0% Complete
صفحه اصلی
/
سی و دومین کنفرانس بین المللی مهندسی برق
Learning-Based Routing Policy For Wireless Sensor Networks
نویسندگان :
Najim Halloum
1
Yousef Darmani
2
Ali Ahmadi
3
1- دانشگاه صنعتی خواجه نصیرالدین طوسی
2- دانشگاه صنعتی خواجه نصیرالدین طوسی
3- دانشگاه صنعتی خواجه نصیرالدین طوسی
کلمات کلیدی :
IoT،Reinforcement Learning،WSN،Q-Learning،Routing،Reliability،RPL،Load-balancing،Objective Function
چکیده :
The pervasive Internet of Things (IoT) technology applications take the quality of the service provided to another level. Wireless Sensor Network (WSN) is the sensing layer in IoT-based systems that collects data and sends it to a central component. On the other hand, IoT-WNSs have special characteristics in terms of lossy environment and resource-constrained devices. However, the next generation of the Internet of Things networks is expected to be large-scale networks with large amounts of data being transferred. In such IoT networks, the main issues come from the need for an efficient routing protocol that can provide an efficient forwarding mechanism in congestion-based scenarios. Here, the routing protocol for low-power and Lossy networks (RPL) is a standardized routing protocol for IoT-WSNs. With such conditions, RPL could suffer from reliability decreasing, control overhead and latency increasing. Reinforcement learning provides a methodology by which a system can improve its behavior to select upcoming actions efficiently by learning from previous interactions with the environment. In this study, a Reinforcement Learning-based load balancing-aware routing scheme will be proposed to build a reliable path for IoT-WSNs. To do so, a multi-metric reward function based on the Received Signal Strength Indicator and Buffer utilization metrics is designed to form the essential part of the next forwarder selection process using the Q-Learning algorithm. According to an evaluation using the Contiki OS / Cooja simulator in terms of control overhead, network latency, and packet delivery ratio, the proposed approach has demonstrated its efficiency against the counterparts.
لیست مقالات
لیست مقالات بایگانی شده
Defense Against Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks Using Machine Learning
Nazanin Parhizgar - Ali Jamshidi - Peyman Setoodeh
بررسی نامتعادلی در مبدل DC به DC تمامپل شیفت فاز با یکسوکنندهی دوبرابرکنندهی جریان
رضا نرئی - یاسر کریمی - محمدهادی زارع
Bilabial Consonants Recognition in CV Persian Syllable Based on Computer Vision
Melika Khajeh - Azam Bastanfard - Dariush Amirkhani
A New Method on Failure Detection of Fixed and Moving Contacts of Circuit Breakers
Hassan Hamidi - Ali Asghar Razi Kazemi
Performance Analysis of an UAV-assisted cognitive D2D communication-based Disaster Response Network
Hossein Mohammadi Firozjae - Javad Zeraatkar Moghaddam - Mehrdad Ardebilipour
Improving the Performance of Unified Power Quality Conditioner Using Interval Type 2 Fuzzy Control
Farzad Rastegar - Zohreh Paydar
ترکیب الگوریتم بهینهساز ازدحام ذرات و شبکه عصبی همگشتی رزنت در مدلسازی و طراحی سطوح انتخابگر فرکانس فراکتالی
امین مزروعی آبکنار - مجتبی مداح علی - مرضیه نصیریان
Energy Management of a Floating Photovoltaic System by Optimally Designed Fuzzy Logic Controller
Payam Loloei - S.hossein Hosseinian
Smartly, reduce the latency of high-priority vehicles using IoT technology
Mahdi Talebi - Masoud Sabaei
رمز نگاری داده های EEGبا کلید ترکیبی RSA-AESبرای بالا بردن امنیت و بهینه سازی مدت زمان رمزگذاری و رمز گشایی
حجت قیمت گر - پریسا قربانی
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.8.0