int. Conf. access control protocol for wireless ad-hoc networks,” in Proc. WIP
Mobile Comput. Netw., Rome, Italy, 2001, pp. 210–221. Session IEEE Real Time Syst. Symp. (RTSS), London, U.K., Dec. 2001,
[216] B. Yahya and J. Ben-Othman, “An energy efficient hybrid medium pp. 5–8.
access control scheme for wireless sensor networks with qual- [237] H. Wang, X. Zhang, and A. Khokhar, “WSN05-6: An energy-efficient
ity of service guarantees,” in Proc. IEEE Glob. Telecommun. low-latency MAC protocol for wireless sensor networks,” in Proc. IEEE
Conf. (GLOBECOM), New Orleans, LO, USA, 2008, pp. 1–5. Globecom, San Francisco, CA, USA, 2006, pp. 1–5.
[217] G. Zhou et al., “MMSN: Multi-frequency media access control for [238] S. Biaz and Y. D. Barowski, “‘GANGS’: An energy efficient MAC
wireless sensor networks,” in Proc. INFOCOM, Barcelona, Spain, protocol for sensor networks,” in Proc. 42nd Annu. Southeast Reg.
2006, pp. 1–13. Conf., Huntsville, AL, USA, 2004, pp. 82–87.
[218] Y. Wu, J. A. Stankovic, T. He, and S. Lin, “Realistic and effi- [239] Z. Liu, D. Dragomirescu, G. D. Costa, and T. Monteil, “Dynamic
cient multi-channel communications in wireless sensor networks,” in multi-channel allocation mechanism for wireless multimedia sensor
Proc. 27th Conf. Comput. Commun. (INFOCOM), Phoenix, AZ, USA, networks,” in Proc. Wireless Days (WD), Toulouse, France, 2016,
2008, pp. 211–222. pp. 1–6.
[219] Y. Kim, H. Shin, and H. Cha, “Y-MAC: An energy-efficient [240] N. Nasser, L. Karim, and T. Taleb, “Dynamic multilevel priority packet
multi-channel MAC protocol for dense wireless sensor networks,” in scheduling scheme for wireless sensor network,” IEEE Trans. Wireless
Proc. 7th Int. Conf. Inf. Process. Sensor Netw., St. Louis, MO, USA, Commun., vol. 12, no. 4, pp. 1448–1459, Apr. 2013.
2008, pp. 53–63. [241] K.-H. Phung et al., “Schedule-based multi-channel communication
[220] M. Salajegheh, H. Soroush, and A. Kalis, “HYMAC: Hybrid in wireless sensor networks: A complete design and performance
TDMA/FDMA medium access control protocol for wireless sensor evaluation,” Ad Hoc Netw., vol. 26, pp. 88–102, 2015.
networks,” in Proc. IEEE 18th Int. Symp. Pers. Indoor Mobile Radio [242] W.-C. Jeong and J. Lee, “Performance evaluation of IEEE 802.15.4e
Commun., Athens, Greece, 2007, pp. 1–5. DSME MAC protocol for wireless sensor networks,” in Proc. 1st IEEE
[221] J. Lin, W. Liang, H. Yu, and Y. Xiao, “Polling in the frequency Workshop Enabling Technol. Smartphone Internet Things (ETSIoT),
domain: A new MAC protocol for industrial wireless network for fac- Seoul, South Korea, 2012, pp. 7–12.
tory automation,” Int. J. Ad Hoc Ubiquitous Comput., vol. 20, no. 4, [243] S. Meninger, J. O. Mur-Miranda, R. Amirtharajah, A. P. Chandrakasan,
pp. 211–222, 2015. and J. H. Lang, “Vibration-to-electric energy conversion,” IEEE Trans.
[222] K. Jamieson, H. Balakrishnan, and Y. C. Tay, “Sift: A MAC protocol Very Large Scale Integr. (VLSI) Syst., vol. 9, no. 1, pp. 64–76,
for event-driven wireless sensor networks,” in Proc. Eur. Workshop Feb. 2001.
Wireless Sensor Netw., Zürich, Switzerland, 2006, pp. 260–275. [244] S. Chalasani and J. M. Conrad, “A survey of energy harvesting sources
[223] A. Boukerche, Handbook of Algorithms for Wireless Networking and for embedded systems,” in Proc. IEEE Southeastcon, Huntsville, AL,
Mobile Computing. Boca Raton, FL, USA: CRC Press, 2005. USA, 2008, pp. 442–447.
[224] G. Lu, B. Krishnamachari, and C. S. Raghavendra, “An adaptive [245] V. Raghunathan, A. Kansal, J. Hsu, J. Friedman, and M. Srivastava,
energy-efficient and low-latency MAC for data gathering in wireless “Design considerations for solar energy harvesting wireless embedded
sensor networks,” in Proc. 18th Int. Parallel Distrib. Process. Symp., systems,” in Proc. 4th Int. Symp. Inf. Process. Sensor Netw., Boise, ID,
Santa Fe, NM, USA, 2004, p. 224. USA, 2005, pp. 457–462.
[225] T. Van Dam and K. Langendoen, “An adaptive energy-efficient [246] J. P. Amaro, F. J. T. E. Ferreira, R. Cortesao, and J. Landeck, “Energy
MAC protocol for wireless sensor networks,” in Proc. 1st Int. harvesting for ZigBee compliant wireless sensor network nodes,” in
Conf. Embedded Netw. Sensor Syst., Los Angeles, CA, USA, 2003, Proc. 38th Annu. Conf. IEEE Ind. Electron. Soc. (IECON), Montreal,
pp. 171–180. QC, Canada, 2012, pp. 2583–2588.
[226] Y.-C. Chang, J.-R. Jiang, J.-P. Sheu, and H.-Y. Shih, “ADCA: An asyn- [247] R. J. M. Vullers, R. van Schaijk, H. J. Visser, J. Penders, and
chronous duty cycle adjustment MAC protocol for wireless sensor C. Van Hoof, “Energy harvesting for autonomous wireless sensor net-
networks,” in Proc. IEEE Glob. Telecommun. Conf. (GLOBECOM), works,” IEEE Solid State Circuits Mag., vol. 2, no. 2, pp. 29–38,
New Orleans, LO, USA, 2008, pp. 1–5. Jun. 2010.
[227] Y. Liu, I. Elhanany, and H. Qi, “An energy-efficient QoS-aware media [248] A. Paidimarri, N. Ickes, and A. P. Chandrakasan, “A+ 10dBm 2.4 GHz
access control protocol for wireless sensor networks,” in Proc. IEEE transmitter with sub-400pW leakage and 43.7% system efficiency,” in
Int. Conf. Mobile Adhoc Sensor Syst. Conf., Washington, DC, USA, Proc. IEEE Int. Solid-State Circuits Conf. (ISSCC), 2015, pp. 246–247.
2005, p. 191. [249] M.-L. Ku, Y. Chen, and K. J. R. Liu, “Data-driven stochastic models
[228] A. Farhad, Y. Zia, S. Farid, and F. B. Hussain, “A traffic aware dynamic and policies for energy harvesting sensor communications,” IEEE J.
super-frame adaptation algorithm for the IEEE 802.15.4 based net- Sel. Areas Commun., vol. 33, no. 8, pp. 1505–1520, Aug. 2015.
works,” in Proc. IEEE Asia–Pac. Conf. Wireless Mobile (APWiMob), [250] W. S. Wang et al., “Design considerations of sub-mW indoor light
Bandung, Indonesia, 2015, pp. 261–266. energy harvesting for wireless sensor systems,” ACM J. Emerg. Technol.
