The invention is in the field of low-power sensor networks such as those that facilitate the internet of things (IoT).
Networks of wireless sensor nodes have become ubiquitous in the internet of things (IoT). As the technologies related to IoT evolve, the main goals for development of components include improved (reduced) power consumption, increased speed/higher data rate, better sensitivity, and robustness.
Ultra low power (ULP) receivers are gaining traction in various consumer and industrial markets as new standards are being defined to support them in IoT devices. Communication standards such as WiFi 802.11ba, BLE, and NB-IoT are all considering operating modes and signaling that take advantage of ULP receivers as companion radios for several reasons. They significantly reduce active and average power while providing continuous connectivity, thus enabling batteryless operation. They also simplify provisioning of new nodes, reduce synchronization energy overhead and latency to nearly zero, scale to networks of 1000s of nodes, and enable microsecond (ms) wakeup latency. ULP receivers have been demonstrated with better than −100 dBm sensitivity and 10 nW, but none have addressed aspects for widespread adoption such as selectivity, random pulsed interferer rejection, yield over process, voltage and temperature (PVT) variations, and security against replay or energy attacks.
A key component of wireless sensor networks are sensor nodes, which include main circuit components such as wakeup receivers (WRXs). Because of the nature of the network, these receivers are typically ULP receivers. Most IoT networks comprise many ULP receivers that are tasked with receiving radio frequency (RF) wireless signals over the air (OTA) and taking some local action based on the ULP receiver's interpretation of the received RF signals. Translating the received RF signal into a local action typically involves translating the continuous RF signal to some discrete “on/off” (e.g., Wakeup) type of message to a local component of the IoT system.
Current sensor nodes may have some low power characteristics. For example, certain ULP receive frontends that feature continuous-time analog circuitry do consume a relatively low amount of power. But they exhibit low sensitivity, and poor robustness in the presence of interference and across wide temperature range.
Another current type of ULP receive frontend is an intermediate frequency (IF) frontend with a continuous-time mixer and amplifiers. This type of frontend exhibits good sensitivity and selectivity characteristics, but consumes a relatively large amount of power.
Current ULP receiver frontends tend to rely on continuous-time analog approaches to receive, process, translate, and transmit RF signals in sensor networks.
It would be desirable to have a ULP receiver that overcomes the stated challenges of the current solutions. It would be desirable to have a ULP receiver that operates at very low power, and exhibits: above-average sensitivity; random pulsed interferer rejections; yield over process; voltage and temperature (PVT) variations; and security against replay or energy attacks.
Embodiments of the invention include a wakeup receiver (WRX) featuring a charge-domain analog front end (AFE) with parallel radio frequency (RF) rectifier, charge-transfer summation amplifier (CTSA), and successive approximation analog-to-digital converter (SAR ADC) stages. In a particular embodiment, the invention includes a 3.2 μW WRX with simplified 802.15.4g medium access control/physical layer (MAC/PHY) baseband, received signal strength indicator (RSSI) and clear channel assessment (CCA), forward error correction (FEC), and a cryptographic checksum for industrial IoT applications. The charge-domain AFE provides a conversion gain of 26 dB with no static bias currents used anywhere in the rectifier, CTSA, or SAR ADC. This provides robustness to process, voltage and temperature (PVT) variation, and pulsed interference rejection.
Embodiments combine an ADC, a FIR filter and digital baseband to make a wakeup radio. A FIR filter can be implemented by changing the CT value overtime as the filter coefficient and summing with previous ADC samples. ASK modulation and Manchester encoding is supported. On-off keying (OOK) is a subset of ASK modulation. With the ADC, the WRX is able to support additional information encoded in the ASK RF message. Manchester is also supported. Multiple carrier frequencies are supported. Aa an example, 100 MHz to 3 GHz is used for a practical performance. However, embodiments are capable of frequencies as low as ˜10 MHz and as high as 100 GHz depending on the quality factor of matching network 302.
The WRX 300 is fully integrated into a system-on-a-chip (SoC) designed for an energy-harvesting industrial IoT leaf node, but is suitable for any type of node. A leaf node is typically an outer node in a sensor network. Signals from antenna 112 go through matching network 302. A main RF path (Main) from the antenna 112 and a dummy path (Dummy) from a broadband load form a pseudo-differential signal that improves common-mode rejection. In an embodiment, a conventional FR-4 substrate (a known glass-reinforced epoxy laminate material for printed circuit boards) and on-board inductor and capacitor (LC) components are used for the matching network 302 to the custom antenna 112.
The charge-domain AFE 310 comprises parallel RF rectifiers 108, a charge-transfer summation amplifier (CTSA) 104A, and a 10-bit SAR ADC 104B. The AFE 310 processes signals in the discrete-time charge domain as opposed to the traditional continuous-time analog approach. No static bias currents are required, providing low-power and robust operation over a wide range of conditions. In an embodiment, the WRX 300 down converts a Manchester encoded on-off keying modulation (OOK) RF wakeup message to baseband and digitizes the signal for demodulation, while providing reliable and rapid in-band and out-of-band interference rejection. The WRX 300 supports received signal strength indicator (RSSI) and CCA, used by the network layer for continuous traffic monitoring and link quality measurement.
Baseband physical layer (BB PHY) 304 receives signals from the ADC 104B and outputs a fast wakeup signal 306 and a secure wakeup signal 308. The network can be configured for either fast wakeups of only a Sync Word or secure wakeups with a full WRX beacon packet with cryptographic checksum that includes a payload for data transfer without the need for a high-power receiver.
A CLKGEN circuit 106, as further described below, controls the operation of the WRX 300. WRX CLK signal originates from an on-chip clock source using an on-board crystal reference.
In contrast to current solutions, parallel paths (leading to RECT_P_1 and RECT_P_2) achieve a high signal-to-noise ratio (SNR) and fast settling time. Specifically, longer chains (as in current solutions) produce higher settling times. As shown in
No static bias is used in the circuit.
In an embodiment, the WRX is fabricated in 65 nm CMOS and occupies 0.33 mm2. It shows the measured results from 15 parts at 6 temperature points between −40° C. to 85° C. without any trimming. All measurements are reported with the SoC on-chip switching regulators and clock. Across PVT, the WRX achieves a mean sensitivity of −70.2 dBm for fast wakeup and −67.5 dBm for secure wakeup under 10% of packet error rate (PER), enabling in-network range in deployed industrial environments of 250 m, non-line-of-sight. It also demonstrates the in-band selectivity performance of the WRX under CW interference at −500 kHz offset. A mean signal-to-interference ratio (SIR) of −16.5 dB is measured for fast wakeup and −15.3 dB for secure wakeups. A −65 dB out-of-band SIR at 1.485 GHz offset (2.4 GHz) is achieved with the additional help from an on-board LC matching network without a SAW filter. In-band selectivity under AM-type interference of an OOK packet with the same bit rate is also measured, showing an SIR of 0 dB at 0 Hz offset, demonstrating a fast interference rejection capability. The WRX achieves an RSSI accuracy within ±3 dB from −67 dBm to −43 dBm without calibration. The measured power for secure wakeup is shown in
This application claims priority from U.S. Provisional Patent Application No. 62/897,770, filed Sep. 9, 2019, which is incorporated by reference in its entirety herein.
Number | Name | Date | Kind |
---|---|---|---|
6343185 | Aoshima et al. | Jan 2002 | B1 |
6535724 | Pernici et al. | Mar 2003 | B1 |
6646604 | Anderson | Nov 2003 | B2 |
6853835 | Wynbeck | Feb 2005 | B2 |
6867696 | Becken | Mar 2005 | B2 |
7283475 | Fortin et al. | Oct 2007 | B2 |
7362781 | Rhoads | Apr 2008 | B2 |
7415018 | Jones et al. | Aug 2008 | B2 |
7571269 | Schmidt et al. | Aug 2009 | B2 |
7693191 | Gorday | Apr 2010 | B2 |
7715446 | Rhoads | May 2010 | B2 |
7813344 | Cheswick | Oct 2010 | B2 |
8027663 | Rhoads | Sep 2011 | B2 |
8081944 | Shaolin | Dec 2011 | B2 |
8325704 | Lemkin et al. | Dec 2012 | B1 |
8848777 | Wang | Sep 2014 | B2 |
10089856 | Zong | Oct 2018 | B1 |
20030040326 | Levy et al. | Feb 2003 | A1 |
20030076782 | Fortin | Apr 2003 | A1 |
20030084148 | Cousins | May 2003 | A1 |
20030091064 | Partridge | May 2003 | A1 |
20030097439 | Strayer | May 2003 | A1 |
20030203740 | Bahl | Oct 2003 | A1 |
20040001221 | McCallum | Jan 2004 | A1 |
20040059935 | Cousins | Mar 2004 | A1 |
20050054319 | Tamaki | Mar 2005 | A1 |
20050169201 | Huylebroeck | Aug 2005 | A1 |
20050186906 | Hussmann | Aug 2005 | A1 |
20070082647 | Behzad | Apr 2007 | A1 |
20070082715 | Rofougaran | Apr 2007 | A1 |
20080046549 | Saxena | Feb 2008 | A1 |
20080240167 | Keaney | Oct 2008 | A1 |
20090047991 | Elg | Feb 2009 | A1 |
20100003935 | Behzad | Jan 2010 | A1 |
20100067546 | Mishra | Mar 2010 | A1 |
20100079254 | Koo et al. | Apr 2010 | A1 |
20100105346 | Huang | Apr 2010 | A1 |
20100120362 | Walley et al. | May 2010 | A1 |
20100202767 | Shirakawa et al. | Dec 2010 | A1 |
20110299638 | Gauthier | Dec 2011 | A1 |
20110317600 | Thomson et al. | Dec 2011 | A1 |
20120256009 | Mucignat et al. | Oct 2012 | A1 |
20130039239 | Lin | Feb 2013 | A1 |
20130040573 | Hillyard | Feb 2013 | A1 |
20130322313 | Sikri | Dec 2013 | A1 |
20130336188 | Yomo | Dec 2013 | A1 |
20140126442 | Jafarian | May 2014 | A1 |
20140146756 | Sahin | May 2014 | A1 |
20150036575 | Li | Feb 2015 | A1 |
20150333534 | Liu | Nov 2015 | A1 |
20180115195 | Dalwadi | Apr 2018 | A1 |
20190097633 | Ullmann | Mar 2019 | A1 |
20190222126 | Parisi | Jul 2019 | A1 |
Entry |
---|
Selected USPTO Documents from 2003/0091064. |
Berk, Vincent, et al., “Detection of Covert Channel Encoding in Network Packet Delays,” Technical Report TR2005-536, Department of Computer Sciences, Dartmouth College, Hanover, NH, Aug. 2005. |
Calhoun, Telvis E., et al., “An 802.11 MAC Layer Covert Channel,” Wireless Communications and Mobile Computing (2010), Wiley InterScience www.interscience.wiley.com; DOI: 10.1002/wcm.969, Department of Computer Sciences, Georgia State University, Atlanta, GA 30303, USA. |
Dye, Derek, “Bandwidth and detection of packet length cover channels,” Issue date Mar. 2011, Monterey, California, Naval Postgraduate School, http://hdl.handle.net/10945/5724. |
Edwards, Jonathan, “Covert Channels in Ad Hoc Networking: An Analysis Using the Optimized Link State Routing Protocol,” A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements for the degree of Master of Applied Sciences in Electrical Computer Engineering, Carleton University, Ontario, Canada, Apr. 2012. |
Girling, Gary, “Covert Channels in LAN's,” IEEE Transactions on Software Engineering, vol. SE-13, No. 2, Feb. 1987. |
Handel, Theodore, et al., “Hiding Data in the OSI Network Model,” Weapon Design Technology Group, Los Alamos, NM 87545, pp. 23-38. |
Ji, Liping, et al., “A Novel Covert Channel Based on Length of Messages,” 2009 International Symposium on Information Engineering and Electronic Commerce, Harbin Institute of Technology, Shenzhen Graduate School Shenzhen, P.R. China. |
Kondo, Yoshihisa, et al., “Wake-up Radio using IEEE 802.11 Frame Length Modulation for Radio-on-Demand Wireless LAN,” 2011 IEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications. |
Kratzer, Christian, et al., “WLAN Steganography: A First Practical Reivew,” Copyright 2006 ACM 1-59593-493-6060009, Department of Computer Science, Research Group Multimedia and Security, MM & Sec '06, Sep. 26-27, 2006, Geneva, Switzerland. |
Lucena, Norka B., et al., “Covert Channels in IPv6,” Syracuse University, Syracuse, NY 13244 USA, Copyright 2006, Springer-Verlag Berlin Heidelberg 2006, pp. 147-166. |
Padlipsky, M.A., et al., “Limitations of End-to-End Encryption in Secure Computer Networks”, Deputy for Technical Operations, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Massachusetts; Pepared by the Mitre Corporation, Project 672B, Aug. 1978. |
Panajotov, Boris, et al, “Covert Channels in TCP/IP Protocol Stack,” ICT Innovations 2013 Web Proceedings ISSN 1857-7288, University “Goce Delcev”, Faculty of Computer Science, “Krste Misirkov” bb, 2000, Stip, Republic of Macedonia, pp. 190-199. |
Scott, Carlos, “Network Covert Channels: Review of Current State and Analysis of Viability of the Use of X.509 Certificates for Covert Communications,” Technical Report RHUL-MA-2008-11, Jan. 15, 2008, Royal Holloway University of London, Department of Mathematics, England. |
Stelte, Bjorn, et al., “Concealed Integrity Monitoring for Wireless Sensor Networks,” Wireless Sensor Network, 2011, 3, 10-17, doi: 10.4236/wsn.2011.31002, Published online Jan. 2011, http://www.scirp.org/journal.wsn. |
Wolf, Manfred, “Covert Channels in LAN Protocols,” Tele-Consulting GmbH, Germany, pp. 91-101. |
Yuan, Bo, et al., “A Covert Channel in Packet Switching Data Networks,” Department of Networking, Security and Systems Administration, Rochester Institute of Technology, Rochester, NY 14623. |
Zander, Sebastian, et al., “A Survey of Covert Channels and Countermeasures in Computer Network Protocols,” 3rd Quarter 2007, vol. 9, No. 3, IEE Communications Survey, The Electronic Magazine of Original Peer-Reviewed Survey Articles, www.comsoc.org/pubs/surveys. |
Zander, Sebastian, “Performance of Selected Noisy Covert Channels and Their Countermeasures in IP Networks,” Thesis submitted in accordance with the requirements for the degree of Doctor of Philosophy, Swinburne University of Technology, Melbourne, Australia, Copyright May 2010. |
Zhang, Xinyu, et al., “Gap Sense: Lightweight Coordination of Heterogeneous Wireless Devices,” University of Wisconsin—Madison and the University of Michigan—Ann Arbor, supported in part by NSF Grant CNS-1160775. |
Patent Cooperation Treaty, International Searching Authority, “Notification of Transmittal of the International Search Report and the Written Opinion,” PCT Application No. PCT/US16/27280; dated Jul. 15, 2016. |
Patent Cooperation Treaty, “International Preliminary Report on Patentability,” PCT Application No. PCT/US2014/028889, dated Sep. 15, 2015. |
Chinese Intellectual Property Office, Patent Application No. 201480028106.0, English translation of First Office Action dated Jul. 14, 2017. |
Chinese Intellectual Property Office, Patent Application No. 201480028106.0, English translation of Third Office Action dated Aug. 16, 2018. |
European Patent Office, EP Patent Application No. 14771024.8, Examination Report No. 1, dated Apr. 25, 2017. |
European Patent Office, EP Patent Application No. 14771024.8, Examination Report No. 2, dated Feb. 19, 2018. |
Korean Intellectual Property Office (KIPO), Patent Application No. 10-2015-7029467, English translation of Office Action, received from Korean associates dated Aug. 21, 2017. |
Korean Intellectual Property Office (KIPO), Patent Application No. 10-2015-7029467, English translation of Office Action, received from Korean associates dated Jul. 10, 2018. |
Number | Date | Country | |
---|---|---|---|
20210075452 A1 | Mar 2021 | US |
Number | Date | Country | |
---|---|---|---|
62897770 | Sep 2019 | US |