Sei sulla pagina 1di 7

of involved devices with sensing, processing, and

Green Industrial
communications capabilities, consume substantial
amounts of energy and lead to an increasing car-
bon footprint. On the other hand, IIoT systems

Internet of Things Architecture: typically consist of low-power devices support-


ed by batteries, which constrains the continuous
operations of IIoT systems.

An Energy-Efficient Perspective Recently, various challenging issues in IoT


systems have been investigated. The authors in
[1] proposed an architecture that addresses the
The authors focus on the sense entities domain where huge amounts of energy are consumed by heterogeneity and inter-operability in IoT. The
a tremendous number of nodes. The proposed framework includes three layers: the sense layer, authors in [2] proposed a conceptual system
the gateway layer, and the control layer. This hierarchical framework balances the traffic load and skeleton to tackle the flexibility and extendibility
issues. More recent advances in green IoT can be
enable a longer lifetime of the whole system. found in [3]. In this article, we adopt an architec-
ture for energy-efficient IIoT, which is comprised
Kun Wang, Yihui Wang, Yanfei Sun, Song Guo, and Jinsong Wu of a sense entities domain, RESTful service hosted
networks, a cloud server, and user applications [4].
Further, energy efficient mechanisms are pro-
posed in the sense entities domain that conform
to the system architecture.
A bstract In the IIoT domain, data collection rely heavily
on the massive sensor nodes and smart devices.
The Internet of Things (IoT) can support col- Thus, optimizing sensing, processing, and commu-
laboration and communication between objects nications for IoT devices may effectively reduce
automatically. However, with the increasing num- energy consumption [5]. Being the backbone of
ber of involved devices, IoT systems may con- IIoT systems, wireless sensor networks (WSNs) are
sume substantial amounts of energy. Thus, the the main source of energy consumption. There
relevant energy efficiency issues have recently are four types of topological structures for the
been attracting much attention from both aca- deployment of large scale WSNs: mesh, plane,
demia and industry. In this article we adopt an hierarchical, and hybrid. Both the exact deploy-
energy-efficient architecture for ment scheme for mesh WSNs
Industrial IoT (IIoT), which con- COMMUNICATIONS and the ad hoc deployment
sists of a sense entities domain,
RESTful service hosted networks,
a cloud server, and user applica-
ST A N D A R DS scheme for plane WSNs suffer
from limited overall lifetime. The
scheme for hierarchical WSNs,
tions. Under this architecture, we focus on the which places nodes in a tiered framework and
sense entities domain where huge amounts of limits communications among sensor nodes, can
energy are consumed by a tremendous num- improve routing efficiency dramatically and make
ber of nodes. The proposed framework includes the network more scalable and extensible. The
three layers: the sense layer, the gateway layer, hierarchy schemes for hybrid WSNs deploy nodes
and the control layer. This hierarchical framework in tiered ways even when direct communication
balances the traffic load and enables a longer life- among sensor nodes is available, which also limits
time of the whole system. Based on this deploy- the overall lifetime. In this article we adopt hierar-
ment, a sleep scheduling and wake-up protocol chical deployment and present a three-layer archi-
is designed, supporting the prediction of sleep tecture for the deployment of nodes and devices
intervals. The shifts of states support the use of in the sense entities domain. By distinguishing
the entire system resources in an energy-efficient nodes as sense nodes, gateway nodes, and con-
way. Simulation results demonstrate the signifi- trol nodes, the traffic loads can be balanced, and
cant advantages of our proposed architecture in thus network lifetimes may be prolonged. Our
resource utilization and energy consumption. architecture differs from those in previous studies,
since a link traffic balance constraint is proposed
I ntroduction in order to reduce excessive energy consumption.
With the rapid development of industrial infor- Based on the proposed three-layer framework,
matization, the Internet of Things (IoT) has been we improve energy efficiency by proposing a novel
considered an extremely important and promis- sleep scheduling protocol, in which the prediction
ing component of the future transformation of of sleep intervals is first taken into consideration.
Kun Wang, Yihui Wang, and industrial systems. By leveraging radio-frequency The objective of the protocol is to switch some
Yanfei Sun are with Nanjing identification (RFID) and more general sensors, nodes to sleep mode when the nodes are not in
University of Posts and industrial plants and equipment may be protected working state and wake them up when required.
Telecommunications. The by high quality surveillance and control based on The sleep interval of the nodes is impacted by
corresponding author is
Yanfei Sun. a wide range of wireless and intelligent devices. many factors that we will discuss later. The wake
Industrial IoT (IIoT) systems are becoming more up protocol is presented correspondingly and the
Song Guo is with The Hong complicated with growing scales, which leads to a reprovision of resources is also mentioned.
Kong Polytechnic University. number of significant challenges that need to be Contributions: The contributions of our paper
Jinsong Wu is with the considered, such as increasing energy consumption. are summarized as follows:
Universidad de Chile. In the early stages, one of the purposes to • A system model for energy-efficient IIoT is
adopt IIoT was to reduce resource consumption adopted, which consists of a sense entities
Digital Object Identifier: and carbon emissions of industrial systems. How- domain, RESTful service hosted networks, a
10.1109/MCOM.2016.1600399CM ever, IIoT systems themselves, including a diversity cloud server, and user applications.