[229] H. Pham and S. Jha, “An adaptive mobility-aware MAC proto- Comput. Syst., vol. 6, no. 2, 2010, Art. no. 6.
col for sensor networks (MS-MAC),” in Proc. IEEE Int. Conf. [251] Y. K. Tan and S. K. Panda, “Energy harvesting from hybrid indoor
Mobile Ad Hoc Sensor Syst., Fort Lauderdale, FL, USA, 2004, ambient light and thermal energy sources for enhanced performance
pp. 558–560. of wireless sensor nodes,” IEEE Trans. Ind. Electron., vol. 58, no. 9,
[230] R. Yadav, S. Varma, and N. Malaviya, “Optimized medium access con- pp. 4424–4435, Sep. 2011.
trol for wireless sensor network,” Int. J. Comput. Sci. Netw. Security, [252] H. J. Visser and R. J. M. Vullers, “RF energy harvesting and transport
vol. 8, no. 2, pp. 334–338, 2008. for wireless sensor network applications: Principles and requirements,”
[231] T. Zheng, S. Radhakrishnan, and V. Sarangan, “PMAC: An adap- Proc. IEEE, vol. 101, no. 6, pp. 1410–1423, Jun. 2013.
tive energy-efficient MAC protocol for wireless sensor networks,” in [253] S. Kim et al., “Ambient RF energy-harvesting technologies for self-
Proc. 19th IEEE Int. Parallel Distrib. Process. Symp., Denver, CO, sustainable standalone wireless sensor platforms,” Proc. IEEE, vol. 102,
USA, 2005, p. 8. no. 11, pp. 1649–1666, Nov. 2014.
[232] L. Guntupalli and F. Y. Li, “DTMC modeling for performance evalua- [254] I. Krikidis et al., “Simultaneous wireless information and power trans-
tion of DW-MAC in wireless sensor networks,” in Proc. IEEE Wireless fer in modern communication systems,” IEEE Commun. Mag., vol. 52,
Commun. Netw. Conf., Doha, Qatar, 2016, pp. 1–6. no. 11, pp. 104–110, Nov. 2014.
[233] A. El-Hoiydi, “Spatial TDMA and CSMA with preamble sampling for [255] S. Boisseau, G. Despesse, and B. A. Seddik, “Electrostatic
low power ad hoc wireless sensor networks,” in Proc. 7th Int. Symp. conversion for vibration energy harvesting,” in Small-Scale
Comput. Commun. (ISCC), 2002, pp. 685–692. Energy Harvesting, M. Lallart, Ed. InTech, Oct. 2012. [Online].
[234] V. Rajendrian, K. Obraczka, and J. J. Garcia-Luna-Aceves, “Energy- Available: https://www.intechopen.com/books/small-scale-energy-
efficient collision-free medium access control for wireless sensor harvesting/electrostatic-conversion-for-vibration-energy-harvesting,
network,” in Proc. ACM SenSys, Los Angeles, CA, USA, 2003, doi: 10.5772/51360.
pp. 181–192. [256] W. K. G. Seah, Z. A. Eu, and H.-P. Tan, “Wireless sensor net-
[235] I. Rhee, A. Warrier, M. Aia, and J. Min, “Z-MAC: A hybrid works powered by ambient energy harvesting (WSN-HEAP)-survey
MAC for wireless sensor networks,” in Proc. 3rd ACM Conf. and challenges,” in Proc. 1st Int. Conf. Wireless Commun. Veh. Technol.
Embedded Netw. Sensor Syst. (SenSys), San Diego, CA, USA, 2005, Inf. Theory Aerosp. Electron. Syst. Technol. Wireless (VITAE), 2009,
pp. 90–101. pp. 1–5.
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 91

[257] S. He et al., “Energy provisioning in wireless rechargeable sensor net- [281] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of
works,” IEEE Trans. Mobile Comput., vol. 12, no. 10, pp. 1931–1942, Things (IoT): A vision, architectural elements, and future directions,”
Oct. 2013. Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, 2013.
[258] A. Berger et al., “Sustainable energy harvesting for robust wireless [282] L. Da Xu, W. He, and S. Li, “Internet of Things in industries: A survey,”
sensor networks in industrial applications,” in Proc. Sensors Appl. IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2233–2243, Nov. 2014.
Symp. (SAS), Zadar, Croatia, 2015, pp. 1–6. [283] D. Guinard, V. Trifa, S. Karnouskos, P. Spiess, and D. Savio,
[259] J. A. R. Azevedo and F. E. S. Santos, “Energy harvesting from wind “Interacting with the SOA-based Internet of Things: Discovery, query,
and water for autonomous wireless sensor nodes,” IET Circuits Devices selection, and on-demand provisioning of Web services,” IEEE Trans.
Syst., vol. 6, no. 6, pp. 413–420, Nov. 2012. Services Comput., vol. 3, no. 3, pp. 223–235, Jul./Sep. 2010.
[260] P. Cuffe, P. Smith, and A. Keane, “Transmission system impact of wind [284] C. Flügel and V. Gehrmann, “Scientific workshop 4: Intelligent objects
energy harvesting networks,” IEEE Trans. Sustain. Energy, vol. 3, no. 4, for the Internet of Things: Internet of Things—Application of sensor
pp. 643–651, Oct. 2012. networks in logistics,” in Proc. Eur. Conf. Ambient Intell., vol. 32.
[261] C. Park and P. H. Chou, “AmbiMAX: Autonomous energy harvesting Nov. 2009, pp. 16–26.
platform for multi-supply wireless sensor nodes,” in Proc. 3rd Annu. [285] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things:
IEEE Commun. Soc. Sensor Ad Hoc Commun. Netw., Reston, VA, USA, A survey,” Comput. Netw., vol. 54, no. 15, pp. 2787–2805, 2010.
2006, pp. 168–177. [286] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of
[262] J. Jessen, M. Venzke, and V. Turau, “Design considerations for a Things: Vision, applications and research challenges,” Ad Hoc Netw.,
universal smart energy module for energy harvesting in wireless sen- vol. 10, no. 7, pp. 1497–1516, 2012.
sor networks,” in Proc. 9th Workshop Intell. Solutions Embedded [287] T. Watteyne et al., “OpenWSN: A standards-based low-power wire-
Syst. (WISES), Regensburg, Germany, 2011, pp. 35–40. less development environment,” Trans. Emerg. Telecommun. Technol.,
[263] B. Ulmen, P. Desai, S. Moghaddam, G. H. Miley, and R. I. Masel, vol. 23, no. 5, pp. 480–493, 2012.
“Development of diode junction nuclear battery using 63Ni,” [288] T. Chang, P. Tuset-Peiro, X. Vilajosana, and T. Watteyne, “OpenWSN
J. Radioanal. Nucl. Chem., vol. 282, pp. 601–604, Nov. 2009. & OpenMote: Demo’ing a complete ecosystem for the industrial
[264] B. J. Hansen, Y. Liu, R. Yang, and Z. L. Wang, “Hybrid nanogenerator Internet of Things,” in Proc. 13th Annu. IEEE Int. Conf. Sens. Commun.
for concurrently harvesting biomechanical and biochemical energy,” Netw. (SECON), London, U.K., 2016, pp. 1–3.
ACS Nano, vol. 4, no. 7, pp. 3647–3652, 2010. [289] N. Kushalnagar, G. Montenegro, and C. P. P. Schumacher, “IPv6 over
[265] H. Long, Y. Liu, Y. Wang, R. P. Dick, and H. Yang, “Battery allo- low-power wireless personal area networks (6LoWPANs): Overview,
cation for wireless sensor network lifetime maximization under cost assumptions, problem statement, and goals,” Internet Eng. Task Force,
constraints,” in Proc. Int. Conf. Comput.-Aided Design, San Jose, CA, Fremont, CA, USA, RFC 4919, Aug. 2007.
USA, 2009, pp. 705–712. [290] T. Winter et al., “RPL: IPv6 routing protocol for low-power and lossy
[266] K. Mikhaylov and J. Tervonen, “Node’s power source type identifi- network,” Internet Eng. Task Force, Fremont, CA, USA, RFC 6550,
cation in wireless sensor networks,” in Proc. Int. Conf. Broadband Mar. 2012.
Wireless Comput. Commun. Appl. (BWCCA), Barcelona, Spain, 2011, [291] Z. Shelby, K. Hartke, and C. Bormann, “The constrained applica-
pp. 521–525. tion protocol (CoAP),” Internet Eng. Task Force, Fremont, CA, USA,
[267] (Jan. 2016). Sun SPOT Mainboard Technical Datasheet Revison 8.0. RFC 7252, Jun. 2014.
