Next Article in Journal
Comparison of Amplitude Measurements on Borehole Geophone and DAS Data
Next Article in Special Issue
Fairness-Based Multi-AP Coordination Using Federated Learning in Wi-Fi 7
Previous Article in Journal
A Cost-Effective, Integrated Haptic Device for an Exoskeletal System
Previous Article in Special Issue
A Software-Defined Directional Q-Learning Grid-Based Routing Platform and Its Two-Hop Trajectory-Based Routing Algorithm for Vehicular Ad Hoc Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Resource Management for Massive Internet of Things in IEEE 802.11ah WLAN: Potentials, Current Solutions, and Open Challenges

Wireless and Mobile Communication System Laboratory, Department of Information and Communication Engineering, Chosun University, Gwangju 61452, Republic of Korea
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(23), 9509; https://doi.org/10.3390/s22239509
Submission received: 31 October 2022 / Revised: 1 December 2022 / Accepted: 2 December 2022 / Published: 5 December 2022
(This article belongs to the Special Issue Recent Advances in Next Generation Wireless Sensor and Mesh Networks)

Abstract

:
IEEE 802.11ah, known as Wi-Fi HaLow, is envisioned for long-range and low-power communication. It is sub-1 GHz technology designed for massive Internet of Things (IoT) and machine-to-machine devices. It aims to overcome the IoT challenges, such as providing connectivity to massive power-constrained devices distributed over a large geographical area. To accomplish this objective, IEEE 802.11ah introduces several unique physical and medium access control layer (MAC) features. In recent years, the MAC features of IEEE 802.11ah, including restricted access window, authentication (e.g., centralized and distributed) and association, relay and sectorization, target wake-up time, and traffic indication map, have been intensively investigated from various aspects to improve resource allocation and enhance the network performance in terms of device association time, throughput, delay, and energy consumption. This survey paper presents an in-depth assessment and analysis of these MAC features along with current solutions, their potentials, and key challenges, exposing how to use these novel features to meet the rigorous IoT standards.

1. Introduction

Low-power wide area networks (LPWANs) are designed for static and mobile Internet of Things (IoT) applications that demand energy-efficient long-distance communication [1]. LPWAN technologies have been utilized in the IoT domains, including identification, sensing, computation, cloud, and fog-edge computing [2]. IEEE 802.11ah is one of the significant LPWAN technologies, including narrowband-IoT (NB-IoT) and Sigfox, widely used for the IoT [3]. Specifically, the IoT needs a communication protocol that can meet application needs, such as extended range, low energy consumption, low latency, and scalability [4].
Current low-power IoT communication systems are mainly categorized as wireless personal area networks (WPAN) and low-power wide-area networks (LPWAN). A detailed comparison between LPWAN and WPAN technologies is illustrated in Table 1. The WPAN technologies comprise ZigBee and Bluetooth Low Energy (BLE). ZigBee and BLE offer a medium data rate ranging from a few hundred kbps to Mbps at a few meters distance [5,6]. Among WPAN technologies, BLE requires less energy than ZigBee (i.e., IEEE 802.15.4 standard). On the other hand, the LPWAN technologies, including Long-Range (LoRa) [4], SigFox, NB-IoT [7], and IEEE 802.11ah [8] emphasize long-range communication ranging from 1 km to 50 km. The data rate of LPWAN technologies ranges from a few hundred bps to a few Mbps. In the LPWAN technologies, the NB-IoT and SigFox are IoT-specific 5G technologies that operate in licensed frequency channels, while other LPWAN technologies operate in the ISM band [9,10]. In terms of transmission range, SigFox has the highest range of 50 km, followed by LoRaWAN with a range of 20 km in suburban areas, Nb-IoT with 15 km, and IEEE 802.11ah has the lowest range of 1 km. However, because of the limited transmission range of BLE and ZigBee and the insufficient throughput, they are limited to several IoT use cases such as indoor positioning [11,12] and healthcare systems [13]. Consequently, there is a need for a low-power and massive IoT communication system, requiring substantial throughput and a few km of transmission range. To address this gap, the IEEE 802.11ah, commonly known as Wi-Fi HaLow, is introduced as an LPWAN technology since it has the highest data rate and transmission range of all WPAN technologies [8].
IEEE 802.11ah [20] targets IoT and machine-to-machine (M2M) communications [21,22,23] owing to its promising features such as long range and low power. The IEEE 802.11ah is now intended for the smart grid (e.g., smart meters, smart houses, smart utility), smart agriculture, smart industry, extended range, and smart healthcare [24,25,26,27,28]. For instance, the smart grid is intended to facilitate intelligent power transmission and consumption in urban areas via two-way communication between smart meters and the grid system [29]. In a smart grid scenario, a home area network (HAN) can be used for automation, where the smart appliances communicate the consumed energy to the smart meter. The smart meter transmits the energy consumption statistics to an intermediate controller, such as a neighborhood area network (NAN). A single NAN contains a few hundred intelligent meters organized in HANs. Finally, a WAN is designed to connect various NANs and transmit data to the grid. The IEEE 802.15.4 and BLE cannot satisfy the throughput requirement of a high-density network over a long communication range [30]. In contrast, IEEE 802.11ah provides a medium access protocol for a network with massive stations (STAs) connectivity, long-range, and energy constraints [31].
IEEE 802.11ah can support up to 8191 STAs on a sub-1 GHz band within a 1 km range while providing at least 100 kbps throughput [32]. The IEEE 802.11ah supports three types of STAs: traffic indication map (TIM), non-TIM, and unscheduled. TIM STAs essentially adhere to both delivery traffic indication map (DTIM) and TIM beacons and use a traffic-aware power-saving strategy known as “target wake-up time (TWT)”. The AP is responsible for scheduling the sleep and waking times of the communicating STAs using TWT. On the other hand, the non-TIM STAs negotiate with the AP for their subsequent channel-access intervals. Finally, unscheduled STAs may be broadcast whenever the channel is available. Based on an association identifier (AID) of the STAs, the AP is responsible for time slot distribution to STAs in a beacon interval (BI).
Despite the growing relevant literature in the IEEE 802.11ah domain, many important questions remain unanswered.
  • What are the currently deployed use cases of the IEEE 802.11ah in the industry?
  • What are the advantages and disadvantages of the current literature to support IoT applications?
  • What MAC feature of the IEEE 802.11ah WLAN is the most suitable and widely adopted for improving resource efficiency?
  • What impact do deployment choices, such as channel plan and MAC feature, have on the performance of the IEEE 802.11ah WLAN?
  • What kind of traffic (UL/DL) harms the network performance of the IEEE 802.11ah WLAN network?
The primary goal of this survey is to answer these questions and provide insights into the strengths and limits of the legacy IEEE 802.11ah WLAN in the IoT domain.

1.1. Related Survey Articles

The specification for Wi-Fi HaLow gives a thorough overview of the PHY and MAC layers [33]. However, the decision making of parameter configuration and optimization (e.g., resource allocation) is left open to developers and academic researchers, allowing them to construct and develop solutions (e.g., prototype or mathematical-based models) for rigorous IoT applications. In recent years, several studies have surveyed the IEEE 802.11ah, its PHY and MAC layers, and solutions designed for low-power IoT applications. Table 2 provides the main focus and brief description of the main topics covered by the existing survey articles on IEEE 802.11ah WLAN.
Mainly, these survey articles focus on PHY and MAC layer techniques with limitations and future directions. Compared to other relevant surveys, as illustrated in Table 2, this survey article presents an in-depth assessment, and critical analysis of these MAC features along with current solutions, highlighting their potentials and key challenges and exposing how to use these novel PHY and MAC features to meet the rigorous IoT application requirements.

1.2. Motivation and Contributions

In contrast to the published surveys and tutorials highlighted in Table 2 that present many characteristics or provide a comprehensive evaluation of the IEEE 802.11ah WLAN system, where channel access mechanisms, RAW optimization techniques, PHY, and MAC layers are the major topics, our survey mainly focuses on resource allocation in a MAC layer with its adoption for M2M and massive IoT networks. The contribution of this article, compared to the surveys and tutorials presented in Table 2, is as follows.
  • First, we briefly describe the IEEE 802.11ah, including deployed use cases of the IEEE 802.11ah WLAN and the MAC layer features.
  • Second, the current solutions in the literature are thoroughly studied and assessed from several aspects, along with their shortcomings for different MAC features of the IEEE 802.11ah WLAN.
  • Third, the potentials and challenges of the IEEE 802.11ah are identified, and open research issues and future research directions are briefly discussed.

1.3. Structure of Survey

Figure 1 presents the detailed structure of the survey paper and provides a section-wise overview. Section 2 presents the IEEE 802.11ah applications, deployed use cases, and their requirements. Section 3 provides an overview of the MAC features of the IEEE 802.11ah and current resource allocation solutions alongside their key objectives and shortcomings. Finally, Section 4 discusses the potentials and challenges of IEEE 802.11ah, whereas Section 5 provides concluding remarks on this survey paper and highlights future directions.
Table 2. A brief summary of existing IEEE 802.11ah WLAN surveys and tutorials.
Table 2. A brief summary of existing IEEE 802.11ah WLAN surveys and tutorials.
Ref.YearMain Focus of SurveysBrief Description of Main Topics Covered
[31]2012advantages and challengeshighlighted the IEEE 802.11ah standardization efforts and explored the benefits and challenges of physical (PHY) and medium access control (MAC) layer methods
[34]2013channel access enhancementaimed to describe the channel access (e.g., MAC layer) improvements made to the IEEE 802.11ah specification to improve machine-type communication (MTC) performance
[35]2013overview of PHY and MAC layersurveyed the MAC layer enhancements, including power-saving features, support for many STAs, efficient medium access methods, and throughput improvements for meeting the expected system requirement
[36]2014energy consumption in the MAC layerexplored the energy consumption in the MAC layer along with a performance evaluation of IEEE 802.11ah in four popular M2M situations, namely farm monitoring, smart metering, industrial automation, and animal monitoring
[30]2015mechanisms and challengesin-depth overview of the fundamental mechanisms and the use of these mechanisms in smart cities with related open issues are discussed
[37]2015PHY and MAC layer featuresummarized the issues and solutions regarding throughput and network reliability as well as discussed the proposed enhancements to the PHY and MAC layers
[38]2015PHY and MAC layer featuresprovided an overview of the PHY and MAC layers and highlighted how various features might address the issues associated with enabling IoT use cases
[39]2016challenges for IoT scenariosinvestigated the essential properties of IEEE 802.11ah to satisfy IoT needs and provided a comprehensive assessment of IEEE 802.11ah WLAN
[40]2017challenges and future directionssurveyed the state of the art of IEEE 802.11ah WLAN and identified the technical challenges and research directions in this area
[41]2017cooperative MAC protocolsoffered an in-depth overview of current research on cooperative MAC and relay-based MAC protocols and models desirable categories and problems in the IEEE 802.11ah standard
[42]2017study of M2M communicationspresented state-of-the-art M2M technologies, focusing on IEEE 802.11ah, and explored the future challenges and envisioned opportunities
[43]2019study of LPWAN technologiesexplored the LPWA technologies, focusing on technical parameters of IEEE 802.11ah, LoRa, and NB-IoT
[44]2019MAC layer featurespresented a detailed review of the research on MAC improvement for wireless real-time control applications
[45]2019MAC layer featuresprovided a comparative study of MAC protocols for the IoT was performed to provide insights into IoT applications, considering their characteristics, limitations, and behavior, along with challenges and open research issues
[46]2021suitability for IoV and IoT-enabled networkssurveyed IoT communication technologies and highlighted the benefits of the Internet of Vehicles (IoV) and IoT-enabled networks
[47]2021machine learning techniquespresented several Wi-Fi applications of machine learning, providing researchers an in-depth review of the major trends, open issues, and future recommendations
[48]2021challenges in mobile IoT networksprovided a comprehensive view of the challenges introduced by mobility in IoT networks under different IoT standards related to intelligent transport, smart agriculture, smart cities, and industry that involve collecting measurements and performing coordinated actuation
[8]2021PHY and MAC layer featurespresented a detailed review of the WiFi Halow, comprising analysis of the PHY and MAC layers, open challenges, and addressed future orientation
[49]2022MAC layer featuresprovided a comprehensive assessment of various MAC protocols and highlighted issues and limitations of the MAC layer

2. Deployed Use Cases of the IEEE 802.11ah WLAN

IEEE 802.11ah has three main categories of use cases: network for sensors and meters, extended Wi-Fi range, and wireless backhaul [38,39,40,49]. In this section, applications regarding each use case are introduced.

2.1. Sensors and Meters

IEEE 802.11ah is recommended for M2M and IoT applications based on sensors and meters due to its low power consumption, long range, and suitability in a highly dense network. As an example of the IEEE 802.11ah application, the smart grid [50] mainly consists of smart meters, smart appliances, renewable energy resources (e.g., wind turbines and solar panels), and an energy management system. Furthermore, the hierarchical communication network of the smart grid can be categorized as HAN, NAN, and WAN [24,51].
NEWRATEK, one of the Wi-Fi solution providers, designed a chip for IoT devices based on IEEE 802.11ah to support smart grid application [52,53]. The primary aim of the suggested solution is to increase the network lifetime due to longer sleep time. In addition, it provides support for both AP and STA roles.

2.1.1. Smart Grid-Meter to Pole

Wireless sensor networks [54,55] allow customers and utilities to hand over, monitor, and accomplish energy resources efficiently. They are widely adopted by smart meters, where the sensors proactively report the usage (readings) to the AP after a scheduled interval. Thus, utility companies can manage electricity demand and respond efficiently [50]. Smart grid applications include smart metering, home energy management, load management, demand and response, outage detection, renewable generation, distributed storage, distributed generation, vehicle to grid, etc. [24,25,50,51,56,57,58,59,60].
As an example of smart grid application devices, Ref. [61] shows the IEEE 802.11ah-based Wi-Fi module kit, supporting 1/2/4 MHz channel bandwidth for both AP and STA roles.

2.1.2. Environmental/Agricultural Monitoring

This category is the outdoor use case of IEEE 802.11ah in sub-GHz. Applications that come under surveillance include measurement of wind speed, wind direction, humidity, temperature, water level, soil condition, pollution information, plant and crop condition, animal habitat and location, and gathering of disaster information [26,62,63,64,65].
To support agriculture monitoring using IEEE 802.11ah, a remote monitoring system was designed to prevent crop damage caused by wild animals such as boars or deer. The existing remote monitoring and alarming system notifies the farmer and identifies the trapped wild animals [66].

