Advertisement

A New Method to Find a High Reliable Route in IoT by Using Reinforcement Learning and Fuzzy Logic

  • Yalda Akbari
  • Shayesteh TabatabaeiEmail author
Article
  • 11 Downloads

Abstract

Recently, Internet is moving quickly toward the interaction of objects, computing devices, sensors, and which are usually indicated as the Internet of things (IoT). The main monitoring infrastructure of IoT systems main monitoring infrastructure of IoT systems is wireless sensor networks. A wireless sensor network is composed of a large number of sensor nodes. Each sensor node has sensing, computing, and wireless communication capability. The sensor nodes send the data to a sink or a base station by using wireless transmission techniques However, sensor network systems require suitable routing structure to optimizing the lifetime. For providing reasonable energy consumption and optimizing the lifetime of WSNs, novel, efficient and economical schemes should be developed. In this paper, for enhancing network lifetime, a novel energy-efficient mechanism is proposed based on fuzzy logic and reinforcement learning. The fuzzy logic system and reinforcement learning is based on the remained energies of the nodes on the routes, the available bandwidth and the distance to the sink. This study also compares the performance of the proposed method with the fuzzy logic method and IEEE 802.15.4 protocol. The simulations of the proposed method which were carried out by OPNET (Optimum Network performance) indicated that the proposed method performed better than other protocols such as fuzzy logic and IEEE802.15.4 in terms of power consumption and network lifetime.

Keywords

IoT Energy consumption Wireless sensor networks (WSNs) Fuzzy logic IEEE802.15.4 Reinforcement learning 

Notes

References

  1. 1.
    Skarmeta, A. F., Hernandez-Ramos, J. L., & Moreno, M. (2014). A decentralized approach for security and privacy challenges in the internet of things. In IEEE World Forum on Internet of Things (WF-IoT) (pp. 67–72).Google Scholar
  2. 2.
    Wang, J., Liu, Z., Shen, Y., Chen, H., Zheng, L., Qiu, H., et al. (2015). A distributed algorithm for inter-layer network coding-based multimedia multicast in Internet of Things. Computers & Electrical Engineering,52, 125–137.CrossRefGoogle Scholar
  3. 3.
    Li, G., Zhang, D., Zheng, K., Ming, X., Pan, Z., & Jiang, K. (2013). A kind of new multicast routing algorithm for application of Internet of Things. Journal of Applied Research and Technology,11, 578–585.CrossRefGoogle Scholar
  4. 4.
    Suarez, J., Quevedo, J., Vidal, I., Corujo, D., Garcia-Reinoso, J., & Aguiar, R. L. (2016). A secure IoT management architecture based on Information-Centric Networking. Journal of Network and Computer Applications,63, 190–204.CrossRefGoogle Scholar
  5. 5.
    Qiu, T., Luo, D., Xia, F., Deonauth, N., Si, W., & Tolba, A. (2016). A greedy model with small world for improving the robustness of heterogeneous Internet of Things. Computer Networks,101, 127–143.CrossRefGoogle Scholar
  6. 6.
    Shah, J., & Mishra, B. (2016). Customized IoT enabled wireless sensing and monitoring platform for smart buildings. Procedia Technology,23, 256–263.CrossRefGoogle Scholar
  7. 7.
    Qiu, T., Lv, Y., Xia, F., Chen, N., Wan, J., & Tolba, A. (2016). ERGID: An efficient routing protocol for emergency response Internet of Things. Journal of Network and Computer Applications,72, 104–112.CrossRefGoogle Scholar
  8. 8.
    Di Marco, P., Athanasiou, G., Mekikis, P.-V., & Fischione, C. (2016). MAC-aware routing metrics for the internet of things. Computer Communications,74, 77–86.CrossRefGoogle Scholar
  9. 9.
    Ming, Z., & Yan, M. (2013). QoS-aware computational method for IoT composite service. The Journal of China Universities of Posts and Telecommunications,20, 35–39.CrossRefGoogle Scholar
  10. 10.
    L. M. S. Committee. (2003). Part 15.4: wireless medium access control (MAC) and phsical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs). IEEE Computer Society.Google Scholar
  11. 11.
  12. 12.
    Koubaa, A., Alves, M., & Tovar, E. (2006). GTS allocation analysis in IEEE 802.15. 4 for real-time wireless sensor networks. In Proceedings 20th IEEE international parallel & distributed processing symposium (p. 8). IEEE.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Authors and Affiliations

  1. 1.Department of Computer Engineering, Ahvaz BranchIslamic Azad UniversityAhvazIran
  2. 2.Department of Computer EngineeringHigher Educational Complex of SaravanSaravanIran

Personalised recommendations