[Online]. Available: http://sunspotdev.org/docs/Yellow/eSPOT8ds.pdf [292] (2017). IETF Charter of IPv6 Over Networks of Resource-
Constrained Nodes (6lo) Working Group. [Online]. Available:
[268] (2016). A Practical Guide to Battery Technologies for
https//datatracker.ietf.org/wg/6lo/charter
Wireless Sensor Networking Sensors. [Online]. Available:
http://www.sensorsmag.com/networking-communications/batteries/a- [293] (Jun. 2017). IETF: IPv6 Over Networks of Resource-Constrained
practical-guide-battery-technologies-wireless-sensor-netwo-1499 Nodes (6lo), Active Internet Drafts. [Online]. Available:
https//datatracker.ietf.org/wg/6lo/documents
[269] (2017). Alkaline AA (E91 Battery), Energizer. [Online]. Available:
[294] J. Vučić et al., “230 Mbit/s via a wireless visible-light link based
http://data.energizer.com/products.aspx
on OOK modulation of phosphorescent white LEDs,” in Proc.
[270] (2017). Cylindrical Primary Lithium Chemical System: Lithium/Iron
Opt. Fiber Commun. (OFC) Collocated Nat. Fiber Opt. Eng. Conf.
Disulfide (Li/FeS2) (L91), Energizer. [Online]. Available:
(OFC/NFOEC), San Diego, CA, USA, 2010, pp. 1–3.
http://www.ieeeoes.org/pubs/newsletters/oes/html/fall16/CoolTech.html
[295] L. Zeng et al., “High data rate multiple input multiple output (MIMO)
[271] Lithium 9V, Lithium-Manganese Dioxide (Li/MnO2) (LA522), optical wireless communications using white led lighting,” IEEE J. Sel.
Energizer, St. Louis, MO, USA, Jan. 2005. Areas Commun., vol. 27, no. 9, pp. 1654–1662, Dec. 2009.
[272] S. H. Lee and L. Choi, “SPEED-MAC: Speedy and energy efficient [296] H. Le Minh et al., “80 Mbit/s visible light communications
data delivery MAC protocol for real-time sensor network applications,” using pre-equalized white LED,” in Proc. 34th Eur. Conf. Opt.
Wireless Netw., vol. 21, no. 3, pp. 883–898, 2015. Commun. (ECOC), Brussels, Belgium, 2008, pp. 1–2.
[273] Y. Sun, S. Du, O. Gurewitz, and D. B. Johnson, “DW-MAC: A low [297] J. Zhu, A. Waltho, X. Yang, and X. Guo, “Multi-radio coexis-
latency, energy efficient demand-wakeup MAC protocol for wireless tence: Challenges and opportunities,” in Proc. 16th Int. Conf. Comput.
sensor networks,” in Proc. 9th ACM Int. Symp. Mobile Ad Hoc Netw. Commun. Netw. (ICCCN), Honolulu, HI, USA, 2007, pp. 358–364.
Comput., Hong Kong, 2008, pp. 53–62. [298] S. Pollin, I. Tan, B. Hodge, C. Chun, and A. Bahai, “Harmful coex-
[274] N. Aslam, W. Philips, W. Robertson, and S. Sivakumar, istence between 802.15.4 and 802.11: A measurement-based study,”
“A multi-criterion optimization technique for energy efficient in Proc. 3rd Int. Conf. Cogn. Radio Orient. Wireless Netw. Commun.
cluster formation in wireless sensor networks,” Inf. Fusion, vol. 12, (CrownCom), Singapore, 2008, pp. 1–6.
no. 3, pp. 202–212, 2011. [299] R. Gummadi, D. Wetherall, B. Greenstein, and S. Seshan,
[275] L. Grobe et al., “High-speed visible light communication systems,” “Understanding and mitigating the impact of RF interference on 802.11
IEEE Commun. Mag., vol. 51, no. 12, pp. 60–66, Dec. 2013. networks,” ACM SIGCOMM Comput. Commun. Rev., vol. 37, no. 4,
[276] D. C. O’Brien et al., “Visible light communications: Challenges and pp. 385–396, 2007.
possibilities,” in Proc. IEEE 19th Int. Symp. Pers. Indoor Mobile Radio [300] A. Ahmad, S. Ahmad, M. H. Rehmani, and N. U. Hassan, “A survey
Commun. (PIMRC), Cannes, France, 2008, pp. 1–5. on radio resource allocation in cognitive radio sensor networks,” IEEE
[277] T. M. Chiwewe, C. F. Mbuya, and G. P. Hancke, “Using cognitive Commun. Surveys Tuts., vol. 17, no. 2, pp. 888–917, 2nd Quart., 2015.
radio for interference-resistant industrial wireless sensor networks: An [301] G. A. Shah, V. C. Gungor, and O. B. Akan, “A cross-layer design for
overview,” IEEE Trans. Ind. Informat., vol. 11, no. 6, pp. 1466–1481, QoS support in cognitive radio sensor networks for smart grid applica-
Dec. 2015. tions,” in Proc. IEEE Int. Conf. Commun. (ICC), Ottawa, ON, Canada,
[278] G. P. Joshi, S. Y. Nam, and S. W. Kim, “Cognitive radio wireless sen- 2012, pp. 1378–1382.
sor networks: Applications, challenges and research trends,” Sensors, [302] J. Silvestre-Blanes, L. Almeida, R. Marau, and P. Pedreiras, “Online
vol. 13, no. 9, pp. 11196–11228, 2013. QoS management for multimedia real-time transmission in industrial
[279] S. Li, L. D. Xu, and X. Wang, “Compressed sensing signal and data networks,” IEEE Trans. Ind. Electron., vol. 58, no. 3, pp. 1061–1071,
acquisition in wireless sensor networks and Internet of Things,” IEEE Mar. 2011.
Trans. Ind. Informat., vol. 9, no. 4, pp. 2177–2186, Nov. 2013. [303] J. Chen, X. Cao, P. Cheng, Y. Xiao, and Y. Sun, “Distributed collabora-
[280] D. Goyal and M. R. Tripathy, “Routing protocols in wireless sensor tive control for industrial automation with wireless sensor and actuator
networks: A survey,” in Proc. 2nd Int. Conf. Adv. Comput. Commun. networks,” IEEE Trans. Ind. Electron., vol. 57, no. 12, pp. 4219–4230,
Technol. (ACCT), 2012, pp. 474–480. Dec. 2010.
92 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

[304] S. H. R. Bukhari, M. H. Rehmani, and S. Siraj, “A survey of channel [326] J. Yiu and I. Johnson, “Multi-core microcontroller design with
bonding for wireless networks and guidelines of channel bonding for cortex-M processors and coresight SoC,” ARM, Cambridge, U.K.,
futuristic cognitive radio sensor networks,” IEEE Commun. Surveys Tech. Rep., 2013.
Tuts., vol. 18, no. 2, pp. 924–948, 2nd Quart., 2016. [327] L. Jie, H. Ghayvat, and S. C. Mukhopadhyay, “Introducing Intel Galileo
[305] O. B. Akan, O. B. Karli, and O. Ergul, “Cognitive radio sensor as a development platform of smart sensor: Evolution, opportunities and
networks,” IEEE Netw., vol. 23, no. 4, pp. 34–40, Jul./Aug. 2009. challenges,” in Proc. IEEE 10th Conf. Ind. Electron. Appl. (ICIEA),
[306] T. Zheng, Y. Qin, H. Zhang, and S.-Y. Kuo, “A self-configurable power Auckland, New Zealand, 2015, pp. 1797–1802.
control algorithm for cognitive radio-based industrial wireless sen- [328] J. S. Meena, S. M. Sze, U. Chand, and T. Tseng, “Overview of emerg-
sor networks with interference constraints,” in Proc. IEEE Int. Conf. ing nonvolatile memory technologies,” Nanoscale Res. Lett., vol. 9,
Commun. (ICC), Ottawa, ON, Canada, 2012, pp. 98–103. p. 526, Sep. 2014.
