Multi-UAV Path Learning for Age and Power Optimization in IoT With UAV Battery Recharge

被引:44
作者
Eldeeb, Eslam [1 ]
Sant'Ana, Jean Michel de Souza [1 ]
Perez, Dian Echevarria [1 ]
Shehab, Mohammad [1 ]
Mahmood, Nurul Huda [1 ]
Alves, Hirley [1 ]
机构
[1] Univ Oulu, Ctr Wireless Commun CWC, Oulu 90570, Finland
基金
芬兰科学院;
关键词
Age of Information; deep reinforcement learning; energy efficiency; sustainability; DEEP; INFORMATION;
D O I
10.1109/TVT.2022.3222092
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In many emerging Internet of Things (IoT) applications, the freshness of the is an important design criterion. Age of Information (AoI) quantifies the freshness of the received information or status update. This work considers a setup of deployed IoT devices in an IoT network; multiple unmanned aerial vehicles (UAVs) serve as mobile relay nodes between the sensors and the base station. We formulate an optimization problem to jointly plan the UAVs' trajectory, while minimizing the AoI of the received messages and the devices' energy consumption. The solution accounts for the UAVs' battery lifetime and flight time to recharging depots to ensure the UAVs' green operation. The complex optimization problem is efficiently solved using a deep reinforcement learning algorithm. In particular, we propose a deep Q-network, which works as a function approximation to estimate the state-action value function. The proposed scheme is quick to converge and results in a lower ergodic age and ergodic energy consumption when compared with benchmark algorithms such as greedy algorithm (GA), nearest neighbour (NN), and random-walk (RW).
引用
收藏
页码:5356 / 5360
页数:5
相关论文
共 13 条
[1]   Deep Reinforcement Learning A brief survey [J].
Arulkumaran, Kai ;
Deisenroth, Marc Peter ;
Brundage, Miles ;
Bharath, Anil Anthony .
IEEE SIGNAL PROCESSING MAGAZINE, 2017, 34 (06) :26-38
[2]   Neural Combinatorial Deep Reinforcement Learning for Age-Optimal Joint Trajectory and Scheduling Design in UAV-Assisted Networks [J].
Ferdowsi, Aidin ;
Abd-Elmagid, Mohamed A. ;
Saad, Walid ;
Dhillon, Harpreet S. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (05) :1250-1265
[3]  
Kaul S., 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2011), P350, DOI 10.1109/SAHCN.2011.5984917
[4]   Human-level control through deep reinforcement learning [J].
Mnih, Volodymyr ;
Kavukcuoglu, Koray ;
Silver, David ;
Rusu, Andrei A. ;
Veness, Joel ;
Bellemare, Marc G. ;
Graves, Alex ;
Riedmiller, Martin ;
Fidjeland, Andreas K. ;
Ostrovski, Georg ;
Petersen, Stig ;
Beattie, Charles ;
Sadik, Amir ;
Antonoglou, Ioannis ;
King, Helen ;
Kumaran, Dharshan ;
Wierstra, Daan ;
Legg, Shane ;
Hassabis, Demis .
NATURE, 2015, 518 (7540) :529-533
[5]   A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems [J].
Mozaffari, Mohammad ;
Saad, Walid ;
Bennis, Mehdi ;
Nam, Young-Han ;
Debbah, Merouane .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2334-2360
[6]   Synchronizing UAV Teams for Timely Data Collection and Energy Transfer by Deep Reinforcement Learning [J].
Oubbati, Omar Sami ;
Atiquzzaman, Mohammed ;
Lim, Hyotaek ;
Rachedi, Abderrezak ;
Lakas, Abderrahmane .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (06) :6682-6697
[7]  
Saad W., 2019, ARXIV190502993
[8]   Online Altitude Control and Scheduling Policy for Minimizing AoI in UAV-Assisted IoT Wireless Networks [J].
Samir, Moataz ;
Assi, Chadi ;
Sharafeddine, Sanaa ;
Ghrayeb, Ali .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (07) :2493-2505
[9]   Age of Information Aware Trajectory Planning of UAVs in Intelligent Transportation Systems: A Deep Learning Approach [J].
Samir, Moataz ;
Assi, Chadi ;
Sharafeddine, Sanaa ;
Ebrahimi, Dariush ;
Ghrayeb, Ali .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) :12382-12395
[10]   Research on k-means Clustering Algorithm An Improved k-means Clustering Algorithm [J].
Shi Na ;
Liu Xumin ;
Guan Yong .
2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, :63-67