Next Article in Journal
Super Resolution Generative Adversarial Network (SRGANs) for Wheat Stripe Rust Classification
Previous Article in Journal
A Bibliometric Network Analysis of Recent Publications on Digital Agriculture to Depict Strategic Themes and Evolution Structure
Previous Article in Special Issue
Modeling and Performance Analysis of Opportunistic Link Selection for UAV Communication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Intelligent Dynamic Real-Time Spectrum Resource Management for Industrial IoT in Edge Computing

1
Department of Electronic Engineering, Soongsil University, Seoul 06978, Korea
2
School of Electronic Engineering, Soongsil University, Seoul 06978, Korea
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(23), 7902; https://doi.org/10.3390/s21237902
Submission received: 19 October 2021 / Revised: 20 November 2021 / Accepted: 24 November 2021 / Published: 26 November 2021
(This article belongs to the Special Issue Advances in Cognitive Radio Networks)

Abstract

:
Intelligent dynamic spectrum resource management, which is based on vast amounts of sensing data from industrial IoT in the space–time and frequency domains, uses optimization algorithm-based decisions to minimize levels of interference, such as energy consumption, power control, idle channel allocation, time slot allocation, and spectrum handoff. However, these techniques make it difficult to allocate resources quickly and waste valuable solution information that is optimized according to the evolution of spectrum states in the space–time and frequency domains. Therefore, in this paper, we propose the implementation of intelligent dynamic real-time spectrum resource management through the application of data mining and case-based reasoning, which reduces the complexity of existing intelligent dynamic spectrum resource management and enables efficient real-time resource allocation. In this case, data mining and case-based reasoning analyze the activity patterns of incumbent users using vast amounts of sensing data from industrial IoT and enable rapid resource allocation, making use of case DB classified by case. In this study, we confirmed a number of optimization engine operations and spectrum resource management capabilities (spectrum handoff, handoff latency, energy consumption, and link maintenance) to prove the effectiveness of the proposed intelligent dynamic real-time spectrum resource management. These indicators prove that it is possible to minimize the complexity of existing intelligent dynamic spectrum resource management and maintain efficient real-time resource allocation and reliable communication; also, the above findings confirm that our method can achieve a superior performance to that of existing spectrum resource management techniques.

1. Introduction

Based on the recent development of the Internet of Things (IoT), a paradigm shift is rapidly occurring in computing technology, creating the ability to effectively process large amounts of data generated by various industrial IoT devices [1]. According to the International Data Corporation, by 2025 there will be 44.1 billion internet-connected IoT devices generating close to 79.4 zettabytes of data [2], representing a significant departure from major end–end smart device terminals to the machines, sensors, and cameras that constitute the IoT. Gartner also predicted that approximately 10% of enterprise-generated data is already being processed outside of centralized data centers or the cloud, and that this number will reach approximately 75% by 2025 [3]. This suggests that cloud computing with a centralized computing structure has limitations in terms of accommodating Industrial IoT services requiring real-time processing, such as smart factories, smart farms, and autonomous vehicles. Therefore, due to the risk of overloading cloud servers based on the exponentially increasing data volume and network traffic, the transition of computing from the current remote clouds to a new paradigm of network edges within the radio access network is expected to gain popularity [4,5,6].
Edge computing is a distributed computing pattern that brings computation and data storage closer to the sources of data. This means when computing services are processed in a location close to the terminal user device, the user can receive faster and more stable services and can benefit from flexible hybrid cloud computing. This method is particularly effective for overcoming the problem of long latency, an issue that must be overcome to achieve real-time data processing and decision-making in smart factories using the IoT. It also supports real-time decision-making through sensing data collection and analysis. however as shown in Table 1, The demand for access to finite spectrum resource is increasing, as new technologies allow a variety of applications to make use of a broader range of frequency bands [7,8,9,10,11,12].
This in turn results frequent spectrum handoffs in dynamic spectrum environments that require machine type device (MTD) operation in real time, which may lead to serious performance degradation owing to interference with other homogeneous networks. Therefore, dynamic optimization according to time-varying parameters, such as channel state information, is preferable.
To achieve this, the previously studied intelligent dynamic spectrum resource management [13] constitutes an infrastructure-based WRAN in which a base station utilizing the TV White Space (TVWS) band controls IoT devices in a suburban area with limited broadband access support according to the IEEE 802.22 WRAN standard [14,15,16]. Each base station forms a single wireless network and has a learning, reasoning, and optimization engine structure made possible through database access, enabling dynamic spectrum resource management for coexistence between cells of the same network type existing in adjacent channels and locations. First, to facilitate timely handoffs to idle channels, the learning engine generates a list of backup channels through characterization, spectrum determination, and classification based on historic data representing the statistical information of the existing local network. A reasoning engine then uses the backup channel list to perform a spectrum handoff operation to another idle channel, enabling continuous communication without interfering with incumbent users. At this time, when interference is affected in incumbent users existing in adjacent channels and locations, transmission parameters that can coexist between neighboring networks are dynamically reconstructed through an optimization engine using interference analysis and genetic algorithms.
However, decision making based on the optimization algorithm increases computation time and complexity, making it difficult to rapidly allocate resources and wasting valuable solution information optimized according to the evolution of the spectrum state between the space–time and frequency domains [17,18]. Therefore, case-based reasoning is used in this study to reduce the complexity of intelligent dynamic spectrum resource management and achieve rapid resource allocation. However, if misclassified cases exist due to irregular patterns, system performance may deteriorate due to incorrect prediction; therefore, creating an accurate learning algorithm for case-specific data is imperative.
In this paper, we propose intelligent dynamic real-time spectrum resource management using data mining and case-based reasoning, as shown in Figure 1. The intelligent dynamic real-time spectrum resource management structure is largely divided into a CR Master and CR User. First, CR Master, which applies data mining and case-based reasoning, analyzes the activity patterns of existing users through data pre-processing and machine learning based on historyl data stored in the database and classifies them by case. In addition, when a new case is input, similarity verification is performed using the classified case DB. The CR User performs solution reuse and maintenance and update operations in case-based reasoning. At this time, the solution means the optimized transmission parameters and, depending on the suitability evaluation result achieved for the solution, a new solution is derived through solution retain or an optimization engine.
The intelligent dynamic real-time spectrum resource management operation is as follows. Initially, ① the sensing information of the Cognitive Radio (CR) User is transmitted to the database via the CR Master, which uses data mining at regular intervals to analyze the activity patterns of incumbent users from the historic data stored in the database. Data mining performs data collection, pre-processing, and machine learning operations for each reasoning cycle. When reasoning using case DB classified through data mining, ② CR Master determines whether or not to deliver solutions for cases similar to ones seen in the past through similarity verification. Subsequently, ③ in the idle channel reasoning process using the backup channel list, if the CR User affects influence of interference with the incumbent users existing in the adjacent channels or locations, the CR User operates the optimization engine according to the similarity verification result or ④ reuses the solution delivered from the CR Master. ⑤ The verification of the solution determines the operation of the optimization engine through Monte Carlo algorithm-based interference analysis, and ⑥ the optimized solution is updated in the case DB for the next reasoning.
The major contributions of this paper are as follows.
  • We developed an intelligent dynamic real-time spectrum resource management structure that combines data mining and case-based reasoning to minimize computational volume and complexity of existing spectrum resource management and enable rapid resource allocation within a limited time.
  • We provide insight into spectrum management issues in various fields through intelligent dynamic real-time spectrum resource management.
The composition of this paper uses data collection, data preprocessing, data mining. and artificial neural networks (ANNs) to analyze the activity patterns of incumbent users from historic data and compares and analyzes the prediction accuracy and spectrum resource management performance based on the number of IoT devices involved.

