skip to main content
10.1145/3570361.3592513acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

RF-SIFTER: Sifting Signals at Layer-0.5 to Mitigate Wideband Cross-Technology Interference for IoT

Published: 10 July 2023 Publication History

Abstract

IoT uplink performance is crucial for a wide variety of IoT applications such as health sensing and industrial control, which demand reliable delivery of sensor data to the cloud. However, due to the limited transmission power budget imposed on many power-constrained IoT devices, IoT uplinks are highly susceptible to cross-technology interference (CTI) caused by coexisting networks. Previous approaches to mitigating CTI have relied on MAC/PHY designs. They suffer from poor performance and limited generality in the presence of wideband CTI sources such as Wi-Fi and RF jammer, which transmit aggressively on large spectrum chunks using diverse radio technologies.
This paper introduces RF-SIFTER, a general and highly-effective system that protects low-power IoT uplinks against intensive wideband CTI. RF-SIFTER enables technology-agnostic blind beamforming to sift signals based on bandwidth, allowing IoT signals to pass through while rejecting interference wider than the IoT band. RF-SIFTER is designed as a Layer-0.5 that is transparent to IoT MAC/PHY, ensuring general applicability and practical deployability across a wide range of coexistence scenarios. RF-SIFTER is implemented on an FPGA-based software radio platform. Extensive experiments show that RF-SIFTER can improve the SINR of IoT uplink signals by up to 29 dB and increase packet delivery ratio by 2× to 5× for ZigBee, BLE, and RFID in the presence of wideband CTI caused by 802.11ac networks and RF jamming.

