IoT Congestion Control via Fuzzy Logic
IoT Congestion Control via Fuzzy Logic
  ABSTRACT Congestion management in the Internet of Things (IoT) is one of the most challenging
  tasks in improving the quality of service (QoS) of a network. This is largely because modern wireless
  networks can consist of an immense number of connections. Consequently, limited network resources can be
  consumed simultaneously. This eventually causes congestion that has adverse impacts on both throughput
  and transmission delay. This is particularly true in a network whose transmissions are regulated by the
  Constrained Application Protocol (CoAP), which has been widely adopted in the IoT network. CoAP has a
  mechanism that allows connection-oriented communication by means of acknowledgment messages (ACKs)
  and retransmission timeouts (RTOs). However, during congestion, a client node is unable to efficiently
  specify the RTO, resulting in unnecessary retransmission. This overhead in turn causes even more extensive
  congestion in the network. Therefore, this research proposes a novel scheme for optimally setting the initial
  RTO and adjusting the RTO backoff that considers current network utilization. The scheme consists of
  three main components: 1) a multidimensional congestion estimator that determines congestion conditions
  in various aspects, 2) precise initial RTO estimation by means of a relative strength indicator and trend
  analysis, and 3) a flexible and congestion-aware backoff strategy based on an adaptive-boundary backoff
  factor evaluated by using a fuzzy logic system (FLS). The simulation results presented here reveal that the
  proposed scheme outperforms state-of-the-art methods in terms of the carried load, delay and percentage of
  retransmission.
  INDEX TERMS Adaptive timeout, congestion control, constrained application protocol, fuzzy logic
  systems, Internet of Things.
                      This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
VOLUME 9, 2021                                                                                                                                                         58967
                                                                           P. Aimtongkham et al.: Enhanced CoAP Scheme Using Fuzzy Logic
an FLS into the backoff strategy and RTO adjustment cor-          in cases where the RTT does not change over time. Accord-
responding to dynamic congestion conditions on CoAP. The          ing to their experiments, it was found that CoCoA+ was
proposed scheme could significantly reduce retransmission          able to improve the efficiency over CoCoA in terms of
and hence energy consumption while increasing the network         both the packet delivery ratio (PDR) and delay, especially in
efficiency in terms of both throughput and transmission delay.     cases where the number of connections increased. However,
The scheme evaluates the RTT and accordingly specifies the         CoCoA+ remains impeded by limited thresholds for backoff
optimal RTO by means of the following key components:             adjustment to only three levels. This may cause retransmis-
   1) The multidimensional congestion estimator consid-           sion overhead in the fourth backoff.
      ers the RTT from various perspectives to create auxil-         Thus far, both CoCoA and CoCoA+ share a shortcoming,
      iary parameters in adjusting the initial RTO and backoff    that is, that the RTO is specified as a constant. Therefore,
      ratio when congestion is detected.                          J. J. Lee et al. [15] later proposed a novel RTO specification.
   2) The accurate initial RTO configuration specifies the          In their work, the retransmission count (RC) value obtained
      initial RTO based on changing trends in each round and      from request/response attempts was used to set an adaptive
      the RTT with and without retransmission, weighted by        RTO that corresponds to the current congestion condition in
      statistical indicators.                                     the network while maintaining other processes as designated
   3) The adaptive-boundary backoff adjusts the RTO by            in the original CoCoA. The reported experiments indicated
      using a flexible backoff mechanism based on an FLS,          that an adaptive RTO could help improve both throughput and
      whose inputs are congestion related, to reduce retrans-     PDR. However, this scheme remains limited by a relatively
      mission overhead.                                           short network lifetime. Insight into the reason behind conges-
   The remainder of this paper is organized as follows:           tion in a network with a large number of clients also revealed
Section II reviews the related literature and the state-of-the-   that it was caused by bursty traffic, which can generally be
art congestion-aware routing methods. Based on this survey,       remedied by an accurate initial RTO.
section III discusses the motivation and problem statement.          Later, in 2018, S. Bolettieri et al. proposed a precise con-
Subsequently, section IV describes the proposed congestion        gestion control algorithm for CoAP (pCoCoA) [25]. With this
control method for CoAP. The scheme consists of three major       algorithm, the RTO was initialized precisely. First, a transmis-
components. First, a multidimensional congestion estima-          sion counter (TC) was incorporated into the header of CON
tor determines the current conditions based on multivariate       and ACK messages and then used to estimate the RTT. Then,
congestion parameters. Second, a novel initial RTO estima-        the mean deviance (MDEV) method was adopted in RTO
tor based on a relative strength indicator and trend anal-        initialization by adjusting the backoff level through statistical
ysis is proposed. Finally, an FLS is employed to evaluate         smoothing. Although it is able to reduce the retransmission
the adaptive-boundary backoff factor. The simulations and         rate and hence congestion, compared to CoCoA+, its main
experimental results are explained, analyzed, and discussed       limitation is RTT estimation by the MDEV method. In partic-
in section V and are compared to those obtained by state-of-      ular, with constant smoothing weights, pCoCoA lacks flexi-
the-art methods. Finally, concluding remarks on the outcome       bility to abrupt changes in the RTT.
of the proposed scheme and future works are presented in             The concept of enhancing the precision of RTT and RTO
section VI.                                                       adjustments by means of time-series forecasting has since
                                                                  continuously propelled developments in the field. In 2019,
II. RELATED WORKS                                                 V. Rathod et al. proposed CoCoA++ in an article on delay
Research on congestion control schemes based on CoAP              gradient-based congestion control for the IoT [26]. In their
was first introduced in 2014 by A. Betzler et al., in which        proposal, the precision of RTT estimation was enhanced
CoCoA [14] was proposed. CoCoA is thus considered the             by using a statistical prediction method called the CAIA
first technique that aimed to manage congestion by estimating      delay gradient (CDG) in predicting RTT levels during con-
the RTT from the strong and weak RTT. The former type is          gestion. Additionally, the VBF was also replaced by the
received when there is no retransmission, while the latter is     probabilistic backoff factor (PBF). The reported experimental
received when there are at least two retransmissions. These       results demonstrated that CoCoA++ was able to reduce
two RTT values are then used to adjust the backoff rate. With     the transmission delay while maintaining the package deliv-
this technique, a variable backoff factor (VBF) is used to        ery ratio and lowering retransmission compared to CoCoA.
determine an appropriate RTO. The major drawback is that          However, since CoCoA++ employs a probabilistic method
CoCoA is inflexible across various network environments.           and assumes a uniform random distribution in specifying
In other words, defining the RTO based primarily on the RTT        the backoff sequence, in some PBF rounds, there might be
might not give the optimal results.                               retransmission overhead. Moreover, it is unclear whether
   Later, in 2015, this same research team improved the           CoCoA++ could maintain its performance in the case of a
CoCoA scheme and proposed CoCoA+ [24]. With this                  higher data transmission rate.
improvement, the RTO was weighted between the RTO                    Nonetheless, the prevailing determinants of congestion
obtained from retransmission and the accumulated average          control on CoAP are not limited to optimal RTT estimation
RTO. They also introduced RTO aging to update the RTO             and RTO adjustment. Because the characteristics of network
utilization in the IoT change constantly and greatly over         TABLE 1. Nomenclature used in this study.
its lifecycle, a congestion control scheme must be designed
so that it can spontaneously accommodate this dynamism.
Accordingly, in the same year, S. Gheisari et al. proposed a
technique that integrated learning automata and game theory
to determine and adjust network parameters to suit current
congestion conditions. This technique is called the cognitive
approach for congestion control in IoTs using a game of
learning automata (CCCLA) [27]. In that work, a random
environment network model was created. Given the network
conditions, the best solution was determined by seven optimal
congestion parameters, i.e., the congestion windows, packet
size, duty cycle, retransmission timer, maximum retransmis-
sion, and contention window. The simulation results indi-
cated that the CCCLA could improve network efficiency
by automatically configuring the client node parameters to
better control congestion occurring in the network. However,
by creating a random environment of dynamic conditions,
the CCCLA may not be able to define a set of optimal network
parameters in some cases.
   In the latest development by G. A. Akpakwu et al.,
the context-aware congestion control (CACC) approach for
lightweight CoAP/UDP-based IoT traffic was proposed [28].
This technique considers failed RTT in considering conges-
tion conditions in a network. They proposed three parts of        issues, i.e., the initial mismatch in bursty traffic and the
RTO estimation, i.e., weak, strong and failed RTO. Their          lack of a mechanism in a constraint network. The details are
experimental results revealed that CACC performed much            addressed in the next subsections. Table 1 lists the definitions
more efficiently than CoCoA+. However, failed RTT can be           of the notation used in this study.
evaluated only when retransmission reaches the maximum
number of attempts. This implies that CACC can improve
                                                                  A. INITIAL RTO MISMATCH IN BURSTY TRAFFIC
the network efficiency only when retransmission overhead
                                                                  For estimating the initial RTO in CoAP, statistical methods
occurs.
                                                                  involving time-series models [14], [24], [25] are the most
   In conclusion, awareness of network utilization is a key
                                                                  prevalent. This is because congestion is caused by an accumu-
factor in devising congestion control methods. Typically,
                                                                  lated load at a server node. The server node is thus subject to
congestion control on CoAP implies a congestion condition
                                                                  overload when there are overwhelming concurrent demands
by observing the RTT during confirmation of CON and
                                                                  from client nodes in the network. This congestion scenario
ACK messages. Most existing methods therefore adopt this
                                                                  occurs frequently during bursty traffic.
mechanism in specifying an RTO that suits current network
                                                                     Nevertheless, the changes in network traffic still conform
conditions. However, such implications are based solely on a
                                                                  to cyclical trends. According to previous studies [14], [25],
timing parameter (i.e., RTT). Hence, this type of method is
                                                                  [26], the initial RTO is estimated by the expressions given in
unable to predict transient congestion, such as bursty traffic
                                                                  Eqs. (1) and (2).
phenomena [25]. This is because a client node must wait
to detect an abnormal RTT, which manifests only when the
                                                                          RTTVARx = (1 − β) × RTTVARx
server node is already congested.                                                         ∣                ∣
   Accordingly, this paper presents an improvement on con-                          +β × ∣RTT x − RTT xnew ∣                         (1)
gestion control by proposing RTT estimation and initial                        RTT x = (1 − α) × RTT x + α × RTT xnew                (2)
RTO adjustment on the basis of indicative parameters. These
parameters imply various aspects of network conditions,              In the above equations, RTTVARx and RTTx for an RTT
including the stability and node burden of the network due to a   state x are determined by either strong (RTTstrong ) or weak
fluctuating RTT. In addition, an FLS is employed to calculate      (RTTweak ) RTT for a round trip without or with retransmis-
the adaptive-boundary backoff factor (ABF) to make the            sion, and xnew are determined by the RTT state for a newly
retransmission backoff much more flexible.                         RTT measured, when β and α are fixed at 0.25 and 0.125 [24],
                                                                  respectively. The resulting RTTVARx and RTTx are then used
III. MOTIVATION AND PROBLEM STATEMENT                             to estimate the RTO following Eq. (3).
This section presents the motivation for studying congestion
control in CoAP. The emphasis is placed on two important                       RTOx = RTT x + Rmax × RTTVARx                         (3)
   In Eq. (9), the RTT Jitter is expressed as absolute dif-               Accordingly, the future trend of the RTT is predicted from
ferences delay between the RTTs (i.e., RTTt and RTTt−1 ).              the value in the previous interval (Ft−1 ), the relative weight
The resulting RTTJitter parameter is then used to determine            obtained from the RS indicator (RSIndicator ), and the current
the congestion for the adaptive-boundary backoff factor (see           trend (RTTTrend ), given by Eq. (11). The resulting prediction
Section IV-C).                                                         is used in adjusting the initial RTO (RTOinit ), as shown in Eq.
                                                                       (13), to make its configuration more precise.
B. INITIAL RTO RELATIVE WEIGHT ESTIMATION WITH                                         RTOinit = RTOest + FTrend                  (13)
TREND ADJUSTMENT
This section presents methods of estimating the initial RTO            where RTOest are the adjusted initial RTO (RTOinit ) and that
and optimally adjusting the RTO by using relative weights              estimated by means of the relative weight method. The FTrend
and RTT Trend evaluation, respectively. To this end, the initial       is the trend predicted by Eq. (12).
RTO estimation is based on previous work on forecasting
                                                                       C. ADAPTIVE-BOUNDARY BACKOFF FACTOR BASED
trends [32]. Estimations of both the initial RTO and its trend
                                                                       ON FUZZY LOGIC
are explained below.
                                                                       This process involves enhancing the backoff efficiency by
1) RTO RELATIVE WEIGHT ESTIMATION
                                                                       adjusting the RTO in response to the present congestion in
                                                                       the network. To this end, both the flexibility and accuracy of
This section describes the improvement in RTO estimation
                                                                       the RTO setting are considered while reducing the number of
compared with [14] and [24]. In those works, the RTO
                                                                       retransmissions due to its overhead. The process consists of 2
was estimated based on constant ratios. Note, however, that
                                                                       main stages. First, an FLS is utilized to set the weight of the
applying different RTO stages is also feasible to enhance the
                                                                       backoff time boundary. Second, the efficiency of the backoff
performance for RTO estimation [28], and thus, we consider
                                                                       strategy is enhanced by means of the FLS adaptive boundary
both the weak and strong stages in this research. With the
                                                                       after retransmission.
present improvement, however, the ratio is adjusted opti-
mally based on the relative strength indicator, as defined in
                                                                       1) FUZZY LOGIC SYSTEM
Section IV-A. Therefore, the initial RTO can be estimated
                                                                       This step applies an FLS to compute the weight considering
by Eq. (10).
                                                                       multidimensional congestion-related variables, i.e., the net-
                                                                       work stability (RTT Interval), RTT fluctuation (RTT Jitter),
RTOest = RS Indicator × RTOweak + (1 − RS Indicator )
                                                                       and statistically analyzed RTT trend (RTT Trend). The FLS
                                       ×RTOstrong               (10)   consists of four key modules: the fuzzifier, fuzzy rule, fuzzy
                                                                       inference engine, and defuzzifier. Their detailed analyses are
where RSIndicator is an indicator obtained from the RS indi-           presented below.
cator (see Section IV-A) and RTOweak and RTOstrong are the
                                                                          • Fuzzifier: This module converts inputs in crisp sets
approximately RTO when retransmission occurs and when
                                                                            into fuzzy sets. In this paper, three input variables are
there is no retransmission, respectively. The resulting RTOest
                                                                            considered. They are RTT Trend, RTT Interval, and RTT
is employed in the calculation as described in the next
                                                                            Jitter, whose units and ranges differ, each computed
subsection.
                                                                            during the individual RTO round. Therefore, the former
                                                                            is normalized to within the range [–1, 1], i.e., the two
2) RTO TREND ADJUSTMENT                                                     RTTs during a particular interval over the maximum of
This section extends RTO estimation by considering the pre-                 the RTT difference. The remaining two are restricted to
diction of the RTT Trend in each round. Insights into changes               within the range [0, 1] and evaluated as follows: for RTT
in the RTT between intervals reveal that they also affect the               Interval, the number of received ACKs over the number
prediction of the RTO. The RTT Trend is defined simply as                    of transmitted packets, while for RTT Jitter, the differ-
the difference between RTTs in consecutive intervals, i.e., t               ence delay of the pair of RTTs over the maximum of the
and t – 1, as expressed in Eq. (11).                                        difference delay within the RTO round. Subsequently,
                                                                            membership functions (MFs) are defined. According to
                 RTTTrend = RTT t−1 − RTT t                     (11)        a preliminary experiment, among different types of MFs,
                                                                            i.e., Gaussian, triangular, trapezoidal, generalized bell,
   This trend represents the RTT change in each interval t,                 and sigmoid functions, the triangular function was the
where RTTt−1 and RTTt are the RTTs of the transmission in                   most suitable for partitioning the inputs, whose bands
the previous and current intervals, respectively. The resulting             were generally narrow. Note that based on our experi-
RTTTrend is used both to predict the future trend by smooth-                ment, Gaussian, trapezoidal, and generalized bell MFs
ing, as in Eq. (12), and as a parameter in the FLS (see                     were suitable for a wide range of variables when con-
Section IV-C.1).                                                            sidering the crisp input variables. Similarly, the sigmoid
                                                                            function is appropriate for constructing a single-level
     FTrend = Ft−1 + RSIndicator × (RTT Trend − Ft−1 ) (12)                 MF [20], [21].
                                                                       in the first round with RTOinit . While the backoff count has
                                                                       not reached the backoff threshold (backoffMax), the backoff
                                                                       boundary is calculated from either of the RTO conditions as
                                                                       per Eq. (16). Subsequently, the FLS is employed to adjust the
                                                                       backoff rate in each round, as described in Section IV-C.1.
                                                                       The resulting ABW is then used to adjust the backoff RTO
                                                                       for the next retransmission, as given in Eq. (17).
method in Section IV-B (RTOinit ). In addition, RTOGain is
the threshold for incremental rate of RTO per round such               Algorithm 1 ABF Backoff Adjustment
that RTOGain ∈ {RTOGainmin , RTOGainmax } [24]–[26].                           Input: RTOn−1, ABW
ABF                                                                            Output: RTO_backoff
 
 RTOn−1 × RTOGainmax ,                 RTOn−1 < RTOGainmin              1 INITIALIZE RTOinit ,backoffCount = 0
 
 
 
                                       < RTOn−1< RTOGainmax             2     WHILE (backoffCount < backoffMax) DO
 
           (            )
             RTOGainmax                                                 3      Calculate backoff boundary based on Eq. (16)
= RTOn−1 ×                 ,               RTOGainmin ≤ RTOn−1           4      IF (RTOn−1 < RTOGainmin ) THEN
 
                 2
 
                                                                        5         ABF = RTOn−1 × RTOGainmax
 
 
                                        ≤ RTOGainmax                    6         ELSE IF (RTOGainmin ≤ RTOn−1 ≤
 
   RTOn−1 × RTOGainmin ,                 RTOn−1 > RTOGainmax                         RTOGainmax ) THEN
                                                         (16)            7              ABF = RTOn−1 × RTOGainmax × 0.5
                                                                         8         ELSE IF (RTOn−1 > RTOGainmax ) THEN
   Once the boundary factor has been evaluated, the backoff
                                                                         9              ABF = RTOn−1 × RTOGainmin
boundary of the RTO (RTOn or RTO_backoff) is adapted from
                                                                         10     END IF
that in the previous round (RTOn−1 ) and weighted by the ABF
                                                                         11    Calculate RTO_backoff based on Eq. (17)
and ABW, as given in Eq. (17).
                                                                         12              RTO_backoff = (RTOn−1 × ABF)
         RTO_backoff = (RTOn−1 × ABF) × ABW                     (17)                     × ABW
                                                                         13            RETURN RTO_backoff
 In summary, Algorithm 1 explains the steps involved in
                                                                         14    END WHILE
ABF backoff adjustment. It starts by initializing the RTO
V. PERFORMANCE EVALUATION
To demonstrate the performance and efficiency of FLCoCoA,
simulations were performed, and the results obtained by
the proposed method were compared to those of the state-
of-the-art methods reviewed in the related studies section.
They were pCoCoA [25], CoCoA+ [24], CCCLA [27], and
CoCoA++ [26].
A. SIMULATION SETTINGS
In the following experiments, this study employed CoAP on
the IoT simulation software package Cooja [33], which was
run on the Contiki operating system version 3.0 [34], and the
FLS model simulation software Octave version 4.2 [35]. Sim-
ilar to the experiments conducted in [14], [24], [25], and [27],
the entire process was executed on a virtual machine installed
on an x86 computer system running Ubuntu Linux 14.04 LTS.
Likewise, the parameter settings defined in Table 3 followed
those prescribed in [14], [24], [25], and [27].
   To compare the results with related works [14], [24], [25],
and [27], this study evaluated three indicative metrics:
   • Carried load (average throughput per node), defined
      as the average transmission per node given different
      simulated data rates in the range of 1–10 kbps,
   • Delay (average end-to-end delay), defined as the aver-
      age receiving delay between the client and server
      nodes given different simulated data rates in the range       FIGURE 6. Four network topologies considered in the simulations.
      of 1–10 kbps, and
                                                                    TABLE 3. Simulation parameters of [14], [24], [25], and [27].
   • Retransmission (average percentage of retransmis-
      sion), defined as the average retransmission percentage,
      which indicates the efficiency and precision in determin-
      ing the RTO.
   To elucidate the proposed mechanisms on a variety of net-
works, simulations on four different network topologies were
performed and compared with the related works. Following
the state of the art [14], [24]–[26], there are 4 main topologies
with 36 nodes in 100 square meters that are 1) uniformly
distributed over 6 × 6 grids, 2) randomly deployed, and
3) distributed in a three-leaf group forming a flower pattern
that include 6, 13, and 15 nodes with a server node and a
border router located in the central and in the large group,
respectively, and 4) a linear distribution of 20 nodes in a
chain pattern. In all cases, the server, border router and client
node are illustrated in magenta, yellow and green circles
respectively. The communication range was specified to be
10 meters (interference 20 meters), while the buffer size,          B. SIMULATION RESULTS AND DISCUSSION
backoff threshold, and RTOGain were set to 8 packets, 5,            This section presents and discusses the experimental results.
and {1 s, 3 s}, respectively [14], [24]–[27]. In this setup,        Those obtained by the FLCoCoA methods were bench-
we use accumulated ACKs as RTT Interval and the last pair           marked in terms of performance and efficiency against the
of RTTs in each RTO for RTT Trend and RTT Jitter in the             state-of-the-art methods, i.e., pCoCoA [25], CoCoA+ [24],
fuzzification process. In addition, to validate the reliability      CCCLA [27], and CoCoA++ [26].
of the simulation model, the experiments were carried out              The discussion is divided into three areas according to the
10 times in each scenario. Then, for each experimental setup,       indicative metrics. They are the 1) carried load, 2) delay,
the average and standard deviation were evaluated at a confi-        and 3) retransmission ratio. The first metric measures the
dence interval (CI) of 95%.                                         transmission efficiency from a client to a server, while the sec-
   Fig. 6 depicts example node distributions in the simulated       ond measures the average delay time in transmission, which
topologies, in which server nodes, border routers, and client       determines the efficiency of specifying the RTO timeframe.
nodes are denoted in red, yellow, and blue, respectively.           Last, the retransmission ratio represents the efficiency of the
                                                                            VI. CONCLUSION
                                                                            This research presents a novel congestion control scheme
                                                                            for CoAP. In particular, it improves the RTOinit estimation
                                                                            mechanism and RTO backoff method. Its main contributions
                                                                            are 1) determining the multidimensional RTT based on the
                                                                            RS indicator, RTT Interval, and RTT Jitter, 2) initial RTO
                                                                            estimation by the RS indicator during weight adjustment from
                                                                            both RTT values in conjunction with trend prediction, and
                                                                            3) a flexible backoff method based on an FLS to determine
                                                                            congestion-driven factors and optimally adjust the backoff
                                                                            ratio according to the network condition.
                                                                               It was demonstrated in the experiments that all these con-
                                                                            tributions jointly enhanced the congestion control efficiency.
                                                                            In particular, compared to pCoCoA, CoCoA+, CCCLA
FIGURE 9. Simulation results for the average delay versus offered load in   and CoCoA++, they increased the data transmission rate
four network topology scenarios.                                            by 7.59%, 14.33%, 24.34%, and 35.74% and reduced
                                                                            retransmissions by 5.21%, 9.69%, 12.40%, and 16.71%,
                                                                            respectively.
by those obtained by using pCoCoA, CoCoA+, CCCLA,                              Thus far, FLCoCoA has not been specifically designed to
and CoCoA++, which were 3.12–62.38%, 3.14–64.3%,                            support congestion control on CoAP in the nonconfirmable
3.2–67.5%, and 3.25–68.6%, respectively.                                    mode. Furthermore, for practicality, intensive simulation
with a real testbed should be investigated, including various                        [16] C. Vallati, F. Righetti, G. Tanganelli, E. Mingozzi, and G. Anastasi, ‘‘Anal-
topologies, traffic heterogeneity, and diverse parameters and                              ysis of the interplay between RPL and the congestion control strategies
                                                                                          for CoAP,’’ Ad Hoc Netw., vol. 109, Dec. 2020, Art. no. 102290, doi:
setups. In addition, the diversity and density of the node dis-                           10.1016/j.adhoc.2020.102290.
tribution merit consideration for further study, i.e., variations                    [17] L. P. Verma and M. Kumar, ‘‘An IoT based congestion control
of the number of nodes and scaling areas in the experimental                              algorithm,’’ Internet Things, vol. 9, Mar. 2020, Art. no. 100157, doi:
                                                                                          10.1016/j.iot.2019.100157.
field, energy consumption in the fuzzy logic system, and                              [18] F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, ‘‘Machine learning
applications to real devices, which were not considered dur-                              in IoT security: Current solutions and future challenges,’’ IEEE Com-
ing network simulation. In future investigations, we intend                               mun. Surveys Tuts., vol. 22, no. 3, pp. 1686–1721, 3rd Quart., 2020, doi:
                                                                                          10.1109/COMST.2020.2986444.
to include experiments, protocols, and energy consumption                            [19] P. Punithavathi, S. Geetha, M. Karuppiah, S. H. Islam, M. M. Hassan,
measurements using real-world IoT devices. In addition,                                   and K.-K.-R. Choo, ‘‘A lightweight machine learning-based authentica-
                                                                                          tion framework for smart IoT devices,’’ Inf. Sci., vol. 484, pp. 255–268,
we are working on the energy usage from the computing                                     May 2019, doi: 10.1016/j.ins.2019.01.073.
perspective in MicaZ and Tmote Sky.                                                  [20] P. Hilletofth, M. Sequeira, and A. Adlemo, ‘‘Three novel fuzzy logic con-
                                                                                          cepts applied to reshoring decision-making,’’ Expert Syst. Appl., vol. 126,
                                                                                          pp. 133–143, Jul. 2019, doi: 10.1016/j.eswa.2019.02.018.
REFERENCES                                                                           [21] Y. H. Kim, S. C. Ahn, and W. H. Kwon, ‘‘Computational complexity
 [1] P. P. Ray, ‘‘A survey on Internet of Things architectures,’’ J. King Saud            of general fuzzy logic control and its simplification for a loop con-
     Univ.-Comput. Inf. Sci., vol. 30, no. 3, pp. 291–319, Jul. 2018, doi:                troller,’’ Fuzzy Sets Syst., vol. 111, no. 2, pp. 215–224, Apr. 2000, doi:
     10.1016/j.jksuci.2016.10.003.                                                        10.1016/S0165-0114(97)00409-0.
 [2] E. Sisinni, A. Saifullah, S. Han, U. Jennehag, and M. Gidlund, ‘‘Indus-         [22] M. Cuka, D. Elmazi, M. Ikeda, K. Matsuo, and L. Barolli, ‘‘IoT node selec-
     trial Internet of Things: Challenges, opportunities, and directions,’’ IEEE          tion in opportunistic networks: Implementation of fuzzy-based simulation
     Trans. Ind. Informat., vol. 14, no. 11, pp. 4724–4734, Nov. 2018, doi:               systems and testbed,’’ Internet Things, vol. 8, Dec. 2019, Art. no. 100105,
     10.1109/TII.2018.2852491.                                                            doi: 10.1016/j.iot.2019.100105.
                                                                                     [23] R. S. Krishnan, E. G. Julie, Y. H. Robinson, S. Raja, R. Kumar, P. H. Thong,
 [3] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, ‘‘Internet of
                                                                                          and L. H. Son, ‘‘Fuzzy logic based smart irrigation system using Internet
     Things for smart cities,’’ IEEE Internet Things J., vol. 1, no. 1, pp. 22–32,
                                                                                          of Things,’’ J. Cleaner Prod., vol. 252, Apr. 2020, Art. no. 119902, doi:
     Feb. 2014, doi: 10.1109/JIOT.2014.2306328.
                                                                                          10.1016/j.jclepro.2019.119902.
 [4] Statista.com. (2018). IoT: Number of Connected Devices Worldwide                [24] A. Betzler, C. Gomez, I. Demirkol, and J. Paradells, ‘‘CoCoA+: An
     2012-2025 | Statista Web. Accessed: Jul. 7, 2020. [Online]. Available:               advanced congestion control mechanism for CoAP,’’ Ad Hoc Netw., vol. 33,
     https://www.statista.com/statistics/471264/iot-number-of-connected-                  pp. 126–139, Oct. 2015, doi: 10.1016/j.adhoc.2015.04.007.
     devices-worldwide/                                                              [25] S. Bolettieri, G. Tanganelli, C. Vallati, and E. Mingozzi, ‘‘PCoCoA: A
 [5] Intel.com. (2016). A Guide to the Internet of Things Infographic, Intel.             precise congestion control algorithm for CoAP,’’ Ad Hoc Netw., vol. 80,
     Accessed: Mar. 08, 2019. [Online]. Available: https://www.intel.com/                 pp. 116–129, Nov. 2018, doi: 10.1016/j.adhoc.2018.06.015.
     content/www/us/en/internet-of-things/infographics/guide-to-iot.html             [26] V. Rathod, N. Jeppu, S. Sastry, S. Singala, and M. P. Tahiliani,
 [6] J. Ren, H. Guo, C. Xu, and Y. Zhang, ‘‘Serving at the edge: A scalable IoT           ‘‘CoCoA++: Delay gradient based congestion control for Internet
     architecture based on transparent computing,’’ IEEE Netw., vol. 31, no. 5,           of Things,’’ Future Gener. Comput. Syst., vol. 100, pp. 1053–1072,
     pp. 96–105, Aug. 2017, doi: 10.1109/MNET.2017.1700030.                               Nov. 2019, doi: 10.1016/j.future.2019.04.054.
 [7] C. Bormann, A. P. Castellani, and Z. Shelby, ‘‘CoAP: An application pro-        [27] S. Gheisari and E. Tahavori, ‘‘CCCLA: A cognitive approach for
     tocol for billions of tiny Internet nodes,’’ IEEE Internet Comput., vol. 16,         congestion control in Internet of Things using a game of learning
     no. 2, pp. 62–67, Mar. 2012, doi: 10.1109/MIC.2012.29.                               automata,’’ Comput. Commun., vol. 147, pp. 40–49, Nov. 2019, doi:
 [8] J. Misic, M. Z. Ali, and V. B. Misic, ‘‘Architecture for IoT domain                  10.1016/j.comcom.2019.08.017.
     with CoAP observe feature,’’ IEEE Internet Things J., vol. 5, no. 2,            [28] G. A. Akpakwu, G. P. Hancke, and A. M. Abu-Mahfouz, ‘‘CACC: Context-
     pp. 1196–1205, Apr. 2018, doi: 10.1109/JIOT.2018.2800691.                            aware congestion control approach for lightweight CoAP/UDP-based
 [9] RFC 7252—The Constrained Application Protocol (CoAP). Accessed:                      Internet of Things traffic,’’ Trans. Emerg. Telecommun. Technol., vol. 31,
     Jul. 7, 2020. [Online]. Available: https://tools.ietf.org/html/rfc7252               no. 2, p. e3822, Feb. 2020, doi: 10.1002/ett.3822.
[10] M. Gohar, J.-G. Choi, and S.-J. Koh, ‘‘CoAP-based group mobility man-           [29] D. A. Hayes and G. Armitage, Revisiting TCP congestion control using
     agement protocol for the Internet-of-Things in WBAN environment,’’                   delay gradients (Lecture Notes in Computer Science: Lecture Notes in
     Future Gener. Comput. Syst., vol. 88, pp. 309–318, Nov. 2018, doi:                   Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6641,
     10.1016/j.future.2018.06.003.                                                        no. 2. Berlin, Germany: Springer, 2011, pp. 328–341, doi: 10.1007/978-
                                                                                          3-642-20798-3_25.
[11] C. Bockelmann, N. K. Pratas, G. Wunder, S. Saur, M. Navarro,
                                                                                     [30] B. W. Crowell, Y. Bock, and Z. Liu, ‘‘Single-station automated detection of
     D. Gregoratti, G. Vivier, E. De Carvalho, Y. Ji, C. Stefanovic,
                                                                                          transient deformation in GPS time series with the relative strength index: A
     P. Popovski, Q. Wang, M. Schellmann, E. Kosmatos, P. Demestichas,
                                                                                          case study of cascadian slow slip,’’ J. Geophys. Res., Solid Earth, vol. 121,
     M. Raceala-Motoc, P. Jung, S. Stanczak, and A. Dekorsy, ‘‘Towards
                                                                                          no. 12, pp. 9077–9094, Dec. 2016, doi: 10.1002/2016JB013542.
     massive connectivity support for scalable mMTC communications in
                                                                                     [31] Q. Zhang, H. Gong, X. Zhang, C. Liang, and Y.-A. Tan, ‘‘A sensitive
     5G networks,’’ IEEE Access, vol. 6, pp. 28969–28992, May 2018, doi:
                                                                                          network jitter measurement for covert timing channels over interactive
     10.1109/ACCESS.2018.2837382.
                                                                                          traffic,’’ Multimedia Tools Appl., vol. 78, no. 3, pp. 3493–3509, Feb. 2019,
[12] S. R. Pokhrel, J. Ding, J. Park, O.-S. Park, and J. Choi, ‘‘Towards enabling         doi: 10.1007/s11042-018-6281-1.
     critical mMTC: A review of URLLC within mMTC,’’ IEEE Access, vol. 8,            [32] G. Cui, J. Guo, Y. Fan, Y. Lan, and X. Cheng, ‘‘Trend-smooth:
     pp. 131796–131813, 2020, doi: 10.1109/ACCESS.2020.3010271.                           Accelerate asynchronous SGD by smoothing parameters using param-
[13] F. L. Coman, K. M. Malarski, M. N. Petersen, and S. Ruepp, ‘‘Security                eter trends,’’ IEEE Access, vol. 7, pp. 156848–156859, 2019, doi:
     issues in Internet of Things: Vulnerability analysis of LoRaWAN, sigfox              10.1109/ACCESS.2019.2949611.
     and NB-IoT,’’ in Proc. Global IoT Summit (GIoTS), Aarhus, Denmark,              [33] F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt, ‘‘Cross-
     Jun. 2019, pp. 1–6, doi: 10.1109/GIOTS.2019.8766430.                                 level sensor network simulation with COOJA,’’ in Proc. 31st IEEE Conf.
[14] A. Betzler, C. Gomez, I. Demirkol, and J. Paradells, ‘‘CoAP congestion               Local Comput. Netw., Nov. 2006, pp. 641–648, doi: 10.1109/LCN.2006.
     control for the Internet of Things,’’ IEEE Commun. Mag., vol. 54, no. 7,             322172.
     pp. 154–160, Jul. 2016, doi: 10.1109/MCOM.2016.7509394.                         [34] A. Dunkels, B. Gronvall, and T. Voigt, ‘‘Contiki—A lightweight and
[15] J. J. Lee, K. T. Kim, and H. Y. Youn, ‘‘Enhancement of congestion                    flexible operating system for tiny networked sensors,’’ in Proc. 29th
     control of constrained application protocol/congestion control/advanced              Annu. IEEE Int. Conf. Local Comput. Netw., Nov. 2004, pp. 455–462, doi:
     for Internet of Things environment,’’ Int. J. Distrib. Sensor Netw., vol. 12,        10.1109/LCN.2004.38.
     no. 11, Nov. 2016, Art. no. 155014771667627, doi: 10.1177/155014771             [35] J. W. Eaton, D. Bateman, and S. Hauberg, ‘‘GNU Octave,’’ in Network
     6676274.                                                                             Thoery London. Bristol, U.K.: Network Theory, 1997.
                          PHET AIMTONGKHAM received the B.S., M.S.,                                       CHAKCHAI SO-IN (Senior Member, IEEE)
                          and Ph.D. degrees in information technology                                     received the Ph.D. degree in computer engineer-
                          from the Department of Computer Science, Khon                                   ing from Washington University, St. Louis, MO,
                          Kaen University, Thailand, in 2013, 2017, and                                   USA, in 2010. He was an Intern with CNAP-NTU
                          2020, respectively. He is currently a Postdoctoral                              (SG), Cisco Systems, WiMAX Forums, and the
                          Researcher with the ANT Laboratory, Khon Kaen                                   Bell Labs, USA. He is currently a Professor with
                          University. His research interests include com-                                 the Department of Computer Science, Khon Kaen
                          puter networking, multimedia networks, the Inter-                               University. He has authored over 100 international
                          net of Things, and machine learning.                                            publications and ten books, including some in
                                                                                                          IEEE JSAC, IEEE Magazines, and Computer Net-
                                                                                  work/Network Security Labs. His research interests include the Internet of
                                                                                  Things (IoT), mobile computing, wireless/sensor networks, signal process-
                                                                                  ing, and computer networking and security. He is also a senior member of
                            PARAMATE HORKAEW received the B.Eng.
                                                                                  ACM. He has served as an Editor for IEEE ACCESS, PLOS ONE, PeerJ, and
                            degree in telecommunication engineering from the
                                                                                  ECTI-Transactions on Computer and Information Technology (ECTI-CIT)
                            King Mongkut’s Institute of Technology, Ladkra-
                                                                                  and as a Committee Member for many conferences/journals such as GLOBE-
                            bang, in 1999. During his undergraduate study,
                                                                                  COM, ICC, VTC, WCNC, ICNP, ICNC, PIMRC, IEEE TRANSACTIONS, IEEE
                            he was working part-time on medical informatics
                                                                                  LETTER, IEEE Magazines, and Computer Networks/Communications.
                            research with the Computed Tomography Labora-
                            tory, NECTEC, from 1997 to 1999. As a Research
                            Assistant with the institute, he was involved in
                            both software development, notably CalScoreR,
                            and FPGA design projects. He had then continued
his research, supported by the Ministry of Science, in medical image comput-
ing with the Visual Information Processing Group, Imperial College London,
from 2000 to 2004. His Ph.D. thesis focused on an efficient and automatic
method for constructing the optimal statistical deformable model for com-
plex topological shapes with application to cardiovascular imaging. Based on
the p-Harmonic analysis on manifolds and information theory, the resultant
model is not only concise but also able to capture the intrinsic morphology
of typical human hearts. As a part of his research, in collaboration with
the Royal Brompton Hospital London, he also co-wrote a computer-assisted
diagnosis software for cardiovascular magnetic resonance images (CMR-
ToolsR), currently being clinically validated by several international research
centers. He is currently a Lecturer with the School of Computer Engineering,
Suranaree University of Technology. His main research interests include
computational anatomy, digital geometry processing, computer vision and
graphics, and the evolution of harmonic maps on riemannian surfaces with
applications to nonlinear PDE.