Leveraging the Power of Machine Learning for Performance Evaluation Prediction in Wireless Sensor Networks | IEEE Conference Publication | IEEE Xplore

Leveraging the Power of Machine Learning for Performance Evaluation Prediction in Wireless Sensor Networks


Abstract:

Formal methods are widely exploited in the performance evaluation of Wireless Sensor Networks (WSNs) protocols and algorithms. These methods help researchers to model and...Show More

Abstract:

Formal methods are widely exploited in the performance evaluation of Wireless Sensor Networks (WSNs) protocols and algorithms. These methods help researchers to model and to analyse mathematically such protocols. Numerical results obtained by analysis and performance evaluation can be employed to prove the correctness and consistency of the designed models. However, these methods face a scalability problem when the number of components becomes very high, which is often the case in WSNs. To overcome this challenge, this paper proposes to use a Machine Learning (ML) solution to provide predictions when the number of nodes increases and the formal model becomes enable to make the analysis. Indeed, this work deals with the application of effective Artificial Neural Networks (ANNs) for the prediction of a set of crucial performance metrics of CSMA/CA-MAC protocol in WSNs when the number of nodes increases significantly in the network. This prediction process is based on prior results obtained by the formal model when the number of nodes was manageable by that formal model.
Date of Conference: 14-15 July 2021
Date Added to IEEE Xplore: 26 July 2021
ISBN Information:
Conference Location: Amman, Jordan
References is not available for this document.

I. Introduction

Wireless sensor networks (WSNs) [1] consist of many sensor nodes that communicate with each other to perform a collective task such as sensing an environment. The main duty of these nodes is sensing and communicating the gathered information from the ambient environment to the Base Station (BS) or sink. Meanwhile, a sensor node is characterised by a limited computational and communication power. These constraints make the designing of an effective medium access control (MAC) protocol in WSNs a challenging task in aim to determine the channel access control capabilities and the energy consumption properties of WSNs. The MAC protocol of Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) for carrier transmission in WSNs avoids collisions by transmitting only when being sure that channel is idle [2].

Select All
1.
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "Wireless sensor networks: a survey", Computer networks, vol. 38, no. 4, pp. 393-422, 2002.
2.
M. Khanafer, M. Guennoun and H. T. Mouftah, "A survey of beaconenabled ieee 802.15. 4 mac protocols in wireless sensor networks", IEEE Communications Surveys Tutorials, vol. 16, no. 2, pp. 856-876, 2013.
3.
T. Murata, "Petri nets and their application an introduction" in Management and office information systems, Springer, pp. 351-368, 1984.
4.
E. Coronado, V. Valero, L. Orozco-Barbosa, M.-E. Cambronero and F. L. Pelayo, "Modeling and simulation of the ieee 802.11 e wireless protocol with hidden nodes using colored petri nets", Software and Systems Modeling, pp. 1-34, 2020.
5.
S. Zroug, L. Kahloul, S. Benharzallah and K. Djouani, "A hierarchical formal method for performance evaluation of wsns protocol", Computing, pp. 1-26, 2021.
6.
T. M. Mitchell et al., "Machine learning. 1997" in , Burr Ridge, IL:McGraw Hill, vol. 45, no. 37, pp. 870-877, 1997.
7.
T. M. Mitchell, The discipline of machine learning, Carnegie Mellon University, School of Computer Science, Machine Learning, vol. 9, 2006.
8.
N. Ahad, J. Qadir and N. Ahsan, "Neural networks in wireless networks: Techniques applications and guidelines", Journal of network and computer applications, vol. 68, pp. 1-27, 2016.
9.
W. J. Murdoch, C. Singh, K. Kumbier, R. Abbasi-Asl and B. Yu, "Definitions methods and applications in interpretable machine learning", Proceedings of the National Academy of Sciences, vol. 116, no. 44, pp. 22 071-22 080, 2019.
10.
S. Haykin and N. Network, "A comprehensive foundation", Neural networks, vol. 2, no. 2004, pp. 41, 2004.
11.
M. A. Alsheikh, S. Lin, D. Niyato and H.-P. Tan, "Machine learning in wireless sensor networks: Algorithms strategies and applications", IEEE Communications Surveys Tutorials, vol. 16, no. 4, pp. 1996-2018, 2014.
12.
Z. Guo and B. Malakooti, "Delay prediction for intelligent routing in wireless networks using neural networks", 2006 IEEE International Conference on Networking Sensing and Control, pp. 625-630, 2006.
13.
L. Mart´ ın, L. F. Zarzalejo, J. Polo, A. Navarro, R. Marchante and M. Cony, "Prediction of global solar irradiance based on time series analysis: Application to solar thermal power plants energy production planning", Solar Energy, vol. 84, no. 10, pp. 1772-1781, 2010.
14.
Y.-J. Shen and M.-S. Wang, "Broadcast scheduling in wireless sensor networks using fuzzy hopfield neural network", Expert systems with applications, vol. 34, no. 2, pp. 900-907, 2008.
15.
R. V. Kulkarni and G. K. Venayagamoorthy, "Neural network based secure media access control protocol for wireless sensor networks", 2009 international joint conference on neural networks, pp. 1680-1687, 2009.
16.
Prowler: Probabilistic wireless network simulator, 2021, [online] Available: https://www.isis.vanderbilt.edu/projects/nest/prowler/.
17.
F. Khorasani and H. R. Naji, "Energy efficient data aggregation in wireless sensor networks using neural networks", International Journal of Sensor Networks, vol. 24, no. 1, pp. 26-42, 2017.
18.
J. Xie, F. R. Yu, T. Huang, R. Xie, J. Liu, C. Wang, et al., "A survey of machine learning techniques applied to software defined networking (sdn): Research issues and challenges", IEEE Communications Surveys Tutorials, vol. 21, no. 1, pp. 393-430, 2018.
19.
Z. M. Fadlullah, F. Tang, B. Mao, N. Kato, O. Akashi, T. Inoue, et al., "State-of-the-art deep learning: Evolving machine intelligence toward tomorrow’s intelligent network traffic control systems", IEEE Communications Surveys Tutorials, vol. 19, no. 4, pp. 2432-2455, 2017.
20.
A. H. Duffy, "The", what and how of learning in design IEEE Expert, vol. 12, no. 3, pp. 71-76, 1997.
21.
P. Langley and H. A. Simon, "Applications of machine learning and rule induction", Communications of the ACM, vol. 38, no. 11, pp. 54-64, 1995.
22.
Y. S. Abu-Mostafa, M. Magdon-Ismail and H.-T. Lin, Learning from data, New York, NY, USA:AMLBook, vol. 4, 2012.
23.
L. Maruster, A machine learning approach to understand business processes, Citeseer, 2003.
24.
R. Mehmood and A. Selwal, "Fingerprint biometric template security schemes: attacks and countermeasures", Proceedings of ICRIC 2019, pp. 455-467, 2020.
25.
K. El Bouchefry and R. S. de Souza, "Learning in big data: Introduction to machine learning", Knowledge Discovery in Big Data from Astronomy and Earth Observation, pp. 225-249, 2020.
26.
O. Chapelle, B. Scholkopf, A. Zien et al., "Semi-supervised learning", IEEE Transactions on Neural Networks, vol. 20, no. 3, pp. 542-542, 2009.
27.
"Cpn-tool can be downloaded (free for academics) from", [online] Available: http://wiki.daimi.au.dk/cpntools/cpntools.wikim.
28.
J. Bergstra, R. Bardenet, Y. Bengio and B. Kegl, "Algorithms for hyper-parameter optimization", 25th annual conference on neural information processing systems (NIPS 2011), vol. 24, 2011.
29.
D. E. Rumelhart, G. E. Hinton and R. J. Williams, "Learning representations by back-propagating errors", nature, vol. 323, no. 6088, pp. 533-536, 1986.
30.
A. Belaala, L. S. Terrissa, N. Zerhouni and C. Devalland, "Computer-Aided Diagnosis for Spitzoid Lesions Classification Using Artificial Intelligence Techniques", International Journal of Healthcare Information Systems and Informatics (IJHISI), vol. 16, no. 1, pp. 16-37, 2021.

Contact IEEE to Subscribe

References

References is not available for this document.