2. Data Mining

In general, vast amounts of sensing data from industrial IoT deployed in poor environments are frequently generated by repetitive and irregular data owing to various transmission errors, sensor malfunctions, and cases of external interference, which can eventually lead to poor performance due to incorrect predictions being made in case-based reasoning [19,20]. Therefore, we propose the use of data collection, data preprocessing, and ANN to effectively improve prediction performance through the accurate pattern learning of sensed data [21].

2.1. Data Collection

In this study, the CR master learns traffic patterns for each average occupancy probability as well as backup channel selection mechanisms using historic data representing the statistical characteristics of incumbent users at regular periodic intervals from the database.
Here, the historic data representing the statistical characteristics of the incumbent user use the ON/OFF process model represented by the incumbent user activity model in the CR network (CRN) [22]. The historic data configuration using the ON/OFF process model has different exponential distribution characteristics in the j-th channel and calculates the occupancy probability P o n j for each channel using λ o n j and λ o f f j , which indicate the average values for ON and OFF state retention times.
P o n j = λ o n j λ o n j + λ o f f j .
where j N , N = 1 , 2 , 3 , , n .
At this time, the occupancy status of the incumbent users per channel until the reasoning period T is based on the following conditional expression according to the above occupancy probability value.
C j ( T i ) = 0 , P o n j ( T i ) k 1 , P o n j ( T i ) > k
where i M , M = 1 , 2 , 3 , , m .
Here, k corresponds to a random number between zero and one and is randomly generated for each channel until a given time T. At this time, if the random number k in the j-th channel at time T i is greater than the occupied state probability, it is judged that the incumbent user is highly likely to be ‘OFF’ and the function returns a zero. Conversely, if the occupied state probability is high, then the incumbent user in the j-th channel is likely to be ‘ON’ and the function returns a one.
Figure 2 shows historic data representing the status information of incumbent users from the past to the present using such conditional expressions.

2.2. Data Preprocessing

In this study, data preprocessing process consisting of data cleaning, data reduction, outlier detection, and data scaling are performed using the history data defined in the data collection stage as shown in Figure 3 [23,24].
Data cleaning aims to construct new characteristics based on linear combinations of existing variables. As a representative linear feature extraction technique, a statistical feature extraction method calculates statistics such as the average or median of raw data within a specific time range [25]. However, severe time series fluctuations can lead to data loss, so statistical data samples were reduced to categorical data in this study. The term ’categorical data’ refers here to the frequency of values belonging to the corresponding interval, dividing the range of statistical data values into several intervals of the same size. Through this transformation, this method can minimize information loss and data size, effectively reducing the amount of computation required when analyzing large-scale data.
Following on from the above method, an occupancy probability P o n j representing the statistical characteristics of the sensed data within the total M time slots per channel is calculated in this study.
P o n j = 1 M i = 1 m C j ( T i )
At this time, the interval width Δ x divided based on the specified number of intervals L within the categorical data set range (min, max) is defined as follows:
Δ x = m a x m i n L
If P o n j exists in the range of ± 0.5 Δ x based on the k-th median value χ k among pieces of statistical data, it is defined as one; otherwise, it is zero. In this case, the frequency of the appearance of H k indicates a result value counted up to l 1 per interval.
χ k = m i n + 0.5 Δ x + k Δ x
Δ k ( χ k 0.5 Δ x + 0.5 Δ x )
y k ( P o n j ) = 1 , P o n j Δ k 0 , e l s e w h e r e
H k = k = 0 l 1 y k ( P o n j )
where k L , k = 0 , 1 , 2 , , l 1 .
In addition, repetitive and irregular data are highly likely to generate outliers during data preprocessing due to various transmission errors, sensor malfunctions, or types of external interference occurring during the data collection process. This causes the data analysis accuracy to decrease by excessively increasing the variance in estimating the population average of the data. To counteract this, outlier detection was used in the data reduction process. This method represents the characteristics of each channel by calculating raw data with which it is difficult to distinguish between outliers and noise as statistical data. Then, after the frequency of appearance is calculated by dividing several intervals within the range of statistical data values, the data points in the interval with the fewest observations are identified as outliers and converted to zero.
Finally, data scaling is used to maximize the classification and prediction accuracy using an ANN based on supervised learning. To accomplish this, discretization was used in a previous study, allowing for pattern classification according to data characteristics and enabling efficient searching to take place [26]. However, to classify patterns of categorical data with binary values of zero and one, it is necessary to have a categorical data set with a high resolution that is distinguishable from neighboring datasets with other characteristics. Therefore, we used min–max normalization to solve this problem.
Min–max normalization rescales the range of each component x in a categorical data set to a range between zero and one. The general formula for normalization is as follows [27]:
x = x m i n m a x m i n
Here, max and min denote the categorical data set size and x denotes the normalized value.

2.3. Machine Learning

The CR Master classifies the preprocessed historic data by case and determines whether or not to deliver the optimized solution information to the CR User according to the reasoning result gained using the classified case DB. To this end, in this paper artificial neural networks are used for learning and reasoning according to the characteristics of preprocessed history data based on the categorical data size and the use of data scaling techniques.
In CRN, ANN achieves a high prediction accuracy for future existing user patterns by learning the behavioral patterns of existing users from a data set [28,29,30]. The ANN structure consists of an input layer, a hidden layer, and an output layer. The input layer is responsible for delivering content image information composed of N neurons to the hidden layer. The hidden layer investigates whether a feature pattern is included in the content image received from the input layer and reports the content cost to the output layer. Assuming that the feature pattern is defined for each hidden layer, as illustrated in Figure 4, the calculation of the content cost for the content image included in the feature pattern is determined by the thickness (weight) of the connecting arrow between the hidden layer and the input layer, as shown in Figure 4. The output layer takes into account the content cost information calculated in the hidden layer and outputs the certainty as a value between zero and one. Finally, the final content image is judged by comparing the certainty factor of each output layer from ① to ⑨.

2.3.1. Definition of Artificial Neural Network Parameters

In this section, variables necessary for describing the relationship between neurons constituting an ANN are defined and relational expressions for the content cost and certainty factor in the hidden layer and output layer in the previously constructed ANN are summarized [31,32].
First, when the i-th input layer neuron x i is given a weight ω i H j and a threshold θ H j , the output y j for each hidden layer is defined as σ ( a ) .
σ ( a ) = 1 1 + e a
where i N , N = 1 , 2 , 3 , , n .
Here, σ ( a ) is a sigmoid function that is continuously expressed in the interval between zero and one, while the input linear sum a in the j-th hidden layer is defined as follows:
a = x 1 ω 1 H j + x 2 ω 2 H j + + θ H j
where j M , M = 1 , 2 , 3 , , m .
The role of the threshold value θ H j is to block the noise signal coming from transport sources other than the signal from the transport of the input layer connected by the thick arrow shown in Figure 4.
As described above, the content cost calculation result output by the sigmoid function determines the content image as an output certainty factor with a value between 0 and 1 for the output layer. For example, if the certainty factor of output layer ① is very close to 1, we can be sure that the input image has an average probability of occupation of 0.1.