48 0163-6804/16/$25.00 © 2016 IEEE IEEE Communications Magazine — Communications Standards Supplement • December 2016
• In the sense entities domain, we design a
three-layer hierarchical framework to realize
the deployment of nodes in IIoT, achieving
the goal of saving energy and increasing net- Virtual
work lifetimes. environment
• Based on the aforementioned architecture, Application
Application
we develop an activity scheduling mecha- server
nism to switch nodes to sleep mode and
wake them up when required based on the OS
calculation of sleep interval.
The remainder of our article is organized as fol- Hypervisor
Interface
lows. We describe the system model developed
for energy-efficient IIoT. We present the three-lay-
er framework for the deployment of nodes in the
proposed model. We demonstrate the activity Cloud server
scheduling and wake up mechanism on the basis
of the predicted sleep intervals. We demonstrate
the experimental results and conclude this paper.

Energy-Efficient IIoT Architecture Constrained


RESTful
The overall architecture toward energy-efficient environment
IIoT is illustrated in Fig. 1, which is comprised of
a sense entities domain, RESTful service hosted
networks, a cloud server, and user applications. Client
Smart devices and nodes are deployed in the Networks
sense entities domain. To further optimize energy
savings, they are classified into sense nodes (SNs),
gateway nodes (GNs), and control nodes (CNs). CN
The network hosts RESTful web services and con- Admin
nects the sense entities with the cloud server. The GN
cloud server virtualizes objects, which then are
transferred to the server applications. Processing SN SN
and computation for the extracted data from the
sense entities domain are also made on the cloud Sense entities
server. The application server interface assists
the client to communicate with application serv- Figure 1. Energy-efficient IIoT architecture.
er without access to the server side codes, while
direct access can be made by the administration
(admin) node. as resources that are able to be accessed with
uniform resource identifiers. For resource-con-
Sense Entities strained environments, this RESTful service
IIoT networks involve sensor nodes and smart makes the applications lightweight, simple, and
devices that are Internet Protocol (IP) enabled fast [7]. Our proposed RESTful service networks
and RFID attached. Compared with smart may serve as a bridge between physical sense
devices, sensor nodes have strict energy con- entities and virtual objects. They receive the
straints due to their dependence upon batteries. specification data from the sense entities side,
Although there are differences between their such as product ID, device IP address, or device
capabilities in terms of memory and processing, features, and notify the cloud sever to create
for the convenience of discussion and without the virtual objects with the semantic description
loss of generality, we omit these differences. of the sense entities.
We adopt a novel deployment for these nodes
targeting the energy efficiency issue, which will Cloud Server
be discussed later. SNs collect the desired infor- In our energy-efficient IIoT architecture, the cloud
mation data from their interested area and send server includes the following two components.
them to GNs. Then GNs store the data in buf- Virtual Environment: Physical things, included
fer and forward them to CNs. Also, GNs run a in the sense entities domain, are virtualized for
protocol to calculate the sleep intervals of SNs, service lookup in the virtual environment. Then
which will be discussed in a later section. CNs the virtual objects are hosted and composited as
work as the manager to allocate resources under applications performed inside the virtual machine.
them and redirect the aggregated data to the Processing capabilities are also enhanced in
networks. Allocation of SNs to specific GNs is this way. In addition, the virtual environment is
also decided by the CNs. responsible for meshing up diverse objects to ini-
tiate composite ones, which are made regarding the
RESTful Service Hosted Networks system situations or service requests from the users.
Nowadays, REST methodology has been con- Further processing and computation of data
sidered [6] in many IIoT proposals, since it is also made in the virtual environment. The data
makes the integration and accessibility of the harvested by SNs are in large volumes and raw
heterogeneous devices easier and more conve- form. Thus, it is necessary to store, compute, and
nient. Thus, our network hosts a RESTful service analyze them and extract interpretable informa-
where functionalities and data are regarded tion. The virtual environment uses storage and

