LCBA
LCBA
ABSTRACT A wireless sensor network typically comprises of heterogeneous nodes with varying sampling
rates and sample sizes. IEEE 802.11ah supports up to 8192 sensor nodes, offering a data rate of
approximately 16 Mbps from an individual access point. It utilizes a feature called Restricted Access Window
(RAW) in the MAC protocol; a limited number of nodes are assigned to access the channel at a designated
time to reduce contention. However, most of the existing mechanisms do not account for this heterogeneity,
and they randomly group the nodes. In this work, we introduce a Load Balanced Channel Allocation (LBCA)
algorithm for a large heterogeneous sensor network. This algorithm collects the sampling interval and sample
size from the node and identifies the appropriate group based on the fuzzy logic approach. We calculate the
grouping probability (GP) for each RAW and assign the node to the RAW with the highest GP. The number
of nodes, the standard deviation of RAW utilization ratio among the groups and the average transmission
efficiency rate were considered as the input parameters for the fuzzy logic. We simulated this work using
ns-3 simulator and evaluated the performance against random grouping in terms of improvement in channel
utilization of around 7.65%, throughput by 1.37%, decrease in collision rate by 16.42% and minimization
of delay by about 8.57%. These results highlight the effectiveness of the LBCA algorithm in achieving load
balance along with efficient channel utilization.
INDEX TERMS Channel utilization, transmission efficiency, grouping, heterogeneous, IEEE 802.11 ah,
traffic.
it lacks adaptive load-balancing and traffic differentiation average of 6% and 4% over other grouping methods but may
capabilities. The machine learning-based model is developed lack flexibility for varying traffic loads.
in [9] to optimize RAW and station grouping parameters The sector-based device grouping scheme utilizing a
for the network operating with dynamic traffic conditions. spatial orthogonal access mechanism is introduced in [17].
The method has significant improvement in throughput, The result showcase substantial improvement in through-
minimization in delay and execution time of about 13.53%, put, reduction in the system delay and frame collisions
18.01%, 30.32% over TAROA and 52.88%, 70.88%, 41.65% when compared with conventional grouping mechanisms
over 802.11ah, but is contingent on predefined conditions. yet fixed sector allocations limit adaptability in dynamic
Additionally, authors in [10] developed an algorithm in which scenarios.
the scheduling for channel access were done with the help To solve the problem due to system irregularity a grouping
of RBT values of the station and the RAW is composed algorithm is developed in [18] utilizing the data rate and
of two phases. TRC-RBT-GC enhances system performance incorporating constraints like overhead with the motive to
by utilizing efficient claiming RAW/slot mechanisms and improve throughput and to optimize the performance but it
incorporation of load balancing among RAW slots. Yet may fall short amid rapid rate fluctuations in high-density IoT
limited by static scheduling that doesn’t account for rapid settings, resulting in performance limitations.
traffic changes.
The TAROA algorithm stated in [11] is designed to
adapt the RAW parameters based on traffic conditions, C. HIDDEN NODE MANAGEMENT
execution takes place at each target beacon transmission The challenges faced due to network non-uniformity in
time and parallelly communicate the RAW parameters to the IEEE 802.11ah IoT networks was addressed by sector-based
corresponding stations. It excels in terms of throughput for grouping in [19]. The strategy leverages adjustable cen-
dense networks, but may struggle with highly variable traffic. tral angles and incorporates three distinct criteria’s to
The spectral-based clustering introduced in [12] illustrates provides fair communication among STAs by mitigating
the grouping in RAW without relying on the geographic the hidden terminal problem, enhances overall network
data. The mechanism utilizes density levels, traffic patterns, throughput. The critical issues in Wi-Fi Halow standard
and propagation models, enhance the throughput, delay, and while supporting the sensor network applications is alleviated
collision rate over IEEE 802.11ah, K-Means Clustering and by designing hidden matrix-based regrouping algorithm
hidden matrix-based regrouping. However, its applicability in [20]. The detection of hidden node and regrouping
to dense IoT networks with diverse traffic characteristics of the same was done with the help of hidden node
remains limited. matrix. It shows superior performance than standard IEEE
802.11ah grouping in terms of minimizing hidden node
pairs and enhancing PS-Poll transmission times but not
B. GROUPING STRATEGIES catering to adaptive load-balancing for diverse traffic
A priority class-based grouping (PCG) algorithm was devel- profiles.
