You are on page 1of 7

ARTIFICIAL INTELLIGENCE FOR COGNITIVE WIRELESS COMMUNICATIONS

Intelligence at the Edge of


Complex Networks: The Case of
Cognitive Transmission Power Control
Pasquale Pace, Giancarlo Fortino, Yin Zhang, and Antonio Liotta

Abstract gently is crucial to realizing the full potential of


our digital ecosystems. An industrial factory typ-
The rapid proliferation of new devices has led ically uses thousands of sensors to monitor the
to the Internet of Things (IoT), a network where status of thousands of machines and processes.
virtually any object equipped with a radio inter- However, conventional communication proto-
face can be connected. Accordingly, networks cols are not geared for such industrial IoT require-
are exploding in terms of the number of devices ments, where reliable wireless connectivity and
but also in complexity. The key issue arises from ultra-low latency are musts. In most challenging
the increasing density in wireless communications, IoT applications, sensor data needs to be collect-
which the deterministic nature of current proto- ed, analyzed, and correlated with historical perfor-
cols can no longer handle. Herein, we explore mance data to make decisions in real time [2]. As
ways in which the latest development in artificial an example, you can consider swarms of industri-
intelligence (AI) and particularly machine learning al drones or remote facilities filled with smart sen-
may help address the complex requirements of sors and actuators that need to communicate and
IoT communications, highlighting the crucial role coordinate with each other to accomplish tasks
of predictive communications. We illustrate the without being connected to a remote AI cloud
software architectures and the fundamental mech- service [3, 4].
anisms that can enable AI processes in communi- In such cases, embedding intelligence at the
cations. Finally, we introduce an exemplary case source of the sensing is the most sensible way to
study where machine learning is successfully used obtain timely actionable reactions. What is more,
to find the delicate balance between spectrum the very same intelligent mechanisms may be
and energy efficiency in wireless sensor networks. used both at the application level (e.g., to detect
The emerging panorama for cognitive communi- anomalies or predict trajectories) and to meet
cations is one in which intelligent processes must the demands of real-time communications (e.g.,
start at the very edge and need to transfer meta- enabling prediction-based protocols). Moreover,
learned information in a peer-to-peer fashion. edge computing provides a new computation-
al paradigm to place substantial computing and
Introduction storage resources at the network edge in close
The widespread digitization of the physical world proximity to user devices or terminals.
and the Internet of Things (IoT) trend to connect The opportunities and challenges to exploit AI
virtually any object equipped with a radio inter- to achieve intelligent 5G networks by effective-
face are creating ever more complex systems. ly orchestrating cellular network resources have
Across all sectors of industry and society, there been widely investigated in the last few years [5].
is a quest to adopt artificial intelligence (AI) to However, the time has come to focus on future
master the complexity of IoT systems, which designs and working paradigms consisting of mov-
requires pervasive wireless connectivity beyond ing the intelligence from the core to the edge of
what is currently possible. While AI is being used the network [6], to enable decisions to be made
broadly in the most innovative applications and directly on the IoT nodes (i.e., on resource con-
services, there is an opportunity to use those very strained sensors), rather than “phoning home” to
same intelligent mechanisms to construct more headquarters or a cloud service to find out “what
intelligent and cognitive communications [1]. The to do next.”
key issue with pervasive connectivity is not only Thanks to recent breakthroughs in lightweight
the sheer number of devices (projected to be at AI methods, it is now possible to bring IoT sys-
the level of trillions) but the increasing density in tems to the next level, allowing localized (rather
wireless communications, which the deterministic than cloud-centric) decisions and minimizing the
nature of current protocols can no longer handle. communication footprint. That will, in turn, allow
As the number of commercial and industrial enterprises to better capitalize on their IoT invest-
IoT devices proliferates, getting such a diverse ments. It is crucial for IoT devices to be able to
range of “things” to behave and connect intelli- work together, for instance, to diagnose and solve

Pasquale Pace and Giancarlo Fortino are with the University of Calabria — Rende; Yin Zhang is with Zhongnan University of Economics and Digital Object Identifier:
Law; Antonio Liotta is with the University of Derby. 10.1109/MWC.2019.1800354

IEEE Wireless Communications • June 2019 1536-1284/19/$25.00 © 2019 IEEE 97


Authorized licensed use limited to: Cardiff University. Downloaded on April 13,2021 at 22:52:48 UTC from IEEE Xplore. Restrictions apply.
Traditional Learning Distributed Learning Data Fusion
Architecture Architecture
External
Intelligent sources
•Central Node
Intelligent (cloud)
•Central Node
(cloud)

Intelligent
Intelligent n - intermediary nodes
•Intermediary •Intermediary
Node Node

•Sensing and •Sensing and •Sensing and •Sensing and •Sensing and •Sensing and •Sensing and
Actuator Actuator Actuator Actuator Actuator Actuator P2P Actuator
Node (SAN) Node (SAN) Node (SAN) Node (SAN) Node (SAN) Node (SAN) Node (SAN)
DUMB DUMB DUMB
Intelligent Intelligent Intelligent Intelligent

Learned models Intelligence pushed down Data streams

FIGURE 1. Traditional learning architecture vs. distributed learning architecture.

problems in real time, even when disconnected gies play an important role when it comes to reli-
from central big data capability. Starting from this ability of communication, often setting stringent
challenging vision of decentralized intelligence, requirements on the energy efficiency and robust-
here we discuss the need to move the intelligence ness of the wireless systems, which makes a type
toward the edge of the network in which many of “on-the-fly” adjustment to the residual energy
different resource constrained devices are placed; level necessary in practical implementation.
then we explore the various ways in which the AI and particularly ML have considerably
latest AI developments, particularly machine evolved in the past decade, with a broad set of
learning (ML), may help address the complex methods and applications. Our intention in this
requirements of IoT communications, highlighting section is to explore which general software
the crucial role of predictive rather than deter- architectures for learning (i.e., traditional vs. dis-
ministic communications. First, we illustrate the tributed, shown in Fig. 1) may be employed in
software architectures that may be used for mov- cognitive wireless communications to support
ing intelligence toward the edge and transferring the well-known cognitive cycle in which the radio
meta-learned models. Next, we look at learning should be able to learn from its past actions.
mechanisms that can naturally be deployed in the
IoT node. Finally, we introduce an exemplary case Centralized Learning
study where ML is successfully used to find the Up until recently, the predominant method for
delicate balance between spectrum and energy employing ML has been the centralized one.
efficiency in the wireless sensor network. In the IoT context, this has been referred to as
This level of autonomy and self-adaptation cloud-assisted sensing, whereby all contextual
(through ML) within individual nodes is crucial in data needs to be transported to a central point
a context that is continuously changing in ways before it can be used to make prediction models
that conventional deterministic models fail to cap- and inference. The sensor nodes are “dumb” in
ture. In our prototyping study we wanted to ascer- the sense that their functional requirements are
tain the extent to which lightweight ML could limited to data collection and communication.
beneficially be used in cognitive communications. All intelligence resides in servers, which is where
Our findings, based on a range of diverse sensors sufficient computing resources are concentrated.
(some having as little as 20kB memory), show Centralized learning shares the pros and cons
great potential and encourage further studies in of centralization. It can rely on rich datasets and
this direction. However, in this work we only pres- powerful computations. However, communica-
ent the results related to a specific sensor plat- tion becomes the limiting factor, particularly con-
form due to space limits. sidering the projected scale of IoT systems and
their predominant use of wireless spectrum.
General Software Architectures for Learning
Since new attractive applications have caused the In-Node Learning
data volume in both fixed and mobile networks Recent development in AI has made it possible to
to skyrocket in recent years, it is foreseeable that miniaturize ML processes to the extent that online
the technologies available today will be unable to learning can be run on limited devices, with as
satisfy users’ demands for service quality in the little memory as a few dozen kilobytes [7]. Thanks
future. In this context, cognitive wireless technolo- to new breakthroughs at the intersection between

98 IEEE Wireless Communications • June 2019


Authorized licensed use limited to: Cardiff University. Downloaded on April 13,2021 at 22:52:48 UTC from IEEE Xplore. Restrictions apply.
network science and ML, it is now possible to interest and take appropriate actions according- In-node learning rep-
train artificial neural networks (ANNs) directly ly. Using conventional AI to detect, prevent, or resents a major step
onto constrained devices, rather than in powerful adjust to events means that the whole of data forward compared to
servers [8]. It is therefore realistic to conceive that gathered at the edge would need to be trans- a centralized architec-
intelligent processes should start at the network ferred to the cloud before any process may be
periphery, leading to new forms of decentralized applied. This is infeasible, considering the scale ture, and is also the
ML. Decentralized learning opens several new and resource constraints of IoT systems. Specific starting point for even
avenues when it comes to cognitive wireless com- problems include: more elaborate forms
munications, as it allows wireless devices to direct- • Limited wireless spectrum around devices of decentralized intel-
ly spot communication patterns without incurring • Limited energy available on the devices that are ligence. With transfer
any communication overheads with base stations not typically able to permanently stay in trans-
or other centralized points [9]. In-node learning mit mode learning it is possible
has significant potential to evolve current com- • Limited computing available on the server side, to transfer information
munication standards toward prediction-based considering that IoT devices are projected to learned across nodes in
communications at the physical, medium access grow by 2–3 orders of magnitude within the a peer-to-peer learning
control (MAC), and network layers, and enabling next few years fashion.
cross-layer communication protocols for high-den- Lightweight online and RL methods come to
sity, low-power, massive-scale systems. the rescue. Bosman et al. [7] have done exten-
sive work to evaluate the viability of various ML
Transfer Learning methods in tiny sensors. Their work proves that
In-node learning represents a major step forward nontrivial events and diverse anomalies may be
compared to a centralized architecture, and is also picked up on the fly without having to rely on
the starting point for even more elaborate forms any prior knowledge. That means that, despite
of decentralized intelligence. With transfer learn- the limitations of embedded platforms, it is possi-
ing it is possible to transfer information learned ble to provide them with sufficient intelligence to
across nodes in a peer-to-peer learning fashion self-adjust their transmission parameters based on
[10]. The value to intelligent communications is the observed context. That may include informa-
unprecedented, as it allows for a learned node tion from any of the network layers and the data
to bootstrap or accelerate the learning transient patterns. What has even more potential is the abil-
of another one. High-level meta information can ity to fuse or transfer meta-learned information
travel not only from top to bottom (e.g., from the among neighboring devices to further improve
cloud down to individual nodes) but also between the detection of anomalies (in terms of precision
similar nodes (e.g., among neighboring sensors). It and recall) [13]. Anomaly detection at the edge is
is also conceivable to use transfer learning to gen- a fundamental building block in edge intelligence,
erate meta-learning models, starting from sub-do- as it allows for substantial filtering and compres-
mains. All these possibilities are very important in sion of data, which is paramount to scaling up IoT
cognitive communications, where it is not always communications.
possible for a device to learn communication pat-
terns (e.g., due to lack of access to data or limited Resource Management
computing capability). An exemplary work on the Edge devices, sensors, actuators, controllers, and
use of transfer learning as a mechanism for coop- other sorts of embedded systems are typically bat-
erative management in cognitive radio has been tery powered and communicate through wireless
carried out by Zhao et al. [11]. protocols. Efficient resource management is there-
fore of paramount importance, particularly finding
Learning Mechanisms for Constrained Devices optimal transmission frequencies and power and
Thanks to recent breakthroughs in ML miniatur- minimizing packet collision and latency. These are
ization, it is now possible to contemplate the real- conflicting requirements that demand going well
ization of AI tasks directly on constrained devices, beyond the simple reactive protocols in use. AI
which are digital objects such as wireless sensors offers the opportunity to develop predictive meth-
with limited computing capability. The key dif- ods that prevent, rather than address, issues such
ference with other programmatic approaches as packet retransmissions.
is the use of online reinforcement learning (RL) Chincoli et al. [9] have carried out exemplary
mechanisms, which allow individual nodes to self- work on learning-based resource management in
tune, without requiring any predetermined rules wireless sensor networks, showing how RL may
or threshold setting [12]. To this end, cognitive be used in small sensors to tackle the combined
IoT devices can use local information to find out problems of energy and spectrum efficiency.
the communication and interference patterns and Q-learning can indeed be deployed in low-spec
make prediction models. These can be used to devices to iteratively predict the channel con-
drive transmission power and channel selection so ditions through trial-and-error methods that are
as to minimize packet collision and energy con- more viable than other optimization algorithms.
sumption, without having to tightly rely on cloud Overall, in-node RL is a pre-requisite for typical
resources or edge-to-cloud communication. Next, IoT devices to continuously strive for minimum
we explore three key mechanisms that can have energy status.
real impact on cognitive communications.
Self-Characterization
Anomaly Detection Online RL has crucial applications in smart
IoT systems are typically used to gather vast sensing and predictive communications, as illus-
amounts of data, with a view to identify anomalies trated in the aforementioned examples. How-
(e.g., system failures, intrusion, or unanticipated ever, the true power of AI resides in the ability
behavior of the environment) or other events of to train ANNs based on sample datasets that

IEEE Wireless Communications • June 2019 99


Authorized licensed use limited to: Cardiff University. Downloaded on April 13,2021 at 22:52:48 UTC from IEEE Xplore. Restrictions apply.
Edge devices, sensors, reflect the context of the given application. purely conservative (i.e., l = 0) or adaptive (i.e., l =
actuators, controllers, Meaningful ANNs require considerable com- 1). The parameter d  U[0, 1] is the discount fac-
and other sorts of puting power, which is typically available only tor, which weighs the contribution of the future
embedded systems are in the cloud. This has so far confined ANNs Q-value estimations maxa Qk(sk+1, a).
to centralized learning architectures, whereby Episode k represents the transmission of N
typically battery pow- the ANN is first trained in the cloud and then packets within a window W using the same
ered and communicate pushed down to the edge node. action. At the end of the current window, the
through wireless proto- This form of intelligence decentralization is agent is rewarded, the new state is updated, and
cols. Efficient resource effective in various applications, but still requires the action is changed; then W is flushed, and new
management is there- considerable batch communication and process- packets are sent.
ing between the many IoT nodes and a few cloud Q-learning is an off-policy algorithm, which
fore of paramount service centers. There is still a centralized bottle- means that the action selection does not follow a
importance, particularly neck in the process, which limits the real-time ele- defined policy p but changes over time, following
finding optimal trans- ment of AI in IoT. a strategy. The strategy of the proposed proto-
mission frequencies However, thanks to recent developments col is e-greedy, which is based on the compar-
and power and mini- reported in [14], it is now conceivable to train ison of e  U[0,1] with a uniformly distributed
ANNs directly in edge nodes. This enables new random value x  U[0,1]. In this way, when x 
mizing packet collision possibilities in IoT intelligence, since individual e the system explores; otherwise, it exploits the
and latency. These are nodes will soon be able to self-characterize their actions that produced the maximum Q-value for
conflicting require- contextual parameters in real time (i.e., via limited the specific state s k. The e factor is variable in
ments that demand or no communication with cloud services). accordance with a scheduling setup related to the
going well beyond the In terms of intelligent communications, in-node episode count.
ANNs open the door to far more advanced pre- In summary, the different components of the
simple reactive proto- diction capability, which is necessary to capture proposed cognitive Q-learning TPC (CQL-TPC)
cols in use. the complex realm of wireless communications. protocol have the following meanings:
• The action is the transmission power level.
Cognitive Transmission Power Control • The state is the interference intensity at the
In this section, we investigate one of the afore- transmitter and receiver side, mapping both
mentioned ML techniques in constrained devices the clear channel assessment (CCA) attempts
based on the in-node learning paradigm, to bet- and the retransmission combination in discrete
ter illustrate and substantiate the intelligence at values.
the edge vision. We describe a cognitive, coop- • The reward takes into account the quantiza-
erative transmission power control (TPC) scheme tion of the packet reception ratio (PRR) and the
based on RL agents, whereby each wireless sen- selected transmission power combinations (i.e.,
sor node iteratively learns its minimum energy the higher the PRR and the lower the transmis-
level. Since all sensors incorporate the same RL sion power, the higher the reward).
agent functionality, this is an example of multi- In multi-agent systems, each parameter is
agent systems that strives for optimality through independent and specific per agent; thus, the kth
a sequence of trial-and-error actions. Specific episodes are also different and occur asynchro-
goals are specified in terms of network quality nously. For this reason, actions may be taken at
of service (QoS) parameters. As an example, we the same time by different agents, whereas other
target the combination of minimum energy and nodes are idle. Since the agents do not know the
minimum packet error rate, showing that this <state-action-reward> triplet of other nodes, game
has a positive effect in terms of both energy and theory plays an important role for converging the
spectrum efficiency. node decisions to a near-optimal global equilibri-
The agent is the decision maker of the system um. In this context, the nodes are the players of
that interacts and influences the environment (i.e., a common interest theoretical game in which the
the wireless channel). The decisions that the agent payoff of each player is maximized if their deci-
takes are called actions, a  A  N, where A is a sions improve the interference mitigation for a
set of actions. global benefit (i.e., the nodes gain higher reward
The status of the environment is defined as by selecting lower power levels). Figure 2a illus-
state s  S  N, where S is a set of states. The trates the different functional blocks composing
agent is rewarded via a discrete range of nega- the intelligent node and the interactions with the
tive and positive numbers, whether the action environment, and Fig. 2b summarizes the states,
taken provides a positive or negative effect on the actions, and rewards during the transmission pro-
environment toward the goal, respectively. The cess of a node pair.
so-called reward is defined as r  R  R, where R
is a set of rewards. The TPC protocol adopts the Experiments and Results
Q-learning algorithm, a well-known lightweight RL This section shows the experiments conducted
solution [15], suitable for constrained devices by on a real testbed in which the multi-agent CQL-
computing the long-term quality value (Q-value) TPC strategy has been implemented in the sensor
of the state-action combinations (sk, ak), at every nodes. In particular, the network performance
kth episode. Q-value is updated by using the fol- and energy consumption have been evaluated
lowing formula: in different density conditions in terms of nodes
by comparing the proposed CQL-TPC scheme
Qk+1(sk, ak) = (1 – lk) * Qk(sk, ak) + with a standard homogeneous scheme, named
lk(sk, ak) * [rk+1 + d * maxa Qk(sk+1, a)] (1) MaxPow, in which the transmission is always per-
formed at the maximum power level. In addition,
where l k  U[0,1] is the learning factor at the the convergence and scalability of the proposed
kth episode, providing the system to be between approach are analyzed and discussed.