[307] A. Asokan and R. AyyappaDas, “Survey on cognitive radio and cog- [329] K. Babbar, K. L. Jain, and G. N. Purohit, “Implementation of energy
nitive radio sensor networks,” in Proc. Int. Conf. Electron. Commun. efficient coverage aware routing protocol for wireless sensor network
Syst. (ICECS), Coimbatore, India, 2014, pp. 1–7. using genetic algorithm,” Int. J. Found. Comput. Sci. Technol., vol. 5,
[308] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “NeXt gen- no. 1, pp. 23–34, 2015.
eration/dynamic spectrum access/cognitive radio wireless networks: [330] Z. Jing, X. Leng, F. Hongbo, and C. Yi, “TQS-DP: A lightweight and
A survey,” Comput. Netw., vol. 50, no. 13, pp. 2127–2159, 2006. active mechanism for fast scheduling based on WSN operating system
[309] A. Fragkiadakis, V. Angelakis, and E. Z. Tragos, “Securing cogni- TinyOS,” in Proc. 27th Chin. IEEE Control Decis. Conf. (CCDC),
tive wireless sensor networks: A survey,” Int. J. Distrib. Sensor Netw., Qingdao, China, 2015, pp. 1470–1475.
vol. 2014, pp. 1–12, Mar. 2014. [331] F. Botman et al., “Bellevue: A 50MHz variable-width SIMD 32bit
[310] G. Bleser et al., “Cognitive learning, monitoring and assistance of microcontroller at 0.37V for processing-intensive wireless sensor
industrial workflows using egocentric sensor networks,” PLoS ONE, nodes,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), Melbourne,
vol. 10, no. 6, 2015, Art. no. e0127769. VIC, Australia, 2014, pp. 1207–1210.
[311] M. Eskola and T. Heikkilä, “Classification of radio channel distur- [332] A. S. Almazyad et al., “A proposed scalable design and simulation
bances for industrial wireless sensor networks,” Ad Hoc Netw., vol. 42, of wireless sensor network-based long-distance water pipeline leakage
pp. 19–33, May 2016. monitoring system,” Sensors, vol. 14, no. 2, pp. 3557–3577, 2014.
[333] T. F. Wykret, L. H. A. Correia, D. F. Macedo, J. C. Giacomin, and
[312] S. Zhuo, H. Shokri-Ghadikolaei, C. Fischione, and Z. Wang, “Adaptive
L. T. Andrade, “Evaluation and avoidance of interference in WSN:
congestion control in cognitive industrial wireless sensor networks,” in
A multi-radio node prototype using dynamic spectrum allocation,” in
Proc. IEEE 13th Int. Conf. Ind. Informat. (INDIN), Cambridge, U.K.,
Proc. IFIP IEEE Wireless Days (WD), Valencia, Spain, 2013, pp. 1–13.
2015, pp. 900–907.
[334] O. D. Incel, L. van Hoesel, P. Jansen, and P. Havinga, “MC-LMAC:
[313] M. H. Rehmani, Cognitive Radio Sensor Networks: Applications,
A multi-channel MAC protocol for wireless sensor networks,” Ad Hoc
Architectures, and Challenges. Hershey, PA, USA: IGI Glob., 2014.
Netw., vol. 9, no. 1, pp. 73–94, 2011.
[314] T. Melodia, D. Pompili, V. C. Gungor, and I. F. Akyildiz, [335] E. Ziouva and T. Antonakopoulos, “CSMA/CA performance under high
“Communication and coordination in wireless sensor and actor net- traffic conditions: Throughput and delay analysis,” Comput. Commun.,
works,” IEEE Trans. Mobile Comput., vol. 6, no. 10, pp. 1116–1129, vol. 25, no. 3, pp. 313–321, 2002.
Oct. 2007.
[336] M.-K. Oh, X. Ma, G. B. Giannakis, and D.-J. Park, “Cooperative
[315] N. Kurata, S. Saruwatari, and H. Morikawa, “Ubiquitous structural synchronization and channel estimation in wireless sensor networks,”
monitoring using wireless sensor networks,” in Proc. Int. Symp. J. Commun. Netw., vol. 7, no. 3, pp. 284–293, Sep. 2005.
IEEE Intell. Signal Process. Commun. (ISPACS), Tottori, Japan, 2006,
[337] T. Wang, R. C. de Lamare, and P. D. Mitchell, “Low-complexity
pp. 99–102.
set-membership channel estimation for cooperative wireless sensor net-
[316] S. Kim et al., “Health monitoring of civil infrastructures using wireless works,” IEEE Trans. Veh. Technol., vol. 60, no. 6, pp. 2594–2607,
sensor networks,” in Proc. 6th Int. Conf. Inf. Process. Sensor Netw., Jul. 2011.
Cambridge, MA, USA, 2007, pp. 254–263. [338] M. Senel, K. Chintalapudi, D. Lal, A. Keshavarzian, and E. J. Coyle,
[317] L. Hou and N. W. Bergmann, “Novel industrial wireless sensor net- “A Kalman filter based link quality estimation scheme for wireless
works for machine condition monitoring and fault diagnosis,” IEEE sensor networks,” in Proc. Glob. Telecommun. Conf. (GLOBECOM),
Trans. Instrum. Meas., vol. 61, no. 10, pp. 2787–2798, Oct. 2012. Washington, DC, USA, 2007, pp. 875–880.
[318] S. K. Singh, M. P. Singh, and D. K. Singh, “A survey of energy-efficient [339] A. Ribeiro, I. D. Schizas, S. I. Roumeliotis, and G. Giannakis, “Kalman
hierarchical cluster-based routing in wireless sensor networks,” Int. J. filtering in wireless sensor networks,” IEEE Control Syst., vol. 30, no. 2,
Adv. Netw. Appl., vol. 2, no. 2, pp. 570–580, 2010. pp. 66–86, Apr. 2010.
[319] M. Mukherjee, L. Shu, L. Hu, G. P. Hancke, and C. Zhu, “Sleep [340] B. Sundararaman, U. Buy, and A. D. Kshemkalyani, “Clock synchro-
scheduling in industrial wireless sensor networks for toxic gas monitor- nization for wireless sensor networks: A survey,” Ad Hoc Netw., vol. 3,
ing,” IEEE Wireless Commun., vol. 24, no. 4, pp. 106–112, Jan. 2017. no. 3, pp. 281–323, 2005.
[320] C. Zhu, V. C. M. Leung, L. T. Yang, and L. Shu, “Collaborative [341] Y.-C. Wu, Q. Chaudhari, and E. Serpedin, “Clock synchronization of
location-based sleep scheduling for wireless sensor networks integrat- wireless sensor networks,” IEEE Signal Process. Mag., vol. 28, no. 1,
edwith mobile cloud computing,” IEEE Trans. Comput., vol. 64, no. 7, pp. 124–138, Jan. 2011.
pp. 1844–1856, Jul. 2015. [342] I. Hosni and N. Hamdi, “Cross layer optimization of end to end delay
[321] S. Kundu, S. Das, A. V. Vasilakos, and S. Biswas, “A modified differ- in WSN for smart grid communications,” in Proc. Int. Symp. Signal
ential evolution-based combined routing and sleep scheduling scheme Image Video Commun. (ISIVC), Tunis, Tunisia, 2016, pp. 217–223,
for lifetime maximization of wireless sensor networks,” Soft Comput. doi: 10.1109/ISIVC.2016.7893990.