2.1.3. Industrial Monitoring

IEEE 802.11ah recommends use cases for monitoring and controlling equipment and manufacturing processes. Industrial monitoring primarily aims to provide quality products and safety measurements. Thousands of sensors are required in the automation process at input/output points, where processes such as refining petroleum and manufacturing iron and steel can be monitored to increase productivity and quality and ensure reliability [67].
For industrial monitoring, Silex Technology has proposed a solution, Wireless Bridge (BR-100AH), based on IEEE 802.11ah [68]. BR-100AH supports communications at sub-1 GHz and provides a much longer range than the case of 2.4 GHz/5 GHz, more device connections per AP, radio interference avoidance with 2.4 GHz/5 GHz radios, and much better radio coverage due to better wall penetration and diffraction around obstacles. Simple deployment for industrial monitoring of BR-100AH is shown in Figure 2, where a wireless bridge connects a non-wireless device (10BASE-T/100BASE-TX network device) to IEEE 802.11ah WLAN. With sub-GHz radio, various non-wireless devices can easily be connected to a wide-range IEEE 802.11ah WLAN. Furthermore, the BR-100AH employs WPA3 Wi-Fi authentication to ensure safe and secure use of wireless communication at an office, factory, etc., where higher security is required.

2.1.4. Healthcare Monitoring

IEEE 802.11ah can be utilized for indoor healthcare monitoring systems, including hospitals/clinics, elderly care, and personal fitness monitoring [70]. For example, in the case of a hospital/clinic, a patient can be monitored by deploying different sensors that can monitor heart rate, blood pressure, oxygen in the blood (SOPO2), temperature, electrocardiogram, etc. [71]. The caregivers use the information collected from the patient to provide the required medication.
Elderly care is an essential part of health monitoring. Sensors are deployed on the patient to monitor urgent notifications, including fall detection and pill bottle monitoring [72]. Many health problems that affect the elderly are caused by falls, which are the leading cause of accidental deaths. A fall detection system sends an alert signal to the caregiver to provide timely medical assistance [73]. Further, to monitor the daily medicine intake, a smart pill bottle provides an easy way to send sensor data directly to the user’s mobile device [74]. In addition, personal fitness includes weight and heart rate monitoring, the data collected over a certain period. This information is analyzed periodically to help the users control, maintain, and improve their lifestyles.

2.2. Extended Wi-Fi Range

A primary scenario of IEEE 802.11ah is the extended range of hotspots offering Internet access over WLAN. Wi-Fi is regularly used for hotspot applications globally. These domains can benefit from the extended area by using lower frequency bands in IEEE 802.11ah. The distinctive frameworks of a long-range hotspot include homes, campuses, and shopping malls [75]. Besides hotspots, IEEE 802.11ah is also considered a leading choice for traffic offloading, a solution to mobile traffic explosion. Due to the massive coverage of IEEE 802.11ah, it can be applied to mobile traffic offloading in outdoor environments [76].

2.3. Wireless Backhaul

Figure 3 shows a backhaul aggregation of sensors having battery power restrictions induced by IEEE 802.15.4g. It is primarily designed for low-rate wireless personal area networks and is a premier choice for low-power, long-range STAs due to its applicability to intelligent utility networks [6]. In addition, IEEE 802.11ah provides an appropriate feature of a backhaul link to receive the aggregated data of leaf STAs. As a result, the data can be conveyed to an IEEE 802.11ah AP for scrutiny and retrieved from the Internet. Moreover, IEEE 802.11ah performs these tasks without the scarcity of network throughput and consistency, even if co-existing with IEEE 802.15.4g, due to the S1G feature [39,77,78].

2.4. IEEE 802.11ah Use Cases Requirements

IEEE 802.11ah supports IoT and M2M applications and scenarios. Therefore, based on its promising features, such as long-range and low power, it supports low data rate applications (e.g., up to 100kbps) within the range of 1 km [79]. Furthermore, another requirement for the IEEE 802.11ah is that it supports more than two thousand STAs in outdoor environments [33]. IoT and M2M STAs are usually battery-powered and are expected to operate in low-power mode to conserve energy. Therefore, IEEE 802.11ah must provide enhanced power-saving techniques for battery-powered operation with a long lifetime [80]. Furthermore, Table 3 summarizes the basic requirements for IEEE 802.11ah WLAN use cases, where the IEEE 802.11ah-enabled devices can transmit data either continuously, periodically, or in a burst. The devices continuously transmit data to the server in the continuous data transmission mode. Whereas the periodic data transmission is performed by the devices for a certain amount of time and then goes into an energy-saving mode (i.e., sleep mode). Finally, burst data transmission refers to a period when the data from a device is sent at irregular intervals.

3. MAC Features of the IEEE 802.11ah and Current Resource Allocation Solutions

This section briefly discusses the promising MAC layer features of IEEE 802.11ah, including authentication and association, restricted access window (RAW), relay and sectorization, association identifier (AID), traffic indication map (TIM), and target wake-up time, as shown in Figure 4. In this section, first, we thoroughly discuss the abovementioned MAC layer features of the IEEE 802.11ah WLAN, their potentials, and issues. Second, we discuss the current resource allocation solutions for each MAC layer feature. Finally, the traffic type, performance evaluation, shortcomings, and simulator tool utilized in each solution are highlighted.

3.1. Authentication and Association

When communication to an AP is required, all STAs before the communication should initiate authentication/association setup with the AP, as indicated in Figure 5 [81]. An STA transmits an authentication request ( A u t h R e q ) and association request ( A s s o c R e q ) to an AP, allowing the AP to discover the existence and capabilities of the STA [22,82,83,84]. By returning the authentication response ( A u t h R e s p ) and association response ( A s s o c R e s p ) to the STA, the AP assigns AID. Unfortunately, STAs utilize the DCF channel access method during the link setup phase, causing a collision between authentication and association messages [84,85]. Due to the collisions between authentication and association messages, link setup between STAs and AP might be time-consuming when several STAs attempts to associate simultaneously with the AP. This becomes problematic at the IEEE 802.11ah with the massive STAs deployed for IoT applications.
The IEEE 802.11ah suggests two techniques for overcoming this issue: (1) centralized authentication control (CAC) and (2) distributed authentication control (DAC).
  • Centralized Authentication Control: The AP modifies the proportion of STAs permitted to transmit A u t h R e q messages in the CAC method. The AP creates a threshold and broadcasts it through beacon frames to all STAs. The beacon frame comprises network information that the AP regularly delivers to advertise the network existence and synchronize all STAs. When an STA starts authentication, it randomly generates a value within the [0, 1022] range. If the beacon delivered from the AP has a random value smaller than the threshold at the STA (i.e., available range of threshold values: [0, 1022]), the STA tries to transmit the A u t h R e q to the AP. If not, the authentication/association procedure is delayed until the next beacon arrives. The AP should dynamically adjust the threshold to limit the number of STAs that may access the channel in a single BI and guarantee that all STAs can associate with the AP rapidly.
  • Distributed Authentication Control: The DAC technique divides a BI into authentication control slots (ACSs). STAs randomly choose a BI and ACS to communicate their A u t h R e q to the AP. If STA fails to authenticate, it retransmits the A u t h R e q in the next m t h BI and i t h ACS, where m and i are calculated using the truncated binary exponential backoff approach [8].

Related Studies Concerning Authentication/Association

Related studies concerning authentication/association are presented here, and their specific details are highlighted in Table 4. The primary purpose of these existing schemes is to reduce the authentication/association time of STAs with AP.
The authors in [87] proposed an analytical model to resolve the collisions of authentication and association messages. First, the study showed the impact of the A u t h R e q s parameters in a single ACS that affect the network performance in average authentication time. Then, they found the number of successful A u t h R e q s with a function of the number of STAs that have chosen the BI. Finally, the average authentication time for the chosen STA is computed. Their proposed method showed that the association parameters were set up efficiently, and the link setup time was close to the minimum.
Similarly, the authors in [88] studied the handshakes in the IEEE 802.11ah for improving the association time of STAs using an analytical model. In particular, they focused on the CAC, a default method utilized by the IEEE 802.11ah. They developed analytical and heuristic methods to manage CAC parameters and improve their efficiency adaptively. Their results show that their proposed solutions decrease the link setup time during the association of STAs with AP.
A performance evaluation of the association time was studied in [89], where STAs are randomly deployed in a 400 m range around an AP. This study focused on the performance evaluation of the association time, implementation, and validation of IEEE 802.11ah RAW in ns-3 [90]. Similarly, the authors of [84] examined the authentication and association procedures of the IEEE 802.11ah. Their study revealed that the association procedure might take several minutes and argued that a new method is required to prevent collision between A u t h R e q s and traffic from already-associated STAs with AP. In addition, [81] demonstrated that the optimal group of STAs can result in minimum association time. However, for the link setup procedure, the assumptions presented in [81] are the constant probability of successful transmission and the AP intelligence of how many STAs will be asking for connections, which are unrealistic.
Table 4. Existing solutions on authentication and association along with shortcomings.
Table 4. Existing solutions on authentication and association along with shortcomings.
Ref.YearTraffic TypePerformanceEvaluationShortcomingsEvaluation Tool
[84]2015ULassociation timedoes not solve the issues of coexistence data and association framesns-2
[88]2015UL/DLlink setup timecollision is still an issue owing to large association requests and hidden STAsns-2
[89]2016UL/DLassociation time and throughputno solution was proposed to reduce the association timens-3
[87]2016UL/DLthroughputlink setup time increases linearly with the increasing number of STAs since it does not entirely resolve the collision issue owing to a large association requestsanalytical
[87]2016UL/DLthroughputcollision is still an issue owing to large association requestsanalytical
[81]2017UL/DLassociation timeduring the link setup process, the AP knows the number of STAs in advance, which is unrealisticanalytical
[91]2018UL/DLassociation timeassociation and PS-Poll frames create overhead, which can cause excessive energy consumptionns-3
[92]2019UL/DLassociation timethe existing study does not determine the best data rate for massive IoT devices registration that can speed up the registration processns-3
[82]2020UL/DLassociation and authenticationtheir proposed FASUS technique does not guarantee fairness if the user modifies the MAC address for fast association with the APns-3
[83]2020UL/DLdelay and energy consumptionthe proposed fast key re-authentication (FKR) method does not consider the traffic requirementsMATLAB
[93]2021ULassociation delaytheir proposed method does not consider the existence of both association and data exchange framesns-2
[94]2022UL/DLassociation timeit does not consider the heterogeneous trafficanalytical
To effectively register STAs with an AP, the slotted-CSMA/CA with time division multiple access (TDMA) was proposed in [91]. In their proposed method, contention-based slotted-CSMA/CA enables STAs to transmit the A u t h R e q through randomly chosen backoff slots. Their simulation findings showed improved contention-free transmission compared with the traditional IEEE 802.11ah with CSMA/CA.
In addition, a simulation study was presented in [92] to evaluate the association time of STAs. Their study using multi-rate capabilities during association showed improved performance by 5–15% relative to the association at a fixed transmission data rate.
Recently, a new association mechanism named fast association based on speculating the number of STAs (FASUS) was proposed in [82]. This method aimed to improve the authentication and association process of STAs. To minimize unnecessary retransmission, the FASUS approach retransmits the A s s o c R e q / A s s o c R e s p pair depending on retry counts rather than timers. In addition, the number of STAs inside the network is used to adjust the threshold dynamically (i.e., available range of threshold: [0, 1022]).
The fast key re-authentication (FKR) method aimed to speed up the re-authentication process by using the nonce (i.e., a pseudo-random number generated as part of an authentication procedure to guarantee those past communications cannot be reused in replay attacks) of a single STA to introduce unpredictability into the system [83]. Owing to the single nonce introduced in each authentication round, their proposed FKR protocol may reduce the authentication procedure to just two messages. The detailed evaluation of the FKR method has shown that it is more effective in terms of time delay and energy usage.
To address the association issue, the authors proposed automating the cluster head selection using a low-energy adaptive clustering hierarchy (LEACH) protocol in [93]. Their simulation results revealed that their LEACH-based proposed method using the cluster of STAs efficiently reduces the association delay.
Authors [94] proposed an analytical model for examining the association process under jamming to assess the interference effect. Their findings indicated that the jammer might fail the association process and prevent network access, rendering IoT applications. In addition to the association process, they also proposed countermeasures for various jamming attempts to defend against the problem.

3.2. Restricted Access Window (RAW)

A RAW aims to save power in STAs and provide high-channel-utilization services to several STAs participating in the communication. In IEEE 802.11ah, a beacon interval (BI) is composed of a RAW, which is divided into time series called “slots”, as shown in Figure 6a. After every BI, thousands of STAs attempt to access the medium for communication in the BI. In each BI, a RAW period is divided into a series of time slots having equal duration. However, the number of slots assigned in each RAW period can differ based on the data transmission requests [95]. An AP is responsible for assigning slots to a group of STAs during N R A W , as shown in Figure 6a. The remaining STAs not involved in the transmission go into sleep mode to save energy.
However, RAW-related information is included in the RAW parameter set (RPS) element that is contained within the frame body subfield of the beacon frame, as shown in Figure 6b [20]. In the RPS element, each RAW assignment subfield contains the necessary parameters to restrict the medium access to one or more STAs within a RAW. The RPS element further defines RAW start time, RAW duration N R A W , RAW group, AIDs, and eligible STAs to contend for their assigned time slots. Furthermore, a parameter called cross-slot boundary is included in the beacon, which defines the behavior of the RAW. An STA can cross the slot boundary of its assigned slots for data transmission. If the cross-slot boundary is not permitted, STAs can only access the channel if the remaining time in the assigned slot boundary is adequate to complete the data communication. Otherwise, the STAs are not allowed to initiate transmission.
Based on the information including N R A W and time slot period T s l o t contained in RPS, individual STAs compute the number of slots to be assigned. In each RAW, these slots are indexed from 0 to ( N R A W 1 ), where N R A W indicates the total number of slots. Each STA decides its slot index i s l o t , which shows the permitted slot for accessing the medium based on the slot assignment function:
i s l o t = ( A i + N o f f s e t ) mod N R A W ,
where A i is the position index of an AID of the STA, and N o f f s e t is an offset value provided to address the fairness among the STAs indicated in the TIM. N o f f s e t is determined via an offset field in the beacon frame from an AP and may change throughout one or more BIs so that the slots assigned to the STAs vary. Moreover, the AP prevents the constant end-to-end delay by changing the N o f f s e t value in the beacon [50].

