TSCH schedules assessment

Tim van der Lee, Antonio Liotta, Georgios Exarchakos

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)


Safety and security in marine environments is an emerging application area of low-power wireless sensor networks. Yet, these environments pose big challenges to network reliability. The IEEE802.15.4-TSCH protocol has been extensively regarded as a reliable low-power wireless sensor network solution. It requires, though, an external scheduling mechanism in place to allocate connections to specific timeslots and transmission channels. In changing environments, rescheduling is often required to keep up with network performance. To ease the schedule selection process, we propose a schedule assessment method given a certain topology. The method combines the schedule and topology into an interference graph and uses the network density metric to rate the schedule. Moreover, it pinpoints the connections and pair of nodes that should be rescheduled to improve schedule efficiency. The experiments and initial results have shown high accuracy on rating schedules as well as on selecting connections for rescheduling. The results have also indicated directions of improvement of the method.

Original languageEnglish
Title of host publicationProceedings of the 2017 IEEE 14th International Conference on Networking, Sensing and Control, ICNSC 2017
Place of PublicationPiscataway
PublisherInstitute of Electrical and Electronics Engineers
Number of pages6
ISBN (Electronic)978-1-5090-4429-0
ISBN (Print)978-1-5090-4430-6
Publication statusPublished - 1 Aug 2017
Event14th IEEE International Conference on Networking, Sensing and Control (ICNSC 2017) - Calabria, Italy
Duration: 16 May 201718 May 2017
Conference number: 14


Conference14th IEEE International Conference on Networking, Sensing and Control (ICNSC 2017)
Abbreviated titleICNSC 2017
Internet address

Fingerprint Dive into the research topics of 'TSCH schedules assessment'. Together they form a unique fingerprint.

Cite this