Configuring Transmission Thresholds in IIoT Alarm Scenarios for Energy-Efficient Event Reporting

David E. Ruíz-Guirola, , Onel L. A. López, ,
and Samuel Montejo-Sánchez
David E. Ruíz-Guirola and Onel L. A. López are with the Centre for Wireless Communications, University of Oulu, Finland. {David.RuizGuirola, Onel.AlcarazLopez}. Samuel Montejo-Sánchez is with the Instituto Universitario de Investigación y Desarrollo Tecnológico, Universidad Tecnológica Metropolitana, Santiago, Chile. {[email protected]}. This work has been partially supported by the Finnish Foundation for Technology Promotion and the Research Council of Finland (former Academy of Finland) 6G Flagship Programme (Grant Number: 346208), the Finnish Foundation for Technology Promotion, the European Commission through the Horizon Europe/JU SNS project Hexa-X-II (Grant Agreement no. 101095759), and in Chile, by ANID FONDECYT Regular No.1241977.
Abstract

Industrial Internet of Things (IIoT) applications involve real-time monitoring, detection, and data analysis. This is challenged by the intermittent activity of IIoT devices and their limited battery capacity. Indeed, the former issue makes resource scheduling and/or random access difficult, while the latter constrains IIoT devices’ lifetime and efficient operation. In this paper, we address interconnected aspects of these issues. Specifically, we focus on extending the battery life of IIoT devices sensing events/alarms by minimizing the number of unnecessary transmissions. Note that when multiple devices access the channel simultaneously, there are collisions, potentially leading to retransmissions, thus reducing energy efficiency. We propose a threshold-based transmission-decision policy based on the sensing quality and the network spatial deployment. We optimize the transmission thresholds using several approaches such as successive convex approximation, block coordinate descent methods, Voronoi diagrams, explainable machine learning, and algorithms based on natural selection and social behavior. Besides, we propose a new approach that reformulates the optimization problem as a Q𝑄\displaystyle Qitalic_Q-learning solution to promote adaptability to system dynamics. Through numerical evaluation, we demonstrate significant performance enhancements in complex IIoT environments, thus validating the practicality and effectiveness of the proposed solutions. We show that Q-learning performs the best, while the block coordinate descending method incurs the worst performance. Additionally, we compare the proposed methods with a benchmark assigning the same threshold to all the devices for transmission decision. Notably, in low-density scenarios, all the proposed methods outperform the benchmark. On the other hand, successive convex approximation, Voronoi-(i), the K-nearest neighbors-based, and Q-learning outperform the benchmark, while the remaining methods attain similar performance in high-density scenarios. Compared to the benchmark, up to 94% and 60% reduction in power consumption are achieved in low-density and high-density scenarios, respectively.

Index Terms:
Alarm scenario, convex optimization, Industrial Internet of Things, machine learning, transmission threshold.

I Introduction

The Industrial Internet of Things (IIoT) aims to connect Industry 4.0 and thus support predictive maintenance, asset tracking, smart manufacturing, energy management, environmental monitoring, health and safety monitoring, remote control, smart grid management, and agricultural automation [1]. These applications enhance efficiency, safety, and sustainability across several industries, e.g., manufacturing, agriculture, energy, and logistics. Indeed, by incorporating intelligent attributes, including the utilization of real-time data and automation for process optimization and decision-making, IIoT networks allow cyber-physical systems to operate proactively and efficiently [2].

IIoT networks are steadily evolving, driving massive data collection, analysis, and exploitation for control and sensing [3]. In addition, the corresponding applications are often latency-sensitive and handle large amounts of IIoT entities sharing scarce communication resources, e.g., time and bandwidth, resulting in severe co-channel interference. Unfortunately, coordinating the transmissions to mitigate the interference incurs significant overheads, especially because the payload size in IIoT is usually small [4]. Moreover, the sporadic activation of devices leads to highly inefficient coordination. Balancing resource scheduling without prior knowledge about when transmission resources are required and managing interference in large IIoT networks pose significant challenges [5]. Additionally, due to the limited battery capacity of IIoT devices (IIoTDs), improving energy efficiency and incorporating energy harvesting sources are crucial [6].

Note that the spatial arrangement of nodes in an IIoT network significantly impacts event detection accuracy and the effectiveness of alarm notifications. Indeed, one can enhance coverage, minimize blind spots, and optimize data transmission, thereby improving the overall efficiency of the network, by strategically deploying the IIoTDs [7]. Also, one can leverage available information on the spatial correlation among devices to enhance transmission policies upon an event triggering. For instance, tools such as Voronoi diagrams can help identify specific coverage areas for individual IIoTDs within a given space, aiding in spatial analysis [8]. Specifically, a clustering-based distributed learning solution for a medium access scheme is proposed in [6] to tackle the problem where a set of sensors may communicate a joint observation. The complexity lies in the limited signaling and shared information constraints, distinct from related research on exploiting sensor activity correlations or reliable alarm message transmission. In [9], the authors propose a novel channel scheduling method by leveraging the spatial correlation between device activations. Integrating spatial correlation information and employing clustering-based techniques offer promising avenues to optimize transmission policies and enhance the system’s energy efficiency and successful event detection.

Data-driven techniques are also suggested, e.g., in [10, 11, 12, 13, 14]. The authors in [10] propose a security framework that correlates activity across space and time to detect transmission patterns using data mining and supervised machine learning (ML), reaching 99% accuracy. In [11], the authors employ data capturing the correlations between devices to develop a random forest-based predictor for energy consumption in solar-powered nodes, leading to a 14% reduction in prediction error. The age-of-information (freshness of information) optimization problem is tackled using spatial correlations among IoT devices in [12]. The authors in [13] present a framework for deriving high-level industrial events from low-level raw data streams, which can be used for online correlation analysis with high-level process events into a process event log. Meanwhile, in [14], a statistical model is proposed for joint sensor identification and channel estimation using the least absolute shrinkage and selection operator joined to the orthogonal matching pursuit.

Despite the previous IIoT-related research projects, complex issues such as scalability, resource efficiency, and energy efficiency remain open challenges in implementing correlation-based strategies effectively [5]. Addressing these issues is essential to fully optimize IoT connectivity performance as illustrated in this work.

TABLE I: List of Symbols
Symbol Description
di,jsubscript𝑑𝑖𝑗\displaystyle d_{i,j}italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT Distance between ithsuperscript𝑖th\displaystyle i^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT event and an IIoTD j𝑗\displaystyle jitalic_j at (xj,yjsubscript𝑥𝑗subscript𝑦𝑗\displaystyle x_{j},y_{j}italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT)
rj,hsubscript𝑟𝑗\displaystyle r_{j,h}italic_r start_POSTSUBSCRIPT italic_j , italic_h end_POSTSUBSCRIPT Distance between two IIoTDs at (xj,yjsubscript𝑥𝑗subscript𝑦𝑗\displaystyle x_{j},y_{j}italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT) and (xh,yhsubscript𝑥subscript𝑦\displaystyle x_{h},y_{h}italic_x start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT)
𝔼()𝔼\displaystyle\mathbb{E}(\cdot)blackboard_E ( ⋅ ) Expected value operator
fX()subscript𝑓𝑋\displaystyle f_{X}(\cdot)italic_f start_POSTSUBSCRIPT italic_X end_POSTSUBSCRIPT ( ⋅ ), FX()subscript𝐹𝑋\displaystyle F_{X}(\cdot)italic_F start_POSTSUBSCRIPT italic_X end_POSTSUBSCRIPT ( ⋅ ) PDF and CDF of random variable X𝑋\displaystyle Xitalic_X
g𝑔\displaystyle gitalic_g Maximum number of iterations for the algorithms
𝒥𝒥\displaystyle\mathcal{J}caligraphic_J Set of IIoTDs
M𝑀\displaystyle Mitalic_M Number of clusters in k-nearest neighbors
P Transition probability from inactive to active state
p()𝑝\displaystyle p(\cdot)italic_p ( ⋅ ) Sensing power function
Pcolsubscript𝑃col\displaystyle P_{\text{col}}italic_P start_POSTSUBSCRIPT col end_POSTSUBSCRIPT Collision probability
Pesubscript𝑃e\displaystyle P_{\text{e}}italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT Error probability
Pmisssubscript𝑃miss\displaystyle P_{\text{miss}}italic_P start_POSTSUBSCRIPT miss end_POSTSUBSCRIPT Miss-detection probability
Pr(Aj)Prsubscript𝐴𝑗\displaystyle\Pr\left(A_{j}\right)roman_Pr ( italic_A start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) Steady-state probability of IIoTD jthsuperscript𝑗𝑡\displaystyle j^{th}italic_j start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT being active
Pr(Aj|Ah)Prconditionalsubscript𝐴𝑗subscript𝐴\displaystyle\Pr\left(A_{j}|A_{h}\right)roman_Pr ( italic_A start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT | italic_A start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) Probability of IIoTD jthsuperscript𝑗𝑡\displaystyle j^{th}italic_j start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT active if IIoTD hthsuperscript𝑡\displaystyle h^{th}italic_h start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT is active
Q()𝑄\displaystyle Q(\cdot)italic_Q ( ⋅ ) Lookup Q𝑄\displaystyle Qitalic_Q-table
S𝑆\displaystyle Sitalic_S System space
(s,a)𝑠𝑎\displaystyle(s,a)( italic_s , italic_a ) State-action pair
𝒯()𝒯\displaystyle\mathcal{T}(\cdot)caligraphic_T ( ⋅ ) First-order Taylor serie approximation operator
W()𝑊\displaystyle W(\cdot)italic_W ( ⋅ ) Expected power consumption per IIoTD
α𝛼\displaystyle\alphaitalic_α Probability of event occurrence
β𝛽\displaystyle\betaitalic_β Cardinality of population vector in GA
ξ𝜉\displaystyle\xiitalic_ξ Network area
η𝜂\displaystyle\etaitalic_η Control factor sensitivity for a given distance
𝜹𝜹\displaystyle\boldsymbol{\delta}bold_italic_δ IIoTD transmission threshold vector
\displaystyle\nabla First-order derivative operator
μ1,μ2subscript𝜇1subscript𝜇2\displaystyle\mu_{1},\mu_{2}italic_μ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_μ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT Balance utility/cost factors
γjsubscript𝛾𝑗\displaystyle\gamma_{j}italic_γ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT Energy efficiency factor of the jthsuperscript𝑗𝑡\displaystyle j^{th}italic_j start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT IIoTD
ρjsubscript𝜌𝑗\displaystyle\rho_{j}italic_ρ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT Collision effect factor of the jthsuperscript𝑗𝑡\displaystyle j^{th}italic_j start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT IIoTD
σ𝜎\displaystyle\sigmaitalic_σ Miss-detection factor
U𝑈\displaystyle Uitalic_U Cumulative discounted reward
ζτsuperscript𝜁𝜏\displaystyle\zeta^{\tau}italic_ζ start_POSTSUPERSCRIPT italic_τ end_POSTSUPERSCRIPT Discount factor at state τ𝜏\displaystyle\tauitalic_τ
rτ+1subscript𝑟𝜏1\displaystyle r_{\tau+1}italic_r start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT Reward at a next state τ+1𝜏1\displaystyle\tau+1italic_τ + 1
π𝜋\displaystyle\piitalic_π Policy employed within RL
ωτsubscript𝜔𝜏\displaystyle\omega_{\tau}italic_ω start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT Learning rate at state τ𝜏\displaystyle\tauitalic_τ
ϵitalic-ϵ\displaystyle\epsilonitalic_ϵ Non-stuck factor (random action factor)
𝒪()𝒪\displaystyle\mathcal{O}(\cdot)caligraphic_O ( ⋅ ) Big 𝒪𝒪\displaystyle\mathcal{O}caligraphic_O notation
ΘΘ\displaystyle\Thetaroman_Θ Population size for GA and PSO
ΩΩ\displaystyle\Omegaroman_Ω Voronoi distance
  • *

    Probability distribution function (PDF), cumulative distribution function (CDF), genetic algorithm (GA), and particle swarm optimization (PSO).

In this paper, we focus on efficiently allocating transmit resources in an IIoT scenario to prolong the battery life of the devices. The trade-off involving resource allocation and energy efficiency is a complex design problem that we tackle from a perspective that considers spatial and temporal correlations between devices. For this, we leverage convex optimization techniques and derive computationally efficient solutions. Specifically, the contributions of this work are summarized as follows:

  • We propose that the IIoTDs adopt threshold-based transmission decisions based on the sensing quality and network spatial deployment. We assess the impact of such an approach on coverage area, energy efficiency, and successful event detection.

  • We propose successive convex approximation (SCA), block coordinate descending (BCD), and different heuristic and data-driven solutions to optimize the transmission thresholds. The latter solutions include Voronoi diagrams, explainable machine learning, and algorithms based on natural selection and social behavior.

  • We reformulate the optimization problem as a reinforcement learning (RL) challenge and propose a Q𝑄\displaystyle Qitalic_Q-learning solution due to its ability to handle complex and dynamic environments where traditional optimization techniques struggle, and where finding an exact solution is computationally expensive or infeasible.

  • We improve energy efficiency and scalability in complex environments by exploiting the different approaches proposed in this paper. We show that RL performs the best, while BCD performs the worst. Moreover, all the proposed methods outperform the benchmark with equal transmission threshold setup for low-density scenarios, while they perform at least similarly to the benchmark for high-density scenarios. Notably, energy consumption is reduced by up to 94% for low-density scenarios and up to 60% for high-density scenarios.

The rest of the paper is organized as follows. Section II presents the system model and event influence analysis. Section III formulates the optimization problem. The proposed convex optimization solutions are presented in Section IV. In contrast, solutions based on heuristic and RL are proposed in Section V. Section VI discusses the computational complexity of the proposed methods, while Section VII evaluates the proposed method through numerical simulations. Finally, we conclude the paper and list potential future work in Section VIII. Table I lists the symbols used throughout this paper.

II System Model

We consider a rectangular coverage area, ξ𝜉\displaystyle\xiitalic_ξ, of dimensions L×H𝐿𝐻\displaystyle L\times Hitalic_L × italic_H, where a single coordinator/base station serves as the gateway for a set 𝒥𝒥\displaystyle\mathcal{J}caligraphic_J of N𝑁\displaystyle Nitalic_N short-range IIoTDs as depicted in Fig. 1. These IIoTDs aim to detect the triggering of events, such as a moving object in motion detection applications or a fire in a fire-alarm system. The device switches from idle (I𝐼\displaystyle Iitalic_I) to active (A𝐴\displaystyle Aitalic_A) when an alarm event is detected, signifying the need for data transmission to the coordinator. The active devices send packets to the coordinator, which controls all the information exchange within its cell [15]. For simplicity, we assume that all IIoTDs transmit with equal power.

Refer to caption
Figure 1: Illustration of an IIoT network where a coordinator controls and collects information from N=55𝑁55\displaystyle N=55italic_N = 55 IIoTDs. The influence of an event on the surrounding IIoTDs is modeled by a probability activation function that decays with the distance from the event epicenter to the IIoTDs.

Assume that time is slotted in transmission time intervals (TTIs). The devices report their sensing information in state A𝐴\displaystyle Aitalic_A (active), while no traffic is generated in state I𝐼\displaystyle Iitalic_I (idle). We assume that the coordinator knows each IIoTD location and that each event occurs uniformly in the area with probability (α𝛼\displaystyle\alphaitalic_α) in every TTI [16].

Let us define p(di,j)𝑝subscript𝑑𝑖𝑗\displaystyle p(d_{i,j})italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) as a sensing power function that represents the impact of the ithsuperscript𝑖th\displaystyle i^{\text{th}}italic_i start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT event, triggered with epicenter (xi,yi)subscript𝑥𝑖subscript𝑦𝑖\displaystyle(x_{i},y_{i})( italic_x start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ), on the jthsuperscript𝑗th\displaystyle j^{\text{th}}italic_j start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT IIoTD within the network area, in the two-dimensional Euclidean plane 2superscript2\displaystyle\Re^{2}roman_ℜ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT. Here, di,jsubscript𝑑𝑖𝑗\displaystyle d_{i,j}italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT indicates the distance separating them. Moreover, p(di,j)[0,1]𝑝subscript𝑑𝑖𝑗01\displaystyle p(d_{i,j})\rightarrow[0,1]italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) → [ 0 , 1 ] is non-increasing to mimic a decaying influence of events as the distance di,jsubscript𝑑𝑖𝑗\displaystyle d_{i,j}italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT increases. As an example, Fig. 1 depicts the influence of an event epicenter on the surrounding IIoTDs. Potential functions to be used include exponential [16, 15], linear [17], piece-wise linear [18, 19], and power-law decay [17] for general scenarios, while step [20] or sigmoidal [17] functions may be used for more stringent scenarios like indoor setups. In this paper, we use an exponentially decreasing function, i.e., p(di,j)=eηdi,j𝑝subscript𝑑𝑖𝑗superscript𝑒𝜂subscript𝑑𝑖𝑗\displaystyle p(d_{i,j})=e^{-\eta d_{i,j}}italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) = italic_e start_POSTSUPERSCRIPT - italic_η italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT end_POSTSUPERSCRIPT [15]. Here, the parameter η𝜂\displaystyle\etaitalic_η (η>0𝜂0\displaystyle\eta>0italic_η > 0) controls the average sensitivity for a given distance.

Refer to caption
Figure 2: The coverage regions of an illustrative network deployment for a) (top left) η=1𝜂1\displaystyle\eta=1italic_η = 1 and 25 IIoTDs, b) (top right) η=1𝜂1\displaystyle\eta=1italic_η = 1 and 100 IIoTDs, c) (bottom left) η=0.1𝜂0.1\displaystyle\eta=0.1italic_η = 0.1 and 25 IIoTDs, and d) (bottom right) η=0.1𝜂0.1\displaystyle\eta=0.1italic_η = 0.1 and 100 IIoTDs. The activation probability shows the event detection coverage.

Note that η𝜂\displaystyle\etaitalic_η directly influences network coverage, as depicted in Fig. 2. A high η𝜂\displaystyle\etaitalic_η value results in more granulated but smaller coverage, while a smaller η𝜂\displaystyle\etaitalic_η value expands the coverage area. Note that the probability of detecting the event is low for the configuration depicted in Fig. 2(a) since there is a large uncovered area. On the other hand, the coverage area in Fig. 2(d) is the most extensive, while in Fig. 2(b-c) the coverage is medium. However, increasing coverage areas comes together with increasing overlapping regions, which is not desired as it leads to increased collision probability and power consumption, contributing to the IIoTDs’ battery depletion. Increasing (decreasing) the activation probability increases (decreases) the power consumption of the IoTDs but also increases the collision (miss-detection) probability in the network. Thus, designing the IIoTDs’ coverage areas for minimum overlap but realizing desired event detection capabilities extends overall coverage and enhances network energy efficiency. In this article, we explore a solution based on IIoTD clustering according to their spatial position/proximity, as depicted in Fig. 1, thus optimizing resource management and enabling localized data processing. In addition, this aids in fault isolation and provides scalability to the IIoT system while improving energy efficiency. Clustering IIoTDs enables the system to quickly detect and isolate faults within a particular cluster, reducing the impact on the overall network. Furthermore, it enhances scalability by managing clusters independently, simplifying the process of adding or removing devices without disrupting the entire system.

III Optimization Problem

In the considered IIoT setup, devices make observations or measurements, which can be used to estimate the probability of successful signal reception, defined here as p(di,j)𝑝subscript𝑑𝑖𝑗\displaystyle p(d_{i,j})italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ). This probability is typically inferred from historical data or real-time measurements, considering factors such as signal strength and the deployment of IIoTDs. Leveraging sensing signal probabilities, p(di,j)𝑝subscript𝑑𝑖𝑗\displaystyle p(d_{i,j})italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ), as a guide for transmission decisions holds promise for optimizing network efficiency. This accounts for the likelihood of successful signal reception at various distances, considering interference and IIoTD deployment.

We propose setting (and optimizing) a threshold for each device to decide when to transmit data. We denote δjsubscript𝛿𝑗\displaystyle{\delta_{j}}italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT as the transmission threshold that is dynamically chosen for the jthsuperscript𝑗th\displaystyle j^{\text{th}}italic_j start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT IIoTD. Then, the transmission probability for this jthsuperscript𝑗th\displaystyle j^{\text{th}}italic_j start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT IIoTD is given by

Pr(Aj)=αPr(p(di,j)δj).Prsubscript𝐴𝑗𝛼Pr𝑝subscript𝑑𝑖𝑗subscript𝛿𝑗\Pr\left(A_{j}\right)=\alpha\Pr\left(p(d_{i,j})\geq{\delta_{j}}\right).roman_Pr ( italic_A start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) = italic_α roman_Pr ( italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) ≥ italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) . (1)

Specifically, if the estimated p(di,j)𝑝subscript𝑑𝑖𝑗\displaystyle p(d_{i,j})italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) for a given distance is lower than the preset threshold, the device avoids transmission. This is done with the hope that another device has a better observation of the event, thereby avoiding collisions in high-density scenarios, reducing re-transmissions, and conserving energy. This aligns transmission strategies with real-world signal dynamics, promoting more responsive and energy-efficient communication.

Herein, we aim to minimize the energy consumption in the network by optimizing 𝜹𝜹\displaystyle\boldsymbol{\delta}bold_italic_δ=[δ1,δ2,δN]𝐓absentsuperscriptsubscript𝛿1subscript𝛿2subscript𝛿𝑁𝐓\displaystyle=[\delta_{1},\delta_{2},\dots\delta_{N}]^{\mathbf{T}}= [ italic_δ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_δ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … italic_δ start_POSTSUBSCRIPT italic_N end_POSTSUBSCRIPT ] start_POSTSUPERSCRIPT bold_T end_POSTSUPERSCRIPT. Specifically, the optimization problem is stated as

P1::P1\displaystyle\displaystyle\text{P}1:\text{ }P 1 : min𝜹subscript𝜹\displaystyle\displaystyle\min_{{\boldsymbol{\delta}}}\text{ }roman_min start_POSTSUBSCRIPT bold_italic_δ end_POSTSUBSCRIPT W(𝜹)𝑊𝜹\displaystyle\displaystyle W(\boldsymbol{\delta})italic_W ( bold_italic_δ ) (2a)
s.t. 𝔼(Pe(𝜹))𝔼subscript𝑃e𝜹\displaystyle\displaystyle\mathbb{E}(P_{\text{e}}(\boldsymbol{\delta}))blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ ) )  E,absent 𝐸\displaystyle\displaystyle\leq\text{ }E,≤ italic_E , (2b)

where Pe(𝜹)subscript𝑃e𝜹\displaystyle P_{\text{e}}(\boldsymbol{\delta})italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ ) is the error probability given the IIoTDs location and transmission threshold, 𝔼(Pe)𝔼subscript𝑃e\displaystyle\mathbb{E}(P_{\text{e}})blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ) is its expected value with respect to the events’ epicenters, and E𝐸\displaystyle Eitalic_E is the imposed error constraint. Meanwhile, W(𝜹)𝑊𝜹\displaystyle W(\boldsymbol{\delta})italic_W ( bold_italic_δ ) depicts the expected power consumption per IIoTD in the network, which obeys

W(𝜹)=1Nj=1NPr(Aj).𝑊𝜹1𝑁superscriptsubscript𝑗1𝑁Prsubscript𝐴𝑗missing-subexpression\begin{array}[]{ll}W({\boldsymbol{\delta}})=\frac{1}{N}\sum_{j=1}^{N}\Pr\left(% A_{j}\right).\end{array}start_ARRAY start_ROW start_CELL italic_W ( bold_italic_δ ) = divide start_ARG 1 end_ARG start_ARG italic_N end_ARG ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT roman_Pr ( italic_A start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) . end_CELL start_CELL end_CELL end_ROW end_ARRAY (3)

Here, we adopt a simplified energetic model, which is calculated as the proportion of time that the devices are in an active state. We disregard power consumption during idle periods due to its negligible impact on the overall analysis since, in IIoTDs, the primary battery depletion factor comes from radio interface usage. Notice that we assume one transmission window (Tx) per TTI, so more than one IIoTD trying to access the medium at the TTI slot time (kthsuperscript𝑘th\displaystyle k^{\text{th}}italic_k start_POSTSUPERSCRIPT th end_POSTSUPERSCRIPT) is translated into collision.

Collisions occur when multiple devices transmit their shared observations simultaneously, leading to data loss and increasing the expected error probability in our scenario. However, note that failing to detect the presence of an event also increases the error probability. Given an IIoTD deployment, the event error probability Pesubscript𝑃e\displaystyle P_{\text{e}}italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT captures collision (Pcolsubscript𝑃col\displaystyle P_{\text{col}}italic_P start_POSTSUBSCRIPT col end_POSTSUBSCRIPT) and miss-detection (Pmisssubscript𝑃miss\displaystyle P_{\text{miss}}italic_P start_POSTSUBSCRIPT miss end_POSTSUBSCRIPT) probabilities after the occurrence of an event, i.e.,

Pe(𝜹)=Pcol(𝜹)+Pmiss(𝜹),subscript𝑃e𝜹subscript𝑃col𝜹subscript𝑃miss𝜹missing-subexpression\begin{array}[]{rl}P_{\text{e}}(\boldsymbol{\delta})=P_{\text{col}}(% \boldsymbol{\delta})+P_{\text{miss}}(\boldsymbol{\delta}),\vspace{1mm}\end{array}start_ARRAY start_ROW start_CELL italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ ) = italic_P start_POSTSUBSCRIPT col end_POSTSUBSCRIPT ( bold_italic_δ ) + italic_P start_POSTSUBSCRIPT miss end_POSTSUBSCRIPT ( bold_italic_δ ) , end_CELL start_CELL end_CELL end_ROW end_ARRAY (4)

since the coordinator does not receive information about this event in both cases. The miss-detection probability is calculated as

Pmiss(𝜹)=αj=1NPr(p(di,j)<δj)subscript𝑃miss𝜹𝛼superscriptsubscriptproduct𝑗1𝑁Pr𝑝subscript𝑑𝑖𝑗subscript𝛿𝑗missing-subexpression\begin{array}[]{rl}P_{\text{miss}}(\boldsymbol{\delta})=\alpha\prod_{j=1}^{N}% \Pr(p{(d_{i,j})}<{\delta_{j}})\end{array}start_ARRAY start_ROW start_CELL italic_P start_POSTSUBSCRIPT miss end_POSTSUBSCRIPT ( bold_italic_δ ) = italic_α ∏ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT roman_Pr ( italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) < italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) end_CELL start_CELL end_CELL end_ROW end_ARRAY (5)

due to the event not being detected by any sensor (miss-detection). Conversely, the probability of message notification losses due to collisions when several, more than one IIoTD, transmit at the same time is given by

Pcol(𝜹)=αPmiss(𝜹)Psuc(𝜹),subscript𝑃col𝜹𝛼subscript𝑃miss𝜹subscript𝑃suc𝜹\displaystyle\displaystyle P_{\text{col}}(\boldsymbol{\delta})=\alpha-P_{\text% {miss}}(\boldsymbol{\delta})-P_{\text{suc}}(\boldsymbol{\delta}),italic_P start_POSTSUBSCRIPT col end_POSTSUBSCRIPT ( bold_italic_δ ) = italic_α - italic_P start_POSTSUBSCRIPT miss end_POSTSUBSCRIPT ( bold_italic_δ ) - italic_P start_POSTSUBSCRIPT suc end_POSTSUBSCRIPT ( bold_italic_δ ) , (6)

where Psucsubscript𝑃suc\displaystyle P_{\text{suc}}italic_P start_POSTSUBSCRIPT suc end_POSTSUBSCRIPT is the success probability. Therefore, we have that

Pe(𝜹)=αPsuc(𝜹).subscript𝑃e𝜹𝛼subscript𝑃suc𝜹\displaystyle\displaystyle P_{\text{e}}(\boldsymbol{\delta})=\alpha-P_{\text{% suc}}(\boldsymbol{\delta}).italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ ) = italic_α - italic_P start_POSTSUBSCRIPT suc end_POSTSUBSCRIPT ( bold_italic_δ ) . (7)

Herein, Psucsubscript𝑃suc\displaystyle P_{\text{suc}}italic_P start_POSTSUBSCRIPT suc end_POSTSUBSCRIPT refers to the union of the detection events from one and only one of the N𝑁\displaystyle Nitalic_N sensors described as

Psuc(𝜹)=αh=1N(Pr(p(di,j)δh)jhNPr(p(di,j)<δj)).subscript𝑃suc𝜹𝛼superscriptsubscript1𝑁Pr𝑝subscript𝑑𝑖𝑗subscript𝛿superscriptsubscriptproduct𝑗𝑁Pr𝑝subscript𝑑𝑖𝑗subscript𝛿𝑗\displaystyle\displaystyle P_{\text{suc}}(\boldsymbol{\delta})=\alpha\sum_{h=1% }^{N}\Big{(}\Pr\left(p{(d_{i,j})}\geq{\delta_{h}}\right)\prod_{j\neq h}^{N}\Pr% \left(p{(d_{i,j})}<{\delta_{j}}\right)\Big{)}.italic_P start_POSTSUBSCRIPT suc end_POSTSUBSCRIPT ( bold_italic_δ ) = italic_α ∑ start_POSTSUBSCRIPT italic_h = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT ( roman_Pr ( italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) ≥ italic_δ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) ∏ start_POSTSUBSCRIPT italic_j ≠ italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT roman_Pr ( italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) < italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) ) . (8)

Then, the expected value in the network area is given by

𝔼(Pe(𝜹))=α𝔼(Psuc(𝜹))=ξ1|ξ|Pe(𝜹)ξ.𝔼subscript𝑃e𝜹𝛼𝔼subscript𝑃suc𝜹subscript𝜉1𝜉subscript𝑃e𝜹𝜉\mathbb{E}(P_{\text{e}}(\boldsymbol{\delta}))=\alpha-\mathbb{E}(P_{\text{suc}}% (\boldsymbol{\delta}))=\int_{\xi}\frac{1}{|\xi|}P_{\text{e}}(\boldsymbol{% \delta})\partial\xi.blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ ) ) = italic_α - blackboard_E ( italic_P start_POSTSUBSCRIPT suc end_POSTSUBSCRIPT ( bold_italic_δ ) ) = ∫ start_POSTSUBSCRIPT italic_ξ end_POSTSUBSCRIPT divide start_ARG 1 end_ARG start_ARG | italic_ξ | end_ARG italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ ) ∂ italic_ξ . (9)

IV Convex Optimization-based solution

Substituting αPr(eηdi,j>δj)𝛼Prsuperscript𝑒𝜂subscript𝑑𝑖𝑗subscript𝛿𝑗\displaystyle\alpha\Pr\textstyle\left(e^{-\eta d_{i,j}}>\delta_{j}\right)italic_α roman_Pr ( italic_e start_POSTSUPERSCRIPT - italic_η italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT end_POSTSUPERSCRIPT > italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) into (3), the expected power consumption in the network obeys

W(𝜹)=αNj=1NPr(eηdi,j>δj).𝑊𝜹𝛼𝑁superscriptsubscript𝑗1𝑁Prsuperscript𝑒𝜂subscript𝑑𝑖𝑗subscript𝛿𝑗missing-subexpression\begin{array}[]{ll}W(\boldsymbol{\delta})=\frac{\alpha}{N}\sum_{j=1}^{N}{\Pr% \left(e^{-\eta d_{i,j}}>\delta_{j}\right)}.\end{array}start_ARRAY start_ROW start_CELL italic_W ( bold_italic_δ ) = divide start_ARG italic_α end_ARG start_ARG italic_N end_ARG ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT roman_Pr ( italic_e start_POSTSUPERSCRIPT - italic_η italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT end_POSTSUPERSCRIPT > italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) . end_CELL start_CELL end_CELL end_ROW end_ARRAY (10)

This is monotonically increasing on Pr(eηdi,j>δj)Prsuperscript𝑒𝜂subscript𝑑𝑖𝑗subscript𝛿𝑗\displaystyle\Pr\left(e^{-\eta d_{i,j}}>\delta_{j}\right)roman_Pr ( italic_e start_POSTSUPERSCRIPT - italic_η italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT end_POSTSUPERSCRIPT > italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ), which in turn is exponentially decreasing on δjsubscript𝛿𝑗\displaystyle\delta_{j}italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT. Then, the optimization problem can be reformulated as minimizing Pr(eηdi,j>δj)Prsuperscript𝑒𝜂subscript𝑑𝑖𝑗subscript𝛿𝑗\displaystyle\Pr\textstyle\left(e^{-\eta d_{i,j}}>\delta_{j}\right)roman_Pr ( italic_e start_POSTSUPERSCRIPT - italic_η italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT end_POSTSUPERSCRIPT > italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) equivalent to Pr(di,j<ln(δj)/η)Prsubscript𝑑𝑖𝑗lnsubscript𝛿𝑗𝜂\displaystyle\Pr\left({d_{i,j}}<-\mathrm{ln}(\delta_{j})/\eta\right)roman_Pr ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT < - roman_ln ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) / italic_η ). Note that di,j=(Xxj)2+(Yyj)2subscript𝑑𝑖𝑗superscript𝑋subscript𝑥𝑗2superscript𝑌subscript𝑦𝑗2\displaystyle d_{i,j}=\textstyle\sqrt{(X-x_{j})^{2}+(Y-y_{j})^{2}}italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = square-root start_ARG ( italic_X - italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + ( italic_Y - italic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG, where X𝑋\displaystyle Xitalic_X and Y𝑌\displaystyle Yitalic_Y are random variables. Herein, without losing generality, we assume that X𝑋\displaystyle Xitalic_X and Y𝑌\displaystyle Yitalic_Y are equally distributed in [0,L]0𝐿\displaystyle[0,L][ 0 , italic_L ] and [0,H]0𝐻\displaystyle[0,H][ 0 , italic_H ], respectively, and (xj,yj)subscript𝑥𝑗subscript𝑦𝑗\displaystyle(x_{j},y_{j})( italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) is the known position of the device j𝑗\displaystyle jitalic_j.

Theorem 1

Let Z=di,j2=(Xxj)2+(Yyj)2𝑍superscriptsubscript𝑑𝑖𝑗2superscript𝑋subscript𝑥𝑗2superscript𝑌subscript𝑦𝑗2\displaystyle Z=d_{i,j}^{2}=(X-x_{j})^{2}+(Y-y_{j})^{2}italic_Z = italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT = ( italic_X - italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + ( italic_Y - italic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT, then

FZ(z)=2zξ(arcsin(uz)+12sin(2arcsin(uz))),subscript𝐹𝑍𝑧2𝑧𝜉arcsin𝑢𝑧122arcsin𝑢𝑧\displaystyle\displaystyle F_{Z}(z)=\frac{2z}{\xi}\left(\text{arcsin}\left(% \sqrt{\frac{u}{z}}\right)+\frac{1}{2}\sin{\left(2\text{arcsin}\left(\sqrt{% \frac{u}{z}}\right)\right)}\right),italic_F start_POSTSUBSCRIPT italic_Z end_POSTSUBSCRIPT ( italic_z ) = divide start_ARG 2 italic_z end_ARG start_ARG italic_ξ end_ARG ( arcsin ( square-root start_ARG divide start_ARG italic_u end_ARG start_ARG italic_z end_ARG end_ARG ) + divide start_ARG 1 end_ARG start_ARG 2 end_ARG roman_sin ( 2 arcsin ( square-root start_ARG divide start_ARG italic_u end_ARG start_ARG italic_z end_ARG end_ARG ) ) ) , (11)

where u=max(xj;Lxj)2.𝑢maxsuperscriptsubscript𝑥𝑗𝐿subscript𝑥𝑗2\displaystyle u=\text{max}(x_{j};L-x_{j})^{2}.italic_u = max ( italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ; italic_L - italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT .

Proof: See proof in Appendix A.

The function in (11) is inherently non-convex and highly non-linear due to the significant oscillations and fluctuations introduced by the trigonometric functions, leading to multiple local minima and maxima. This makes (11) computationally expensive to analyze and optimize. Note however that

FZ(z)1e2zw, for z200/η2,formulae-sequencesubscript𝐹𝑍𝑧1superscript𝑒2𝑧𝑤 for 𝑧200superscript𝜂2F_{Z}(z)\approx 1-e^{-\frac{2z}{w}},\text{ for }z\leq 200/\eta^{2},italic_F start_POSTSUBSCRIPT italic_Z end_POSTSUBSCRIPT ( italic_z ) ≈ 1 - italic_e start_POSTSUPERSCRIPT - divide start_ARG 2 italic_z end_ARG start_ARG italic_w end_ARG end_POSTSUPERSCRIPT , for italic_z ≤ 200 / italic_η start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT , (12)

which is a practical sensing range for low-power IIoTD (less than 5 meters [6], corresponding to δ[104,1]𝛿superscript1041\displaystyle\delta\in[10^{-4},1]italic_δ ∈ [ 10 start_POSTSUPERSCRIPT - 4 end_POSTSUPERSCRIPT , 1 ]).

Refer to caption
Refer to caption
Figure 3: Approximation to (11) fo different u,v𝑢𝑣\displaystyle u,vitalic_u , italic_v and η𝜂\displaystyle\etaitalic_η values, (left) u,v=25𝑢𝑣25\displaystyle u,v=25italic_u , italic_v = 25 and (rigth) u,v=50𝑢𝑣50\displaystyle u,v=50italic_u , italic_v = 50.

Fig. 3 illustrates the accuracy of (12) for various values of u𝑢\displaystyle uitalic_u, v𝑣\displaystyle vitalic_v, and η𝜂\displaystyle\etaitalic_η, suggesting its suitability for reformulating the complexity of (2) into a more manageable form. Therefore, Pr(di,jln(δj)/η)Prsubscript𝑑𝑖𝑗lnsubscript𝛿𝑗𝜂\displaystyle\Pr\left({d_{i,j}}\leq-\mathrm{ln}(\delta_{j})/\eta\right)roman_Pr ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ≤ - roman_ln ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) / italic_η ) can be reformulated as Pr(zjln2(δj)/η2)=Fz(ln2(δj)/η2)Prsubscript𝑧𝑗superscriptln2subscript𝛿𝑗superscript𝜂2subscript𝐹𝑧superscriptln2subscript𝛿𝑗superscript𝜂2\displaystyle\Pr\left({z_{j}}\leq\mathrm{ln^{2}}(\delta_{j})/\eta^{2}\right)=F% _{z}\left(\mathrm{ln^{2}}(\delta_{j})/\eta^{2}\right)roman_Pr ( italic_z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ≤ roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) / italic_η start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ) = italic_F start_POSTSUBSCRIPT italic_z end_POSTSUBSCRIPT ( roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) / italic_η start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ), which is monotonically increasing, and P1 can be rewritten as

P2::P2\displaystyle\displaystyle\text{P}2:\text{ }P 2 : min𝜹subscript𝜹\displaystyle\displaystyle\min_{\boldsymbol{\delta}}\text{ }roman_min start_POSTSUBSCRIPT bold_italic_δ end_POSTSUBSCRIPT j=1NFz(ln2(δj)/η2)superscriptsubscript𝑗1𝑁subscript𝐹𝑧superscriptln2subscript𝛿𝑗superscript𝜂2\displaystyle\displaystyle\sum_{j=1}^{N}{F_{z}\left(\mathrm{ln^{2}}(\delta_{j}% )/\eta^{2}\right)}∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT italic_F start_POSTSUBSCRIPT italic_z end_POSTSUBSCRIPT ( roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) / italic_η start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ) (13a)
s.t. 𝔼(Pe(𝜹)) E.𝔼subscript𝑃e𝜹 𝐸\displaystyle\displaystyle\mathbb{E}(P_{\text{e}}(\boldsymbol{\delta}))\leq% \text{ }E.blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ ) ) ≤ italic_E . (13b)

Herein, 𝔼(Pe(𝜹))𝔼subscript𝑃e𝜹\displaystyle\mathbb{E}(P_{\text{e}}(\boldsymbol{\delta}))blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ ) ) can be computed by substituting (8) into (9), wherein

𝔼(Psuc(𝜹))=𝔼subscript𝑃suc𝜹absent\displaystyle\displaystyle\mathbb{E}(P_{\text{suc}}(\boldsymbol{\delta}))=blackboard_E ( italic_P start_POSTSUBSCRIPT suc end_POSTSUBSCRIPT ( bold_italic_δ ) ) = αh=1N(1e2ln2(δh)wh)jhNe2ln2(δj)wj𝛼superscriptsubscript1𝑁1superscript𝑒2lsuperscriptn2subscript𝛿subscript𝑤superscriptsubscriptproduct𝑗𝑁superscript𝑒2lsuperscriptn2subscript𝛿𝑗subscript𝑤𝑗\displaystyle\displaystyle\alpha\sum_{h=1}^{N}\left(1-e^{-\frac{2\mathrm{ln^{2% }}(\delta_{h})}{w_{h}}}\right)\prod_{j\neq h}^{N}e^{-\frac{2\mathrm{ln^{2}}(% \delta_{j})}{w_{j}}}italic_α ∑ start_POSTSUBSCRIPT italic_h = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT ( 1 - italic_e start_POSTSUPERSCRIPT - divide start_ARG 2 roman_l roman_n start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT ) ∏ start_POSTSUBSCRIPT italic_j ≠ italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT italic_e start_POSTSUPERSCRIPT - divide start_ARG 2 roman_l roman_n start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT
=\displaystyle\displaystyle== αh=1N(1e2ln2(δh)wh)e2jhNln2δjwj𝛼superscriptsubscript1𝑁1superscript𝑒2lsuperscriptn2subscript𝛿subscript𝑤superscript𝑒2superscriptsubscript𝑗𝑁superscript2subscript𝛿𝑗subscript𝑤𝑗\displaystyle\displaystyle\alpha\sum_{h=1}^{N}\left(1-e^{-\frac{2\mathrm{ln^{2% }}(\delta_{h})}{w_{h}}}\right)e^{-2\sum_{j\neq h}^{N}\frac{\ln^{2}\delta_{j}}{% w_{j}}}italic_α ∑ start_POSTSUBSCRIPT italic_h = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT ( 1 - italic_e start_POSTSUPERSCRIPT - divide start_ARG 2 roman_l roman_n start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT ) italic_e start_POSTSUPERSCRIPT - 2 ∑ start_POSTSUBSCRIPT italic_j ≠ italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT
=\displaystyle\displaystyle== αh=1Ne2jhNln2δjwj+αNe2j=1Nln2δjwj.𝛼superscriptsubscript1𝑁superscript𝑒2superscriptsubscript𝑗𝑁superscript2subscript𝛿𝑗subscript𝑤𝑗𝛼𝑁superscript𝑒2superscriptsubscript𝑗1𝑁superscript2subscript𝛿𝑗subscript𝑤𝑗\displaystyle\displaystyle\alpha\sum_{h=1}^{N}e^{-2\sum_{j\neq h}^{N}\frac{\ln% ^{2}\delta_{j}}{w_{j}}}+{\alpha}{N}e^{-2\sum_{j=1}^{N}\frac{\ln^{2}\delta_{j}}% {w_{j}}}.italic_α ∑ start_POSTSUBSCRIPT italic_h = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT italic_e start_POSTSUPERSCRIPT - 2 ∑ start_POSTSUBSCRIPT italic_j ≠ italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT + italic_α italic_N italic_e start_POSTSUPERSCRIPT - 2 ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT . (14)

Hence,

𝔼(Pe(𝜹))=𝔼subscript𝑃e𝜹absent\displaystyle\displaystyle\mathbb{E}(P_{\text{e}}(\boldsymbol{\delta}))=blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ ) ) = ααh=1Ne2jhNln2δjwj+αNe2j=1Nln2δjwj.𝛼𝛼superscriptsubscript1𝑁superscript𝑒2superscriptsubscript𝑗𝑁superscript2subscript𝛿𝑗subscript𝑤𝑗𝛼𝑁superscript𝑒2superscriptsubscript𝑗1𝑁superscript2subscript𝛿𝑗subscript𝑤𝑗\displaystyle\displaystyle\alpha-\alpha\sum_{h=1}^{N}e^{-2\sum_{j\neq h}^{N}% \frac{\ln^{2}\delta_{j}}{w_{j}}}+{\alpha}{N}e^{-2\sum_{j=1}^{N}\frac{\ln^{2}% \delta_{j}}{w_{j}}}.italic_α - italic_α ∑ start_POSTSUBSCRIPT italic_h = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT italic_e start_POSTSUPERSCRIPT - 2 ∑ start_POSTSUBSCRIPT italic_j ≠ italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT + italic_α italic_N italic_e start_POSTSUPERSCRIPT - 2 ∑ start_POSTSUBSCRIPT italic_j = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT . (15)

However, solving this optimization problem is still non-trivial since the objective and constraint functions are not convex (see proof in Appendix B).

Convex optimization techniques have been promising in addressing various challenges in wireless communication systems, including optimizing beamforming for enhanced signal transmission [21], power consumption minimization [22], and refining device localization methods for precise positioning [23]. Moreover, interior point methods (IPM) [24, 25], which are known to converge in/with polynomial time/complexity, are commonly utilized for solving convex problems [26, 27]. In the following subsections, we will discuss the fundamental principles of convex approximation methods used in this paper and how they address P2. Such an optimization problem can be solved by iterative approximation methods like SCA [28, 25] or BCD [29], where an inner convex approximation in each iteration approximates the non-convex feasible set. By using the approximation methods, an approximate solution to the optimization problem in (13) can be attained using standard convex optimization tools such as CVX [28] or fmincon of MATLAB [30].

IV-A Successive Convex Approximation (SCA)

Algorithm 1 SCA
1:Initialization: Choose initial 𝜹𝟎subscript𝜹0\displaystyle\boldsymbol{\delta_{0}}bold_italic_δ start_POSTSUBSCRIPT bold_0 end_POSTSUBSCRIPT
2:for k=0,1,2,,g1𝑘012𝑔1\displaystyle k=0,1,2,\ldots,g-1italic_k = 0 , 1 , 2 , … , italic_g - 1 do
3:    Solve the surrogate problem using 𝒯()𝒯\displaystyle\mathcal{T}(\cdot)caligraphic_T ( ⋅ ) around 𝜹ksubscript𝜹𝑘\displaystyle\boldsymbol{\delta}_{k}bold_italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT such that 𝜹^k=argmin𝜹W(𝜹) s.t. 𝔼(Pe(𝜹))Esubscriptbold-^𝜹𝑘subscript𝜹𝑊𝜹 s.t. 𝔼subscript𝑃e𝜹𝐸\displaystyle{\boldsymbol{\hat{\delta}}}_{k}=\arg\min_{\boldsymbol{\delta}}W(% \boldsymbol{\delta})\text{ }\text{s.t. }\mathbb{E}(P_{\text{e}}(\boldsymbol{% \delta}))\leq Eoverbold_^ start_ARG bold_italic_δ end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT = roman_arg roman_min start_POSTSUBSCRIPT bold_italic_δ end_POSTSUBSCRIPT italic_W ( bold_italic_δ ) s.t. blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ ) ) ≤ italic_E
4:    Update with learning rate ϑk:𝜹k+1=𝜹k+ϑk(𝜹^k𝜹k):subscriptitalic-ϑ𝑘subscript𝜹𝑘1subscript𝜹𝑘subscriptitalic-ϑ𝑘subscriptbold-^𝜹𝑘subscript𝜹𝑘\displaystyle\vartheta_{k}:\boldsymbol{\delta}_{k+1}=\boldsymbol{\delta}_{k}+% \vartheta_{k}\left({\boldsymbol{\hat{\delta}}}_{k}-\boldsymbol{\delta}_{k}\right)italic_ϑ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT : bold_italic_δ start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT = bold_italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT + italic_ϑ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ( overbold_^ start_ARG bold_italic_δ end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT - bold_italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT )
5:end for
6:Return 𝜹ksubscript𝜹𝑘\displaystyle\boldsymbol{\delta}_{k}bold_italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT

To solve P2 using SCA, we approximate the constraint function with its first-order Taylor series and iteratively optimize the objective function. Also, we use regularization to enforce convergence. Herein, we define 𝒯()𝒯\displaystyle\mathcal{T}(\cdot)caligraphic_T ( ⋅ ) as the operator approximating an input function using its first-order Taylor series expansion. The first-order Taylor series approximation is used to estimate the constraint around 𝜹𝟎subscript𝜹0\displaystyle\boldsymbol{\delta_{0}}bold_italic_δ start_POSTSUBSCRIPT bold_0 end_POSTSUBSCRIPT. This constraint is a vector of initial values of 𝜹𝜹\displaystyle\boldsymbol{\delta}bold_italic_δ that gets updated in each SCA iteration by the resulting value obtained in the previous iteration. The error probability and its first derivative is evaluated in 𝜹𝜹\displaystyle\boldsymbol{\delta}bold_italic_δ, Thus, it is given by

𝒯(𝔼(Pe(𝜹)))=𝒯𝔼subscript𝑃e𝜹absent\displaystyle\displaystyle\mathcal{T}(\mathbb{E}(P_{\text{e}}(\boldsymbol{% \delta})))=caligraphic_T ( blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ ) ) ) = 𝔼(Pe(𝜹𝟎))+(𝜹𝜹𝟎)𝐓𝔼(Pe(𝜹𝟎)),𝔼subscript𝑃esubscript𝜹0superscript𝜹subscript𝜹0𝐓𝔼subscript𝑃esubscript𝜹0\displaystyle\displaystyle\mathbb{E}(P_{\text{e}}(\boldsymbol{\delta_{0}}))+(% \boldsymbol{\delta}-\boldsymbol{\delta_{0}})^{\mathbf{T}}\nabla\mathbb{E}(P_{% \text{e}}(\boldsymbol{\delta_{0}})),blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ start_POSTSUBSCRIPT bold_0 end_POSTSUBSCRIPT ) ) + ( bold_italic_δ - bold_italic_δ start_POSTSUBSCRIPT bold_0 end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT bold_T end_POSTSUPERSCRIPT ∇ blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ start_POSTSUBSCRIPT bold_0 end_POSTSUBSCRIPT ) ) , (16)

where

δj𝔼(Pe(𝜹))subscriptsubscript𝛿𝑗𝔼subscript𝑃e𝜹\displaystyle\displaystyle\!\nabla_{\delta_{j}}\mathbb{E}(P_{\text{e}}(% \boldsymbol{\delta}))\!∇ start_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ ) ) =4αln(δj)wjδj(h=1N1e2ihNln2δiwie2i=1Nln2δiwi).absent4𝛼lnsubscript𝛿𝑗subscript𝑤𝑗subscript𝛿𝑗superscriptsubscript1𝑁1superscript𝑒2superscriptsubscript𝑖𝑁superscript2subscript𝛿𝑖subscript𝑤𝑖superscript𝑒2superscriptsubscript𝑖1𝑁superscript2subscript𝛿𝑖subscript𝑤𝑖\displaystyle\displaystyle=\!\frac{4\alpha\mathrm{ln}(\delta_{j})}{w_{j}\delta% _{j}}\!\left(\sum_{h=1}^{N-1}\!e^{-2\sum_{i\neq h}^{N}\!\frac{\ln^{2}\delta_{i% }}{w_{i}}}\!\!-\!e^{-2\sum_{i=1}^{N}\!\frac{\ln^{2}\delta_{i}}{w_{i}}}\!\!% \right).= divide start_ARG 4 italic_α roman_ln ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG ( ∑ start_POSTSUBSCRIPT italic_h = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N - 1 end_POSTSUPERSCRIPT italic_e start_POSTSUPERSCRIPT - 2 ∑ start_POSTSUBSCRIPT italic_i ≠ italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT - italic_e start_POSTSUPERSCRIPT - 2 ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT ) . (17)

Algorithm 1 depicts the SCA algorithm for each iteration k𝑘\displaystyle kitalic_k. Note that the complexity when implementing SCA is 𝒪(gf(𝜹))𝒪𝑔𝑓𝜹\displaystyle\mathcal{O}(gf({\boldsymbol{\delta}}))caligraphic_O ( italic_g italic_f ( bold_italic_δ ) ), where g𝑔\displaystyle gitalic_g is the maximum number of iterations.

IV-B Block coordinate descending method (BCD)

Algorithm 2 BCD
1:Initialization: Choose initial 𝜹𝟎subscript𝜹0\displaystyle\boldsymbol{\delta_{0}}bold_italic_δ start_POSTSUBSCRIPT bold_0 end_POSTSUBSCRIPT
2:for k=0,1,2,,g1𝑘012𝑔1\displaystyle k=0,1,2,\ldots,g-1italic_k = 0 , 1 , 2 , … , italic_g - 1 do
3:    for j=1,2,,N𝑗12𝑁\displaystyle j=1,2,\ldots,Nitalic_j = 1 , 2 , … , italic_N do
4:         Solve P2 for variable δj^^subscript𝛿𝑗\displaystyle{{\hat{\delta_{j}}}}over^ start_ARG italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG with δhjsubscript𝛿𝑗\displaystyle\delta_{h\neq j}italic_δ start_POSTSUBSCRIPT italic_h ≠ italic_j end_POSTSUBSCRIPT fixed, i.e., δj^=argminδj W(𝜹) s.t. 𝔼(Pe(𝜹))E^subscript𝛿𝑗subscriptsubscript𝛿𝑗 𝑊𝜹 s.t. 𝔼subscript𝑃e𝜹𝐸\displaystyle{{{\hat{\delta_{j}}}}=\arg\min_{\delta_{j}}}\text{ }W(\boldsymbol% {\delta})\text{ }\text{s.t. }\mathbb{E}(P_{\text{e}}(\boldsymbol{\delta}))\leq Eover^ start_ARG italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG = roman_arg roman_min start_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_W ( bold_italic_δ ) s.t. blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ ) ) ≤ italic_E
5:    end for
6:    𝜹k+1=𝜹^ksubscript𝜹𝑘1subscriptbold-^𝜹𝑘\displaystyle\boldsymbol{\delta}_{k+1}={\boldsymbol{\hat{\delta}}}_{k}bold_italic_δ start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT = overbold_^ start_ARG bold_italic_δ end_ARG start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT
7:end for
8:Return 𝜹𝒌subscript𝜹𝒌\displaystyle\boldsymbol{\delta_{k}}bold_italic_δ start_POSTSUBSCRIPT bold_italic_k end_POSTSUBSCRIPT

In the conventional BCD framework, the formulated non-convex sparse recovery problem can be decomposed into small-scale sub-problems after exploiting the least absolute shrinkage and selection operator-based regularization [29]. Subsequently, the variables in each sub-problem can be optimized sequentially with variables from other sub-problems kept fixed. Herein, we also approximate the constraint function with its first-order Taylor series, as in SCA, but in this case, the function has just one variable in each iteration, while the rest are fixed. The method runs N𝑁\displaystyle Nitalic_N iterations in which the problem is solved for one variable at each step, fixing the rest of (N1)𝑁1\displaystyle(N-1)( italic_N - 1 ) variables, running N𝑁\displaystyle Nitalic_N sequential problems with one variable in an inner loop, and repeating the method g𝑔\displaystyle gitalic_g times (maximum iteration). Algorithm 2 summarizes BCD algorithm and note that its complexity is 𝒪(gNf(𝜹))𝒪𝑔𝑁𝑓𝜹\displaystyle\mathcal{O}(gNf({\boldsymbol{\delta}}))caligraphic_O ( italic_g italic_N italic_f ( bold_italic_δ ) ).

Refer to caption
Refer to caption
Refer to caption
Figure 4: Illustration of a Voronoi diagram for a grid IIoT deployment with 5 devices (represented as red dots). The black lines represent the Voronoi polygon corresponding to each IIoTD, while the blue lines represent the sensing area border. (left) Voronoi-(i), (center) Voronoi-(ii), and (right) Voronoi-(iii).

V Heuristic & Data-driven proposed solutions

Relying on previous optimization techniques can be computationally expensive and time-consuming, especially for large-scale IoT systems. Herein, we aim to explore heuristic and data-driven approaches to efficiently solve the problem. Note that heuristic approaches may lead to near-optimal solutions relatively quickly. In contrast, data-driven solutions can learn from the available data and make predictions based on the learned patterns. Metaheuristic methods such as GA [31] and PSO [32] are valid tools, along with online methods like RL [33] and Lyapunov optimization [34], which also offer adaptability.

In the following, we present potential approaches to solve the problem. The first two solutions are heuristics, one based on the Voronoi diagram and the other on clustering and Bayes’ theorem, specifically KNN. The third solution uses metaheuristic numerical methods and requires GA and PSO tools. The fourth and final approach is a RL-based solution. Notice that, unlike the metaheuristic methods, such heuristic learning can be performed online, as it does not require an oracle view of the network for re-training. Specifically, the sensors can independently implement and change strategies in case of re-training, using acknowledgments for correctly transmitted packets as their only feedback while knowing the position of the sensors (fixed) in its cluster and their threshold.

V-A Voronoi-based approach

Herein, we optimize 𝜹𝜹\displaystyle\boldsymbol{\delta}bold_italic_δ using the Voronoi graph theory applied to the IIoT deployment. The principle of the Voronoi diagram has been maturely applied to computer graphics research, occupying an important role in computational geometry [35]. A Voronoi diagram comprises a set of continuous polygons formed by vertical bisectors connecting two neighboring edges [36]. The bisector is the trajectory of all points at equal distances to neighboring IIoTD. A Voronoi diagram has three basic properties: (i) each Voronoi area is unique; (ii) the adjacent Voronoi area of each Voronoi area is the nearest adjacent area in the Euclidean plane; and (iii) each Voronoi area has at least three edges, and the edges are closed [36]. Fig. 4 depicts a simplified and easily interpretable Voronoi diagram of an IIoT deployment with 5 devices.

The Voronoi diagram’s definition and unique properties can be harnessed to partition areas and employ the resulting polygons for each device as a metric for optimizing transmission thresholds. Specifically, we use the polygon metrics to calculate the optimal δj=eηΩjsubscript𝛿𝑗superscript𝑒𝜂subscriptΩ𝑗\displaystyle\delta_{j}=e^{-\eta\Omega_{j}}italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = italic_e start_POSTSUPERSCRIPT - italic_η roman_Ω start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUPERSCRIPT, where ΩjsubscriptΩ𝑗\displaystyle\Omega_{j}roman_Ω start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT (blue lines in Fig. 4) represents the target coverage radio per IoTD, and it is obtained by using three approaches as follows

  • i)

    minimum distance from the IIoTD to its polygon;

  • ii)

    mean distance from the IIoTD to its polygon;

  • iii)

    maximum distance from the IIoTD to its polygon.

When employing a Voronoi-based approach, the worst-case complexity is 𝒪(2NlogN)𝒪2𝑁𝑁\displaystyle\mathcal{O}(2N\log N)caligraphic_O ( 2 italic_N roman_log italic_N ) [37].

V-B Bayesian-based KNN

Recently, ML capabilities and utilization have tremendously increased in various fields. While cutting-edge ML models provide invaluable benefits, they often function as black boxes, which makes it difficult for humans to understand their decision-making processes. Indeed, complex models such as deep neural networks have multiple parameters and intricate structures to the point of being considered black boxes with low understandability.

The demand for transparency has prompted the emergence of Explainable AI (XAI). XAI is a field dedicated to developing AI methods that serve two primary objectives: i) to generate more comprehensible models while ensuring their learning efficiency remains high and ii) to enable humans to trust, understand, and effectively manage these AI systems. Note, for instance, that ML models such as linear/logistic regression, decision trees, KNN, rule-based learners, general additive models, and Bayesian models are more easily understood and manipulated by humans. These models are transparent by design and have a greater explaining capacity than complex models like deep neural networks, as depicted in Fig. 5, inspired in [38].

Herein, we adopt KNN [39, 40] and Bayesian Models [41], widely used XAI approaches in the IIoT context because of their trade-off accuracy/interpretability and simplicity.

Refer to caption
Figure 5: The trade-off between model interpretability and performance.

Specifically, we propose a heuristic approach wherein we form clusters based on each device’s spatial placement using KNN, thus each data point is connected to its K-nearest neighbors, creating a graph structure. Note that the considered IIoT network is stationary, i.e., devices’ positions are fixed and known, thus the computational cost associated with implementing KNN is 𝒪(N(N1)/2)𝒪𝑁𝑁12\displaystyle\mathcal{O}(N(N-1)/2)caligraphic_O ( italic_N ( italic_N - 1 ) / 2 ) in the worst-case scenario (brute force). This complexity arises due to the need to calculate distances to the N𝑁\displaystyle Nitalic_N IIoTD for each query point. The search involves scanning the entire dataset to identify the KNN. However, as previously mentioned, the computation time can differ based on the utilized algorithm, occasionally reducing to 𝒪(min{M(NM),(NM)2})𝒪𝑀𝑁𝑀superscript𝑁𝑀2\displaystyle\mathcal{O}(\min\{M(N-M),(N-M)^{2}\})caligraphic_O ( roman_min { italic_M ( italic_N - italic_M ) , ( italic_N - italic_M ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT } ), where M𝑀\displaystyle Mitalic_M is the number of clusters [37]. Note that we only form clusters once for a given IIoTD deployment, thus it can be implemented offline.

After establishing the clusters, as depicted in Fig. 6 (see also Fig. 1) as an example, we employ a greedy conditional probability rule, the generalized Bayes’ rule. We start from the edges that statistically require a larger sensing area, i.e., a lower threshold, to cover the entire area effectively and prevent miss-detection. Each device constitutes the center of a cluster according to the spatial correlation to its nearest neighbors, forming a graph structure. Initially, the devices’ activation probability is set randomly. Then, we begin by updating the transmission threshold for each device by taking into account its spatial correlation with its nearest neighbors. We calculate δjsubscript𝛿𝑗\displaystyle\delta_{j}italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT based on the transmission thresholds of the neighbors and its transmission threshold, taking into account the spatial correlation as well. Then,

Pr(p(di,j)δj)=hPr(Aj|Ah)Pr(p(di,h)δh),Pr𝑝subscript𝑑𝑖𝑗subscript𝛿𝑗subscriptfor-allPrconditionalsubscript𝐴𝑗subscript𝐴Pr𝑝subscript𝑑𝑖subscript𝛿\Pr\left(p(d_{i,j})\geq{\delta_{j}}\right)=\sum_{\forall h}\Pr(A_{j}|A_{h})\Pr% \left(p(d_{i,h})\geq{\delta_{h}}\right),roman_Pr ( italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) ≥ italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) = ∑ start_POSTSUBSCRIPT ∀ italic_h end_POSTSUBSCRIPT roman_Pr ( italic_A start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT | italic_A start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) roman_Pr ( italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_h end_POSTSUBSCRIPT ) ≥ italic_δ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) , (18)

where Pr(Aj|Ah)Prconditionalsubscript𝐴𝑗subscript𝐴\displaystyle\Pr(A_{j}|A_{h})roman_Pr ( italic_A start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT | italic_A start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) is the conditional probability for the device j𝑗\displaystyle jitalic_j being active given that device h\displaystyle hitalic_h is active.

Theorem 2

Let R=min(xh,yh,Hxh,Lyh)𝑅subscript𝑥subscript𝑦𝐻subscript𝑥𝐿subscript𝑦\displaystyle R=\min(x_{h},y_{h},H-x_{h},L-y_{h})italic_R = roman_min ( italic_x start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT , italic_H - italic_x start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT , italic_L - italic_y start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) and r=max(R,dh)𝑟𝑅subscript𝑑\displaystyle r=\max(R,d_{h})italic_r = roman_max ( italic_R , italic_d start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ), then

Pr(Aj|Ah)=1cos1(di,h2+rj,h2ln2(δj)/η22di,jrj,h)2π8cos1(R/r),Prconditionalsubscript𝐴𝑗subscript𝐴1superscript1superscriptsubscript𝑑𝑖2subscriptsuperscript𝑟2𝑗superscriptln2subscript𝛿𝑗superscript𝜂22subscript𝑑𝑖𝑗subscript𝑟𝑗2𝜋8superscript1𝑅𝑟\displaystyle\displaystyle\Pr(A_{j}|A_{h})=1-\frac{\cos^{-1}\left(\frac{d_{i,h% }^{2}+r^{2}_{j,h}-\mathrm{ln^{2}}(\delta_{j})/\eta^{2}}{2d_{i,j}r_{j,h}}\right% )}{2\pi-8\cos^{-1}\left(R/r\right)},roman_Pr ( italic_A start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT | italic_A start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) = 1 - divide start_ARG roman_cos start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ( divide start_ARG italic_d start_POSTSUBSCRIPT italic_i , italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_r start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_j , italic_h end_POSTSUBSCRIPT - roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) / italic_η start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG 2 italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT italic_r start_POSTSUBSCRIPT italic_j , italic_h end_POSTSUBSCRIPT end_ARG ) end_ARG start_ARG 2 italic_π - 8 roman_cos start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ( italic_R / italic_r ) end_ARG , (19)

where rj,hsubscript𝑟𝑗\displaystyle r_{j,h}italic_r start_POSTSUBSCRIPT italic_j , italic_h end_POSTSUBSCRIPT is the distance between the IIoTDs j𝑗\displaystyle jitalic_j and h\displaystyle hitalic_h, and φ𝜑\displaystyle\varphiitalic_φ represents the angle at the event epicenter determined by the IIoTDs j𝑗\displaystyle jitalic_j and h\displaystyle hitalic_h positions.

Proof: See proof in Appendix C.

Finally, the complexity when implementing the Bayesian-based KNN algorithm is bounded by 𝒪(gN+min{M(NM),(NM)2})𝒪𝑔𝑁𝑀𝑁𝑀superscript𝑁𝑀2\displaystyle\mathcal{O}(gN+\min\{M(N-M),(N-M)^{2}\})caligraphic_O ( italic_g italic_N + roman_min { italic_M ( italic_N - italic_M ) , ( italic_N - italic_M ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT } ), where g𝑔\displaystyle gitalic_g is the maximum number of iterations to converge. Note that the required iterations vary depending on the initial value for 𝜹𝜹\displaystyle\boldsymbol{\delta}bold_italic_δ.

Refer to caption
Figure 6: Illustration of an IIoT deployment clustering with 30 IIoTDs and 4 clusters. The dot lines represent the cluster edges and the black dots represent IIoTDs acting as cluster heads.

V-C Genetic algorithm (GA)

We employ a GA for its capacity to explore extensive solution spaces and tackle nonlinear, non-convex problems efficiently. GAs are well-suited for parallelization and scalability [42] and adapt to dynamic and changing environments. Unlike black-box approaches, GAs provide flexibility and adaptability while maintaining transparency [43, 44]. These meta-heuristic algorithms inspired by biological evolution are straightforward to construct and demand relatively modest storage.

GAs systematically explore the state space and iteratively apply mutation, crossover, and selection operations [31]. Specifically, an initial population of size ΘΘ\displaystyle\Thetaroman_Θ with potential solutions is generated first. Different 𝜹𝜹\displaystyle\boldsymbol{\delta}bold_italic_δ initialization are generated with random threshold values. Note that increasing the population size increases the probability of finding a near-optimal solution, but the execution complexity also increases. The best-fit potential solutions are probabilistically selected from the current population based on the objective and constraint functions of (13). Then, the threshold parameters for each device undergo modifications, including recombination and potential random mutations, to generate a new generation [31]. Crossover combines activation probabilities of devices from different parent solutions, while mutation introduces random changes in these probabilities to promote exploration. The algorithm works by repeatedly going through a process of evolution, where the population changes over time and individuals are adjusted based on their fitness until an optimal or near-optimal solution is found. This process continues until either the optimization objective is met or the maximum number of iterations is reached (as defined by the parameter g𝑔\displaystyle gitalic_g).

Using this meta-heuristic algorithm, we approximate a near-optimal configuration with a complexity of 𝒪(gβ)𝒪𝑔𝛽\displaystyle\mathcal{O}(g\beta)caligraphic_O ( italic_g italic_β ), where g𝑔\displaystyle gitalic_g is the maximum number of iterations, and β𝛽\displaystyle\betaitalic_β represents the cardinality of the candidate population vector, which depends on the parameter values N𝑁\displaystyle Nitalic_N and ΘΘ\displaystyle\Thetaroman_Θ as follows, β=NΘ𝛽𝑁Θ\displaystyle\beta=N\Thetaitalic_β = italic_N roman_Θ. Parameter fitness is assessed in each generation using the objective and constraint functions in (13).

V-D Particle swarm optimization (PSO)

PSO is exceptional in dynamic and nonlinear spaces with a high complexity degree [32] and thus it is a compelling choice for addressing P2. PSO operates on the principles of swarm intelligence, mirroring the collaborative behavior of particles in nature. This is appealing in IIoT systems, where numerous devices must work together efficiently [32, 45].

Like in GA, a population ΘΘ\displaystyle\Thetaroman_Θ of threshold sets is randomly initialized within the threshold space (0,1]01\displaystyle(0,1]( 0 , 1 ], where each threshold set represents a potential solution. Then, we evaluate the potential solutions using (13) and based on the optimization goal. In each iteration, the threshold sets adjust their activation probabilities based on knowledge of better individual and global solutions discovered by themselves and the swarm. Specifically, we determine δjsubscript𝛿𝑗\displaystyle{\delta_{j}}italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT for each device by using a fixed value for the other devices’ thresholds and selecting the best potential solutions in the population. At each iteration, we assess the fitness of each particle’s solution using (13), then update the individual δjsubscript𝛿𝑗\displaystyle{\delta_{j}}italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT and global best 𝜹𝜹\displaystyle\boldsymbol{\delta}bold_italic_δ based on any improvements in fitness. This allows us to refine and improve the overall solution. PSO continues iterations until an optimal or near-optimal solution that satisfies the optimization objective is found, or the number of iterations parameter (g𝑔\displaystyle gitalic_g) reaches the preset maximum number. The best global solution found represents optimized activation probabilities. Herein, we approximate a near-optimal configuration using PSO with a complexity of 𝒪(gNΘ)𝒪𝑔𝑁Θ\displaystyle\mathcal{O}(gN\Theta)caligraphic_O ( italic_g italic_N roman_Θ ). Note that the population of potential solutions can be initialized based on the spatial correlation relation from heuristics like Voronoi, which may decrease the complexity to reach a near-optimal solution.

V-E Reinforcement Learning (RL)

Model-free RL is a programming tool to tackle decision-making challenges and learn optimal solutions in dynamic environments [46]. Herein, we reframe the optimization problem by introducing spatially-based transmission thresholds and approach it as RL challenge. The IIoT system is conceptualized as the environment, while the devices function as learning agents in this setup. A coordinator retains decision-making authority to prevent computational overload at the IIoTDs, representing them virtually. The central controller stationed at the coordinator provides notifications for miss-detection and collisions. The fundamental components of RL are described as follows.

Let 𝒮𝒮\displaystyle\mathcal{S}caligraphic_S denote the system state space. The current system state s𝒮𝑠𝒮\displaystyle s\in\mathcal{S}italic_s ∈ caligraphic_S includes the state of each device (active or inactive) and their received sensing power from the event, depicted by the sensing function p(di,j)𝑝subscript𝑑𝑖𝑗\displaystyle p(d_{i,j})italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ). Consequently, it also includes information corresponding to collisions and miss-detections. In addition, the known position of the devices and their current thresholds are also known. The current state of each device is defined as

s={{δj}j𝒥,{p(di,j)}j𝒥,{(xj,yj)}j𝒥}.𝑠subscriptsubscript𝛿𝑗for-all𝑗𝒥subscript𝑝subscript𝑑𝑖𝑗for-all𝑗𝒥subscriptsubscript𝑥𝑗subscript𝑦𝑗for-all𝑗𝒥missing-subexpression\begin{array}[]{rl}s=\{\{\delta_{j}\}_{\forall j\in\mathcal{J}},\{p(d_{i,j})\}% _{\forall j\in\mathcal{J}},\{(x_{j},y_{j})\}_{\forall j\in\mathcal{J}}\}.\end{array}start_ARRAY start_ROW start_CELL italic_s = { { italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT } start_POSTSUBSCRIPT ∀ italic_j ∈ caligraphic_J end_POSTSUBSCRIPT , { italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) } start_POSTSUBSCRIPT ∀ italic_j ∈ caligraphic_J end_POSTSUBSCRIPT , { ( italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) } start_POSTSUBSCRIPT ∀ italic_j ∈ caligraphic_J end_POSTSUBSCRIPT } . end_CELL start_CELL end_CELL end_ROW end_ARRAY (20)

With an observed state ‘s𝑠\displaystyle sitalic_s’ given, the coordinator varies δ𝛿\displaystyle\deltaitalic_δ for each device according to the reward/penalty function. The action space is then delimited by threshold limits as δj(0;1];subscript𝛿𝑗01\displaystyle\delta_{j}\in(0;1];italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ ( 0 ; 1 ] ; j𝒥for-all𝑗𝒥\displaystyle\forall j\in\mathcal{J}∀ italic_j ∈ caligraphic_J. The reward must capture the effectiveness of the threshold policy when the agent takes an action in the current state. In each learning step, the system’s performance must align with the reward function [46], enhancing energy efficiency while avoiding errors. This reward function represents our optimization goal, which is to maximize the system’s overall energy efficiency. Therefore, the reward function at a TTI τ𝜏\displaystyle\tauitalic_τ is expressed as

rτ=j,h𝒥Pr(Aj|Ah)Pr(p(di,j)δh)μ1p(di,j)ρjμ2p(di,j)σ,subscript𝑟𝜏subscript𝑗𝒥Prconditionalsubscript𝐴𝑗subscript𝐴Pr𝑝subscript𝑑𝑖𝑗subscript𝛿subscript𝜇1𝑝subscript𝑑𝑖𝑗subscript𝜌𝑗subscript𝜇2𝑝subscript𝑑𝑖𝑗𝜎\displaystyle\displaystyle\!r_{\tau}\!=\!\!\!\!\sum_{j,h\in\mathcal{J}}\!\!\!% \Pr(A_{j}|A_{h})\!\Pr\!\left(p(d_{i,j})\!\!\geq\!\!{\delta_{h}}\right)\!-\!\mu% _{1}p(d_{i,j})\rho_{j}\!-\!\mu_{2}p(d_{i,j})\sigma\!,italic_r start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_j , italic_h ∈ caligraphic_J end_POSTSUBSCRIPT roman_Pr ( italic_A start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT | italic_A start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) roman_Pr ( italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) ≥ italic_δ start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) - italic_μ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) italic_ρ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - italic_μ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) italic_σ , (21)

where the coefficients μ1subscript𝜇1\displaystyle\mu_{1}italic_μ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT and μ2subscript𝜇2\displaystyle\mu_{2}italic_μ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT are the positive constants used to balance the utility and cost. Additionally, Pr(Aj|Ah)Prconditionalsubscript𝐴𝑗subscript𝐴\displaystyle\Pr(A_{j}|A_{h})roman_Pr ( italic_A start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT | italic_A start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) accounts for the conditional activation probability between IIoTD in position (xj,yjsubscript𝑥𝑗subscript𝑦𝑗\displaystyle x_{j},y_{j}italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT) given an active IIoTD in (xh,yhsubscript𝑥subscript𝑦\displaystyle x_{h},y_{h}italic_x start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT). On the other hand, the second and last terms are penalized to account for situations that provoke error. Specifically, ρjsubscript𝜌𝑗\displaystyle\rho_{j}italic_ρ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT accounts for the collision effect factor given by

ρj={1,if collision occurs andPr(p(di,j)δj),1,otherwise.subscript𝜌𝑗absentcases1if collision occurs andPr𝑝subscript𝑑𝑖𝑗subscript𝛿𝑗1otherwise.\begin{array}[]{rl}\rho_{j}&=\begin{cases}1,&\text{if collision occurs and}\Pr% \left(p(d_{i,j})\geq{\delta_{j}}\right),\\ \hfil-1,&\text{otherwise.}\\ \end{cases}\\ \end{array}start_ARRAY start_ROW start_CELL italic_ρ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_CELL start_CELL = { start_ROW start_CELL 1 , end_CELL start_CELL if collision occurs and roman_Pr ( italic_p ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) ≥ italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) , end_CELL end_ROW start_ROW start_CELL - 1 , end_CELL start_CELL otherwise. end_CELL end_ROW end_CELL end_ROW end_ARRAY (22)

Moreover, σ𝜎\displaystyle\sigmaitalic_σ is the miss-detection factor given by

σ={1,if no IIoTD is active,0,otherwise.𝜎absentcases1if no IIoTD is active,0otherwise.\begin{array}[]{rl}\sigma&=\begin{cases}1,&\text{if no IIoTD is active,}\\ \hfil 0,&\text{otherwise.}\\ \end{cases}\\ \end{array}start_ARRAY start_ROW start_CELL italic_σ end_CELL start_CELL = { start_ROW start_CELL 1 , end_CELL start_CELL if no IIoTD is active, end_CELL end_ROW start_ROW start_CELL 0 , end_CELL start_CELL otherwise. end_CELL end_ROW end_CELL end_ROW end_ARRAY (23)

Herein, we assume that the coordinator detects event miss-detection during training. Note that ρjsubscript𝜌𝑗\displaystyle\rho_{j}italic_ρ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT and σ𝜎\displaystyle\sigmaitalic_σ impose the error probability satisfaction level. If no collision or miss-detection occurs, then ρj=0subscript𝜌𝑗0\displaystyle\rho_{j}=0italic_ρ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = 0 or σ=0𝜎0\displaystyle\sigma=0italic_σ = 0, indicating no penalization to the reward function due to any error. The idea is finding an optimal policy πsuperscript𝜋\displaystyle\pi^{*}italic_π start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT at each state τ𝜏\displaystyle\tauitalic_τ (mapping states in 𝒮𝒮\displaystyle\mathcal{S}caligraphic_S to the probability of choosing an action πj(s)[δj,1δj]superscriptsubscript𝜋𝑗𝑠superscriptsubscript𝛿𝑗1superscriptsubscript𝛿𝑗\displaystyle{\pi_{j}^{*}(s)\in[-\delta_{j}^{*},1-\delta_{j}^{*}]}italic_π start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ( italic_s ) ∈ [ - italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT , 1 - italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ], with sτ+πsτ+1subscript𝑠𝜏superscript𝜋subscript𝑠𝜏1\displaystyle{s_{\tau}+\pi^{*}\rightarrow s_{\tau+1}}italic_s start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT + italic_π start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT → italic_s start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT[33] that maximizes the long-term expected discounted reward. The cumulative discounted reward is given by

Uτ=k=0τζkrk+1,subscript𝑈𝜏superscriptsubscript𝑘0𝜏superscript𝜁𝑘subscript𝑟𝑘1missing-subexpression\begin{array}[]{rl}U_{\tau}=\sum_{k=0}^{\tau}\zeta^{k}r_{k+1},\end{array}start_ARRAY start_ROW start_CELL italic_U start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT = ∑ start_POSTSUBSCRIPT italic_k = 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_τ end_POSTSUPERSCRIPT italic_ζ start_POSTSUPERSCRIPT italic_k end_POSTSUPERSCRIPT italic_r start_POSTSUBSCRIPT italic_k + 1 end_POSTSUBSCRIPT , end_CELL start_CELL end_CELL end_ROW end_ARRAY (24)

where ζ(0,1]𝜁01\displaystyle\zeta\in(0,1]italic_ζ ∈ ( 0 , 1 ] is the discount factor that grows exponentially with each state τ𝜏\displaystyle\tauitalic_τ and rτ+1subscript𝑟𝜏1\displaystyle r_{\tau+1}italic_r start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT is the reward at the next state.

Moreover, the state-action function of the agent with a state-action pair (s,a)𝑠𝑎\displaystyle(s,a)( italic_s , italic_a ) under a policy π𝜋\displaystyle\piitalic_π is given by

Qτπ(sτ,aτ)=𝔼π[Uτ|s=sτ,a=aτ],subscriptsuperscript𝑄𝜋𝜏subscript𝑠𝜏subscript𝑎𝜏subscript𝔼𝜋delimited-[]formulae-sequenceconditionalsubscript𝑈𝜏𝑠subscript𝑠𝜏𝑎subscript𝑎𝜏missing-subexpression\begin{array}[]{rl}Q^{\pi}_{\tau}(s_{\tau},a_{\tau})=\mathbb{E}_{\pi}[U_{\tau}% |s=s_{\tau},a=a_{\tau}],\end{array}start_ARRAY start_ROW start_CELL italic_Q start_POSTSUPERSCRIPT italic_π end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT ( italic_s start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT , italic_a start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT ) = blackboard_E start_POSTSUBSCRIPT italic_π end_POSTSUBSCRIPT [ italic_U start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT | italic_s = italic_s start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT , italic_a = italic_a start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT ] , end_CELL start_CELL end_CELL end_ROW end_ARRAY (25)

where a conventional Q-learning algorithm can be adapted to learn the optimal policy by updating the Q-table using Bellman’s equation to reach the optimal action-value function [47]. Furthermore, the Q-value is updated as follows

Qτ+1π(sτ,aτ)superscriptsubscript𝑄𝜏1𝜋subscript𝑠𝜏subscript𝑎𝜏\displaystyle\displaystyle Q_{\tau+1}^{\pi}(s_{\tau},a_{\tau})italic_Q start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_π end_POSTSUPERSCRIPT ( italic_s start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT , italic_a start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT ) =(1ωτ)Qτπ(sτ,aτ)+absent1subscript𝜔𝜏superscriptsubscript𝑄𝜏𝜋subscript𝑠𝜏subscript𝑎𝜏\displaystyle\displaystyle=(1-\omega_{\tau})Q_{\tau}^{\pi}(s_{\tau},a_{\tau})+\dots= ( 1 - italic_ω start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT ) italic_Q start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_π end_POSTSUPERSCRIPT ( italic_s start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT , italic_a start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT ) + …
+ωτ(rτ+ζτmaxaτQπ(sτ+1,aτ+1)),subscript𝜔𝜏subscript𝑟𝜏subscript𝜁𝜏subscriptsubscript𝑎𝜏superscript𝑄superscript𝜋subscript𝑠𝜏1subscript𝑎𝜏1\displaystyle\displaystyle+\omega_{\tau}(r_{\tau}+\zeta_{\tau}\max_{a_{\tau}}Q% ^{\pi^{*}}(s_{\tau+1},a_{\tau+1})),+ italic_ω start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT ( italic_r start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT + italic_ζ start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT roman_max start_POSTSUBSCRIPT italic_a start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_Q start_POSTSUPERSCRIPT italic_π start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT end_POSTSUPERSCRIPT ( italic_s start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT , italic_a start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ) ) , (26)

where ωτ(0,1]subscript𝜔𝜏01\displaystyle\omega_{\tau}\in(0,1]italic_ω start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT ∈ ( 0 , 1 ] is the learning rate.

Q𝑄\displaystyle Qitalic_Q-Learning generally constructs a lookup Q𝑄\displaystyle Qitalic_Q-table Q(s,a)𝑄𝑠𝑎\displaystyle Q(s,a)italic_Q ( italic_s , italic_a ), and the agent selects actions based on an ϵitalic-ϵ\displaystyle\epsilonitalic_ϵ-greedy policy for each learning step [48]. In the ϵitalic-ϵ\displaystyle\epsilonitalic_ϵ-greedy policy, the agent chooses the action with the maximum Q𝑄\displaystyle Qitalic_Q-table value with probability (1ϵ)1italic-ϵ\displaystyle(1-\epsilon)( 1 - italic_ϵ ), whereas a random action is picked with probability ϵitalic-ϵ\displaystyle\epsilonitalic_ϵ to support exploration and avoid getting stuck at non-optimal policies [46]. Once the optimal Q𝑄\displaystyle Qitalic_Q-function Q(s,a)superscript𝑄𝑠𝑎\displaystyle Q^{*}(s,a)italic_Q start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ( italic_s , italic_a ) is achieved, the optimal policy is determined by

π(s,a)=argmaxaτQ(s,a).superscript𝜋𝑠𝑎subscriptsubscript𝑎𝜏superscript𝑄𝑠𝑎missing-subexpression\begin{array}[]{rl}\pi^{*}(s,a)=\arg\max_{a_{\tau}}Q^{*}(s,a).\end{array}start_ARRAY start_ROW start_CELL italic_π start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ( italic_s , italic_a ) = roman_arg roman_max start_POSTSUBSCRIPT italic_a start_POSTSUBSCRIPT italic_τ end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_Q start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ( italic_s , italic_a ) . end_CELL start_CELL end_CELL end_ROW end_ARRAY (27)

The complexity of the RL-based approach might vary depending on the initial values and the algorithm implementation. However, the worst-case algorithm complexity is 𝒪(N2)𝒪superscript𝑁2\displaystyle\mathcal{O}(N^{2})caligraphic_O ( italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ).

VI Complexity Analysis

Herein, we summarize and discuss the complexity of the proposed optimization algorithms. We compare our proposals with a conventional implementation where each device has the same threshold (sensitivity) configured [16], i.e., δj=δsubscript𝛿𝑗𝛿\displaystyle\delta_{j}=\deltaitalic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = italic_δ, j𝒥for-all𝑗𝒥\displaystyle\forall j\in\mathcal{J}∀ italic_j ∈ caligraphic_J. Notice that the problem in (13) is easily solved for an equal activation threshold since the sum and multiplication of probabilities in the objective and constraint function become an arithmetic and geometric mean with only one variable (see Appendix D).

The complexity for equal-δ𝛿\displaystyle{\delta}italic_δ, SCA, and BCD depends on the complexity of performing IPM to solve f(𝜹)𝑓𝜹\displaystyle f({\boldsymbol{\delta}})italic_f ( bold_italic_δ ) [49], which depends on the inequality constraints and the complexity of a typically polynomial method. In this case, there is just one inequality constraint and the worst-case complexity to solve the problem using IPM is 𝒪(N3)𝒪superscript𝑁3\displaystyle\mathcal{O}(N^{3})caligraphic_O ( italic_N start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT ) and typically converges for g=N𝑔𝑁\displaystyle g=\sqrt{N}italic_g = square-root start_ARG italic_N end_ARG iterations. Note that this value varies depending on the suitability of the initial values. Here, for equal-δ𝛿\displaystyle{\delta}italic_δ and BCD, the problem is evaluated in a summation of N𝑁\displaystyle Nitalic_N terms with one variable, thus the complexity is 𝒪(N3)𝒪superscript𝑁3\displaystyle\mathcal{O}(N^{3})caligraphic_O ( italic_N start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT ) for equal 𝜹𝜹\displaystyle{\boldsymbol{\delta}}bold_italic_δ while for BCD is 𝒪(N9/2)𝒪superscript𝑁92\displaystyle\mathcal{O}(N^{9/2})caligraphic_O ( italic_N start_POSTSUPERSCRIPT 9 / 2 end_POSTSUPERSCRIPT ) since the problem is solved N𝑁\displaystyle Nitalic_N times and converges in N𝑁\displaystyle\sqrt{N}square-root start_ARG italic_N end_ARG. Meanwhile, the complexity for SCA is 𝒪(N7/2)𝒪superscript𝑁72\displaystyle\mathcal{O}(N^{7/2})caligraphic_O ( italic_N start_POSTSUPERSCRIPT 7 / 2 end_POSTSUPERSCRIPT ) since there is a summation of N𝑁\displaystyle Nitalic_N terms with a vector 𝜹𝜹\displaystyle{\boldsymbol{\delta}}bold_italic_δ of N𝑁\displaystyle Nitalic_N variables. Without losing generality, we assume that the complexity of evaluating a variable is 𝒪(1)𝒪1\displaystyle\mathcal{O}(1)caligraphic_O ( 1 ).

Table II summarizes the methods’ complexity. We can see that the equal-δ𝛿\displaystyle{\delta}italic_δ and Voronoi approaches do not depend on the iterations to converge, while the rest do. However, the rest depends on the specific algorithms and how fast they converge. Moreover, the computational complexity of implementing the proposed methods exhibits polynomial behavior. BCD is the most complex method, while Voronoi and KNN are comparatively less complex. Additionally, although RL is the most energy-efficient method, it is the only one that requires online implementation or a quite wide dataset. It is noteworthy that when implementing RL with an initial 𝜹𝜹\displaystyle\boldsymbol{\delta}bold_italic_δ based on previous algorithm results like SCA or Voronoi, rather than random 𝜹𝜹\displaystyle\boldsymbol{\delta}bold_italic_δ initialization, the complexity decreases up to 𝒪(NlogN)𝒪𝑁𝑁\displaystyle\mathcal{O}(N\log N)caligraphic_O ( italic_N roman_log italic_N ). Therefore, RL could be implemented either offline with a history dataset or to retrain the system in a dynamic scenario.

TABLE II: Complexity analysis
Algorithm Complexity
Equal 𝜹𝜹\displaystyle\boldsymbol{\delta}bold_italic_δ 𝒪(N3)𝒪superscript𝑁3\displaystyle\mathcal{O}(N^{3})caligraphic_O ( italic_N start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT )
SCA 𝒪(N3N)𝒪superscript𝑁3𝑁\displaystyle\mathcal{O}(N^{3}\sqrt{N})caligraphic_O ( italic_N start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT square-root start_ARG italic_N end_ARG )
BCD 𝒪(N4N)𝒪superscript𝑁4𝑁\displaystyle\mathcal{O}(N^{4}\sqrt{N})caligraphic_O ( italic_N start_POSTSUPERSCRIPT 4 end_POSTSUPERSCRIPT square-root start_ARG italic_N end_ARG )
Voronoi 𝒪(NlogN)𝒪𝑁𝑁\displaystyle\mathcal{O}(N\log N)caligraphic_O ( italic_N roman_log italic_N )
Bayesian-based KNN 𝒪(gN+(NM)(min{M,NM}))𝒪𝑔𝑁𝑁𝑀𝑀𝑁𝑀\displaystyle\mathcal{O}(gN+(N-M)(\min\{M,N-M\}))caligraphic_O ( italic_g italic_N + ( italic_N - italic_M ) ( roman_min { italic_M , italic_N - italic_M } ) )
GA 𝒪(gNΘ)𝒪𝑔𝑁Θ\displaystyle\mathcal{O}(gN\Theta)caligraphic_O ( italic_g italic_N roman_Θ )*
PSO 𝒪(gNΘ)𝒪𝑔𝑁Θ\displaystyle\mathcal{O}(gN\Theta)caligraphic_O ( italic_g italic_N roman_Θ )
RL 𝒪(N2)𝒪superscript𝑁2\displaystyle\mathcal{O}(N^{2})caligraphic_O ( italic_N start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT )

*Note that good choices for g𝑔\displaystyle gitalic_g and ΘΘ\displaystyle\Thetaroman_Θ may increase with N𝑁\displaystyle Nitalic_N.

VII Results

Consider a 50×\displaystyle\times×50 m2 area with N[25 250]𝑁delimited-[]25 250\displaystyle N\in[25\text{ }250]italic_N ∈ [ 25 250 ] devices. We choose N25𝑁25\displaystyle N\geq 25italic_N ≥ 25 since for smaller numbers the optimization problem often becomes unfeasible as there are not enough devices to cover the area. Indeed, miss-detection events are very common for N<25𝑁25\displaystyle N<25italic_N < 25. Additionally, we consider α=0.1𝛼0.1\displaystyle\alpha=0.1italic_α = 0.1, η=1𝜂1\displaystyle{\eta=1}italic_η = 1 [15], and set E=0.1𝐸0.1\displaystyle E=0.1italic_E = 0.1 and g=N𝑔𝑁\displaystyle g=\sqrt{N}italic_g = square-root start_ARG italic_N end_ARG. We perform 250 Monte Carlo runs corresponding to different deployments. For simplicity, the power consumption is given without units (percentage of time in active state). However, the value can be obtained by multiplying this value and the power consumption of the specific device in an active state.

VII-A Benchmark and Voronoi approaches

We adopt the equal-δ𝛿\displaystyle{\delta}italic_δ approach as a benchmark. Initially, we assess the power consumption linked to employing the equal-δ𝛿\displaystyle{\delta}italic_δ approach and compare it with the four Voronoi-based solutions. It’s noteworthy that the optimization problem might not always be solvable with the equal-δ𝛿\displaystyle{\delta}italic_δ approach and the latter three Voronoi-based alternatives, due to non-compliance with the error constraints.

In Fig. 7, we show the mean energy consumption per device in the network when using the two previous solutions. Note that the Voronoi-(i) algorithm has the best performance, while the scenario with equal-δ𝛿\displaystyle{\delta}italic_δ and Voronoi-(iii) has the worst performance related to energy consumption. Herein, note that equal-δ𝛿\displaystyle{\delta}italic_δ slightly outperforms Voronoi-(iii) for more than 33 IIoTDs. Indeed, the sensing area in the latter approach is determined by the biggest distance to the Voronoi polygon, hence, the overlapping probability in sensing areas for neighbor IIoTD is high and the energy efficiency low. However, Voronoi-(i) is the only algorithm capable of finding a solution to the optimization problem in each scenario. The other approaches can find solutions in just some cases, as depicted in Fig. 8. In this case, both approaches with the worst performance can find a solution between 49% (equal-δ𝛿\displaystyle{\delta}italic_δ) to 55% (Voronoi-(iii)) of the time, while the feasibility is about 72%-74% for Voronoi-(ii).

Refer to caption
Figure 7: Power consumption as a function of the number of IIoTDs for the benchmark and the Voronoi approaches.
Refer to caption
Figure 8: Feasibility rate to find a configuration with Pe0.1subscript𝑃𝑒0.1\displaystyle P_{e}\leq 0.1italic_P start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ≤ 0.1 as a function of the number of IIoTDs for the benchmark and Voronoi’s approaches.

Based on the above discussions, only the Voronoi-(i) approach is adopted for comparison purposes in the following. It is worth noting that the equal-δ𝛿\displaystyle{\delta}italic_δ solution, although not always feasible according to the constraint, will still be included in the comparisons for benchmarking purposes.

VII-B Performance comparison

Herein, we present performance results for the proposed energy-efficient solutions. Notably, these solutions are feasible across all 250 modeled scenarios, unlike the benchmark and Voronoi’s approaches analyzed in Section VII-A. Specifically, Fig. 9 shows the power consumption per device as a function of the device density and using the approximation methods. Herein, BCD and RL have the worst and best performance, respectively. Interestingly, as we increase the device density, SCA and KNN show a performance similar to RL. Meanwhile, GA and PSO show similar performances and outperform the equal-δ𝛿\displaystyle{\delta}italic_δ approach. On the other hand, BCD outperforms the equal threshold scheme for a density below 150 IIoTDs. However, it consumes more power when the density increases above 150. Notice that for the equal-δ𝛿\displaystyle{\delta}italic_δ scenario, the error probability constraints can not be met for around half of the scenarios modeled. Here, the RL approach reduces the power consumption by up to 96% compared with the benchmark for low-density scenarios, while for high-density scenarios, the consumption is reduced by 60%. As expected, the power consumption decreases as IIoTDs density increases because coverage increases, allowing for a smaller sensing area to be set for each IIoTD, thereby lowering their activation probability for most approaches.

Refer to caption
Figure 9: Power consumption as a function of the number of IIoTDs per device for the proposed solutions.
Refer to caption
Refer to caption
Refer to caption
Figure 10: Error probability (Pesubscript𝑃e\displaystyle P_{\text{e}}italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT) for the proposed solutions as the sum of the collision (cyan) and miss-detection (green) probabilities for (left) 50, (center) 150, and (right) 250 IIoTDs. The percentages indicate the error probability of the methods compared to the equal-δ𝛿\displaystyle\deltaitalic_δ approach, while the red dotted line represents the error constraint E𝐸\displaystyle Eitalic_E.

In addition, Fig. 10 displays Pesubscript𝑃e\displaystyle P_{\text{e}}italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT for the proposed methods, which combines the collision (cyan) and miss-detection (green) probabilities. It’s worth noting that Pesubscript𝑃e\displaystyle P_{\text{e}}italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT is consistently below 0.1 for each of the proposed solutions, meeting the constraint E𝐸\displaystyle Eitalic_E in P2, while the equal-δ𝛿\displaystyle\deltaitalic_δ approach fails to stay below this limit. The value of Pmisssubscript𝑃miss\displaystyle P_{\text{miss}}italic_P start_POSTSUBSCRIPT miss end_POSTSUBSCRIPT remains almost constant, staying below 0.01. It’s important to highlight that the RL approach demonstrates the lowest Pesubscript𝑃e\displaystyle P_{\text{e}}italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT, whereas BCD, GA, and PSO exhibit the highest values. Notably, the value of Pesubscript𝑃e\displaystyle P_{\text{e}}italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT increases with higher IIoTD density, as more devices are likely to collide upon activation from the same event. Furthermore, Fig. 10 also illustrates the relative error probability of the proposed methods compared to the equal-δ𝛿\displaystyle\deltaitalic_δ approach. Notably, in low-density scenarios, SCA, KNN, and RL reduce the error probability by up to 45.7%, 28.2%, and 0.7% respectively. However, in high-density scenarios, only RL is capable of reducing the error probability by up to 14%, while the other approaches decrease the error probability by around 61%-77% compared to the equal-δ𝛿\displaystyle\deltaitalic_δ approach.

Noteworthy, employing BCD requires a computational cost N𝑁\displaystyle Nitalic_N times higher than that of SCA. This is even though each iteration in SCA is slightly more complex to execute. Furthermore, RL requires access to additional historical data characterizing the IIoTD traffic and activation behavior to facilitate learning, which makes the training a little more complex but gives additional online support for a dynamic scenario.

Note that the value of η𝜂\displaystyle\etaitalic_η does not affect the power consumption of our proposed methods. This is because the transmission threshold is adjusted based on the value of η𝜂\displaystyle\etaitalic_η, but the sensor area itself remains constant.

VIII Conclusion

This paper comprehensively explored energy efficiency and transmit resource allocation strategies in IIoT setups while considering device-specific attributes and activation correlations. We introduced a transmission threshold for event-sensing scenarios and assessed its effects on energy efficiency, coverage area, and successful event detection. We formulated the optimization problem for setting the transmission threshold using a convex approximation. Likewise, we presented multiple solutions relying on convex methods such as SCA and BCD; and heuristic methods like Voronoi diagrams, explainable ML, and algorithms based on natural selection and social behavior. Additionally, we reformulated the problem as a form of RL, employing Q𝑄\displaystyle Qitalic_Q-learning. We showed that the complexity of the proposed methods is polynomial, with BCD as the most complex, while Voronoi and KNN are the least complex. Overall, our proposals provided a 94% power consumption reduction concerning the equal-δ𝛿\displaystyle\deltaitalic_δ benchmark in low-density scenarios, while the consumption is reduced by 60% for high-density scenarios.

In future work, we aim to explore adaptive methods for optimizing transmission thresholds dynamically according to network conditions, non-stationary devices, or device-specific attributes. This could involve developing algorithms that adjust thresholds in real-time to maximize energy efficiency while maintaining a target performance.

Appendix A. CDF of di,jsubscript𝑑𝑖𝑗\displaystyle d_{i,j}italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT

The variable (Xxj)𝑋subscript𝑥𝑗\displaystyle(X-x_{j})( italic_X - italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) has a uniform probability distribution function (PDF) 1L[xj,Lxj]1𝐿subscript𝑥𝑗𝐿subscript𝑥𝑗\displaystyle\textstyle\frac{1}{L}\in[-x_{j},L-x_{j}]divide start_ARG 1 end_ARG start_ARG italic_L end_ARG ∈ [ - italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , italic_L - italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ] and the PDF of X^(Xxj)2^𝑋superscript𝑋subscript𝑥𝑗2\displaystyle{\hat{X}\triangleq(X-x_{j})^{2}}over^ start_ARG italic_X end_ARG ≜ ( italic_X - italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT is given by [50]

fX^(x)subscript𝑓^𝑋𝑥\displaystyle\displaystyle f_{\hat{X}}(x)italic_f start_POSTSUBSCRIPT over^ start_ARG italic_X end_ARG end_POSTSUBSCRIPT ( italic_x ) ={1uX^,0X^min(xj;Lxj)2,12uX^,min(xj;Lxj)2<X^u,0,otherwise,absentcases1𝑢^𝑋0^𝑋minsuperscriptsubscript𝑥𝑗𝐿subscript𝑥𝑗212𝑢^𝑋minsuperscriptsubscript𝑥𝑗𝐿subscript𝑥𝑗2^𝑋𝑢0otherwise,\displaystyle\displaystyle=\begin{cases}\frac{1}{u\sqrt{\hat{X}}},&0\leq\hat{X% }\leq\text{min}(x_{j};L-x_{j})^{2},\vspace{1mm}\\ \frac{1}{2u\sqrt{\hat{X}}},&\text{min}(x_{j};L-x_{j})^{2}<\hat{X}\leq u,\\ \hfil 0,&\text{otherwise,}\\ \end{cases}= { start_ROW start_CELL divide start_ARG 1 end_ARG start_ARG italic_u square-root start_ARG over^ start_ARG italic_X end_ARG end_ARG end_ARG , end_CELL start_CELL 0 ≤ over^ start_ARG italic_X end_ARG ≤ min ( italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ; italic_L - italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT , end_CELL end_ROW start_ROW start_CELL divide start_ARG 1 end_ARG start_ARG 2 italic_u square-root start_ARG over^ start_ARG italic_X end_ARG end_ARG end_ARG , end_CELL start_CELL min ( italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ; italic_L - italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT < over^ start_ARG italic_X end_ARG ≤ italic_u , end_CELL end_ROW start_ROW start_CELL 0 , end_CELL start_CELL otherwise, end_CELL end_ROW (28)

where u=max(xj;Lxj)2𝑢maxsuperscriptsubscript𝑥𝑗𝐿subscript𝑥𝑗2\displaystyle u=\text{max}(x_{j};L-x_{j})^{2}italic_u = max ( italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ; italic_L - italic_x start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT. Likewise, let us denote Y^(Yyj)2^𝑌superscript𝑌subscript𝑦𝑗2\displaystyle{\hat{Y}\triangleq(Y-y_{j})^{2}}over^ start_ARG italic_Y end_ARG ≜ ( italic_Y - italic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT, and then

fY^(y)subscript𝑓^𝑌𝑦\displaystyle\displaystyle f_{\hat{Y}}(y)italic_f start_POSTSUBSCRIPT over^ start_ARG italic_Y end_ARG end_POSTSUBSCRIPT ( italic_y ) ={1vY^,0Y^min(yj;Hyj)2,12vY^,min(yj;Hyj)2<Y^v,0,otherwise,absentcases1𝑣^𝑌0^𝑌minsuperscriptsubscript𝑦𝑗𝐻subscript𝑦𝑗212𝑣^𝑌minsuperscriptsubscript𝑦𝑗𝐻subscript𝑦𝑗2^𝑌𝑣0otherwise,\displaystyle\displaystyle=\begin{cases}\frac{1}{v\sqrt{\hat{Y}}},&0\leq\hat{Y% }\leq\text{min}(y_{j};H-y_{j})^{2},\vspace{1mm}\\ \frac{1}{2v\sqrt{\hat{Y}}},&\text{min}(y_{j};H-y_{j})^{2}<\hat{Y}\leq v,\\ 0,&\text{otherwise,}\\ \end{cases}= { start_ROW start_CELL divide start_ARG 1 end_ARG start_ARG italic_v square-root start_ARG over^ start_ARG italic_Y end_ARG end_ARG end_ARG , end_CELL start_CELL 0 ≤ over^ start_ARG italic_Y end_ARG ≤ min ( italic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ; italic_H - italic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT , end_CELL end_ROW start_ROW start_CELL divide start_ARG 1 end_ARG start_ARG 2 italic_v square-root start_ARG over^ start_ARG italic_Y end_ARG end_ARG end_ARG , end_CELL start_CELL min ( italic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ; italic_H - italic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT < over^ start_ARG italic_Y end_ARG ≤ italic_v , end_CELL end_ROW start_ROW start_CELL 0 , end_CELL start_CELL otherwise, end_CELL end_ROW (29)

where v=max(yj;Hyj)2𝑣maxsuperscriptsubscript𝑦𝑗𝐻subscript𝑦𝑗2\displaystyle v=\text{max}(y_{j};H-y_{j})^{2}italic_v = max ( italic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ; italic_H - italic_y start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT. Next, given Z=di,j2=X^+Y^𝑍superscriptsubscript𝑑𝑖𝑗2^𝑋^𝑌\displaystyle{Z=d_{i,j}^{2}=\hat{X}+\hat{Y}}italic_Z = italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT = over^ start_ARG italic_X end_ARG + over^ start_ARG italic_Y end_ARG and knowing that X^^𝑋\displaystyle\hat{X}over^ start_ARG italic_X end_ARG and Y^^𝑌\displaystyle\hat{Y}over^ start_ARG italic_Y end_ARG are independent variables, the CDF of the variable Z𝑍\displaystyle Zitalic_Z, denoted as FZ(z)subscript𝐹𝑍𝑧\displaystyle F_{Z}(z)italic_F start_POSTSUBSCRIPT italic_Z end_POSTSUBSCRIPT ( italic_z ), is calculated as Pr(X^+Y^z)Pr^𝑋^𝑌𝑧\displaystyle{\Pr(\hat{X}+\hat{Y}\leq z)}roman_Pr ( over^ start_ARG italic_X end_ARG + over^ start_ARG italic_Y end_ARG ≤ italic_z )

FZ(z)=0u0zxfX^(x)fY^(y)yx=2ξ0uzxxx.subscript𝐹𝑍𝑧superscriptsubscript0𝑢superscriptsubscript0𝑧𝑥subscript𝑓^𝑋𝑥subscript𝑓^𝑌𝑦𝑦𝑥2𝜉superscriptsubscript0𝑢𝑧𝑥𝑥𝑥\displaystyle\displaystyle F_{Z}(z)=\int_{0}^{u}\int_{0}^{z-x}f_{\hat{X}}(x)f_% {\hat{Y}}(y)\partial y\partial x=\frac{2}{\xi}\int_{0}^{u}\frac{\sqrt{z-x}}{% \sqrt{x}}\partial x.\vspace{-3mm}italic_F start_POSTSUBSCRIPT italic_Z end_POSTSUBSCRIPT ( italic_z ) = ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_u end_POSTSUPERSCRIPT ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_z - italic_x end_POSTSUPERSCRIPT italic_f start_POSTSUBSCRIPT over^ start_ARG italic_X end_ARG end_POSTSUBSCRIPT ( italic_x ) italic_f start_POSTSUBSCRIPT over^ start_ARG italic_Y end_ARG end_POSTSUBSCRIPT ( italic_y ) ∂ italic_y ∂ italic_x = divide start_ARG 2 end_ARG start_ARG italic_ξ end_ARG ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_u end_POSTSUPERSCRIPT divide start_ARG square-root start_ARG italic_z - italic_x end_ARG end_ARG start_ARG square-root start_ARG italic_x end_ARG end_ARG ∂ italic_x . (30)

Then, using q=x𝑞𝑥\displaystyle q=\sqrt{x}italic_q = square-root start_ARG italic_x end_ARG, we obtain

FZ(z)subscript𝐹𝑍𝑧\displaystyle\displaystyle F_{Z}(z)italic_F start_POSTSUBSCRIPT italic_Z end_POSTSUBSCRIPT ( italic_z ) =2ξ0x2zq2qabsent2𝜉superscriptsubscript0𝑥2𝑧superscript𝑞2𝑞\displaystyle\displaystyle=\frac{2}{\xi}\int_{0}^{\sqrt{x}}2{\sqrt{z-q^{2}}}\partial q= divide start_ARG 2 end_ARG start_ARG italic_ξ end_ARG ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT square-root start_ARG italic_x end_ARG end_POSTSUPERSCRIPT 2 square-root start_ARG italic_z - italic_q start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG ∂ italic_q
=4ξ0xz(1q2z)qabsent4𝜉superscriptsubscript0𝑥𝑧1superscript𝑞2𝑧𝑞\displaystyle\displaystyle=\frac{4}{\xi}\int_{0}^{\sqrt{x}}{\sqrt{z\left(1-% \frac{q^{2}}{z}\right)}}\partial q= divide start_ARG 4 end_ARG start_ARG italic_ξ end_ARG ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT square-root start_ARG italic_x end_ARG end_POSTSUPERSCRIPT square-root start_ARG italic_z ( 1 - divide start_ARG italic_q start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG italic_z end_ARG ) end_ARG ∂ italic_q
=4zξ0x1q2zq.absent4𝑧𝜉superscriptsubscript0𝑥1superscript𝑞2𝑧𝑞\displaystyle\displaystyle=\frac{4\sqrt{z}}{\xi}\int_{0}^{\sqrt{x}}{\sqrt{1-% \frac{q^{2}}{z}}}\partial q.\vspace{-3mm}= divide start_ARG 4 square-root start_ARG italic_z end_ARG end_ARG start_ARG italic_ξ end_ARG ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT square-root start_ARG italic_x end_ARG end_POSTSUPERSCRIPT square-root start_ARG 1 - divide start_ARG italic_q start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG italic_z end_ARG end_ARG ∂ italic_q . (31)

Next, applying trigonometric substitution we obtain

FZ(z)subscript𝐹𝑍𝑧\displaystyle\displaystyle F_{Z}(z)italic_F start_POSTSUBSCRIPT italic_Z end_POSTSUBSCRIPT ( italic_z ) =4zξ0arcsin(1/zx)zcos2(v)vabsent4𝑧𝜉superscriptsubscript01𝑧𝑥𝑧superscript2𝑣𝑣\displaystyle\displaystyle=\frac{4\sqrt{z}}{\xi}\int_{0}^{\arcsin(\sqrt{1/z}% \sqrt{x})}\sqrt{z}\cos^{2}(v)\partial v= divide start_ARG 4 square-root start_ARG italic_z end_ARG end_ARG start_ARG italic_ξ end_ARG ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_arcsin ( square-root start_ARG 1 / italic_z end_ARG square-root start_ARG italic_x end_ARG ) end_POSTSUPERSCRIPT square-root start_ARG italic_z end_ARG roman_cos start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_v ) ∂ italic_v
=4zξ0arcsin(1/zx)cos2(v)vabsent4𝑧𝜉superscriptsubscript01𝑧𝑥superscript2𝑣𝑣\displaystyle\displaystyle=\frac{4{z}}{\xi}\int_{0}^{\arcsin(\sqrt{1/z}\sqrt{x% })}\cos^{2}(v)\partial v= divide start_ARG 4 italic_z end_ARG start_ARG italic_ξ end_ARG ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_arcsin ( square-root start_ARG 1 / italic_z end_ARG square-root start_ARG italic_x end_ARG ) end_POSTSUPERSCRIPT roman_cos start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_v ) ∂ italic_v
=4zξ0arcsin(1/zx)1+cos(2v)2v,absent4𝑧𝜉superscriptsubscript01𝑧𝑥12𝑣2𝑣\displaystyle\displaystyle=\frac{4{z}}{\xi}\int_{0}^{\arcsin(\sqrt{1/z}\sqrt{x% })}\frac{1+\cos(2v)}{2}\partial v,= divide start_ARG 4 italic_z end_ARG start_ARG italic_ξ end_ARG ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_arcsin ( square-root start_ARG 1 / italic_z end_ARG square-root start_ARG italic_x end_ARG ) end_POSTSUPERSCRIPT divide start_ARG 1 + roman_cos ( 2 italic_v ) end_ARG start_ARG 2 end_ARG ∂ italic_v , (32)

where the last step comes from using the trigonometric identities cos2ϕ+2sin2ϕ=12italic-ϕ2superscript2italic-ϕ1\displaystyle\cos{2\phi}+2\sin^{2}{\phi}=1roman_cos 2 italic_ϕ + 2 roman_sin start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_ϕ = 1 and cos2ϕ+sin2ϕ=1superscript2italic-ϕsuperscript2italic-ϕ1\displaystyle\cos^{2}{\phi}+\sin^{2}{\phi}=1roman_cos start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_ϕ + roman_sin start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_ϕ = 1. Then, after solving the integral in (Appendix A. CDF of di,jsubscript𝑑𝑖𝑗\displaystyle d_{i,j}italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT), we derive (11). \displaystyle\blacksquare

Appendix B. Proof of Non-Convexity of (15)

The first-order partial derivative of (15) is

δj𝔼(Pe(𝜹))subscriptsubscript𝛿𝑗𝔼subscript𝑃e𝜹\displaystyle\displaystyle\!\nabla_{\delta_{j}}\mathbb{E}(P_{\text{e}}(% \boldsymbol{\delta}))\!∇ start_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ( bold_italic_δ ) ) =4αln(δj)wjδj(h=1N1e2ihNln2δiwie2i=1Nln2δiwi).absent4𝛼lnsubscript𝛿𝑗subscript𝑤𝑗subscript𝛿𝑗superscriptsubscript1𝑁1superscript𝑒2superscriptsubscript𝑖𝑁superscript2subscript𝛿𝑖subscript𝑤𝑖superscript𝑒2superscriptsubscript𝑖1𝑁superscript2subscript𝛿𝑖subscript𝑤𝑖\displaystyle\displaystyle=\!\frac{4\alpha\mathrm{ln}(\delta_{j})}{w_{j}\delta% _{j}}\!\left(\sum_{h=1}^{N-1}\!e^{-2\sum_{i\neq h}^{N}\!\frac{\ln^{2}\delta_{i% }}{w_{i}}}\!\!-\!e^{-2\sum_{i=1}^{N}\!\frac{\ln^{2}\delta_{i}}{w_{i}}}\!\!% \right).= divide start_ARG 4 italic_α roman_ln ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG ( ∑ start_POSTSUBSCRIPT italic_h = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N - 1 end_POSTSUPERSCRIPT italic_e start_POSTSUPERSCRIPT - 2 ∑ start_POSTSUBSCRIPT italic_i ≠ italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT - italic_e start_POSTSUPERSCRIPT - 2 ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT ) . (33)

Note that this expression depends on the N𝑁\displaystyle Nitalic_N variables, which means it is not constant. Therefore, we cannot conclude the convexity of the function based on the first-order conditions alone, and thus proceed to test the second-order condition. In this case, the Hessian matrix is given by

=[hjjhjkhkjhkk],delimited-[]subscript𝑗𝑗subscript𝑗𝑘subscript𝑘𝑗subscript𝑘𝑘\mathcal{H}=\left[{\begin{array}[]{cc}h_{jj}&h_{jk}\\ h_{kj}&h_{kk}\\ \end{array}}\right],caligraphic_H = [ start_ARRAY start_ROW start_CELL italic_h start_POSTSUBSCRIPT italic_j italic_j end_POSTSUBSCRIPT end_CELL start_CELL italic_h start_POSTSUBSCRIPT italic_j italic_k end_POSTSUBSCRIPT end_CELL end_ROW start_ROW start_CELL italic_h start_POSTSUBSCRIPT italic_k italic_j end_POSTSUBSCRIPT end_CELL start_CELL italic_h start_POSTSUBSCRIPT italic_k italic_k end_POSTSUBSCRIPT end_CELL end_ROW end_ARRAY ] , (34)

where kj𝑘𝑗\displaystyle k\neq jitalic_k ≠ italic_j, hjj=δj22𝔼(Pe)subscript𝑗𝑗subscriptsuperscript2superscriptsubscript𝛿𝑗2𝔼subscript𝑃e\displaystyle{h_{jj}=\nabla^{2}_{\delta_{j}^{2}}\mathbb{E}(P_{\text{e}})}italic_h start_POSTSUBSCRIPT italic_j italic_j end_POSTSUBSCRIPT = ∇ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_POSTSUBSCRIPT blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ), hjk=δjδk2𝔼(Pe)subscript𝑗𝑘subscriptsuperscript2subscript𝛿𝑗subscript𝛿𝑘𝔼subscript𝑃e\displaystyle{h_{jk}=\nabla^{2}_{\delta_{j}\delta_{k}}\mathbb{E}(P_{\text{e}})}italic_h start_POSTSUBSCRIPT italic_j italic_k end_POSTSUBSCRIPT = ∇ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ), hkj=δkδj2𝔼(Pe)subscript𝑘𝑗subscriptsuperscript2subscript𝛿𝑘subscript𝛿𝑗𝔼subscript𝑃e\displaystyle{h_{kj}=\nabla^{2}_{\delta_{k}\delta_{j}}\mathbb{E}(P_{\text{e}})}italic_h start_POSTSUBSCRIPT italic_k italic_j end_POSTSUBSCRIPT = ∇ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ), and hkk=δk22𝔼(Pe)subscript𝑘𝑘subscriptsuperscript2superscriptsubscript𝛿𝑘2𝔼subscript𝑃e\displaystyle{h_{kk}=\nabla^{2}_{\delta_{k}^{2}}\mathbb{E}(P_{\text{e}})}italic_h start_POSTSUBSCRIPT italic_k italic_k end_POSTSUBSCRIPT = ∇ start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_POSTSUBSCRIPT blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ). Then, we have that

hjj=subscript𝑗𝑗absent\displaystyle\displaystyle h_{jj}\!=italic_h start_POSTSUBSCRIPT italic_j italic_j end_POSTSUBSCRIPT = 4αwj(1ln(δj)δj2)(h=1N1e2ihNln2δiwie2i=1Nln2δiwi)+4𝛼subscript𝑤𝑗1lnsubscript𝛿𝑗superscriptsubscript𝛿𝑗2superscriptsubscript1𝑁1superscript𝑒2superscriptsubscript𝑖𝑁superscript2subscript𝛿𝑖subscript𝑤𝑖superscript𝑒2superscriptsubscript𝑖1𝑁superscript2subscript𝛿𝑖subscript𝑤𝑖\displaystyle\displaystyle\frac{4\alpha}{w_{j}}\!\left(\!1\!-\!\frac{\mathrm{% ln}(\delta_{j})}{\delta_{j}^{2}}\!\right)\!\!\!\left(\sum_{h=1}^{N-1}\!e^{-2% \sum_{i\neq h}^{N}\!\frac{\ln^{2}\delta_{i}}{w_{i}}}\!\!-\!e^{-2\sum_{i=1}^{N}% \!\frac{\ln^{2}\delta_{i}}{w_{i}}}\!\!\right)\!\!+\!\!\dots\!divide start_ARG 4 italic_α end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_ARG ( 1 - divide start_ARG roman_ln ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) end_ARG start_ARG italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG ) ( ∑ start_POSTSUBSCRIPT italic_h = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N - 1 end_POSTSUPERSCRIPT italic_e start_POSTSUPERSCRIPT - 2 ∑ start_POSTSUBSCRIPT italic_i ≠ italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT - italic_e start_POSTSUPERSCRIPT - 2 ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT ) + …
+16α2ln2(δj)wj2δj2e2i=1Nln2δiwi,16superscript𝛼2superscriptln2subscript𝛿𝑗superscriptsubscript𝑤𝑗2superscriptsubscript𝛿𝑗2superscript𝑒2superscriptsubscript𝑖1𝑁superscript2subscript𝛿𝑖subscript𝑤𝑖\displaystyle\displaystyle+\frac{16\alpha^{2}\mathrm{ln^{2}}(\delta_{j})}{w_{j% }^{2}\delta_{j}^{2}}e^{-2\sum_{i=1}^{N}\frac{\ln^{2}\delta_{i}}{w_{i}}},+ divide start_ARG 16 italic_α start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG italic_e start_POSTSUPERSCRIPT - 2 ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT , (35a)
hjk=subscript𝑗𝑘absent\displaystyle\displaystyle h_{jk}\!=italic_h start_POSTSUBSCRIPT italic_j italic_k end_POSTSUBSCRIPT = 16α(ln(δj)ln(δk)δjwjwkδk)(h=1N2e2ihNln2δiwie2i=1Nln2δiwi).16𝛼lnsubscript𝛿𝑗lnsubscript𝛿𝑘subscript𝛿𝑗subscript𝑤𝑗subscript𝑤𝑘subscript𝛿𝑘superscriptsubscript1𝑁2superscript𝑒2superscriptsubscript𝑖𝑁superscript2subscript𝛿𝑖subscript𝑤𝑖superscript𝑒2superscriptsubscript𝑖1𝑁superscript2subscript𝛿𝑖subscript𝑤𝑖\displaystyle\displaystyle 16\alpha\!\left(\!\frac{\mathrm{ln}(\delta_{j})% \mathrm{ln}(\delta_{k})}{\delta_{j}w_{j}w_{k}\delta_{k}}\!\right)\!\!\!\left(% \sum_{h=1}^{N-2}\!e^{-2\sum_{i\neq h}^{N}\!\frac{\ln^{2}\delta_{i}}{w_{i}}}\!% \!-\!e^{-2\sum_{i=1}^{N}\!\frac{\ln^{2}\delta_{i}}{w_{i}}}\!\!\right).16 italic_α ( divide start_ARG roman_ln ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) roman_ln ( italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ) end_ARG start_ARG italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT italic_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_ARG ) ( ∑ start_POSTSUBSCRIPT italic_h = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N - 2 end_POSTSUPERSCRIPT italic_e start_POSTSUPERSCRIPT - 2 ∑ start_POSTSUBSCRIPT italic_i ≠ italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT - italic_e start_POSTSUPERSCRIPT - 2 ∑ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_N end_POSTSUPERSCRIPT divide start_ARG roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_δ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG start_ARG italic_w start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_ARG end_POSTSUPERSCRIPT ) . (35b)

Similarly, hkksubscript𝑘𝑘\displaystyle h_{kk}italic_h start_POSTSUBSCRIPT italic_k italic_k end_POSTSUBSCRIPT is calculated by substituting δjsubscript𝛿𝑗\displaystyle\delta_{j}italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT and wjsubscript𝑤𝑗\displaystyle w_{j}italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT in (35a) for δksubscript𝛿𝑘\displaystyle\delta_{k}italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT and wksubscript𝑤𝑘\displaystyle w_{k}italic_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT, while hkjsubscript𝑘𝑗\displaystyle h_{kj}italic_h start_POSTSUBSCRIPT italic_k italic_j end_POSTSUBSCRIPT can be calculated using (35b) by exchanging δk,wksubscript𝛿𝑘subscript𝑤𝑘\displaystyle\delta_{k},w_{k}italic_δ start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT , italic_w start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT and δj,wjsubscript𝛿𝑗subscript𝑤𝑗\displaystyle\delta_{j},w_{j}italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , italic_w start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT. To determine convexity, let us evaluate the Hessian at some specific values, e.g., δ1=0.3subscript𝛿10.3\displaystyle\delta_{1}=0.3italic_δ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = 0.3, δ2=0.5subscript𝛿20.5\displaystyle\delta_{2}=0.5italic_δ start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT = 0.5, and N=2𝑁2\displaystyle N=2italic_N = 2. Then, the eigenvalues of the matrix are negative, so the Hessian is not positive semi-definite, therefore the function is not convex in the range [0 1]delimited-[]0 1\displaystyle[0\text{ }1][ 0 1 ]. \displaystyle\blacksquare

Appendix C. Closed-form for Pr(Aj|Ah)Prconditionalsubscript𝐴𝑗subscript𝐴\displaystyle\Pr(A_{j}|A_{h})roman_Pr ( italic_A start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT | italic_A start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT )

Using the cosine rule, we have

di,j2=di,h2+rj,h22di,hrj,hcosφ.superscriptsubscript𝑑𝑖𝑗2superscriptsubscript𝑑𝑖2superscriptsubscript𝑟𝑗22subscript𝑑𝑖subscript𝑟𝑗𝜑d_{i,j}^{2}=d_{i,h}^{2}+r_{j,h}^{2}-2d_{i,h}r_{j,h}\cos{\varphi}.italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT = italic_d start_POSTSUBSCRIPT italic_i , italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_r start_POSTSUBSCRIPT italic_j , italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT - 2 italic_d start_POSTSUBSCRIPT italic_i , italic_h end_POSTSUBSCRIPT italic_r start_POSTSUBSCRIPT italic_j , italic_h end_POSTSUBSCRIPT roman_cos italic_φ . (36)

Then,

Pr(Aj|Ah)=Prconditionalsubscript𝐴𝑗subscript𝐴absent\displaystyle\displaystyle\Pr(A_{j}|A_{h})=roman_Pr ( italic_A start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT | italic_A start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ) = Pr(di,j2ln2(δj)/η2 | di,h2)Prsuperscriptsubscript𝑑𝑖𝑗2conditionalsuperscriptln2subscript𝛿𝑗superscript𝜂2  superscriptsubscript𝑑𝑖2\displaystyle\displaystyle\Pr\left(d_{i,j}^{2}\leq\mathrm{ln^{2}}(\delta_{j})/% \eta^{2}\text{ }|\text{ }d_{i,h}^{2}\right)roman_Pr ( italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ≤ roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) / italic_η start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT | italic_d start_POSTSUBSCRIPT italic_i , italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT )
=\displaystyle\displaystyle== Pr(di,h2+rj,h22di,hrj,hcosφln2(δj)/η2),Prsuperscriptsubscript𝑑𝑖2superscriptsubscript𝑟𝑗22subscript𝑑𝑖subscript𝑟𝑗𝜑superscriptln2subscript𝛿𝑗superscript𝜂2\displaystyle\displaystyle\Pr\left(d_{i,h}^{2}+r_{j,h}^{2}-2d_{i,h}r_{j,h}\cos% {\varphi}\leq\mathrm{ln^{2}}(\delta_{j})/\eta^{2}\right),roman_Pr ( italic_d start_POSTSUBSCRIPT italic_i , italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_r start_POSTSUBSCRIPT italic_j , italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT - 2 italic_d start_POSTSUBSCRIPT italic_i , italic_h end_POSTSUBSCRIPT italic_r start_POSTSUBSCRIPT italic_j , italic_h end_POSTSUBSCRIPT roman_cos italic_φ ≤ roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) / italic_η start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ) , (37)

where di,hsubscript𝑑𝑖\displaystyle d_{i,h}italic_d start_POSTSUBSCRIPT italic_i , italic_h end_POSTSUBSCRIPT and rj,hsubscript𝑟𝑗\displaystyle r_{j,h}italic_r start_POSTSUBSCRIPT italic_j , italic_h end_POSTSUBSCRIPT are known. Therefore,

Pr(φcos1(di,h2+rj,h2ln2(δj)/η22di,hrj,h)).Pr𝜑superscript1superscriptsubscript𝑑𝑖2superscriptsubscript𝑟𝑗2superscriptln2subscript𝛿𝑗superscript𝜂22subscript𝑑𝑖subscript𝑟𝑗\Pr\left({\varphi}\geq\cos^{-1}\left(\frac{d_{i,h}^{2}+r_{j,h}^{2}-\mathrm{ln^% {2}}(\delta_{j})/\eta^{2}}{2d_{i,h}r_{j,h}}\right)\right).roman_Pr ( italic_φ ≥ roman_cos start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ( divide start_ARG italic_d start_POSTSUBSCRIPT italic_i , italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_r start_POSTSUBSCRIPT italic_j , italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT - roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) / italic_η start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG start_ARG 2 italic_d start_POSTSUBSCRIPT italic_i , italic_h end_POSTSUBSCRIPT italic_r start_POSTSUBSCRIPT italic_j , italic_h end_POSTSUBSCRIPT end_ARG ) ) . (38)

Let r=max(R,dh(i))𝑟𝑅superscriptsubscript𝑑𝑖\displaystyle{r=\max(R,d_{h}^{(i)})}italic_r = roman_max ( italic_R , italic_d start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_i ) end_POSTSUPERSCRIPT ) and R=min(xh,yh,Hxh,Lyh)𝑅subscript𝑥subscript𝑦𝐻subscript𝑥𝐿subscript𝑦\displaystyle{R=\min(x_{h},y_{h},H-x_{h},L-y_{h})}italic_R = roman_min ( italic_x start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT , italic_y start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT , italic_H - italic_x start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT , italic_L - italic_y start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT ). Herein, for dh(i)Rsuperscriptsubscript𝑑𝑖𝑅\displaystyle d_{h}^{(i)}\leq Ritalic_d start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_i ) end_POSTSUPERSCRIPT ≤ italic_R, φ𝜑\displaystyle\varphiitalic_φ has a PDF given by 1/(2π)12𝜋\displaystyle 1/(2\pi)1 / ( 2 italic_π ). However, for dh(i)>Rsuperscriptsubscript𝑑𝑖𝑅\displaystyle d_{h}^{(i)}>Ritalic_d start_POSTSUBSCRIPT italic_h end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_i ) end_POSTSUPERSCRIPT > italic_R, the PDF varies due to the corner effect in the rectangular area. Then, to calculate the PDF taking into account the corner effect, we divided the area in 8 equal octants, kπ/4φ<(k+1)π/4𝑘𝜋4𝜑𝑘1𝜋4\displaystyle k\pi/4\leq\varphi<(k+1)\pi/4italic_k italic_π / 4 ≤ italic_φ < ( italic_k + 1 ) italic_π / 4, for k{0,1,2,3,4,5,6,7}𝑘01234567\displaystyle k\in\{0,1,2,3,4,5,6,7\}italic_k ∈ { 0 , 1 , 2 , 3 , 4 , 5 , 6 , 7 }. Then, let us make a circumference with center at the expected position (H/2,L/2)𝐻2𝐿2\displaystyle(H/2,L/2)( italic_H / 2 , italic_L / 2 ). Focusing on the firt octant, 0φ<π/40𝜑𝜋4\displaystyle 0\leq\varphi<\pi/40 ≤ italic_φ < italic_π / 4, the part of the circumference with 0φcos1(R/r)0𝜑superscript1𝑅𝑟\displaystyle 0\leq\varphi\leq\cos^{-1}\left(R/r\right)0 ≤ italic_φ ≤ roman_cos start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ( italic_R / italic_r ) fall outside the coverage area ξ=L×H𝜉𝐿𝐻\displaystyle\xi=L\times Hitalic_ξ = italic_L × italic_H. Then, this values of φ𝜑\displaystyle\varphiitalic_φ have zero occurrence probability. The same applies for the other 7 octants where R𝑅\displaystyle Ritalic_R coincides with φ=kπ𝜑𝑘𝜋\displaystyle\varphi=k\piitalic_φ = italic_k italic_π, for k{0,1/2,1,3/2}𝑘012132\displaystyle k\in\{0,1/2,1,3/2\}italic_k ∈ { 0 , 1 / 2 , 1 , 3 / 2 }. Therefore, the PDF of φ𝜑\displaystyle\varphiitalic_φ within ξ𝜉\displaystyle\xiitalic_ξ given by

f(φ)𝑓𝜑\displaystyle\displaystyle f(\varphi)italic_f ( italic_φ ) ={0,kπR/r<φ<kπ+R/r,12π8cos1(R/r),otherwise,absentcases0𝑘𝜋𝑅𝑟𝜑𝑘𝜋𝑅𝑟12𝜋8superscript1𝑅𝑟otherwise,\displaystyle\displaystyle\!=\!\!\begin{cases}0,&k\pi\!-\!{R}/{r}\!<\varphi\!<% k\pi\!+\!{R}/{r},\\ \frac{1}{2\pi-8\cos^{-1}\left(R/r\right)},&\text{otherwise,}\\ \end{cases}= { start_ROW start_CELL 0 , end_CELL start_CELL italic_k italic_π - italic_R / italic_r < italic_φ < italic_k italic_π + italic_R / italic_r , end_CELL end_ROW start_ROW start_CELL divide start_ARG 1 end_ARG start_ARG 2 italic_π - 8 roman_cos start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ( italic_R / italic_r ) end_ARG , end_CELL start_CELL otherwise, end_CELL end_ROW (39)

for k{0,1/2,1,3/2}𝑘012132\displaystyle k\in\{0,1/2,1,3/2\}italic_k ∈ { 0 , 1 / 2 , 1 , 3 / 2 }. Then, the CDF is calculated as

Fφ(a)=0af(φ)φ=a2π8cos1(R/r).subscript𝐹𝜑𝑎superscriptsubscript0𝑎𝑓𝜑𝜑𝑎2𝜋8superscript1𝑅𝑟F_{\varphi}(a)=\int_{0}^{a}f(\varphi)\partial\varphi=\frac{a}{2\pi-8\cos^{-1}% \left(R/r\right)}.italic_F start_POSTSUBSCRIPT italic_φ end_POSTSUBSCRIPT ( italic_a ) = ∫ start_POSTSUBSCRIPT 0 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_a end_POSTSUPERSCRIPT italic_f ( italic_φ ) ∂ italic_φ = divide start_ARG italic_a end_ARG start_ARG 2 italic_π - 8 roman_cos start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ( italic_R / italic_r ) end_ARG . (40)

Then, Pr(φa)Pr𝜑𝑎\displaystyle\Pr\left({\varphi}\geq a\right)roman_Pr ( italic_φ ≥ italic_a ) is equal to 1Pr(φ<a)1Pr𝜑𝑎\displaystyle{1-\Pr\left({\varphi}<a\right)}1 - roman_Pr ( italic_φ < italic_a ). Herein, Pr(φ<a)Pr𝜑𝑎\displaystyle\Pr\left({\varphi}<a\right)roman_Pr ( italic_φ < italic_a ) can be calculated as Fφ(a)subscript𝐹𝜑𝑎\displaystyle F_{\varphi}(a)italic_F start_POSTSUBSCRIPT italic_φ end_POSTSUBSCRIPT ( italic_a ). Therefore, the conditional probability is given in closed-form as (19). \displaystyle\blacksquare

Appendix D. Benchmark solution for P2 (13)

We rewrite (13) assuming the equal-δ𝛿\displaystyle\deltaitalic_δ approach as follow

P2::P2\displaystyle\displaystyle\text{P}2:\text{ }P 2 : minδsubscript𝛿\displaystyle\displaystyle\min_{{\delta}}\text{ }roman_min start_POSTSUBSCRIPT italic_δ end_POSTSUBSCRIPT FZ(ln2(δ))subscript𝐹𝑍superscriptln2𝛿\displaystyle\displaystyle{F_{Z}\left(\mathrm{ln^{2}}(\delta)\right)}italic_F start_POSTSUBSCRIPT italic_Z end_POSTSUBSCRIPT ( roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ ) ) (41a)
s.t. 𝔼(Pe) 0.1,𝔼subscript𝑃e 0.1\displaystyle\displaystyle\mathbb{E}(P_{\text{e}})\leq\text{ }0.1,blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ) ≤ 0.1 , (41b)

where 𝔼(Pe)𝔼subscript𝑃e\displaystyle\mathbb{E}(P_{\text{e}})blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ) is given by

𝔼(Pe)=1N(1e2ln2(δ)w)e2ln2(δ)(N1)w.𝔼subscript𝑃e1𝑁1superscript𝑒2lsuperscriptn2𝛿𝑤superscript𝑒2lsuperscriptn2𝛿𝑁1𝑤\displaystyle\displaystyle\mathbb{E}(P_{\text{e}})=1-{N}(1-e^{-\frac{2\mathrm{% ln^{2}}(\delta)}{w}})e^{-\frac{2\mathrm{ln^{2}}(\delta)({N-1})}{w}}.blackboard_E ( italic_P start_POSTSUBSCRIPT e end_POSTSUBSCRIPT ) = 1 - italic_N ( 1 - italic_e start_POSTSUPERSCRIPT - divide start_ARG 2 roman_l roman_n start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ ) end_ARG start_ARG italic_w end_ARG end_POSTSUPERSCRIPT ) italic_e start_POSTSUPERSCRIPT - divide start_ARG 2 roman_l roman_n start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ ) ( italic_N - 1 ) end_ARG start_ARG italic_w end_ARG end_POSTSUPERSCRIPT . (42)

Note that minimizing FZ(ln2(δ))subscript𝐹𝑍superscriptln2𝛿\displaystyle F_{Z}\left(\mathrm{ln^{2}}(\delta)\right)italic_F start_POSTSUBSCRIPT italic_Z end_POSTSUBSCRIPT ( roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ ) ) is attained by maximizing δ𝛿\displaystyle\deltaitalic_δ. This is because FZsubscript𝐹𝑍\displaystyle F_{Z}italic_F start_POSTSUBSCRIPT italic_Z end_POSTSUBSCRIPT is monotonically increasing in z𝑧\displaystyle zitalic_z and z=ln2(δ)𝑧superscriptln2𝛿\displaystyle z=\mathrm{ln^{2}}(\delta)italic_z = roman_ln start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ ) is inversely proportional with respect to δ(0,1]𝛿01\displaystyle\delta\in(0,1]italic_δ ∈ ( 0 , 1 ]. Therefore, the solution for P2 is given by

δ=sup{δ:(1e2ln2(δ)w)e2ln2(δ)(N1)w 0.9N},superscript𝛿supremumconditional-set𝛿1superscript𝑒2lsuperscriptn2𝛿𝑤superscript𝑒2lsuperscriptn2𝛿𝑁1𝑤 0.9𝑁\delta^{\star}=\sup\left\{\delta:(1-e^{-\frac{2\mathrm{ln^{2}}(\delta)}{w}})e^% {-\frac{2\mathrm{ln^{2}}(\delta)({N-1})}{w}}\geq\text{ }\frac{0.9}{N}\right\},italic_δ start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT = roman_sup { italic_δ : ( 1 - italic_e start_POSTSUPERSCRIPT - divide start_ARG 2 roman_l roman_n start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ ) end_ARG start_ARG italic_w end_ARG end_POSTSUPERSCRIPT ) italic_e start_POSTSUPERSCRIPT - divide start_ARG 2 roman_l roman_n start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ ) ( italic_N - 1 ) end_ARG start_ARG italic_w end_ARG end_POSTSUPERSCRIPT ≥ divide start_ARG 0.9 end_ARG start_ARG italic_N end_ARG } , (43)

where δ𝛿\displaystyle\deltaitalic_δ is calculated as the maximum value that satisfy the constraint in P2.

In scenarios where N𝑁\displaystyle N\rightarrow\inftyitalic_N → ∞, as may occur in practical applications with very large N𝑁\displaystyle Nitalic_N, an asymptotic solution emerges. In this case, the first term of (43) approaches 1, while the second term converges to 0 and becomes dominant. As a result, we can simplify (43) by solely focusing on the second term as follows

δsuperscript𝛿\displaystyle\displaystyle\delta^{\star}italic_δ start_POSTSUPERSCRIPT ⋆ end_POSTSUPERSCRIPT =sup{δ:e2ln2(δ)(N1)w 0.9N}absentsupremumconditional-set𝛿superscript𝑒2lsuperscriptn2𝛿𝑁1𝑤 0.9𝑁\displaystyle\displaystyle=\sup\left\{\delta:e^{-\frac{2\mathrm{ln^{2}}(\delta% )({N-1})}{w}}\geq\text{ }\frac{0.9}{N}\right\}= roman_sup { italic_δ : italic_e start_POSTSUPERSCRIPT - divide start_ARG 2 roman_l roman_n start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ( italic_δ ) ( italic_N - 1 ) end_ARG start_ARG italic_w end_ARG end_POSTSUPERSCRIPT ≥ divide start_ARG 0.9 end_ARG start_ARG italic_N end_ARG }
=ew(ln(N)ln(0.9))2(N1).absentsuperscript𝑒𝑤ln𝑁ln0.92𝑁1\displaystyle\displaystyle=\displaystyle{e^{\displaystyle{\sqrt{\frac{w(% \mathrm{ln}(N)-\mathrm{ln}({0.9}))}{2(N-1)}}}}}.= italic_e start_POSTSUPERSCRIPT square-root start_ARG divide start_ARG italic_w ( roman_ln ( italic_N ) - roman_ln ( 0.9 ) ) end_ARG start_ARG 2 ( italic_N - 1 ) end_ARG end_ARG end_POSTSUPERSCRIPT . (44)

References

  • [1] Z. Shi, Y. Xie, W. Xue, Y. Chen, L. Fu, and X. Xu, “Smart factory in Industry 4.0,” Systems Research and Behavioral Science, vol. 37, no. 4, pp. 607–617, 2020.
  • [2] L. E. Chatzieleftheriou, C.-F. Liu, I. Koutsopoulos, M. Bennis, and M. Debbah, “Online Learning for Industrial IoT: The Online Convex Optimization Perspective,” in IEEE International Mediterranean Conference on Communications and Networking (MeditCom).   IEEE, 2022, pp. 7–12.
  • [3] D. E. Ruíz-Guirola et al., “Discontinuous Reception with Adjustable Inactivity Timer for IIoT,” 2024.
  • [4] G. Alliance, “White paper-5G for connected industries and automation,” 2018.
  • [5] E. V. Belmega, P. Mertikopoulos, and R. Negrel, “Online convex optimization in wireless networks and beyond: The feedback-performance trade-off,” in International Symposium on Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt).   IEEE, 2022, pp. 298–305.
  • [6] S. ul Haque, S. Chandak, F. Chiariotti, D. Günduz, and P. Popovski, “Learning to Speak on Behalf of a Group: Medium Access Control for Sending a Shared Message,” IEEE Communications Letters, vol. 26, no. 8, pp. 1843–1847, 2022.
  • [7] J. Riihijarvi and P. Mahonen, “Modeling spatial structure of wireless communication networks,” in INFOCOM IEEE Conference on Computer Communications Workshops, 2010, pp. 1–6.
  • [8] O. L. López, N. H. Mahmood, M. Shehab, H. Alves, O. M. Rosabal, L. Marata, and M. Latva-Aho, “Statistical Tools and Methodologies for Ultrareliable Low-Latency Communication—A Tutorial,” Proceedings of the IEEE, vol. 111, no. 11, pp. 1502–1543, 2023.
  • [9] P. Raghuwanshi, O. L. A. López, P. Popovski, and M. Latva-aho, “Channel Scheduling for IoT Access with Spatial Correlation,” IEEE Communications Letters, 2024.
  • [10] K. L. K. Sudheera, D. M. Divakaran, R. P. Singh, and M. Gurusamy, “ADEPT: Detection and Identification of Correlated Attack Stages in IoT Networks,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6591–6607, 2021.
  • [11] A. E. Braten, F. A. Kraemer, and D. Palma, “Adaptive, Correlation-Based Training Data Selection for IoT Device Management,” in International Conference on Internet of Things: Systems, Management and Security (IOTSMS), 2019, pp. 169–176.
  • [12] J. Tong, L. Fu, and Z. Han, “Age-of-Information Oriented Scheduling for Multichannel IoT Systems With Correlated Sources,” IEEE Transactions on Wireless Communications, vol. 21, no. 11, pp. 9775–9790, 2022.
  • [13] R. Seiger, F. Zerbato, A. Burattin, L. García-Bañuelos, and B. Weber, “Towards IoT-driven Process Event Log Generation for Conformance Checking in Smart Factories,” in IEEE International Enterprise Distributed Object Computing Workshop (EDOCW), 2020, pp. 20–26.
  • [14] L. Chetot, M. Egan, and J.-M. Gorce, “Joint Identification and Channel Estimation for Fault Detection in Industrial IoT With Correlated Sensors,” IEEE Access, vol. 9, pp. 116 692–116 701, 2021.
  • [15] D. E. Ruíz-Guirola, C. A. Rodríguez-López, S. Montejo-Sánchez, R. D. Souza, O. L. A. López, and H. Alves, “Energy-Efficient Wake-Up Signalling for Machine-Type Devices Based on Traffic-Aware Long Short-Term Memory Prediction,” IEEE Internet of Things Journal, vol. 9, no. 21, pp. 21 620–21 631, 2022.
  • [16] H. Thomsen, C. N. Manchón, and B. H. Fleury, “A traffic model for machine-type communications using spatial point processes,” in IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017, pp. 1–6.
  • [17] H. Alves and O. A. Lopez, “Wireless RF Energy Transfer in the Massive IoT Era: Towards Sustainable Zero-energy Networks,” 2021.
  • [18] J. Hejselbæk, J. Ø. Nielsen, W. Fan, and G. F. Pedersen, “Empirical study of near ground propagation in forest terrain for Internet-of-Things type device-to-device communication,” IEEE Access, vol. 6, pp. 54 052–54 063, 2018.
  • [19] H. Yang, Y. Ye, X. Chu, and M. Dong, “Resource and power allocation in SWIPT-enabled device-to-device communications based on a nonlinear energy harvesting model,” IEEE Internet of Things Journal, vol. 7, no. 11, pp. 10 813–10 825, 2020.
  • [20] P. Sun, J. Li, M. Z. A. Bhuiyan, L. Wang, and B. Li, “Modeling and clustering attacker activities in IoT through machine learning techniques,” Information Sciences, vol. 479, pp. 456–471, 2019.
  • [21] J. Lin, Y. Zout, X. Dong, S. Gong, D. T. Hoang, and D. Niyato, “Deep Reinforcement Learning for Robust Beamforming in IRS-assisted Wireless Communications,” in IEEE Global Communications Conference, 2020, pp. 1–6.
  • [22] X. Mu, Y. Liu, L. Guo, J. Lin, and R. Schober, “Simultaneously Transmitting and Reflecting (STAR) RIS Aided Wireless Communications,” IEEE Transactions on Wireless Communications, vol. 21, no. 5, pp. 3083–3098, 2022.
  • [23] Y. Jin, L. Zhou, L. Zhang, Z. Hu, and J. Han, “A Novel Range-Free Node Localization Method for Wireless Sensor Networks,” IEEE Wireless Communications Letters, vol. 11, no. 4, pp. 688–692, 2022.
  • [24] L. S. Vargas, V. H. Quintana, and A. Vannelli, “A tutorial description of an interior point method and its applications to security-constrained economic dispatch,” IEEE Transactions on Power Systems, vol. 8, no. 3, pp. 1315–1324, 1993.
  • [25] S. P. Boyd and L. Vandenberghe, Convex optimization.   Cambridge university press, 2004.
  • [26] Y. Ye, Interior point algorithms: theory and analysis.   John Wiley & Sons, 2011.
  • [27] F. A. Tondo, V. D. P. Souto, O. L. A. López, S. Montejo-Sánchez, S. Céspedes, and R. D. Souza, “Optimal Traffic Load Allocation for Aloha-Based IoT LEO Constellations,” IEEE Sensors Journal, vol. 23, no. 3, pp. 3270–3282, 2022.
  • [28] S. Boyd and M. C. Grant, “The CVX users’ guide-Release 2.2,” CVX, 2020.
  • [29] P. Gao, Z. Liu, P. Xiao, C. H. Foh, and J. Zhang, “Low-Complexity Block Coordinate Descend Based Multiuser Detection for Uplink Grant-Free NOMA,” IEEE Transactions on Vehicular Technology, vol. 71, no. 9, pp. 9532–9543, 2022.
  • [30] M. MathWorks, “Fmincon-Find Minimum Of Constrained Nonlinear Multivariable Function,” Documentation of mathworks, Available at: http://www. mathworks. com/access/helpdesk/help/toolbox/opti m/index. html.
  • [31] M. Saraswat and A. Sharma, “Genetic Algorithm for optimization using MATLAB,” International Journal of Advanced Research in Computer Science, vol. 4, no. 3, pp. 155–159, 2013.
  • [32] M. Z. Ghawy, G. A. Amran, H. AlSalman, E. Ghaleb, J. Khan, A. A. Al-Bakhrani, A. M. Alziadi, A. Ali, S. S. Ullah et al., “An Effective wireless sensor network routing protocol based on particle swarm optimization algorithm,” Wireless Communications and Mobile Computing, 2022.
  • [33] D. Bertsekas, Reinforcement learning and optimal control.   Athena Scientific, 2019.
  • [34] M. Neely, Stochastic network optimization with application to communication and queueing systems.   Springer Nature, 2022.
  • [35] A. Okabe, B. Boots, K. Sugihara, and S. N. Chiu, “Spatial tessellations: concepts and applications of Voronoi diagrams,” 2009.
  • [36] N. Ma, H. Zhang, H. Hu, and Y. Qin, “ESCVAD: an energy-saving routing protocol based on Voronoi adaptive clustering for wireless sensor networks,” IEEE Internet of Things Journal, vol. 9, no. 11, pp. 9071–9085, 2021.
  • [37] C.-H. Liu, E. Papadopoulou, and D.-T. Lee, “An output-sensitive approach for the L1/Lsubscript𝐿1subscript𝐿\displaystyle L_{1}/L_{\infty}italic_L start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT / italic_L start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT K-Nearest-Neighbor Voronoi diagram,” in 19th Annual European Symposium, Saarbrücken, Germany, September 5-9, 2011. Proceedings 19.   Springer, 2011, pp. 70–81.
  • [38] A. B. Arrieta, N. Díaz-Rodríguez, J. Del Ser, A. Bennetot, S. Tabik, A. Barbado, S. García, S. Gil-López, D. Molina, R. Benjamins et al., “Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI,” Information fusion, vol. 58, pp. 82–115, 2020.
  • [39] H. Qi, J. Wang, W. Li, Y. Wang, and T. Qiu, “A blockchain-driven IIoT traffic classification service for edge computing,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2124–2134, 2020.
  • [40] H. Yang, S. Liang, J. Ni, H. Li, and X. S. Shen, “Secure and efficient k NN classification for industrial Internet of Things,” IEEE Internet of Things Journal, vol. 7, no. 11, pp. 10 945–10 954, 2020.
  • [41] Y.-L. Hsu, C.-F. Liu, H.-Y. Wei, and M. Bennis, “Optimized Data Sampling and Energy Consumption in IIoT: A Federated Learning Approach,” IEEE Transactions on Communications, vol. 70, no. 12, pp. 7915–7931, 2022.
  • [42] R. Du and L. Zhen, “Multiuser physical layer security mechanism in the wireless communication system of the IIoT,” Computers & Security, vol. 113, p. 102559, 2022.
  • [43] Y. Zhao and F. Akter, “Adaptive Clustering Algorithm for IIoT Based Mobile Opportunistic Networks,” Security and Communication Networks, 2022.
  • [44] A. S. Allahloh, M. Sarfraz, S. Iqbal, and M. M. Al Maathidi, “Optimizing Process Performance with IIoT and Advanced Intelligent Controllers,” in International Conference on Recent Advances in Electrical, Electronics & Digital Healthcare Technologies (REEDCON), 2023, pp. 259–264.
  • [45] N. Bacanin, M. Antonijevic, T. Bezdan, M. Zivkovic, K. Venkatachalam, and S. Malebary, “Energy efficient offloading mechanism using particle swarm optimization in 5G enabled edge nodes,” Cluster Computing, vol. 26, no. 1, pp. 587–598, 2023.
  • [46] M. A. Wiering and M. Van Otterlo, “Reinforcement learning,” Adaptation, learning, and optimization, vol. 12, no. 3, p. 729, 2012.
  • [47] H. Yang, Z. Xiong, J. Zhao, D. Niyato, L. Xiao, and Q. Wu, “Deep reinforcement learning-based intelligent reflecting surface for secure wireless communications,” IEEE Transactions on Wireless Communications, vol. 20, no. 1, pp. 375–388, 2020.
  • [48] S. Lu, X. Shen, P. Zhang, Z. Wu, Y. Chen, L. Wang, and X. Xie, “Deep Reinforcement Learning-Based Intelligent Reflecting Surface for cooperative Jamming Model Design,” IEEE Access, 2023.
  • [49] M. Colombo, “Advances in interior point methods for large-scale linear programming,” 2007.
  • [50] S. Miller and D. Childers, Probability and random processes: With applications to signal processing and communications.   Academic Press, 2012.