Related Studies Concerning RAW Optimization

Related studies concerning RAW optimization are presented here, and details are shown in Table 5. The current solutions for RAW optimization in the literature primarily focus on enhancing the network performance in terms of throughput [96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,115], channel efficiency/utilization [97,104,116,117,118], and energy consumption [59,102,105,111,112,119,120,121,122,123,124].
A traffic-adaptive RAW optimization algorithm (TAROA) was proposed to dynamically adapt the RAW parameters considering the underlying traffic conditions [100]. The TAROA scheme is triggered each time a target beacon transmission time (TBTT) is sent. The TAROA scheme calculates the packet transmission interval of each STA based only on packet transmission information gathered during the previous BI by the AP. Based on this projected transmission frequency, the TAROA estimates the RAW characteristics and allocates STA to RAW slots. Their simulation findings indicate that, compared to EDCA/DCF, the TAROA method may significantly increase the throughput performance of IEEE 802.11ah.
The channel access slot (CAS)-based channel access protocol [96] aims to divide the RAW period into slots (downlink and uplink accesses). More concretely, the proposed scheme adjusts the number CASs and their length based on the number of STAs contending in RAW. In each CAS, a selected group of STAs compete to transmit data. To ensure fair access to all STAs, a periodic reset of back-off is assumed in combination with the random choice of the CAS performed by the STAs. As a result, in the CAS protocol, STAs remain in the sleeping mode for more than 98% of the time, consequently increasing the network lifetime. Moreover, a higher value of CAS slots can lower the probability of collision and, thus, reduce channel contention and increase the packet delivery ratio. However, the CAS algorithm does not consider the collision that has occurred in the previous BI since an STA can randomly select the same slot for transmission, which results in a high possibility of collision. Therefore, if a higher value of CAS is chosen for the lower number of STAs, the channel utilization is possibly reduced.
To boost the network performance, the authors in [98] dynamically modified the RAW period dependent on the number of STAs. First, STA cannot cross its allotted slot boundary when transmitting data in the RAW. Second, the STA can cross the slot boundary; however, this STA is not allowed to transmit data in another slot, which is already allocated to another STA. Consequently, their proposed method may significantly improve channel efficiency by restricting the amount of STAs during this contention phase. Thus, it enhances the normalized throughput gains by up to 210% and 770% in a network of 128 and 256 groups, respectively. Furthermore, the collision is possibly reduced during the handover process of slots between multiple groups. However, several mini-slots within a RAW may remain unused, resulting in under-utilization of the channel during the process mentioned above.
A new MAC enhancement algorithm proposed in [97] aims to simultaneously adjust the RAW period by considering the relation between the expected number of STAs and the duration of RAW to increase the channel efficiency. Based on the success probability of STAs, the ideal size for uplink and downlink in the RAW period is determined. The analysis shows that this scheme outperforms a typical IEEE 802.11ah in terms of success probability, network throughput, and channel utilization due to the dynamic nature of the RAW period. However, the application content is restricted to one type of traffic; therefore, it does not apply to massive IoT applications due to their heterogeneous traffic nature. Traffic load is essential in determining the optimal size of a slot in the RAW uplink access. Without considering the traffic load of STAs, an optimal size of RAW cannot be guaranteed in a massive IoT-based network.
The renewal access protocol (RAP) [116] has two strategies for undertaking collisions capably and attaining high network throughput performance in a congested network: strategies without grouping (RAP) and with grouping (G-RAP). RAP dynamically allocates several slots to individual groups by considering the back-off transmission attempts, whereas G-RAP aims to enhance channel efficiency by considering transmission attempts. As a result, it efficiently solves the channel contention and achieves acceptable throughput performance regardless of the group size. Moreover, G-RAP achieves better fairness due to assigning the same number of transmission attempts to each group. However, G-RAP can cause a significant delay due to higher back-off time during high contention.
A hybrid MAC for energy efficiency based on the contention reservation scheme (CRS) is presented in [122]. This scheme aims to enhance the network lifetime based on the number of STAs per group. The proposed CRS consists of three main phases: grouping, negotiation, and RAW slot assignment. During the first phase, the AP forms disjoint groups of STAs, and in the second phase, STAs with a low energy budget can start negotiating with the AP based on the TWT procedure before going into sleep mode. Finally, during the third phase, the STAs begin transmitting the PS-Poll messages for slot reservation, and then the AP schedules the RAW slots and transmits the number and duration of the slots in the subsequent BIs. Meanwhile, the STAs contend for the channel in the assigned time slots for buffered packet transmission. However, a mathematical CRS model enhances the network lifetime for a successful uplink data communication by up to 55% overall. This is because the AP assigns a slot to only those STAs that have successfully transmitted the PS-Poll messages during contention. Therefore, it results in contention-free access and reduces energy consumption. Nevertheless, the larger data packets compared to that of a PS-Poll frame in a large network consisting of 1500 STAs causes a higher contention delay of 62 s during transmission.
The sequential transmission scheme (STS) [104] was proposed to reduce channel contention. In STS, an AP is responsible for allocating RAWs to each group based on the number of transmitting STAs and the total traffic generated by each group. The AP computes the network load in the UL direction and resources required by each group by considering the duration of PS-Poll frames, whereas the DL traffic is known to the AP. As a result, STS achieves better channel utilization because STAs access the channel based on their allocated time; hence, no slots are wasted due to collisions or idle channels during data communication in a RAW. Similarly, STS accomplishes high network throughput, i.e., 2.4 and 2.2 Mbps, under Modulation and Coding Scheme (MCS7 (6.5 Mbps) conditions and MCS5 (5.2 Mbps), respectively. However, while transmitting data at MCS3 (2.6 Mbps), STS suffers longer delays and lower throughput due to the high contention and lower transmission rate.
Reference [100] aimed to adjust the RAW parameters dynamically based on the current network traffic load by considering the UL transmission to enhance the balance between channel contention and utilization. Their proposed method, known as TAROA, is mainly based on two steps: (1) transmission interval estimation and (2) RAW slot assignment. During the transmission interval estimation phase, TAROA computes the packet interval of each STA based only on the packet transmission information obtained during the last BI. The second step calculates the RAW parameters and assigns STAs to RAW slots based on the expected transmission frequency. In TAROA, each STA is expected to transmit packets predictably. The simulation results show that under the dynamic number of STAs (i.e., 1536), high traffic load (i.e., T = 1.275 Mbps), and Poisson rate of 0.1 s, the TAROA algorithm achieves 0.83 Mbps throughput, as compared to EDCA/DCF, which achieves 0.63 Mbps throughput. However, TAROA significantly suffers under the Poisson rate of 5 s and achieves 0.077 Mbps throughput out of T = 0.1425 in the “without hidden nodes” case compared to EDCA/DCF, which achieves 0.09712 Mbps throughput. This is because TAROA fails to adapt due to the highly topological change and, thus, reduces the network throughput.
A dynamic energy-aware window control algorithm is described in [102], which mainly aims to enhance energy efficiency and network throughput by precisely adjusting the RAW duration based on the number of STAs per group. The method assumes a single-hop star topology for smart grid-dense network communication. The method is based on the gradient descent approach, an efficient technique for less working load and repository capacity to achieve maximum energy efficiency. The simulation results demonstrate that the proposed RAW method achieves up to 50% improved results for packet delivery ratio because the algorithm adjusts the RAW size based on the group scale compared to the legacy RAW mechanism. Likewise, the proposed algorithm shows a 20% improvement in terms of energy consumption when compared to the existing RAW. However, the proposed method fails to sustain its performance due to the high probability of collision, leading to excessive energy consumption, low throughput, and long delay as the number of STAs increases per group.
The RAW size is generally adapted dynamically by accounting for the group size to increase the network throughput. First, reference [101] suggests that the groups are organized based on size. Second, the RAW is further divided into two independent sections, called “subframes,” while the length of each subframe is adapted based on the group size. The proposed scheme enhances the throughput as the larger duration of the RAW period is allocated to a relatively smaller number of STAs to avoid high contention. However, the proposed scheme can result in the underutilization of the channel since the larger size of the RAW period is assigned to a group containing fewer STAs.
Energy-aware window control schemes are presented by proposing a retransmission mechanism to enhance energy consumption [59,123]. The schemes reduce the retransmission attempts by adopting the slots in a RAW based on the number of active STAs. However, in most cases, the AP assigns the same slot to many STAs, since the AP is unaware of whether the STAs are in active or sleep mode. The scheme presented in [123] divides the number of STAs into groups, where an AP computes the number of active STAs in each group based on the transmission attempts, and accordingly, the slots are computed in a RAW. An STA contends to gain access to a slot in the RAW period randomly, and if it fails to access the slot, it tries to access the following slot in the same RAW. The proposed scheme shows an enhanced network lifetime of up to 12.3% as compared to the existing RAW mechanism. Correspondingly, the packet delivery ratio is improved, in general, up to 7.5%, due to the re-use factor of empty slots in a RAW period.
Reference [117] proposed a traffic-aware grouping technique to achieve fairness. Their proposed method computes the expected channel utilization of each group based on their traffic requirements, then determines the contention probability. Their study was validated through ns-3, which improved the channel utilization by 5.5% and 9.7% in random grouping and simple utilization, respectively. In addition, their proposed method improved channel fairness by avoiding starvation and uneven distribution of channel resources among distinct groups.
A TDMA and CSMA/CA-based channel access mechanism is proposed for IEEE 802.11ah to improve the throughput performance by considering the traffic load [109]. In CL-MAC, the STAs are initially classified based on their Traffic Profiles (TPs). TPs represent the features, such as the payload of STAs and priority. TPs are further divided into real-time or non-real-time traffic patterns. Based on the traffic priority, TDMA slots are assigned to the STAs based on the group density. The CL-MAC also proposes Guaranteed Time Slots (GTSs) for high-priority traffic. GTSs are only assigned based on the requests received by an AP from a designated STA. The remaining STAs can use the CSMA period for those without access to the TDMA period. The CL-MAC algorithm shows better performance when compared to the EDCA mechanism of IEEE 802.11ah.
The influence of mobility models, Random Walk, Gauss–Markov, and Random Waypoint, was analyzed in the IEEE 802.11ah network by varying the traffic and network density [112]. Their simulation results revealed that the Random Waypoint produced better results in throughput. However, in a high network density case, the performance is degraded by increasing the number of STAs due to high contention. Recently, the authors in [115] proposed a grouping method by splitting the RAW into two sub-RAWs. Their proposed RAW method allows the STAs to group in a similar size inside each sub-RAW.

3.3. Association Identifier (AID)

An AP is responsible for assigning slots to individual STAs and a group of STAs during the time for which the allowed STAs can contend for the channel. An AID is unique in a network, containing 13 bits, divided into 4 levels: page, block, sub-block, and STA’s index in sub-block. A page is divided into 32 blocks of equal length and 8 sub-blocks each. An individual block and sub-block can support up to 64 and 8 STAs. Similarly, a sub-block comprises eight bits, corresponding to an STA position index. This hierarchical construction enables IEEE 802.11ah to support more than 8000 STAs, as shown in Figure 7 [125], and can be adapted to facilitate the grouping of STAs much more quickly. The STAs with different priorities and traffic patterns can be easily grouped to utilize the resources efficiently. Hence, grouping can be used to save power, allocate resources, and for the efficient channel, access [35].
During the network deployment, the AP allocates AIDs to STAs based on (2), which illustrates how an AID ( A i ) is computed and how a slot is assigned to a specific STA during a communication [125].
A i = P a g e I D × 4 + ( P a g e I D B l o c k I n d e x E x t e n t i o n 1 ) × 8 + ( B l o c k I n d e x 1 ) × 8 + ( S u b B l o c k I n d e x 1 ) × 8 + ( B i t P o s i t i o n O f S t a t i o n ) ,
where P a g e I D is the page identifier and P a g e I D B l o c k I n d e x E x t e n t i o n consists of two bits; B l o c k I n d e x , S u b B l o c k I n d e x , and B i t P o s i t i o n O f S t a t i o n comprise three bits. Equation (2) shows the calculation of a unique number per STA based on the hierarchical structure illustrated in Figure 7b [125].

Related Studies Concerning AID, Overhead, and Backoff

The current solutions regarding AID, overhead, and backoff mechanism in the IEEE 802.11ah WLAN are presented here, and their shortcoming and other features are shown in Table 6.
The collision chain mitigation (CCM) algorithm presented in [126] mitigates serious collisions in IEEE 802.11ah dense networks (e.g., smart grid) by using the simultaneous allocation of slots in the RAW duration based on hidden STAs. To mitigate the collisions, CCM follows four steps: (1) detection, (2) interruption, (3) mediation, and (4) identification. First, to detect a collision, an AP checks abnormally long duration by examining the energy block in a channel and considering it as an existence of a collision chain. Second, after collision detection, CCM interrupts the transmission and broadcasts a notification signal. Third, during the phase of mediation, those STAs can continue transmission who have already attempted but failed. Last, in the identification step, the AP collects the transmission start time of STAs to identify the hidden nodes based on the overlapping transmission among different STAs in each group and updates the carrier sensitivity. As a result, the CCM algorithm achieves a lower delay of up to 5 ms compared to the conventional mechanism, which reaches around 28 ms. Furthermore, CCM attains considerably low collision by limiting the number of hidden STAs during group formation. Furthermore, CCM achieves higher throughput by 139% and 146% with six and eight groups, respectively, by limiting the number of hidden STAs to less than 1% in each group. However, the CCM performance degrades (up to 17% less) in a relatively small network of 400 STAs compared to the conventional case in terms of throughput.
A power-saving scheduling technique was developed in [127]. The primary aim was to schedule smart meters to uplink/downlink traffic to reduce the network overhead. Their proposed method also considers the dynamic allocation of the AID to STAs communicating in the network based on their average service time, allowing STAs with comparable service characteristics to occupy subsequent AIDs. Their proposed method showed improved results regarding overheads, throughput, average wake-up time, and energy consumption. Another similar method was presented in [128] to reduce the encoded bitmap length within the same hierarchical structure.
Table 6. Current solutions on association identifier (AID), overhead, and backoff in IEEE 802.11ah WLAN with shortcomings.
Table 6. Current solutions on association identifier (AID), overhead, and backoff in IEEE 802.11ah WLAN with shortcomings.
Ref.YearTraffic TypePerformance EvaluationShortcomingsEvaluation Tool
[128]2014 2015ULbitmap reductiontheir proposed method can cause excessive overhead owing to the association and authentication frames, PS-Poll, and ACK etc., still challengingunknown
[129]2016UL/DLthroughput, delay, association timelimiting contention and RAW size calculation over dynamic networkns-3
[126]2016UL/DLcollision mitigationcollisions remain due to longer sleep duration and number of hidden STAs remain in each group during the regrouping processMATLAB
[127]2017UL/DLthroughput, energy, overheadit does not take into account energy efficiency as the similarity indexMATLAB
[127]2017UL/DLoverhead, energyit completely ignores energy consumption and unnecessary wake-up of STAs and the support for RAW schemesMATLAB
[130]2018ULdelay and retransmissionoptimizing contention window size in a small IoT network does not help in reducing the number of collisions in massive IoT scenarioOPNET
[131]2018UL/DLthroughput, delivery ratio, delayit does not take into heterogeneous traffic requirements while optimizing the contention window sizens-3
[132]2018UL/DLfairness, delay, interferenceEDCCA and Q-learning backoff diminish the packet delivery rate of IEEE 802.11ah because they limit STAs’ channel access opportunitiesanalytical
[133]2018UL/DLscalability, throughput, latency, energytheir proposed method does not consider the STAs status (i.e., either asleep or awake) is still challengingns-3
[134]2019UL/DLthroughput, latencyit is not compatible with the current RAW of the IEEE 802.11ah WLANanalytical
[135]2021UL/DLthroughput, packet collision and loss ratetheir proposed method does not consider re-grouping for load balancing to improve throughputns-3
A distributed MAC protocol supporting a large number in IEEE 802.11ah was proposed for multi-hop communication in [129]. Simulation findings indicated that the suggested protocol enhances throughput, network coverage range, and average end-to-end packet latency compared to 802.11ah. However, most STAs operate in sleep mode in IEEE 802.11ah WLAN, and it is projected that the network would have a considerably greater collision probability at the beginning of a BI than at the end. To mitigate these limitations, the authors in [130] proposed an adaptive contention window technique in which the contention window size is optimized at the beginning of the BI and subsequently decreased after the transmission is successfully completed. Through simulations, it was demonstrated that the suggested method might improve IEEE 802.11ah WLAN performance. Similarly, the collision problem was mitigated with another backoff mechanism in [131], where the authors have developed an analytical model to optimize the contention window size. Their analytical and simulation results showed improved throughput, delivery ratio, and delay performance.
The authors in [132] proposed a learning-based self-coexistence control method for IEEE 802.11ah to decrease interference impact on IEEE 802.15.4g. First, the authors utilized the energy detection clear channel assessment method (EDCCA) on IEEE 802.11ah-enabled STAs to sense the ongoing data communication of IEEE 802.15.4. Second, the authors proposed a Q-learning method by utilizing the backoff mechanism of the IEEE 802.11ah to avoid interference caused by IEEE 802.15.4 packets. Their simulation results showed improved spectrum-sharing performance among both IEEE 802.15.4 and IEEE 802.15.4g.
A simulation study was conducted in [133] to examine the concurrent use and performance of TIM and RAW on scalability. In the presence of DL traffic, the RAW mechanism restricts UL performance by delaying it until the next available channel access opportunity and giving DL priority. As a result, UL-only networks have different RAW performance than networks with bidirectional or DL traffic.
To prevent collisions, an analytical model in [134] was designed to employ association IDs to determine a deterministic backoff value. Existing techniques are compared to the deterministic backoff technique’s performance. According to the findings, their proposed method yields a greater throughput and lower latency than previous deterministic backoff systems.