2.3.2. Defining Objective Functions for Weight and Threshold Optimization

In this study, linear regression analysis is used to derive the optimal weight and threshold values to minimize the sum of square errors Q h of the output layer for each piece of input data defined above.
z k t a r g e t = p y j + q
In the regression equation given above, y j , z k t a r g e t are variables used for inputting the actual value of the data, the right-hand side y j is defined as the explanatory variable, and the left-hand side z k t a r g e t is defined as the objective variable. At this time, the square error Q h between the objective variable z k t a r g e t given to the k-th output layer and the predicted value z k t r i a l is calculated as follows:
Q h = k = 1 l ( z k t a r g e t z k t r i a l ) 2 = k = 1 l ( z k t a r g e t ( p y j + q ) ) 2
where k L , k = 1 , 2 , 3 , , l .
Here, the objective function Q T for optimizing the parameters p ( = ω i H j ) and q ( = θ H j ) representing weights and thresholds can derive optimal parameters when the sum of Q h calculated from the total T input data is minimized.
Q T = h = 1 t Q h
where h T , T = 1 , 2 , 3 , , t .

3. Case-Based Reasoning

In intelligent dynamic spectrum resource management, case-based reasoning (CBR) is divided into CR Mater and CR User roles as shown in Figure 5, and retrieving, reusing and retain operation based on the case DB created through data mining is performed [13,33].

3.1. CR Master

CR Master performs similarity verification using the optimal number of hidden layers and threshold that minimize the objective function Q T when a new case is input. If the predicted and actual values are the same during the similarity verification process, the CR Master will deliver a list of solutions and backup channels to the CR User; conversely, if they do not match the actual values, they will only deliver the backup channel list to the CR user.

3.2. CR User

The CR user must not interfere with incumbent users when a spectrum is shared opportunistically by identifying an idle channel, defined as an unused spectrum hole or white space, at a specific time and location. Therefore, if an incumbent user is detected during the idle channel reasoning process, the operation should be paused and switched to another idle channel to maintain communication. This switching method is defined as spectrum handoff and is used in this study to perform a reasoning engine operation utilizing a reactive handoff process based on the backup channel list. At this time, when a CR user using the maximum transmission power in the idle channel demonstrates an interference influence on incumbent users existing in an adjacent channel or location, the CR user performs solution reuse or an optimization engine operation depending on the similarity verification result. If the predicted and actual values are found to be the same after performing a similarity verification, the CR user reuses the solution received from the CR Master, we use Monte Carlo algorithm-based interference analysis to verify the solution.
In this study, interference analysis based on the Monte Carlo algorithm calculates randomly generated radio wave propagation-related samples based on input parameters applied to a specific interference scenario environment, determining the inter-user interference probability using the samples obtained [34]. Monte Carlo algorithm-based interference analysis is largely divided into user interfaces, event generation engines, and interference calculation engines. At first, the user interfaces define the parameters (antenna height, transmission power, center frequency, etc.) of the victim in the interference environment scenario, as well as a propagation loss model according to specific distance, location, and topography features. The interference environment is divided into victim and interfering links, as shown in Figure 6.
Victim links refer to incumbent users in use at a particular location and time in the licensing band, while interfering links refer to any communication that temporarily uses an idle channel not being used by the incumbent user at a specific time and region through the opportunistic frequency use method based on CR technology in the licensed band.
The event engine calculates the desired received signal strength (dRSS) and the interfered received signal strength (iRSS) through repeated simulations of N events according to the frequency separation and space distance. First, dRSS defines the transmit power ( P w ) and antenna gain ( g w v , g v w ) for the desired transmitter and victim receiver constituting the victim link. It also uses a path loss model ( P L w v ) that considers the distance between the wanted transmitter and the victim receiver in the city center as well as the propagation environment, which is defined by a number of unspecified obstacles.
d R S S = P w + g w v P L w v + g v w
i R S S u n w a n t e d , i is calculated based on the imperfect pulse shaping of the interfering source transmitter and propagation environment defined by the unwanted emission component ( e m i s s i o n ( f I t , f V r ) ) of the interfering source, as shown in Figure 7. This component appears in individual elements constituting the transmitter and a number of unspecified obstacles between the interfering transmitter and interfering receiver. Additionally, to obtain the sum of the signal powers received from n interfering transmitters operating in different channels and random locations, i R S S u n w a n t e d , i in d B m is used as an exponent and then converted into a logarithm, as defined in Equation (17).
i R S S u n w a n t e d , i = e m i s s i o n ( f I t , f V r ) + g i v P L i v + g v i
where i N , N = 1 , 2 , 3 , , n .
i R S S u n w a n t e d , i = 10 log 10 i = 1 n 10 i R S S u n w a n t e d , i 10
Finally, according to the process of Figure 8, the interference engine calculates C / I t r i a l using the iRSS value generated from the event with a dRSS value greater than the sensitivity and determines it to be “Good” or “Interfered” by making comparisons to the interference protection ratio ( C / I t a r g e t ) of the victim receiver. This process is repeated until the end of events, and after the events are terminated the interference probability of N i n t e r f e r e d , for which interference occurred among the total number of events, is finally derived.
As mentioned above, when verifying a solution using Monte Carlo algorithm–based interference analysis, the CR user determines the solution maintenance or optimization engine operation according to the 5% interference probability standard applied in the field test [35,36]. If the interference probability exceeds the standard of 5% or more during the solution verification process, the CR user determines that the solution information is not suitable and derives the optimized transmission parameters according to the service purpose required by the incumbent user through the optimization engine. Conversely, if the interference probability is within 5%, the CR user maintains the past solution.
Additionally, in the case where the predicted and actual values are different, the CR user determines that there has been no similar case in the past and directly derives the optimized transmission parameters according to the service purpose required by the incumbent user through the optimization engine.

4. Simulation

4.1. Scenario

In this study, the process of analyzing the performance of intelligent dynamic real-time spectrum resource management using data mining and case-based reasoning in a CR network environment that is dynamically variable in the space–time and frequency domains consists of three steps, as shown in Figure 9 below [13,18,37].
In the first step, historic data that are dynamically variable in the time and frequency domains are based on the super-frame structure defined in IEEE 802.22 Mac [38]. The historic data representing the super-frame consist of 16 time slots with a length of 10 ms. In addition, the channels are composed of 55 individual orthogonal sub-channels, each with a 100 kHz bandwidth size within the 5.5 MHz occupied bandwidth, excluding the 250 kHz protection area on both sides of the 6 MHz channel bandwidth defined in the ATSC broadcasting standard for domestic DTV broadcasting [39]. In this study, the number and distribution of incumbent users in the spatial domain are determined according to the channel usage status for each time slot unit using historic data composed of super-frame units, as described above [18].
The second step of forming n single wireless networks in the space domain is deploying wireless networks that opportunistically service IoT devices in random locations within a 5 × 5 km square area [40] using channels representing the incumbent user occupancy statuses of the 55 individual orthogonal sub-channels in the m-th time slot. At this time, in order to derive the optimal transmission parameter of the interfering transmitter that satisfies the standard of 6 dB for the protection ratio( I / N t a r g e t ) of the victim receiver at the minimum receiving power position, the IoT assumes the worst case situation located on the service boundary (600 m) [41] of a base station. Table 2 lists the victim link parameters used in the simulation.
As a final step, Figure 10 depicts a situation where 255 IoTs [38] perform uplink operations at any location within the service area (600 m) of a base station located in the center of a 5 × 5 km square area. This indicates that the unwanted emission of industrial IoT devices performing uplink operations with a maximum transmission power of 12.6 dBm per 100 kHz [39] at a random location can have a serious radio wave interference effect on incumbent users located in adjacent channels and cell boundaries [42,43]. In addition, the extended Hata propagation model [34] and the unwanted emission mask of the wireless microphone service [44] are applied to reflect the propagation loss due to an unspecified obstacle between the interfering source and receiving unit. Table 3 and Table 4 show the interfering link parameters and unwanted emission masks used for the simulation.