IEEE Communications Magazine — Communications Standards Supplement • December 2016 49


analytical technologies with the aid of the cloud
In our proposed computing platform. Control node
Application Server and Interface: The applica-
system architecture, tion server allows SNs to communicate with the Control
we focus on the sense client through the interface or via direct access layer
from the admin. The registry is made by tracking
entities domain where the services and physical entities that are available
within the entire IoT. Thus, activities in both the
intelligent collections physical and virtual environments can be moni-
of monitored data in tored, and notification will be sent to the autho-
rized user. Gateway
IIoT systems are made The server interface works as a protection of nodes

via massive nodes. the sever, preventing direct access from the cli- Gateway
ent application. This keeps the server code trans- layer
Thus, optimizing their parent to the client, preventing unnecessary and
potentially dangerous release of the code. How-
sensing, processing, ever, the admin is allowed direct access to the
and communications server in order to make necessary modifications.
This is also the interface that provides visualization
can efficiently reduce of the processed data derived from the raw data
energy consumptions. collected by SNs. Sensor
Sense
User Applications layer
RFID
Working as client side applications, the user appli-
Phone
cations can be classified into the following two Camera
categories according to the authentication mech-
anisms.
Client Applications: To use virtual objects host- Figure 2. Three-layer architecture of sensing entities
ed as applications in the virtual environment, the domain.
client uses application interface to send requests
to the server. Direct access is not allowed within information from the interested area are placed
this authentication. in the sense layer. Being responsible for data
Admin Applications: Unlike the client applica- collection, a SN senses the target environ-
tion, an admin application has the right to access ment and sends information to a GN. The SNs
the server directly. Then the admin can promptly are classified into trigger-based and periodic,
make necessary modifications to the system and according to the data collection and transmis-
monitor the performance of the whole system. sion frequency that are specified by a certain
application. The former transmit data only when
Three-Layer Framework of the a particular event occurs. Otherwise, they just
Sense Entities Domain wait. However, periodic nodes collect and
transmit information on the arrival of a query at
Design Goals regular intervals. Both types collect data in their
In our proposed system architecture, we focus buffers and transmit data via their communica-
on the sense entities domain where intelligent tion hardware.
collections of monitored data in IIoT systems Unlike sense nodes in other deployment
are made via massive nodes. Thus, optimizing schemes, we pursue the goal of saving energy
their sensing, processing, and communications and balancing traffic loads. Thus, in our deploy-
can efficiently reduce energy consumption. As ment, direct communications between SNs are
the backbone of IIoT systems, WSNs can be not allowed and must take GNs as relay nodes. A
a reference when things are deployed in IIoT. SN only sends the acquired data to and receives
However, compared with WSNs, IIoT achieves packets from its upper GN. For this, nodes in
a larger scale and involves much more het- IIoT are not necessary to implement sophisticat-
erogeneous devices, which in return calls for ed hardware or run complicated routing mech-
efficient and effective information collection, anisms, thus reducing computational complexity
processing, and communication approaches. and system cost.
To address the mentioned problems, in this Gateway Layer: The gateway layer is a col-
paper we follow the hierarchical deployment lection of nodes with relatively high processing
and arrange nodes in a three-layer approach in capabilities to run a relatively complicated routing
the sense entities domain for the deployment protocol and thus work as the state managers for
of nodes in the IIoT based on our proposed the lower SNs. GNs also serve as relays to for-
architecture. ward the data harvested by their SNs to the cloud
server through CNs for further computation and
Three-Layer Framework processing. In the scenario discussed in the next
We place nodes involved in the IIoT in a hierarchi- section, a GN can calculate the sleep intervals of
cal style with static routing configuration, avoiding the SNs connected to it. There is no constraint on
a complex routing protocol as suggested in [8]. communications between two GNs.
The three layers of our architecture are illustrated Control Layer: In the control layer, there are
in Fig. 2, i.e., from bottom to top, the sense layer, CNs that serve as the manager of GNs. In addi-
the gateway layer, and the control layer. tion to transmitting data harvested by SNs to the
Sense Layer: Nodes to collect the desired cloud server and fetching required information

