Intelligent Security Management and Control in the IoT. Mohamed-Aymen Chalouf
Чтение книги онлайн.

Читать онлайн книгу Intelligent Security Management and Control in the IoT - Mohamed-Aymen Chalouf страница 18

СКАЧАТЬ (2020) makes a recursive Bayesian estimation of the active terminals in each class, and depending on this estimation some preambles are allocated to different classes. The algorithm was then improved by assigning an ACB blocking factors to each of the classes, independently of the others, for better congestion control. In Jin et al. (2017), a recursive Bayesian estimation of the active terminals, based on the number of unchosen preambles, makes it possible to calculate a blocking factor for those arrivals from the terminals that are sporadic in character. Performance of the EAB technique is studied in Cheng et al. (2015) for LTE-A networks. The optimal values of the radio messaging cycle as well as the periodicity of SIB14 are then derived by submitting the analytic model to targeted QoS constraints.

      In this chapter, we base ourselves on an estimator proposed in an earlier work (Bouzouita et al. 2019) and unlike the work cited above, we use reinforcement learning techniques, especially the TD3 algorithm, to calculate an optimal blocking factor from a set of past estimations. To our knowledge, this is the first time that this type of algorithm has been used in managing massive access to terminals in NB-IoT networks, excepting our previous contribution (Hadjadj-Aoul and Ait-Chellouche 2020).

      The model proposed represents an overview of IoT devices executing the ACB algorithm. During the random access attempt, the IoT devices compete for the same available preambles. As the 3GPP standard indicates, the number of preambles N should be an integer as explained in section 2.3 (ETSI 2011).

      During each access opportunity (i.e. Random Access Channel, RACH), these preambles are divided into successful preambles, chosen by a single device, in collision, chosen by two or more devices, and free, not chosen by any of these devices.

      In what follows, we calculate the average values of these quantities, which we determined in Bouzouita et al. (2015). These will thereafter be used by our algorithms.

      Let us define qN=1 – 1/N. The average number of successful preambles NS, during RACH opportunities, is given as follows (this is a classic problem of throwing balls into bins):

      From [2.1] and [2.2], we obtain the expected number of failed preambles NF:

      [2.4] Image

      The modeled system is an approximation of reality in many ways, especially where it concerns the fixed and limited number of access attempts. However, we preferred to simplify the model to make it more tractable (Figure 2.5).

Schematic illustration of the system model.

      Figure 2.5. System model. For a color version of this figure, see www.iste.co.uk/chalouf/intelligent.zip

      The proposed model is fluid: the quantities involved and the whole numbers are considered to be real (continuous) quantities. The parameters used are listed below:

       – x1(t) is the number of waiting devices;

       – x1,L(t) is the number of blocked devices, after a failure at the end of an access attempt (i.e. ACB);

       – x2(t) is the total number of devices that pass the ACB control and wait to start the random access attempt (RA);

       – x2,L(t) is the number of blocked devices, at instant t, after a failed RA attempt, awaiting a new attempt;

       – λ is the arrival rate of IoT objects;

       – μ is the rate of objects that can reattempt ACB after a failure;

       – θ1 is the RA failure rate, which is equal to when θ is equal to 0 (see the point before last);

       – θ2 is the rate of objects that can attempt access after a failure;

       – θ is the rate at which the device abandons transmission after having reached the maximum number of RA attempts; in a correctly dimensioned system, we should have θ = 0;

       – p is the ACB blocking factor.

      We are now able to describe the evolution of state variables Image and Image basing our study on the model represented in Figure 2.5. The model’s dynamic is described by the following system of differential equations:

      [2.5] Image

      In what follows, we suppose that θ = 0, to simplify the model. In fact, a system where the devices often reach the maximum number of attempts is an unstable system, which we naturally try to avoid.

      Although the state is not observable, it is possible to produce an estimation of the average number of devices attempting access СКАЧАТЬ