3.4. Relay and Group Sectorization

3.4.1. Relay

To extend the transmission range between a root AP and STAs, IEEE 802.11ah suggests the use of a relay to serve IoT applications demanding high coverage. Relays consist logically of a relay AP and a relay STA. Relay APs are associated with STAs, while relay STAs are linked to root APs. The root AP sends packets to the relay STA for DL transmission. The relay STA then forwards the sent packets to the relay AP. To simplify the forwarding approach, the relay connection between an STA and the root AP is limited to two hops.

3.4.2. Group Sectorization

Group sectorization utilizes time-division multiplexing with space-division multiplexing [30,136]. It splits a BSS coverage area into sub-areas (i.e., geographical regions), with each sub-area including a subset of STAs, to alleviate hidden terminal issues, traffic congestion, and interference. The sectorization is accomplished by the AP sending or receiving through several antenna beams spanning multiple BSS sectors [49].

3.4.3. Related Studies Concerning Relay and Group Sectorization

Table 7 provides an in-depth overview of the various resource allocation MAC protocols suggested for relay and group sectorization. The highlighted approaches in Table 7 support relay [108,129,137,138,139,140], and group sectorization [141] is supported in IEEE 802.11ah. These approaches can increase the network coverage and capacity. These approaches are compared concerning their unique objectives and their shortcomings highlighted. Relay and group sectorization approaches enhance scalability and improve coverage but lack energy efficiency and cannot function in a heterogeneous scenario.
Among these approaches, reference [137] proposed a hierarchical MAC framework for relay to extend the range. Their proposed method improved the throughput by mitigating interference and lowering energy consumption. Similarly, the authors in [129] presented a distributed MAC protocol focusing on multi-hop communication to support many IoT STAs. Their simulation findings demonstrated that their proposed protocol outperforms IEEE 802.11ah in terms of performance, network coverage range, and average end-to-end packet latency. Reference [129] was improved by the authors in [108] using estimating the RAW size based on traffic loads and providing relay node assistance for STAs using various data rates. The relay nodes distributed bandwidth dynamically to STAs belonging to various relay groups. Another study presented a relay-based IEEE 802.11ah WLAN based on a cross-layer approach to optimize the energy consumption of the STAs [138]. A simulation study through an analytical model was conducted in [139] to evaluate the effectiveness and achievable range with dual-hop relay, as suggested by IEEE 802.11ah.
A sector-wise STA grouping system for fast channel access was proposed in [141]. First, the coverage area is divided into unique sectors by the AP. Second, each sector is further divided into various groups based on the number of STAs, and each group within a sector is then allotted particular RAW slots. Finally, STAs inside each group in different sectors use a spatial orthogonal access method to access the allocated RAW slots. Compared to the standard DCF and IEEE 802.11ah grouping methods, their simulation findings demonstrated that their proposed method might significantly increase network performance while concurrently minimizing the delay.

3.5. Traffic Indication Map (TIM) Segmentation

A TIM element, known as TIM beacon, is used inside each beacon frame by the AP to indicate a list of STAs with buffered data packets [98]. In the case of no buffered packets, the STA stays asleep. Otherwise, a PS-Poll frame is transmitted to recover the buffered data packets. However, the AP transmitting DL traffic inside a beacon frame for some STAs causes a bottleneck. IEEE 802.11ah addresses this issue with an enhanced power-saving mechanism known as TIM segmentation. This method splits the TIM information into N segments (e.g., TIM groups). The TIM beacon carries information for each TIM group. The Delivery Traffic Indication Map (DTIM) beacons are used for TIM group-level signaling, while TIM beacons are employed at the STA level. Periodically, all STAs wake up at a designated time to receive the DTIM signal. All STAs in the TIM group check if the AP has data waiting for their TIM group. In the case AP has data waiting for STAs, they wake up and listen to the TIM beacon. Otherwise, all STAs go back to sleep mode. As shown in Figure 8, the AP has only pending data for TIM Group 7. Consequently, STAs in TIM Group 7 wake up and listen to the corresponding TIM signal, while other stations return to sleep until the subsequent DTIM announcement. In addition, when the beacon for TIM Group 7 is received by the STAs, signaling that the AP has pending data for STAs 1539 and 1540, the remaining STAs of TIM Group 7 continue to sleep while STAs 1539 and 1540 compete for channel access to obtain the data from the AP.

Related Studies Concerning TIM Segmentation

Table 8 provides an overview of the various related studies suggested for TIM segmentation. Some existing studies have examined the TIM segmentation performance from different perspectives, including the energy consumption for DL traffic [142,143,144,145]. In contrast, other related studies are interested in using TIM segmentation and RAW to support both UL and DL [111,133,146,147,148], to provide and support heterogeneous services.
The authors in [143] examined the performance of the TIM segmentation for the DL traffic under different network settings. The findings indicated a trade-off between delay and energy consumption; shorter DTIM intervals may reduce delay, but it can increase energy consumption.
To solve the TIM segmentation problem, [144,145] presented a solution that dynamically modifies the STA membership. Their method issue a primary and secondary AID to an STA. As a result, the STA becomes a member of two distinct TIM groups, enabling it to transition between the groups and reorganize its traffic to optimize total resting time without delaying data transmission.
Reference [146] proposed an analytical model to reduce energy consumption. The model comprised a RAW group composed of one DL TIM and one UL segment. Based on a set of closed-form equations, the model estimated the average energy used by an STA and anticipated its battery lifespan.
A simple and precise mathematical model [147] was adopted to manage a protected interval during which only a subset of low-power STAs with sporadic traffic transmit their PS-Polls to retrieve DL packets indicated by TIM elements to reduce energy consumption for low-power STAs and increase throughput for the powered STAs with saturated traffic.
To improve the efficiency of the heterogeneous network (e.g., with different requirements of the IoT applications), the authors proposed an analytical model using a joint TIM segmentation with RAW [147]. In addition, the authors studied the impact of the throughput and average energy consumption. They improved the throughput and energy consumption compared to the legacy RAW mechanism.

3.6. Target Wakeup Time (TWT) for Energy Saving

TWT reduces the energy consumption of STAs with intermittent data transmission. TWT enables STAs to decide when and how often they wake up to receive data from the AP or send data to the AP. According to the TWT mechanism, the TWT service period (SP) is the amount of time a sleeping STA is awake and able to receive or send packets. Therefore, the STAs do not need to wake up unnecessarily to receive beacons from the AP. As a result, the STA can stay in low-powering saving mode (i.e., sleep mode) for a long time.

Related Studies Concerning TWT and Energy Saving

Table 9 provides an in-depth overview of the various resource allocation MAC protocols suggested for TWT. Some earlier works have focused on TWT [149,150,151,152]. As RAW may be used to safeguard TWT STAs from collisions with other STAs, Ref. [149] suggested interleaving TWT STAs. As a result, their TWT may be covered by a single RAW, lowering RAW indication overhead and transmission delay.
The article in [150] focused on how RAW and TWT may help in the reduction of energy consumption. First, the authors introduced an analytical model that determines the typical energy use across a RAW session. Next, the IEEE 802.11ah simulator that was modified for this purpose with an energy life-cycle model for RAW and TWT was used to compare these findings. Next, the authors utilized RAW to analyze energy use in various scenarios. Finally, a TWT was used to assess energy use. Their findings demonstrate that the analytical model has a maximum divergence from simulations of 10% when the capture effect (CE) is present and 7% when it is not. Furthermore, when there is more traffic, RAW consistently outperforms CSMA/CA, and using additional slots has been shown to have superior energy efficiency, up to 76%, and dramatically increasing latency.
Authors [151] investigated the energy consumption of RAW and TWT STAs coexisting. Their findings showed that the presence of RAW STAs might have a detrimental impact on the energy efficiency of TWT STAs. However, a suitable channel access scheduling can offset this effect without compromising the throughput performance of RAW STAs. Clock drift is one of the issues with TWT since it causes devices to stop closely adhering to the schedule, therefore missing the planned transmission time, which increases the active time and energy consumption. Recently, the authors in [153] proposed a PRAW with a unique analytical model for minimizing the channel timeshare, average latency, and energy consumption. The important aspect of their analytical model is the analysis of short PRAW slots, which reduces computing complexity and achieves high precision.
Table 9. Current solution concerning TWT with shortcomings.
Table 9. Current solution concerning TWT with shortcomings.
RefYearTraffic TypePerformance EvaluationShortcomingsEvaluation Tool
[89]2016ULthroughput, packet loss rate, latencyTIM segmentation is not taken into accountns-3
[149]2018ULthroughputno solution is proposed for RAW mechanism optimizationanalytical
[152]2018DL/ULpacket delivery rate, energy consumptionRAW optimization is not taken accountns-3
[150]2019DL/ULlatencythe transmission time should be know to utilize TWTns-3
[151]2019DL/ULenergy consumptionclock drift might cause missing the planned transmission time, which may increase the active time and, consequently, energy consumptionns-3
[153]2021UL/DLthroughput, delay, energy consumptiona tradeoff exists between delay and energy consumption, influenced by the traffic intensityanalytical and ns-3

4. Potentials of IEEE 802.11ah and Challenges

This section highlights the potentials and challenges of IEEE 802.11ah in the massive IoT, M2M, and Heterogeneous Internet of Medical Things (Het-IoMT) applications. The requirements can be differentiated to envision the challenges within the IoT, Het-IoMT, and M2M communications. For example, massive STAs transmitting traffic (i.e., homogeneous or heterogeneous) simultaneously or periodically, features such as low energy consumption, network coverage, and a long sleep interval. The rest of this section presents an overview of the features used by the IEEE 802.11ah to tackle the challenges faced by IoT applications.

4.1. Network Coverage

Network coverage refers to the area in which wireless signals are transmitted. IEEE 802.11ah support thousands of STAs on a sub-1 GHz band within a 1 km coverage area. However, some of the applications need a higher range than 1 km due to the nature of the operation (e.g., smart grid [52,53]). The network coverage of WLANs in an urban environment is highly impacted by two primary sources, namely, multipath and external WLAN interference [37]. The adverse effects of multipath are dominant if omnidirectional antennae are used. However, multipath effects can lead to higher end-to-end delay and channel attenuation, leading to intersymbol interference (ISI) in WLANs.
IEEE 802.11ah fulfills the coverage requirement by presenting a 1 MHz channel bandwidth with a new feature of the MCS index, MCS10. In addition, it also provides support for 2, 4, 8, and 16 MHz. Unfortunately, extending the transmission range requires a larger symbol duration than the legacy IEEE 802.11 due to the support of such narrow bandwidths. However, due to longer symbols and guard time intervals, IEEE 802.11ah is robust to ISI in outdoor and indoor environments [37].
Furthermore, due to the support of MIMO, IEEE 802.11ah benefits from spatial diversity. This feature improves the received signal quality of the IEEE 802.11ah link; hence, longer links are possible. In addition, IEEE 802.11ah provides an appropriate feature of a backhaul link to accommodate the aggregated data and helps increase coverage. Furthermore, the IEEE 802.11ah specification considers multi-hop features with relay nodes to further extend the coverage [39].

4.2. Resources

Currently, some technologies operate in the most widely used frequency band of 2.4 GHz (IEEE 802.11, IEEE 802.15, BLE, etc.). As a result, these technologies suffer from interference, degrading the network performance concerning packet loss, high energy consumption, and long network delays. Moreover, due to massive IoT device connectivity, long-range, and diverse resources, the 2.4 GHz band does not look suitable for IEEE 802.11ah. On the contrary, communication problems, such as inter and intra-interference, which is very destructive in CSMA-based channel access techniques, are aggravated. Nevertheless, the IEEE 802.11ah standard is envisioned to operate below 1 GHz resulting in better coverage and less interference. This feature of the IEEE 802.11ah seems attractive for the IoT, M2M, and Het-IoMT applications, where thousands of devices are likely to coexist. In addition, to accommodate massive IoT devices, IEEE 802.11ah recommends using RAW to provide high-channel-utilization services to several STAs/groups of STAs participating in the communication [154].

4.3. Support for Massive IoT

IoT, M2M, and Het-IoMT-based networks consist of thousands of STAs. However, the network suffers high collision because STAs try to associate with the AP simultaneously, thus leading to a severe collision. To limit channel contention, IEEE 802.11ah offers a promising feature called an authentication control mechanism (ACM), which allows only a small group of STAs for association in a BI. In addition, during the process of simultaneous communication, collisions occur frequently. These excessive collisions result in reduced network throughput, increased end-to-end communication latency, and excessive energy consumption during the retransmission process; thus, finding an appropriate technique to reduce the collision is challenging in the field of IoT. Furthermore, when multi-APs with large-scale associated STAs are considered in a massive IoT network, APs are presumed unsynchronized, and no coordination between them is used. Under this scenario, high interference between the APs is expected, and a notable decay in throughput might occur.
Previous standards of IEEE 802.11 support only up to 2007 STAs by a single AP due to the limited number of AID that can be assigned during the association/authentication [30,33]. On the contrary, IEEE 802.11ah uses a novel AID structure, as shown in Figure 7, to support 8191 STAs by a single AP. IEEE 802.11ah groups the thousands of STAs based on similar characteristics by efficiently utilizing the AID structure, proving support for massive IoT STAs.

