26 research outputs found
Timely Monitoring of Dynamic Sources with Observations from Multiple Wireless Sensors
Age of Information (AoI) has recently received much attention due to its
relevance in IoT sensing and monitoring applications. In this paper, we
consider the problem of minimizing the AoI in a system in which a set of
sources are observed by multiple sensors in a many-to-many relationship, and
the probability that a sensor observes a source depends on the state of the
source. This model represents many practical scenarios, such as the ones in
which multiple cameras or microphones are deployed to monitor objects moving in
certain areas. We formulate the scheduling problem as a Markov Decision
Process, and show how the age-optimal scheduling policy can be obtained. We
further consider partially observable variants of the problem, and devise
approximate policies for large state spaces. Our evaluations show that the
approximate policies work well in the considered scenarios, and that the fact
that sensors can observe multiple sources is beneficial, especially when there
is high uncertainty of the source states.Comment: Submitted for publicatio
Minimizing the Age of Information from Sensors with Common Observations
We study the average Age of Information (AoI) in a system where physical
sources produce independent discrete-time updates that are each observed by
several sensors. We devise a model that is simple, but still capable to capture
the main tradeoffs. Two sensor scheduling policies are proposed to minimize the
AoI of the sources; one in which the system parameters are assumed known, and
one in which they are learned. Both policies are able to exploit the common
sensor information to reduce the AoI, resulting in large reductions in AoI
compared to common schedules
Massive Random Access with Common Alarm Messages
The established view on massive IoT access is that the IoT devices are
activated randomly and independently. This is a basic premise also in the
recent information-theoretic treatment of massive access by Polyanskiy. In a
number of practical scenarios, the information from IoT devices in a given
geographical area is inherently correlated due to a commonly observed physical
phenomenon. We introduce a model for massive access that accounts for
correlation both in device activation and in the message content. To this end,
we introduce common alarm messages for all devices. A physical phenomenon can
trigger an alarm causing a subset of devices to transmit the same message at
the same time. We develop a new error probability model that includes false
positive errors, resulting from decoding a non-transmitted codeword. The
results show that the correlation allows for high reliability at the expense of
spectral efficiency. This reflects the intuitive trade-off: an access from a
massive number can be ultra-reliable only if the information across the devices
is correlated.Comment: Extended version of conference submissio
A Decentralized Policy for Minimization of Age of Incorrect Information in Slotted ALOHA Systems
The Age of Incorrect Information (AoII) is a metric that can combine the
freshness of the information available to a gateway in an Internet of Things
(IoT) network with the accuracy of that information. As such, minimizing the
AoII can allow the operators of IoT systems to have a more precise and
up-to-date picture of the environment in which the sensors are deployed.
However, most IoT systems do not allow for centralized scheduling or explicit
coordination, as sensors need to be extremely simple and consume as little
power as possible. Finding a decentralized policy to minimize the AoII can be
extremely challenging in this setting. This paper presents a heuristic to
optimize AoII for a slotted ALOHA system, starting from a threshold-based
policy and using dual methods to converge to a better solution. This method can
significantly outperform state-independent policies, finding an efficient
balance between frequent updates and a low number of packet collisions.Comment: Accepted to IEEE ICC 202
Trusted Wireless Monitoring based on Blockchain over NB-IoT Connectivity
The data collected from Internet of Things (IoT) devices on various emissions
or pollution, can have a significant economic value for the stakeholders. This
makes it prone to abuse or tampering and brings forward the need to integrate
IoT with a Distributed Ledger Technology (DLT) to collect, store, and protect
the IoT data. However, DLT brings an additional overhead to the frugal IoT
connectivity and symmetrizes the IoT traffic, thus changing the usual
assumption that IoT is uplink-oriented. We have implemented a platform that
integrates DLTs with a monitoring system based on narrowband IoT (NB-IoT). We
evaluate the performance and discuss the tradeoffs in two use cases: data
authorization and real-time monitoring.Comment: 7 pages, 6 figures, Accepted in IEEE Communication Magazin