100 IEEE Wireless Communications • June 2019


Authorized licensed use limited to: Cardiff University. Downloaded on April 13,2021 at 22:52:48 UTC from IEEE Xplore. Restrictions apply.
Testbed Setup and Working Parameters
Intelligent Node
The CQL-TPC scheme is implemented in ZigBit ANALYZER RECONFIGURATOR
nodes1 composed of:
• The ATxmega256A3U processor with 32 MHz
Cognition
of computational speed, 256 kB + 8 kB of flash
memory, and 16 kB of SRAM
• The AT86RF233 low-power transceiver working
Spectrum Efficiency
at 2.4 GHz which can be used to develop IEEE Target:
ü
DECISION ü Power Control
802.15.4 applications MAKER ü …
• A USB connector ü …
Since many functionalities are embedded in the
hardware, we expect to obtain reliable and accurate
results; moreover, the CQL-TPC scheme has been ENVIRONMENT
programmed in the integrated development plat-
form, Atmel Studio, provided by the manufacturer to (a)
support the IEEE 802.15.4 module. The developed
software code is lightweight enough since it occu- Retransmissions
Rx STATE
pies only 20.12 percent of the total memory. Clear Channel Assessment (CCA) attempts
The sensor nodes are deployed in a specific
environment to minimize the external interfer-
ence; in particular, we used a Faraday cage, thus ACTION Transmission power level

focusing only on the interference that is caused


by our sensor nodes. They are placed to form a Packet Reception Ratio
Manhattan grid symmetric topology in which we Tx REWARD
Transmission power level
tested four transmission scenarios, depicted in Fig.
3, consisting of one, two, four, and eight node
pairs, respectively. (b)
Each transmitter sends packets to its associated
FIGURE 2. a) intelligent node, b) states, actions, and rewards of the intelligent
receiver at d = 1 m distance.
As main performance indexes we measured: node.
• The packet reception ratio (PRR) consisting
of the ratio of the received acknowledgments Parameter Symbol Value
(ACKs) and the generated packets, calculated
over a window W of 10 packets Number of node pairs nn 1, 2, 4, 8
• The latency, defined as the difference between Distance between transmitter-receiver (m) d 1
the reception and generation packet time, aver- Distance between a pair of transmitters (m) D 5
aged among the received packets within W Packet payload size (byte) payload 50
• The average energy consumption of the nodes Inter-arrival time (ms)- Poisson distributed m 300
with respect to the transmission power levels Number of packets in a window N 10
chosen by the CQL-TPC algorithm Number of transmission power levels nptx 16
Table 1 summarizes all the parameters and the –17, –12, –8, –6, –4,
related values used in the experiments. Transmission power (dBm) ptx –3, –2, –1, 0, 1,
According to the implemented scenarios, the 2, 2.5, 3, 3.4, 3.7, 4
states sk and rewards rk are calculated as follows: Number of states ns 68
D
sk = retrk + ccak ∗ (nretr +1) Reward quantization step size 3.12
(2) Reward quantization levels mr 320
PRR quantization levels mprr 20
m ⎤
(


) ( )
rk = Δ ∗ ⎢ prrkq − 1 ∗ n ptx + n ptx − ptx,k − r ⎥
2 ⎦ (3)
Maximum retransmission attempts
Maximum CCA attempts
nretr
ncca
3
4

TABLE 1. Parameter settings of the Atmel ZigBit nodes.
where retrk and ccak are the retransmissions and
the number of CCA obtained in the kth episode,
nretr is the maximum number of retransmissions value is kept constant to 0.1, whereas l decreas-
q
allowed for each packet, prr k is the quantized PRR es from 0.9 to 0.1. Lastly, in the final phase, the
prr
over m levels, nptx is the number of transmission values of l and e are maintained small to rapidly
power levels, ptx,k is the transmission power level adapt in case of changes in the environment.
used during the kth episode, and mr is the number It is worth noting that we assume a symmetric
of quantization levels for the reward, respectively. communication on the links between the node
Regarding the learning phase of the algorithm pairs to support the CQL-TPC scheme because
and the e-greedy factors, we scheduled the rela- each specific power level, computed by the cog-
tive values as a function of the episodes (i.e., the nitive algorithm, needs to be communicated by
packets transmitted in one window). The sched- the transmitter to its recipient in the payload of
uling is planned according to the three phases of the packets, and in the same way, the receiver
learning, convergence, and testing shown in Table uses the same power level to send back the ACKs. 1 ZigBit wireless Modules

2. In particular, at the beginning of the learning AT86RF233 Datasheet:


procedure, the learning factor l is kept high, equal Results and Discussions http://www.microchip.com/
design-centers/wireless-con-
to 0.9, whereas the e value gradually decreases The performance of CQL-TPC is evaluated by nectivity/embedded-wire-
from 0.9 (explorative strategy) to 0.1 (exploitative comparing the proposed scheme with the stan- less/802-15-4/hardware/
strategy). Later, in the convergence phase, the e dard strategy in which the maximum power zigbit-modules

IEEE Wireless Communications • June 2019 101


Authorized licensed use limited to: Cardiff University. Downloaded on April 13,2021 at 22:52:48 UTC from IEEE Xplore. Restrictions apply.
ed to the energy consumption due to the used
transmission power levels; in this case, the intelli-
gence within the CQL-TPC allows wisely adapting
the transmission power, saving more than 10 per-
cent of the energy, as shown in Fig. 4b.
In particular, the difference in energy con-
sumption between the two tested scheme varies
between 27 nJ/bit and 15 nJ/bit depending of
the density of the network. Assuming the use of
two alkaline AA batteries of 3000 mAh @ 1.5 V
for each node corresponding to a total energy
of 32,400 J, the nodes in which the CQL-TPC is
implemented can transmit for a longer period
before battery depletion.
(a) (b) We have estimated that the lifetime of the
nodes increases from several days (i.e., 15–25),
without any sleeping techniques, up to a few
months (i.e., 9–16) if the deep sleep mode is
enabled during the idle periods. Moreover, the
energy consumed by the CQL-TPC in the learn-
ing and convergence phases does not affect the
battery capacity in the long term since such esti-
mated average value of about 2 J and 0.35 J, with
deep sleep disabled and enabled, can be consid-
ered as a negligible value compared to the total
battery energy.
Finally, the convergence time of the proposed
scheme is similar in the first two scenarios, but it
increases for denser networks in which the inter-
(c) (d) ference is higher and more dynamic; thus, the
system is less stable and requires more time to
FIGURE 3. Scenario with a) two; b) four; c) eight; d) 16 nodes. settle, as confirmed by the high standard devia-
tion values for the scenario with 16 nodes. How-
e d
ever, it is worth noting that the obtained converge
Phase l Episode #
time is not a big issue in static wireless sensor net-
0.9 0.9 0.8 k < 150 work scenarios in which the nodes slowly vary
0.9 0.7 0.8 150  k < 300 their mutual interference, making the presented
Learning approach far more preferable with respect to the
0.9 0.3 0.8 300  k < 450
0.9 0.1 0.8 450  k < 600 deterministic one.

Convergence
0.1
0.01
0.1
0.1
0.8
0.8
600  k < 750
750  k < 900
Conclusion
Many powerful AI and ML techniques address-
Testing 0.01 0.01 0.8 k  900 ing knowledge engineering, planning, schedul-
ing, and learning in distributed environments
TABLE 2. Parameter setting for the phases of learn- have been developed in the last few years to
ing, convergence, and testing. face different networking and communication
issues taking advantage of the availability of
(MaxPow) is always used for the transmission. both processing and storing capabilities with-
As performance indices to validate the cogni- in the cloud. In the near future, attention on
tive approach within the presented commu- the design and application of such powerful
nication scenarios, we computed the average techniques will be moved from the core to the
values of PRR, latency, number of retransmis- edge of complex and heterogeneous networks
sions, number of CCA attempts and energy by adapting and re-designing their working
consumption of the whole network. We also features to face the limitation imposed by the
evaluated the convergence time of the CQL- presence of widely used and constrained IoT
TPC scheme in relation to the density of the devices.
network. This is computed as the time needed From this perspective, the presented work
by the agent to reach the Q-value that differs discusses the potential and, at the same
at most 1 percent from the final value at the time, the needs of moving more intelligence
end of each experiment. toward the edge of the networks by making
The obtained results are summarized in Fig. constrained devices evolve through the use of
4a, where it is possible to note that most of the lightweight ML and AI techniques, paving the
performance between CQL-TPC and MaxPow are way for the so-called actionable intelligence
similar in all the scenarios. In particular, the PRR at the edge. The implemented case study,
slightly drops when the network is composed of focused on the design of a cognitive transmis-
eight pairs of nodes; on the contrary, the latency, sion power control well suited for small real
retransmissions, and CCA attempts rise propor- sensors, proves the feasibility of the proposal
tionally to the number of nodes. in terms of energy efficiency, reliability, and
The main and significant difference that con- scalability, also ensuring standard network per-
firms the value of the cognitive approach is relat- formance levels.

102 IEEE Wireless Communications • June 2019


Authorized licensed use limited to: Cardiff University. Downloaded on April 13,2021 at 22:52:48 UTC from IEEE Xplore. Restrictions apply.
FIGURE 4. Network performance comparison between CQL-TPC and MaxPow varying the density pairs: a) general network metrics;
b) average energy consumption.

Acknowledgment [14] D. C. Mocanu et al., “A Topological Insight into Restricted


Boltzmann Machines,” Machine Learning J., Springer, 2016,
This work was supported by the China Nation- pp. 1–28.
al Natural Science Foundation under Grant [15] W. Qiang and Z. Zhongli “Reinforcement Learning Model,
61702553, and the Fundamental Research Funds Algorithms and Its Application,” Int’l. Conf. Mechatronic Sci-
ence, Electric Engineering and Computer, Jilin, China, 2011,
for the Central Universities, Zhongnan Univer- pp. 1143–46.
sity of Economics and Law (Grant Number:
2722019JCT037). Biographies
Pasquale Pace [M’05] (p.pace@dimes.unical.it) is an assistant
References professor in telecommunications at the University of Calabria
[1] M. Chen and V. C. M. Leung, “From Cloud-Based Communi- (Unical), Italy, where he received his Ph.D. in information engi-
cations to Cognition-Based Communications: A Computing neering in 2005. He was a visiting researcher at the CCSR, Sur-
Perspective,” Computer Commun., vol. 128, 2018, pp. 74–79. rey, United Kingdom, and at Georgia Institute of Technology.
[2] M. G. Kibria et al., “Big Data Analytics, Machine Learning, He has authored more than 80 papers in international journals,
and Artificial Intelligence in Next-Generation Wireless Net- conferences, and books. His research interests include cognitive
works,” IEEE Access, vol. 6, 2018, pp. 32,328–38. and opportunistic networks, sensor and self-organized networks,
[3] P. Pace et al., “A Mission-Oriented Coordination Framework and interoperability of IoT platforms and devices.
for Teams of Mobile Aerial and Terrestrial Smart Objects,”
Mobile Networks and Applications, vol. 21, no. 4, 2016, pp. Giancarlo Fortino [SM’12] (g.fortino@unical.it) is a full pro-
708–25. fessor of computer engineering in the Department of Informat-
[4] Y. Luo et al., “Workshop Networks Integration Using Mobile ics, Modeling, Electronics, and Systems of Unical. He received
Intelligence in Smart Factories,” IEEE Commun. Mag., vol. 56, a Ph.D. in computer engineering from Unical in 2000. His
no. 2, Feb. 2018, pp. 68–75. research interests include IoT technology, agent-based comput-
[5] R. Li et al. “Intelligent 5G: When Cellular Networks Meet ing, and wireless sensor networks. He is an author of over 350
Artificial Intelligence,” IEEE Wireless Commun., vol. 24, no. 5, papers in international journals, conferences, and books. He is
Oct. 2017, pp. 175–83. also co-founder and CEO of SenSysCal S.r.l., a Unical spin-off
[6] M. Chen et al., “A Dynamic Service-Migration Mechanism in focused on innovative IoT systems.
Edge Cognitive Computing,”, ACM Trans. Internet Technolo-
gy, vol. 19, no. 2, 2019, article 30. Yin Zhang [M’13, SM’16] (yinzhang@zuel.edu.cn) is an asso-
[7] H. H. W. J. Bosman et al., “Ensembles of Incremental Learn- ciate professor at Zhongnan University of Economics and Law
ers to Detect Anomalies in Ad Hoc Sensor Networks,” Ad (ZUEL), China. He is a Wenlan Distinguished Scholar at ZUEL
Hoc Networks, vol. 35, Elsevier, 2015, pp. 14–36. and a Chutian Distinguished Scholar, Hubei, China. He is Vice-
[8] D. C. Mocanu et al., “Scalable Training of Artificial Neural Chair of the IEEE Computer Society Big Data STC. He serves
Networks with Adaptive Sparse Connectivity Inspired by as Associate Editor for IEEE Network, IEEE Access, and others.
Network Science,” Nature Commun., vol. 9 , no. 1, art. no. He has published more than 100 prestigious conference and
2383, 2018. journal papers, including 9 ESI Highly Cited Papers. He got the
[9] M. Chincoli and A. Liotta “Self-Learning Power Control in Systems Journal Best Paper Award of the IEEE Systems Council
Wireless Sensor Networks,” Sensors, vol. 18, no. 2, MDPI, in 2018. His research interests include intelligent service com-
2018. puting, big data, social network, and more.
[10] K. Hwang and M. Chen, Big Data Analytics for Cloud/IoT and
Cognitive Computing, Wiley. ISBN: 9781119247029, 2017. Antonio Liotta [SM’15] (a.liotta@derby.ac.uk) is a professor
[11] Q. Zhao, D. Grace, and T. Clarke “Transfer Learning and of data science and the founding director of the Data Science
Cooperative Management: Balancing the Quality of Service Research Centre, University of Derby, United Kingdom. He is
and Information Exchange in Cognitive Radio Networks,” the director of the Joint Intellisensing Lab (Europe, Asia, and
Trans. Emerging Tel. Tech., vol. 26, Wiley, 2014, pp. 290–301. Australia) and a guest professor at Shanghai Ocean University,
[12] M. Chen et al., “Label-Less Learning for Traffic Control in China. His team is at the forefront of influential research in data
an Edge Network,” IEEE Network, vol. 32, no. 6, 2018, pp. science and artificial intelligence, specifically in the context of
8–14. smart cities, the Internet of Things, and smart sensing. He is the
[13] H. H. W. J. Bosman et al., “Spatial Anomaly Detection in Editor-in-Chief of the Springer Internet of Things book series;
Sensor Networks Using Neighborhood,” Info. Fusion J., vol. Associate Editor of the journals JNSM, IJNM, JMM, and IF; and an
33, Elsevier, 2017, pp. 41–56. Editorial Board member of six more journals.

IEEE Wireless Communications • June 2019 103


Authorized licensed use limited to: Cardiff University. Downloaded on April 13,2021 at 22:52:48 UTC from IEEE Xplore. Restrictions apply.

You might also like