Fusion Found. Methodol. Appl., vol. 19, no. 3, pp. 637–659, 2015. [343] J. He, H. Li, J. Chen, and P. Cheng, “Study of consensus-based time
[322] M. Mukherjee, L. Shu, T. Zhao, K. Li, and H. Wang, “Low con- synchronization in wireless sensor networks,” ISA Trans., vol. 53, no. 2,
trol overhead-based sleep scheduling in software-defined wireless pp. 347–357, 2014.
sensor networks,” in Proc. IEEE 18th Int. Conf. High Perform. [344] J. Elson and K. Römer, “Wireless sensor networks: A new regime
Comput. Commun. 14th Int. Conf. Smart City 2nd Int. Conf. Data for time synchronization,” ACM SIGCOMM Comput. Commun. Rev.,
Sci. Syst. (HPCC/SmartCity/DSS), Sydney, NSW, Australia, 2016, vol. 33, no. 1, pp. 149–154, 2003.
pp. 1236–1237. [345] I. Bojic and K. Nymoen, “Survey on synchronization mechanisms
[323] M. Raza, H. Le-Minh, N. Aslam, and S. Hussain, “Deterministic in machine-to-machine systems,” Eng. Appl. Artif. Intell., vol. 45,
scheduling for heterogeneous sensing deadlines in industrial wireless pp. 361–375, Oct. 2015.
sensor networks,” in Proc. 2nd Int. Workshop Sustainability Green [346] O. Simeone, U. Spagnolini, Y. Bar-Ness, and S. H. Strogatz,
Technol., 2017, pp. 1–4. “Distributed synchronization in wireless networks,” IEEE Signal
[324] A. S. Boaventura and N. B. Carvalho, “A low-power wakeup radio for Process. Mag., vol. 25, no. 5, pp. 81–97, Sep. 2008.
application in WSN-based indoor location systems,” Int. J. Wireless [347] M. Raza, H. Le-Minh, N. Aslam, S. Hussain, and W. Ellahi, “A control
Inf. Netw., vol. 20, no. 1, pp. 67–73, 2013. channel based MAC protocol for time critical and emergency commu-
[325] M. Wu, L. Tan, and N. Xiong, “Data prediction, compression, and nications in industrial wireless sensor networks,” in Proc. Int. Conf.
recovery in clustered wireless sensor networks for environmental Commun. Comput. Digit. Syst. (C CODE), Islamabad, Pakistan, 2017,
monitoring applications,” Inf. Sci., vol. 329, pp. 800–818, Feb. 2016. pp. 122–126, doi: 10.1109/C-CODE.2017.7918914.
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 93

[348] P. Radmand, A. Talevski, S. Petersen, and S. Carlsen, “Taxonomy of [372] J. Hao, B. Zhang, and H. T. Mouftah, “Routing protocols
wireless sensor network cyber security attacks in the oil and gas indus- for duty cycled wireless sensor networks: A survey,” IEEE
tries,” in Proc. 24th IEEE Int. Conf. Adv. Inf. Netw. Appl. (AINA), Perth, Commun. Mag., vol. 50, no. 12, pp. 116–123, Dec. 2012,
WA, Australia, 2010, pp. 949–957. doi: 10.1109/MCOM.2012.6384460.
[349] J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless sen- [373] M. Asif, S. Khan, R. Ahmad, M. Sohail, and D. Singh,
sor network security: A survey,” in Distributed, Grid, and Pervasive “Quality of service of routing protocols in wireless sensor net-
Computing, Y. Xiao, Ed. Boca Raton, FL, USA: Auerbach, 2006. works: A review,” IEEE Access, vol. 5, pp. 1846–1871, 2017,
[350] T. I. J. Olsson. (2014). 6LoWPAN Demystified. [Online]. Available: doi: 10.1109/ACCESS.2017.2654356.
http://www.ti.com/lit/wp/swry013/swry013.pdf [374] X. Liu, “Atypical hierarchical routing protocols for wireless sensor
[351] A. Perrig, J. Stankovic, and D. Wagner, “Security in wireless sensor networks: A review,” IEEE Sensors J., vol. 15, no. 10, pp. 5372–5383,
networks,” ACM Commun., vol. 47, no. 6, pp. 53–57, Jun. 2004. Oct. 2015, doi: 10.1109/JSEN.2015.2445796.
[352] H. Li, Z. Jia, and X. Xue, “Application and analysis of ZigBee [375] N. A. Pantazis, S. A. Nikolidakis, and D. D. Vergados, “Energy-
security services specification,” in Proc. 2nd Int. Conf. Netw. efficient routing protocols in wireless sensor networks: A survey,” IEEE
Security Wireless Commun. Trusted Comput., Wuhan, China, 2010, Commun. Surveys Tuts., vol. 15, no. 2, pp. 551–591, 2nd Quart., 2013.
pp. 494–497, doi: 10.1109/NSWCTC.2010.261. [376] S. Murphy and J. J. Garcia-Luna-Aceves, “An efficient routing protocol
[353] C. Hennebert and J. D. Santos, “Security protocols and privacy issues for wireless networks,” Mobile Netw. Appl., vol. 1, no. 2, pp. 183–197,
into 6LoWPAN stack: A synthesis,” IEEE Internet Things J., vol. 1, 1996.
no. 5, pp. 384–398, Oct. 2014. [377] B. Bellur and R. G. Ogier, “A reliable, efficient topology broadcast
[354] S. Liang, Y. Tang, and Q. Zhu, “Passive wake-up scheme protocol for dynamic networks,” in Proc. IEEE INFOCOM, vol. 1.
for wireless sensor networks,” in Proc. 2nd Int. Conf. Innov. New York, NY, USA, 1999, pp. 178–186.
Comput. Inf. Control (ICICIC), Kumamoto, Japan, 2007, p. 507, [378] S. Bali, “Performance comparisons of DSR and TORA,” in Wireless
doi: 10.1109/ICICIC.2007.443. Networks and Mobile Computing. Los Alamitos, CA, USA: IEEE
[355] R. Riggio, T. Rasheed, and S. Sicari, “Performance evaluation of Comput. Soc., 2001, pp. 10–15.
an hybrid mesh and sensor network,” in Proc. IEEE Int. Glob. [379] H. Lim and C. Kim, “Flooding in wireless ad hoc networks,” Comput.
Telecommun., Kathmandu, Nepal, 2011, pp. 1–6. Commun., vol. 24, nos. 3–4, pp. 353–363, 2001.
[356] T. T. Vinh, T. N. Quynh, and M. B. T. Quynh, “EMRP: Energy-aware [380] S. M. Hedetniemi, S. T. Hedetniemi, and A. L. Liestman, “A survey
mesh routing protocol for wireless sensor networks,” in Proc. IEEE of gossiping and broadcasting in communication networks,” Networks,
Int. Conf. Adv. Technol. Commun., Hanoi, Vietnam, 2012, pp. 78–82. vol. 18, no. 4, pp. 319–349, 1988.
[357] H. K. Le, D. Henriksson, and T. Abdelzaher, “A control theory [381] S. Giannoulis, C. Antonopoulos, E. Topalis, and S. Koubias, “ZRP ver-
approach to throughput optimization in multi-channel collection sensor sus DSR and TORA: A comprehensive survey on ZRP performance,”
networks,” in Proc. IPSN, Cambridge, MA, USA, 2007, pp. 31–40. in Proc. 10th IEEE Conf. Emerg. Technol. Factory Autom., Catania,
Italy, 2005, pp. 1017–1024.
[358] Y. Wu, S. Fahmy, and N. B. Shroff, “On the construction of
a maximum-lifetime data gathering tree in sensor networks: NP- [382] D. A. Vidhate, A. K. Patil, and S. S. Pophale, “Performance evalu-
completeness and approximation algorithm,” in Proc. INFOCOM, ation of low energy adaptive clustering hierarchy protocol for wire-
Phoenix, AZ, USA, 2008, pp. 131–136. less sensor networks,” in Proc. Int. Conf. Workshop Emerg. Trends
Technol. (ICWET), Mumbai, India, 2010, pp. 59–63.
[359] F. Yang, C. He, and H.-Z. Shao, “Two simplified coding schemes for
[383] A. Manjeshwar and D. P. Agrawal, “TEEN: A routing protocol for
wireless sensor networks with star topologies,” in Proc. Int. Conf. Softw.
enhanced efficiency in wireless sensor networks,” in Proc. 15th Int.
Telecommun. Comput. Netw. (SoftCOM), 2010, pp. 185–189.
