Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
survey
Open access

Cross-Technology Communication for the Internet of Things: A Survey

Published: 03 December 2022 Publication History

Abstract

The ever-developing Internet of Things (IoT) brings the prosperity of wireless sensing and control applications. In many scenarios, different wireless technologies coexist in the shared frequency medium as well as the physical space. Such wireless coexistence may lead to serious cross-technology interference (CTI) problems, e.g., channel competition, signal collision, and throughput degradation. Compared with traditional methods like interference avoidance, tolerance, and concurrency mechanism, direct and timely information exchange among heterogeneous devices is therefore a fundamental requirement to ensure the usability, inter-operability, and reliability of the IoT. Under this circumstance, Cross-Technology Communication (CTC) technique thus becomes a hot topic in both academic and industrial fields, which aims at directly exchanging data among heterogeneous devices that follow different standards. This paper comprehensively summarizes the CTC techniques and reveals that the key challenge for CTC lies in the heterogeneity of IoT devices, including the incompatibility of technical standards and the asymmetry of connection capability. Based on the above finding, we present a taxonomy of the existing CTC works (packet-level CTCs and physical-level CTCs) and compare the existing CTC techniques in terms of throughput, reliability, hardware modification, and concurrency.

1 Introduction

Wireless communication is the key to connecting countless devices around the world. As IoT applications widely spread, wireless technologies will get proliferated everywhere [1, 2, 3, 4, 5, 6, 7]. Note that IoT applications are born to be diverse, with respect to many different factors, e.g., the deployment and operational environment, system scale, communication range, energy budget, desired network bandwidth, etc. [8, 9, 10, 11, 12, 13, 14, 15]. Wireless technologies for IoT are intrinsically diverse as well. One size doesn’t fit all. Every type of wireless technology fits a certain category of applications. A number of different wireless technologies therefore coexist in the IoT era [16, 17].
A big portion of wireless technologies operates at the industrial, scientific and medical (ISM) band, sharing limited spectrum resource. As more and more IoT devices are deployed, we expect to see the increasingly crowded wireless channel. It is a crucial and significant problem to make those coexisting wireless technologies efficiently coordinate or even cooperate over the shared spectrum.
Conventional approaches to tackle the above problem are using schemes based on collision avoidance to separate different technologies in accessing the spectrum, such as TDMA [18, 19] and CSMA [20, 21]. Methods like TDMA require end devices to use a common communication standard, which doesn’t work in the scenario involving different wireless technologies. Methods like CSMA may effectively avoid collisions but have proved inefficient in spectrum resource utilization. Driven by the need for ubiquitous connectivity in the IoT era, we desire to share information more efficiently than how it is collected nowadays.
CTC emerges as such a technology that enables direct communication among heterogeneous devices that follow different wireless standards [22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32]. It works like a translator that builds a mutually compatible side channel between two wireless technologies. CTC not only creates a new way for inter-operation and data exchange among wireless devices but also enhances the ability to manage wireless networks.
Many studies on CTC have been proposed to fulfill the function of translation and to support applications like channel coordination and cross-technology collaboration [22, 24, 25, 26, 27, 28, 29, 30, 33, 34, 35]. Most of the existing works focus on the enabling technology of CTC, but a complete picture of the literature and the research space is missing so far. Based on the survey of recent studies, our paper presents a taxonomy of the existing CTC works (packet-level CTCs and physical-level CTCs) and compares the existing CTC techniques in terms of throughput, reliability, hardware modification, and concurrency. The findings and summaries of our paper are potentially significant in the following directions: (1) to guide subsequent researchers to rethink the CTC techniques regarding the design methodology; (2) to further innovate the infrastructure of future IoT by introducing CTC; and (3) to enable important IoT application by enabling ubiquitous network connectivity.
Although there are existing surveys (e.g., [36]) on CTC, our paper presents new results in the following aspects: (1) Our paper is more inclusive and reflects the latest progress in the area of CTC. (2) We propose a different taxonomy of CTC. Our paper classifies the existing CTC works into two categories: packet-level CTCs and physical-level CTCs, from the perspective of how to resolve the heterogeneity of IoT devices. The survey in [36] classifies the existing CTC works straightforwardly: hardware-based CTCs and hardware-free CTCs, from the perspective of whether hardware modification is required. (3) We conduct comprehensive comparison and analysis, presenting a full-scale understanding of the existing works on CTC. Specifically, we compare the performance of CTC techniques in terms of throughput, reliability, hardware modification, and concurrency. (4) The scope of study in our paper is broader than that in [36]. Besides introducing and discussing the specific CTC techniques, our paper also illuminates the upper-layer application scenarios and the cutting-edge directions, which may motivate more follow-up studies in this area.
The main contributions of this paper are summarized as follows:
This paper presents a complete picture of the literature in the area of CTC.
In this paper, we point out that the key challenge for CTC lies in the heterogeneity of IoT devices, including the incompatibility of technical standards and the asymmetry of connection capability.
This paper envisions the upper-layer application scenarios and discusses the research space of CTC, which may inspire researchers to innovate the design of future IoT.
The remainder of this paper is structured as follows. This survey first discusses the problem of wireless coexistence as the background of CTC in Section 2, and introduces the application of CTC in Section 3. We then describe the packet-level CTC and physical-level CTC in Section 4 and Section 5. Section 6 compares CTC techniques and Section 7 presents the upper layer CTC. We also discuss the future directions of CTC in Section 8, with a particular emphasis on how it will innovate the design of future wireless systems. We conclude in Section 9.

2 Background

Studies on CTC are motivated by the need for effective cooperation and efficient data exchange between heterogeneous devices coexisting in the same scenario. This section discusses the background studies, including collision avoidance, collision tolerance, and indirect bridging approaches. Based on such discussion, we better understand why CTC is needed and what problems CTC exactly addresses.

2.1 Collision Avoidance

Some approaches to avoid collision among heterogeneous devices are similar to those for homogeneous devices. We can leverage the methods of CSMA, TDMA, and frequency hopping to avoid the collisions [37, 38, 39, 40, 41]. But in scenarios where heterogeneous devices coexist, because of the asymmetry of communication ability, computational ability, and other abilities, the data transmission of the weaker device may not be perceived by the stronger device. For example, the weaker device with lower transmission power is in the communication range of the stronger device with higher transmission power, but not vice versa. The stronger device hardly knows the weaker device’s existence and has a significant impact on its data transmission. Therefore, in scenarios where heterogeneous devices coexist, the weaker ones need to avoid the collision actively.

2.2 Collision Tolerance

Researchers focus on error detection and recovery methods to achieve the collision tolerance [42, 43, 44, 45, 46]. PPR [47] is a partial retransmission method that proposes retransmission of the parts with errors instead of the whole packet to save cost. In [48, 49], the authors find that the bit errors of a ZigBee packet are temporally correlated with 802.11 traffic. Coding [50, 51] is another method to tolerate the interference. Rateless coding [52, 53] is a recent coding technique that allows the sender to transmit linearly-independent coded packets without knowing the channel condition as a prior. The receiver can decode the packets after accumulating enough correctly-coded packets.

2.3 Indirect Bridging

Different wireless technologies can be bridged by building an indirect connection through a multi-radio gateway. With multiple wireless interfaces equipped, a gateway can translate data from different devices following different communication standards. There are many applications that use the gateway to perform the data processing [54, 55, 56]. For example, Shim et al. [57] design a ZigBee-BLE gateway to control and manage home appliances. These IoT systems implement multi-radio gateways that introduce additional hardware, maintenance costs, deployment complexity, and traffic overhead.

2.4 Direct Connection

CTC opens a new direction which enables direct communication among heterogeneous wireless devices [58, 59, 60, 61]. The ability to communicate with devices of different technologies avoids the unnecessary hardware cost and communication delay, compared to the indirect solutions based on a multi-radio gateway [54]. With CTC, it becomes easier for heterogeneous wireless devices to coordinate even in a shared channel [62]. CTC is also an enabling technology for emerging IoT applications (e.g., industrial surveillance and smart home), where seamless data collection and interoperation are desired [63, 64, 65]. Therefore, CTC brings benefits to interference management, in-situ data exchange, and inter-operation among wireless devices.

3 Application

With the rapid development of CTC links among heterogeneous devices, researchers have proposed many application scenarios to bring this technique into reality. By enabling direct communication among multiple coexisting technologies, CTC benefits existing wireless networking and our daily life in many aspects.

3.1 Avoiding Cross-technology Interference

3.1.1 Passive Avoidance.

With the ability to decode data packets of another technology, reliable communication can be established by learning free bands in the channel and therefore avoids CTI. Based on this idea, G-Bee [66] leverages the guard band of ongoing WiFi traffic to transmit ZigBee packets reliably. Guard bands separate WiFi channels by 3 or 5 MHz to avoid inter-channel interference. It is enough to accommodate a ZigBee transmission which requires 2 MHz bandwidth. As shown in Figure 1, ZigBee channel 11 and 16 can be safeguarded when WiFi transmission is in channel 2. Evaluation results show that G-Bee enhances packet reception rate (PRR) from 15% to over 95% under significant WiFi interference.
Fig. 1.
Fig. 1. Channel layout and operation procedure of G-Bee.

3.1.2 Active Avoidance.

Different from listening to WiFi transmissions passively, the active avoidance approach will back off WiFi transmissions and reserve certain transmission windows for ZigBee. Based on this idea, researchers in ECC [62] found that it is possible to aggregate white spaces in WiFi transmissions as the channel is idle for 230 ms in every second. They use a CTS message to clear the channel and notify ZigBee nodes to transmit by adopting CTC from WiFi to ZigBee. As a result, ECC achieves 1.8x ZigBee packet reception ratio under heavy interference of WiFi.

3.2 Improving IoT Network Efficiency

In order to improve the network efficiency when IoT devices coexist with WiFi stations, ECT [67] intends to reduce packet collisions by leveraging concurrent transmission and setting priorities for different nodes. As another example of network efficiency improvement with the help of CTC, Amphista [68] presents a novel and effective approach to utilize the 2.4 GHz spectrum. As shown in Figure 2, by leveraging a single ZigBee stream, Amphista enables the ZigBee device to send different information to WiFi and ZigBee devices. The ZigBee to WiFi (Z2W) link embeds sensor data into ZigBee’s transmission power. The same stream is used to disseminate software updates and control messages between ZigBee devices, i.e., Z2Z links. Amphista achieves highly concurrent transmissions and data forwarding of a WiFi video uploading, four groups of ZigBee to WiFi uploading, and four groups of ZigBee intra-communication. The experimental results show that Amphista improves network throughput by up to 400x and reduces transmission latency.
Fig. 2.
Fig. 2. Amphista network architecture. By using the CTC link from ZigBee to WiFi (Z2W), control messages and software updates are transmitted inside ZigBee networks. Overall, Amphista achieves concurrent communications of (1) WiFi high quality (HQ) video uploading, (2) four groups of ZigBee sensor data uploading, and (3) four groups of ZigBee intra-communication.

3.3 Working with Backscatter Networking

As the rapid growth of IoT devices and sensors, ultra-low power and energy harvesting sensors are gaining more attention in areas such as health monitoring. A simple example would be energy-harvesting sensors, which are implanted in patients and collect data like electrocardiogram, that need to transmit the data to wearable ZigBee devices. The wearable devices also require localization and control data from a cloud server. Considering the energy consumption of traditional ZigBee and the repetitive packets overhead of bridge gateway, existing methods are unable to provide efficient transmission. In [69], researchers propose to modify the WiFi payload of the gateway so that it can transmit a hybrid WiFi and ZigBee signal. As shown in Figure 3, by leveraging productive WiFi packets, a tag backscatters the hybrid signal to transmit its sensor data as well as relay messages to the ZigBee node. The tag changes the frequency of the hybrid signal with power consumption of only 25 \(\mu\) W. It demonstrates the feasibility and possible improvement of leveraging CTC in backscatter networking.
Fig. 3.
Fig. 3. Passive ZigBee overview. (a) Tag backscatters the signal to transmit sensor data. (b) Tag relays messages to ZigBee device.