4.4. Energy Consumption

The IoT devices are driven by a battery and should work for months or years based on the application requirements. Hence, low power consumption becomes a crucial aspect of increasing the battery life of IoT, M2M, and Het-IoMT STAs. To prolong the network lifetime, IEEE 802.11ah uses the TWT mechanism [152]. Based on TWT, AP schedule the wake-up time of STAs and their channel access attempts. The wake-up information between an AP and an STA is exchanged utilizing an association request and association response frames. Thus, the STAs with a low energy budget can start negotiating with the AP based on the TWT procedure before going into sleep mode.
Similarly, IEEE 802.11ah uses a shorter header, implicit acknowledgment, and speed frame exchange (i.e., Transmission Opportunity), which helps in extending the battery lifetime of STAs by shortening the transmission time and keeping them awake for shorter periods.

5. Conclusions and Future Directions

IEEE 802.11ah, known as Wi-Fi HaLow, is a viable next-generation Wi-Fi technology envisioned for long-range, low-power, and large-scale IoT applications. This survey offers a detailed review and analysis of the current developments in IEEE 802.11ah WLAN. First, this survey presented a detailed summary of the current surveys and tutorials and their targeted areas, use cases of IEEE 802.11ah with deployed scenarios, and a description of IEEE 802.11ah WLAN along with MAC features. Second, the current solutions for different MAC features of the IEEE 802.11ah WLAN were thoroughly studied and assessed from several aspects, along with their shortcomings. Thirdly, the potential of the IEEE 802.11ah and its challenges were discussed.
In conclusion, IEEE 802.11ah combines the benefits of Wi-Fi and low-power communication technologies, supports a high data rate, and can meet the performance requirements of various IoT applications with tailored approaches such as large-scale networks, low power, and QoS. In a massive IoT network, UL traffic is dominant. Therefore, the RAW mechanism can be adapted to minimize collisions by modifying appropriate parameters. These parameters include RAW group length, the number of slots in a RAW, and the number of STAs. As a result, the IEEE 802.11ah WLAN performance in terms of throughput, energy consumption, and latency could be increased. In addition, TIM segmentation may be used to reduce energy consumption in low-powered STA and DL traffic. In a massive IoT network, a mix of RAW, TIM segmentation, TWT, and other characteristics may be deployed concurrently to fulfill heterogeneous traffic demands or QoS requirements. Moreover, massive access communication based on machine learning is a new trend in IoT wireless communication. With resource-constrained device features, intelligent resource allocation, signal processing, channel estimate, and transceiver design may increase IEEE 802.11ah WLAN performance.
Finally, in the future, we anticipate that Wi-Fi HaLow will play a significant role in massive IoT networks and be extensively adopted for IoT when more off-the-shelf solutions become available.

Author Contributions

Conceptualization, A.F. and J.-Y.P.; writing—original draft preparation, A.F.; writing—review and editing, A.F. and J.-Y.P.; supervision, J.-Y.P.; project administration, J.-Y.P.; funding acquisition, J.-Y.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the BrainKorea21Four Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (4299990114316).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ACMAuthentication Control Mechanism
ACSAuthentication Control Slot
AIDAssociation Identifier
AssocReqAssociation Request
AuthReqAuthentication Request
b/sbits per second
BIBeacon Interval
BLEBluetooth Low Energy
BSSSasic Service Set
CACCentralized Authentication Control
CASChannel Access Slot
CCMCollision Chain Mitigation
CRSContention Reservation Scheme
DACDistributed Authentication Control
DTIMDelivery Traffic Indication Map
EDCCAEnergy Detection Clear Channel Assessment Method
FASUSFast Association Based on Speculating the Number of Stations
FILSFast Initial Link Setup
FKRFast Key Re-authentication
G-RAPRenewal Access Protocol with Grouping
GS-DCFGroup-synchronized Distributed Coordination Function
GTSGuaranteed Time Slot
HANHome Area Network
IoTInternet of Things
IoVInternet of Vehicles
kbpskilobits per second
LEACHLow-Energy Adaptive Clustering Hierarchy
LoRaLong Range
LPWANLow-Power Wide Area Networks
M2MMachine-to-Machine
MACMedium Access Control
MIMOMulti Input Multi Output
MTCMachine-Type Communication
NANNeighborhood Area Network
NB-IoTNarrowband-IoT
OFDMOrthogonal Frequency Division Multiplexing
PHYPhysical Layer
PSPower Saving
PSMPower Saving Mechanism
PSMPPower Save Multi-Poll
RAPRenewal Access Protocol
RAWRestricted Access Window
RPSRAW Parameter Set
RSSIReceived Signal Strength Indication
SPService Period
STAStation
STSSequential Transmission Scheme
TAROATraffic-Adaptive RAW Optimization Algorithm
TBTTTarget Beacon Transmission Time
TDMATime Division Multiple Access
TDoATime Difference of Arrival
TIMTraffic Indication Map
TPTraffic Profile
TWTTarget Wakeup Time
UAVUnmanned Aerial Vehicle
WANWide Area Network
WPANWireless Personal Area Network