50 IEEE Communications Magazine — Communications Standards Supplement • December 2016


from the upper layer, CNs decide the allocation
of SNs to GNs based on many factors that will be
Sleep Scheduling and Wake Up Protocol The application server
discussed later. Protocol Overview allows SNs to commu-
Communication Mechanism In our proposed architecture, the sense entities nicate with the client
Based on the aforementioned architecture, we domain is comprised of battery-powered nodes,
propose the communication mechanism for any which are responsible for energy-consuming data through the interface
two nodes. First, we formulate the communica- processing and communications. We improve the or the direct access
tion scenario as follows. Let m and n be two energy efficiency via sleep scheduling, of which
nodes in the system and S be the set of SNs. the objective is to switch some nodes to sleep from the admin. The
Also denote G and C as the collection of GNs mode during their inactive periods and wake
and CNs. Let r be the communication radius of them up when required. Unlike what has been registry is made via
each node and d(m, n) as the distance between done in other works, we make the sleep interval tracking the services
m and n. The communication mechanism can be predictable according to the usage history and
outlined as follows: remaining battery level of the nodes. The pre- and physical entities
1. For any m  S,n  S, communications dicted value in return boosts the utilization of all that are available
between m and n are not allowed. the resources in IIoT via reprovisioning the allo-
2. For any m  S,n  G, if d(m, n)  r, the data cated resources to other nodes in active mode. within the whole IoT.
transmission process between m and n can Although the authors in [11] proposed a method
be made. to improve energy efficiency by prolonging the Thus, activities in both
3. For any m  G,n  G  C, if d(m, n)  r, m sleep period of nodes, the mechanism to predict physical and virtual
and n can reach each other. the sleep interval of a node was not available.
environment can be
System Deployment Constraints Sense Nodes
In such a hierarchical system, we provide two On the side of a SN, it is said to be “active”
monitored and notifica-
constraints when deploying energy-efficient IIoT. when it is of high energy, sensing and transmit- tion will be sent to the
Based on our architecture and the constraints, a ting data to a GN. When turning off its transceiv-
comprehensive optimization of the deployment ers, it switches to a low-energy state called sleep authorized user.
of IIoT can be achieved. mode and stays in sleep mode until a wake-up
Energy Consumption Constraint: The ener- signal sent by the GN is received. A SN can be
gy consumption in data communication is much switched off for a long duration of time when it
higher than in data sensing and processing in IIoT. is not necessary to sense the target environment.
Thus, for discussion simplicity, in our architecture There are three situations in which a GN sends a
we only consider energy required for transmit- wake-up signal. Two of them are when the sleep
ting and receiving data. According to the Friis free interval has expired and a query arrives. In these