4.2. Performance Evaluation Method

Similarity verification is performed using the optimal number of hidden layers, weights, and thresholds to minimize the objective function Q T based on the preprocessed training data. At this time, the accuracy is calculated by counting the number of successful predictions in the total T test data sets by producing a value of one if z k t a r g e t and z k t r i a l are equal in the h-th test dataset and a value of zero otherwise.
F ( Q h ) = 1 , z k t r i a l = z k t a r g e t 0 , otherwise
A c c u r a c y = 1 T h = 1 t F ( Q h )
In addition, to check the number of optimization engine operations according to the prediction accuracy, the following conditional expression is defined:
If the predicted value z k t a r g e t and the actual value z k t r i a l are the same, CR Users reuse the solution when interference occurs in the reasoning engine process. At this time, the verification for the solution is defined as zero when the interference probability criterion ( P I P , t a r g e t ) of 5% is satisfied through the Monte Carlo algorithm-based interference analysis and when the interference probability exceeds 5%, it is defined as 1 because the optimization engine operation is performed.
F 1 ( T i h ) = 1 , P I P , t r i a l > P I P , t a r g e t 0 , P I P , t r i a l < P I P , t a r g e t
Conversely, if the predicted value differs from the actual value, the number is defined as zero if the interference probability criterion of 5% is satisfied when idle channels are used at maximum transmission power in the reasoning engine process and one when it exceeds 5%.
F 2 ( T i h ) = 1 , P I P , t r i a l > P I P , t a r g e t 0 , P I P , t r i a l < P I P , t a r g e t
Following these conditions, the number of optimization engine operations per time slot unit T i is calculated according to the prediction accuracy during T test data sets.
C o u n t ( T i h ) = h = 1 t i = 1 m ( F 1 ( T i h ) + F 2 ( T i h ) )
The definitions of the number of spectrum handoffs, handoff delay, link maintenance probability, and energy consumption are defined as follows for intelligent dynamic spectrum resource management performance comparison and analysis depending on whether data mining and case-based reasoning is applied or not.
The number of spectrum handoffs is defined as the number of times that data transmission is stopped and switched to another idle channel according to the incumbent user detection during one session of CR data transmission in the idle channel reasoning process [13,45,46]. However, as frequent spectrum handoff operations can degrade the communication performance based on latency and increase the energy consumption, this simulation aims to minimize unnecessary spectrum handoffs in order to realize an efficient CR network. The number of spectrum handoff operations was counted for each time slot according to the incumbent user detection as defined in the following equation:
F ( T i ) = 1 , if   T i   is   on   state 0 , otherwise ,
C o u n t ( T i ) = i = 1 m F T i
The spectrum handoff latency represents the number of channel searches that occur during the handoff process to an idle channel according to the detection of an incumbent user [13,45,47]. To verify a channel selection technique that can quickly handle an idle channel with a small number of searches during the reasoning period, as shown in Equations (25) and (26), the number of channel searches occurring during the handoff process for each time slot is counted according to the backup channel order:
F ( C i j ) = 1 , if   C i j   is   on   state 0 , otherwise ,
C o u n t ( C i j ) = i = 1 m j = 1 n F C i j
In a temporally and spatially dynamic CR network, frequent spectrum handoffs made by incumbent users can degrade IoT communication performance as a result of excessive sensing energy consumption [13,48]. Therefore, in this study, as shown in Equations (27) and (28), a reduction in sensing energy consumption was confirmed by counting the number of times the same idle channel was maintained in a continuous time interval without a spectrum handoff operation occurring over a total of m 1 time slots.
F ( T i , T i + 1 ) = 1 , if   T i   and   T i + 1   is   off   state 0 , otherwise
C o u n t ( T i , T i + 1 ) = i = 1 m 1 F T i , T i + 1
A pause in communication is most likely to occur when an idle channel does not exist at a specific time in a traffic environment with a large number of incumbent users. Additionally, radio wave interference caused by the unwanted emission of an interference source limits the use of available idle channels [13,46,49]. Therefore, to evaluate the spectrum management performance for continuous communications in such a scenario, the number of time slots in which a communication link was successfully maintained up to T m was counted.
F ( T i ) = 1 , if   T i   is   CU   is   on   state 0 , otherwise
C o u n t ( T i ) = i = 1 m F T i

4.3. Performance Evaluation Results

4.3.1. Data Preprocessing Using History Data

The data preprocessing process, which is conducted using historic data, calculates the frequency of occurrence of occupation probability values per channel using 5, 10, and 20 equal interval sizes to convert the statistical data for each of the nine average occupancy probabilities composed of 0.1 size units from 0.1 to 0.9 into categorical data. Figure 11, Figure 12 and Figure 13 show the histogram represented by the average occupancy probability of categorical data according to the equal interval size and the pattern by data characteristics according to discretization and normalization.
In cases where P O N A V G = 0.1, the probability density function has a long tail on the right side, indicating that more data are distributed on the left side, meaning that out of the 55 channels the number of idle channels available to CR users is larger. Conversely, if P O N A V G = 0.9, the number of channels with a high occupancy probability of incumbent users is distributed to the right, so the number of idle channels available to CR users is small. Therefore, it can be seen that the distribution of data gradually shifts from left to right as the average occupancy probability increases.
In the case of 4 × 5 , 2 × 5 , and 1 × 5 images pretreated with discretization according to the unit of 5, 10, and 20, as the equidistant size gradually increases, it is highly likely that they will be misclassified between adjacent cases as shown in Figure 11.
On the other hand, when pretreated through normalization, it is easy to distinguish the characteristics of each case under conditions such as discretization. However, if the equidistant size is very low or high, it is likely to be misclassified as the presence of neurons with similar appearance frequencies. Therefore, in this paper, a preprocessing process through categorical data with an appropriate equidistant size is required.

4.3.2. Comparative Analysis of Prediction Accuracy by Data Preprocessing Techniques, Number of Hidden Layers, and Number of Learning Data Samples Using History Data