References

  1. Farhad, A.; Pyun, J.Y. HADR: A Hybrid Adaptive Data Rate in LoRaWAN for Internet of Things. ICT Express 2022, 8, 283–289. [Google Scholar] [CrossRef]
  2. Tiwari, R.; Mittal, M.; Goyal, L.M. Energy Conservation Solutions for Fog-Edge Computing Paradigms; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar]
  3. Chakravarthi, V.S. Internet of Things and M2M Communication Technologies; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar]
  4. Farhad, A.; Kim, D.H.; Pyun, J.Y. R-ARM: Retransmission-Assisted Resource Management in LoRaWAN for the Internet of Things. IEEE Internet Things J. 2022, 9, 7347–7361. [Google Scholar] [CrossRef]
  5. Subedi, S.; Kim, D.H.; Kim, B.H.; Pyun, J.Y. Improved smartphone-based indoor localization system using lightweight fingerprinting and inertial sensors. IEEE Access 2021, 9, 53343–53357. [Google Scholar] [CrossRef]
  6. Farhad, A.; Zia, Y.; Hussain, F.B. Survey of Dynamic Super-Frame Adjustment Schemes in Beacon-Enabled IEEE 802.15.4 Networks: An Application’s Perspective. Wirel. Pers. Commun. 2016, 91, 119–135. [Google Scholar] [CrossRef]
  7. Sinha, R.S.; Wei, Y.; Hwang, S.H. A survey on LPWA technology: LoRa and NB-IoT. ICT Express 2017, 3, 14–21. [Google Scholar] [CrossRef]
  8. Tian, L.; Santi, S.; Seferagić, A.; Lan, J.; Famaey, J. Wi-Fi HaLow for the Internet of Things: An up-to-date survey on IEEE 802.11 ah research. J. Netw. Comput. Appl. 2021, 182, 103036. [Google Scholar] [CrossRef]
  9. Farhad, A.; Kim, D.H.; Kim, B.H.; Mohammed, A.F.Y.; Pyun, J.Y. Mobility-Aware Resource Assignment to IoT Applications in Long-Range Wide Area Networks. IEEE Access 2020, 8, 186111–186124. [Google Scholar] [CrossRef]
  10. Farhad, A.; Kim, D.H.; Subedi, S.; Pyun, J.Y. Enhanced lorawan adaptive data rate for mobile internet of things devices. Sensors 2020, 20, 6466. [Google Scholar] [CrossRef] [PubMed]
  11. Subedi, S.; Pyun, J.Y. A Survey of Smartphone-Based Indoor Positioning System Using RF-Based Wireless Technologies. Sensors 2020, 20, 7230. [Google Scholar] [CrossRef] [PubMed]
  12. Kim, D.H.; Farhad, A.; Pyun, J.Y. UWB Positioning System Based on LSTM Classification with Mitigated NLOS Effects. IEEE Internet Things J. 2022. [Google Scholar] [CrossRef]
  13. Rajesh Gowd, G.; Prasad, M. ZigBee-Based Health Monitoring System. In Control and Measurement Applications for Smart Grid; Springer: Berlin/Heidelberg, Germany, 2022; pp. 243–254. [Google Scholar]
  14. Farhad, A.; Kim, D.H.; Pyun, J.Y. Resource Allocation to Massive Internet of Things in LoRaWANs. Sensors 2020, 20, 2645. [Google Scholar] [CrossRef]
  15. Mekki, K.; Bajic, E.; Chaxel, F.; Meyer, F. A comparative study of LPWAN technologies for large-scale IoT deployment. ICT Express 2019, 5, 1–7. [Google Scholar] [CrossRef]
  16. Singh, R.K.; Puluckul, P.P.; Berkvens, R.; Weyn, M. Energy consumption analysis of LPWAN technologies and lifetime estimation for IoT application. Sensors 2020, 20, 4794. [Google Scholar] [CrossRef]
  17. Gomez, C.; Veras, J.C.; Vidal, R.; Casals, L.; Paradells, J. A sigfox energy consumption model. Sensors 2019, 19, 681. [Google Scholar] [CrossRef] [Green Version]
  18. Subedi, S.; Hwang, S.S.; Pyun, J.Y. Hybrid Wireless Indoor Positioning System Combining BLE Beacons And Wi-Fi APs. In Proceedings of the 2020 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Republic of Korea, 21–23 October 2020; pp. 36–41. [Google Scholar]
  19. Zia, Y.; Farhad, A.; Bashir, F.; Qureshi, K.N.; Ahmed, G. Content-based dynamic superframe adaptation for Internet of Medical Things. Int. J. Distrib. Sens. Netw. 2020, 16, 1550147720907032. [Google Scholar] [CrossRef] [Green Version]
  20. IEEE. Standard for Information Technology—Telecommunications and Information Exchange Between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2: Sub 1 GHz License Exempt Operation; IEEE Std 802.11ah-2016 (Amendment to IEEE Std 802.11-2016, as Amended by IEEE Std 802.11ai-2016); IEEE: Piscataway, NJ, USA, 2017; pp. 1–594. [Google Scholar] [CrossRef]
  21. Amodu, O.A.; Othman, M. Machine-to-machine communication: An overview of opportunities. Comput. Netw. 2018, 145, 255–276. [Google Scholar] [CrossRef]
  22. Sthapit, P.; Pyun, J.Y. Implicit Block ACK Scheme for IEEE 802.11 WLANs. Sensors 2016, 16, 167. [Google Scholar] [CrossRef] [Green Version]
  23. Chakravarthi, V.S. M2M Communication in Constrained Devices. In Internet of Things and M2M Communication Technologies: Architecture and Practical Design Approach to IoT in Industry 4.0; Springer International Publishing: Cham, Switzerland, 2021; pp. 191–206. [Google Scholar] [CrossRef]
  24. Emmanuel, M.; Rayudu, R. Communication technologies for smart grid applications: A survey. J. Netw. Comput. Appl. 2016, 74, 133–148. [Google Scholar] [CrossRef]
  25. Adhiatma, F.N.; Perdana, D.; Adriansyah, N.M. Techno-Economic Analysis of Implementation IEEE 802.11 ah Standard for Smart Meter Application in Bandung Area. In Proceedings of the 2020 6th International Conference on Science and Technology (ICST), Yogyakarta, Indonesia, 7–8 September 2020; Volume 1, pp. 1–6. [Google Scholar]
  26. Brinkhoff, J.; Hornbuckle, J.; Quayle, W.; Lurbe, C.B.; Dowling, T. WiField, an IEEE 802.11-based agricultural sensor data gathering and logging platform. In Proceedings of the 2017 Eleventh International Conference on Sensing Technology (ICST), Sydney, Australia, 4–6 December 2017; pp. 1–6. [Google Scholar]
  27. Kocan, E.; Domazetovic, B.; Pejanovic-Djurisic, M. Range extension in IEEE 802.11 ah systems through relaying. Wirel. Pers. Commun. 2017, 97, 1889–1910. [Google Scholar] [CrossRef] [Green Version]
  28. Lee, I.G.; Kim, D.B.; Choi, J.; Park, H.; Lee, S.K.; Cho, J.; Yu, H. WiFi HaLow for Long-Range and Low-Power Internet of Things: System on Chip Development and Performance Evaluation. IEEE Commun. Mag. 2021, 59, 101–107. [Google Scholar] [CrossRef]
  29. Wang, W.; Xu, Y.; Khanna, M. A survey on the communication architectures in smart grid. Comput. Netw. 2011, 55, 3604–3629. [Google Scholar] [CrossRef]
  30. Khorov, E.; Lyakhov, A.; Krotov, A.; Guschin, A. A survey on IEEE 802.11 ah: An enabling networking technology for smart cities. Comput. Commun. 2015, 58, 53–69. [Google Scholar] [CrossRef]
  31. Aust, S.; Prasad, R.V.; Niemegeers, I.G.M.M. IEEE 802.11ah: Advantages in standards and further challenges for sub 1 GHz Wi-Fi. In Proceedings of the IEEE International Conference on Communications, Ottawa, ON, Canada, 10–15 June 2012; pp. 6885–6889. [Google Scholar] [CrossRef]
  32. Adame, T.; Bel, A.; Bellalta, B.; Barcelo, J.; Gonzalez, J.; Oliver, M. Capacity Analysis of IEEE 802.11ah WLANs for M2M Communications; Springer: Cham, Switzerland, 2013; pp. 139–155. [Google Scholar]
  33. IEEE. Standard for Information Technology—Telecommunications and Information Exchange between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 3: Enhancements for Very High Throughput in the 60 GHz Band; IEEE Std 802.11ad-2012 (Amendment to IEEE Std 802.11-2012, as Amended by IEEE Std 802.11ae-2012 and IEEE Std 802.11aa-2012); IEEE: Piscataway, NJ, USA, 2012; pp. 1–628. [Google Scholar] [CrossRef]
  34. Zhou, Y.; Wang, H.; Zheng, S.; Lei, Z.Z. Advances in IEEE 802.11ah standardization for machine-type communications in sub-1GHz WLAN. In Proceedings of the 2013 IEEE International Conference on Communications Workshops (ICC), Budapest, Hungary, 9–13 June 2013; pp. 1269–1273. [Google Scholar] [CrossRef]
  35. Sun, W.; Choi, M.; Choi, S. IEEE 802.11 ah: A long range 802.11 WLAN at sub 1 GHz. J. ICT Stand. 2013, 1, 83–108. [Google Scholar]
  36. Adame, T.; Bel, A.; Bellalta, B.; Barcelo, J.; Oliver, M. IEEE 802.11 AH: The WiFi approach for M2M communications. IEEE Wirel. Commun. 2014, 21, 144–152. [Google Scholar] [CrossRef] [Green Version]
  37. Aust, S.; Prasad, R.V.; Niemegeers, I.G. Outdoor long-range WLANs: A lesson for IEEE 802.11 ah. IEEE Commun. Surv. Tutorials 2015, 17, 1761–1775. [Google Scholar] [CrossRef]
  38. Park, M. IEEE 802.11ah: Sub-1-GHz license-exempt operation for the internet of things. IEEE Commun. Mag. 2015, 53, 145–151. [Google Scholar] [CrossRef]
  39. Baños-Gonzalez, V.; Afaqui, M.S.; Lopez-Aguilera, E.; Garcia-Villegas, E. IEEE 802.11 ah: A technology to face the IoT challenge. Sensors 2016, 16, 1960. [Google Scholar] [CrossRef] [Green Version]
  40. Meera, M.; Rao, S.N. A survey of the state of the art of 802.11 ah. In Proceedings of the 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Coimbatore, India, 14–16 December 2017; pp. 1–4. [Google Scholar]
  41. Sadeghi, R.; Barraca, J.P.; Aguiar, R.L. A survey on cooperative MAC protocols in IEEE 802.11 wireless networks. Wirel. Pers. Commun. 2017, 95, 1469–1493. [Google Scholar] [CrossRef]
  42. Zhao, M.; Kumar, A.; Ristaniemi, T.; Chong, P.H.J. Machine-to-machine communication and research challenges: A survey. Wirel. Pers. Commun. 2017, 97, 3569–3585. [Google Scholar] [CrossRef]
  43. Muteba, F.; Djouani, K.; Olwal, T. A comparative survey study on LPWA IoT technologies: Design, considerations, challenges and solutions. Procedia Comput. Sci. 2019, 155, 636–641. [Google Scholar] [CrossRef]
  44. Cheng, Y.; Yang, D.; Zhou, H.; Wang, H. Adopting IEEE 802.11 MAC for industrial delay-sensitive wireless control and monitoring applications: A survey. Comput. Netw. 2019, 157, 41–67. [Google Scholar] [CrossRef]
  45. Oliveira, L.; Rodrigues, J.J.; Kozlov, S.A.; Rabêlo, R.A.; de Albuquerque, V.H.C. MAC layer protocols for Internet of Things: A survey. Future Internet 2019, 11, 16. [Google Scholar] [CrossRef] [Green Version]
  46. Pavan, B.S.; Mahesh, M.; Harigovindan, V. IEEE 802.11 ah for internet of vehicles: Design issues and challenges. In Internet of Vehicles and its Applications in Autonomous Driving; Springer: Berlin/Heidelberg, Germany, 2021; pp. 41–61. [Google Scholar]
  47. Szott, S.; Kosek-Szott, K.; Gawłowicz, P.; Gómez, J.T.; Bellalta, B.; Zubow, A.; Dressler, F. WiFi Meets ML: A Survey on Improving IEEE 802.11 Performance with Machine Learning. arXiv 2021, arXiv:2109.04786. [Google Scholar]
  48. Dimitriou, N.; Kontovasilis, K. Mobile IoT Networks: Standards, Use Cases and Requirements. In Proceedings of the 2021 IEEE Conference on Standards for Communications and Networking (CSCN), Thessaloniki, Greece, 15–17 December 2021; pp. 46–51. [Google Scholar]
  49. Ahmed, N.; De, D.; Barbhuiya, F.A.; Hussain, M.I. MAC Protocols for IEEE 802.11ah-Based Internet of Things: A Survey. IEEE Internet Things J. 2022, 9, 916–938. [Google Scholar] [CrossRef]
  50. Liu, Y. Wireless sensor network applications in smart grid: Recent trends and challenges. Int. J. Distrib. Sens. Netw. 2012, 2012, 492819. [Google Scholar] [CrossRef]
  51. Gungor, V.C.; Sahin, D.; Kocak, T.; Ergut, S.; Buccella, C.; Cecati, C.; Hancke, G.P. A Survey on smart grid potential applications and communication requirements. IEEE Trans. Ind. Inform. 2013, 9, 28–42. [Google Scholar] [CrossRef] [Green Version]
  52. NEWRATEK. NRC4792: TV White Space (TVWS) Based IEEE 802.11ah Wi-Fi Solution + MCU SoC. Available online: https://22278615.fs1.hubspotusercontent-na1.net/hubfs/22278615/Product%20Brochure%20(NRC4792)(NEWRATEK)-1.pdf (accessed on 13 October 2022).
  53. NEWRATEK. NRC7292: IEEE 802.11ah Wi-Fi Solution + MCU SoC. Available online: https://22278615.fs1.hubspotusercontentna1.net/hubfs/22278615/Product%20Brochure%20(NRC7292)(NEWRATEK).pdf (accessed on 13 October 2022).
  54. Chithaluru, P.; Tiwari, R.; Kumar, K. AREOR–Adaptive ranking based energy efficient opportunistic routing scheme in Wireless Sensor Network. Comput. Netw. 2019, 162, 106863. [Google Scholar] [CrossRef]
  55. Chithaluru, P.; Tiwari, R.; Kumar, K. Performance analysis of energy efficient opportunistic routing protocols in wireless sensor network. Int. J. Sensors Wirel. Commun. Control. 2021, 11, 24–41. [Google Scholar] [CrossRef]
  56. Yang, Y.; Yin, Y.; Hu, Z. MAC protocols design for smart metering network. arXiv 2016, arXiv:1601.01069. [Google Scholar] [CrossRef] [Green Version]
  57. Brak, M.E.; Brak, S.E.; Essaaidi, M.; Benhaddou, D. Wireless Sensor Network applications in smart grid. In Proceedings of the 2014 International Renewable and Sustainable Energy Conference (IRSEC), Ouarzazate, Morocco, 17–19 October 2014; pp. 587–592. [Google Scholar]
  58. Zheng, Z.; Cui, W.; Qiao, L.; Guo, J. Performance and power consumption analysis of ieee802. 11ah for smart grid. Wirel. Commun. Mob. Comput. 2018, 2018, 5286560. [Google Scholar] [CrossRef] [Green Version]
  59. Wang, Y.; Li, Y.; Chai, K.K.; Chen, Y.; Schormans, J. Energy-aware adaptive restricted access window for IEEE 802.11ah based smart grid networks. In Proceedings of the 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), Miami, FL, USA, 2–5 November 2015; pp. 581–586. [Google Scholar]
  60. Gharavi, H.; Hu, B. Wireless infrastructure M2M network for distributed power grid monitoring. IEEE Network 2017, 31, 122–128. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  61. NEWRATEK. NRC7292EVK: IEEE 802.11ah Wi-Fi Module Evaluation Kit. Available online: https://22278615.fs1.hubspotusercontentna1.net/hubfs/22278615/Product%20Brochure%20(NRC7292%20EVK)(NEWRATEK)-1.pdf (accessed on 13 October 2022).
  62. Song, W. IEEE 802.11 ah Use Case-Outdoor Environmental/Agricultural Monitoring. 2011. Available online: https://mentor.ieee.org/802.11/dcn/11/11-11-0301-02-00ah-categories-of-use-cases-and-straw-polls.pptx (accessed on 7 September 2022).
  63. Gonsioroski, L.; dos Santos, A.B.; Silva, R.M.L.; da Silva Mello, L.R.A.; Oliveira, C.H.R.; Castellanos, P.G. Channel Measurement and Modeling for Path Loss Prediction in Vegetated Environment for IEEE 802.11 ah Network. In Proceedings of the 2020 IEEE Latin-American Conference on Communications (LATINCOM), Santo Domingo, Dominican Republic, 18–20 November 2020; pp. 1–6. [Google Scholar]
  64. Brinkhoff, J.; Hornbuckle, J. Characterization of WiFi signal range for agricultural WSNs. In Proceedings of the 2017 23rd Asia-Pacific Conference on Communications (APCC), Perth, Australia, 11–13 December 2017; pp. 1–6. [Google Scholar]
  65. Abbasi, M.; Yaghmaee, M.H.; Rahnama, F. Internet of Things in agriculture: A survey. In Proceedings of the 2019 3rd International Conference on Internet of Things and Applications (IoT), Isfahan, Iran, 17–18 April 2019; pp. 1–12. [Google Scholar]
  66. Yasuhiko; Inoue, S.; Kitazawa, T.; Hasegawa, M.; Abe, T.; Sakai. IEEE 802.11ah Use Cases Considered by AHPC, 2019. Available online: https://mentor.ieee.org/802.19/dcn/19/19-19-0047-00-0003-ieee-802-11ah-use-cases-considered-by-ahpc.pptx (accessed on 13 October 2022).
  67. Iwaoka, M. IEEE 802.11 ah use case-industrial process automation. 2011. 2011. Available online: https://mentor.ieee.org/802.11/dcn/11/11-11-0260-01-00ah-tgah-use-case-industrial-process-automation.ppt (accessed on 10 September 2022).
  68. Technology, S. IEEE 802.11ah Wi-Fi HaLow Wireless Bridge BR-100AH. Available online: https://www.silextechnology.com/hubfs/Resource%20PDF/140-20167-100%20BR-100AH%20user%20manual.pdf (accessed on 13 October 2022).
  69. Technology, S. SX-NEWAH. 2022. Available online: https://www.silextechnology.com/hubfs/Resource%20PDF/SX-NEWAH_Hardware%20Specification_JW205520AB_spec_20201110.pdf (accessed on 13 October 2022).
  70. Park, M. Additional Indoor Use Cases for 802.11 ah. 2011. 2011. Available online: https://mentor.ieee.org/802.11/dcn/11/11-11-0017-00-00ah-proposed-ieee-802-11ah-use-cases.pdf (accessed on 8 September 2022).