References

[1]
Evgeny Khorov, Anton Kiryanov, Andrey Lyakhov, and Giuseppe Bianchi. A tutorial on IEEE 802.11 ax high efficiency WLANs. IEEE Communications Surveys & Tutorials, 21(1):197--216, 2018.
[2]
Avik Ghose, Priyanka Sinha, Chirabrata Bhaumik, Aniruddha Sinha, Amit Agrawal, and Anirban Dutta Choudhury. UbiHeld: ubiquitous healthcare monitoring system for elderly and chronic patients. In Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, pages 1255--1264, 2013.
[3]
C Arcadius Tokognon, Bin Gao, Gui Yun Tian, and Yan Yan. Structural health monitoring framework based on internet of things: A survey. IEEE Internet of Things Journal, 4(3):619--635, 2017.
[4]
Jun Huang, Guoliang Xing, Gang Zhou, and Ruogu Zhou. Beyond co-existence: Exploiting WiFi white space for ZigBee performance assurance. In The 18th IEEE International Conference on Network Protocols, pages 305--314. IEEE, 2010.
[5]
Yoon Chae, Shuai Wang, and Song Min Kim. Exploiting WiFi guard band for safeguarded Zigbee. In Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, pages 172--184, 2018.
[6]
Yan Yubo, Yang Panlong, Li Xiangyang, Tao Yue, Zhang Lan, and You Lizhao. Zimo: Building cross-technology MIMO to harmonize ZigBee smog with WiFi flash without intervention. In Proceedings of the 19th annual international conference on Mobile computing & networking, pages 465--476, 2013.
[7]
Meng Meng, Lizhao You, Kun Tan, Jiansong Zhang, and Wenjie Wang. SpaceHub: A smart relay system for smart home. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks, pages 1--7, 2015.
[8]
Ömer Can Dabak, Fatih Erdem, Tolga Sönmez, Lale Alatan, and S Sencer Koç. Interference suppression in a GPS receiver with 4 element array design and implementation of beamforming algorithms. In IEEE/ION Position, Location and Navigation Symposium, pages 645--652. IEEE, 2016.
[9]
Dan Lu, Renbiao Wu, and Wenyi Wang. Robust widenull anti-jamming algorithm for high dynamic gps. In 2012 IEEE 11th International Conference on Signal Processing, 2012.
[10]
David S De Lorenzo et al. Navigation accuracy and interference rejection for GPS adaptive antenna arrays. Stanford University, 2007.
[11]
Jack Capon. High-resolution frequency-wavenumber spectrum analysis. Proceedings of the IEEE, 57(8):1408--1418, 1969.
[12]
SN Sivanandam and SN Deepa. Genetic algorithms. In Introduction to genetic algorithms, pages 15--37. Springer, 2008.
[13]
Darrell Whitley. A genetic algorithm tutorial. Statistics and computing, 4(2):65--85, 1994.
[14]
Shravan Rayanchu, Ashish Patro, and Suman Banerjee. Airshark: detecting non-WiFi RF devices using commodity WiFi hardware. In Proceedings of the ACM SIGCOMM conference on Internet measurement conference, pages 137--154, 2011.
[15]
Solomon Kullback. Information theory and statistics. Courier Corporation, 1997.
[16]
P. Yang, Y. Yan, X. Y. Li, Y. Zhang, T. Yue, and L. You. Taming cross-technology interference for WiFi and ZigBee coexistence networks. IEEE Transactions on Mobile Computing, 15(4):1009--1021, 2016.
[17]
gr-ieee802-15-4. https://github.com/bastibl/gr-ieee802-15-4.
[18]
https://github.com/hhornbacher/gr-ble.
[19]
Gen2-uhf-rfid-reader. https://github.com/nkargas/Gen2-UHF-RFID-Reader.
[20]
https://www.xilinx.com/support/documents/boards_and_kits/zcu104/ug1267-zcu104-eval-bd.pdf.
[21]
Chieh-Jan Mike Liang, Nissanka Bodhi Priyantha, Jie Liu, and Andreas Terzis. Surviving WiFi interference in low power ZigBee networks. In Proceedings of the 8th ACM conference on embedded networked sensor systems, pages 309--322, 2010.
[22]
Shyamnath Gollakota, Fadel Adib, Dina Katabi, and Srinivasan Seshan. Clearing the rf smog: making 802.11 n robust to cross-technology interference. In Proceedings of the ACM SIGCOMM Conference, pages 170--181, 2011.
[23]
Zhimeng Yin, Zhijun Li, Song Min Kim, and Tian He. Explicit channel coordination via cross-technology communication. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, pages 178--190, 2018.
[24]
Xiaolong Zheng, Zhichao Cao, Jiliang Wang, Yuan He, and Yunhao Liu. Zisense: towards interference resilient duty cycling in wireless sensor networks. In Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, pages 119--133, 2014.
[25]
C. E. Shannon. A mathematical theory of communication. SIGMOBILE Mob. Comput. Commun. Rev., 2001.
[26]
Kan Yu, Filip Baracć, Mikael Gidlund, Johan Åkerberg, and Mats BjÖrkman. A flexible error correction scheme for ieee 802.15.4-based industrial wireless sensor networks. In 2012 IEEE International Symposium on Industrial Electronics, 2012.
[27]
Xinyu Zhang and Kang G Shin. Enabling coexistence of heterogeneous wireless systems: Case for ZigBee and WiFi. In Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 1--11, 2011.
[28]
Zhijun Li and Tian He. Webee: Physical-layer cross-technology communication via emulation. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, pages 2--14, 2017.
[29]
Kenneth Mills, Fauzia Ahmad, Moeness G. Amin, and Braham Himed. Fast iterative interpolated beamforming for interference doa estimation in gnss receivers using fully augmentable arrays. In 2019 IEEE Radar Conference (RadarConf), 2019.
[30]
Bo Qiu, Wei Liu, and Renbiao Wu. Blind interference suppression for satellite navigation signals based on antenna arrays. In 2013 IEEE China Summit and International Conference on Signal and Information Processing, 2013.

Cited By

View all

Index Terms

  1. RF-SIFTER: Sifting Signals at Layer-0.5 to Mitigate Wideband Cross-Technology Interference for IoT

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ACM MobiCom '23: Proceedings of the 29th Annual International Conference on Mobile Computing and Networking
    October 2023
    1605 pages
    ISBN:9781450399906
    DOI:10.1145/3570361
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 July 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cross-technology interference
    2. jamming
    3. IoT
    4. low-power wireless networks
    5. beamforming

    Qualifiers

    • Research-article

    Conference

    ACM MobiCom '23
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 440 of 2,972 submissions, 15%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)296
    • Downloads (Last 6 weeks)13
    Reflects downloads up to 07 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media