Figure 14, Figure 15 and Figure 16 compare and analyze the prediction accuracy according to the number of training data (1, 5, 10, 50, 100, 200, and 300) and the number of hidden layers (2, 3, 4, and 5) for each case using preprocessed learning and test data that have undergone discretization and normalization with a categorical data size (m) set to 5, 10, and 20. Overall, it shows a graph that exponentially increases along with the size of the training data while the number of hidden layers gradually increases. At this time, it can be seen that when the training and test data preprocessed by the discretization method are used, the accuracy improves as the size of the categorical data set increases.
This requires categorical data with a high resolution to improve the accuracy, since the prediction accuracy is evaluated to be low due to misclassification caused by an unclear distinction from other adjacent cases when data with a relatively low resolution are used. On the other hand, in the case of data preprocessing using a normalization method under the same conditions, the accuracy is high even with a low-resolution categorical data size. Therefore, it can be seen that if the categorical data size is five, the prediction accuracy can be improved by approximately 38% based on the maximum value and there will be a 19% and 11% higher prediction accuracy for the other 10 and 20, respectively.
In the case of prediction accuracy according to the number of learning data available, it can be seen that the growth trend begins to clearly slow from having 50 learning data samples in common and converge at 100 learning data samples without a significant increase. Therefore, from the results gained in this study, we can state that 100 learning data points is the optimal number of learning data necessary to improve the prediction accuracy and minimize the increase in computation due to the excessive amount of learning data.
In addition, when analyzing the prediction accuracy using the same number of learning data, it can be seen that as the number of hidden layers increased, the classification ability improved and more patterns could be recognized, indicating that the prediction accuracy increased. However, because the amount of computation necessary may increase due to overfitting, four hidden layers (green) were used in this study as the optimal number of hidden layers with a high prediction accuracy while minimizing the amount of computation needed through the above simulation results. This has the same prediction accuracy as the maximum number of hidden layers in the 100 learning data samples.
In addition, when the hyperbolic tangent function [32] was used under the same conditions as the artificial neural network structure optimized through the sigmoid function, the growth trend began to gradually decline in 100 training data as shown in Figure 17, and 84.71% prediction accuracy was obtained from 300 training data. That is, since the hyperbolic tangent function has about 13% lower prediction accuracy than the sigmoid function and requires more than 300 training data for high prediction accuracy, an optimization method using the sigmoid function is preferable.

4.3.3. Comparison and Analysis of the Number of Optimization Engine Operations According to the Prediction Accuracy for the Number of IoT Devices

This section analyzes the number of optimization engine operations according to the prediction accuracy for each number of preprocessed learning data during pattern classification and case-based reasoning based on an ANN with four hidden layers.
At this time, when the predicted value and the actual value are found to be the same when verifying the similarity in the case-based reasoning process, the solution information delivered from the case DB is defined in Table 5 for each number of IoT devices. For reference, Table 5 shows the average values of transmission power optimized through reasoning engines and optimization engines using the number of IoT devices and 500 historic data points for each case.
As shown in Figure 18 below, the number of optimization engine operations according to the prediction accuracy for each number of training data are shown in a graph in which the number of optimization engine operations exponentially decreases as the accuracy increases.
At this time, the number of optimization engine operations using 255 IoT devices showed up to 1153 optimization engine operations at a 66.82% prediction accuracy, and it is possible to confirm that the optimization engine operation reduced to 833 for a total of 100 training data points with a 97.13% prediction accuracy. when comparing the number of optimization engine operations for 100, 50, and 10 IoT devices based on the same prediction accuracy as that given above, it can be seen that the number of optimization engine operations decreased slightly to 802, 1014, and 736, respectively.
In addition, as the number of IoT devices decreases, the number of idle channels available through the optimization engine operation increases. However, for the case of 10 IoT devices, the number of optimization engine operations is lower than the number of 50 IoT devices, as there are some idle channels that can be used at maximum transmission power without the operation of the optimization engine.

4.3.4. Comparative Analysis of the Number of Optimization Engine Operations Depending on Whether or Not Case-Based Reasoning Is Applied

In Figure 19, the red bar graph represents the number of optimization engine operations that occur when interference is affected by incumbent users in adjacent channels and locations while reasoning an idle channel based on a list of backup channels for every time slot through the existing intelligent dynamic spectrum resource management. On the other hand, the blue bar graph shows the number of optimization engine operations for each number of IoT devices out of 100 training data with a 97.4% prediction accuracy in case-based reasoning based on optimized data mining. That is, when case-based reasoning is applied based on optimized data mining, it can be seen that the optimization engine operation is significantly reduced by more than half compared to the existing one for all traffic situations from 0.1 to 0.9.
In addition, when 255 IoT devices are used, as the average occupancy probability gradually increases, the frequency of the occurrence of incumbent users in adjacent channels and areas increases, resulting in optimization engines operating in up to 0.5 traffic.
However, frequent handoff operations occurring due to the frequent appearance of incumbent users from 0.6 traffic increases the number of channel searches, making it difficult to maintain a backup channel list. Eventually, a pause begins to occur at certain time slots and the number of idle channels available gradually decreases, resulting in a sharp decrease in the number of optimization engine operations.
On the other hand, in cases where there are 100, 50, and 10 IoT devices, the use of a relatively small number of devices will increase the number of idle channels that can be used as optimized transmission parameters, even in traffic situations with a high occupancy probability. Therefore, it can be seen that the optimization engine operation increases up to a level of 0.8 traffic.

4.3.5. Comparative Analysis of Spectrum Resource Management Performance Depending on Whether or Not Case-Based Reasoning Is Applied

In the case of spectrum resource management using 10 IoT devices, as shown in Figure 20, continuous handoff operation is possible in situations where there is up to 0.9 traffic. In addition, compared to the performance of 255 IoT devices when the number of channel searches was less than 500 and the number of time slots that could be used continuously had increased by more than seven, it was confirmed that the link maintenance performance was improved by more than 90%, which is very similar to the value of the existing intelligent dynamic spectrum resource management performance
In the case where there are 50 IoT devices, there is a continuous handoff operation in up to 0.8 traffic and a channel search number of approximately 345 or less. In addition, more than three time slots are continuously available on average and the link maintenance performance improves by more than 65% compared to that gained with 255 IoT devices; this is very similar to the performance of existing intelligent dynamic spectrum resource management.
Finally, in the case where there are 100 IoT devices, there is a continuous handoff operation in up to 0.6 traffic and a number of channel searches of approximately 270 or less. In addition, more than three time slots are continuously available on average, and it can be seen that the link maintenance performance improves by approximately 20% or more compared to that gained with 255 IoT devices; this is very similar to the performance of existing intelligent dynamic spectrum resource management.

5. Conclusions

In this paper, we proposed a method for intelligent dynamic real-time spectrum resource management using data mining and case-based reasoning to overcome the complexity of existing methods and the difficulty of rapid resource allocation.
Data mining facilitated classification according to historic data characteristics through data preprocessing using historic data and learning through ANN. Additionally, the reuse of solutions through case-based reasoning reduced the complexity of the existing intelligent dynamic spectrum resource management and enabled efficient real-time resource allocation. also, the fact that our method achieved the same number of spectrum handoffs and the same handoff delay, energy consumption, and link maintenance probability as the existing spectrum resource management performance method proved that reliable communication can be maintained at every time slot without optimization engine operation.
As such, the intelligent dynamic real-time spectrum resource management proposed in this study is not only used in various fields such as smart factories, smart farms, and autonomous vehicles that require real-time processing, but also By realizing frequency sharing, it will be possible to respond to excess spectrum demand and promote the growth of new services.
However, in addition to the occupancy probability by channel in the ON/OFF statistical model considered in this paper, there are numerous factors that can affect learning performance, such as service priorities, locations, and QoS requirements from a CR User perspective. Therefore, future studies need to prepare reasonable integration measures for more accurate estimation.