  71. Khan, M.; Jilani, M.T.; Khan, M.K.; Ahmed, M. A Security Framework for Wireless Body Area Network Based Smart Healthcare System. 2017. Available online: https://ceur-ws.org/Vol-1852/p13.pdf (accessed on 8 September 2022).
  72. Mateska, A.; Pavloski, M.; Gavrilovska, L. RFID and sensors enabled In-home elderly care. In Proceedings of the 34th International Convention MIPRO 2011, Opatija, Croatia, 23–27 May 2011; pp. 285–290. [Google Scholar]
  73. Díaz-Ramírez, A.; Domínguez, E.; Martínez-Alvarado, L. A falls detection system for the elderly based on a WSN. In Proceedings of the International Symposium on Technology and Society, Dublin, Ireland, 11–12 November 2016; pp. 1–6. [Google Scholar] [CrossRef]
  74. Sohn, S.Y.; Bae, M.; Lee, D.K.R.; Kim, H. Alarm system for elder patients medication with IoT-enabled pill bottle. In Proceedings of the International Conference on ICT Convergence 2015: Innovations Toward the IoT, 5G, and Smart Media Era, ICTC 2015, Jeju, Republic of Korea, 28–30 October 2015; pp. 59–61. [Google Scholar] [CrossRef]
  75. Porat, R. Additional Outdoor Use Case for 802.11 ah. IEEE 802.11-11/0243r0. 2011. Available online: https://mentor.ieee.org/802.11/dcn/11/11-11-0243-01-00ah-tgah-additional-outdoor-use-case.ppt (accessed on 29 August 2022).
  76. Kim, S. IEEE 802.11 ah Use Case-Outdoor Wi-Fi for Cellular Traffic Offloading. IEEE 802.11-11/0244r1. 2011. Available online: https://mentor.ieee.org/802.11/dcn/11/11-11-0244-01-00ah-tgah-use-case-outdoor-wi-fi-for-cellular-traffic-offloading.ppt (accessed on 21 August 2022).
  77. Shimada, S. Supplemental Use Cases in Industrial Apps. IEEE 802.11-11/0014r2. 2011. Available online: https://mentor.ieee.org/802.11/dcn/11/11-11-0014-02-00ah-supplemental-use-case-in-industrial-infrastructural-apps.ppt (accessed on 21 August 2022).
  78. HALASZ. Sub 1 GHz License-Exempt PAR and 5C. IEEE 802.11-10/0001r13 2010. Available online: https://mentor.ieee.org/802.11/dcn/10/11-10-0001-13-0wng-900mhz-par-and-5c.doc (accessed on 20 August 2022).
  79. Hazmi, A.; Rinne, J.; Valkama, M. Feasibility study of IEEE 802.11ah radio technology for IoT and M2M use cases. In Proceedings of the 2012 IEEE Globecom Workshops, Anaheim, CA, USA, 3–7 December 2012; pp. 1687–1692. [Google Scholar] [CrossRef]
  80. Nafi, N.S.; Ahmed, K.; Gregory, M.A.; Datta, M. A survey of smart grid architectures, applications, benefits and standardization. J. Netw. Comput. Appl. 2016, 76, 23–36. [Google Scholar] [CrossRef]
  81. Sthapit, P.; Pyun, J.Y. Station grouping strategy for minimizing association delay in IEEE 802.11 ah. IEICE Trans. Commun. 2017, 100, 1419–1427. [Google Scholar] [CrossRef]
  82. Yin, W.; Hu, P.; Wang, W.; Wen, J.; Zhou, H. FASUS: A fast association mechanism for 802.11 ah networks. Comput. Netw. 2020, 175, 107287. [Google Scholar] [CrossRef]
  83. Zhang, L.; Ma, M. FKR: An efficient authentication scheme for IEEE 802.11 ah networks. Comput. Secur. 2020, 88, 101633. [Google Scholar] [CrossRef]
  84. Sthapit, P.; Subedi, S.; Kwon, G.R.; Pyun, J.Y. Performance analysis of association procedure in IEEE 802.11 ah. In Proceedings of the ICSNC 2015, Barcelona, Spain, 15–20 November 2015; pp. 70–73. [Google Scholar]
  85. Jamali, A.; Shahgholi Ghahfarokhi, B.; Abedini, M. Improving Performance of Association Control in IEEE 802.11ah-Based Massive IoT Networks. IEEE Internet Things J. 2022, 9, 8572–8583. [Google Scholar] [CrossRef]
  86. Bankov, D.; Khorov, E.; Lyakhov, A.; Stepanova, E.; Tian, L.; Famaey, J. What is the fastest way to connect stations to a Wi-Fi HaLow network? Sensors 2018, 18, 2744. [Google Scholar] [CrossRef] [Green Version]
  87. Bankov, D.; Khorov, E.; Lyakhov, A. The study of the distributed control method to hasten link set-up in IEEE 802.11 ah networks. In Proceedings of the 2016 XV International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY), St. Petersburg, Russia, 26–29 September 2016; pp. 13–17. [Google Scholar]
  88. Bankov, D.; Khorov, E.; Lyakhov, A. The Study of the Centralized Control Method to Hasten Link Set-up in IEEE 802.11ah Networks. In Proceedings of the European Wireless 2015—21th European Wireless Conference, Budapest, Hungary, 20–22 May 2015; pp. 1–6. [Google Scholar]
  89. Tian, L.; Deronne, S.; Latré, S.; Famaey, J. Implementation and Validation of an IEEE 802.11ah Module for ns-3. In Proceedings of the Workshop on ns-3—WNS3 ’16, Seattle, WA, USA, 15–16 June 2016; pp. 49–56. [Google Scholar] [CrossRef]
  90. Network Simulator (ns)-3. Available online: https://www.nsnam.org/ (accessed on 5 July 2022).
  91. Shahin, N.; Ali, R.; Kim, Y.T. Hybrid slotted-CSMA/CA-TDMA for efficient massive registration of IoT devices. IEEE Access 2018, 6, 18366–18382. [Google Scholar] [CrossRef]
  92. Arif, T.Y.; Munadi, R.; Syahrial, S.; Rizky, M.M. Performance of Centralized Authentication Control in IEEE 802.11ah with Multirate Registration. In Proceedings of the 2019 International Conference on Electrical Engineering and Computer Science (ICECOS), Batam, Indonesia, 2–3 October 2019; pp. 265–270. [Google Scholar] [CrossRef]
  93. Waseem, M.; Farhad, A.; Ahmed, A. Efficient Cluster Head Selection in IEEE 802.11 ahfor IoT Applications. Int. J. 2021, 10, 208–213. [Google Scholar]
  94. Yin, W.; Hu, P.; Zhou, H.; Xing, G.; Wen, J. Jamming attacks and defenses for fast association in IEEE 802.11 ah networks. Comput. Netw. 2022, 208, 108890. [Google Scholar] [CrossRef]
  95. Kwon, Y.; Yang, Y.; Rong, Z. System and Method for Allocating Periodic Resources. US Patent 925,365, 26 June 2013. [Google Scholar]
  96. Bel, A.; Adame, T.; Bellalta, B.; Barcelo, J.; Gonzalez, J.; Oliver, M. CAS-based Channel Access Protocol for IEEE 802.11ah WLANs. In Proceedings of the 20th European Wireless Conference, Barcelona, Spain, 14–16 May 2014; pp. 1–6. [Google Scholar]
  97. Park, C.W.; Hwang, D.; Lee, T.J. Enhancement of IEEE 802.11ah MAC for M2M Communications. IEEE Commun. Lett. 2014, 18, 1151–1154. [Google Scholar] [CrossRef]
  98. Zheng, L.; Ni, M.; Cai, L.; Pan, J.; Ghosh, C.; Doppler, K. Performance analysis of group-synchronized DCF for dense IEEE 802.11 networks. IEEE Trans. Wirel. Commun. 2014, 13, 6180–6192. [Google Scholar] [CrossRef] [Green Version]
  99. Qutab-ud din, M.; Hazmi, A.; Badihi, B.; Larmo, A.; Torsner, J.; Valkama, M. Performance analysis of IoT-enabling IEEE 802.11ah technology and its RAW mechanism with non-cross slot boundary holding schemes. In Proceedings of the 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Boston, MA, USA, 14–17 June 2015; pp. 1–6. [Google Scholar] [CrossRef]
  100. Tian, L.; Khorov, E.; Latre, S.; Famaey, J. Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah. Sensors 2017, 17, 1559. [Google Scholar] [CrossRef] [Green Version]
  101. Nawaz, N.; Hafeez, M.; Mclernon, D.C.; Ghogho, M. Throughput Enhancement of Restricted Access Window for Uniform Grouping Scheme. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017. [Google Scholar] [CrossRef]
  102. Wang, Y.; Liu, C.; Chai, K.K.; Chen, Y.; Loo, J. Optimized Energy-Aware Window Control for IEEE 802.11ah Based Networks in Smart Grid Enabled Cities; Springer: Cham, Switzerland, 2017; pp. 165–173. [Google Scholar]
  103. Kim, J.; Yeom, I. QoS enhanced channel access in IEEE 802.11ah networks. In Proceedings of the 17th International Symposium on Communications and Information Technologies (ISCIT), Cairns, Australia, 25–27 September 2017; pp. 1–6. [Google Scholar] [CrossRef]
  104. Lei, X.; Rhee, S.H. Performance improvement of Sub 1 GHz WLANs for future IoT environments. Wirel. Pers. Commun. 2017, 93, 933–947. [Google Scholar] [CrossRef]
  105. Tian, L.; Santi, S.; Latré, S.; Famaey, J. Accurate sensor traffic estimation for station grouping in highly dense IEEE 802.11 ah networks. In Proceedings of the First ACM International Workshop on the Engineering of Reliable, Robust, and Secure Embedded Wireless Sensing Systems, Delft, The Netherlands, 5 November 2017; pp. 1–9. [Google Scholar]
  106. Ahmed, N.; De, D.; Hussain, M.I. A QoS-aware MAC protocol for IEEE 802.11ah-based Internet of Things. In Proceedings of the 2018 Fifteenth International Conference on Wireless and Optical Communications Networks (WOCN), Kolkata, India, 2–4 February 2018; pp. 1–5. [Google Scholar] [CrossRef]
  107. Tian, L.; Mehari, M.; Santi, S.; Latré, S.; De Poorter, E.; Famaey, J. IEEE 802.11ah Restricted Access Window Surrogate Model for Real-Time Station Grouping. In Proceedings of the 2018 IEEE 19th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Chania, Greece, 12–15 June 2018; pp. 14–22. [Google Scholar] [CrossRef] [Green Version]
  108. Ahmed, N.; Rahman, H.; Hussain, M. An IEEE 802.11 ah-based scalable network architecture for Internet of Things. Ann. Telecommun. 2018, 73, 499–509. [Google Scholar] [CrossRef]
  109. Oyegbola, K.; Zubair, S.; Onwuka, E.; Ramat, Y. Classified Medium Access Control Algorithm (CL-MAC) for Enhanced Operation of IEEE 802.11ah. Covenant J. Inform. Commun. Technol. 2018, 10, 951. [Google Scholar]
  110. Khorov, E.; Lyakhov, A.; Yusupov, R. Two-Slot Based Model of the IEEE 802.11ah Restricted Access Window with Enabled Transmissions Crossing Slot Boundaries. In Proceedings of the 2018 IEEE 19th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Chania, Greece, 12–15 June 2018; pp. 1–9. [Google Scholar] [CrossRef]
  111. Seferagić, A.; Moerman, I.; De Poorter, E.; Hoebeke, J. Evaluating the Suitability of IEEE 802.11ah for Low-Latency Time-Critical Control Loops. IEEE Internet Things J. 2019, 6, 7839–7848. [Google Scholar] [CrossRef] [Green Version]
  112. Riski, M.N.A.; Perdana, D.; Negara, R.M. Performance Analysis of Mobility Impact on IEEE 802. 11ah Standard with Traffic Pattern Scheme. Int. J. Commun. Netw. Inf. Secur. 2018, 10, 139–147. [Google Scholar]
  113. Mahesh, M.; Harigovindan, V.P. Restricted Access Window-Based Novel Service Differentiation Scheme for Group-Synchronized DCF. IEEE Commun. Lett. 2019, 23, 900–903. [Google Scholar] [CrossRef]
  114. Ahmed, N.; Hussain, M.I. Periodic Traffic Scheduling for IEEE 802.11ah Networks. IEEE Commun. Lett. 2020, 24, 1510–1513. [Google Scholar] [CrossRef]
  115. Sangeetha, U.; Babu, A. Service Differentiation in IEEE 802.11ah WLAN under Restricted Access Window based MAC protocol. Comput. Commun. 2021, 172, 142–154. [Google Scholar] [CrossRef]
  116. Kim, Y.; Hwang, G.; Um, J.; Yoo, S.; Jung, H.; Park, S. Optimal throughput analysis of a super dense wireless network with the Renewal Access Protocol. In Proceedings of the 2015 IEEE International Conference on Communication Workshop, ICCW 2015, London, UK, 8–12 June 2015; pp. 2194–2199. [Google Scholar] [CrossRef]
  117. Chang, T.C.; Lin, C.H.; Lin, K.C.J.; Chen, W.T. Traffic-Aware Sensor Grouping for IEEE 802.11ah Networks: Regression Based Analysis and Design. IEEE Trans. Mob. Comput. 2018, XXX, 1–15. [Google Scholar] [CrossRef]
  118. Tian, L.; Lopez-Aguilera, E.; Garcia-Villegas, E.; Mehari, M.T.; De Poorter, E.; Latré, S.; Famaey, J. Optimization-Oriented RAW Modeling of IEEE 802.11ah Heterogeneous Networks. IEEE Internet Things J. 2019, 6, 10597–10609. [Google Scholar] [CrossRef] [Green Version]
  119. Corrales Madueno, G.; Stefanovic, C.; Popovski, P. Reliable and Efficient Access for Alarm-Initiated and Regular M2M Traffic in IEEE 802.11ah Systems. IEEE Internet Things J. 2016, 3, 673–682. [Google Scholar] [CrossRef] [Green Version]
  120. Bankov, D.; Khorov, E.; Kureev, A.; Lyakhov, A. Improving efficiency of heterogeneous Wi-Fi networks with energy-limited devices. In Internet of Things, Smart Spaces, and Next Generation Networks and Systems; Springer: Berlin/Heidelberg, Germany, 2016; pp. 181–192. [Google Scholar]
  121. Zhao, Y.; Yilmaz, O.N.C.; Larmo, A. Optimizing M2M Energy Efficiency in IEEE 802.11ah. In Proceedings of the 2015 IEEE Globecom Workshops (GC Wkshps), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar] [CrossRef]
  122. Beltramelli, L.; Osterberg, P.; Jennehag, U.; Gidlund, M. Hybrid MAC mechanism for energy efficient communication in IEEE 802.11ah. In Proceedings of the IEEE International Conference on Industrial Technology, Toronto, ON, Canada, 22–25 March 2017; pp. 1295–1300. [Google Scholar] [CrossRef]
  123. Wang, Y.; Chai, K.K.; Chen, Y.; Schormans, J.; Loo, J. Energy-aware Restricted Access Window control with retransmission scheme for IEEE 802.11ah (Wi-Fi HaLow) based networks. In Proceedings of the 13th Annual Conference on Wireless On-Demand Network Systems and Services, WONS 2017, Jackson, WY, USA, 21–24 February 2017; pp. 69–76. [Google Scholar] [CrossRef] [Green Version]
  124. Charania, N.F.; Giluka, M.K.; Tamma, B.R.; Franklin, A. Dearf: Delay and energy aware raw formation scheme to support delay sensitive m2m traffic in ieee 802.11 ah networks. arXiv 2017, arXiv:1709.03723. [Google Scholar]
  125. Park, M. Methods and Arrangements to Assign Slots in Restricted Access Windows in Wireless Networks. US Patent 4,741,207, 20 December 2016. [Google Scholar]
  126. Damayanti, W.; Kim, S.; Yun, J.H. Collision chain mitigation and hidden device-aware grouping in large-scale IEEE 802.11 ah networks. Comput. Netw. 2016, 108, 296–306. [Google Scholar] [CrossRef]
  127. Chen, C.; Zhao, H.; Qiu, T.; Hu, M.; Han, H.; Ren, Z. An efficient power saving polling scheme in the internet of energy. J. Netw. Comput. Appl. 2017, 89, 48–61. [Google Scholar] [CrossRef]
  128. Zheng, S.; Lei, Z. TIM encoding for IEEE 802.11ah based WLAN. In Proceedings of the 2014 IEEE International Conference on Communication Systems, Macau, China, 19–21 November 2014; pp. 559–563. [Google Scholar] [CrossRef]
  129. Ahmed, N.; Hussain, M.I. A distributed channel access mechanism for IEEE 802.11 ah. In Proceedings of the IEEE World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12–14 December 2016; pp. 1–6. [Google Scholar]
  130. Gao, R.; Lei, X.; Hu, Q. An adaptive contention window scheme for 802.11 ah WLANs. ITM Web Conf. Edp Sci. 2018, 17, 01016. [Google Scholar] [CrossRef] [Green Version]
  131. Gopinath, A.J.; Nithya, B. Mathematical and simulation analysis of contention resolution mechanism for IEEE 802.11 ah networks. Comput. Commun. 2018, 124, 87–100. [Google Scholar] [CrossRef]
  132. Liu, Y.; Guo, J.; Orlik, P.; Nagai, Y.; Watanabe, K.; Sumi, T. Coexistence of 802.11ah and 802.15.4g networks. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; pp. 1–6. [Google Scholar] [CrossRef]
  133. Šljivo, A.; Kerkhove, D.; Tian, L.; Famaey, J.; Munteanu, A.; Moerman, I.; Hoebeke, J.; De Poorter, E. Performance evaluation of IEEE 802.11 ah networks with high-throughput bidirectional traffic. Sensors 2018, 18, 325. [Google Scholar] [CrossRef] [Green Version]
  134. Nabuuma, H.; Alsusa, E.; Baidas, M.W. AID-based backoff for throughput enhancement in 802.11 ah networks. Int. J. Commun. Syst. 2019, 32, e3923. [Google Scholar] [CrossRef]
  135. Cheng, R.S.; Li, Y.M.; Huang, C.M. The Collision Avoidance and Situation-Aware Media Access Scheme Using the Registered-Backoff-Time Method for the IEEE 802.11 ah-Based IoT Wireless Networks. Comput. J. 2021, 65, 1977–1997. [Google Scholar] [CrossRef]
  136. Raeesi, O.; Pirskanen, J.; Hazmi, A.; Talvitie, J.; Valkama, M. Performance enhancement and evaluation of IEEE 802.11 ah multi-access point network using restricted access window mechanism. In Proceedings of the 2014 IEEE International Conference on Distributed Computing in Sensor Systems, Marina Del Rey, CA, USA, 26–28 May 2014; pp. 287–293. [Google Scholar]
  137. Kumar, S.; Lim, H.; Kim, H. Hierarchical MAC protocol with multi-channel allocation for enhancing IEEE 802.11ah relay networks. In Proceedings of the 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, Croatia, 24–28 August 2015; pp. 1458–1463. [Google Scholar] [CrossRef]