Parallel Distrib. Process. Symp. Workshops (IPDPS), San Francisco,
[360] I. S. AlShawi, L. Yan, W. Pan, and B. Luo, “Lifetime enhancement in
CA, USA, 2001, pp. 2009–2015.
wireless sensor networks using fuzzy approach and A-star algorithm,”
[384] S. Lindsey and C. S. Raghavendra, “PEGASIS: Power-efficient gath-
IEEE Sensors J., vol. 12, no. 10, pp. 3010–3018, Oct. 2012.
ering in sensor information systems,” in Proc. IEEE Aerosp. Conf.,
[361] Z. Wu, H. Chu, Y. Pan, and X. Yang, “Bus priority control sys- vol. 3. Big Sky, MT, USA, 2002, pp. 1125–1130.
tem based on wireless sensor network (WSN) and ZigBee,” in
[385] A. Manjeshwar and D. P. Agrawal, “APTEEN: A hybrid protocol
Proc. IEEE Int. Conf. Veh. Electron. Safety, Shanghai, China, 2006,
for efficient routing and comprehensive information retrieval in wire-
pp. 148–151.
less sensor networks,” in Proc. Int. Parallel Distrib. Process. Symp.,
[362] A. S. Poornima and B. B. Amberker, “Logical ring based key man- Fort Lauderdale, FL, USA, 2002, pp. 195–202.
agement for clustered sensor networks with changing cluster head,” in [386] Y. Yuan, Z. He, and M. Chen, “Virtual MIMO-based cross-layer design
Proc. Int. Conf. Signal Process. Commun. (SPCOM), Bengaluru, India, for wireless sensor networks,” IEEE Trans. Veh. Technol., vol. 55, no. 3,
2010, pp. 1–5. pp. 856–864, May 2006.
[363] T. P. Lambrou and C. G. Panayiotou, “A survey on routing techniques [387] Q. Li, J. Aslam, and D. Rus, “Hierarchical power-aware routing
supporting mobility in sensor networks,” in Proc. 5th Int. Conf. Mobile in sensor networks,” in Proc. DIMACS Workshop Pervasive Netw.,
Ad Hoc Sensor Netw. (MSN), 2009, pp. 78–85. Los Angeles, CA, USA, 2001, pp. 25–27.
[364] D. Sharma, S. Verma, and K. Sharma, “Network topologies in wireless [388] H.-B. Cheng, G. Yang, and S.-J. Hu, “NHRPA: A novel hierarchical
sensor networks: A review,” Int. J. Electron. Commun. Technol., vol. 4, routing protocol algorithm for wireless sensor networks,” J. China Univ.
no. 3, pp. 93–97, 2013. Posts Telecommun., vol. 15, no. 3, pp. 75–81, 2008.
[365] O. Banimelhem and S. Khasawneh, “Grid-based multi-path with con- [389] C.-H. Lung and C. Zhou, “Using hierarchical agglomerative clustering
gestion avoidance routing (GMCAR) protocol for wireless sensor in wireless sensor networks: An energy-efficient and flexible approach,”
networks,” in Proc. IEEE Int. Conf. Telecommun. (ICT), Marrakesh, Ad Hoc Netw., vol. 8, no. 3, pp. 328–344, 2010.
Morocco, 2009, pp. 131–136. [390] H. Luo, F. Ye, J. Cheng, S. Lu, and L. Zhang, “TTDD: Two-tier data
[366] R. Zurawski, Networked Embedded Systems. Boca Raton, FL, USA: dissemination in large-scale wireless sensor networks,” Wireless Netw.,
CRC Press, 2009. vol. 11, nos. 1–2, pp. 161–175, 2005.
[367] Wireless Systems for Industrial Automation: Process Control and [391] Y. Yao and J. Gehrke, “The Cougar approach to in-network query
Related Applications, ISA Standard 100.11a, 2009. processing in sensor networks,” SIGMOD Rec., vol. 31, no. 3, pp. 9–18,
[368] S. Jagadeesan and V. Parthasarathy, “Cross-layer design in wireless 2002.
sensor networks,” in Proc. 2nd Int. Conf. Comput. Sci. Eng. Appl. Adv. [392] J. Newsome and D. Song, “GEM: Graph embedding for routing and
Comput. Sci. Eng. Appl. (ICCSEA), vol. 1. New Delhi, India, May 2012, data-centric storage in sensor networks without geographic informa-
pp. 283–295. tion,” in Proc. 1st Int. Conf. Embedded Netw. Sensor Syst., Los Angeles,
[369] J. Wan, D. Yuan, and X. Xu, “A review of routing protocols in wire- CA, USA, 2003, pp. 76–88.
less sensor networks,” in Proc. 4th Int. Conf. Wireless Commun. Netw. [393] Y. Yu, R. Govindan, and D. Estrin, “Geographical and energy aware
Mobile Comput. (WiCOM), Dalian, China, 2008, pp. 1–4. routing: A recursive data dissemination protocol for wireless sen-
[370] P. Kumar, M. P. Singh, and U. S. Triar, “A review of routing protocols sor networks,” Dept. Comput. Sci., Univ. California at Los Angeles,
in wireless sensor network,” Int. J. Eng. Res. Technol., vol. 1, no. 4, Los Angeles, CA, USA, Tech. Rep., 2001, pp. 1–11.
pp. 1–14, 2012. [394] B. Blum, T. He, S. Son, and J. Stankovic, “IGF: A state-free robust
[371] S. K. Singh, P. Kumar, and J. P. Singh, “A survey on successors communication protocol for wireless sensor networks,” Dept. Comput.
of LEACH protocol,” IEEE Access, vol. 5, pp. 4298–4328, 2017, Sci., Univ. Virginia, Charlottesville, VA, USA, Tech. Rep. CS-2003-11,
doi: 10.1109/ACCESS.2017.2666082. 2003.
94 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 20, NO. 1, FIRST QUARTER 2018

[395] G. Lukachan and M. A. Labrador, “SELAR: Scalable energy-efficient [417] B. David and D. Estrin, “Rumor routing algorthim for sensor networks,”
location aided routing protocol for wireless sensor networks,” in in Proc. 1st ACM Int. Workshop Wireless Sensor Netw. Appl., Atlanta,
Proc. 29th Annu. IEEE Int. Conf. Local Comput. Netw., Tampa, FL, GA, USA, 2002, pp. 22–31.
USA, 2004, pp. 694–695. [418] S. Lee, Y. Yu, S. Nelakuditi, Z.-L. Zhang, and C.-N. Chuah, “Proactive
[396] D. Chen and P. K. Varshney, “On-demand geographic forwarding for vs reactive approaches to failure resilient routing,” in Proc. 23rd Annu.
data delivery in wireless sensor networks,” Comput. Commun., vol. 30, Joint Conf. IEEE Comput. Commun. Soc., vol. 1. Hong Kong, 2004,
nos. 14–15, pp. 2954–2967, 2007. pp. 176–186.
[397] N. M. Khan, Z. Khalid, and G. Ahmed, “Gradient cost establish- [419] T. He, J. A. Stankovic, C. Lu, and T. Abdelzaher, “SPEED: A state-
ment (grace) for an energy-aware routing in wireless sensor networks,” less protocol for real-time communication in sensor networks,” in
EURASIP J. Wireless Commun. Netw., vol. 1, pp. 1–15, Dec. 2009. Proc. 23rd Int. Conf. Distrib. Comput. Syst., Providence, RI, USA,
[398] C. Schurgers and M. B. Srivastava, “Energy efficient routing in wire- 2003, pp. 46–55.
less sensor networks,” in Proc. IEEE Commun. Netw. Centric Oper. [420] M. Paone, L. Paladina, M. Scarpa, and A. Puliafito, “A multi-sink
Creating Inf. Force Mil. Commun. Conf. (MILCOM), McLean, VA, swarm-based routing protocol for wireless sensor networks,” in
USA, 2001, pp. 357–361. Proc. IEEE Symp. Comput. Commun. (ISCC), Sousse, Tunisia, 2009,
[399] P. Huang, H. Chen, G. Xing, and Y. Tan, “SGF: A state-free gradient- pp. 28–33.
based forwarding protocol for wireless sensor networks,” ACM Trans. [421] W.-M. Chen, C.-S. Li, F.-Y. Chiang, and H.-C. Chao, “Jumping ant
Sensor Netw., vol. 5, no. 2, p. 14, 2009. routing algorithm for sensor networks,” Comput. Commun., vol. 30,
no. 14, pp. 2892–2903, 2007.
[400] J. Guo, P. Orlik, J. Zhang, and K. Ishibashi, “Reliable routing in large
[422] C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva,
scale wireless sensor networks,” in Proc. 6th Int. Conf. Ubiquitous
“Directed diffusion for wireless sensor networking,” IEEE/ACM Trans.