3.4 Clock Synchronization

Clock synchronization is a critical function in IoT networks, especially in event-driven scenarios such as environmental surveillance. Crocs [70] is the first work to synchronize clocks of WiFi and ZigBee devices. It consists of two phases. First, a WiFi device transmits beacon messages to form a detectable pattern and let the ZigBee device record timestamps of every received pattern. After agreeing on a unique global time point, timestamps recorded by the WiFi device are sent to ZigBee in the CTC link. Then, clock calibration and adjustment are conducted on ZigBee devices. Crocs provides a robust and accurate synchronization between WiFi and ZigBee with an error of less than 1 millisecond.

3.5 Cross Technology Attack

Although researchers have proposed many CTC links and applications in IoT networks, CTC transmission is vulnerable to network attacks such as jamming and sniffing [71]. Different from attacks on the existing network, reactively jamming packet-level CTC link requires prior knowledge of specific modulation scheme (e.g., packet pattern, power level). To this end, JamCloak [72] proposes a taxonomy on different CTC protocols and trains a detection model to classify CTC traffic. Then, it conducts a reactive jamming attack on the CTC traffic. The results show that JamCloak can reduce the packet delivery ratio by 80.8% of existing CTC links in practice. In addition, a countermeasure against such attacks is proposed and shown to be capable of resolving the jamming attack.

4 Packet Level CTC

Early works on CTC utilize the packet transmission as the carrier to convey messages to the receiver of another technology. These works are named as packet level CTC. The sender usually transmits legitimate packets in an elaborate manner to encode information, which is decoded by the receiver based on the channel analysis. The existing works on packet level CTC are shown in Table 1. In the column of throughput, the values in the parentheses refer to the aggregated throughput when multiple senders or receivers are involved.
Table 1.
CategoryMethodLinkParallel CTCsThroughputReliabilityComplexity
RSSI-based CTC using packet energyBasic [73]WiFi \(\rightarrow\) ZigBeeNo16bpsHighLow
WiZig [25, 74]WiFi \(\rightarrow\) ZigBeeNo153.85bpsHighLow
StripComm [75]WiFi \(\rightarrow\) ZigBeeNo1.1kbpsHighLow
RSSI-based CTC using packet sizeEsense [76]WiFi \(\rightarrow\) ZigBeeNoN/AHighLow
HoWiES [77]WiFi \(\rightarrow\) ZigBeeNoN/AHighLow
RSSI-based CTC using packet scheduleFreeBee [78]WiFi \(\leftrightarrow\) ZigBee Bluetooth \(\rightarrow\) WiFi/ZigBeeYes31.5(560)bpsHighLow
DCTC [79]WiFi \(\leftrightarrow\) ZigBeeYes47-160(760)bpsHighLow
Gap Sense [80]WiFi \(\rightarrow\) ZigBeeNoN/AHighLow
C-Morse [81]WiFi \(\rightarrow\) ZigBeeYes12-137(936)bpsHighLow
EMF [64]WiFi \(\leftrightarrow\) ZigBeeYes203(356)bpsHighLow
RSSI-based CTC using packet contentLoraBee [82]LoRa \(\rightarrow\) ZigBeeNo281.61bpsHighLow
CSI-based CTC \(B^2W^2\) [83] DAFSKBluetooth \(\rightarrow\) WiFiYes1.5kbpsHighLow
ZigFi [84, 85]ZigBee \(\rightarrow\) WiFiNo215.9bpsHighLow
AdaComm [86]ZigBee \(\rightarrow\) WiFiNo229bpsHighLow
Amphista [68]ZigBee \(\rightarrow\) WiFiYes2500bpsHighLow
cChirp [87, 88]ZigBee \(\rightarrow\) WiFiNo90.12bpsHighLow
DopplerFi [89]Bluetooth \(\leftrightarrow\) WiFiNo1.59KbpsHighLow
Receiver Transparent CTCsWEBee [22]WiFi \(\rightarrow\) ZigBeeYes63 KbpsLowHigh
PMC [90]WiFi \(\rightarrow\) ZigBeeYes121.02 KbpsLowHigh
BlueFi [23]WiFi \(\rightarrow\) BluetoothYes122.5 KbpsLowHigh
LTE2B [91]LTE \(\rightarrow\) ZigBeeNo/LowHigh
Passive-ZigBee [69]WiFi \(\rightarrow\) ZigBeeNo230 KbpsLowHigh
WIDE [92, 93]WiFi \(\rightarrow\) ZigBeeYes247.2 KbpsLowHigh
BlueBee [94]BLE \(\rightarrow\) ZigBeeNo225 KbpsLowHigh
Transmitter Transparent CTCsXBee [95]ZigBee \(\rightarrow\) BLENo217 KbpsLowHigh
LEGO-Fi [96, 97]ZigBee \(\rightarrow\) WiFiNo213.6 KbpsLowHigh
XFi [98]ZigBee \(\rightarrow\) WiFiYes285.7 KbpsLowHigh
None Transparent CTCsTwinBee [99]WiFi \(\rightarrow\) ZigBeeYes/LowHigh
LongBee [100]WiFi \(\rightarrow\) ZigBeeYes/LowHigh
SymBee [101]ZigBee \(\rightarrow\) WiFiNo31.25 KbpsLowHigh
Chiron [102]WiFi \(\leftrightarrow\) ZigBeeYes223.97 KbpsLowHigh
PIC [103]WiFi \(\leftrightarrow\) BLEYes121.02 KbpsLowHigh
Symphony [104]ZigBee, BLE \(\rightarrow\) LoRaYes3 KbpsLowHigh
Table 1. Packet Level CTC and Physical Level CTC
There are two typical ways that the receiver captures the characteristics of the sender’s packet transmission and decodes the intended information. First, the receiver may utilize the received signal strength indication (RSSI) to recognize and analyze the packets from a heterogeneous device. As a foundational function for MAC techniques including CSMA, RSSI sampling is common among varieties of wireless standards (e.g., Bluetooth, ZigBee). Based on the fact that common technologies like WiFi, ZigBee and Bluetooth coexist on the 2.4GHz ISM band, one device is able to sense the energy of packets from another device in the channel if their frequency bands overlap. Therefore, RSSI can serve as a bridge between heterogeneous devices. The second method utilizes channel state information (CSI) as a side channel to convey CTC symbols. This method is specific to the scenario where WiFi is the receiver. WiFi is able to sense the transmission of heterogeneous wireless devices like Bluetooth or ZigBee devices by analyzing the CSI values of the subcarrier of corresponding frequency. So these devices may convey information to WiFi by influencing the CSI values of ongoing WiFi transmissions. This method developed quickly in recent years as WiFi devices are widely deployed in various environments.

4.1 RSSI-based Packet Level CTC

In RSSI-based packet level CTC, the sender and receiver communicate by producing and sensing the RSSI sequence of a certain pattern in the channel. Figure 4 shows how to establish a side channel based on RSSI between the sender and receiver which utilize heterogeneous technologies but coexist in an overlapping frequency band. Typically, when the sender sends packets in the channel, the receiver senses the existence of them by observing the fluctuation of RSSI values. In Figure 4, the receiver is able to recognize two packets from the sender by analyzing these RSSI samples. In a subsequent analysis of RSSI samples, the receiver can calculate the packet size and packet interval of the sender. These parameters can be manipulated by the sender to convey information. Moreover, the energy gap between RSSI values related to packets and the noise floor is an optional side channel.
Fig. 4.
Fig. 4. RSSI as the side channel for packet-level CTC.
In this section, we introduce the representative CTC works where the sender encodes messages in RSSI by manipulating packet energy, packet size, packet schedule or packet content.

4.1.1 Packet Energy.

Although ZigBee cannot decode WiFi packets directly due to incompatible standards, ZigBee can detect the presence of WiFi packets by background energy sensing. This sheds light on the CTC based on packet energy. In the Reference [73], the author proposes a CTC method for WiFi to communicate with ZigBee using packet energy as the information carrier. Since that the channel overlapping is an essential condition for ZigBee to perceive WiFi signals, WiFi channel \(N\) and ZigBee channel \(N+11\) are used to accomplish the CTC. As a basic RSSI-based CTC using packet energy, this work achieves a data rate of 2 bytes per second with less than \(10\%\) bit error rate.
The modulation and demodulation scheme is shown in Figure 5. The WiFi sender modulates the energy in the channel by controlling the presence and the absence of high rate UDP packets. The presence and absence of high rate UDP packets represent the CTC symbol “1” and “0”, respectively. During the transmission of WiFi packets, the ZigBee receiver conducts energy sensing and collects the RSSI sequence. Then it uses the minimum RSSI fraction or average RSSI as an indicator to distinguish the presence or absence of the WiFi UDP packets. For example, the ZigBee receiver calculates the average RSSI within the decoding window. If this ratio is larger than the predefined threshold, the CTC symbol is decoded as “1”. Otherwise, the CTC symbol is decoded as “0”.
Fig. 5.
Fig. 5. The modulation and demodulation of the basic packet energy based CTC.
It is inefficient to use only the presence and absence of WiFi packets to encode the CTC symbol, as there are only two energy levels (one binary CTC symbol) within a CTC window. To improve CTC throughput, WiZig [25, 74] proposes to increase the number of energy levels to encode multiple CTC symbols within a CTC window. Generally, WiZig offers a throughput of 153.85 bps with less than \(1\%\) symbol error rate in a real environment. To explain the modulation of WiZig, we take the scheme of four energy levels as an example. As shown in Figure 6, the WiZig sender transmits WiFi packets with three different powers to provide three energy levels, which can be encoded as “01”, “10”, and “11”. The absence of WiFi packets is encoded as “00”. The WiZig receiver samples the RSSI sequence on the overlapping channel and detects four different energy levels. In this way, the WiZig receiver can decode two CTC symbols within a CTC decoding window. If the number of energy levels is \(M\) , the CTC symbols with a CTC window are equal to \(log_2M\) .
Fig. 6.
Fig. 6. WiZig with multiple energy levels and the adjustment of CTC symbol window length.

4.1.2 Packet Size.

Esense [76] is an early work that uses packet size as the side channel to realize uni-directional CTC from WiFi to ZigBee. To encode CTC symbols, Esense builds an “alphabet set” by exploring a set of packet sizes that are distinguished from the normal packet size of WiFi communication. Each packet size in the “alphabet set” can represent a different piece of information conveyed from WiFi to ZigBee. HoWiES [77] is another RSSI-based packet level CTC that manipulates packet size. HoWiES is inspired by Esense and expands the message capacity of CTC. In the Reference [105], the author proposes a bi-directional CTC between WiFi and ZigBee.

4.1.3 Packet Schedule.

In the Reference [78], the author proposes FreeBee, a CTC framework among three popular wireless technologies: WiFi, ZigBee, and Bluetooth. The key idea of FreeBee is to modulate CTC symbol messages by shifting the transmission timings of periodic beacons. FreeBee utilizes mandatory beacons widely adopted among wireless technologies and achieves a generic and free side channel design without incurring extra traffic. We use the communication from WiFi to ZigBee to illustrate the generic design of FreeBee. The modulation process of basic FreeBee is shown in Figure 7. We assume that the reference position of the unmodulated beacon is at \(t\) and the interval between two unmodulated beacons is \(T\) . The FreeBee sender shifts the beacon from its reference position in the range of \((\frac{-T}{2},\frac{T}{2}]\) to embed the CTC symbols. The capacity of FreeBee depends on the \(T\) and the granularity of shift \(\bigtriangleup\) . Following the 802.11 standards, \(\bigtriangleup\) is set as 1.024ms and the interval of the unmodulated beacons is 102.4ms. That means the beacon can be modulated at 100 different time instances and the beacon timing shift can represent 6 bits ( \(\lfloor log_2100 \rfloor\) ). The modulated beacons are transmitted several times repeatedly (i.e., beacons are transmitted at \(t+T-\bigtriangleup\) , \(t+2T-\bigtriangleup\) , and so on). The required number of beacon repetitions per CTC symbol is decided by the channel noise.
Fig. 7.
Fig. 7. The modulation of basic FreeBee.
Different from FreeBee, DCTC [79] achieves CTC with existing data packets, which significantly enhances the CTC throughput to 760bps. Besides modulating the timings of beacon and data packets, Gap Sense [80] constructs customized preambles and leverages the quiet period between the customized preambles to convey CTC symbols. The preamble is designed elaborately in a way to maximize the signal-to-noise ratio (SNR). The gap between two consecutive preambles can be determined by the receiver according to the number of samples that the receiver recorded between the RSSI pulses. Then the gap length can be mapped to various CTC symbols, depending on the objective of higher-layer protocols. C-Morse [81] borrows the idea from International Morse Code, and uses the combination of the short WiFi packet (dot) and the long WiFi packet (dash) to construct recognizable energy patterns at the ZigBee receiver. EMF [64] embeds CTC message by constructing different traffic occupancy ratios. The traffic occupancy ratio denotes the ratio of total packets duration to the total time duration. The change of packet occupancy ratio can be achieved by shifting the packets or flipping the packet order to form a unique pattern.

4.1.4 Packet Content.

LoraBee [82] explores how to enable CTC from LoRa to ZigBee devices. LoraBee observes that ZigBee can sense and capture the characteristics of LoRa communication by RSSI measurement. When the LoRa and ZigBee channels overlap partially, ZigBee is able to detect the LoRa payload based on its RSSI signature. Therefore, the LoRa payload and the corresponding RSSI sequence measured by ZigBee can be used as a side channel to convey messages. Specifically, LoRaBee uses the sudden RSSI value drops as the feature to identify the RSSI signature of LoRa. This feature is resilient to noise and interference and can be captured by the receiving ZigBee node. As for the encoding scheme, the LoRa device puts the feature in the packet payload according to the conveyed CTC symbol, while the ZigBee device decodes the symbol when it detects the match between the measured RSSI feature and the feature set stored beforehand. The experimental results show that LoRaBee provides reliable CTC communication from LoRa to ZigBee with a throughput of 281.61bps in the Sub-1 GHz band.

4.2 CSI-based CTC

CSI is normally used by WiFi to measure the channel variation during the WiFi packet transmission from the WiFi sender to the WiFi receiver. The CSI values include the phase and magnitude attenuation caused by channel changes at the subcarrier level and the CSI values can be obtained from the off-the-shelf WiFi devices (e.g., Intel 5300 card). Considering a WiFi device transmitting packets in the channel, the heterogeneous device can overlap its transmission at both the frequency band and the transmission time. That way, the device can influence the CSI values of the WiFi subcarriers of the same frequency and further, convey information by changing the CSI values.
Specifically, the bandwidth of a WiFi subcarrier (312.5KHz) is several times narrower than one BLE or ZigBee channel (2MHz). In addition, a BLE or ZigBee packet is long enough to hit several WiFi packets in a row. Therefore, BLE or ZigBee devices can convey information by affecting the CSI values of WiFi subcarriers. At the WiFi side, considering a WiFi receiver that receives \(m\) continuous packets at different time and the WiFi band is divided into \(N\) subcarriers. The Figure 8 shows the CSI matrix from time \(T[0]\) to time \(T[m]\) and from subcarrier 1 to \(N\) . The blue-colored CSI values are affected by the transmission of heterogeneous devices. The researchers observe that, without the effect of other packets, the neighboring subcarriers (e.g., subcarrier i and i+1) should have very similar CSI readings due to the similar wavelength and multipath effect. So the WiFi device is able to extract the information embedded to the blue colored CSI values by calculating the following equation:
\begin{equation} Y_{i+1}[k]=|CSI_{i+1}[k]|-|CSI_{i}[k]| \end{equation}
(1)
where \(Y_{i+1}[k]\) can be used to decode the information from a heteregeneous sender.
Fig. 8.
Fig. 8. CSI matrix from subcarrier 1 to \(N\) after received WiFi packets at different times.
Based on the analysis above, the CSI-based CTC achieves the message transfer to WiFi receiver from a heterogeneous sender. Recent works on CSI-based CTC also explore how to improve the reliability in dynamic conditions, extend the transmission range, avoid modifications to MAC-related configurations, or apply it in edge computing scenarios involving gateways.
\(\mathbf {B^2W^2}\) [83] enables CTC from BLE to WiFi while concurrently supports the original BLE to BLE and WiFi to WiFi communications. The basic idea of \(B^2W^2\) is to leverage the CSI variation to embed the CTC symbol from BLE into its overlapped WiFi subcarriers.
To encode and transfer information by CSI, the \(B^2W^2\) sender uses a module named DAFSK to form a sine wave by adjusting the transmission powers of the adjacent BLE packets. As shown in Figure 9, discrete points on the sine wave is corresponding to the BLE packets with different transmission powers. Then the frequency of the sine wave can be changed so that the BLE data streams with different frequencies can represent different CTC symbols. For example, a sine wave with the total duration of eight BLE packets and four BLE packets represents CTC symbol “0” and “1”, respectively. To decode and receive information embedded in the CSI values, the \(B^2W^2\) receiver extracts the CSI values that are affected by the BLE’s transmission and then recovers the discrete sine waves. The \(B^2W^2\) receiver demodulates the CTC symbol according to the frequency of the sine waves. Compared with FreeBee, \(B^2W^2\) achieves 85x throughput improvement by DAFSK.
Fig. 9.
Fig. 9. Illustration of DAFSK in \(B^2W^2\) .
ZigFi [84] is another work depending on the side channel of CSI, which achieves CTC from a ZigBee sender to a WiFi receiver. The basic idea of ZigFi is to carefully piggy-back ZigBee packets over WiFi packets, without destroying the ongoing WiFi transmissions. In order to use the CSI sequence to enable ZigBee to WiFi CTC, some conditions need to be satisfied: (i) An appropriate subchannel should be selected to make ZigBee and WiFi overlap in the frequency domain. (ii) The ZigBee packet length must be large enough to make ZigBee packets overlap with WiFi packets in the time domain. (iii) An appropriate ZigBee power to make the CSI sequence more distinctive. The ZigFi sender transmits ZigBee packets that satisfy the above conditions and encodes the CTC symbols using the presence or absence of ZigBee packets. The ZigFi receiver receives two sets of information. It decodes packets transmitted by the ZigFi sender as a regular WiFi packet. It also collects the CSI sequence and uses the support vector machine classifier to decode the CTC data. ZigFi achieves a throughput of \(215.9bps\) , which is 18x faster than FreeBee.
AdaComm [86] is also related to CSI-based CTC from ZigBee to WiFi. AdaComm aims at maintaining reliable communication performance in dynamic channel conditions. Different from previous work like ZigFi that reactively adjusts the CTC scheme at the sender, AdaComm improves reliability by using an online learning mechanism at the receiver side. The evaluation results demonstrate that AdaComm can significantly reduce the symbol error rate (SER) by \(72.9\%\) and \(49.2\%\) , respectively, compared with the existing approaches.
cChirp [87] extends the communication range of CSI-based CTC from ZigBee to WiFi. Due to the asymmetric bandwidth and transmission power, the existing CTC from the low-power and narrow-band technology to the high-power and wide-band technology suffers from serious symbol distortions and has a limited range. Inspired by chirp spread spectrum (CSS) modulation in LoRa, cChirp proposes that the ZigBee sender can use transmissions on multiple ZigBee channels to construct chirps in the WiFi CSI matrix in Figure 10. This method constructs a stable and distinguishable pattern to convey symbols, improves the decoding sensitivity at the WiFi receiver, and achieves a \(60m\) communication range from ZigBee to WiFi with a goodput of about \(90bps\) .
Fig. 10.
Fig. 10. The transmissions of ZigBee in cChirp.
DopplerFi [89] explores how to build a CTC channel between BLE and WiFi without modifying the MAC-related configurations such as transmission power or time. As for transmission from BLE to WiFi, DopplerFi is transparent to upper layers and achieves CSI-based CTC from BLE to WiFi with a throughput of \(1.59 Kbps\) . DopplerFi takes advantage of the fact that the current designs of BLE can tolerate and compensate 150 KHz central frequency offset (CFO). Particularly, BLE packets are shifted with \(\pm 80\) KHz by CFO calibration in PHY. Such shift has little impact on adjacent channels due to the guard band protection and leaves enough space for BLE to tune carrier frequency and encode bits. It also ensures CFO recovery in legacy packet reception even in the presence of inherent CFO and Doppler effect. Since one BLE channel overlaps with multiple subcarriers in WiFi, WiFi can obtain the information from BLE by extracting the CSI values of WiFi packets. To identify different amounts of frequency shifts in BLE packets, WiFi differentiates them by analyzing the frequency correlations among adjacent CSI values.

5 Physical Level CTC

The CTC works that depend on the side channel of packet energy, packet size, packet interval, and CSI belong to the packet level CTC. The efficiency of these CTC works is bounded due to the limited throughput. First, the duration and interval of the wireless packet are in the range of milliseconds. Hence, embedding CTC symbols into the sparse wireless packets is inefficient. Second, the packet level CTC fails to fully utilize the bandwidth. Take the CTC from WiFi to ZigBee as an example. ZigBee conducts RSSI sensing within a 2MHz-bandwidth channel, while the bandwidth of WiFi is 20MHz. The signals within the rest of the WiFi bandwidth will be wasted. Due to the above limitations, the physical level CTC works arise.
According to whether the communication process is transparent to the transmitter or receiver, the physical level CTCs can be divided into three categories, namely receiver transparent CTCs, transmitter transparent CTCs, and none transparent CTCs. In this section, we will introduce the representative CTC works in the three categories. Table 1 also includes a brief summary and comparison of them.

5.1 Receiver Transparent CTCs

With receiver transparent CTC, the receivers can demodulate the heterogeneous transmitters’ signals without any modification. The receiver transparent CTCs mainly utilize the transmitter’s signals (e.g., WiFi) to emulate the receiver’s signals (e.g., ZigBee) by manipulating the transmitter’s payload. According to the emulation target, these works can be divided into two categories, namely time-domain waveform-based emulation and phase-shift-sequence-based emulation. The former mainly emulates the receiver’s time-domain waveform, such as WEBee [22] and PMC [90], while the latter mainly emulates the phase shift sequence of the receiver’s signal, such as WIDE [92] and BlueBee [94].
WEBee [22] introduces a high-throughput CTC from WiFi to ZigBee via emulating the ZigBee time-domain waveform by modifying the WiFi transmitter. Figure 11 illustrates the architecture of WEBee. The WiFi device chooses the payload of a WiFi frame to emulate the ZigBee packet. When the ZigBee device receives signals, the WiFi header, preamble, and trailer are ignored as noise. The WiFi payload is recognized as a legitimate ZigBee packet and is decoded successfully at the ZigBee receiver. The complete WEBee emulation procedure is transparent to the ZigBee receiver and is shown in Figure 12, which mainly consists of three parts: (i) Quadrature Amplitude Modulation (QAM) Emulation, (ii) Channel Coding Emulation, and (iii) Post-QAM Emulation.
Fig. 11.
Fig. 11. The architecture of the WEBee.
Fig. 12.
Fig. 12. Complete WEBee emulation procedure.
QAM Emulation is the core of WEBee. As shown in Figure 13, the process of QAM selection is done in the reverse direction, where the desired ZigBee time-domain signals are sent into the fast Fourier transform (FFT) to select the corresponding QAM constellation points. Whereas the frequency components of the desired ZigBee time-domain signals may not match the WiFi QAM points perfectly, which leads to QAM quantization errors. Parseval’s theorem states that the energy in the time-domain is equal to the energy in the frequency domain. That means minimizing the signal distortion in the time-domain caused by the QAM emulation errors is equal to minimizing the deviation of frequency components. Hence, the QAM emulation is an optimizing process to choose the closest \(n\) QAM points in terms of the difference of FFT points between the desired signals and WiFi signals. Moreover, the Direct Sequence Spread Spectrum (DSSS) also improves the ability to tolerate errors. Specifically, a ZigBee symbol (4-bits) is mapped into a 32-chip sequence. The maximum Hamming distance between the received chip sequence and the standard chip sequence is customizable in commercial off-the-shelf devices. Hence, in WEBee, the maximum Hamming distance can be set more loosely to tolerate QAM emulation errors.
Fig. 13.
Fig. 13. The basic process of QAM emulation.
Channel Coding Emulation is used to achieve the emulation of convolutional encoder, scramber, and interleaver. First, the convolutional encoding can be modeled as a matrix \(M\) , which satisfies \(M \times _{GF(2)}X=Y\) . The Galois field \(GF(2)\) is used to define the relationship between the source bits \(X\) and the coded bits \(Y\) . WEBee only needs to control 7 WiFi QAM points to emulate ZigBee signals because the ZigBee channel only covers 7 WiFi subcarriers. So with 64-QAM, WEBee controls only 42 (7 \(\times\) 6) bits of \(Y\) by manipulating \(X\) . In addition to convolutional encoder, the scrambling of WiFi is achieved by XORing the incoming source bits with the output of a 7-bit linear feedback shift register. It is easy to reverse the scrambler by XORing the scrambled bits with the same output of the shift register because the scrambler is a one-to-one mapping from the source bits to the scrambled bits. Similarly, the interleaver is also a one-to-one mapping from the coded bits to the permuted bits, and it can be reversed easily.
Post-QAM Emulation has several challenges to be resolved. First, the duration of a ZigBee symbol is four times that of WiFi. Therefore, a complete ZigBee symbol has to be segmented before emulated by four WiFi symbols and such segmentation introduces boundary errors. Second, the cyclic prefix (CP) will also cause errors. The 0.8 \(\mu\) s-CP means that the front segment and the end segment of WiFi signals are the same, introducing additional error for ZigBee. Due to the inherent difference between WiFi and ZigBee, the signal distortion cannot be avoided completely during the emulation. WEBee also proposes repeated transmission and forward error correction (FEC) for reliability.
PMC [90] is another waveform-based CTC from WiFi to ZigBee. Different from WEBee, PMC only uses the signals of the overlapping WiFi subcarriers to emulate ZigBee signals. The other subcarriers still transmit WiFi signals. The system overview is shown in Figure 14. Specifically, PMC firstly develops an offline search algorithm, which can map the desired ZigBee signals to WiFi QAM-modulated signals. This search algorithm iteratively finds the QAM phase states that are most similar to the ZigBee offset quadrature phase shift keying (OQPSK) signals from all possible QAM phase states in the overlapping WiFi subcarriers. It should be noted that it is different from WEBee [22] as it can choose other QAM points besides the original WiFi constellation points. This mapping relationship is stored in a look-up table (LUT). Then WiFi sender goes through the LUT table to get the QAM states corresponding to the ZigBee signals. The signals in other non-overlapping subcarriers are the traditional WiFi signals. The hybrid ZigBee and WiFi signals are sent after the inverse FFT module. In this way, the hybrid signals can be decoded by the WiFi receiver and ZigBee receiver, respectively. It should be noted that the hybrid signals can be directly received and decoded by the ZigBee receiver without any modification, while the WiFi receiver needs to be modified at the link layer to extract the WiFi data from the hybrid signals.
Fig. 14.
Fig. 14. The system overview of the PMC.
In addition to the person-area network (e.g., WiFi, ZigBee, and Bluetooth), some works focus on the wide-area network (e.g., LTE and Multefire). LTE2B [91] is a representative CTC work that delivers information from LTE to ZigBee. Some works attempt to combine the physical level CTC with backscatter. Passive-ZigBee [69] utilizes a low power backscatter radio to transform a WiFi signal into a ZigBee packet.
On the one hand, in spite of the progress in time-domain waveform emulation, an important fact is often overlooked: the emulated signals from the sender cannot perfectly match the desired signals of the receiver due to the difference in communication standards and the hardware restrictions. There is more or less Hamming distance between the emulated and the desired signals, incurring emulation errors. On the other hand, the receiver transparent CTC receiver (ZigBee, BLE, etc.) uses the phase shift rather than the phase itself or time-domain waveform to decode signals. Specifically, the receiver outputs “1” if the phase shift between two consecutive samples is bigger than 0 and otherwise outputs “0”.
Based on the above finding, WIDE [92] achieves CTC based on the method of digital emulation to reduce emulation errors. Instead of emulating the original time-domain waveform of the receiver, the sender emulates the phase shifts associated with the desired signals. The process of digital emulation is shown in Figure 15. Given the desired data bits of the receiver, the sender calculates the signs of phase shifts. The positive and negative phase shifts represent the bit “1” and “0”, respectively. The sender generates a ladder-shaped phase sequence that matches the signs of phase shifts. The duration of each phase value is equal to the decoding period of the receiver. The ladder-shaped phase sequence corresponds to a waveform, which is then emulated by using the time-domain waveform emulation.
Fig. 15.
Fig. 15. The process of digital emulation.
Compared with the time-domain waveform emulation, digital emulation is more flexible and robust. As shown in Figure 15, the phase shift sequence of the desired data bits at the receiver side is not unique, because the receiver decodes signals according to the sign of the phase shift rather than the specific phase shift value. For example, the phase shift value \(+\frac{\pi }{4}\) and \(+\frac{\pi }{2}\) can both be decoded as “1” due to the positive sign of phase shift. The errors at the WiFi sender when emulating different phase shift sequences are different. Therefore, we have the opportunity to reduce the emulation errors by selecting an appropriate phase shift sequence for emulation.
BlueBee [94] proposes a CTC from BLE to ZigBee by emulating legitimate ZigBee packets using BLE packets. It is also based on phase shift sequence emulation. The feasibility of emulating ZigBee packets using BLE packets relies on two key technique insights. First, the modulation techniques of ZigBee and BLE are similar. ZigBee’s OQPSK and BLE’s GFSK both leverage the phase shift between consecutive samples to indicate symbols. Second, the demodulation of Zigbee only considers the sign of the phase shift (“+” or “ \(-\) ”) instead of a particular phase shift value, which offers great flexibility in emulation. Figure 16(a) depicts the ZigBee signal containing chips “11”. The phase shifts from \(T_1\) to \(T_2\) and from \(T_2\) to \(T_3\) are both \(\frac{\pi }{2}\) . Figure 16(b) shows the BLE signal, which is the emulation of Figure 16(a). The bandwidth of BLE is half of the bandwidth of ZigBee, which means the sampling rate of BLE is also half of ZigBee. When the BLE signal is fed into the ZigBee receiver, the ZigBee receives samples at \(T_1\) , \(T_2\) , and \(T_3\) . The phase shifts from \(T_1\) to \(T_2\) and from \(T_2\) to \(T_3\) are both \(\frac{\pi }{4}\) . Since the signs of these two phase shifts are positive, the ZigBee chips can be successfully decoded as “11”. In this case, the ZigBee receiver can decode the BLE signal segment as “11” or “00”. Consider that there are “10” and “01” in the DSSS sequence of the ZigBee symbols. The BLE signal is optimally designed such that the inevitable error is minimized and kept under the tolerance of the ZigBee’s OQPSK/DSSS demodulator.
Fig. 16.
Fig. 16. The emulation process of BlueBee.

5.2 Transmitter Transparent CTCs

Different from the receiver transparent CTCs that utilize the transmitter’s strong capability to realize the communication from high-end transmitters to low-end receivers, the transmitter transparent CTCs make full use of the receiver’s capability to realize the communication from low-end transmitters to high-end receivers without any modification of transmitters. Now we introduce three transmitter transparent CTC works. The first two of them observe the pattern of the transmitter’s signal at the receiver to achieve cross-decoding, while the third one utilizes the strong computing capability of the WiFi receiver to reconstruct the transmitter’s signal.
XBee [95] is a physical-level CTC from ZigBee to BLE. This work proposes the method of cross-decoding, which interprets a ZigBee frame by observing the bit pattern obtained at the BLE receiver. Cross-decoding is inspired by the following two technical insights. First, Both the ZigBee receiver and the BLE receiver utilize the phase shift to decode their signals. Second, the phase shifts at the BLE receiver are quantized, and only the sign of phase shifts are used. We illustrate the method of cross-decoding with the example shown in Figure 17. A ZigBee symbol lasts 16 \(\mu\) s. Considering the sampling rate of BLE is 1 \(MHz\) , the above ZigBee signals can be demodulated as 8 BLE bits based on the sign of phase shifts. Since the sampling rate of BLE is half of the sampling rate of ZigBee, whether the samples have a left offset or a right offset determines the final decoding result. The BLE decoding bit sequence has some determined bits and some undetermined bits. According to the demodulated BLE bits, the BLE receiver can infer the ZigBee symbols.
Fig. 17.
Fig. 17. Two different bit sequences obtained by the BLE receiver for ZigBee symbol.
LEGO-Fi [96] is another transmitter transparent CTC, which delivers information from ZigBee to WiFi. LEGO-Fi reuses the standard WiFi modules for the ZigBee reception and proposes a concept named cross-demapping. As shown in Figure 18, the authors reuse the WiFi short preamble detection module, the WiFi long preamble detection module, and the quadrature demodulation module to decode ZigBee symbols. First, the received signals after the process of downsampling are fed to the WiFi short preamble detection module. Second, if the periodic ZigBee preamble is detected, we reuse the WiFi long preamble detection module to conduct symbol synchronization to segment each ZigBee symbol. During this process, the start of frame delimiter (SFD) template of ZigBee is fed into the WiFi long preamble detection module to locate the SFD. Third, these received signals are forwarded to the quadrature demodulator to calculate the corresponding phase shift sequence. Finally, LEGO-Fi uses a matching filter to distinguish different ZigBee symbols and accomplish CTC from ZigBee to WiFi.
Fig. 18.
Fig. 18. The framework of LEGO-Fi [96].
XFi [98] enables mobile devices to directly and simultaneously collect data from diverse IoT devices by commodity WiFi radio. The key insight is that the IoT data can be captured by the WiFi receiver and retained when the IoT frame collides with a WiFi transmission. XFi obtains the collided IoT data by analyzing the decoded WiFi payload. The detailed procedures of XFi are as follows: (i) reconstruct the waveform of hitchhiking IoT data, and (ii) decode the reconstructed IoT waveform. Figure 19 shows the architecture of XFi. The coded bits are recovered from decode bits by the coded bit reconstructor. The coded bits are mapped to the subcarriers and the IoT waveform can be reconstructed by performing IFFT. A robust decoding algorithm is used to decode the IoT data with these reconstructed waveforms. While the channel decoder of WiFi adopts FEC and attempts to eliminate the hitchhiking IoT signal as interference in the decoded output, the author observes that the decoder almost keeps the corrupted coded bits intact, especially when coded bits are severely disturbed by the IoT signal. So the coded bits can be approximated with decoded bits. On the other hand, with the parity removal and CP removal, nearly a third of IoT waveforms are erased by WiFi hardware and cannot be reconstructed. In this case, XFi customizes an enhanced IoT decoder to provide robust decoding with the symbol-level and chip-level redundancy of IoT signals.
Fig. 19.
Fig. 19. The architecture of XFi.

5.3 None Transparent CTCs

In addition to the above two types of CTCs, another type of CTC modifies both the transmitter and the receiver. Part of them are to enhance the robustness of CTC, such as TwinBee [99], LongBee [100], and SymBee [101]. Other works are to achieve parallel communication between the different wireless protocols, such as Chiron [102] and PIC [103]. We introduce these representative works below.
TwinBee [99] is a representative none transparent CTC work to enhance the robustness of CTC, which is proposed to recover errors introduced by imperfect signal emulation of WEBee. The author analyzes the reasons for these errors and conducts several experiments to explore the chip error patterns. The received 32-chip sequence of ZigBee, whose chip errors are located in the middle and both ends of the chip sequence, is regarded as the error-prone chip. The rest of the chips are regarded as normal chips. Since those chip errors have distinguishable patterns, TwinBee designs a specific chip-combining coding method to recover the errors in error-prone chips.
The cyclic-shift feature of ZigBee chip sequence ensures the feasibility of chip-combining coding. As we know, a 4-bit ZigBee symbol is mapped into a 32-chip sequence, and there are a total of 16 different chip sequences for symbol “0” to symbol “15”. The chip sequence “ \(m+2\) ” is the right-cyclic-shifted by 4 chips from the chip sequence “ \(m\) ”.
The basic idea of the chip-combining coding is leveraging the cyclic-shift feature of ZigBee chip sequences to move the error-prone chips away. We suppose the length of error-prone chips is 8 chips. After the chip sequence “ \(m+2\) ” is shifted by 8 chips, the error-prone chips’ position is exactly complementary to the position of symbol “ \(m\) ”. Combining these two emulated symbols only with their normal chips will recover the original symbol with all normal chips.
The diagram of chip-combining coding is shown in Figure 20. An original symbol “ \(m\) ” is to be transmitted. The TwinBee sender firstly selects a twin symbol “ \(m+2\) ” whose chip sequence is right-cycle-shifted by 8 chips from the original symbol. Then the TwinBee sender combines these twin symbols into one byte and transmits via emulation. The TwinBee receiver left-cyclic-shifts the received chip sequence of symbol “ \(m+2\) ” by 8 chips, denoted as “ \(m+2\lt \lt\) ”. The positions of error-prone chips of “ \(m+2\lt \lt\) ” are different from the original symbol \(m\) . In addition, due to the cyclic-shift feature of the ZigBee chip sequence, the chip sequence of “ \(m+2\lt \lt\) ” is equal to the symbol “ \(m\) ” in theory. The TwinBee receiver combines the normal chips of these two chip sequences “ \(m+2\lt \lt\) ” and “ \(m\) ” together. In this way, the TwinBee receiver gets the chip sequence of the original symbol “ \(m\) ” with all normal chips, and the error-prone chips can be recovered successfully.
Fig. 20.
Fig. 20. The diagram of chip-combining coding in TwinBee.
LongBee [100] is another improved CTC work of WEBee. LongBee extends the communication range of CTC to support long-range IoT applications. In terms of signal emulation, LongBee works similarly to WEBee. Moreover, LongBee combines the high transmission power of WiFi and the fine receiving sensitivity of ZigBee together to increase the CTC communication range significantly. SymBee [101] is a symbol-level CTC from ZigBee to WiFi, which is built on the insight of cross-observability on ZigBee-WiFi physical layer. The ZigBee sender transmits specific symbols, and these symbols yield unique and easily detectable patterns when cross-observed at the WiFi receiver. SymBee elaborately selects optimal combinations of ZigBee symbols to achieve two goals. First, these symbols yield the longest stable patterns that maximize the detection under noise and interference. Second, the difference between different combinations of elected symbols used to represent different CTC symbols is maximally distinct. Chiron [102] is a representative none transparent CTC work to achieve parallel communication, as it designs a Chiron receiver and a Chiron sender to enable parallelly transmitting (or receiving) WiFi data and Zigbee data to (or from) commodity WiFi and ZigBee devices.
PIC [103] design a new gateway to achieve the parallel inclusive bi-directional transmission of both WiFi and BLE data simultaneously. The core of the PIC’s design is to generate a frame that contains both WiFi and BLE data which can be demodulated by both WiFi and BLE devices, leveraging the unique modulation schemes of WiFi and BLE. Symphony [104] achieves CTC from both ZigBee and BLE to LoRa. The key ideas of this approach are two techniques: (i) ZigBee and BLE can both generate several specific signals by controlling the payload. (ii) LoRa demodulation mechanism based on FFT can be used to detect the specific signals from ZigBee and BLE.

6 Overall Comparison of CTC

In this section, we compare CTC techniques in terms of throughput, reliability, concurrency, hardware modification, and complexity overhead, as shown in Table 1.

6.1 Performance Comparison

First, the data rate of packet level CTC is lower than that of physical level CTC. For example, the data rate of packet level CTC is usually no more than a few Kbps, while the data rate of physical level CTC can be up to hundreds of Kbps. That is expected because the physical level CTC uses more fine-grained time-domain signal or phase information to transmit CTC messages, while the packet level CTC uses coarse-grained packet features. A packet can only carry a few bits of CTC messages.
Second, the packet level CTC is usually more reliable than the physical level CTC. Specifically, the packet level CTCs have stronger anti-interference and anti-noise ability than the physical level CTCs.
Third, parallel CTC is often desired can be realized by either a packet level CTC or physical level CTC. For example, the packet level CTC named DCTC [79] and the physical level CTC named WEBee [22] support four-channel concurrent CTC links.

6.2 Complexity Comparison

First, the complexity and cost of the packet level CTC are relatively low. For the RSSI-based packet level CTC and the CSI-based packet level CTC, the transmitter sometimes needs to inject extra data packets to construct distinguished RSSI and CSI patterns. At the transmitter, the packet level CTC has no requirement for the data payload and there is no modification on the hardware and the MAC protocol. At the receiver, there is only an add-on demodulation algorithm based on the received RSSI sequence and CSI sequence. The demodulation algorithm of RSSI classification is simple and the computational complexity is \(O(n)\) , where \(n\) is the number of samples. Whereas, the demodulation complexity of the CSI-based packet level CTC depends on the classification algorithm. Different CSI classification algorithms, such as variance detection, SVM classifier and CNN classifier, have different complexity and cost.
Second, the complexity of the physical level CTC is higher than that of the packet level CTC. We present brief comparison of them as follows.
(1) Receiver-transparent physical level CTC: In order to emulate the desired signal or phase of the receiver, the transmitter needs to manipulate the packet payload. The emulation process is the reverse-engineering of the modulation process. FFT operation is the most time-consuming operation in the process of signal emulation, and its computational complexity is \(O(lgn)\) where \(n\) is the length of the desired packet. There is no modification on the modulation/demodulation algorithm, transmitting/receiving parameters, hardware, or the MAC protocol at the transmitter and the receiver.
(2) Transmitter-transparent physical level CTC: In order to demodulate the signal from the transmitter without any modification, the receiver reuses and rewires the existing processing modules to obtain a mapping table between the identified patterns and the CTC messages. The receiver only needs to update the demodulation algorithm without the modification on hardware or the MAC protocol. The transmitter also does not require any modification and transmits the data packet directly.
(3) None-transparent physical level CTC. In order to improve the reception radio of the emulated packet, extend the communication distance of CTC, and support CTC links with higher concurrency, the none-transparent physical level CTC leverages more complex operations such as bandwidth conversion and segment stitching. Although there is no modification on the hardware and MAC protocol, the transmitter needs to modify the packet payload and the transmitting parameters (bandwidth, power, and interval). The receiver employs more complex demodulation algorithm at the software layer.

7 Upper Layer CTC

As mentioned above, packet level CTC and physical level CTC form the physical layer foundation of direct communication among heterogeneous devices. However, a seamless CTC network requires the construction of upper network layers. Simply applying upper layer protocols of homogeneous devices is not optimal. The existence of heterogeneous devices in the network brings opportunities as well as challenges. For example, a heterogeneous network may provide a better routing solution for the network layer. But different signal strength of these devices may lead to a cross-technology hidden terminal problem in the MAC layer. Meanwhile, channel quality estimation and acknowledgment are also issues that require resolving. This section introduces some existing works on building upper layer protocols of CTC network, as shown in Table 2.
Table 2.
NameLayerDesign TargetTechnology
ECC [106]MAC LayerChannel CoordinationWiFi -> ZigBee
ECT [67]Network LayerData ForwardingZigBee -> WiFi
NetCTC [107]Network LayerACKZigBee -> WiFi
CRF [108]Network LayerRouting and FloodingZigBee -> WiFi
C-LQI [109]Link LayerLink Quality EstimationWiFi -> ZigBee
XMIMO [29]Link LayerLink Quality EstimationZigBee -> WiFi
Table 2. Upper Layer Works of CTC
ECC [106] is a representative work that achieves explicit channel coordination on top of CTC from WiFi to ZigBee, as shown in Figure 21. It ensures ZigBee communication under CTI without disrupting WiFi operation. Specifically, ECC first aggregates scattered WiFi white spaces by adopting clear to send (CTS) in the WiFi standard. Then, the WiFi sender broadcasts the cross-technology CTS via CTC, notifying the ZigBee device to wake up and access the spectrum. During the whole communication window, background WiFi devices remain silent due to CTS. In this way, ECC protects the ZigBee transmission from the interference of WiFi and improves the spectrum efficiency by recycling white spaces.
Fig. 21.
Fig. 21. The overview of ECC.
NetCTC [107] proposes a networking support design for physical layer CTC between WiFi and ZigBee to establish feedbacks. ECT [67] proposes a cross-technology network layer design between WiFi and ZigBee. It is a data forwarding method based on B2W2 [83] and EMF [64]. Figure 22 shows ECT’s cross-technology network model. When a ZigBee node transmits raw data to other ZigBee nodes, important data is concurrently transmitted to WiFi. Since WiFi APs have direct connections to the server, the priority map generated on the server can be obtained by the WiFi APs. Then, the WiFi APs will broadcast the priority map to ZigBee nodes so that they can forward the data based on their senders’ priorities. In this way, ECT dynamically adjusts the priorities of ZigBee nodes and therefore reduces the delivery delay. CRF [108] presents a coexistent routing and flooding protocol, which concurrently conducts routing within the WiFi network and flooding among ZigBee nodes using a single stream of WiFi packets.
Fig. 22.
Fig. 22. The IoT networks model in ECT.
C-LQI [109] proposes a new link metric and a joint link model that considers both the emulation error and the channel distortion. Based on the link model, a lightweight approach is proposed to estimate the quality of the CTC link. C-LQI is defined as the expected probability for a symbol to be correctly decoded by the receiver of a CTC link. X-MIMO [29] also performs link quality estimation between WiFi and Zigbee to achieve Multi-User Multiple-Input Multiple-Output (MU-MIMO) CTC. It turns the WiFi AP into an MU-MIMO transmitter, delivering different packets to multiple ZigBee devices in parallel. Cross-technology channel estimation is indispensable as the ZigBee channel information must be collected at X-MIMO to support implicit MU-MIMO. As shown in Figure 23 X-MIMO utilizes a WiFi device associated with the X-MIMO WiFi AP and the WiFi fragmentation function to precisely control the timings of WiFi and ZigBee packets to make them overlap in time. Then the ZigBee channel information can be recovered from this CSI measurement. With the ZigBee channel information and the ZigBee packets to be sent, X-MIMO precodes these different ZigBee packets into multiple streams. Then the different packets can be decoded by these ZigBee devices simultaneously. The precoded streams are converted into a WiFi packet by multi-stream CTC. This WiFi packet is transmitted by X-MIMO through multiple antennas and is decoded into the different ZigBee packets by the ZigBee devices simultaneously.
Fig. 23.
Fig. 23. Timing control via fragmentation of X-MIMO.

8 Future Work

In order to achieve a more ubiquitous cross-network, cross-frequency, and cross-media communication system, there have also been a lot of cutting-edge works to open a new direction for the development of CTC.

8.1 Cross-network Systems

CTC enables interpreting signals from other technologies with dedicated hardware as a helper in a backscatter communication system [110, 111, 112]. Although a basic backscatter communication system consists of dedicated hardware, it can still be a promising alternative to connect different technologies due to its low power consumption and simplicity. By leveraging the receiver-transparent CTC technique, WiTAG [113], shown in Figure 24, designs a MAC-layer backscatter tag that can be read using WiFi devices. It reduces the complexity and cost of deploying backscatter systems by using existing WiFi infrastructures instead of specialized readers. Gatescatter [114] is another backscatter-based CTC connecting commodity IoT to WiFi. The Gatescatter tag can reshape ZigBee packets with an arbitrary payload into a legitimate 802.11b WiFi packet, such that the payload can be decoded at the WiFi receiver.
Fig. 24.
Fig. 24. WiTAG overview.

8.2 Cross-frequency BackCom-based Systems

The above CTC works require the frequency overlapping between the transmitter and the receiver. Nowadays, some CTC works achieve cross-frequency communication between different devices. Interscatter [115] is the first cross-frequency communication work that achieves CTC from Bluetooth to WiFi in different channels by using backscatter technology. TiFi [116] is another cross-frequency communication work. It achieves CTC from the RFID tag (from 840 \(MHz\) to 920 \(MHz\) ) to the WiFi receiver (2.4 \(GHz\) ). TiFi proposes harmonic backscattering to sew the frequency gap between RFID and WiFi [117]. Due to the rectenna’s nonlinearity effect, RFID tags reflect the reader’s wave at the fundamental frequency (e.g., first at 820 \(MHz\) ) and at the harmonics (e.g., second at 1.64 \(GHz\) , third at 2.46 \(GHz\) ). In this way, the frequency of the harmonic reflected signal of the RFID tag overlaps with WiFi. The illustration of TiFi process is shown in Figure 25. Leveraging the RFID mode of retransmission request, the reader can obtain the message of the RFID tag after one transmission. Later, the reader remodulates the message of the RFID tag with the modulation of WiFi. Therefore, the WiFi receiver can receive packets from the RFID tag.
Fig. 25.
Fig. 25. Reflection of WiFi beacon in TiFi.

8.3 Cross-media Systems

Existing communication technologies cannot enable communication across medium boundaries, such as across the water-air interface. This is because most wireless signals directly reflect at the media boundary. Besides using RF signals, many advanced works explore acoustic and light signals to achieve cross-media communications. TARF [118] enables submerged underwater sensors to directly communicate with an airborne node, as shown in Figure 26(a). The design of TARF relies on the fundamental physical properties of acoustic waves. The underwater sensor equipped with a sound transducer transmits the acoustic waves as the pressure waves. When the pressure waves hit the water surface, there will be perturbation or displacement caused by the mechanical nature. In order to pick up the displacement of the surface caused by the acoustic waves, TARF’s airborne sensor transmits frequency-modulated carrier wave (FMCW) millimeter-wave to measure the phase of reflected signals. AmphiLight [119] uses laser light to achieve communication across the air-water interface.
Fig. 26.
Fig. 26. Enabling communication across the water-air interface.

9 Conclusion

This paper gives a survey of cross-technology communication in the era of IoT. We first point out that the heterogeneity of IoT devices is the critical challenge to achieving communication among heterogeneous wireless devices. Such heterogeneity includes the incompatibility of technical standards and the asymmetry of connection capabilities. After showing the application potential of CTC, we survey the existing CTC works and classify them into two main categories, packet-level CTC and physical-level CTC. To have a deep understanding of these works, we analyze those CTC techniques in terms of throughput, reliability, hardware modification, and concurrency. We also investigate the works for the construction of upper layers in the CTC network and explore three future trends of CTC: cross-network, cross-frequency, and cross-media. Enabling genuinely ubiquitous network connectivity, ubiquitous sensing, and pervasive computing, the CTC technique is deemed an essential component in the infrastructure of future IoT.

References

[1]
Diana Zhang, Jingxian Wang, Junsu Jang, Junbo Zhang, and Swarun Kumar. 2019. On the feasibility of WiFi based material sensing. In Proceedings of ACM MobiCom.
[2]
Hua Huang and Shan Lin. 2020. MET: A magneto-inductive sensing based electric toothbrushing monitoring system. In Proceedings of ACM MobiCom.
[3]
Zhenlin An, Qiongzheng Lin, Ping Li, and Lei Yang. 2020. General-purpose deep tracking platform across protocols for the Internet of Things. In Proceedings of ACM MobiSys.
[4]
Yonghang Jiang, Zhenjiang Li, and Jianping Wang. 2019. PTrack: Enhancing the applicability of pedestrian tracking with wearables. IEEE/ACM Transactions on Mobile Computing 18, 2 (2019), 431–443.
[5]
Yili Ren, Sheng Tan, Linghan Zhang, Zi Wang, Zhi Wang, and Jie Yang. 2020. Liquid level sensing using commodity WiFi in a smart home environment. In Proceedings of ACM UbiComp.
[6]
Ding Yi, Ling Liu, Yu Yang, Yunhuai Liu, Tian He, and Desheng Zhang. 2021. From conception to retirement: A lifetime story of a 3-year-old operational wireless beacon system in the wild. In Proceedings of USENIX NSDI.
[7]
Yuan He, Junchen Guo, Long Liu, Haozhen Liu, Xinpeng Zhang, Qilong Zhao, Xiaolong Zheng, Meng Jin, Ting Wang, Chunya Liu, Yao Luo, Songzhen Yang, Chengkun Jiang, Xiuzhen Guo, and Zihao Yu. 2018. IoT for the power industry: Recent advances and future directions with pavatar. In Proceedings of ACM SenSys.
[8]
Sanjib Sur, Loannis Pefkianakis, Xinyu Zhang, and Kyu Han Kim. 2017. WiFi-assisted 60 GHz wireless networks. In Proceedings of ACM MobiCom.
[9]
Hanbin Zhang, Gabriel Guo, Chen Song, Chenhan Xu, Kevin Cheung, Jasleen Alexis, Huining Li, Dongmei Li, Kun Wang, and Wenyao Xu. 2020. PDLens: Smartphone knows drug effectiveness among Parkinson’s via daily-life activity fusion. In Proceedings of ACM MobiCom.
[10]
Fawad Ahmad, Hang Qiu, Ray Eells, Fan Bai, and Ramesh Govindan. 2020. CarMap: Fast 3D feature map updates for automobiles. In Proceedings of USENIX NSDI.
[11]
Lili Chen, Jie Xiong, Xiaojiang Chen, Sunghoon Ivan Lee, Kai Chen, and Zheng Wang. 2019. WideSee: Towards wide-area contactless wireless sensing. In Proceedings of ACM SenSys.
[12]
Fusang Zhang, Zhaoxin Chang, Kai Niu, Jie Xiong, Beihong Jin, Qin Lv, and Daqing Zhang. 2020. Exploring LoRa for long-range through-wall sensing. In Proceedings of ACM UbiComp.
[13]
Yinggang Yu, Dong Wang, Run Zhao, and Qian Zhang. 2019. RFID based real-time recognition of ongoing gesture with adversarial learning. In Proceedings of ACM SenSys.
[14]
Meng Jin, Yuan He, Xiaolong Zheng, Dingyi Fang, Dan Xu, Tianzhang Xing, and Xiaojiang Chen. 2016. Smogy-link: Fingerprinting interference for predictable wireless concurrency. In Proceedings of IEEE ICNP.
[15]
Haotian Jiang, Jiacheng Zhang, Xiuzhen Guo, and Yuan He. 2021. Sense me on the ride: Accurate mobile sensing over a LoRa backscatter channel. In Proceedings of ACM SenSys.
[16]
Yongtae Park, Jihun Ha, Hyogon Kim, and JeongGil Ko. 2017. Enabling sensor network to smartphone interaction using software radios. ACM Transactions on Sensor Networks 13, 2 (2017), 1–26.
[17]
Fusang Zhang, Zhaoxin Chang, Kai Niu, Jie Xiong, Beihong Jin, Qin Lv, and Daqing Zhang. 2013. RFID based real-time recognition of ongoing gesture with adversarial learning. In Proceedings of ACM SenSys.
[18]
Nabi Majid, Geilen Marc, Basten Twan, and Blagojevic Milos. 2014. Efficient cluster mobility support for TDMA-based MAC protocols in wireless sensor networks. ACM Transactions on Sensor Networks 10, 4 (2014), 1–32.
[19]
Sailesh Bharati, Omar Hassan Aboubakr, and Weihua Zhuang. 2017. Enhancing transmission collision detection for distributed TDMA in vehicular networks. ACM Transactions on Multimedia Computing, Communications, and Applications 13, 37 (2017), 1–21.
[20]
Nikumani Choudhury, Rakesh Matam, Mithun Mukherjee, and Lei Shu. 2017. Adaptive duty cycling in IEEE 802.15.4 cluster tree networks using MAC parameters. In Proceedings of ACM MobiHoc.
[21]
Luis Sanabria-Russo, Barcelo Jaume, Bellalta Boris, and Gringoli Francesco. 2017. A high efficiency MAC protocol for WLANs: Providing fairness in dense scenarios. IEEE/ACM Transactions on Networking 25, 1 (2017), 492–505.
[22]
Zhijun Li and Tian He. 2017. WEBee: Physical-layer cross-technology communication via emulation. In Proceedings of ACM MobiCom.
[23]
Hsun-Wei Cho and Kang G. Shin. 2021. BlueFi: Bluetooth over WiFi. In Proceedings of ACM SIGCOMM.
[24]
Ruofeng Liu, Zhimeng Yin, Wenchao Jiang, and Tian He. 2021. WiBeacon: Expanding BLE location-based services via WiFi. In Proceedings of ACM MobiCom.
[25]
Xiuzhen Guo, Xiaolong Zheng, and Yuan He. 2017. WiZig: Cross-technology energy communication over a noisy channel. In Proceedings of IEEE INFOCOM.
[26]
Iqbal Hassan, Hamad Alizai Muhammad, Ayyub Qazi Ihsan, Olaf Landsiedel, and Afzal Uzmi Zartash. 2018. Scylla: Interleaving multiple IoT stacks on a single radio. In Proceedings of ACM CoNEXT.
[27]
Hofmann Rainer, Alberto Boano Carlo, and Romer Kay. 2019. X-burst: Enabling multi-platform cross-technology communication between constrained IoT devices. In Proceedings of IEEE SECON.
[28]
Lingang Li, Yongrui Chen, and Zhijun Li. 2019. Physical-layer cross-technology communication with narrow-band decoding. In Proceedings of IEEE ICNP.
[29]
Shuai Wang, Woojae Jeong, Jinhwan Jung, and Song Min Kim. 2020. X-MIMO: Cross-technology multi-user MIMO. In Proceedings of ACM SenSys.
[30]
Xianjin Xia, Shining Li, Yu Zhang, Lin Li, Mingfei Wei, and Wei Qin. 2016. ToneSense: Communication across technologies through power-channel. In Proceedings of ACM MobiCom.
[31]
Dan Xia, Xiaolong Zheng, Fu Yu, Liang Liu, and Huadong Ma. 2022. WiRa: Enabling cross-technology communication from WiFi to LoRa with IEEE 802.11ax. In Proceedings of IEEE INFOCOM.
[32]
Junmei Yao, Xiaolong Zheng, Jun Xu, and Kaishun Wu. 2020. Cross-technology communication through symbol-level energy modulation for commercial wireless networks. In Proceedings of IEEE PerCom.
[33]
Jia Zhang, Xiuzhen Guo, Haotian Jiang, Xiaolong Zheng, and Yuan He. 2022. Link quality estimation of cross-technology communication: The case with physical-level emulation. ACM Transactions on Sensor Networks 18, 1 (2022), 1550–4859.
[34]
Zihao Yu, Pengyu Li, Carlo Alber Boano, Yuan He, Meng Jin, Xiuzhen Guo, and Xiaolong Zheng. 2021. BiCord: Bidirectional coordination among coexisting wireless devices. In Proceedings of IEEE ICDCS.
[35]
Zihao Yu, Xin Na, Carlo Alberto Boano, Yuan He, Xiuzhen Guo, and Meng Jin. 2022. SmarTiSCH: An interference-aware engine for IEEE 802.15.4e-based networks. In Proceedings of ACM IPSN.
[36]
Ying Chen, Ming Li, Pengpeng Chen, and Shixiong Xia. 2019. Survey of cross-technology communication for IoT heterogeneous devices. The Institution of Engineering and Technology 13, 12 (2019), 1709–1720.
[37]
Jun Huang, Guoliang Xing, Gang Zhou, and Ruogu Zhou. 2010. Beyond co-existence: Exploiting WiFi white space for ZigBee performance assurance. In Proceedings of IEEE ICNP.
[38]
IEEE Computer Society. 2005. IEEE standard 802.15.1.
[39]
Stefan Geirhofer, Lang Tong, and Brian M. Sadler. 2008. Cognitive medium access: Constraining interference based on experimental models. IEEE Journal on Selected Areas in Communications 26, 1 (2008), 95–105.
[40]
Stefan Geirhofer, Lang Tong, and Brian M. Sadler. 2006. Dynamic spectrum access in WLAN channels: Empirical model and its stochastic analysis. In Proceedings of the First International Workshop on Technology and Policy for Accessing Spectrum. ACM.
[41]
Mo Sha, Gregory Hackmann, and Chenyang Lu. 2011. ARCH: Practical channel hopping for reliable home-area sensor networks. In Proceedings of IEEE RTAS.
[42]
Chengshang Chang, Wanjiun Liao, and Tsungying Wu. 2016. Tight lower bounds for channel hopping schemes in cognitive radio networks. IEEE/ACM Transactions on Networking 24, 4 (2016), 2343–2356.
[43]
Ramanujan Sheshadri, Karthikeyan Sundaresan, Eugene Chai, Amir Khojastepour, Sampath Rangarajan, and Dimitrios Koutsonikolas. 2017. BLU: Blue-printing interference for robust LTE access in unlicensed spectrum. In Proceedings of ACM CONEXT.
[44]
Yubo Yan, Panlong Yang, Xiangyang Li, Yue Tao, Lan Zhang, and Lizhao You. 2013. ZIMO: Building cross-technology MIMO to harmonize ZigBee smog with WiFi flash without intervention. In Proceedings of ACM MobiCom.
[45]
Michael Konig and Roger P. Wattenhofer. 2016. Effectively capturing attention using the capture effect. In Proceedings of ACM SenSys.
[46]
Meng Jin, Yuan He, Chengkun Jiang, and Yunhao Liu. 2020. Effectively capturing attention using the capture effect. In Proceedings of ACM IPSN.
[47]
Kyle Jamieson and Hari Balakrishnan. 2007. PPR: Partial packet recovery for wireless networks. In ACM SIGCOMM Computer Communication Review.
[48]
Jan-Hinrich Hauer, Andreas Willig, and Adam Wolisz. 2010. Mitigating the effects of RF interference through RSSI-based error recovery. In Proceedings of ACM EWSN.
[49]
Chieh-Jan Mike Liang, Nissanka Bodhi Priyantha, Jie Liu, and Andreas Terzis. 2010. Surviving Wi-Fi interference in low power ZigBee networks. In Proceedings of ACM SenSys.
[50]
Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Médard, and Jon Crowcroft. 2006. XORs in the air: Practical wireless network coding. In ACM SIGCOMM Computer Communication Review.
[51]
Sachin Katti, Shyamnath Gollakota, and Dina Katabi. 2007. Embracing wireless interference: Analog network coding. ACM SIGCOMM Computer Communication Review (2007).
[52]
Aditya Gudipati and Sachin Katti. 2011. Strider: Automatic rate adaptation and collision handling. In ACM SIGCOMM Computer Communication Review.
[53]
Aditya Gudipati, Stephanie Pereira, and Sachin Katti. 2012. AutoMAC: Rateless wireless concurrent medium access. In Proceedings of ACM MobiCom.
[54]
Zachariah Thomas, Klugman Noah, Campbell Bradford, Adkins Joshua, Jackson Neal, and Dutta Prabal. 2015. The Internet of Things has a gateway problem. In Proceedings of ACM HotMobile.
[55]
Gedela Vamsy Vivek and M. P. Sunil. 2015. Enabling IoT services using WiFi - ZigBee gateway for a home automation system. (2015).
[56]
Olga Galinina, Konstantin Mikhaylov, Sergey Andreev, Andrey Turlikov, and Yevgeni Koucheryavy. 2015. Smart home gateway system over Bluetooth low energy with wireless energy transfer capability. EURASIP Journal on Wireless Communications & Networking 37, 1 (2015), 178.
[57]
Jae Sung Shim, Hyung Joon Kim, Nam Uk Lee, and Seok Cheon Park. 2018. Design of ZigBee-BLE gateway direct communication system for smart home environment. Advances in Computer Science and Ubiquitous Computing 474, 1 (2018), 1428–1433.
[58]
Song Min Kim, Shigemi Ishida, Shuai Wang, and Tian He. 2017. Free side-channel cross-technology communication in wireless networks. IEEE/ACM Transactions on Networking 25, 5 (2017), 2974–1987.
[59]
Gonglong Chen and Wei Dong. 2021. Reactive jamming and attack mitigation over cross-technology communication links. IEEE/ACM Transactions on Sensor Networks 17, 1 (2021), 1–25.
[60]
Yongrui Chen, Shuai Wang, Zhijun Li, and Tian He. 2020. Reliable physical-layer cross-technology communication with emulation error correction. IEEE/ACM Transactions on Networking 28, 2 (2020), 612–624.
[61]
Wenchao Jiang, Zhimeng Yin, Ruofeng Liu, Zhijun Li, Song Min Kim, and Tian He. 2019. Boosting the bitrate of cross-technology communication on commodity IoT devices. IEEE/ACM Transactions on Networking 27, 3 (2019), 1069–1083.
[62]
Zhimeng Yin, Zhijun Li, Song Min Kim, and Tian He. 2018. Explicit channel coordination via cross-technology communication. In Proceedings of ACM MobiSys.
[63]
Jinsong Han, Han Ding, Chen Qian, Wei Xi, Zhi Wang, Zhiping Jiang, Longfei Shangguan, and Jizhong Zhao. 2016. CBID: A customer behavior identification system using passive tags. IEEE/ACM Transactions on Networking 24, 5 (2016), 2885–2898.
[64]
Zicheng Chi, Zhichuan Huang, Yao Yao, Tiantian Xie, Hongyu Sun, and Ting Zhu. 2017. EMF: Embedding multiple flows of information in existing traffic for concurrent communication among heterogeneous IoT devices. In Proceedings of IEEE INFOCOM.
[65]
Yonghang Jiang, Zhenjiang Li, and Jianping Wang. 2017. PTrack: Enhancing the applicability of pedestrian tracking with wearables. In Proceedings of IEEE ICDCS.
[66]
Yoon Chae, Shuai Wang, and Song Min Kim. 2018. Exploiting WiFi guard band for safeguarded ZigBee. In Proceedings of the ACM Sensys. 13.
[67]
Wei Wang, Tiantian Xie, Xin Liu, and Ting Zhu. 2018. ECT: Exploiting cross-technology concurrent transmission for reducing packet delivery delay in IoT networks. In Proceedings of IEEE INFOCOM.
[68]
Zicheng Chi, Yan Li, Zhichuan Huang, Hongyu Sun, and Ting Zhu. 2019. Simultaneous bi-directional communications and data forwarding using a single ZigBee data stream. In Proceedings of IEEE INFOCOM.
[69]
Yan Li, Zicheng Chi, Xin Liu, and Ting Zhu. 2018. Passive-ZigBee: Enabling ZigBee communication in IoT networks with 1000x+ less power consumption. In Proceedings of ACM Sensys.
[70]
Zihao Yu, Chengkun Jiang, Yuan He, Xiaolong Zheng, and Xiuzhen Guo. 2018. Crocs: Cross-technology clock synchronization for WiFi and ZigBee. In Proceedings of ACM EWSN.
[71]
Xin Na, Xiuzhen Guo, and Yuan He. 2021. Wi-attack: Cross-technology impersonation attack against iBeacon services. In Proceedings of IEEE SECON.
[72]
Gonglong Chen and Wei Dong. 2018. JamCloak: Reactive jamming attack over cross-technology communication links. In Proceedings of IEEE ICNP.
[73]
Shengrong Yin, Qiang Li, and Omprakash Gnawali. 2015. Interconnecting WiFi devices with IEEE 802.15.4 devices without using a gateway. In Proceedings of DCOSS.
[74]
Xiuzhen Guo, Xiaolong Zheng, and Yuan He. 2020. WiZig: Crosstechnology energy communication over a noisy channel. IEEE/ACM Transactions on Networking 28, 6 (2020), 1063–6692.
[75]
Xiaolong Zheng, Yuan He, and Xiuzhen Guo. 2018. StripComm: Interference-resilient cross-technology communication in coexisting environments. In Proceedings of IEEE INFOCOM.
[76]
Kameswari Chebrolu and Ashutosh Dhekne. 2009. Esense: Communication through energy sensing. In Proceedings of ACM MobiCom.
[77]
Yifan Zhang and Qun Li. 2013. HoWiES: A holistic approach to ZigBee assisted WiFi energy savings in mobile devices. In Proceedings of IEEE INFOCOM.
[78]
Song Min Kim and Tian He. 2015. FreeBee: Cross-technology communication via free side-channel. In Proceedings of ACM MobiCom.
[79]
Wenchao Jiang, Zhimeng Yin, Kim Song Min, and Tian He. 2017. Transparent cross-technology communication over data traffic. In Proceedings of IEEE INFOCOM.
[80]
Xinyu Zhang and Kang G. Shin. 2013. Gap sense: Lightweight coordination of heterogeneous wireless devices. In Proceedings of IEEE INFOCOM.
[81]
Zhimeng Yin, Wenchao Jiang, Song Min Kim, and Tian He. 2017. C-Morse: Cross-technology communication with transparent Morse coding. In Proceedings of IEEE INFOCOM.
[82]
Junyang Shi, Di Mu, and Mo Sha. 2019. LoRaBee: Cross-technology communication from LoRa to ZigBee via payload encoding. In Proceedings of IEEE ICNP.
[83]
Zicheng Chi, Yan Li, Hongyu Sun, Yao Yao, Zheng Lu, and Ting Zhu. 2016. B2W2: N-way concurrent communication for IoT devices. In Proceedings of the ACM Sensys.
[84]
Xiuzhen Guo, Yuan He, Xiaolong Zheng, Liangcheng Yu, and Gnawali Omprakash. 2018. ZigFi: Harnessing channel state information for cross-technology communication. In Proceedings of IEEE INFOCOM.
[85]
Xiuzhen Guo, Yuan He, Xiaolong Zheng, Liangcheng Yu, and Gnawali Omprakash. 2020. ZigFi: Harnessing channel state information for cross-technology communication. IEEE/ACM Transactions on Networking 28, 1 (2020), 1063–6692.
[86]
Weiguo Wang, Xiaolong Zheng, Yuan He, and Xiuzhen Guo. 2019. AdaComm: Tracing channel dynamics for reliable cross-technology communication. In Proceedings of IEEE SECON.
[87]
Dan Xia, Xiaolong Zheng, Liang Liu, Chaoyu Wang, and Huadong Ma. 2020. c-Chirp: Towards symmetric cross-technology communication over asymmetric channels. In Proceedings of IEEE SECON.
[88]
Dan Xia, Xiaolong Zheng, Liang Liu, Chaoyu Wang, and Huadong Ma. 2021. c-Chirp: Towards symmetric cross-technology communication over asymmetric channels. IEEE/ACM Transactions on Networking 29, 3 (2021), 1169–1182.
[89]
Wei Wang, Shiyue He, Liang Sun, Tao Jiang, and Qian Zhang. 2018. Cross-technology communications for heterogeneous IoT devices through artificial doppler shifts. IEEE Transactions on Wireless Communications 18, 2 (2018), 796–806.
[90]
Zicheng Chi, Yan Li, Yao Yao, and Ting Zhu. 2017. PMC: Parallel multi-protocol communication to heterogeneous IoT radios within a single WiFi channel. In Proceedings of IEEE ICNP.
[91]
Ruofeng Liu, Zhimeng Yin, Wenchao Jiang, and Tian He. 2019. LTE2B: Time-domain cross-technology emulation under LTE constraints. In Proceedings of ACM Sensys.
[92]
Xiuzhen Guo, Yuan He, Jia Zhang, and Haotian Jiang. 2019. WIDE: Physical-level CTC via digital emulation. In Proceedings of ACM/IEEE IPSN.
[93]
Xiuzhen Guo, Yuan He, Jia Zhang, and Haotian Jiang. 2021. WIDE: Physical-level CTC via digital emulation. IEEE/ACM Transactions on Networking 29, 4 (2021), 1567–1579.
[94]
Zhijun Li, Wencha Jiang, and Tian He. 2017. BlueBee: Physical-layer cross-technology communication via emulation. In Proceedings of ACM Sensys.
[95]
Wenchao Jiang, Song Min Kim, Zhijun Li, and Tian He. 2018. Achieving receiver-side cross-technology communication with cross-decoding. In Proceedings of ACM MobiCom.
[96]
Xiuzhen Guo, Yuan He, Xiaolong Zheng, Zihao Yu, and Yunhao Liu. 2019. LEGO-Fi: Transmitter-transparent CTC with cross-demapping. In Proceedings of IEEE INFOCOM.
[97]
Xiuzhen Guo, Yuan He, Xiaolong Zheng, Zihao Yu, and Yunhao Liu. 2021. LEGOFi: Transmitter-transparent CTC with cross-demapping. IEEE Internet of Things Journal 8, 8 (2021), 6665–6676.
[98]
Ruofeng Liu, Zhimeng Yin, Wenchao Jiang, and Tian He. 2020. XFi: Cross-technology IoT data collection via commodity WiFi. In Proceedings of IEEE ICNP.
[99]
Yongrui Chen, Zhijun Li, and Tian He. 2018. TwinBee: Reliable physical-layer cross-technology communication with symbol-level coding. In Proceedings of IEEE INFOCOM.
[100]
Zhijun Li and Tian He. 2018. LongBee: Enabling long-range cross-technology communication. In Proceedings of IEEE INFOCOM.
[101]
Shuai Wang, Song Min Kim, and Tian He. 2018. Symbol-level cross-technology communication via payload encoding. In Proceedings of IEEE ICDCS.
[102]
Yan Li, Zicheng Chi, Xin Liu, and Ting Zhu. 2018. Chiron: Concurrent high throughput communication for IoT devices. In Proceedings of ACM Mobisys.
[103]
Zicheng Chi, Yan Li, Xin Liu, Yao Yao, Yanchao Zhang, and Ting Zhu. 2019. Parallel inclusive communication for connecting heterogeneous IoT devices at the edge. In Proceedings of ACM Sensys.
[104]
Zhijun Li and Yongrui Chen. 2019. Achieving universal low-power wide-area networks on existing wireless devices. In Proceedings of IEEE ICNP.
[105]
Daniele Croce, Natale Galioto, Domenico Garlisi, Fabrizio Giuliano, and Ilenia Tinnirello. 2017. An inter-technology communication scheme for WiFi/ZigBee coexisting networks. In Proceedings of ACM EWSN.
[106]
Zhimeng Yin, Zhijun Li, Song Min Kim, and Tian He. 2018. Explicit channel coordination via cross-technology communication. In Proceedings of ACM Mobisys.
[107]
Shuai Wang, Zhimeng Yin, Zhijun Li, and Tian He. 2018. Networking support for physical-layer cross-technology communication. In Proceedings of IEEE ICNP.
[108]
Wei Wang, Xin Liu, Yao Yao, Yan Pan, Zicheng Chi, and Ting Zhu. 2019. CRF: Coexistent routing and flooding using WiFi packets in heterogeneous IoT networks. In Proceedings of IEEE INFOCOM.
[109]
Jia Zhang, Xiuzhen Guo, Haotian Jiang, Xiaolong Zheng, and Yuan He. 2020. Link quality estimation of cross-technology communication. In Proceedings of IEEE INFOCOM.
[110]
Xiuzhen Guo, Longfei Shangguan, Yuan He, Jia Zhang, Haotian Jiang, Awais Ahmad Siddiqi, and Yunhao Liu. 2020. Aloba: Rethinking ON-OFF keying modulation for ambient LoRa backscatter. In Proceedings of ACM SenSys.
[111]
Xiuzhen Guo, Longfei Shangguan, Yuan He, Jia Zhang, Haotian Jiang, Awais Ahmad Siddiqi, and Yunhao Liu. 2017. Efficient ambient LoRa backscatter with On-Off keying modulation. IEEE/ACM Transactions on Networking 1, 1 (2017), 1–26.
[112]
Xiuzhen Guo, Longfei Shangguan, Yuan He, Nan Jing, Jiacheng Zhang, Haotian Jiang, and Yunhao Liu. 2022. Saiyan: Design and implementation of a low-power demodulator for LoRa backscatter systems. In Proceedings of USENIX NSDI.
[113]
Ali Abedi, Farzan Dehbashi, Mohammad Hossein Mazaheri, Omid Abari, and Tim Brecht. 2020. WiTAG: Seamless WiFi backscatter communication. In Proceedings of ACM SIGCOMM.
[114]
Jung Jinhwan, Ryoo Jihoon, Yi Yung, and Song Min Kim. 2020. Gateway over the air: Towards pervasive internet connectivity for commodity IoT. In Proceedings of ACM Mobisys.
[115]
Vikram Iyer, Vamsi Talla, Bryce Kellogg, Shyamnath Gollakota, and Joshua R. Smith. 2016. Inter-technology backscatter: Towards internet connectivity for implanted devices. In Proceedings of ACM SIGCOMM.
[116]
Zhenlin An, Qiongzheng Lin, and Lei Yang. 2018. Cross-frequency communication: Near-field identification of UHF RFIDs with WiFi!. In Proceedings of ACM MobiCom.
[117]
Allane Dahmane, Gianfranco Andia Vera, Yvan Duroc, Rachida Touhami, and Smail Tedjini. 2016. Harmonic power harvesting system for passive RFID sensor tags. IEEE Transactions on Microwave Theory and Techniques 64, 7 (2016), 2347–2356.
[118]
Francesco Tonolini and Fadel Adib. 2018. Networking across boundaries: Enabling wireless communication through the water-air interface. In Proceedings of ACM SIGCOMM.
[119]
Charles J. Carver, Tian Zhao, Hongyong Zhang, Kofi M. Odame, Alberto Quattrini Li, and Xia Zhou. 2020. AmphiLight: Direct air-water communication with laser light. In Proceedings of USENIX NSDI.

Cited By

View all
  • (2024)Wireless Cross-Technology Communication in the Internet of Things2024 47th International Conference on Telecommunications and Signal Processing (TSP)10.1109/TSP63128.2024.10605972(139-142)Online publication date: 10-Jul-2024
  • (2024)Empowering Heterogeneous Wireless Networks through Efficient Signal IdentificationIEEE Wireless Communications10.1109/MWC.013.220049931:3(242-248)Online publication date: Jun-2024
  • (2024)Enabling Reliable and Commodity-Device Compatible PHY-CTC From WiFi to ZigBee via Chip Emulation in PhaseIEEE Sensors Journal10.1109/JSEN.2024.338520524:11(18444-18456)Online publication date: 1-Jun-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 55, Issue 5
May 2023
810 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/3567470
Issue’s Table of Contents
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 December 2022
Online AM: 19 April 2022
Accepted: 14 March 2022
Revised: 14 January 2022
Received: 15 May 2021
Published in CSUR Volume 55, Issue 5

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Wireless communication
  2. heterogeneous coexistence
  3. Cross-Technology Communication
  4. research survey

Qualifiers

  • Survey
  • Refereed

Funding Sources

  • Joint Funds of the National Natural Science Foundation of China
  • National Science Fund of China
  • China Postdoctoral Science Foundation
  • R&D Project of Key Core Technology and Generic Technology in Shanxi Province

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2,668
  • Downloads (Last 6 weeks)167
Reflects downloads up to 02 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Wireless Cross-Technology Communication in the Internet of Things2024 47th International Conference on Telecommunications and Signal Processing (TSP)10.1109/TSP63128.2024.10605972(139-142)Online publication date: 10-Jul-2024
  • (2024)Empowering Heterogeneous Wireless Networks through Efficient Signal IdentificationIEEE Wireless Communications10.1109/MWC.013.220049931:3(242-248)Online publication date: Jun-2024
  • (2024)Enabling Reliable and Commodity-Device Compatible PHY-CTC From WiFi to ZigBee via Chip Emulation in PhaseIEEE Sensors Journal10.1109/JSEN.2024.338520524:11(18444-18456)Online publication date: 1-Jun-2024
  • (2024)High-Availability in IoT Applications through Dual Connectivity: Integrating LoRaWAN and NB-IoT2024 20th International Conference on the Design of Reliable Communication Networks (DRCN)10.1109/DRCN60692.2024.10539139(151-158)Online publication date: 6-May-2024
  • (2024)Efficient feature extraction of radio-frequency fingerprint using continuous wavelet transformWireless Networks10.1007/s11276-024-03817-yOnline publication date: 18-Jul-2024
  • (2024)Construction and Application of Historical Literature Database Based on Internet of Things TechnologyProceedings of the 3rd International Conference on Cognitive Based Information Processing and Applications–Volume 110.1007/978-981-97-1975-4_26(281-292)Online publication date: 2-Jun-2024
  • (2023)Federated Learning Based on CTC for Heterogeneous Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2023.330518910:24(22673-22685)Online publication date: 15-Dec-2023
  • (2023)LCDMA: Lightweight Cross-Domain Mutual Identity Authentication Scheme for Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2023.325205110:14(12590-12602)Online publication date: 15-Jul-2023
  • (2023)Parallel Cross-technology Transmission from IEEE 802.11ax to Heterogeneous IoT DevicesIEEE INFOCOM 2023 - IEEE Conference on Computer Communications10.1109/INFOCOM53939.2023.10229073(1-10)Online publication date: 17-May-2023
  • (2023)LigBee: Symbol-Level Cross-Technology Communication from LoRa to ZigBeeIEEE INFOCOM 2023 - IEEE Conference on Computer Communications10.1109/INFOCOM53939.2023.10229005(1-10)Online publication date: 17-May-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media