  138. Argyriou, A. Power-efficient estimation in IEEE 802.11ah wireless sensor networks with a cooperative relay. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 6755–6760. [Google Scholar] [CrossRef]
  139. Rao, S.N.; Akhil, P.; Kumaravelu, V.B.; Arthi, M. Dual—Hop Relaying for Quality of Service Improvement in IEEE 802.11ah—Downlink. In Proceedings of the 2018 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 3–5 April 2018; pp. 249–253. [Google Scholar] [CrossRef]
  140. Sun, W.; Ding, J.; Cao, J.; Meng, K.; Lin, C. OP-RAW: A RAW Grouping Algorithm Based on Outage Probability for Industrial Internet of Things. In Wireless Sensor Networks; Cui, L., Xie, X., Eds.; Springer: Singapore, 2021; pp. 41–54. [Google Scholar]
  141. Bhandari, S.; Sharma, S.K.; Wang, X. Device Grouping for Fast and Efficient Channel Access in IEEE 802.11ah Based IoT Networks. In Proceedings of the 2018 IEEE International Conference on Communications Workshops (ICC Workshops), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  142. Ji, B.; Chen, S.; Song, K.; Li, C.; Chen, H.; Li, Z. Throughput enhancement schemes for IEEE 802.11ah based on multi-layer cooperation. In Proceedings of the 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, Croatia, 24–28 August 2015; pp. 1112–1116. [Google Scholar] [CrossRef]
  143. Badihi, B.; Del Carpio, L.F.; Amin, P.; Larmo, A.; Lopez, M.; Denteneer, D. Performance Evaluation of IEEE 802.11ah Actuators. In Proceedings of the 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), Nanjing, China, 15–18 May 2016; pp. 1–5. [Google Scholar] [CrossRef]
  144. Kim, T.; Chang, J.M. Enhanced Power Saving Mechanism for Large-Scale 802.11ah Wireless Sensor Networks. IEEE Trans. Green Commun. Netw. 2017, 1, 516–527. [Google Scholar] [CrossRef]
  145. Kim, T. Optimal Resource Scheduling for Energy-Efficient Next Generation Wireless Networks. Ph.D. Thesis, Iowa State University, Ames, IA, USA, 2018. [Google Scholar]
  146. Bel, A.; Adame, T.; Bellalta, B. An energy consumption model for IEEE 802.11 ah WLANs. Ad Hoc Netw. 2018, 72, 14–26. [Google Scholar] [CrossRef] [Green Version]
  147. Kureev, A.; Bankov, D.; Khorov, E.; Lyakhov, A. Improving efficiency of heterogeneous Wi-Fi networks with joint usage of TIM segmentation and restricted access window. In Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada, 8–13 October 2017; pp. 1–5. [Google Scholar] [CrossRef]
  148. Huang, C.M.; Huang, S.H. The Registration-based Scheduling for Avoiding Collision using the Triggered RAW for IEEE 802.11 ah. In Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), Melbourne, Australia, 6–8 December 2021; pp. 269–275. [Google Scholar]
  149. Zhang, X. Enhancing IEEE 802.11 ah for the Internet of things. Ph.D. Thesis, The University of Hong Kong, Hong Kong, China, 2018. [Google Scholar]
  150. Santi, S.; Tian, L.; Khorov, E.; Famaey, J. Accurate Energy Modeling and Characterization of IEEE 802.11 ah RAW and TWT. Sensors 2019, 19, 2614. [Google Scholar] [CrossRef] [Green Version]
  151. Santi, S.; Tian, L.; Famaey, J. Evaluation of the Co-existence of RAW and TWT Stations in IEEE 802.11 ah using ns-3. In Proceedings of the 2019 Workshop on Next-Generation Wireless with ns-3, Florence, Italy, 21 June 2019; pp. 9–12. [Google Scholar]
  152. Bankov, D.; Khorov, E.; Lyakhov, A.; Stepanova, E. Clock Drift Impact on Target Wake Time in IEEE 802.11ax/ah Networks. In Proceedings of the 2018 Engineering and Telecommunication (EnT-MIPT), Moscow, Russia, 15–16 November 2018; pp. 30–34. [Google Scholar] [CrossRef]
  153. Zazhigina, E.; Yusupov, R.; Khorov, E.; Lyakhov, A. Analytical Study of Periodic Restricted Access Window Mechanism for Short Slots. Electronics 2021, 10, 549. [Google Scholar] [CrossRef]
  154. Badarla, S.P.; Harigovindan, V.P. Restricted Access Window-Based Resource Allocation Scheme for Performance Enhancement of IEEE 802.11ah Multi-Rate IoT Networks. IEEE Access 2021, 9, 136507–136519. [Google Scholar] [CrossRef]
Figure 1. Outline of the survey paper.
Figure 1. Outline of the survey paper.
Sensors 22 09509 g001
Figure 2. Use case of IEEE 802.11ah wireless bridge BR-100AH in industrial application [68]: (1) AP-100AH: IEEE 802.11ah-compatible AP; (2) BR-100AH: IEEE 802.11ah-compatible wireless bridge; and (3) SX-NEWAH: IEEE 802.11ah-compatible WLAN module [69].
Figure 2. Use case of IEEE 802.11ah wireless bridge BR-100AH in industrial application [68]: (1) AP-100AH: IEEE 802.11ah-compatible AP; (2) BR-100AH: IEEE 802.11ah-compatible wireless bridge; and (3) SX-NEWAH: IEEE 802.11ah-compatible WLAN module [69].
Sensors 22 09509 g002
Figure 3. Wireless backhaul scenario of IEEE 802.11ah.
Figure 3. Wireless backhaul scenario of IEEE 802.11ah.
Sensors 22 09509 g003
Figure 4. Categorization of the MAC layer features of the IEEE 802.11ah WLAN.
Figure 4. Categorization of the MAC layer features of the IEEE 802.11ah WLAN.
Sensors 22 09509 g004
Figure 5. The station link setup process with access point in IEEE 802.11ah [86].
Figure 5. The station link setup process with access point in IEEE 802.11ah [86].
Sensors 22 09509 g005
Figure 6. Time allocation in BI: (a) RAW of IEEE 802.11ah; (b) beacon frame and RPS element.
Figure 6. Time allocation in BI: (a) RAW of IEEE 802.11ah; (b) beacon frame and RPS element.
Sensors 22 09509 g006
Figure 7. Association identifier (AID): (a) hierarchical structure of AID; (b) AID structure for STA.
Figure 7. Association identifier (AID): (a) hierarchical structure of AID; (b) AID structure for STA.
Sensors 22 09509 g007
Figure 8. Example of TIM beacon with the non-cross and cross slot boundaries of RAW mechanism [133].
Figure 8. Example of TIM beacon with the non-cross and cross slot boundaries of RAW mechanism [133].
Sensors 22 09509 g008
Table 1. A comparison between IEEE 802.11ah and current wireless technologies for IoT.
Table 1. A comparison between IEEE 802.11ah and current wireless technologies for IoT.
LPWANWPAN
FeaturesIEEE 802.11ahLoRaWANNB-IoTSigfoxBLEZigBee
SpectrumSub GHz868 MHz (ISM) in EUSub GHzSub GHz2.4 GHz (ISM)2.4 GHz (ISM)
Bandwidth1–16 MHz125/250/500 KHz180 KHz100 KHz2 MHz5 MHz
ModulationOFDMchirp spread spectrumQPSKBPSKGFSKOQPSK
Topologystarstarcellularstarstarmesh
Data rate150 Kbps300–500 Kbps250 bps100 bps1–2 Mbps10–250 Kbps
Range1000 m20 km15 km50 km30 m100 m
Power consumptionLowLowHighLowLowLow
Mobility supportYesYesNoNoYesYes
LocalizationYesYes (TDoA)NoYes (RSSI)YesYes
BidirectionalYesYesYesLimitedYesYes
Advantageshigh data ratelong distancelong distancelong distancemedium data rateshort distance
Shortcomingsmedium distancelow data ratelow data ratelow data rateshort distancelow data rate
References[8][4,12,14][7,15,16][9,17][5,18][6,19]
Table 3. Summary of IEEE 802.11ah-based applications under sensors and meters, extended Wi-Fi range and wireless backhaul use cases, and their requirements [49].
Table 3. Summary of IEEE 802.11ah-based applications under sensors and meters, extended Wi-Fi range and wireless backhaul use cases, and their requirements [49].
ApplicationsRef.Traffic TypeLatencyThroughputNetwork Lifetime
Smart gridSection 2.1.1[50,61]continuous, periodic, and burstLowHighMonths to Years
Environmental and agricultural monitoringSection 2.1.2[62,63]periodic and event-basedHighMediumYears
Industrial/Building monitoringSection 2.1.3[68,69]periodic and burstLowHighYears
Health monitoringSection 2.1.4[70,71]periodic and event-basedLowHighYears
Extended Wi-FiSection 2.2[75,76]burstLowHighYears
Wireless backhaulSection 2.3[39]periodic and burstLowHighYears
Table 5. Current solutions on RAW optimization of the IEEE 802.11ah WLAN with shortcomings.
Table 5. Current solutions on RAW optimization of the IEEE 802.11ah WLAN with shortcomings.
Ref.YearTraffic TypePerformance EvaluationShortcomingsEvaluation Tool
[96]2014 2015ULthroughputtypical DCF design reduces performance for a network with a high number of STAsMATLAB
[97]2014ULchannel efficiencyit examines the active STAs, even though traffic load and energy consumption are equally crucial factors in IoTanalytical
[98]2014ULthroughputit does not optimize the number of groups and RAW durationanalytical
[121]2015ULenergy, delayit completely ignores the unnecessary wake-up of STAsanalytical
[99]2015ULthroughputthe improvement is suitable only for traffic of the same kindanalytical
[116]2015ULchannel efficiency with success probabilitychannel contention still an issue in a heterogeneous IoT network with priority-based channel accessanalytical
[59]2015ULenergytraffic heterogeneity is not taken into accountMATLAB
[119]2016ULenergyRAW needs to be adjusted dynamically for event detection systemanalytical
[120]2016ULenergytraffic heterogeneity in terms of low and high with energy requirements are not consideredanalytical
[102]2017ULenergyheterogeneous traffic requirements are not consideredMATLAB
[122]2017ULdelay, energythe DL traffic and the mathematical model is not validated through simulation analysisanalytical
[100]2017UL/DLthroughputit does not always produce better latency performancens-3
[104]2017ULchannel contention, throughput, delaythe channel resources are not efficiently allocated into different RAW groupsanalytical
[101]2017ULthroughputit does not take into account the network traffic and channel contentionanalytical
[103]2017UL/DLthroughputpriority scheduling creates a RAW group, and fairness concerns that are not consideredns-3
[102]2017ULenergy, packet delivery ratioRAW size is adjusted based on STAs per group, which does not consider heterogeneous STAs for RAW adaptationMATLAB
[124]2017ULenergy and delaynetwork conditions are not taken into account for RAW adjustment and grouping of STAsMATLAB
[100]2017UL/DLthroughput, energythe RAW adjustment is made using just the information available at AP; RAW grouping is inefficient for long-term performance and only considers STAs with identical characteristicsns-3
[123]2017ULenergy, packet delivery ratiocollision in a massive IoT scenario can cause retransmission, leading to channel under utilizationMATLAB
[104]2017ULthroughputdynamic and heterogeneous traffic are not taken into accountOPNET
[105]2017UL/DLthroughput, latency, energyRAW grouping is inefficient for long-term performance since it only considers STAs with identical characteristicsns-3
[106]2018UL/DLthroughputit failed to consider grouping of STAs in RAW and fairness problemsns-3
[107]2018UL/DLdelay, throughputheterogeneous STAs (i.e., different MCSs utilized by STAs during communication) within a RAW group are not consideredns-3
[108]2018UL/DLthroughput, delaysaturated level of the network is taken into account alwaysns-3
[109]2018UL/DLthroughputtheir proposed method only classifies the traffic and does not consider RAW adaptation for each classified trafficns-3
[110]2018ULthroughput, energycan increase the energy consumption due to retransmission in the UL directionanalytical
[112]2018UL/DLthroughput, energyonly analysis of different traffic pattern schemes are presentedns-3
[111]2019UL/DLdelay, energy, throughputtheir proposed method does not take into account the dynamic environment of the IoT scenarions-3
[117]2019UL/DLchannel utilizationchannel contention in a massive IoT scenario may cause a collision and leads to the channel under utilizationns-3
[113]2019UL/DLthroughputtraffic-aware STAs partitioning with heterogeneous traffic environment is not considered by their proposed methodanalytical
[118]2019UL/DLpacket received ratiopredicting the RAW size does not take into account the energy depletion, the dynamic adjustment of RAW, and multi-hop scenariosunknown
[114]2020UL/DLthroughputthe prediction accuracy of the right number of slots in a RAW, contained in BI is still a concernanalytical
[115]2022UL/DLthroughputmulti-class with traffic-aware STAs and heterogeneous traffic requirements are not consideredMATLAB
Table 7. Current solutions concerning relay and group sectorization in the IEEE 802.11ah WLAN with shortcomings.
Table 7. Current solutions concerning relay and group sectorization in the IEEE 802.11ah WLAN with shortcomings.
Ref.YearTraffic TypePerformance EvaluationShortcomingsEvaluation Tool
[137]2015DLthroughput, energyit does not deal with problems, such as STA dynamic and traffic heterogeneityns-3
[129]2016UL/DLcoverage range, delaylimiting contention and calculating RAW size across a dynamic networkanalytical
[108]2018UL/DLdelay, energy consumptiontheir proposed method does not provide data aggregation and RAW size predictionns-3
[138]2015DLthroughputoptimal bandwidth allocation for heterogeneous traffic is not considered in their proposed workns-3
[139]2018UL/DLRSSItheir proposed method does not consider the relay locationanalytical
[141]2018UL/DLthroughputtheir proposed method doe not comprehensively demonstrate the simultaneous transmission using multiple channels in different sectorsMATLAB
[140]2021UL/DLthroughput, delayit does not consider delay priorityns-3
Table 8. Current solutions related to TIM Segmentation of the IEEE 802.11ah WLAN with shortcomings.
Table 8. Current solutions related to TIM Segmentation of the IEEE 802.11ah WLAN with shortcomings.
Ref.YearTraffic TypePerformance EvaluationShortcomingsEvaluation Tool
[142]2015DLTIM compressionthree-level hierarchical TIM compression coding framework can increase the system complexity and energy consumptionunknown
[143]2016DLdelay, energy consumptionshorter DTIM intervals may reduce delay at the expense of increased energy consumptionanalytical
[144]2017DLenergy efficiencyit can increase network delay in terms of traffic delivery in a massive IoT scenarioMATLAB
[144]2017DLbitmap compressiontheir proposed method does not consider communication delay of the STAs in UL direction and energy consumptionMATLAB
[145]2018DLenergy efficiency, quality of serviceresource allocation in heterogeneous network is still challenginganalytical
[146]2018DL/ULenergy consumptionimpact of the RAW is neglectedMATLAB
[147]2017DL/ULthroughput, energy consumptiondoes not consider delay requirements for low-powered STAsanalytical
[133]2018DL/ULscalability, throughput, latency, and energy efficiencyRAW with a large number of slots could increase the delay of the STA in high dense networkns-3
[111]2019DL/ULthroughput, energy, delayreduction in the BI can cause an increase in the energy consumption of monitoring application and might reduce the overall throughput of the networkns-3
[148]2021DL/ULcollision rateit does not consider load balancing in slots of a RAWns-3
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Farhad, A.; Pyun, J.-Y. Resource Management for Massive Internet of Things in IEEE 802.11ah WLAN: Potentials, Current Solutions, and Open Challenges. Sensors 2022, 22, 9509. https://doi.org/10.3390/s22239509

AMA Style

Farhad A, Pyun J-Y. Resource Management for Massive Internet of Things in IEEE 802.11ah WLAN: Potentials, Current Solutions, and Open Challenges. Sensors. 2022; 22(23):9509. https://doi.org/10.3390/s22239509

Chicago/Turabian Style

Farhad, Arshad, and Jae-Young Pyun. 2022. "Resource Management for Massive Internet of Things in IEEE 802.11ah WLAN: Potentials, Current Solutions, and Open Challenges" Sensors 22, no. 23: 9509. https://doi.org/10.3390/s22239509

APA Style

Farhad, A., & Pyun, J. -Y. (2022). Resource Management for Massive Internet of Things in IEEE 802.11ah WLAN: Potentials, Current Solutions, and Open Challenges. Sensors, 22(23), 9509. https://doi.org/10.3390/s22239509

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop