SlideShare a Scribd company logo
Machine Learning (ML) in Wireless Sensor Networks (WSNs)
Mohammad Abu Alsheikh
School of Computer Engineering
Nanyang Technological University
June 2014
1 / 25
Survey and summary of the field
This material is based on our recently published survey article:
Alsheikh, M.A.; Lin, S.; Niyato, D.; Tan, Hwee-Pink, "Machine Learning in Wireless Sensor
Networks: Algorithms, Strategies, and Applications," IEEE Communications Surveys &
Tutorials, DOI: 10.1109/COMST.2014.2320099
2 / 25
Outline
Outline
1 Introduction
2 Machine learning (ML) algorithms
3 Functional challenges
4 Non-functional challenges
5 Some open research directions
6 Summary
3 / 25
Introduction Motivation
Motivation
A wireless sensor network (WSN) is composed of multiple autonomous, tiny, low cost and
low power sensor nodes that gather data about their environment and collaborate to
forward sensed data to centralized backend units
Machine learning (ML) is the adoption of computational methods for improving machine
performance by detecting and describing consistencies and patterns in training data [LS95]
ML was introduced in the late 1950’s as a technique for artificial intelligence (AI) [Ayo10]
4 / 25
Introduction Motivation
Why machine learning is important
Wireless sensor networks monitor dynamic environments that change rapidly over time.
This dynamic behavior is either caused by external factors or initiated by the system
designers themselves
To adapt to such conditions, sensor networks often adopt machine learning techniques to
eliminate the need for unnecessary redesign. Machine learning also inspires many
practical solutions that maximize resource utilization and prolong the lifespan of the
network
5 / 25
Introduction Motivation
Summary of benefits (1)
Machine learning is important in WSN applications for the following main reasons:
Sensor networks usually monitor dynamic environments that change rapidly over time,
and it is desirable to develop sensor networks that can adapt and operate efficiently in
such environments.
In some applications, due to the unexpected behavior patterns that may arise in such
scenarios, system designers may develop solutions that initially may not operate as
expected. System designers would rather have robust ML algorithms that are able to
calibrate itself to newly acquired knowledge.
WSNs are usually deployed in complicated environments where researchers cannot build
accurate mathematical models to describe the system behavior. Meanwhile, some tasks in
WSNs can be prescribed using simple mathematical models but may still need complex
algorithms to solve them (e.g., the routing problem [KEW02, AKK04]). Under similar
circumstances, ML provides low-complexity estimates for the system model.
6 / 25
Introduction Motivation
Summary of benefits (2)
Sensor network designers often have access to large amounts of data but may be unable to
extract important correlations in them, e.g., in node connectivity and energy sustainability.
ML methods can then be used to discover important correlations in the sensor data
New uses and integrations of WSNs, such as in cyber-physical systems (CPS),
machine-to-machine (M2M) communications, and Internet of things (IoT) technologies,
have been introduced with a motivation of supporting more intelligent decision-making
and autonomous control [WCX+13]. Here, Machine learning methods can then be used
to discover important correlations in the sensor data with limited human intervention
[Ben09].
7 / 25
Introduction Motivation
Drawbacks and limitations
However, there are a few drawbacks and limitations that should be considered:
1 As a resource limited framework, WSN drains a considerable percentage of its energy
budget to predict the accurate hypothesis and extract the consensus relationship among
data samples. Thus, the designers should consider the trade-off between the
algorithm’s computational requirements and the learned model’s accuracy
2 Generally speaking, learning by examples requires a large data set of samples to achieve
the intended generalization capabilities (i.e., fairly small error bounds), and the
algorithm’s designer will not have the full control over the knowledge formulation process
[Hof90]
8 / 25
Machine learning (ML) algorithms
Overview
ML experts recognize it as a rich field with very large themes and patterns. Understanding
such themes will be beneficial to those who wish to apply machine learning to WSNs.
1 Supervised learning: algorithms are provided with a labeled training data set. This set is
used to build the system model representing the learned relation between the input,
output and system parameters
2 Unsupervised learning: algorithms are not provided with labels (i.e., there is no output
vector). Basically, the goal of an unsupervised learning algorithm is to classify the sample
sets to different groups (i.e., clusters) by investigating the similarity between the input
samples
3 Reinforcement learning (RL): the agent, e.g., sensor node, learns by interacting with its
environment (i.e., online learning)
9 / 25
Machine learning (ML) algorithms Supervised learning
Supervised learning
In supervised learning, a labeled training set (i.e., predefined inputs and known outputs) is
used to build the system model. This model is used to represent the learned relation between
the input, output and system parameters. Widely known examples of such algorithms are:
1 K-nearest neighbor (k-NN)
2 Decision tree (DT)
3 Neural networks (NNs)
4 Support vector machines (SVMs)
5 Bayesian statistics
10 / 25
Machine learning (ML) algorithms Unsupervised learning
Unsupervised learning
Unsupervised learners are not provided with labels (i.e., there is no output vector). Basically,
the goal of an unsupervised learning algorithm is to classify the sample set into different
groups by investigating the similarity between them. Examples of such methods are:
1 K-means clustering
2 Principal component analysis (PCA)
3 Self-organizing maps (or Kohonen’s maps)
11 / 25
Machine learning (ML) algorithms Reinforcement Learning
Reinforcement learning (RL)
Reinforcement learning enables an agent (e.g., a sensor node) to learn by interacting with its
environment. The agent will learn to take the best actions that maximize its long-term
rewards by using its own experience.
1 Q-learning
12 / 25
Functional challenges
Overview
In the design of WSNs, it is important to consider power and memory constraints of sensor
nodes, topology changes, communication link failures, and decentralized management
Machine learning paradigms have been successfully adopted to address various functional
challenges of wireless sensor networks such as energy aware and real-time routing, query
processing and event detection, localization, node clustering and data aggregation
13 / 25
Functional challenges Routing in WSNs
Routing in WSNs
Machine learning allows a sensor network to learn from previous experiences, make optimal
routing actions and adapt to the dynamic environment. The benefits can be summarized as
follows:
1 Able to learn the optimal routing paths that will result in energy saving and prolonging
the lifetime of dynamically changing WSNs
2 Reduce the complexity of a typical routing problem by dividing it into simpler sub-routing
problems. In each sub-problem, nodes formulate the graph structures by considering only
their local neighbors, thus achieving low cost, efficient and real-time routing
3 Meet QoS requirements in routing problem using relatively simple computational methods
and classifiers
14 / 25
Functional challenges Clustering and data aggregation
Clustering & data aggregation
Principally, ML techniques improve the operation of node clustering and data aggregation as
follows:
1 Usage of machine learning to compress data locally at cluster heads by efficiently
extracting similarity and dissimilarity (e.g., from faulty nodes) in different sensors’ readings
2 Machine learning algorithms are employed to efficiently elect the cluster head, where
appropriate cluster head selection will significantly reduce energy consumption and
enhance the network’s lifetime
15 / 25
Functional challenges Event detection and query processing
Event detection & query processing
Fundamentally, ML offers solutions to restrict query areas and assess event validity for efficient
event detection and query processing mechanisms. This adoption will result in the following
benefits:
1 Learning algorithms enable the development of efficient event detection mechanisms with
limited requirements of storage and computing resources. Besides they are able to assess
the accuracy of such events using simple classifiers
2 Machine learning facilitates the development of effective query processing techniques for
WSNs, that determine the search regions whenever a query is received without flooding
the whole network
16 / 25
Functional challenges Localization and targeting objects
Localization & targeting objects
Sensor nodes may encounter changes in their location after deployment (e.g., due to
movement). The benefits of using machine learning algorithms in sensor node localization
process can be summarized as follows:
1 Converting the relative locations of nodes to absolute ones using few anchor points. This
will eliminate the need for range measurement hardware to obtain distance estimations
2 In surveillance and object targeting systems, machine learning can be used to divide the
monitored sites into a number of clusters, where each cluster represents specific location
indicator
17 / 25
Functional challenges Medium access control (MAC)
Medium access control (MAC)
Recently, machine learning methods have been used to enhance the performance of MAC
protocols in WSNs. Specifically, this is achieved through the following points:
1 Machine learning can be used to adaptively determine the duty cycle of a node using the
transmission history of the network. In particular, the nodes, which are able to predict
when the other nodes’ transmissions will finish, can sleep in the meantime and wake up
(to transmit data) just when the channel is expected to be idle (i.e., when no other node
is transmitting)
2 Achieving secured data transmission by combining the concepts of machine learning and
MAC protocols. Such MAC layer security schemes are independent of the proposed
application and are able to iteratively learn sporadic attack patterns
18 / 25
Non-functional challenges
Overview
Non-functional requirements include specifications that are not related to the basic operational
behavior of the system. For example, WSN designers may need to ensure that the proposed
solution is always capable of providing up-to-date information about the monitored
environment
19 / 25
Non-functional challenges Security and anomaly intrusion detection
Security & anomaly intrusion detection
Basically, WSN security enhancements by adopting machine learning techniques will result in
the following earnings:
1 Save node’s energy and significantly expand WSN lifetime by preventing the transmission
of the outlier, misleading data
2 Enhance network reliability by eliminating faulty and malicious readings. In the same way,
avoiding the discovery of unexpected knowledge that will be converted to important, and
often critical actions
3 Online learning and prevention (without human intervention) of malicious attacks and
vulnerabilities
20 / 25
Non-functional challenges Quality of service (QoS), data integrity and fault detection
QoS, data integrity & fault detection
In the following, we review the latest efforts of using machine learning techniques to achieve
specific QoS and data integrity constraints. In brief, this adoption results in the following
advantages:
1 Different machine learning classifiers are used to recognize different types of streams, thus
eliminating the need for flow-aware management techniques
2 The requirements for QoS guarantee, data integrity and fault detection depend on the
network service and application. Machine learning methods are able to handle much of
this while ensuring efficient resource utilization, mainly bandwidth and power utilization
21 / 25
Non-functional challenges Miscellaneous applications
Miscellaneous applications
Moreover, there are many other applications such as
1 Resource management
2 Clock synchronization
3 Air quality monitoring
4 Intelligent lighting control
22 / 25
Some open research directions
Future applications
Although machine learning techniques have been applied to many applications in WSNs, many
issues are still open and need further research efforts.
1 Compressive sensing and sparse coding
2 Distributed and adaptive machine learning techniques for WSNs
3 Resource management using machine learning
4 Detecting data spatial and temporal correlations using hierarchical clustering
23 / 25
Summary
Conclusions
Wireless sensor networks require innovative solutions for energy aware and real-time
routing, security, scheduling, localization, node clustering, data aggregation, fault
detection and data integrity
Machine learning provides a collection of techniques to enhance the ability of wireless
sensor network to adapt to the dynamic behavior of its surrounding environment
24 / 25
References
References
Jamal N Al-Karaki and Ahmed E Kamal.
Routing techniques in wireless sensor networks: A survey.
IEEE Wireless Communications, 11(6):6–28, 2004.
Taiwo Oladipupo Ayodele.
Introduction to machine learning.
In New Advances in Machine Learning. InTech, 2010.
Yoshua Bengio.
Learning deep architectures for AI.
Foundations and Trends in Machine Learning, 2(1):1–127, 2009.
Achim G Hoffmann.
General limitations on machine learning, 1990.
B. Krishnamachari, D. Estrin, and S. Wicker.
The impact of data aggregation in wireless sensor networks.
In 22nd International Conference on Distributed Computing Systems Workshops, pages 575–578, 2002.
Pat Langley and Herbert A Simon.
Applications of machine learning and rule induction.
Communications of the ACM, 38(11):54–64, 1995.
Jiafu Wan, Min Chen, Feng Xia, Li Di, and Keliang Zhou.
From machine-to-machine communications towards cyber-physical systems.
Computer Science and Information Systems, 10:1105–1128, 2013.
25 / 25

More Related Content

What's hot

Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
Roma Vyas
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
KABILESH RAMAR
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
Sohebuzzaman Khan
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
Mastan Shaik
 
Machine learning for wireless networks @Bestcom2016
Machine learning for wireless networks @Bestcom2016Machine learning for wireless networks @Bestcom2016
Machine learning for wireless networks @Bestcom2016
Merima Kulin
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
Akash Raghunath
 
Introduction Of Artificial neural network
Introduction Of Artificial neural networkIntroduction Of Artificial neural network
Introduction Of Artificial neural network
Nagarajan
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
Jagdeep Singh
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
Mangesh Vasu
 
Manet
ManetManet
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
Varsha Anandani
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
Mshari Alabdulkarim
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Chandra Meena
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
barodia_1437
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Network
mdfarhanh1
 
Satellite communication
Satellite communicationSatellite communication
Satellite communication
Needa Multani
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
Richa Kumari
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 

What's hot (20)

Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
Machine learning for wireless networks @Bestcom2016
Machine learning for wireless networks @Bestcom2016Machine learning for wireless networks @Bestcom2016
Machine learning for wireless networks @Bestcom2016
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Introduction Of Artificial neural network
Introduction Of Artificial neural networkIntroduction Of Artificial neural network
Introduction Of Artificial neural network
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
 
Manet
ManetManet
Manet
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Network
 
Satellite communication
Satellite communicationSatellite communication
Satellite communication
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 

Similar to Machine Learning (ML) in Wireless Sensor Networks (WSNs)

ML-Approach-for-Telecom-Network-Operations-Management.pptx
ML-Approach-for-Telecom-Network-Operations-Management.pptxML-Approach-for-Telecom-Network-Operations-Management.pptx
ML-Approach-for-Telecom-Network-Operations-Management.pptx
ssuser818de4
 
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Shakas Technologies
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
IJNSA Journal
 
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
IJNSA Journal
 
Camp finall
Camp finallCamp finall
Camp finall
Rowshina Nikzad
 
IRJET - A Survey on Machine Learning Algorithms, Techniques and Applications
IRJET - A Survey on Machine Learning Algorithms, Techniques and ApplicationsIRJET - A Survey on Machine Learning Algorithms, Techniques and Applications
IRJET - A Survey on Machine Learning Algorithms, Techniques and Applications
IRJET Journal
 
Knowledge defined networking
Knowledge defined networkingKnowledge defined networking
Knowledge defined networking
Pavel Ivanov
 
First Year Report, PhD presentation
First Year Report, PhD presentationFirst Year Report, PhD presentation
First Year Report, PhD presentation
Bang Xiang Yong
 
Controller selection in software defined networks using best-worst multi-crit...
Controller selection in software defined networks using best-worst multi-crit...Controller selection in software defined networks using best-worst multi-crit...
Controller selection in software defined networks using best-worst multi-crit...
journalBEEI
 
Micro Electro Mechanical Systems (MEMS) - Lecture 05
Micro Electro Mechanical Systems (MEMS) - Lecture 05Micro Electro Mechanical Systems (MEMS) - Lecture 05
Micro Electro Mechanical Systems (MEMS) - Lecture 05
Manipal Institute of Technology
 
Sensor tasking and control
Sensor tasking and controlSensor tasking and control
Sensor tasking and control
chitra raju
 
C1804011117
C1804011117C1804011117
C1804011117
IOSR Journals
 
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
ServiceWave 2010
 
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
ijwmn
 
M3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
M3AT: Monitoring Agents Assignment Model for the Data-Intensive ApplicationsM3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
M3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
VladislavKashansky
 
Soft Computing based Learning for Cognitive Radio
Soft Computing based Learning for Cognitive RadioSoft Computing based Learning for Cognitive Radio
Soft Computing based Learning for Cognitive Radio
idescitation
 
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...
sunda2011
 
Intrusion Detection System using K-Means Clustering and SMOTE
Intrusion Detection System using K-Means Clustering and SMOTEIntrusion Detection System using K-Means Clustering and SMOTE
Intrusion Detection System using K-Means Clustering and SMOTE
IRJET Journal
 
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)
Eswar Publications
 
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
cscpconf
 

Similar to Machine Learning (ML) in Wireless Sensor Networks (WSNs) (20)

ML-Approach-for-Telecom-Network-Operations-Management.pptx
ML-Approach-for-Telecom-Network-Operations-Management.pptxML-Approach-for-Telecom-Network-Operations-Management.pptx
ML-Approach-for-Telecom-Network-Operations-Management.pptx
 
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
Cyber attack Correlation and Mitigation for Distribution Systems via Machine ...
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
 
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
 
Camp finall
Camp finallCamp finall
Camp finall
 
IRJET - A Survey on Machine Learning Algorithms, Techniques and Applications
IRJET - A Survey on Machine Learning Algorithms, Techniques and ApplicationsIRJET - A Survey on Machine Learning Algorithms, Techniques and Applications
IRJET - A Survey on Machine Learning Algorithms, Techniques and Applications
 
Knowledge defined networking
Knowledge defined networkingKnowledge defined networking
Knowledge defined networking
 
First Year Report, PhD presentation
First Year Report, PhD presentationFirst Year Report, PhD presentation
First Year Report, PhD presentation
 
Controller selection in software defined networks using best-worst multi-crit...
Controller selection in software defined networks using best-worst multi-crit...Controller selection in software defined networks using best-worst multi-crit...
Controller selection in software defined networks using best-worst multi-crit...
 
Micro Electro Mechanical Systems (MEMS) - Lecture 05
Micro Electro Mechanical Systems (MEMS) - Lecture 05Micro Electro Mechanical Systems (MEMS) - Lecture 05
Micro Electro Mechanical Systems (MEMS) - Lecture 05
 
Sensor tasking and control
Sensor tasking and controlSensor tasking and control
Sensor tasking and control
 
C1804011117
C1804011117C1804011117
C1804011117
 
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
Maurer, Sakellariou, Brandic : Simulating Autonomic SLA Enactment in Clouds u...
 
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
 
M3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
M3AT: Monitoring Agents Assignment Model for the Data-Intensive ApplicationsM3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
M3AT: Monitoring Agents Assignment Model for the Data-Intensive Applications
 
Soft Computing based Learning for Cognitive Radio
Soft Computing based Learning for Cognitive RadioSoft Computing based Learning for Cognitive Radio
Soft Computing based Learning for Cognitive Radio
 
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...
 
Intrusion Detection System using K-Means Clustering and SMOTE
Intrusion Detection System using K-Means Clustering and SMOTEIntrusion Detection System using K-Means Clustering and SMOTE
Intrusion Detection System using K-Means Clustering and SMOTE
 
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)
 
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
A SIMPLE PROCESS TO SPEED UP MACHINE LEARNING METHODS: APPLICATION TO HIDDEN ...
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 

Machine Learning (ML) in Wireless Sensor Networks (WSNs)

