Intelligent Security Management and Control in the IoT. Mohamed-Aymen Chalouf. Читать онлайн. Newlib. NEWLIB.NET

Автор: Mohamed-Aymen Chalouf
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Зарубежная компьютерная литература
Год издания: 0
isbn: 9781394156023
Скачать книгу

      Shah, M.A., Zhang, S., Maple, C. (2013). Cognitive radio networks for Internet of Things: Applications, challenges and future. In 19th International Conference on Automation & Computing. IEEE, London.

      Shaikh, F.K., Zeadally, S., Exposito, E. (2017). Enabling technologies for green Internet of Things. IEEE Systems Journal, 11(2), 983–994.

      Shrestha, R., Bajracharya, R., Nam, S.Y. (2018). Challenges of future VANET and cloud-based approaches. Wireless Communications and Mobile Computing. doi:10.1155/2018/5603518.

      Singh, K.D., Rawat, P., Bonnin, J. (2014). Cognitive radio for vehicular ad hoc networks (CR-VANETs): Approaches and challenges. Journal on Wireless Communications and Networking, 49(2014). doi:10.1186/1687-1499-2014-49.

      Song, Y. and Xie, J. (2012). ProSpect: A proactive spectrum handoff framework for cognitive radio ad hoc networks without common control channel. IEEE Transactions on Mobile Computing, 11(7), 1127–1139.

      Tarek, A., Benslimane, M., Darwish, M. (2020). Survey on spectrum sharing/allocation for cognitive radio networks Internet of Things. Egyptian Informatics Journal. doi:10.1016/j.eij.2020.02.003.

      Vlacheas, P., Giaffreda, R., Stavroulaki, V., Kelaidonis, D., Foteinos, V., Poulios, G., Demestichas, P., Somov, A., Biswas, A.R., Moessner, K. (2013). Enabling smart cities through a cognitive management framework for the Internet of Things. IEEE Communications Magazine, 51(6), 102–111.

      Wang, L.-C. and Wang, C.-W. (2008). Spectrum handoff for cognitive radio networks: Reactive-sensing or proactive-sensing? In Proceedings of IEEE International in Performance, Computing and Communications Conference (IPCCC 2008), Austin, TX, 343–348. 10.1109/PCCC.2008.4745128.

      Wang, Y.-H., Huang, G.-R., Tung, Y.-C. (2014). A handover prediction mechanism based on LTE-A UE history information. In International Conference on Computer, Information and Telecommunication Systems (CITS). IEEE, Jeju.

      Wu, Q., Ding, G., Xu, Y., Feng, S., Du, Z., Wang, J., Long, K. (2014a). Cognitive Internet of Things: A new paradigm beyond connection. IEEE Internet of Things Journal, 1(2), 129–143. doi:10.1109/JIOT.2014.2311513.

      Wu, Y., Hu, F., Kumar, S., Zhu, Y., Talari, A., Rahnavard, N., Matyjas, J.D. (2014b). A learning-based QoE-driven spectrum handoff scheme for multimedia transmissions over cognitive radio networks. IEEE Journal on Selected Areas in Communications, 32(11), 2134–2148.

      Xenakis, D., Passas, N., Di Gregorio, L., Verikoukis, C. (2011). A context aware vertical handover framework towards energy-efficiency. In Proceedings of the IEEE Vehicular Technology Conference (VTC).

      Xiao, K. and Li, C. (2018). Vertical handoff decision algorithm for heterogeneous wireless networks based on entropy and improved TOPSIS. In 2018 IEEE 18th International Conference on Communication Technology (ICCT). IEEE, Chongqing.

      Xu, L.D., He, W., Li, S. (2014). Internet of Things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.

      Zekri, M., Jouaber, B., Zeghlache, D. (2012). A review on mobility management and vertical handover solutions over heterogeneous wireless networks. Computer Communications, 35, 2055–2068.

      Zhu, C., Leung, V.C., Shu, L., Ngai, E.C.H. (2015). Green IoT for smart world. Special Section on Challenges for Smart Worlds. doi:10.1109/ACCESS.2015.2497312.

      Zou, L., Javed, A., Muntean, G. (2017). Smart mobile device power consumption measurement for video streaming in wireless environments: WiFi vs. LTE. In 2017 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB). IEEE, Cagliari.

      Using Reinforcement Learning to Manage Massive Access in NB-IoT Networks

       Yassine HADJADJ-AOUL and Soraya AIT-CHELLOUCHE

       Inria, CNRS, IRISA, University of Rennes 1, France

      Communications between objects in the Internet of Things (IoT) and particularly machine-to-machine (M2M) communications are considered as one of the most important evolutions of the Internet. Supporting these devices is, however, one of the most significant challenges that network operators need to overcome (Lin et al. 2016). In fact, the considerable number of these devices that might attempt to access a network at the same time could lead to heavy congestion, or even a total saturation, with all the consequences this might cause. In fact, as can be seen in Figure 2.1, a very limited number of devices trying simultaneously to access the network can reduce the network’s performance to zero, independently of the access opportunities available (Bouzouita et al. 2016). In these circumstances, it seems clear that effective access control mechanisms are needed to maintain a reasonable number of access attempts.

Graph depicts the impact on performance of the number of IoT devices simultaneously attempting access.

      Figure 2.1. Impact on performance of the number of IoT devices simultaneously attempting access

      The idea introduced in this chapter is quite simple, because it involves calculating a blocking factor. Nevertheless, a good implementation would require a good knowledge of the number of terminals ready to attempt access, so as to deduce from this the probability of the optimal blocking. This information is unfortunately not available in the network.

      To solve this problem, two significant challenges should be taken into account: (1) designing an access control strategy for dynamic generation of the blocking factor and (2) estimating the number of devices simultaneously attempting to access the network.

      In this chapter, we tackle these questions using an estimator that was suggested in earlier research (Bouzouita et al. 2019). Since this estimation is very noisy, we exploit the potential of the most advanced reinforcement learning techniques, to take account of this complex reality (the state of the network is not observable) and deduce a sub-optimal control strategy. More especially in this chapter, we use the deep reinforcement learning algorithm Twin Delayed Deep Deterministic policy gradient algorithm (TD3) (Fujimoto et al. 2018) to produce the optimal blocking factor from these past estimations (Hadjadj-Aoul and Ait-Chellouche 2020).