Escolar Documentos
Profissional Documentos
Cultura Documentos
I. I NTRODUCTION
The emergence of the Internet of Things has increased the
scale of the problems inherent to the energy restricted to the
nodes in the wireless networks. For the best performance of
the network, surveys are being produced during this decade in
order to decide the ideal transmission power for each node of
the network, causing this network to be connected and with
minimum of wasted power, thus increasing its Life time [1].
Instead of each node transmitting using the maximum power, it
is possible to redefine the power of the nodes in a collaborative
way, redefining the topology of the wireless network by the
relation between the neighbors under certain criteria [2].
Among the most recent proposals can be cited, Aziz et al.,
[3], which presents a topology control techniques to extend
battery life and energy efficiency in Wireless Sensor Networks
(WSNs) [4]. On the other, new challenges arise for keeping
communication effective and energy consumption low.
For this purpose, the LoRa targets deployments where enddevices have limited energy, where not need to transmit more
than a few bytes at a time [5]. The data traffic can be initiated
either by the end-device (a sensor) or by an external entity
wishing to communicate with the end-device (an actuator).
The long-range and low-power nature of LoRa makes it an
interesting candidate for smart sensing technology in civil
infrastructures (such as health monitoring, smart city, environment monitoring, etc.), as well as in industrial applications.
In order to use low frequency power shifting keying (FSK)
modulation as a physical layer, since this modulation becomes
efficient to achieve low power, the LoRa is based on Chirp [6]
Fig. 2.
C. DASH7
DASH7 is a stack protocol based on the interaction of
the OSI model where the sensor and actuator operates in
unlicensed band with 433 MHz, 868 MHz and 915 MHz [9].
DASH7 aims to provide communication over a range of up to
2 km, low latency, Mobility support, multi-layer battery, 128bit AES shared key encryption support, and data rate up to
167 Kbps. In addition, DASH7 extends and defines the stack
of protocols from the physical layer to the application layer.
III. L O R A OVERVIEW
The data link layer is responsible for delivery of frames
to the next hop destination. It also tries to correct any errors
introduced by the physical layer. This layer is often divided
into two layers: Medium Access Control (MAC) and Logical
Link Control (LLC). In the figure below, shown the recent
protocols of according with corresponding layer.
Fig. 1.
Fig. 3.
For basic architecture, according Figure 3, several components are defined in the LoRaWAN network as: end-devices,
gateways (i.e., base stations),the network server and applications.
1) The End-devices communicate with gateways using LoRa
with LoRaWAN.
2) The Gateways forward the LoRaWAN frames from
devices to a network server over a backhaul interface with
a higher throughput, typically Ethernet, 3G/4G, Ethernet,
satellite, or Wi-Fi.
3) The Network Server being responsible for decoding the
packets sent by the devices, perform security checks,perform
adaptive data rate, and generating the packets that should be
sent back to the devices.
4) Each application receive data of the network server,
where should decode the packets of security and use the
information for decide the action in your application.
Unlike traditional cellular networks, end devices are not
associated with a particular gateway to gain access to the
network. The gateways simply serve as a link layer relay and
route the packet received from the end devices to the network
server after adding information about the reception quality
(QoS). Thus, an end device is associated with a network server,
which is responsible for detecting duplicate packets, choosing
the appropriate gateway to send a response (if any), to the
end devices. Logically, the gateways are transparent to the
end devices.
B. Battery Lifetime
C. Network Capacity
In a long-range star viable network, the gateway must have
high ability to receive messages from a large number of
nodes. This high capacity is allocated using adaptive data rate
and using a multi-channel transmitter so that simultaneous
messages can be received.
Critical factors influencing this capability are:
The number of simultaneous channels;
The data rate;
The length of the payload;
The frequency that the nodes transmit.
A LoRaWAN network can be deployed with a minimal
amount of infrastructure and, with the capacity achieved in
the future, more gateways can be added, shifting data rates
by reducing the amount of overhearing to other gateways by
making the network scalable in 6-8x of the minimum capacity.
Other alternatives do not have the scalability of LoRaWAN
due to technology trade-offs, which limit downlink capacity or
make the downlink band asymmetric to the uplink bandwidth.
D. Device Classes
In a control or actuator application, the downlink communication latency is an important factor to decide the used
battery power. With purpose, the LoRaWAN utilizes different
device classes. The device classes trade off network downlink
communication latency versus battery lifetime.
LoRaWAN has three different classes of end-devices for
needs of used applications:
Fig. 5.
E. Security
This feature, security, is of extreme importance for future
IoT networks, since it will guarantee the operation of the
thing without external interruption. LoRaWAN uses two
layers of security: one for the network and another for the
application, as shown in Figure 6.
Fig. 6.
A LoRaWAN network solution comes with an authentication framework and security framework based on the AES 128
encryption scheme. The AES-128 key encrypts the frame for
confidentiality and generates MIC (Message Integrity Code)
for integrity, and each end device have key assign by the
device manufacturers or the application owner. Compared to
some other systems that depend on a single key for authentication and encryption, the LoRaWAN framework separates
authentication and encryption so that it is able to authenticate
packets and provide integrity protection.
V. C HALLENGES
There have a few articles related to LoRa in the literature. In
[12], [13], different long-range technologies, including LoRa,
are compared. Petajajarvi et al.[14] studied the coverage of
LoRa and proposed a channel attenuation model. This article
provide an overview and functional description of LoRaWAN,
given the semi-proprietary nature of LoRaWAN, because, parts
of the protocol are not well documented. In complementing
the work of this article, should be describe the follow issues
about analysis and performance evaluation of the protocol, as:
estimation of the collision rate, total capacity and channel
load, single device maximal throughput and MTU, scaling
networks to massive number of devices and mobility/roaming
, to propose possible solutions for performance enhancement.
VI. C ONCLUSION
LoRa is a long-range and low-power telecommunication
systems for the Internet of Things. The physical layer uses
the LoRa modulation, a proprietary technology with a MAC
protocol. LoRaWAN is an open standard with the specification
available free of charge [15].
This paper gives a analysis about the LoRaWAN protocol
based in the basic architecture, battery lifetime, network capacity, device classes and security.
It was determined that this protocol showed a 3 to 5-fold
advantage compared to all other technology options in rela-