Future Netw. (ICUFN), Shanghai, China, 2014, pp. 99–104.
Netw., vol. 11, no. 1, pp. 2–16, Feb. 2003.
[401] G. Yi, S. Guiling, L. Weixiang, and P. Yong, “Recluster-LEACH: [423] N. Sadagopan, B. Krishnamachari, and A. Helmy, “Active query for-
A recluster control algorithm based on density for wireless sensor net- warding in sensor networks (ACQUIRE),” Ad Hoc Netw., vol. 3, no. 1,
work,” in Proc. 2nd Int. Conf. Power Electron. Intell. Transp. Syst., pp. 91–113, 2005.
vol. 3. Shenzhen, China, 2009, pp. 198–202.
[424] C. de Morais Cordeiro and D. P. Agrawal, Ad Hoc and Sensor
[402] L. Subramanian and R. H. Katz, “An architecture for building self- Networks: Theory and Applications. Hackensack, NJ, USA: World Sci.,
configurable systems,” in Proc. IEEE/ACM Wksp Mobile Ad Hoc Netw. 2006.
Comput., Boston, MA, USA, Aug. 2000, pp. 63–73. [425] J. Ben-Othman and B. Yahya, “Energy efficient and QoS based routing
[403] M. Chu, H. Haussecker, and F. Zhao, “Scalable information-driven sen- protocol for wireless sensor networks,” J. Parallel Distrib. Comput.,
sor querying and routing for ad hoc heterogeneous sensor networks,” vol. 70, no. 8, pp. 849–857, 2010.
Int. J. High Perform. Comput. Appl., vol. 16, no. 3, pp. 293–313, [426] S. Basagni, I. Chlamtac, V. R. Syrotiuk, and B. A Woodward,
Aug. 2002. “A distance routing effect algorithm for mobility (DREAM),” in Proc.
[404] S. Lindsey, C. S. Raghavendra, and K. M. Sivalingam, “Data gather- ACM/IEEE Int. Conf. Mobile Comput. Netw. (MOBICOM), Dallas, TX,
ing algorithms in sensor networks using energy metric,” IEEE Trans. USA, Oct. 1999, pp. 76–84.
Parallel Distrib. Syst., vol. 13, no. 9, pp. 924–935, Sep. 2002. [427] Y.-B. Ko and N. H. Vaidya, “Location-aided routing (LAR) in mobile
[405] M. Chen, S. Gonzalez, Y. Zhang, and V. Leung, “Multi-agent itinerary ad hoc networks,” in Proc. ACM/IEEE Int. Conf. Mobile Comput.
planning in wireless sensor networks,” Comput. Sci., vol. 22, no. 10, Netw. (MobiCom), Dallas, TX, USA, 1998, pp. 66–75.
pp. 584–597, 2009. [428] J. N. Al-Karaki, R. Ul-Mustafa, and A. E. Kamal, “Data aggregation
[406] M. Chen, L. T. Yang, T. Kwon, L. Zhou, and M. Jo, “Itinerary in wireless sensor networks—Exact and approximate algorithms,” in
planning for energy-efficient agent communications in wireless sensor Proc. IEEE Workshop High Perform. Switch. Routing, Phoenix, AZ,
networks,” IEEE Trans. Veh. Technol., vol. 60, no. 7, pp. 3290–3299, USA, Apr. 2004, pp. 241–245.
Sep. 2011. [429] K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie, “Protocols for
[407] J. Luo and J.-P. Hubaux, “Joint mobility and routing for lifetime elon- self-organization of a wireless sensor network,” IEEE Pers. Commun.,
gation in wireless sensor networks,” in Proc. IEEE INFOCOM, vol. 3. vol. 7, no. 5, pp. 16–27, Oct. 2000.
Miami, FL, USA, Mar. 2005, pp. 1735–1746. [430] D. Čevizović, S. Galović, S. Zeković, Z. Ivić, “Boundary between
[408] R. C. Shah, S. Roy, S. Jain, and W. Brunette, “Data MULEs: Modeling coherent and noncoherent small polaron motion: Influence of the
a three-tier architecture for sparse sensor networks,” in Proc. Sensor phonon hardening,” Phys. B, Condensed Matter, vol. 404, no. 2,
Netw. Protocols Appl., Anchorage, AK, USA, May 2003, pp. 30–41. pp. 270–274, 2009.
[409] H. S. Kim, T. F. Abdelzaher, and W. H. Kwon, “Minimum-energy asyn- [431] J. Kang, Y. Zhang, and B. Nath, “TARA: Topology-aware resource
chronous dissemination to mobile sinks in wireless sensor networks,” in adaptation to alleviate congestion in sensor networks,” IEEE Trans.
Proc. 1st Int. Conf. Embedded Netw. Sensor Syst. ACM, Los Angeles, Parallel Distrib. Syst., vol. 18, no. 7, pp. 919–931, Jul. 2007.
CA, USA, 2003, pp. 193–204. [432] D. Thakur. (2017). Open Loop Congestion Control. [Online]. Available:
http://ecomputernotes.com/computernetworkingnotes/communication-
[410] W. Chang, G. Cao, and T. La Porta, “Dynamic proxy tree-based data
networks/what-is-congestion-control-describe-the-congestion-control-
dissemination schemes for wireless sensor networks,” in Proc. IEEE
algorithm-commonly-used
Mobile Ad Hoc Sensor Syst., Fort Lauderdale, FL, USA, Oct. 2004,
pp. 21–30. [433] A. Ghaffari, “Congestion control mechanisms in wireless sensor net-
works: A survey,” J. Netw. Comput. Appl., vol. 52, pp. 101–115,
[411] Y. Wang, C. Tsai, and H. Mao, “HMRP: Hierarchy-based multipath Jun. 2015.
routing protocol for wireless sensor networks,” Sci. Eng., vol. 9, no. 3,
[434] R. Chakravarthi, C. Gomathy, S. K. Sebastian, K. Pushparaj, and
pp. 255–264, 2006.
V. B. Mon, “A survey on congestion control in wireless sensor net-
[412] F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, “A two-tier data dis- works,” Int. J. Comput. Sci. Commun., vol. 1, no. 1, pp. 161–164,
semination model for large-scale wireless sensor networks,” in Proc. 2010.
ACM/IEEE MOBICOM, Atlanta, GA, USA, 2002, pp. 148–159. [435] L. R. Doherty, J. Simon, and Z. Ye, “Congestion control for wireless
[413] Y. Kiri, M. Sugano, and M. Murata, “Self-organized data-gathering sensor networks,” U.S. Patent 8 189 479. 29, May 2012.
scheme for multi-sink sensor networks inspired by swarm intelligence,” [436] C. Wang, B. Li, K. Sohraby, M. Daneshmand, and Y. Hu, “Upstream
in Proc. 1st Int. Conf. Self Adapt. Self Org. Syst. (SASO), Cambridge, congestion control in wireless sensor networks through cross-layer opti-
MA, USA, 2007, pp. 161–172. mization,” IEEE J. Sel. Areas Commun., vol. 25, no. 4, pp. 786–795,
[414] J. Kulik, W. Heinzelman, and H. Balakrishnan, “Negotiation-based May 2007.