space model [9], the energy consumption for a cases, the SN again senses the environment to fill
node to transmit information is affected by the its buffer. The third case is when a communica-
length of the data, the energy consumption of tion request is made by another SN, and the SN
radio electronics, and the distance between the receives the incoming data into its buffer. After
source and destination nodes. The energy con- the completion of this action, it switches back to
sumption of radio electronics also determines that the sleep mode. Thus, battery power can be used
for receiving data. Based on this analysis and the efficiently.
communication mechanism described above, the
energy expenditure of each node in the sense Gateway Nodes
layer, the gateway layer, and the control layer can Serving as storage media for the sensed data from
be calculated [10]. SNs and the controller of the connected SNs,
In particular, the receiving energy consump- GNs are the major contributors toward energy
tion of a SN can be omitted based on the fact saving. The sleep interval of a SN collected to a
that it only receives signal messages that are com- GN can be calculated in two steps [12]. First, the
parably small. GN obtains a predicted value based on the previ-
Link Traffic Balance Constraint: In our archi- ous usage history of SN. Second, the actual sleep
tecture, CNs serve as the manager of GNs as interval is calculated on the basis of the predicted
well as the “wired” bridge between sense enti- value and other various factors.
ties and cloud server. Thus, they have more Predicted and Actual Sleep Intervals: Let tin be
bandwidth than SNs and GNs and the band- the predicted value and Tin be the actual value of
width is not constrained at CNs. However, the the nth sleep interval of SNi. The GN obtains tin+1
wireless linked GNs must satisfy some require- by using the exponential average of the previous
ments. For a GN that communicates not only sleep intervals. Then the actual sleep interval can
with SNs in the bottom layer but also the neigh- be calculated by adding a factor rti to rtin+1.
boring GNs, the link must ensure that the sum- In calculating the predicted sleep interval,
mation of the transmitting and receiving data there involves both the past history in t in and
rates are under the maximum rate threshold. the latest information in Tin. The initial value t0 is
However, a SN and a CN with a single transmit- constant and based on each application.  is a
ting or receiving function only need to guaran- controlling parameter that determines the relative
tee that the data rate of this function process weight of the present and the past. When  = 1,
is under the maximum. With GNs of relative- this indicates the next sleep interval is just the
ly strong performance upon the SNs, they are last interval. When  = 0, this indicates the most
responsible for most of the traffic loads. Thus, recent scenario poses no effect on the next sleep
link flows balance can be achieved in this interval. It is the node type that determines the
three-layer approach. value of . For a trigger-based node, the value

IEEE Communications Magazine — Communications Standards Supplement • December 2016 51


mation from the target environment. Similar-
ly, the sleep interval will be prolonged if the
value does not deviate much.
Trigger-based nodes:
• Conflict factor ( i): There is a slight differ-
ence compared with the one in the period-
D
SN1 SN2 ic nodes that the occurrence places of the
Overlap trigger event decide the conflict area. There
area is a factor p i indicating the probability of
r the nonoccurrence of the trigger event in
SNi’s coverage area. With a lower pi, SNs are
more likely to cover the occurrence place of
the trigger event and their sleep interval will
Figure 3. SNs’ coverage area overlaps. be reduced, and vice versa.
• Battery level (Ei): For trigger-based nodes, it is
more important to sense when the trigger is
fired in order to save energy. However, the
Noncritical
sleep interval will be prolonged when the bat-
tery level is rather low to gain a whole lifetime
increase from the system perspective.
Sleep interval A query Communication Wake up Mechanism: With the calculated
expires? No reaching? No request?
value, GN sends a signal to wake up the SN when
the sleep interval expires. On the third occasion
that an SN wants to talk to another, the commu-
nication is carried out via a GN, as shown in Fig. 4.
The sender node indicates the communication
type as critical, calling for an immediate action.
Yes Yes Critical Noncritical communication refers to the case
where the contained information from the com-
municated message can be dealt with in the near
future. Based on this, when a SN wants to talk to
another SN in sleep mode, the GN will check the
Send a
type of the information. When it is critical, a wake-
wake-up up signal is sent immediately to guarantee no pack-
signal et loss. Otherwise, the GN saves the information
from the sender SN and forwards it when the SN
wakes up. Thus, it is the GN that helps efficiently
utilize energy by switching the state of the SNs.
Figure 4. Wake up mechanism.
Control Nodes
is close to 0, since the occurrence time of the When it comes to CNs, we mainly focus on their
trigger event is based on past experiences. For a control over GNs. They relay the information col-
periodic node, the value is close to 0.5, providing lected by SNs to the cloud server. Any required
that the present and past scenarios are consid- information is passed on to GNs through CNs.
ered equally important. Then calculating the actu- In other words, they set up a bridge between the
al sleep interval, there is a factor rTi indicating cloud server and sense entities.
the change of sleep interval. Whether the value In addition, the allocation of SNs to GNs is
is zero, positive, or negative depends on various decided by a CN based on the battery level of
factors for the node type. the GNs and the distance between the SNs and
the GNs. The allocation of SN i to GN j is then
Factor r T i in Two Node Types: The r T i is calculated using d(i, j), which shows the distance
affected by the factors varying with the node type. between SNi and GNj and Ej, which is the battery
Periodic nodes: level of GNj that is under the control of the CN.
• Conflict factor (i): There is a possibility that When there is a battery level shift occurring at any
the coverage area of nodes may overlap, GN, the CN calculates a(i, j) again.
as shown in Fig. 3. Thus  i calculates the In this way, the CN acts as a manager to bal-
amount of SNi’s overlapped region using r ance the loads of the system and thus obtain an
and Dij, where r represents the coverage of efficient utilization of the resources.
SN and Dij stands for the distance between
SNi and SNj. Performance Evaluation
• Battery level (Ei): With a high battery level, an In this section, the evaluation is given to validate
SN can have a short sleep interval. On the the effectiveness of our proposed architecture
other hand, a longer sleep interval comes measured by resource utilization and energy con-
with a decrease in battery level for energy sumption.
efficiency.
• Coefficient of variation (CoV): The changes Experimental Setup
between the previously and currently sensed We deployed 300 nodes in a 100  100 m 2
values are monitored by GNs. If a notable region and they included 250 SNs and 50 GNs.
variation is detected, the sleep interval will The server at the lab acts as the CN and the cloud
be decreased to allow SNs to collect infor- server. Among the SNs, there are both periodic

52 IEEE Communications Magazine — Communications Standards Supplement • December 2016


100 1e7
1.0
Original Optimized
Optimized Original

80 0.8
Resource utilization rate (%)

Energy consumption (nJ)


60 0.6

40 0.4

0.2
20

0.0
0 0 0 0 0 0 0 0 0 00 00 00
0 20 40 60 80 100 120 140 160 180 30 60 90 120 150 180 210 24 27 30
Time (min) Number of nodes
(a) (b)

Figure 5. Experimental results: a) Resource utilization; b) Energy consumption.