Author Contributions

The individual contributions of the authors are as follows. D.-W.Y.: conceptualization, methodology, software, validation, and original draft preparation; W.-C.L.: review, editing, supervision, and project administration. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partially supported by an Institute for Information and Communications Technology Promotion (IITP) grant funded by the Korean government (MSIP) (No.2018-0-00943, Study on Distributed Radio Resource Allocation Method using Hybrid Block Chain for the Beyond-5G Light Spectrum Sharing Platform) and by the National Research Foundation of Korea (NRF), which is funded by the Ministry of Education (NRF-2016R1D1A1B01007836, Research on a Multidimensional Radio Resource Allocation Method based on Big Data for Massive Autonomous Wireless Devices) and by Korea Institute for Advancement of Technology (KIAT) grant funded by the Korea Government (MOTIE) (P0017123, The Competency Development Program for Industry Specialist).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lohan, E.S.; Koivisto, M.; Galinina, O.; Andreev, S.; Tolli, A.; Destino, G.; Costa, M.; Leppanen, K.; Koucheryavy, Y.; Valkama, M. Benefits of positioning-aided communication technology in high-frequency industrial IoT. IEEE Commun. Mag. 2018, 56, 142–148. [Google Scholar] [CrossRef]
  2. The Growth in Connected IoT Devices Is Expected to Generate 79.4 ZB of Data in 2025, According to a New IDC Forecast. Available online: https://www.idc.com/getdoc.jsp?containerId=prAP46737220 (accessed on 27 July 2020).
  3. Edge Computing and the Internet of Things. Available online: https://gotappspro.com/edge-computing-and-internet-of-things/ (accessed on 11 May 2020).
  4. Islam, M.T.; Taha, A.M.; Akl, S. A survey of access management techniques in machine-type communications. IEEE Commun. Mag. 2014, 52, 74–81. [Google Scholar] [CrossRef]
  5. Mao, Y.; Zhang, J.; Letaief, K. Dynamic computation offloading for mobile-edge computing with energy-harvesting devices. IEEE J. Sel. Areas Commun. 2016, 34, 3590–3605. [Google Scholar] [CrossRef] [Green Version]
  6. Liao, H.; Zhou, Z.; Zhao, X.; Zhang, L.; Mumtaz, S.; Jolfaei, A.; Ahmed, S.H.; Bashir, A.K. Learning-based context-aware resource allocation for edge computing empowered industrial IoT. IEEE Internet Things J. 2020, 7, 4260–4277. [Google Scholar] [CrossRef]
  7. International Telecommunication Union. Available online: https://www.itu.int/dms_pub/itu-r/opb/act/R-ACT-WRC.14-2019-PDF-E.pdf (accessed on 13 August 2020).
  8. Spectrum Management: Key Applications and Regulatory Considerations Driving the FUTURE Use of Spectrum. Available online: https://digitalregulation.org/spectrum-management-key-applications-and-regulatory-considerations-driving-the-future-use-of-spectrum/ (accessed on 13 August 2020).
  9. 20 Years of Wi-Fi. Available online: https://www.wi-fi.org/discover-wi-fi/20-years-of-wi-fi (accessed on 17 April 2020).
  10. Office of Communications. Improving Spectrum Access for Wi-Fi: Spectrum Use in the 5 and 6 GHz Bands; Office of Communications: London, UK, 2020; pp. 1–69.
  11. Office of Communications. Supporting Innovation in the 100–200 GHz Range: Proposals to Increase Access to Ectremely High Frequency(EHF) Spectrum; Office of Communications: London, UK, 2020; pp. 1–75.
  12. Federal Communications Commission. FCC Adopts New Rules for the 6 GHz Band, Unleashing 1200 Megahertz of Spectrum for Unlicensed Use; Federal Communications Commission: Washington, DC, USA, 2020; pp. 1–2.
  13. Yun, D.W.; Lee, W.C. Intelligent Dynamic Spectrum Resource Management Based on Sensing Data in Space-Time and Frequency Domain. Sensors 2021, 21, 5261. [Google Scholar] [CrossRef]
  14. Ko, G.; Franklin, A.A.; You, S.J.; Pak, J.S.; Song, M.S.; Kim, C.J. Channel management in IEEE 802.22 WRAN system. IEEE Commun. Mag. 2010, 48, 88–94. [Google Scholar] [CrossRef]
  15. Ghosh, C.; Roy, S.; Cavalcanti, D. Coexistence challenges for heterogeneous cognitive wireless networks in TV White Space. IEEE Wirel. Commun. 2011, 18, 22–31. [Google Scholar] [CrossRef]
  16. Gardellin, V.; Das, S.K.; Lenzini, L. Self coexistence in cellular cognitive radio networks based on the IEEE 802.22 standard. IEEE Wirel. Commun. 2013, 20, 52–59. [Google Scholar] [CrossRef]
  17. Abbas, N.; Nasser, Y.; Ahmad, K.E. Recent advances on artificial intelligence and learning techniques in cognitive radio networks. EURASIP J. Wirel. Commun. Netw. 2015, 2015, 174. [Google Scholar] [CrossRef] [Green Version]
  18. Ding, G.; Jiao, Y.; Wang, J.; Zou, Y.; Wu, Q.; Yao, Y.D.; Hanzo, L. Spectrum inference in cognitive radio networks: Algorithms and applications. IEEE Commun. Surv. Tutor. 2018, 20, 150–182. [Google Scholar] [CrossRef] [Green Version]
  19. Zhong, Y.; Fong, S.; Hu, S.; Wong, R.; Lin, W. A Novel Sensor Data Pre-Processing Methodology for the Internet of Things Using Anomaly Detection and Transfer-By-Subspace-Similarity Transformation. Sensors 2019, 19, 4536. [Google Scholar] [CrossRef] [Green Version]
  20. Shi, F.; Li, Q.; Zhu, T.; Ning, H. A Survey of Data Semantization in Internet of Things. Sensors 2018, 18, 313. [Google Scholar] [CrossRef] [Green Version]
  21. Kamruzzaman, S.M.; Jehad Sarkar, A.M. A New Data Mining Scheme Using Artificial Neural Networks. Sensors 2011, 11, 4622–4647. [Google Scholar] [CrossRef]
  22. Saleem, Y.; Rehmani, M.H. Primary radio user activity models for cognitive radio networks: A survey. J. Netw. Comput. Appl. 2014, 43, 1–16. [Google Scholar] [CrossRef]
  23. Fan, C.; Chen, M.; Wang, X.; Wang, J.; Huang, B. A Review on Data Preprocessing Techniques Toward Efficient and Reliable Knowledge Discovery From Building Operational Data. Front. Energy Res. 2021, 9, 652801. [Google Scholar] [CrossRef]
  24. Alexandropoulos, S.-A.N.; Kotsiantis, S.B.; Vrahatis, M.N. Data Preprocessing in Predicitve Data Mining; Cambridge University Press: Cambridge, UK, 2019; Volume 34, pp. 1–33. [Google Scholar]
  25. Han, J.; Pei, J.; Kamber, M. Data Mining Concepts and Techniques, 3rd ed.; Elsevier: Copenhagen, The Netherlands, 2012; pp. 1–703. [Google Scholar]
  26. Launggu, K.; Hermadi, I.; Buono, A. Pixel downsampling for optimization of artificial neural network for handwriting character recognition. Asian Res. Publ. Netw. 2017, 12, 4624–4630. [Google Scholar]
  27. Feature Scaling. Available online: https://en.wikipedia.org/wiki/Feature_scaling (accessed on 21 September 2021).
  28. Naikwadi, M.H.; Patil, K.P. A Survey of Artificial Neural Network based Spectrum Inference for Occupancy Prediction in Cognitive Radio Networks. In Proceedings of the International Conference on Trends in Electronics and Informatics, Tirunelveli, India, 15–17 June 2020. [Google Scholar]
  29. Kaur, A.; Kumar, K.A. Comprehensive survey on machine learning approaches for dynamic spectrum access in cognitive radio networks. J. Exp. Theor. Artif. Intell. 2020, 33, 1–40. [Google Scholar] [CrossRef]
  30. Dudczyk, J.; Rybak, L.; Jezierski, Z. Data Fusion in The Decision-Making Process Based on Artificial Neural Networks. Sci. Pap. Silesian Univ. Technol. 2020, 149, 97–108. [Google Scholar] [CrossRef]
  31. Logistic Function. Available online: https://en.wikipedia.org/wiki/Logistic_function (accessed on 20 September 2021).
  32. Activation Function. Available online: https://en.wikipedia.org/wiki/Activation_function (accessed on 13 November 2021).
  33. Le, B. Building a Cognitive Radio: From Architecture Definition to Prototype Implementation; Virginia Tech: Blacksburg, VA, USA, 2007; pp. 1–209. [Google Scholar]
  34. Electronic Communications Committee. SEAMCAT Handbook, 2nd ed.; Electronic Communications Committee: Copenhagen, Denmark, 2016; pp. 2–252. [Google Scholar]
  35. National Radio Research Agency. Measures to Secure Mobile Communication Frequencies and Research on Technical Standards; National Radio Research Agency: Seoul, Korea, 2014; pp. 1–219. [Google Scholar]
  36. Electronic Communications Committee. Adjacent Channel Co-Existence of SRDs in the Band 863–870 MHz in Light of the LTE Usage Below 862 MHz; Electronic Communications Committee: Copenhagen, Denmark, 2014; pp. 1–57. [Google Scholar]
  37. Grimaldi, S.; Mahmood, A.; Hassan, S.A.; Gidlund, M.; Hancke, G.P. Autonomous interference mapping for industrial Internet of Things networks over unlicensed band. IEEE Ind. Electron. Mag. 2021, 15, 67–78. [Google Scholar] [CrossRef]
  38. Mody, A.N. IEEE 802.22 Wireless Regional Area Networks Removing Digital Divide and Enabling Rural Broadband Access Using Cognitive Radio Technology; IEEE 802.22 WG; IEEE: Piscataway, NJ, USA, 2013; pp. 1–69. [Google Scholar]
  39. Federal Communications Commission. 47 CFR Part 15: Unlicensed White Space Device Operations in the Television Bands; Federal Communications Commission: Washington, DC, USA, 2021; pp. 2278–2295.
  40. Olawole, A.A.; Takawira, F.; Oyerinde, O.O. Cooperative spectrum sensing in multichannel cognitive radio network with energy harvesting. IEEE Access 2019, 7, 84784–84802. [Google Scholar] [CrossRef]
  41. International Telecommunication Union. Technical and Operational Characteristics of Conventional and Trunked Land Mobile Systems Operating in the Mobile Service Allocations Below 869 MHz to Be Used in Sharing Studies in Bands Below 960 MHz; International Telecommunication Union: Geneva, Switzerland, 2019; pp. 1–23. [Google Scholar]
  42. 3rd Generation Partnership Project. 3GPP TSG-RAN4 Meeting R4-125214: Band 7 Band 28 UE-UE Coexistence Test, 3rd ed.; Generation Partnership Project: Sophia Antipolis, France, 2012. [Google Scholar]
  43. Yun, D.W. Interference analysis for mutual coexistence between LTE TDD in spatial and time domains. J. Commun. 2017, 12, 689–694. [Google Scholar] [CrossRef]
  44. European Telecommunications Standards Institute. Wireless Microphones; Audio PMSE up to 3 GHz; Part 1: Class receivers; Harmonised Standard Covering the Essential Requirements of Article 3.2 of Directive 2014/53/EU; European Telecommunications Standards Institute: Sophia Antipolis, France, 2017; pp. 1–64. [Google Scholar]
  45. Christian, I.; Moh, S.; Chung, I.; Lee, J. Spectrum mobility in cognitive radio networks. IEEE Commun. Mag. 2012, 50, 114–121. [Google Scholar] [CrossRef]
  46. Kalil, M.A.; Al-Mahdi, H.; Mitschele-Thiel, A. Spectrum handoff reduction for cognitive radio ad hoc networks. In Proceedings of the 2010 7th International Symposium on Wireless Communication Systems, York, UK, 19–22 September 2010. [Google Scholar]
  47. Zhang, L.; Song, T.; Wu, M.; Guo, J.; Sun, D.; Gu, B. Modeling for spectrum handoff based on secondary users with different priorities in cognitive radio networks. In Proceedings of the 2012 International Conference on Wireless Communications and Signal Processing, Huangshan, China, 25–27 October 2012. [Google Scholar]
  48. Wang, S. Reliable energy-efficient spectrum management and optimization in cognitive radio network: How often should we switch. IEEE Wirel. Commun. 2013, 20, 14–20. [Google Scholar] [CrossRef]
  49. Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.P.; Al-Dhahir, N. Secure and energy efficient transmission for RSMA-based cognitive satellite-terrestrial networks. IEEE Wirel. Commun. Lett. 2021, 10, 251–255. [Google Scholar] [CrossRef]
Figure 1. Intelligent dynamic real-time spectrum resource management structure based on data mining and case-based reasoning.
Figure 1. Intelligent dynamic real-time spectrum resource management structure based on data mining and case-based reasoning.
Sensors 21 07902 g001
Figure 2. Incumbent user activity modeling based on an ON/OFF model.
Figure 2. Incumbent user activity modeling based on an ON/OFF model.
Sensors 21 07902 g002
Figure 3. Data preprocessing using historic data.
Figure 3. Data preprocessing using historic data.
Sensors 21 07902 g003
Figure 4. Artificial neural network structure.
Figure 4. Artificial neural network structure.
Sensors 21 07902 g004
Figure 5. Flowchart of the intelligent dynamic real-time spectrum resource management using case-based reasoning.
Figure 5. Flowchart of the intelligent dynamic real-time spectrum resource management using case-based reasoning.
Sensors 21 07902 g005
Figure 6. Victim link and interfering link.
Figure 6. Victim link and interfering link.
Sensors 21 07902 g006
Figure 7. Interference caused by unwanted emission masks.
Figure 7. Interference caused by unwanted emission masks.
Sensors 21 07902 g007
Figure 8. Interference probability calculation.
Figure 8. Interference probability calculation.
Sensors 21 07902 g008
Figure 9. Simulation environment created by the space–time and frequency domains.
Figure 9. Simulation environment created by the space–time and frequency domains.
Sensors 21 07902 g009
Figure 10. Inter cell interference scenario.
Figure 10. Inter cell interference scenario.
Sensors 21 07902 g010
Figure 11. ( Δ x = 20, L = 5) Histogram by average occupancy probability and pattern comparison by the data scaling method.
Figure 11. ( Δ x = 20, L = 5) Histogram by average occupancy probability and pattern comparison by the data scaling method.
Sensors 21 07902 g011
Figure 12. ( Δ x = 10, L = 10) Histogram by average occupancy probability and pattern comparison by the data scaling method.
Figure 12. ( Δ x = 10, L = 10) Histogram by average occupancy probability and pattern comparison by the data scaling method.
Sensors 21 07902 g012
Figure 13. ( Δ x = 5, L = 20) Histogram by average occupancy probability and pattern comparison by the data scaling method.
Figure 13. ( Δ x = 5, L = 20) Histogram by average occupancy probability and pattern comparison by the data scaling method.
Sensors 21 07902 g013
Figure 14. ( Δ x = 20, L = 5) Comparative analysis of prediction accuracy per data preprocessing technique using historic data, the number of hidden layers, and the number of training data.
Figure 14. ( Δ x = 20, L = 5) Comparative analysis of prediction accuracy per data preprocessing technique using historic data, the number of hidden layers, and the number of training data.
Sensors 21 07902 g014
Figure 15. ( Δ x = 10, L = 10) Comparative analysis of prediction accuracy per data preprocessing technique using historic data, the number of hidden layers, and the number of training data.