  • 1. Machine Learning (ML) in Wireless Sensor Networks (WSNs) Mohammad Abu Alsheikh School of Computer Engineering Nanyang Technological University June 2014 1 / 25
  • 2. Survey and summary of the field This material is based on our recently published survey article: Alsheikh, M.A.; Lin, S.; Niyato, D.; Tan, Hwee-Pink, "Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications," IEEE Communications Surveys & Tutorials, DOI: 10.1109/COMST.2014.2320099 2 / 25
  • 3. Outline Outline 1 Introduction 2 Machine learning (ML) algorithms 3 Functional challenges 4 Non-functional challenges 5 Some open research directions 6 Summary 3 / 25
  • 4. Introduction Motivation Motivation A wireless sensor network (WSN) is composed of multiple autonomous, tiny, low cost and low power sensor nodes that gather data about their environment and collaborate to forward sensed data to centralized backend units Machine learning (ML) is the adoption of computational methods for improving machine performance by detecting and describing consistencies and patterns in training data [LS95] ML was introduced in the late 1950’s as a technique for artificial intelligence (AI) [Ayo10] 4 / 25
  • 5. Introduction Motivation Why machine learning is important Wireless sensor networks monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves To adapt to such conditions, sensor networks often adopt machine learning techniques to eliminate the need for unnecessary redesign. Machine learning also inspires many practical solutions that maximize resource utilization and prolong the lifespan of the network 5 / 25
  • 6. Introduction Motivation Summary of benefits (1) Machine learning is important in WSN applications for the following main reasons: Sensor networks usually monitor dynamic environments that change rapidly over time, and it is desirable to develop sensor networks that can adapt and operate efficiently in such environments. In some applications, due to the unexpected behavior patterns that may arise in such scenarios, system designers may develop solutions that initially may not operate as expected. System designers would rather have robust ML algorithms that are able to calibrate itself to newly acquired knowledge. WSNs are usually deployed in complicated environments where researchers cannot build accurate mathematical models to describe the system behavior. Meanwhile, some tasks in WSNs can be prescribed using simple mathematical models but may still need complex algorithms to solve them (e.g., the routing problem [KEW02, AKK04]). Under similar circumstances, ML provides low-complexity estimates for the system model. 6 / 25
  • 7. Introduction Motivation Summary of benefits (2) Sensor network designers often have access to large amounts of data but may be unable to extract important correlations in them, e.g., in node connectivity and energy sustainability. ML methods can then be used to discover important correlations in the sensor data New uses and integrations of WSNs, such as in cyber-physical systems (CPS), machine-to-machine (M2M) communications, and Internet of things (IoT) technologies, have been introduced with a motivation of supporting more intelligent decision-making and autonomous control [WCX+13]. Here, Machine learning methods can then be used to discover important correlations in the sensor data with limited human intervention [Ben09]. 7 / 25
  • 8. Introduction Motivation Drawbacks and limitations However, there are a few drawbacks and limitations that should be considered: 1 As a resource limited framework, WSN drains a considerable percentage of its energy budget to predict the accurate hypothesis and extract the consensus relationship among data samples. Thus, the designers should consider the trade-off between the algorithm’s computational requirements and the learned model’s accuracy 2 Generally speaking, learning by examples requires a large data set of samples to achieve the intended generalization capabilities (i.e., fairly small error bounds), and the algorithm’s designer will not have the full control over the knowledge formulation process [Hof90] 8 / 25
  • 9. Machine learning (ML) algorithms Overview ML experts recognize it as a rich field with very large themes and patterns. Understanding such themes will be beneficial to those who wish to apply machine learning to WSNs. 1 Supervised learning: algorithms are provided with a labeled training data set. This set is used to build the system model representing the learned relation between the input, output and system parameters 2 Unsupervised learning: algorithms are not provided with labels (i.e., there is no output vector). Basically, the goal of an unsupervised learning algorithm is to classify the sample sets to different groups (i.e., clusters) by investigating the similarity between the input samples 3 Reinforcement learning (RL): the agent, e.g., sensor node, learns by interacting with its environment (i.e., online learning) 9 / 25
  • 10. Machine learning (ML) algorithms Supervised learning Supervised learning In supervised learning, a labeled training set (i.e., predefined inputs and known outputs) is used to build the system model. This model is used to represent the learned relation between the input, output and system parameters. Widely known examples of such algorithms are: 1 K-nearest neighbor (k-NN) 2 Decision tree (DT) 3 Neural networks (NNs) 4 Support vector machines (SVMs) 5 Bayesian statistics 10 / 25
  • 11. Machine learning (ML) algorithms Unsupervised learning Unsupervised learning Unsupervised learners are not provided with labels (i.e., there is no output vector). Basically, the goal of an unsupervised learning algorithm is to classify the sample set into different groups by investigating the similarity between them. Examples of such methods are: 1 K-means clustering 2 Principal component analysis (PCA) 3 Self-organizing maps (or Kohonen’s maps) 11 / 25
  • 12. Machine learning (ML) algorithms Reinforcement Learning Reinforcement learning (RL) Reinforcement learning enables an agent (e.g., a sensor node) to learn by interacting with its environment. The agent will learn to take the best actions that maximize its long-term rewards by using its own experience. 1 Q-learning 12 / 25
  • 13. Functional challenges Overview In the design of WSNs, it is important to consider power and memory constraints of sensor nodes, topology changes, communication link failures, and decentralized management Machine learning paradigms have been successfully adopted to address various functional challenges of wireless sensor networks such as energy aware and real-time routing, query processing and event detection, localization, node clustering and data aggregation 13 / 25
  • 14. Functional challenges Routing in WSNs Routing in WSNs Machine learning allows a sensor network to learn from previous experiences, make optimal routing actions and adapt to the dynamic environment. The benefits can be summarized as follows: 1 Able to learn the optimal routing paths that will result in energy saving and prolonging the lifetime of dynamically changing WSNs 2 Reduce the complexity of a typical routing problem by dividing it into simpler sub-routing problems. In each sub-problem, nodes formulate the graph structures by considering only their local neighbors, thus achieving low cost, efficient and real-time routing 3 Meet QoS requirements in routing problem using relatively simple computational methods and classifiers 14 / 25
  • 15. Functional challenges Clustering and data aggregation Clustering & data aggregation Principally, ML techniques improve the operation of node clustering and data aggregation as follows: 1 Usage of machine learning to compress data locally at cluster heads by efficiently extracting similarity and dissimilarity (e.g., from faulty nodes) in different sensors’ readings 2 Machine learning algorithms are employed to efficiently elect the cluster head, where appropriate cluster head selection will significantly reduce energy consumption and enhance the network’s lifetime 15 / 25
  • 16. Functional challenges Event detection and query processing Event detection & query processing Fundamentally, ML offers solutions to restrict query areas and assess event validity for efficient event detection and query processing mechanisms. This adoption will result in the following benefits: 1 Learning algorithms enable the development of efficient event detection mechanisms with limited requirements of storage and computing resources. Besides they are able to assess the accuracy of such events using simple classifiers 2 Machine learning facilitates the development of effective query processing techniques for WSNs, that determine the search regions whenever a query is received without flooding the whole network 16 / 25
  • 17. Functional challenges Localization and targeting objects Localization & targeting objects Sensor nodes may encounter changes in their location after deployment (e.g., due to movement). The benefits of using machine learning algorithms in sensor node localization process can be summarized as follows: 1 Converting the relative locations of nodes to absolute ones using few anchor points. This will eliminate the need for range measurement hardware to obtain distance estimations 2 In surveillance and object targeting systems, machine learning can be used to divide the monitored sites into a number of clusters, where each cluster represents specific location indicator 17 / 25
  • 18. Functional challenges Medium access control (MAC) Medium access control (MAC) Recently, machine learning methods have been used to enhance the performance of MAC protocols in WSNs. Specifically, this is achieved through the following points: 1 Machine learning can be used to adaptively determine the duty cycle of a node using the transmission history of the network. In particular, the nodes, which are able to predict when the other nodes’ transmissions will finish, can sleep in the meantime and wake up (to transmit data) just when the channel is expected to be idle (i.e., when no other node is transmitting) 2 Achieving secured data transmission by combining the concepts of machine learning and MAC protocols. Such MAC layer security schemes are independent of the proposed application and are able to iteratively learn sporadic attack patterns 18 / 25
  • 19. Non-functional challenges Overview Non-functional requirements include specifications that are not related to the basic operational behavior of the system. For example, WSN designers may need to ensure that the proposed solution is always capable of providing up-to-date information about the monitored environment 19 / 25
  • 20. Non-functional challenges Security and anomaly intrusion detection Security & anomaly intrusion detection Basically, WSN security enhancements by adopting machine learning techniques will result in the following earnings: 1 Save node’s energy and significantly expand WSN lifetime by preventing the transmission of the outlier, misleading data 2 Enhance network reliability by eliminating faulty and malicious readings. In the same way, avoiding the discovery of unexpected knowledge that will be converted to important, and often critical actions 3 Online learning and prevention (without human intervention) of malicious attacks and vulnerabilities 20 / 25
  • 21. Non-functional challenges Quality of service (QoS), data integrity and fault detection QoS, data integrity & fault detection In the following, we review the latest efforts of using machine learning techniques to achieve specific QoS and data integrity constraints. In brief, this adoption results in the following advantages: 1 Different machine learning classifiers are used to recognize different types of streams, thus eliminating the need for flow-aware management techniques 2 The requirements for QoS guarantee, data integrity and fault detection depend on the network service and application. Machine learning methods are able to handle much of this while ensuring efficient resource utilization, mainly bandwidth and power utilization 21 / 25
  • 22. Non-functional challenges Miscellaneous applications Miscellaneous applications Moreover, there are many other applications such as 1 Resource management 2 Clock synchronization 3 Air quality monitoring 4 Intelligent lighting control 22 / 25
  • 23. Some open research directions Future applications Although machine learning techniques have been applied to many applications in WSNs, many issues are still open and need further research efforts. 1 Compressive sensing and sparse coding 2 Distributed and adaptive machine learning techniques for WSNs 3 Resource management using machine learning 4 Detecting data spatial and temporal correlations using hierarchical clustering 23 / 25
  • 24. Summary Conclusions Wireless sensor networks require innovative solutions for energy aware and real-time routing, security, scheduling, localization, node clustering, data aggregation, fault detection and data integrity Machine learning provides a collection of techniques to enhance the ability of wireless sensor network to adapt to the dynamic behavior of its surrounding environment 24 / 25
  • 25. References References Jamal N Al-Karaki and Ahmed E Kamal. Routing techniques in wireless sensor networks: A survey. IEEE Wireless Communications, 11(6):6–28, 2004. Taiwo Oladipupo Ayodele. Introduction to machine learning. In New Advances in Machine Learning. InTech, 2010. Yoshua Bengio. Learning deep architectures for AI. Foundations and Trends in Machine Learning, 2(1):1–127, 2009. Achim G Hoffmann. General limitations on machine learning, 1990. B. Krishnamachari, D. Estrin, and S. Wicker. The impact of data aggregation in wireless sensor networks. In 22nd International Conference on Distributed Computing Systems Workshops, pages 575–578, 2002. Pat Langley and Herbert A Simon. Applications of machine learning and rule induction. Communications of the ACM, 38(11):54–64, 1995. Jiafu Wan, Min Chen, Feng Xia, Li Di, and Keliang Zhou. From machine-to-machine communications towards cyber-physical systems. Computer Science and Information Systems, 10:1105–1128, 2013. 25 / 25