oped by [13] to solve the issues like starvation of lower- Another method is demonstrated in [21] combine two
priority stations. It makes use of the Service Characteristic scenarios: minimizing collisions and employing a grouping
field, making low priority STAs get adequate access, algorithm with prior knowledge of hidden devices to optimize
enhances overall throughput. PCG had better aggregate network performance but limiting scalability. The throughput
saturation output over random grouping mechanism, but has notable improvement of about 139% and 146% for 6 and
does not address dynamic traffic in dense, heterogeneous 8 groups. According to [22] the Max-Min fairness constraint
networks. Authors in [14] utilize the SOM neural network to was utilized to group stations being NP-hard in nature ACO
group devices based on their transmission rates using DGML is used to arrive at the best solution. It shows increase of
algorithm at a learning rate of 0.5, leveraging decapsulated 37% in minimum throughput per station, 40% in overall
PLCP after association phase. When compared with the throughput, and 11% reduction in count of hidden terminals
uniform grouping scheme, it improves average throughput over K-Means but the computational demands make real-time
and overcome a performance anomaly, though its complex application challenging.
training process limits real-time adaptability. To address the above said issue, [23] introduces Signal
The optimal traffic grouping algorithm (OTGA) along with Strength Assistant (SSA) grouping. In this method, multiple
the incorporation of branch and bound method is introduced Reference Nodes (RNs), each located at known positions,
in [15] to achieve optimal solution. Additionally heuristic were used to broadcast beacon signals. The simulation results
traffic sensor mapping algorithm is included to ensure a show that the SSA grouping cause reduction in hidden nodes
balance in traffic demands but struggles with real-time traffic thus reducing collision probability of about 0.05% over RG
variations. The expected traffic demands of a sensor is but lacks adaptability for shifting traffic. The approach pre-
taken by [16] to group them and the contention success sented in [24] focuses on handling the hidden node problem,
was analysed. Ensuring effective mitigation of biased traffic by incorporating regrouping strategy. MHPA initially identify
distribution, provides an improvement in channel utilization’s the nodes hampered by the hidden node problem, then
perform regrouping. It proved to be very useful for dense net- D. HETEROGENEOUS TRAFFIC CONDITIONS
works having up to 8000 nodes achieving 97.8% reduction in Surrogate modelling named Model-based RAW Optimization
hidden pairs yet does not fully balance throughput and energy Algorithm (MoROA) was developed in [26] for optimizing
efficiency across varied traffic. The hidden terminal aware RAW configurations in case of dense heterogeneous environ-
grouping algorithm devised in [25] uses the SNIR parameter ment by utilizing the multi-objective optimization approach.
to mitigate hidden terminal. An analytical model is developed Specifically, it enhances throughput by 65% and achieves
to evaluate and analyse the effectiveness of this approach 96% lower energy consumption. ETAROA improves the
with existing methods in terms of throughput, latency, and throughput by 5.3% and energy efficiency by 32.4%.
energy efficiency. But the notable drawback is SNIR depen- The grouping model reported at [27] utilizes RNN along
dency may hinder adaptability for heterogeneous device with LSTM to perform the grouping in an intelligent way by
capabilities. exploiting the concept of cluster head formation. It provides
enhancement in energy efficiency by up to 88.7%, increase grouping methodology by leveraging fuzzy logic to achieve
in network stability of up to 90.8%, improves network load balancing by optimizing the channel utilization while
scalability by up to 87.1%, reduction in congestion level of considering the heterogeneous traffic condition of the devices
up to 18.3%, and boosts Quality of Service in the range of in the network.
93.4%.
The algorithm for authentication control has been devel- III. PROPOSED SYSTEM
oped in [28] to minimize the association delay by considering Applications running in wireless sensor networks uses sen-
the best group size parameter as major constraint. Results sors with varying sampling rates and sample sizes depending
show notable reduction in total association time by factor of on several factors, including the type of sensor being used,
2.45 and 1.3 when compared with the group sizes of 30 and the application requirements, and the available network
10 respectively. Due to randomness, access windows of the resources. The sampling interval (SI) refers to the interval
nodes will lead to many hidden node collisions, which will between two consecutive samples measured by sensor node.
hamper the energy efficiency. It is typically represented in seconds (s) or minutes (min).
The load-balanced sensor grouping mechanism is pre- The sample size in a wireless sensor network (WSN)
sented in [29] aim to group sensors based on their het- depends on the type of data being collected and requirements
erogeneous traffic demands and were assessed using two of the application. The sample size can range from a few
parameters: Sampling rates and packet size. Notably, this bits to several kilobytes or even megabytes, depending on the
method achieved a 15% increase in channel utilization sensor and the data it is collecting. For example, a temperature
compared to random grouping but may falter in high-density sensor may collect data at a sample size of a few bytes per
traffic. The genetic algorithm-based grouping strategies were reading, while an image sensor may capture data at a sample
utilized in [30] for enhancing throughput and fairness in RAW size of several kilobytes or megabytes per image.
mechanism with heterogeneous traffic, but is too complex for Similarly, an acoustic sensor may capture data at a sample
real-time use. size of a few kilobits to megabits per second, depending on
Combining the MADDPG framework with NOMA, the sampling rate and resolution. In this work we assumed that
in [31], user association, power control and cache design the sensor nodes generate data for transmission in periodic
are jointly optimized to enhance energy efficiency in a intervals of time which is then transmitted to the access point.
dynamic terrestrial-satellite network. Yet, it has limitations on The access point first gathers the sample size and sampling
scalability and cannot adapt in real time for complex models interval as input parameters from sensor node through
involving satellites. The freshness-aware seed selection association request message. It applies proposed grouping
method presented in [32] is based on the assumption that stale algorithm to determine appropriate RAW and then assigns
content cannot satisfy cellular traffic offloading in OMNs, AID to the node or station based on selected RAW and update
and proposed a decay-based approach followed by a greedy the same through association reply.
one to facilitate efficient content propagation. However, While this approach is not standard for Wi-Fi, it allows
it does not perform well for dynamic user mobility adaptation the AP to optimize the assignment of the Restricted Access
and has high computational costs in large networks. Window (RAW) by applying our grouping algorithm using
The above Table 1 summarize the survey, outlining this additional data. The assignment of the Association ID
their grouping methods, simulation tools employed, and (AID) is deferred until after assessing these data properties
specific criteria utilized for grouping. The table highlights to enhance data transmission efficiency, thus optimizing
the algorithms used in comparative studies with which channel access based on specific traffic characteristics for
the evaluation has been done. Additionally, it lists the improved network performance. Additionally, this process
performance factors improved in the respective algorithms is conducted post-authentication of the node, addressing
such as mitigating interference (I), minimizing latency (L) or any security concerns associated with data exchange during
to enhance throughput (T). association. While our approach deviates from standard
The existing works discussed in the survey so far provides Wi-Fi HaLow mechanisms, it is designed to meet the unique
insight into the advancements progressed in the grouping requirements of our study.
methods for sensor network utilizing IEEE 802.11ah stan- The complete architecture of the proposed grouping
dard. The wide range of approaches has been designed to algorithm is described in Figure 4 which gets executed by
enhance the network performance factors but several crit- AP while associating the node. The entire process involves
ical gaps persist. Many approaches consider homogeneous the selection of RAW for assigning the node in an efficient
scenarios and incorporate static grouping mechanisms in way using the fuzzy logic approach named Takagi-Sugeno.
dynamic network conditions, which can lead to performance The initial stage starts by gathering information about the
degradation and lack adaptability. The goal of the novel node participating in association process through association
system is not only to address the limitations faced by request sent by them to the AP. Thus, sample interval and
existing grouping algorithms also develop an effective one sample size are extracted from the association request through
which adapt in real-time and to dynamic network conditions. the header field. The updated association request frame were
Our proposed algorithm’s motive is to design an intelligent shown in Figure 3. Sample interval is specified in terms of
Pseudocode for calculating SD provides an overview of the process carried out using fuzzy
1. Initialize logic to arrive at selecting the group with a higher probability.
2. n ← Number of fixed RAW The fuzzy logic is incorporated to handle the uncertainty
3. m ← Number of Nodes in the network and to make decisions intelligently by
4. for i ← 0 to m do: considering various input parameters. The major factors
5. RUR[j] ← RUR[j] + RURNi that need to be taken into account while performing group
6. Calculation of meanRUR allocation are traffic demand, channel resources, and effective
7. S=0 allocation mechanism. So, the inputs are taken as the number
8. for k ← 0 to n-1 do: of nodes which depicts the traffic, the standard deviation
9. sum=S+RUR[k] among RAW’s RUR is taken, which illustrates the deviation
10. meanRUR ← sum/n among RAW during utilization of the channel resource
11. Calculate variance and last one is the average transmission efficiency rate
12. sumsquareddiff ← 0 among the RAW in channel demonstrating that how well the
13. diff ← RUR[j] - meanRUR nodes were participating in transmission. The fuzzy logic
14. squareddiff ← diff * diff with all these parameters optimizes the grouping process
15. sumsquareddiff ← sumsquareddiff + squareddiff effectively by converting the crisp input into fuzzy values
16. variance ← sumsquareddiff / n then employs fuzzy rules to assess the situation and make
17. Calculate standardDeviation a decision about which RAW should be allocated based on
18. standardDeviation ← SquareRoot(variance) the input combinations and finally provides the grouping
probability by converting the fuzzy values into crisp values.
This approach allows refinement based on the demand and
from line 8 where the nodes get added among RAW in the enhances flexibility, thus improving network performance.
range of k to n-1. The sum used for calculating the mean is The fuzzy process flow involves four phases namely
updated by adding the RUR[k] with the S as mentioned in fuzzification, AND operation, Rule-based system, and
line 9. The meanRUR is then calculated as the average was defuzzification by centroid method which is described in
taken over the updated sum with the range executed in loop detail in the following sections.
condition as described in line 10. From line 11 the calculation
for variance will commence. The sumsquareddiff is set to
zero as in line 12 during the initial stage when the nodes are
not added. The difference between RUR[j] and meanRUR is
computed in line 13 as a term named diff, it gets squared as in
line 14 and mentioned as squareddiff . The squared value gets
added with the sum squared values to attain the updated value
of sumsquareddiff as in line 15 and the loop ends. Dividing
sumsquareddiff by the number of RAW yields the variance
that was mentioned in line 16. Then begins the computation of
standard deviation in line 17. Finally, the standard deviation
is evaluated as the square root of the variance which is given
in line 18 and the algorithm ends.
The block CHj mentioned in Figure 4 gets executed for
FIGURE 5. Fuzzy architecture.
each RAW whenever the node is sending association request
to AP. The number of nodes in the RAW is initially taken to
be zero and gets updated after the addition of each node in
the group. The first input parameter in fuzzy architecture is D. FUZZIFICATION
the number of nodes, second one is the standard deviation of The fuzzification is carried out using the membership
RUR among the groups which is estimated using algorithm function on the input parameters after being fed to the fuzzy
described above and the last one is the average TER of the network. The membership function for the number of nodes
RAW which is calculated using the transmission efficiency was given in Figure 6 with three categories to represent
rate of the individual nodes added from Eq.(6). the values, first the function is trapezoidal which indicates
P the range is small, and the second function is triangular for
TERN i a range of medium number of nodes and the last one is
ATER = (6)
n trapezoidal for representing higher range.
This procedure is repeated for all groups sequentially using The equations are detailed in Eqs.(7), (8), and (9) which
the CHj block by maintaining the values constant for groups break down the function µSmall , µMedium , andµHigh along
where the node is not added and changing the values for the with their corresponding limits. These functions are used for
group where it gets added. The fuzzy architecture in Figure 5 performing the fuzzification process to categorize the number
value being zero and values from low to high represents the
slope line from zero to one and value 1 to represent the high
value at the end of the function which maintains a straight
line at position 1. The triangular function has four constraints
which include the starting point of zero value and followed by
two slope lines one rising from zero to one and another one
descends back from one to zero and at last the point ending
at zero.
(8)
µHigh
0 x ≤ ((minn + maxn )/2)
x − ((minn + maxn )/2)
((minn + maxn )/2) < x
= ((maxn − minn )/2)
≤ maxn
1 FIGURE 8. Membership function for transmission efficiency rate.
x ≥ maxn
(9) The membership function of the grouping probability is
displayed in Figure 9 with the values spanning from min-
Where imum, normal, maximum, and extreme, by two trapezoidal
µ : MembershipValue and two triangular functions.
minn : MinimumNumberofthenodesamonggroups
max n : MaximumNumberofthenodesamonggroups
F. AND OPERATION
The membership functions are utilized to transform the crisp IV. RESULTS AND DISCUSSION
input values into fuzzy values and those values are fed to The simulation parameter utilized in the network simulator
architecture for performing all possible combinations among is mentioned in Table 3 describes the duration and size
the inputs to formulate the rules R1, R2 and R3. The grouping of necessary parameters used during simulation. The plots
probability value is derived from the AND operation to arrive mentioned below are generated from the simulation in NS-
at the minimum value among the inputs which is explained 3 using the proposed LBCA grouping scheme.
below by taking one of the rules from the inference table. In our simulation, traffic intensity varies as follows: 30 to
RULE: AVGTER(Frequent) ∧ SD of RUR(Slight) ∧ Number of Nodes(Small) → Grouping Probability
70 bytes for approximately 60% of the nodes, 100 to
AND:
(Maximum)
0.7 ∧ 0.5 ∧ 0.4 → 0.4
200 bytes for 30% of the nodes, and 2000 to 4000 bytes
for 10% of the nodes, representing the characteristics of a
G. DEFUZZIFICATION CENTROID METHOD heterogeneous network.
The Channel Utilization Ratio of a RAW Group refers
x × µg (x)dx
R
CentroidBackoff = (10) to the proportion of the available channel time during a
µg (x)
R
Restricted Access Window (RAW) period that is successfully
The output is attained by applying the centroid method used by a group of devices for data transmission. It measures
of defuzzification on R1, R2 and R3 as outlined in Eq.(10). how efficiently the RAW group’s allocated time in the
We evaluated the rules for each value to determine what channel were being utilized.
were their degree of membership. These membership values We compare our results over random method to analyse
are then utilized through the defuzzification process with and prove that how our method achieves better performance.
the centroid method to obtain a crisp output. x means that The random method assigns nodes to RAW groups without
crisp output value whose membership to fuzzy output will considering specific network characteristics, leading to load
be equal 1, and µg (x) is the membership value of the fuzzy imbalances, particularly in heterogeneous networks where
output evaluated by the rule. Once this process is over sample sizes and sampling intervals vary among nodes.
the group with the best grouping probability is selected This imbalance can cause increased collisions and delays.
and the node is added to that group. Subsequently, their While it is possible to adjust the number of RAW groups,
corresponding CUR and CAR are updated along with the AID their duration, and the number of slots, achieving optimal
allocation through association reply. Thus, we have discussed performance with the random method would require a
the proposed LBCA grouping mechanism using Fuzzy logic more strategic approach rather than random allocation. Our
in this section detailing the exact conditions required for work aims to address these challenges by implementing an
efficient utilization of the channel. organized grouping strategy to enhance performance.
recording the time just before sending the DATA frame and
again after receiving the ACK at the MAC layer.
The plots depicted in Figures 16, 17 explain the delay
in LBCA and Random method over beacon intervals. The
LBCA has a very low initial delay which is nearly at 0 for
all groups but in the random method the initial delay is high
and the rate of increase over beacon interval is faster. The
LBCA approach has a steady increase indicating that the load
balance across groups is done effectively to manage traffic
and reduce significant fluctuation in delay. Thus, LBCA
provides better control over the delay, ensures predictable
increase among all the groups, and also has a lower delay
of values just above 0.005 when compared with the random
method having a delay of around 0.007.
values around 0.9 but for all the three other groups it
fluctuates between 0.6 to 0.7 which indicates the load is
not distributed evenly but in LBCA method it maintains
constant values in all groups indicating efficiency and load
balance.
The minimal variation in the average value among groups
indicates consistent utilization of the channel by all the
groups, similarly high values of overall channel utilization
across all the groups indicate balanced usage of the available
resource. This proves LBCA method is more efficient than the
random having more variation among groups and a medium FIGURE 20. A) RAW’s Average Throughput of LBCA Method B) RAW’s
overall value. Average Throughput of Random Method.
V. CONCLUSION
The proposed LBCA algorithm, with an intelligent group-
ing approach using fuzzy logic and a standard deviation
strategy for optimizing different types of parameters in the
network, enhances the performance by improving multiple
key metrics. LBCA also maintains an almost perfect balance
on the distribution of loads among RAW, making significant
refinements compared to the random method. The result
shows a 1.37% increase in throughput, ensuring all sensor
nodes transmit maximum data over the channel due to the
FIGURE 18. A) RAW’s Average Channel Utilization Ratio of LBCA Method appropriate access mechanism. The channel utilization rate
B) RAW’s Average Channel Utilization Ratio of Random Method. increases by 7.65%, suggesting more effective load balancing
and stable high-level channel usage.
The plots in Figure 19 illustrate the average collision rate This algorithm effectively manages to minimize the
in two methods and gives clear cut view that the LBCA collided packet. The results show a promising reduction
method is having a value between 0.05 to 0.06 resulting of 25% in the number of collisions and a decrease of
in a total number of 162 collisions whereas in random it 16.42% in collision rate (rate of successful transmission
is from 0.065 to 0.068 with the total number of collisions without interference) among groups. In addition, the delay
being 216 clearly indicating that proposed LBCA outperform is 8.57% lower than the random method ensuring faster and
the random method in terms of collision due to the proper reliable data transmission. The results indicate that the LBCA
utilization of grouping strategy in allocation of the nodes approach improves throughput and channel utilization and
among RAW. minimizes delay and collisions.
In future work, we will concentrate on optimizing the
RAW allocation process in saturated cases, incorporating
ML techniques for more accurate prediction of the channel
duration to improve network efficiency and will further focus
on the slot division according to dynamic traffic conditions.
REFERENCES
[1] W. Yin, P. Hu, W. Wang, J. Wen, and H. Zhou, ‘‘FASUS: A fast association
mechanism for 802.11ah networks,’’ Comput. Netw., vol. 175, Jul. 2020,
Art. no. 107287, doi: 10.1016/j.comnet.2020.107287.
[2] L. Tian, S. Santi, A. Seferagić, J. Lan, and J. Famaey, ‘‘Wi-Fi HaLow
for the Internet of Things: An up-to-date survey on IEEE 802.11ah
research,’’ J. Netw. Comput. Appl., vol. 182, May 2021, Art. no. 103036,
FIGURE 19. A) RAW’s Average Collision Rate of LBCA Method B) RAW’s doi: 10.1016/j.jnca.2021.103036.
Average Collision Rate of Random Method. [3] Y. J. Wu, T. L. Sheu, and P. H. Chan, ‘‘Dynamic slot allocation in restricted
access window for IEEE 802.11 ah networks,’’ J. Inf. Sci. Eng., vol. 38,
The plot visualization in Figure 20 describes the average pp. 697–708, May 2022, doi: 10.6688/JISE.202105_37(3).0012.
throughput of LBCA and random method, it is observed [4] L. Tian, S. Santi, S. Latré, and J. Famaey, ‘‘Accurate sensor traffic
estimation for station grouping in highly dense IEEE 802.11ah networks,’’
that the throughput of the LBCA scheme is approximately in Proc. 1st ACM Int. Workshop Eng. Reliable, Robust, Secure Embedded
700kbps but for random it is around 610kbps thus the LBCA Wireless Sens. Syst., Nov. 2017, pp. 1–9, doi: 10.1145/3143337.3149819.
outperforms the random method in terms of throughput [5] E. Zazhigina, R. Yusupov, A. Lyakhov, and E. Khorov, ‘‘Analytical study of
restricted access window with short slots for fast and reliable data delivery
due to effective channel utilization and achieving minimum from energy-harvesting sensors,’’ Comput. Netw., vol. 250, Aug. 2024,
collision. Art. no. 110573, doi: 10.1016/j.comnet.2024.110573.
[6] S. Aust. (2011). Proposed IEEE 802.11ah Use Cases. [Online]. Available: [25] M. Mahesh and V. P. Harigovindan, ‘‘Hidden terminal aware grouping
https://mentor.ieee.org/802.11/dcn/11/11-11-0017-00-00ah-proposed- scheme for IEEE 802.11ah based dense IoT networks,’’ Comput. Commun.,
ieee-802-11ah-use-cases.pdf vol. 191, pp. 161–172, Jul. 2022, doi: 10.1016/j.comcom.2022.04.033.
[7] T. Adame, A. Bel, B. Bellalta, J. Barcelo, and M. Oliver, ‘‘IEEE 802.11AH: [26] L. Tian, M. T. Mehari, S. Santi, S. Latré, E. De Poorter, and J. Famaey,
The WiFi approach for M2M communications,’’ IEEE Wireless Commun., ‘‘Multi-objective surrogate modeling for real-time energy-efficient station
vol. 21, no. 6, pp. 144–152, Dec. 2014. grouping in IEEE 802.11ah,’’ Pervas. Mobile Comput., vol. 57, pp. 33–48,
[8] F. Malook, O. Mujahid, Z. Ullah, and T. Fouzder, ‘‘On enhancing the Jul. 2019, doi: 10.1016/j.pmcj.2019.04.007.
performance of IEEE 802.11ah by employing a dynamic raw approach in [27] I. Surenther, K. P. Sridhar, and M. K. Roberts, ‘‘Maximizing energy
IoT networks,’’ Wireless Pers. Commun., vol. 129, no. 3, pp. 1983–1997, efficiency in wireless sensor networks for data transmission: A deep
Apr. 2023, doi: 10.1007/s11277-023-10221-w. learning-based grouping model approach,’’ Alexandria Eng. J., vol. 83,
[9] M. A. Mondal and M. I. Hussain, ‘‘Station grouping mechanism using pp. 53–65, Nov. 2023, doi: 10.1016/j.aej.2023.10.016.
machine learning approach for IEEE 802.11ah,’’ Ad Hoc Netw., vol. 149, [28] P. Sthapit and J.-Y. Pyun, ‘‘Station grouping strategy for minimizing
Oct. 2023, Art. no. 103238, doi: 10.1016/j.adhoc.2023.103238. association delay in IEEE 802.11ah,’’ IEICE Trans. Commun., vol. 100,
no. 8, pp. 1419–1427, 2017, doi: 10.1587/transcom.2016ebp3306.
[10] C.-M. Huang and C.-H. Hsieh, ‘‘Registered-backoff-time (RBT) based
[29] T.-C. Chang, C.-H. Lin, K. C. Lin, and W.-T. Chen, ‘‘Load-balanced sensor
channel access with grouping control for the trigger RAW mode of
grouping for IEEE 802.11ah networks,’’ in Proc. IEEE Global Commun.
IEEE 802.11ah IoT network,’’ Comput. Netw., vol. 242, Apr. 2024,
Conf. (GLOBECOM), Dec. 2015, pp. 1–6.
Art. no. 110209, doi: 10.1016/j.comnet.2024.110209.
[30] E. Garcia-Villegas, A. Lopez-Garcia, and E. Lopez-Aguilera, ‘‘Genetic
[11] L. Tian, E. Khorov, S. Latré, and J. Famaey, ‘‘Real-time station grouping
algorithm-based grouping strategy for IEEE 802.11ah networks,’’ Sensors,
under dynamic traffic for IEEE 802.11ah,’’ Sensors, vol. 17, no. 7, p. 1559,
vol. 23, no. 2, p. 862, Jan. 2023, doi: 10.3390/s23020862.
Jul. 2017, doi: 10.3390/s17071559.
[31] X. Li, H. Zhang, H. Zhou, N. Wang, K. Long, S. Al-Rubaye, and
[12] B. T. Guedes, D. Passos, and F. G. O. Passos, ‘‘A spectral G. K. Karagiannidis, ‘‘Multi-agent DRL for resource allocation and cache
clustering algorithm for intelligent grouping in dense wireless design in terrestrial-satellite networks,’’ IEEE Trans. Wireless Commun.,
networks,’’ Comput. Commun., vol. 198, pp. 117–127, Jan. 2023, vol. 22, no. 8, p. 1, Aug. 2023, doi: 10.1109/TWC.2022.3231379.
doi: 10.1016/j.comcom.2022.11.017. [32] H. Zhou, X. Chen, S. He, C. Zhu, and V. C. M. Leung, ‘‘Freshness-aware
[13] U. Sangeetha and A. V. Babu, ‘‘Service differentiation in IEEE seed selection for offloading cellular traffic through opportunistic mobile
802.11ah WLAN under restricted access window based MAC pro- networks,’’ IEEE Trans. Wireless Commun., vol. 19, no. 4, pp. 2658–2669,
tocol,’’ Comput. Commun., vol. 172, pp. 142–154, Apr. 2021, doi: Apr. 2020, doi: 10.1109/TWC.2020.2967658.
10.1016/j.comcom.2021.03.017.
[14] M. Mahesh, B. S. Pavan, and V. P. Harigovindan, ‘‘Data rate-based
grouping using machine learning to improve the aggregate through-
put of IEEE 802.11ah multi-rate IoT networks,’’ in Proc. IEEE Int.
Conf. Adv. Netw. Telecommun. Syst. (ANTS), Dec. 2020, pp. 1–5, doi:
10.1109/ANTS50601.2020.9342758.
[15] C. Kai, J. Zhang, X. Zhang, and W. Huang, ‘‘Energy-efficient sen-
sor grouping for IEEE 802.11ah networks with max-min fairness
guarantees,’’ IEEE Access, vol. 7, pp. 102284–102294, 2019, doi:
10.1109/ACCESS.2019.2931709. R. NANDHINI received the Graduate degree from
[16] T.-C. Chang, C.-H. Lin, K. C. Lin, and W.-T. Chen, ‘‘Traffic-aware the SSN College of Engineering, the B.E. degree in
sensor grouping for IEEE 802.11ah networks: Regression based analysis
electronics and communication engineering from
and design,’’ IEEE Trans. Mobile Comput., vol. 18, no. 3, pp. 674–687,
the A. V. C. College of Engineering, in 2012,
Mar. 2019, doi: 10.1109/TMC.2018.2840692.
and the M.E. degree in VLSI design, in 2015.
[17] S. Bhandari, S. K. Sharma, and X. Wang, ‘‘Device grouping for fast
She is currently pursuing the Ph.D. degree with
and efficient channel access in IEEE 802.11ah based IoT networks,’’ in
Proc. IEEE Int. Conf. Commun. Workshops (ICC Workshops), May 2018, Vellore Institute of Technology, Chennai. She was
pp. 1–6. an Assistant Professor with the C. K. College of
[18] M. Mahesh, B. S. Pavan, and V. P. Harigovindan, ‘‘Data rate-based Engineering, in 2016. She has done research in
grouping to resolve performance anomaly of multi-rate IEEE 802.11ah IoT MEMS-based piezoelectric cantilevers for energy
networks,’’ IEEE Netw. Lett., vol. 2, no. 4, pp. 166–170, Dec. 2020, doi: harvesting using COMSOL multiphysics software and IntelliSuite. She
10.1109/LNET.2020.2998469. recently working with IoT communication protocols and MEMS sensors.
[19] R. Nishida, M. Shimokawa, K. Sanada, H. Hatano, and K. Mori,
‘‘A station grouping method for IEEE 802.11ah networks with various
types of network non-uniformity,’’ Nonlinear Theory Its Appl., IEICE,
vol. 14, no. 1, pp. 35–49, 2023, doi: 10.1587/nolta.14.35.
[20] S.-G. Yoon, J.-O. Seo, and S. Bahk, ‘‘Regrouping algorithm to alleviate
the hidden node problem in 802.11ah networks,’’ Comput. Netw., vol. 105,
pp. 22–32, Aug. 2016, doi: 10.1016/j.comnet.2016.05.011.
[21] W. Damayanti, S. Kim, and J.-H. Yun, ‘‘Collision chain mitiga-
tion and hidden device-aware grouping in large-scale IEEE 802.11ah
R. RADHA received the Ph.D. degree from Anna
networks,’’ Comput. Netw., vol. 108, pp. 296–306, Oct. 2016, doi:
10.1016/j.comnet.2016.09.006. University, Chennai, in 2016. Her Ph.D. thesis
titled ‘‘Collision avoidance strategies over multi
[22] H. Mosavat-Jahromi, Y. Li, and L. Cai, ‘‘A throughput fairness-based
grouping strategy for dense IEEE 802.11ah networks,’’ in Proc. IEEE hop wireless ad hoc networks.’’ She is currently
30th Annu. Int. Symp. Pers., Indoor Mobile Radio Commun. (PIMRC), an Associate Professor with the School of Com-
Sep. 2019, pp. 1–6. puter Science and Engineering, Vellore Institute
[23] L. Zhang, H. Li, Z. Guo, L. Ding, F. Yang, and L. Qian, ‘‘Signal of Technology, Chennai. She is also an Anna
strength assistant grouping for lower hidden node collision probability University Rank holder during her PG. She has
in 802.11ah,’’ in Proc. 9th Int. Conf. Wireless Commun. Signal Process. completed two research projects funded by AICTE
(WCSP), Oct. 2017, pp. 1–6. and TNSCST. She has published multiple research
[24] C.-C. Hu, Z.-B. Liu, Y.-M. Lin, and G.-J. Xu, ‘‘An efficient and effective papers in various SCI, Scopus indexed journals, and conferences. Her
regrouping algorithm for minimizing hidden pairs in 802.11ah networks,’’ research interests include mobile ad-hoc networks, the IoT communication
in Proc. Int. Conf. Adv. Comput. Technol., Inf. Sci. Commun., 2019, technologies, cross layer deign, and the IoT for smart cities.
pp. 191–196, doi: 10.5220/0008097301910196.