protocols for disseminating information in wireless sensor networks,” [437] (2017). Polibol: Process Capabilities. [Online]. Available:
Wireless Netw., vol. 8, nos. 2–3, pp. 169–185, 2002. http://www.polibol.es/eng/procesos.htm
[415] W. Guo, W. Zhang, and G. Lu, “A comprehensive routing pro- [438] (2017). Smart Factory: Reducing Maintenance Costs and Ensuring
tocol in wireless sensor network based on ant colony algorithm,” Quality in the Manufacturing Process. [Online]. Available:
in Proc. 2nd Int. Conf. Netw. Security Wireless Commun. Trusted http://www.libelium.com/smart-factory-reducing-maintenance-costs-
Comput. (NSWCTC), vol. 1. Wuhan, China, 2010, pp. 41–44. ensuring-quality-manufacturing-process/
[416] R. C. Shah and J. M. Rabaey, “Energy aware routing for low energy ad [439] (2017). Libelium Sensors Connect With Microsoft Azure
hoc sensor networks,” in Proc. Wireless Commun. Netw. Conf. (WCNC), Cloud Platform. [Online]. Available: http://www.libelium.com/
vol. 1. Orlando, FL, USA, 2002, pp. 350–355. libelium-sensors-connect-microsoft-azure-cloud-platform/
RAZA et al.: CRITICAL ANALYSIS OF RESEARCH POTENTIAL, CHALLENGES, AND FUTURE DIRECTIVES IN IWSNs 95

[440] (2017). Meshlium Xtreme. [Online]. Available: Nauman Aslam received the B.Sc. degree in
http://www.libelium.com/products/meshlium/ mechanical engineering from the University of
[441] (2017). Honeywell Wireless Solution Improves Steel Mill Engineering and Technology, Lahore, Pakistan, in
Performance. [Online]. Available: https://www.honeywellprocess.com/ 1993, the Master of Engineering degree in inter-
library/.../case.../success-story-nucor-wireless.pdf networking from Dalhousie University in 2003, and
[442] B. Wozniak. (2009). Honeywell Wireless Sensor Networks. [Online]. the Ph.D. degree in engineering mathematics from
Available: https://www.oecd.org/sti/ieconomy/43017542.pdf Dalhousie University, Halifax, NS, Canada, in 2008,
[443] (2017). OneWireless Network—Multiprotocol Wireless IO & where he is a Reader with the Department of
System. [Online]. Available: https://www.honeywellprocess.com/en- Computer Science and Digital Technologies. He
US/explore/products/wireless/OneWireless- joined Northumbria University in 2011. He was an
Network/pages/default.aspx Assistant Professor with Dalhousie University, from
[444] R. Yu. (Jan. 2017). Reliable Wireless Sensor Network 2008 to 2011, where he also currently holds an Adjunct Assistant Professor
Streamlines Manufacturing Operations. [Online]. Available: position.
https://www.youtube.com/watch?v=kM3z4w5NoW8
[445] (2017). Wireless Sensor Network Streamlines Semiconductor
Manufacturing Operations. [Online]. Available: https://www. Hoa Le-Minh received the B.Eng. degree in
linear.com/docs/47541 telecommunications from the Bach Khoa University,
[446] T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2. Ho Chi Minh City, Vietnam, the M.Sc. degree
New York, NY, USA: Springer, 2011. in telecommunications from the Munich University
[447] N. Baldo, F. Maguolo, M. Miozzo, M. Rossi, and M. Zorzi, “ns2- of Technology, Germany, and the Ph.D. degree in
MIRACLE: A modular framework for multi-technology and cross-layer telecommunications from Northumbria University,
support in network simulator 2,” in Proc. 2nd Int. Conf. Perform. Eval. Newcastle upon Tyne, U.K., in 2007. He was a
Methodol. Tools (ICST), 2007, Art. no. 16. Lecturer with the Telecommunications Department,
[448] J. Zheng and M. J. Lee, “A comprehensive performance study of IEEE Bach Khoa University. He was a Research Assistant
802.15.4,” in Sensor Network Operations. Piscataway, NJ, USA: IEEE with Siemens AG, Munich, Germany, from 2002 to
Press, 2004, pp. 1–14. 2004 and a Post-Doctoral Research Fellow with the
[449] (2017). Comparison Between NS2 and NS3. [Online]. University of Oxford, U.K., from 2007 to 2010. Since 2010, he has been a
Available: https://www.researchgate.netfile.PostFileLoader.html?id= Senior Lecturer with Northumbria University. His research areas are wire-
5372cf86d11b8b3b5d8b45ae&assetKey=AS%3A273533144371217% less communications, optical wireless communications, sensor network, and
401442226791690 smartphone technology. He has published over 150 papers in the above areas.
[450] (2017). OMNeT++ Discrete Event Simulator. [Online]. Available: He is currently the Chairman of IEEE ComSoc U.K. and Ireland.
https://omnetpp.org
[451] X. Dai et al., “Development and validation of a simulator for wireless
data acquisition in gas turbine engine testing,” IET Wireless Sensor Sajjad Hussain received the M.S. degree from
Syst., vol. 3, no. 3, pp. 183–192, Sep. 2013. SUPELEC, Gif-sur-Yvette, France, and the Ph.D.
[452] A. Al-Yami, W. Abu-Al-Saud, and F. Shahzad, “On industrial wire- degree in wireless communication and signal pro-
less sensor network (IWSN) and its simulation using castalia,” in cessing from the University of Rennes 1, France.
Proc. UKSim AMSS 18th Int. Conf. Comput. Model. Simulat. (UKSim), He is currently a Lecturer with the School of
Cambridge, U.K., 2016, pp. 293–298, doi: 10.1109/UKSim.2016.51. Engineering, University of Glasgow, U.K. He was
[453] N. G. Palan and A. P. Khadilkar, “Media access control protocol mod- an Associate Professor with the Capital University
elling for mobile sensor network-using OMNeT++-MiXiM network of Science and Technology. He was also an Assistant
simulator,” in Proc. Int. Conf. Sustain. Energy Intell. Syst. (SEISCON), Professor with the National University of Science
Chennai, India, 2011, pp. 641–644. and Technology, Rawalpindi, Pakistan. His main
[454] (2017). End-to-End Perspective of Application and Network research interests include spectrum sensing, security,
Performance With OPNET Technologies. [Online]. Available: and cross layer optimization in cognitive radios and wireless networks.
https://www.riverbed.com/gb/products/steelcentral/opnet.html
[455] C. Marghescu, M. Pantazica, A. Brodeala, and P. Svasta, “Simulation
of a wireless sensor network using OPNET,” in Proc. IEEE 17th Yue Cao received the Ph.D. degree from the
Int. Symp. Design Technol. Electron. Packag. (SIITME), Timişoara, Institute for Communication Systems, University of
Romania, 2011, pp. 249–252, doi: 10.1109/SIITME.2011.6102728. Surrey, Guildford, U.K., in 2013, where he was
[456] (2017). QualNet Network Simulator Software. [Online]. Available: a Research Fellow until 2016. He was a Lecturer
http://web.scalable-networks.com/qualnet-network-simulator-software with the Department of Computer and Information
[457] (2017). Simulation of Wireless Ad-Hoc Sensor Networks With QualNet. Sciences, Northumbria University, Newcastle upon
[Online]. Available: https://www-user.tu-chemnitz.de/∼doto/pdf/ Tyne, U.K., until 2017, where he is currently the
wireless-simulation-with-qualnet.pdf Senior Lecturer since 2017. His research interests
focus on DTNs, E-mobility, QoS/QoE in 5G.

Noor Muhammad Khan received the B.Sc. degree


in electrical engineering from the University of
Engineering and Technology, Lahore, Pakistan, in
1998 and the Ph.D. degree in electrical engineer-
ing from the University of New South Wales,
Sydney, Australia, in 2006. He held several posi-
tions in WorldCall, NISTE, PTCL, UNSW, GIK
Institute of Engineering Sciences and Technology,
and Mohammad Ali Jinnah University, Pakistan,
Mohsin Raza received the B.S. and M.S. degrees in from 1998 to 2015. He is currently a Professor with
electronic engineering from Mohammad Ali Jinnah the Capital University of Science and Technology,
University, Islamabad, Pakistan. He is currently pur- Islamabad, Pakistan. He has served as the Chair and the Co-Chair of
suing the Ph.D. degree with the Department of the Technical Program Committees of the IEEE International Conference
Mathematics, Physics and Electrical Engineering, on Emerging Technologies in 2012 and IEEE International Multi-Topic
Northumbria University, Newcastle upon Tyne, U.K. Conference in 2009. He was a recipient of the Research Productivity Award
He was a Lecturer with the Department of Electronic by the Pakistan Council for Science and Technology, in 2011 and 2012.
Engineering, Mohammad Ali Jinnah University from His research interests include channel modeling and characterization,
2010 to 2015 and Hardware Support Engineer with wireless sensor networks, cellular mobile communication networks, and
USS in 2009. ground-to-air communication systems.

Das könnte Ihnen auch gefallen