nodes and trigger-based nodes. The assignment regarding the nodes, a sleep scheduling and wake
of each SN to a spcific GN is calculated by the up protocol has been proposed. By calculating
CN, and the energy-efficient algorithm is running the sleep interval of SNs, the GN can change the
at the GN’s side. Data collected by the SNs are state of SNs for the purpose of efficient energy
sent to the data center that hosts Hadoop via utilization. Meanwhile, the CN decides the alloca-
their GNs. The conflict factor is assumed to be tion of SNs to GNs. An evaluation has validated
zero. Given the number of nodes that may be the effectiveness of our architecture in improving
at a low level, we use a bootstrapping technique resource utilization and energy consumption.
[13] to bootstrap nodes 300 to 3000. Then, the
performance of these nodes is observed within a Acknowledgment
180-minute experiment, with and without calculat- This work is supported by NSFC (61572262); the
ed sleep intervals. To determine the scalability, we NSF of Jiangsu Province (BK20141427); NUPT
repeat the experiment with a varying number of (NY214097); the Open Research Fund of the Key
nodes. After that, resource utilization and energy Lab of Broadband Wireless Communication and
consumption are measured and shown in Fig. 5a Sensor Network Technology (NUPT), the Minis-
and Fig. 5b, where the optimized curve stands for try of Education (NYKL201507); the Qinlan Proj-
the results of adopting our proposal based on the ect of Jiangsu Province; the ERANet LAC Project
original ones. (ELAC2015/T10- 0761); and CONICYT FONDEF
(ID16I10466).
Performance Analysis
As shown in Fig. 5a, considerable improvement References
in resource utilization is achieved due to the strict [1] C. Sarkar et al., “A Scalable Distributed Architecture Towards
schedule of mode switching using predicted sleep Unifying IoT Applications,” Proc. IEEE World Forum on Inter-
net of Things (WF-IoT), Mar. 2014, pp. 508--13.
intervals for nodes. Figure 5b shows the architec- [2] J. Leu, C. Chen, and K. Hsu, “Improving Heterogeneous
ture’s scalability, as a significant amount of ener- SOA-based IoT Message Stability by Shortest Processing
gy can be saved by increasing the number of Time Scheduling,” IEEE Trans. Services Comp., vol. 7, no. 4,
nodes. This is due to the fact that as the network Oct. 2014, pp. 575--85.
[3] C. Estevez and J. Wu, “Recent Advances in Green Internet of
becomes larger, our architecture will play a more Things,” Proc. IEEE Latin-American Conf. Commun. (LATIN-
important role in optimizing energy consumption. COM), Nov. 2015, pp. 1–5.

Conclusions
[4] S. F. Abedin et al., “A System Model for Energy Efficient
Green-IoT Network,” Proc. Int’l. Conf. Information Network-
ing (ICOIN), Jan. 2015, pp. 177–82.
With the emerging applications of IoT [14, 15], [5] H. Chao, Y. Chen, and J. Wu, “Power Saving for Machine to
it may be adopted to protect industry plants via Machine Communications in Cellular Networks,” Proc. IEEE
control and surveillance, which in turn will intro- GLOBECOM Wksps., Dec. 2011, pp. 389–93.
duce critical energy consumption issues. From [6] Z. Sheng et al., “Recent Advances in Industrial Wireless Sen-
sor Networks Towards Effcient Management in IoT,” IEEE
the perspective of energy saving in industry, we Access, vol. 3, June 2015, pp. 622–37.
adopted an architecture composed of a sense [7] P. Li, S. Guo, and J. K. Hu, “Energy-Efficient Cooperative
entities domain, RESTful service hosted networks, Communications for Multimedia Applications in Multi-Chan-
a cloud server, and user applications. Then, to the nel Wireless Networks,” IEEE Trans. Computers, vol. 64, no.
6, June 2015, pp. 2670–279.
massive deployments of nodes in the sense enti- [8] G. Han et al., “Cross-Layer Optimized Routing in Wireless
ties domain, we presented a three-layer architec- Sensor Networks with Duty Cycle and Energy Harvesting,”
ture that includes a sense layer, a gateway layer, Wireless Commun. and Mobile Comp., vol. 15, no. 16, Mar.
and a control layer. By forbidding direct commu- 2015, pp. 1957–81.
[9] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan,
nication between two SNs and using GNs as relay “An Application-Specific Protocol Architecture for Wireless
nodes, the proposed structure may save energy Microsensor Networks,” IEEE Trans. Wireless Commun., vol.
and prolong the lifetime of the system. Moreover, 1, no. 4, Oct. 2002, pp. 660–70.

IEEE Communications Magazine — Communications Standards Supplement • December 2016 53


[10] J. Huang et al., “A Novel Deployment Scheme for Green Yihua Wang (benbenc2010@163.com) is a graduate student
Internet of Things,” IEEE Internet of Things J., vol. 1, no. 2, with the School of Internet of Things at Nanjing University of
Apr. 2014, pp. 196–205. Posts and Telecommunications, China. Her current research
[11] J. Liang et al., “An Energy-Efficient Sleep Scheduling with interests include wireless sensor networks, embedded systems,
QoS Consideration in 3GPP LTE-Advanced Networks for and cyber-physical systems.
Internet of Things,” IEEE J. Emerg. Sel. Topics Circuits Syst.,
vol. 3, no. 1, Mar. 2013, pp. 13–22. Yanfei Sun (sunyanfei@njupt.edu.cn) received the Ph.D. degree
[12] N. Kaur and S. K. Sood, “An Energy-Efficient Architecture in information networks from the Nanjing University of Posts
for the Internet of Things,” IEEE Systems J., no. 99, Oct. and Telecommunications, Nanjing, China, in 2006. He has been
2015, pp. 1–10 . a professor with the School of Automation, Nanjing Univer-
[13] X. Bao et al., “Helping Mobile Apps Bootstrap with Fewer sity of Posts and Telecommunications, since 2006. His main
Users,” Proc. ACM Conf. Ubiquitous Computing (Ubicomp), research interests are in the areas of intelligent optimization,
Sept. 2012, pp. 491–500. network management, machine learning, and future networks.
[14] K. Wang et al., “LDPA: A Local Data Processing Archi-
tecture in Ambient Assisted Living Communications,” IEEE Song Guo [M’02, SM’11] (song.guo@polyu.edu.hk) received a
Commun. Mag., vol. 53, no. 1, Jan. 2015, pp. 56–63. Ph.D. degree in computer science from the University of Otta-
[15] K. Wang et al., “Mobile Big Data Fault-Tolerant Processing wa, Canada. He is a full professor in the Department of Com-
for eHealth Networks,” IEEE Network, vol. 30, no. 1, Jan. puting, The Hong Kong Polytechnic University. His research
2016, pp. 1–7. interests are mainly in the areas of wireless communication
and mobile computing, cloud computing and networking, and
Biographies cyber-physical systems. He serves as an associate editor of IEEE
Kun Wang [M’13] (kwang@njupt.edu.cn) received the B.Eng. TGCN and IEEE TETC. He is a senior member of ACM.
and Ph.D. degrees from the School of Computer, Nanjing Uni-
versity of Posts and Telecommunications, Nanjing, China, in 2004 Jinsong Wu [M’99, SM’11] (wujs@ieee.org) is with the Depart-
and 2009, respectively. From 2013 to 2015 he was a post-doctor- ment of Electrical Engineering, Universidad de Chile, Santia-
al fellow with the Electrical Engineering Department, University go, Chile. He was the lead editor and a co-author of the book
of California at Los Angeles (UCLA), CA, USA. In 2016 he was a Green Communications: Theoretical Fundamentals, Algorithms,
research fellow with the School of Computer Science and Engi- and Applications (CRC Press, 2012). He is the founder and-
neering, University of Aizu, Fukushima, Japan. He is currently an founding chair of the Technical Committee on Green Commu-
associate professor with the School of Internet of Things, Nanjing nications and Computing (TCGCC) of the IEEE Communications
University of Posts and Telecommunications. His current research Society, which was established in 2011 as an official Technical
interests are mainly in the area of big data, wireless communica- Subcommittee (TSCGCC) and elevated as TCGCC in 2013. He
tions and networking, smart grid, energy Internet, and information is an associate editor of IEEE Communications Surveys and Tuto-
security technologies. He is a member of ACM. rials, IEEE Systems Journal, and IEEE Access.

54 IEEE Communications Magazine — Communications Standards Supplement • December 2016

Potrebbero piacerti anche