Figure 15. ( Δ x = 10, L = 10) Comparative analysis of prediction accuracy per data preprocessing technique using historic data, the number of hidden layers, and the number of training data.
Sensors 21 07902 g015
Figure 16. ( Δ x = 5, L = 20) Comparative analysis of prediction accuracy per data preprocessing technique using historic data, the number of hidden layers, and the number of training data.
Figure 16. ( Δ x = 5, L = 20) Comparative analysis of prediction accuracy per data preprocessing technique using historic data, the number of hidden layers, and the number of training data.
Sensors 21 07902 g016
Figure 17. Comparative analysis of prediction accuracy between sigmoid function and hyperbolic tangent function.
Figure 17. Comparative analysis of prediction accuracy between sigmoid function and hyperbolic tangent function.
Sensors 21 07902 g017
Figure 18. Comparison and analysis of the number of optimization engine operations according to the prediction accuracy for the number of IoT devices. (a) Number of IoT: 255, (b) Number of IoT: 100, (c) Number of IoT: 50, (d) Number of IoT: 10.
Figure 18. Comparison and analysis of the number of optimization engine operations according to the prediction accuracy for the number of IoT devices. (a) Number of IoT: 255, (b) Number of IoT: 100, (c) Number of IoT: 50, (d) Number of IoT: 10.
Sensors 21 07902 g018
Figure 19. Comparative analysis of the number of optimization engine operations depending on whether or not case-based reasoning is applied. (a) Number of IoT: 255, (b) Number of IoT: 100, (c) Number of IoT: 50, (d) Number of IoT: 10.
Figure 19. Comparative analysis of the number of optimization engine operations depending on whether or not case-based reasoning is applied. (a) Number of IoT: 255, (b) Number of IoT: 100, (c) Number of IoT: 50, (d) Number of IoT: 10.
Sensors 21 07902 g019
Figure 20. Comparative analysis of spectrum resource management performance ((a) spectrum handoff, (b) energy consumption, (c) latency, (d) link maintenance) depending on whether or not case-based reasoning is applied.
Figure 20. Comparative analysis of spectrum resource management performance ((a) spectrum handoff, (b) energy consumption, (c) latency, (d) link maintenance) depending on whether or not case-based reasoning is applied.
Sensors 21 07902 g020
Table 1. Technologies driving spectrum demand.
Table 1. Technologies driving spectrum demand.
TechnologySpectrum Demand
5G-5G mobile networks offer significant potential to increase data transfer capacity, as well as spectrum efficiency.
-Sub-6 GHz bands have relatively better propagation characteristics, offering a wider coverage area than mmWave, but their heavy incumbent use limits large, contiguous spectrum blocks.
-mmWave bands offer more spectrum due to less incumbent use, allowing for wider bandwidths, supporting higher throughputs. However, its use is limited, by lower propagation characteristics making them more suitable for coverage of relatively small areas, usually in dense environments.
IoT-Increased connectivity and capacity introduced by technologies using licensed and unlicensed spectrum are fostering more connected devices as part of IoT ecosystem.
-Successful consumer and public applications of different IoT technologies are reliant on effective and efficient spectrum management.
-Spectrum requirements for various segments of the IoT landscape depend on user cases specific to their application. for example, connections for use by industrial automated robots are more latency sensitive than connected kitchen appliances.
WiFi-Wireless network technologies are critical to connected devices implementation and IoT ecosystem advancement.
-In addition to previous use of 900 MHz, 2.4 GHz, and 5 GHz bands, newer WiFi technologies are being implemented in 60 GHz (57–66 GHz) and 6 GHz (5925–7125 MHz) bands.
-Several countries (e.g., United States and United Kingdom) are increasing availability of 6GHz band for unlicensed use.
-New rules in the United States make available 1200 MHz of the spectrum for unlicensed use in the 6 GHz band.
HAPS-HAPS applications (i.e., radio stations located in the stratosphere between 20 and 50 km above the Earth’s surface) can expand access to wireless connectivity.
-HAPS support other terrestrial technologies with potential to expand connectivity and telecommunications services in rural and remote areas.
-HAPS can serve as a tool to extend existing terrestrial networks and provide higher quality service to already connected areas as well as connectivity during emergency situations.
-HAPS applications have frequency bands either authorized directly to its provider or to an existing partner telecommunications operator, such as a mobile operator.
NGSO-NGSO satellites systems, comprised of hundreds or even thousands of satellites, provide connectivity in area currently unreached by terrestrial telecommunications infrastructure.
-This presents some spectrum management challenges, in terms of managing use of different frequency bands and allowing GSO and NGSO satellite systems to operate simultaneously, while mitigating the risk of harmful interference.
Table 2. Victim link parameters.
Table 2. Victim link parameters.
ParametersValue
Victim receiver center frequency ( f V r )600.2 MHz
Antenna height ( H w , v )1.5 m
Antenna gain ( g w v )6 dBi
Noise floor ( N f )−167.83 dBm
Bandwidth (B)100 kHz
Protection ratio ( I / N t a r g e t )−6 dB
Table 3. Interfering link parameters.
Table 3. Interfering link parameters.
ParametersValue
Interfering transmitter center frequency ( f I t )Among 55 sub-channels with a bandwidth of 100 kHz, the idle channel selected based on the backup channel is defined as the center frequency.
transmit power ( P I t )-Optimal transmission power that satisfies the criteria for interference probability within 5%;
-(Min) 1 dBm (Max) 12.6 dBm.
Antenna height ( H i , v )1.5 m.
Antenna gain ( g i v )6 dBi.
Path loss ( P L i v )Extended Hata model.
Table 4. Break points of the unwanted emission mask (B: bandwidth).
Table 4. Break points of the unwanted emission mask (B: bandwidth).
Frequency Relative to the Center of the ChannelRelative Level (dBc)
f c ± 1 MHz−90
f c ± B−80
f c ± 0.5 B−60
f c ± 0.35 B−20
f c ± 0.25 B0
Table 5. Optimized transmission power according to the number of IoT devices.
Table 5. Optimized transmission power according to the number of IoT devices.
ParameterNumber of IoT
Solution( P I t )(255) 6.54844 dBm, (100) 5.11569 dBm, (50) 4.65692 dBm, (10) 4.76417 dBm
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yun, D.-W.; Lee, W.-C. Intelligent Dynamic Real-Time Spectrum Resource Management for Industrial IoT in Edge Computing. Sensors 2021, 21, 7902. https://doi.org/10.3390/s21237902

AMA Style

Yun D-W, Lee W-C. Intelligent Dynamic Real-Time Spectrum Resource Management for Industrial IoT in Edge Computing. Sensors. 2021; 21(23):7902. https://doi.org/10.3390/s21237902

Chicago/Turabian Style

Yun, Deok-Won, and Won-Cheol Lee. 2021. "Intelligent Dynamic Real-Time Spectrum Resource Management for Industrial IoT in Edge Computing" Sensors 21, no. 23: 7902. https://doi.org/10.3390/s21237902

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop