submitted for publication 1 learning, computing, and

16
IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 1 Learning, Computing, and Trustworthiness in Intelligent IoT Environments: Performance-Energy Tradeoffs Beatriz Soret, IEEE Member, Lam D. Nguyen, IEEE Graduate Student Member, Jan Seeger, Arne Brรถring, Chaouki Ben Issaid, IEEE Member, Sumudu Samarakoon, IEEE Member, Anis El Gabli, IEEE Member, Vivek Kulkarni, Mehdi Bennis, IEEE Fellow, and Petar Popovski, IEEE Fellow Abstractโ€”An Intelligent IoT Environment (iIoTe) is comprised of heterogeneous devices that can collaboratively execute semi- autonomous IoT applications, examples of which include highly automated manufacturing cells or autonomously interacting harvesting machines. Energy ef๏ฌciency is key in such edge environments, since they are often based on an infrastructure that consists of wireless and battery-run devices, e.g., e-tractors, drones, Automated Guided Vehicle (AGV)s and robots. The total energy consumption draws contributions from multiple iIoTe technologies that enable edge computing and communication, distributed learning, as well as distributed ledgers and smart contracts. This paper provides a state-of-the-art overview of these technologies and illustrates their functionality and performance, with special attention to the tradeoff among resources, latency, privacy and energy consumption. Finally, the paper provides a vision for integrating these enabling technologies in energy- ef๏ฌcient iIoTe and a roadmap to address the open research challenges. Index Termsโ€”Edge IoT, wireless AI, Distributed learning, Dis- tributed Ledger Technology, Autonomous IoT, Trustworthiness. I. I NTRODUCTION A. Towards the edge During the last decade, the need for connecting billions of Internet of Things (IoT) devices has driven a signi๏ฌcant part of the design of computing and communication networks. The number of use cases is countless, ranging from smart home to smart city, industrial automation or smart farming. Many of the applications involve huge amounts of data, and the need for fast, trustworthy and reliable processing of this data is oftentimes infeasible with a cloud-centric paradigm [1], [2]. Moreover, typical hierarchical setups of IoT cloud platforms hinder use cases with dynamically changing context due to lacking self-awareness of the individual subsystems and the overall system they usher. Alternatively, the architectures are evolving towards edge solutions that place compute, network- ing, and storage in close proximity to the devices. At the same time, the introduction of machine-driven intelligence has led to the term edge intelligence, referring to the design of distributed IoT systems with latency-sensitive learning capabilities [3]. Beatriz Soret, Lam D. Nguyen, and Petar Popovski are with the Connectiv- ity Section, Department of Electronic System, Aalborg University, Denmark. Contact: {bsa, ndl, petarp}@es.aau.dk. Jan Seeger, Arne Brรถring, and Vivek Kulkarni are with Siemens AG, Mu- nich, Germany. Contact: [email protected], {arne.broering, vivekkulka- rni} @siemens.com. Chaouki Ben Issaid, Sumudu Samarakoon, Anis El Gabli, and Mehdi Ben- nis are with Centre for Wireless Communications (CWC), University of Oulu, Finland. Contact: {Chaouki.BenIssaid, Sumudu.Samarakoon, Anis.Elgabli, mehdi.bennis} @oulu.๏ฌ Although the edge-centric approach solves the fundamental limitations in terms of latency and dynamism, it also induces new challenges to the edge system: (1) the system has to deal with complex IoT applications which include functions for sensing, acting, reasoning and control, to be collaboratively run in heterogeneous devices, such as edge computers and resource-constrained devices, and generating data from a huge number of data sources; (2) trustworthiness is a big concern for edge and IoT systems where devices communicate with other devices belonging to potentially many different parties, without any pre-established trust relationship among them; (3) all those functionalities are increasingly based on a resource- limited wireless infrastructure that introduces latency and packet losses in dynamically changing channels. Another huge concern for the exponential growth of IoT is its scalability and contribution to the carbon footprint. On the one hand, IoT is key in deploying a huge amount of applications that will reduce the emissions of numerous sectors and industries (e.g., smart farming or energy) [4]. On the other hand, although many of these devices are low-power, the total energy consumption of the infrastructure that support such systems does have a contribution to the digital carbon footprint and cannot be overlooked [5], [6]. B. Intelligent IoT environments We coin the term Intelligent IoT Environment (iIoTe) to refer to autonomous IoT applications endowed with intelligence based on an ef๏ฌcient and reliable IoT/edge- (computation) and network- (communication) infrastructure that dynamically adapts to changes in the environment and with built-in and assured trust. Besides the wireless (and wired) networking to interconnect all IoT devices and infrastructure, there are other three key (and power-hungry) technologies that enable iIoTe. The ๏ฌrst one is Machine Learning (ML) and Arti๏ฌcial Intelligence (AI), and therefore we talk about intelligent IoT environments, comprising heterogeneous devices that can col- laboratively execute autonomous IoT applications. Given the distributed nature of the system, distributed ML/AI solutions are better suited for multi-node (multi-agent) learning. Edge computing is another de๏ฌning technology that provides the computation side of the infrastructure and allocates computing resources for complex IoT applications that need to be dis- tributed over multiple, connected IoT devices (e.g., machines and Automated Guided Vehicle (AGV)s). The third pillar is the Distributed Ledger Technology (DLT): rather than traditional security mechanisms, DLT has been identi๏ฌed as the most arXiv:2110.01686v2 [cs.DC] 24 Dec 2021

Upload: others

Post on 21-Feb-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 1

Learning, Computing, and Trustworthiness in Intelligent IoTEnvironments: Performance-Energy Tradeoffs

Beatriz Soret, IEEE Member, Lam D. Nguyen, IEEE Graduate Student Member, Jan Seeger, Arne Brรถring,Chaouki Ben Issaid, IEEE Member, Sumudu Samarakoon, IEEE Member, Anis El Gabli, IEEE Member,

Vivek Kulkarni, Mehdi Bennis, IEEE Fellow, and Petar Popovski, IEEE Fellow

Abstractโ€”An Intelligent IoT Environment (iIoTe) is comprisedof heterogeneous devices that can collaboratively execute semi-autonomous IoT applications, examples of which include highlyautomated manufacturing cells or autonomously interactingharvesting machines. Energy efficiency is key in such edgeenvironments, since they are often based on an infrastructurethat consists of wireless and battery-run devices, e.g., e-tractors,drones, Automated Guided Vehicle (AGV)s and robots. The totalenergy consumption draws contributions from multiple iIoTetechnologies that enable edge computing and communication,distributed learning, as well as distributed ledgers and smartcontracts. This paper provides a state-of-the-art overview of thesetechnologies and illustrates their functionality and performance,with special attention to the tradeoff among resources, latency,privacy and energy consumption. Finally, the paper providesa vision for integrating these enabling technologies in energy-efficient iIoTe and a roadmap to address the open researchchallenges.

Index Termsโ€”Edge IoT, wireless AI, Distributed learning, Dis-tributed Ledger Technology, Autonomous IoT, Trustworthiness.

I. INTRODUCTION

A. Towards the edge

During the last decade, the need for connecting billions ofInternet of Things (IoT) devices has driven a significant partof the design of computing and communication networks. Thenumber of use cases is countless, ranging from smart home tosmart city, industrial automation or smart farming. Many ofthe applications involve huge amounts of data, and the needfor fast, trustworthy and reliable processing of this data isoftentimes infeasible with a cloud-centric paradigm [1], [2].Moreover, typical hierarchical setups of IoT cloud platformshinder use cases with dynamically changing context due tolacking self-awareness of the individual subsystems and theoverall system they usher. Alternatively, the architectures areevolving towards edge solutions that place compute, network-ing, and storage in close proximity to the devices. At the sametime, the introduction of machine-driven intelligence has led tothe term edge intelligence, referring to the design of distributedIoT systems with latency-sensitive learning capabilities [3].

Beatriz Soret, Lam D. Nguyen, and Petar Popovski are with the Connectiv-ity Section, Department of Electronic System, Aalborg University, Denmark.Contact: {bsa, ndl, petarp}@es.aau.dk.

Jan Seeger, Arne Brรถring, and Vivek Kulkarni are with Siemens AG, Mu-nich, Germany. Contact: [email protected], {arne.broering, vivekkulka-rni} @siemens.com.

Chaouki Ben Issaid, Sumudu Samarakoon, Anis El Gabli, and Mehdi Ben-nis are with Centre for Wireless Communications (CWC), University of Oulu,Finland. Contact: {Chaouki.BenIssaid, Sumudu.Samarakoon, Anis.Elgabli,mehdi.bennis} @oulu.fi

Although the edge-centric approach solves the fundamentallimitations in terms of latency and dynamism, it also inducesnew challenges to the edge system: (1) the system has to dealwith complex IoT applications which include functions forsensing, acting, reasoning and control, to be collaborativelyrun in heterogeneous devices, such as edge computers andresource-constrained devices, and generating data from a hugenumber of data sources; (2) trustworthiness is a big concernfor edge and IoT systems where devices communicate withother devices belonging to potentially many different parties,without any pre-established trust relationship among them; (3)all those functionalities are increasingly based on a resource-limited wireless infrastructure that introduces latency andpacket losses in dynamically changing channels.

Another huge concern for the exponential growth of IoTis its scalability and contribution to the carbon footprint. Onthe one hand, IoT is key in deploying a huge amount ofapplications that will reduce the emissions of numerous sectorsand industries (e.g., smart farming or energy) [4]. On the otherhand, although many of these devices are low-power, the totalenergy consumption of the infrastructure that support suchsystems does have a contribution to the digital carbon footprintand cannot be overlooked [5], [6].

B. Intelligent IoT environments

We coin the term Intelligent IoT Environment (iIoTe) to referto autonomous IoT applications endowed with intelligencebased on an efficient and reliable IoT/edge- (computation)and network- (communication) infrastructure that dynamicallyadapts to changes in the environment and with built-in andassured trust. Besides the wireless (and wired) networkingto interconnect all IoT devices and infrastructure, there areother three key (and power-hungry) technologies that enableiIoTe. The first one is Machine Learning (ML) and ArtificialIntelligence (AI), and therefore we talk about intelligent IoTenvironments, comprising heterogeneous devices that can col-laboratively execute autonomous IoT applications. Given thedistributed nature of the system, distributed ML/AI solutionsare better suited for multi-node (multi-agent) learning. Edgecomputing is another defining technology that provides thecomputation side of the infrastructure and allocates computingresources for complex IoT applications that need to be dis-tributed over multiple, connected IoT devices (e.g., machinesand Automated Guided Vehicle (AGV)s). The third pillar is theDistributed Ledger Technology (DLT): rather than traditionalsecurity mechanisms, DLT has been identified as the most

arX

iv:2

110.

0168

6v2

[cs

.DC

] 2

4 D

ec 2

021

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 2

flexible solution for trustworthiness in a fully decentralizedand heterogeneous scenario. Combined with smart contracts,it is possible for the system to autonomously control the trans-actions from parties without the need for human intervention.All these ingredients are necessary for a fully functional iIoTe,but they have inevitably a significant contribution to the totalenergy footprint. Our goal is to understand the role of eachtechnology in the performance and energy consumption of aniIoTe.

C. Example: A manufacturing plantA representative use case for iIoTe is a manufacturing plant

like shown in Fig. 1, with autonomous collaboration betweenindustrial robot arms, machinery and AGVs. This relies onreal-time data analysis and adaptability and intelligence inthe manufacturing process, which is only feasible with theedge paradigm. The wireless infrastructure interconnects allthe machines and robots to the edge network and enablesreliable and safe operation. In the figure, the following scene isdepicted: a customer (the end-user) of a shared manufacturingplant orders a product by specifying a manufacturing goal(step 1). In step (2), the needed machine orchestration andassociated process plan is determined to manufacture thedesired product taking into account the available computa-tion and communication resources. The event-based processplanner at the edge node is responsible for observing themanufacturing process and reacting when the health state ofa concerned machine changes. For example, by re-schedulinga given task in a non-responding machine. In step (3), themanufacturing process data is sent to the involved machines,which can include, e.g., mobile robots or an AGV to transportthe work-pieces between production points, robotic arms, laserengravers, assembly stations, etc. Let us assume that the taskrequires a robot to pick up a work-piece and place it indifferent machines for its processing. As these machines maybe operated by the plant owner or a third-party operator, con-tractual arrangements need to be set up, for which a distributedledger is used. The ledger registers the details of each task forfuture accountability. In step (4), the local AI on board of thedifferent end devices comes into play. For example, in the caseof the robot as an end device, its AI decides how to pick upa work-piece and place it in the next machine. In case thelocal AI of the robot cannot complete its task (e.g., becauseit has not been trained for a similar situation yet), a humantakes over remote control (this can be e.g. a plant operator).After the human intervention, the local AI can be re-trainedbased on the data captured from the human input. This scenecaptures the role and interaction of the three technologiesmentioned above: edge computing, ML/AI and DLTs/smartcontracts. Similar examples can be defined in other domains,such as agriculture (e.g., autonomously interacting harvestingmachines), healthcare (e.g., remote patient monitoring andinterventions) and energy (e.g., wind plant monitoring andmaintenance).

D. Contributions and outlineIn this paper, we analyze the key technologies for the next

generation of IoT systems, and the tradeoffs between perfor-

end-device end-device end-device end-device

LocalUpdates

1

GlobalUpdates

2

3

4 4 4 4

5

Users

Plant Operator

Plant Edge

Internet

Fig. 1: iIoTe in a manufacturing plant.

mance and energy consumption. We notice that characterizingthe energy efficiency of these complex systems is a dauntingtask. The conventional approach has been to characterize everysingle device or link. Nevertheless, the energy expenditure ofan IoT device will strongly depend on the context in which itis put, in terms of, e.g., goal of the communication or trafficbehaviour. Therefore, we go beyond the conventional single-device approach and use the iIoTe as the basic building blockin the energy budget. Contrary to the single device, the iIoTeis able to capture the complex interactions among devices foreach of the technologies. The total energy footprint is notjust a simple sum of an average per-link or per-transactionconsumption of an isolated device, and scaling the number ofiIoTe to a large number of instances will give a more accuratepicture of the overall energy consumption.

The rest of the paper is organized as follows. In Section IIwe provide the state-of-the-art of the enabling technologies.Section III analyzes the performance and energy consumptionof each enabling technology, and Section IV provides thevision for integrating the enabling technologies in energy-efficient iIoTe. Concluding remarks and a roadmap to addressthe open research challenges are given in Section V.

II. BACKGROUND AND RELATED WORK

A. Edge wireless communications

Edge computing enables the processing of the receiveddata closer to the sensor that generated them. This means afull re-design of the communication infrastructure that mustimplement additional functionality at the cellular base stationsor other edge nodes. The design and performance of communi-cation networks for edge computing has been widely studiedin the last years, and an overview can be found in [7] and[8]. One example is the term Mobile Edge Computing (MEC),adopted in 5G to refer to the deployment of cloud servers in thebase stations to enable low latency, proximity, high bandwidth,real time radio network information and location awareness.Specifically, the concept was defined in late 2014 by theEuropean Telecommunications Standards Institute (ETSI): Asa complement of the C-RAN architecture, MEC aims to unitethe telecommunication and IT cloud services to provide the

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 3

cloud-computing capabilities within radio access networksin the close vicinity of mobile users [9]. One of the areasof more research has been the network virtualization andslicing with the MEC paradigm [10]. In the Radio AccessNetwork, several authors have looked at the potential of edgecomputing to support Ultra-Reliable Low-Latency Communi-cation (URLLC) [11]โ€“[13]. Another research area is the useof machine learning, particularly deep learning techniques, tounleash the full potential of IoT edge computing and enablea wider range of application scenarios [14], [15]. However,most previous works address the communications separately.Even though several papers address the joint communicationand computation resource management [16], they representonly the first step towards a holistic design of iIoTe andits defining technologies, as well as the integration with thecommunication infrastructure.

To optimize the energy efficiency of iIoTe, it is interestingto choose a communication technology that ensures low powerconsumption and massive connections of devices. In thisregard, 3GPP introduced narrowband Internet of Things (NB-IoT), a cellular technology to utilize limited licensed spectrumof existing mobile networks to handle a limited amount of bi-directional IoT traffic. Although it uses LTE bands or guard-bands, it is usually classified as a 5G technology. It can achieveup to 250 kbps peak data rate over 180 kHz bandwidth on aLTE band or guard-band [17] [18].

Compared to other low-power technologies, NB-IoT isinteresting for IoT applications with more frequent commu-nications. This is the case for the ones considered in iIoTe,where the intelligent end devices share the updated modelsfrequently and must record new transactions in the ledger. Atthe same time, NB-IoT keeps the advantages of Low-PowerWide Area (LPWA) technologies: low power consumption andsimplicity. Throughout the rest of the paper, we use NB-IoTas a representative wireless technology for our analyses ofiIoTe. Other wireless technologies will follow similar accessprocedures and energy-performance trade-offs.

For an analysis of the energy consumption and batterylifetime of NB-IoT under different configurations we refer thereader to [19]. A key point for this analysis is the study of thecommunication exchange during the access procedure: Thedevices that attempt to communicate through a base stationmust first complete a Random Access (RA) procedure totransit from Radio Resource Control (RRC) idle mode toRRC connected mode. Only in RRC connected mode datacan be transmitted in the uplink through the Physical UplinkShared Channel (PUSCH) or in the downlink through thePhysical Downlink Shared Channel (PDSCH). The standard3GPP RA procedure consists of four message exchanges:preamble (Msg1), uplink grant (Msg2), connection request(Msg3), and contention resolution (Msg4) (see Figure 2 wherethe example of recording some data, e.g., a DLT transactionis depicted). Out of these, Msg3 and Msg4 are scheduledtransmissions where no contention takes place.

The NB-IoT preamble are orthogonal resources transmit-ted in the Narrowband Physical Random Access Channel(PRACH) (NPRACH) and used to perform the RA request(Msg1). A preamble is defined by a unique single-tone and

eNB-LedgerDevices

Sync

Random

Access

Sync msg

Preamble

Data Transm

ission

ResponseRRC req

Contention

Record Data

Confirmation

VerificationUplink Downlink

Fig. 2: Random Access procedure in NB-IoT

pseudo-random hopping sequence. The NPRACH is scheduledto occur periodically in specific subframes; these are reservedfor the RA requests and are commonly known as RandomAccess Opportunitys (RAOs). To initiate the RA procedure,the devices select the initial subcarrier randomly, generate thehopping sequence, and transmit it at the next available RAO.The orthogonality of preambles implies that multiple devicescan access the base station in the same RAO if they selectdifferent preambles. Next, the grants are transmitted to thedevices through the Narrowband Physical Downlink ControlChannel (PDCCH) (NPDCCH) within a predefined periodknown as the RA response window. However, the numberof preambles is finite and collisions can happen. In case ofcollision, each collided device may retransmit a preamble aftera randomly selected backoff time.

The specification provides sufficient flexibility in the config-uration of the RA process, which makes it feasible to adjust theprotocol and find the right balance between reliability, latency,and energy consumption for a given application. Specifically,the network configures the preamble format and the maximumnumber of preamble transmission depending on the cell size,and this has an impact on the preamble and the total dura-tion [20]. Increasing the number of preamble transmissionsreduces the erasure probability, but at the cost of higher energyconsumption and larger latency. The same energy-reliability-latency tradeoff applies to other messages, including the RAresponse. Moreover, scheduling the NPRACH and NPDCCHconsumes resources that would otherwise be used for datatransmission. Therefore, each implementation must find anadequate balance between the amount of resources dedicated

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 4

to NPRACH, NPDCCH, PUSCH, and PDSCH1.

B. Distributed Learning over Wireless Networks

Implementing intelligent IoT systems with distributedML/AI over wireless networks (e.g., NB-IoT) needs to con-sider the impact of the communication network (latency andreliability under communication overhead and channel dynam-ics) and on-device constraints (access to data, energy, memory,compute, and privacy, etc.). Obtaining high-quality trainedmodels without sharing raw data is of utmost importance, andredounds to the trustworthiness of the system. In this view,Federated Learning (FL) has received a groundswell interestin both academia and industry, whose underlying principle isto train a ML model by exchanging model parameters (e.g.,Neural Network (NN) weights and/or gradients) among edgedevices under the orchestration of a federation server andwithout revealing raw data [21]. Therein, devices periodicallyupload their model parameters after their local training to aparameter server, which in return does model averaging andbroadcasting the resultant global model to all devices. FL hasbeen proposed by Google for its predictive keyboards [22] andlater on adopted in different use cases in the areas of intelligenttransportation, healthcare and industrial automation, and manyothers [23], [24]. While FL is designed for training overhomogeneous agents with a common objective, recent studieshave extended the focus towards personalization (i.e., multi-task learning) [25], training over dynamic topologies [26] androbustness guarantees [27], [28]. In terms of improving dataprivacy against malicious attackers, various privacy-preservingmethods including injecting fine-tuned noise into model pa-rameters via a differential privacy mechanism [29]โ€“[32] andmixing model parameters over the air via analog transmissions[33], [34] have been recently investigated. Despite of theadvancements in FL design, one main drawback in the designof FL is that its communication overhead is proportional tothe number of model parameters calling for the design ofcommunication-efficient FL. In an edge setup with limitedresources in communication and computation, this introducestraining stragglers degrading the overall training performance.In this view, client scheduling [35]โ€“[37] and computationoffloading [38]โ€“[40] with the focus on guaranteeing targettraining/inference accuracy have been identified as a promisingresearch direction.

With client scheduling, the number of communication linksare reduced (known as link sparcification) and thus, the com-munication bandwidth and energy consumption of distributedlearning can be significantly decreased. Additional temporallink sparsity can be introduced by enforcing model sharingpolicies that account model changes and/or importance withinconsecutive training iterations such as the Lazy AggregatedGradient Descent (LAG) method [41]. Sparsity can be furtherexploited by adopting sparse network topologies, which relyon communications within a limited neighborhood in the

1It is worth mentioning that 5G has not defined a RA procedure yet but itis expected that, when this happens, it will be heavily based on the describedprocedure for LTE and the energy consumption/latency tradeoff will followsimilar principles.

absence of a central coordinator/helper. While such sparsi-fication improves energy and communication efficiencies, itcould yield higher learning convergence speed as well as lowertraining and inference accuracy, in which sparsity needs to beoptimized in terms of the trade-off between communicationcost and convergence speed. In this view, several sparse-topology-based distributed learning methods including decen-tralized Gradient Descent (GD), dual averaging [42], learningover graphs [43], [44] and GADMM algorithms [45], [46]have been investigated.

C. Optimizing IoT Application Deployments in IoT Environ-ments

IoT applications typically consist of multiple components.For instance, an IoT application could comprise componentsfor secure data acquisition (e.g., based on Blockchain), datapre-processing, feeding the data into a neural network (or eventhrough multiple ones) before it acts upon the outcome ofthe ML inference, etc. In many cases, such composed IoTapplications need to be distributed over multiple, connectedintelligent IoT devices. An important aspect is then to optimizethis allocation of application components to devices. The resultof the allocation is an assignment of components to devices,that fulfills the constraints, and optimizes the performance ofthe system in some metric. This metric could, for example,maximize the responsiveness of the application or minimizethe overall energy consumption, where the latter is reasonablein battery-run wireless systems. An overview of existingallocation approaches is given in [47].

Previous work [48] used Constraint Programming to de-scribe an approach for the efficient distribution of actors to IoTdevices. The approach resembles the Quadratic AssignmentProblem (QAP) and is NP-hard, resulting in long computationtimes when scaling up. Samie et al. [49] present another Con-straint Programming-based approach that takes into accountthe bandwidth limitations and minimizing energy consumptionof IoT nodes. The system optimizes computation offloadingfrom an IoT node to a gateway, however, it does not considercomposed computations that can be distributed to multipledevices.

A Game Theory-based approach is presented in [50] thataims at the joint optimization of radio and computationalresources of mobile devices. However, the system local op-timum for multiple users only aims at deciding whether tofully offload a computation or to fully process it on device.

Based on Non-linear Integer Programming, Sahni et al. [51]present their Edge Mesh algorithm for task allocation thatoptimizes overall energy consumption and considers datadistribution, task dependency, embedded device constraints,and device heterogeneity. However, only basic evaluationand experimentation are done, without performance compar-ison. Based on Integer Linear Programming (ILP), Mohan& Kangasharju [52] propose a task assignment solver thatfirst minimizes the processing cost and secondly optimizesthe network cost, which stems from the assumption thatEdge resources may not be highly processing-capable. Anintermediary step reduces the sub-problem space by combining

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 5

tasks and jobs with the same associated costs. This reduces theoverall processing costs.

Cardellini et al. [53] describe a comprehensive ILP-basedframework for optimally placing operators of distributedstream processing applications, while being flexible enough tobe adjusted to other application contexts. Different optimiza-tion goals are considered, e.g., application response time andavailability. They propose their solution as a unified generalformulation of the optimal placement problem and provide anappropriate theoretical foundation. The framework is flexibleso that it can be extended by adding further constraints orshifted to other optimization targets. Finally, our previous work[54] has leveraged Cardelliniโ€™s framework and has extended itby incorporating further constraints for the optimization goal,namely the overall energy usage of the application.

D. Distributed Ledger Technologies over Wireless Networks

In recent years, DLT has been the focus of large researchefforts spanning several application domains. Starting with theadoption of Bitcoin and Blockchain, DLT has received a lotof attention in the realm of IoT, as the technology promisesto help address some of the IoT security and scalabilitychallenges [55]. For instance, in IoT deployments, the recordeddata are either centralized or spread out across different het-erogeneous parties. These data can be both public or private,which makes it difficult to validate their origin and consistency.In addition, querying and performing operations on the databecomes a challenge due to the incompatibility between differ-ent Application Programming Interfaces (APIs). For instance,Non-Governmental Organizations (NGOs), Public and Privatesectors, and industrial companies may use different data typesand databases, which leads to difficulties when sharing thedata [56]. A DLT system offers a tamper-proof ledger thatis distributed on a collection of communicating nodes, allsharing the same initial block of information, the genesis block[57]. In order to publish data to the ledger, a node includesdata formatted in transactions in a block with a pointer to itsprevious block, which creates a chain of blocks, the so calledBlockchain.

A smart contract [58] is a distributed app that lives in theBlockchain. This app is, in essence, a programming languageclass with fields and methods, and they are executed in atransparent manner on all nodes participating in a Blockchain[59]. Smart contracts are the main blockchain-powered mech-anism that is likely to gain a wide acceptance in IoT, wherethey can encode transaction logic and policies, which includesthe requirements and obligations of parties requesting access,the IoT resource/service provider, as well as data tradingover wireless IoT networks [60]. With the aforementionedcharacteristics, the advantages of the integration of DLTs intowireless IoT networks consist of: i) guarantee of immutabilityand transparency for recorded IoT data; ii) removal of theneed for third parties; iii) development of a transparent systemfor heterogeneous IoT networks to prevent tampering andinjection of fake data from the stakeholders.

DLTs have been applied in various IoT areas such as health-care [61], [62], supply chain [63], smart manufacturing [64],

and vehicular networks [65]. In the smart manufacturing area,the work described in [64] investigates DLT-based securityand trust mechanisms and elaborates a particular applicationof DLTs for quality assurance, which is one of the strategicpriorities of smart manufacturing. Data generated in a smartmanufacturing process can be leveraged to retrieve materialprovenance, facilitate equipment management, increase trans-action efficiency, and create a flexible pricing mechanism.

One of the challenges of implementing DLT in IoT andedge computing is the limited computation and communicationcapabilities of some of the nodes. In this regard, the authors in[60], [66] worked on the communication aspects of integratingDLTs with IoT systems. The authors studied the trade-offbetween the wireless communication and the trustworthinesswith two wireless technologies, LoRa and NB-IoT.

III. ENABLING TECHNOLOGIES FOR IIOTE

This section elaborates on the three enabling technologiesfor iIoTe: distributed learning, distributed computing, anddistributed ledgers.

A. Energy-efficient Distributed Learning over Wireless Net-works

As shown in Figure 1, each end device in the iIoTe haslocal AI and the whole system relies on FL. We presentlearning frameworks that are suitable for iIoTe leveragingtwo techniques: (1) spatial and temporal sparsity; and (2)quantization.

1) Dynamic GADMM: Standard FL requires a central en-tity, which plays the role of a parameter server (PS). At everyiteration, all nodes need to communicate with the PS, whichmay not be an energy-efficient solution especially for a largedistributed network of agents/workers, as in the manufacturinguse case. Furthermore, a PS-based approach is vulnerable to asingle point of attack or failure. To overcome this problem andensure a more energy-efficient solution, we propose a variantof the standard Alternative Direction Method of Multipliers(ADMM) [67] method that decomposes the problem into a setof subproblems that are solved in parallel, referred to as GroupADMM (GADMM) [45]. GADMM extends the standardADMM to decentralized topology and enables communicationand energy-efficient distributed learning by leveraging spatialsparsity, i.e. enforcing each worker to communicate with atmost two neighbouring workers. In GADMM, the standardlearning problem (P1) is re-formulated as the following learn-ing problem (P2):

(P1) min{๐œฝ๐‘› }๐‘๐‘›=1

๐‘โˆ‘๐‘›=1

๐‘“๐‘› (๐œฝ๐‘›) (1)

(P2) min{๐œฝ๐‘› }๐‘๐‘›=1

๐‘โˆ‘๐‘›=1

๐‘“๐‘› (๐œฝ๐‘›)

s.t. ๐œฝ๐‘› = ๐œฝ๐‘›+1, for ๐‘› = 1, ยท ยท ยท , ๐‘ โˆ’ 1.(2)

To this end, GADMM divides the set of workers into twogroups head and tail. Thanks to the equality constraint of(P2), each worker from the head/tail group exchanges modelwith only two workers from the tail/head group forming a

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 6

chain topology. At iteration ๐‘˜ + 1, giving the models of thetail workers and the dual variables at iteration ๐‘˜ , all headworkers update their models in parallel since they have nojoint constraints. Once the head workers update their models,they transmit their updated model to their neighbours from thetail group. Then, following the same way, every tail workerupdates its model. Finally, the dual variables are updatedlocally at each worker. Following this alternation, GADMMallows at most ๐‘/2 workers to compete over the availablebandwidth compared to ๐‘ workers for the PS-based approach.With that, GADMM can significantly increase the bandwidthavailable to each worker, which reduces the energy wasted incompetition for communication resources. The energy expen-diture for communication is further reduced by including onlytwo neighbouring workers. The detailed algorithm is describedin [45].

One drawback of GADMM is attributed to its slow conver-gence compared to standard ADMM. In other words, due tothe sparsification of the graph, workers require more iterationsfor the convergence. To alleviate this issue and combine thefast convergence of standard ADMM with the communication-efficiency of GADMM, we have proposed Dynamic GADMM(D-GADMM) [45]. Not only D-GADMM improves the con-vergence speed of GADMM, but it also copes with dynamic(time-variant) networks, in which the workers are moving(e.g., the AGVs in the manufacturing plant or the tractorsin the agriculture use case), while inheriting the theoreticalconvergence guarantees of GADMM. In a nutshell, everycouple of iterations in D-GADMM, i.e. system coherence time,two things are changing: (i) workers assignment to head/tailgroup, which follows a predefined assignment mechanism and(ii) neighbours of each worker from the other group. The ideaat high level as is follows: the workers are given fixed IDs,and they share a pseudo-random code that is used every ๐œ

seconds, where ๐œ is the system coherence time to generate aset of random integers with cardinality ๐‘/2 โˆ’ 2. If ๐‘› belongsto the set, then worker ๐‘› is a head worker for this period.The assumption is that workers 1 and ๐‘ do not change theirassignment. i.e., worker 1 is always a head and worker ๐‘ isalways a tail. Head workers broadcast their IDs alongside apilot signal, then tail workers compute their communicationcost to all head workers, and share the cost vector withthe neighboring heads. If a tail does not receive a signalfrom a certain head, the cost to that head is โˆž, the sameapplies to heads. Subsequently, every head locally computesthe communication-efficient chain using a predefined heuristicand share it with its neighboring tails. This approach requirestwo communication rounds and guarantees that every headwill compute the same chain. Once the chain information iscalculated, each worker will share its right dual variable withits right neighbor to be used by both workers and GADMMcontinues for ๐œ seconds. It is worth mentioning that we could,e.g., start with a chain 1 โˆ’ 2 โˆ’ 3 โˆ’ ยท ยท ยท โˆ’ ๐‘ and move to1 โˆ’ 5 โˆ’ 7 โˆ’ 4 โˆ’ ยท ยท ยท โˆ’ ๐‘ , so only nodes 1 and ๐‘ preservetheir assignments. For further details, the reader is referredto [45] where a comprehensive explanation of the steps ofD-GADMM can be found.

In Fig. 3, we plot the objective error in terms of the number

0 500 2500 30001000 1500 2000Number of iterations

(a)

10-4

10-2

100

102

Lo

ss

ADMMGADMMD-GADMM, refresh rate =1D-GADMM, refresh rate =10D-GADMM, refresh rate =50

0 2 8 104 6Sum energy

(b)1010

10-4

10-2

100

102

Lo

ss

ADMMGADMMD-GADMM, refresh rate =1D-GADMM, refresh rate =10D-GADMM, refresh rate =50

Fig. 3: D-GADMM: loss as a function of (a) number ofiterations and (b) total energy consumption.

of iterations (left) and in terms of sum energy (right) forD-GADMM as well as GADMM and standard ADMM. Aswe can see from Fig. 3, D-GADMM greatly increases theconvergence speed of GADMM and thus decreases the overallcommunication cost for fixed topology. As a consequence, D-GADMM achieves convergence speed comparable to the PS-based ADMM while maintaining GADMMโ€™s low communi-cation cost per iteration.

2) Censored Quantized Generalized GADMM: As pointedout earlier, each worker, in the GADMM framework, ex-changes its model with up to two neighbouring workers only,which slows down convergence. To reduce the communicationoverhead while generalizing to more generic network topolo-gies, we propose the Generalized GADMM (GGADMM) [46].Under this generalized framework, the workers are still dividedinto two groups: head and tail, with possibly different sizes. Inother words, the topology is generalized from a chain topologyto any bipartite graph where the number of neighbours, thateach worker can communicate with can be any arbitrarynumber and not necessarily limited to two. By leveragingthe censoring idea, i.e. temporal sparsity, we introduce theCensored GGADMM (C-GGADMM) where each worker ex-changes its model only if the difference between its currentand previous models is greater than a certain threshold. Tomake the algorithm more communication-efficient, censoringis applied on the quantized version of the workerโ€™s modelinstead of the model itself to get the Censored QuantizedGGADMM (CQ-GGADMM) [46], [68]. CQ-GGADMM cansignificantly reduce the communication overhead, particularly

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 7

0 200 400 600 800 1000 1200 1400Number of iterations

(a)

10-8

10-6

10-4

10-2

100

Lo

ss

C-ADMMGGADMMC-GGADMMCQ-GGADMM

0 500 1000 1500 2000 2500 3000Sum energy

(b)

10-8

10-6

10-4

10-2

100

Lo

ss

C-ADMMGGADMMC-GGADMMCQ-GGADMM

Fig. 4: CQ-GGADMM: loss as a function of (a) number ofiterations and (b) total energy consumption.

for large model size ๐‘‘, since its payload size is (๐‘๐‘‘ + 32) bitscompared to the payload size of 32๐‘‘ bits for the full precisionGGADMM. Since according to the Shannonโ€™s capacity theo-rem, more bits consume more transmission energy for the samebandwidth, transmission duration, and noise spectral density,the communication energy of CQ-GGADMM, compared to theoriginal GADMM, is significantly reduced. Theoretically, CQ-GGADMM inherits the same performance and convergenceguarantees of vanilla GGADMM, provided that the censoringthreshold sequence is non-increasing and non-negative.

Fig. 4 compares CQ-GGADMM with Censored ADMM(C-ADMM), GGADMM, as well as C-GGADMM in termsof the loss versus the number of iterations (left) and versusthe total sum energy (right) for a system of 18 workers on alinear regression task using the Body Fat dataset [69]. We canobserve, from Fig. 4, that CQ-GGADMM exhibits the low-est total communication energy, followed by C-GGADMM,then GGADMM and finally C-ADMM, while having similarconvergence speed to GGADMM. This observation validatesthe benefits of censoring the quantized version of the modelsbefore sharing, which makes the proposed algorithm (CQ-GGADMM) more communication and energy efficient.

Finally, it is worth mentioning that motivated by the factthat, in FL, the parameter server is interested in the aggregatedoutput of all workers rather than the individual output ofeach worker, analog over the air aggregation schemes suchas [34], [70]โ€“[72] were proposed. Such schemes were shownto achieve high scalability and significant savings in energyconsumption owing to their ability to allow non-orthogonal

access to the bandwidth.

B. Optimizing Energy Consumption of Wireless IoT Environ-ments

The next pillar in iIoTe is edge computing. Specifically, weconsider the problem of allocating the application componentsto the available end devices. As first presented in [54], we ex-tend the Integer Linear Programming (ILP) based frameworkdefined by Cardellini et al. [53] (Section II-C). In [54] thegoal was to minimize the overall energy consumption neededfor executing an IoT application. The formulated ILP model isdescribed below. The optimality can be determined with thisby feeding it into a solver, such as IBM CPLEX2.

We define optimality of the allocation by total energy useover one execution of an IoT application. Energy during theapplicationโ€™s execution is consumed in two phases: (1) deviceenergy, consumed by a device when executing a component;(2) and edge network energy, consumed by the device whensending the result of the calculation over the network. Notethat โ€œoptimalโ€ in this case only describes optimality in theinteger model. Given the constraints and the model, we find theoptimal assignment, i.e. the one with minimal energy usage.

The optimal network configuration is the assignment ofapplication components to devices that result in the lowesttotal consumption of energy and satisfies the constraints. Theconstraints concern the requirements that an assignment mustsatisfy: Each component should only be allocated once andresource requirements for assigned components should notexceed the resources of the node. This problem is a form ofthe quadratic assignment problem, and thus is NP-hard.

1) System model: The application consists of a set ofcomponents and edges that interconnect them, modeled asa weighted undirected graph Gapp =

(Vapp, Eapp

). Graph

Gapp is multi-partite, with vertex set Vapp containing theapplication components, |Vapp | = ๐‘ , and edge set Eapp โŠ‚{๐‘ก1๐‘ก2 : ๐‘ก๐‘– โˆˆ Vapp, ๐‘– = 1, 2

}representing the logical connections

between components ๐‘ก๐‘– .Analogously, the network infrastructure where the com-

ponents can be evaluated is modeled with the multi-partitegraph Gnet = (Vnet, Enet) with vertex set Vnet containing thecommunicating nodes, with cardinality |Vnet | = ๐‘€ , and edgeset Enet โŠ‚ {๐‘ก1๐‘ก2 : ๐‘ก๐‘– โˆˆ Vnet, ๐‘› = 1, 2} representing the wirelessand wired links among nodes ๐‘›๐‘– . The result of the allocationis a matrix ๐‘‹ = Vapp ร— Vnet where ๐‘‹ [๐‘ก, ๐‘›] = 1 if and onlyif component ๐‘ก is allocated to node ๐‘›. We also define ๐ธ๐‘‘ tobe the device energy and ๐ธ๐‘› the network energy. ๐ธ๐‘ก is thenthe total energy, and we put the constraint ๐ธ๐‘‘ + ๐ธ๐‘› โ‰ค ๐ธ๐‘ก .Components, nodes and links have properties that are relevantfor the energy consumption of the application once allocated.These parameters are described in Table I. ๐‘†๐‘ก , ๐‘ƒ๐‘›, ๐‘…๐‘› and ๐ถ๐‘›

are defined as multiples of some reference node. The resourcesof a node are expressed as a single scalar, but additionalresource requirements can easily be introduced into the model.

2) Problem formulation: For calculating the network en-ergy, we need to know whether a link between two componentsis assigned to a link between two nodes. For this, we introduce

2https://www.ibm.com/analytics/cplex-optimizer

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 8

TABLE I: Parameters of energy-aware allocation algorithm.

Symbol Description

๐‘…๐‘ก Resources required for the evaluation of component ๐‘ก โˆˆ Vapp.๐‘‚๐‘ก Output of component ๐‘ก โˆˆ Vapp for a single received input.๐‘†๐‘ก Computation time required for completing component ๐‘ก โˆˆ Vapp once.๐‘ƒ๐‘› Processing power of node ๐‘› โˆˆ Vnet.๐‘…๐‘› Resources available on node ๐‘› โˆˆ Vnet.๐ถ๐‘› Energy consumption of node ๐‘› โˆˆ Vnet for one unit of computation.๐‘‡๐‘™ Energy use for the transfer of one data packet over link ๐‘™ โˆˆ ๐ธnet.๐ท (๐‘›1 ,๐‘›2) Energy cost of the shortest path between ๐‘›1 and ๐‘›2.

a matrix ๐‘Œ = Vappร—Vappร—Vnetร—Vnet, where ๐‘Œ [๐‘ก1, ๐‘ก2, ๐‘›1, ๐‘›2] = 1if and only if the communication between component ๐‘ก1 andcomponent ๐‘ก2 is allocated on the network link between nodes๐‘›1 and ๐‘›2. This corresponds to ๐‘‹ [๐‘ก1, ๐‘›1] = 1 โˆง ๐‘‹ [๐‘ก2, ๐‘›2].Unfortunately, this is not a linear constraint, and thus weneed to linearize the formulation. For this, we follow theformulation presented in [53] and define an ILP model as:

โˆ€๐‘ก1, ๐‘ก2 โˆˆ Vapp : โˆ€๐‘›1, ๐‘›2 โˆˆ Vnet : ๐‘Œ [๐‘ก1, ๐‘ก2, ๐‘›1, ๐‘›2] โ‰ค ๐‘‹ [๐‘ก1, ๐‘›1](3)

โˆ€๐‘ก1, ๐‘ก2 โˆˆ Vapp : โˆ€๐‘›1, ๐‘›2 โˆˆ Vnet : ๐‘Œ [๐‘ก1, ๐‘ก2, ๐‘›1, ๐‘›2] โ‰ค ๐‘‹ [๐‘ก2, ๐‘›2](4)

โˆ€๐‘ก1, ๐‘ก2 โˆˆ Vapp : โˆ€๐‘›1, ๐‘›2 โˆˆ Vnet : ๐‘Œ [๐‘ก1, ๐‘ก2, ๐‘›1, ๐‘›2]โ‰ฅ ๐‘‹ [๐‘ก1, ๐‘›1] + ๐‘‹ [๐‘ก2, ๐‘›2] โˆ’ 1

(5)

โˆ€๐‘ก โˆˆ Vapp :โˆ‘

๐‘›โˆˆVnet

๐‘‹ [๐‘ก, ๐‘›] = 1 (6)

โˆ€๐‘› โˆˆ Vnet :โˆ‘

๐‘ก โˆˆVapp

๐‘‹ [๐‘ก, ๐‘›] ยท ๐‘…๐‘ก โ‰ค ๐‘…๐‘› (7)โˆ‘๐‘ก โˆˆVapp

โˆ‘๐‘›โˆˆVnet

๐ถ๐‘› ยท (๐‘†๐‘ก/๐‘ƒ๐‘›) ยท ๐‘‹ [๐‘ก, ๐‘›] โ‰ค ๐ธ๐‘‘ (8)โˆ‘(๐‘ก1 ,๐‘ก2) โˆˆEapp

โˆ‘๐‘›1 ,๐‘›2โˆˆVnet

๐‘‚๐‘›1 ยท ๐‘ƒ๐‘›1 ,๐‘›2 ยท ๐‘Œ [๐‘ก1, ๐‘ก2, ๐‘›1, ๐‘›2] โ‰ค ๐ธ๐‘› (9)

๐ธ๐‘› + ๐ธ๐‘‘ โ‰ค ๐ธ๐‘ก (10)

where equations (3) to (5) describe the linearization of thenetwork matrix ๐‘Œ . (6) and (7) are for ensuring that componentsare allocated only once and that resources are not exceeded,respectively. Equations (8) and (9) calculate network anddevice energy as described above. Finally, we calculate thetotal energy use of the assignment by adding both energies in(10). The objective of the optimization is the minimization ofthe total used energy.

3) A Linear Heuristic for Energy-Optimized Allocation:The presented QAP is NP-hard and thus compute intensive.The culprit for this is the network cost calculation and thelinearization of ๐‘Œ resulting in a large number of constraints.By removing the ๐‘Œ matrix and the associated constraints,we create a linear problem that can be evaluated effectivelyby the simplex method [73]. The approach approximatesthe energy required for sending a packet of data by taking

c0

c1

c2

c3

c4

start

end

c0

c1

c2

Fig. 5: โ€œLongโ€ (left) and โ€œwideโ€ (right) composed IoTapplications.

the average of a nodeโ€™s links. We introduce the parameter๐‘‡๐‘› = 1

|outgoing(๐‘›) |โˆ‘

๐‘’โˆˆoutgoing(๐‘›) ๐‘‡๐‘’ that describes the averagetransmission cost of a nodeโ€™s links.โˆ‘

๐‘ก โˆˆVapp

โˆ‘๐‘›โˆˆVnet

๐ถ๐‘› ยท (๐‘†๐‘ก/๐‘ƒ๐‘›) ยท ๐‘‹ [๐‘ก, ๐‘›] +๐‘‚๐‘ก ยท ๐‘‡๐‘› ยท ๐‘‹ [๐‘ก, ๐‘›] โ‰ค ๐ธ๐‘ก

(11)

The complete model reuses constraints in equations (6)and (7) with the constraint (11). By transforming the QAP intoa linear problem, we greatly increase the speed of finding asolution, and make the optimization feasible for on-line usage.The drawback is that by approximating the network energy thesolution is no longer optimal, as it will be shown in the results.

4) Evaluation of Allocation Algorithm: We implementedthe model using the PuLP3 linear programming library. Theevaluation was done by generating a random network and arandom application, and letting the solver find the optimalallocation.

The network configuration is generated with a variety ofnode configurations and capabilities, reflecting a heteroge-neous computation and communication infrastructure that onecould find in an industrial manufacturing plant (e.g., usingSiemens range of industrial computers [74]). In the evaluatedconfiguration, 60% of the nodes were generated as wirednodes, and the remaining 40% are wireless nodes. Nodes areconnected to each other with a certain probability. That prob-ability is 0.8 for wired-wired connections, 0.5 for wireless-wireless connections and 0.4 for wireless-wired connections.Wired connections use 0.2 units of energy, while wirelessconnections use 0.8 units of energy, which is similar to thepower consumption of an Ethernet module [75] as compared toa WiFi module [76]. Nodes have a varying amount of memory

3https://pythonhosted.org/PuLP/

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 9

6 8 10 12 14 16 18Nodes

0

10000

20000

30000

40000

50000tim

e (s

)

(a) CPU time of the optimal allocation algorithm vs. the numberof nodes. Each experiment with n nodes was measured 5 timeswith 3 to n-1 components.

2.5 5.0 7.5 10.0 12.5 15.0 17.5Tasks

050000

100000150000200000250000300000350000

time

(s)

(b) CPU time of the optimal allocation algorithm vs. thenumber of components. Each experiment with n componentswas measured 5 times with 5 to 20 nodes.

Fig. 6: Runtime for optimal allocation.

resources uniformly distributed between a lower bound of 1and an upper bound of 8 resource units. Nodes also have avarying processing speed between 1 and 3 speedup, roughlycomparing to the Intel processor family i3, i5, and i7. Finally,nodes can use from 0.5 to 1.5 units of energy for a single unitof computation.

For the application, two classes with a certain number ofcomponents are generated, a โ€œwideโ€ and a โ€œlongโ€ application.In a โ€œwideโ€ application, two components are designated theโ€œstartโ€ and โ€œendโ€ components, and every other componentneeds input from the start node and sends output to the endnode. In a long application, components are linked serially.Figure 5 shows two example applications. This method forgenerating recips is similar to [53]. Each application compo-nent has resource requirements randomly distributed between1 and 8, an output factor randomly distributed between 0.5and 1.5, and a computation size of 1 or 2.

As expected, the optimal allocation algorithm scales verybadly (non-polynomially). Figure 6 shows the runtime ofthe algorithm for varying problem sizes. The shaded areashows the variance with the non-shown parameter (differentapplication sizes for the network node graph, differing networksizes for the application node graph). The time needed for

6 8 10 12 14 16 18 20Nodes

0

1

2

3

4

5

6

time

(s)

(a) CPU time of the allocation heuristic vs. the number ofnodes. Each experiment with n nodes was measured 5 timeswith 3 to n-1 components.

4 6 8 10 12 14 16 18Tasks

0

2

4

6

8

time

(s)

(b) CPU time of the allocation heuristic vs. the number ofcomponents. Each experiment with n components was measured5 times with 5 to 20 nodes.

Fig. 7: Heuristic runtime.

finding the optimal allocation grows unwieldy very quickly.In comparison, the heuristic presented in equation (11) finds

a solution much more quickly. Figure 7 shows the runtimeof the heuristic for different network and application sizes.For the slowest case for the full allocation, the heuristictakes 8 seconds of CPU time, while the solver consumes864104 seconds (about 10 days) of CPU time for findingthe optimal allocation. The allocation evaluation was executedon an Amazon EC2 m4.10xlarge machine with 40 virtualcores and 160 GiB of memory. Peak memory use was 51 GiB.However, the heuristic loses about 30% of energy efficiencyover the optimal algorithm. Specifically, 50% of the solutionsachieve between 60% and 80% of the energy efficiency of theoptimal case.

C. Energy-efficient Blockchain over Wireless Networks

The last enabling technology is DLT, which provides atamper-proof ledger distributed for the nodes of the iIoTe.The energy and latency cost of implementing DLT overwireless links and with constrained IoT devices is oftentimesoverlooked. In general, the latency and energy budgets arehighly impacted by the wireless access protocol.

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 10

1) System model: As introduced in [77], there are twoarchitectural choices for IoT DLT. The conventional one isto have IoT devices that receive complete blocks from theBlockchain to which they are connected, and locally verifythe validity of the Proof-of-Work (PoW) solution and the con-tained transactions. This configuration provides the maximumpossible level of security. However, this requires high storage,energy and computation resources, since the node needs tostore the complete Blockhain and to check all transactions.This makes it infeasible for many IoT applications. Instead,we consider the second option where the IoT device is a lightnode that receives only the headers from the Blockchain nodes.These headers contain sufficient information for the Proof-of-Inclusion (PoI), i.e., to prove the inclusion of a transactionin the block without the need to download the entire blockbody. Furthermore, the device defines a list of (few) events ofinterest, such as modifications to the state of a smart contractor transactions from/to a particular address.

The communication model for this lightweight version is asfollows. The IoT devices transmit data to the Blockchain usingthe edge infrastructure. Specifically, a NB-IoT cell with thebase station located in its center is considered, with ๐‘ devicesuniformly distributed within the area. The base station, whichis designated as a full DLT node connected to the Blockchain,is the DLT-anchor for the IoT devices. For the radio resourcemanagement, we adapt the queueing model of [19] to ourscenario, where the uplink and downlink radio resources aremodeled as two servers that visit and serve their respectiveinter-dependent traffic queues.

2) End-2-End (E2E) latency: NB-IoT provides three cov-erage classes namely normal, extreme, and robust class forserving limited-resource devices and suffering various pathlosslevels [78]. Minimum latency and throughput requirementsneed to be maintained in the extreme coverage class, whereasenhanced performance is ensured in the extended or normalcoverage class. Without loss of generality, we consider onlynormal and extreme coverage class, i.e., the number of classes๐ถ = 2. A class is assigned to a device based on the estimatedpath loss, with the base station informing the assigned deviceof the dedicated path between them. Class ๐‘— and โˆ€ ๐‘— aresupported by the replicas number ๐‘ ๐‘— , which are transmittedbased on data and the control packet [19]. Particularly, thereserved NPRACH period of class ๐‘— is denoted by ๐‘ ๐‘—๐œ. Theunit length ๐œ of the NPRACH for the class of coverage isdenoted by ๐‘ ๐‘— = 1. ๐‘ก ๐‘— is the average time interval betweentwo consecutive scheduling of NPRACH of class ๐‘— , whereasthe average time duration between two consecutive NPDCCHoccurrences is denoted by ๐‘‘.

The total E2E latency includes two parts: (1) the latency๐ฟ๐‘ˆ๐‘’๐ท of transmissions of uplink and downlink between IoTdevices and the base station (the wireless communicationlatency); (2) and the latency ๐ฟ๐ท๐ฟ๐‘‡ due to the DLT verificationprocess. I.e., ๐ฟ = ๐ฟ๐‘ˆ๐‘’๐ท + ๐ฟ๐ท๐ฟ๐‘‡ .

The wireless communication latency of NB-IoT uplink anddownlink can be formulated as:

๐ฟ๐‘ˆ๐‘’๐ท = ๐ฟ๐‘ข +๐ฟ๐‘‘ = ๐ฟ๐‘ข๐‘ ๐‘ฆ๐‘›๐‘ +๐ฟ๐‘ข๐‘Ÿ๐‘Ÿ +๐ฟ๐‘ข๐‘ก๐‘ฅ +๐ฟ๐‘‘๐‘ ๐‘ฆ๐‘›๐‘ +๐ฟ๐‘‘

๐‘Ÿ๐‘Ÿ +๐ฟ๐‘‘๐‘Ÿ ๐‘ฅ , (12)

where ๐ฟ๐‘ข๐‘ ๐‘ฆ๐‘›๐‘ , ๐ฟ๐‘ข๐‘Ÿ๐‘Ÿ , ๐ฟ๐‘ข๐‘ก๐‘ฅ , ๐ฟ๐‘‘๐‘ ๐‘ฆ๐‘›๐‘โ„Ž

,๐ฟ๐‘‘๐‘Ÿ๐‘Ÿ , and ๐ฟ๐‘‘

๐‘Ÿ ๐‘ฅ are energy

consumption of synchronization, resource reservation, and datatransmission of uplink and downlink, respectively. ๐ฟ๐‘ข๐‘ ๐‘ฆ๐‘›๐‘ hasbeen defined in [79] with the values of 0.33๐‘ . ๐ฟ๐‘Ÿ๐‘Ÿ is given as:

๐ฟ๐‘Ÿ๐‘Ÿ =

๐‘๐‘Ÿ๐‘š๐‘Ž๐‘ฅโˆ‘๐‘™=1

(1 โˆ’ ๐‘ƒ๐‘Ÿ๐‘Ÿ )๐‘™โˆ’1๐‘ƒ๐‘Ÿ๐‘Ÿ ๐‘™ (๐ฟ๐‘Ÿ๐‘Ž + ๐ฟ๐‘Ÿ๐‘Ž๐‘Ÿ ), (13)

in which, ๐‘๐‘Ÿ๐‘š๐‘Ž๐‘ฅ is the maximum number of attempts, ๐‘ƒ๐‘Ÿ๐‘Ÿ isthe probability of successful resource reservation in an attempt,๐ฟ๐‘Ÿ๐‘Ž = 0.5๐‘ก+๐œ, is the expected latency in sending an RA controlmessage, ๐œ is the unit length and equal to the NPRACH periodfor the coverage class 1 which is varied from 40 ms to 2.56 s[79], and ๐ฟ๐‘Ÿ๐‘Ž๐‘Ÿ = 0.5๐‘‘ + 0.5Q ๐‘“ ๐‘ข + ๐‘ข, is the expected latencyin receiving the RAR message, where Q are requests waitingto be served.

In the following, we provide a simple technique based ondrift approximation [80] to calculate ๐‘ƒ๐‘Ÿ๐‘Ÿ recursively. There-fore, we treat the mean of the random variables involved inthe process as constants. Besides, we assume that sufficientresources are available in the NPDCCH so that failures onlyoccur due to collisions in the NPRACH or to link outages.

Let _๐‘Ž = _๐‘ข + _๐‘‘ be the arrival rate of access requestsper NPRACH period and _๐‘Ž (๐‘™) be the mean number ofdevices participating in the contention with their ๐‘™-th attempt.Note that in the steady state _๐‘Ž (๐‘™) remains constant forall NPRACH periods. Next, let _๐‘Ž๐‘ก๐‘œ๐‘ก =

โˆ‘๐‘๐‘Ÿ๐‘š๐‘Ž๐‘ฅ๐‘™=1 _๐‘Ž (๐‘™). The

collision probability in the NPRACH can be calculated usingthe drift approximation for a given value of _๐‘Ž๐‘ก๐‘œ๐‘ก and for agiven number of available preambles ๐พ as:

๐‘ƒcollision (_๐‘Ž๐‘ก๐‘œ๐‘ก ) = 1 โˆ’(1 โˆ’ 1

๐พ

)_๐‘Ž๐‘ก๐‘œ๐‘กโˆ’1โ‰ˆ 1 โˆ’ ๐‘’โˆ’

_๐‘Ž๐‘ก๐‘œ๐‘ก๐พ . (14)

From there, we approximate the probability of resource reser-vation as a function of _๐‘Ž๐‘ก๐‘œ๐‘ก as ๐‘ƒ๐‘Ÿ๐‘Ÿ (_๐‘Ž๐‘ก๐‘œ๐‘ก ) โ‰ˆ ๐‘๐‘‘ ๐‘’

โˆ’ _๐‘Ž๐‘ก๐‘œ๐‘ก๐พ . This

allows us to define _๐‘Ž๐‘ก๐‘œ๐‘ก as:

_๐‘Ž๐‘ก๐‘œ๐‘ก = _๐‘Ž +

(1 โˆ’ ๐‘ƒ๐‘Ÿ๐‘Ÿ (_๐‘Ž๐‘ก๐‘œ๐‘ก )

) ๐‘๐‘Ÿ๐‘š๐‘Ž๐‘ฅโˆ‘๐‘™=2

_๐‘Ž (๐‘™), (15)

since _๐‘Ž (๐‘™) =(1 โˆ’ ๐‘ƒ๐‘Ÿ๐‘Ÿ (_๐‘Ž๐‘ก๐‘œ๐‘ก )

)_๐‘Ž (๐‘™ โˆ’ 1) for ๐‘™ โ‰ฅ 2 and _๐‘Ž (1) =

_๐‘Ž. Finally, from the initial conditions _๐‘Ž (๐‘™) = 0 for ๐‘™ โ‰ฅ 2,the values of _๐‘Ž (๐‘™) and _๐‘Ž๐‘ก๐‘œ๐‘ก can be calculated recursively by:1) applying (15); 2) calculating ๐‘ƒ๐‘Ÿ๐‘Ÿ (_๐‘Ž๐‘ก๐‘œ๐‘ก ) for the new valueof _๐‘Ž๐‘ก๐‘œ๐‘ก ; and 3) updating the values of _๐‘Ž (๐‘™). This process isrepeated until the values of the variables converge to a constantvalue. The final value of ๐‘ƒ๐‘Ÿ๐‘Ÿ (_๐‘Ž๐‘ก๐‘œ๐‘ก ) is simply denoted as ๐‘ƒ๐‘Ÿ๐‘Ÿand used throughout the rest of the paper.

Assuming that the transmission time for the uplink trans-actions follows a general distribution with the first two mo-ments ๐‘™1, ๐‘™2, the first two moments of the distribution of thepacket transmission time are ๐‘ 1 = ( ๐‘“1๐‘™1) /(R๐‘ค), and ๐‘ 2 =

( ๐‘“1๐‘™2) /(R2๐‘ค2) . Applying the results from [81], considering

๐ฟ๐‘ก ๐‘ฅ as a function of scheduling of NPUSCH, we have:

๐ฟ๐‘ก ๐‘ฅ =๐‘“ _๐‘ข๐‘ 1๐‘ 2

2๐‘ 1 (1 โˆ’ ๐‘“ ๐บ๐‘ 1)+

๐‘“ _๐‘ข๐‘ 212(1 โˆ’ ๐‘“ _๐‘ข๐‘ 1)

+ ๐‘™1R๐‘ข๐‘ค

, (16)

where R๐‘ข is the average uplink transmission rate, _๐‘ข = _๐‘ +_๐‘ ,and ๐‘“ (_๐‘  + _๐‘)๐‘ 1 is the mean batch-size. The latency of data

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 11

reception is defined as:

๐ฟ๐‘Ÿ ๐‘ฅ =0.5๐นโ„Ž1๐‘ก

โˆ’1

โ„Ž1 (1 โˆ’ ๐นโ„Ž๐‘กโˆ’1)+ ๐นโ„Ž1

1 โˆ’ ๐นโ„Ž๐‘กโˆ’1 + ๐‘š2

R๐‘‘๐‘ฆ, (17)

in which, โ„Ž1 = ๐‘“ ๐‘š1 (R๐‘‘๐‘ฆ)โˆ’1, โ„Ž2 = ๐‘“ ๐‘š2 ((R๐‘‘)2๐‘ฆ2)โˆ’1 aretwo moments of distribution of the packet transmission time,assuming that the packet length follows a general distributionwith moments ๐‘š1, ๐‘š2, ๐น = ๐‘“ _๐‘‘๐‘ก, R๐‘‘ is downlink datatransmission rate.

Next, we calculate the second latency component, corre-sponding to the DLT verification process. Consider a DLTnetwork that includes ๐‘€ miners. These miners start theirProof-of-Work (PoW) computation at the same time and keepexecuting the PoW process until one of the miners completesthe computational task by finding the desired hash value [82].When a miner executes the computational task for the POWof current block, the time period required to complete thisPoW can be formulated as an exponential random variable ๐‘Šwhose distribution is ๐‘“๐‘Š (๐‘ค) = _๐‘๐‘’โˆ’_๐‘๐‘ค , in which _๐‘ = _0๐‘ƒ๐‘

represents the computing speed of a miner, ๐‘ƒ๐‘ is powerconsumption for computation of a miner, and _0 is a constantscaling factor. Once a miner completes its PoW, it willbroadcast messages to other miners, so that other miners canstop their PoW and synchronize the new block.

๐ฟ๐‘ก๐‘€ = ๐ฟ๐‘›๐‘’๐‘ค๐ต + ๐ฟ๐‘”๐‘’๐‘ก๐ต + ๐ฟ๐‘ก๐‘Ÿ๐‘Ž๐‘›๐‘ ๐ต (18)

In (18), ๐ฟ๐‘›๐‘’๐‘ค๐ต, ๐ฟ๐‘”๐‘’๐‘ก๐ต, and ๐ฟ๐‘ก๐‘Ÿ๐‘Ž๐‘›๐‘ ๐ต, are latencies of send-ing hash of new mined block, requesting new block fromneighboring nodes, and new block transmission, respectively.๐ฟ๐‘›๐‘’๐‘ค๐ต and ๐ฟ๐‘ก๐‘Ÿ๐‘Ž๐‘›๐‘ ๐ต are computed using uplink transmission,while ๐ฟ๐‘”๐‘’๐‘ก๐ต is computed based on downlink transmission asdescribed in previous section.

For the PoW computation, a miner ๐‘–โˆ—, first finds out thedesired PoW hash value, ๐‘–โˆ— = min๐‘–โˆˆ๐‘€ ๐‘ค๐‘– . The fastest PoWcomputation among miners is ๐‘Š๐‘–โˆ—, the complementary cumu-lative probability distribution of ๐‘Š๐‘–โˆ— could be computed as๐‘ƒ๐‘Ÿ (๐‘Š๐‘–โˆ— > ๐‘ฅ) = ๐‘ƒ๐‘Ÿ (min๐‘–โˆˆ๐‘€ (๐‘Š๐‘–) > ๐‘ฅ) =

โˆ๐ป๐‘–=1 ๐‘ƒ๐‘Ÿ (๐‘Š๐‘– > ๐‘ฅ) =

(1โˆ’ ๐‘ƒ๐‘Ÿ (๐‘Š < ๐‘ฅ))๐‘€ . Hence, the average computational latencyof miner ๐‘–โˆ— is described as:

๐ฟ๐‘Š๐‘–โˆ— =

โˆซ โˆž

0(1 โˆ’ ๐‘ƒ๐‘Ÿ (๐‘Š โ‰ค ๐‘ฅ))๐‘€๐ท๐ท๐‘ฅ

=

โˆซ โˆž

0๐‘’โˆ’_๐‘๐‘€๐‘ฅ๐ท๐ท๐‘ฅ =

1_๐‘๐‘€

(19)

The total latency required from DLT verification process is๐ฟ๐ท๐ฟ๐‘‡ = ๐ฟ๐‘ก๐‘š + ๐ฟ๐‘Š๐‘–โˆ— .

3) Energy consumption: Analogously to the latency, theenergy consumption is divided in the wireless communication(uplink/downlink) and the DLT verification.

The total energy consumption in the wireless communica-tion is written as follows:

๐ธ๐‘ˆ๐ท = ๐ธ๐‘ข + ๐ธ๐‘‘

= ๐ธ๐‘ข๐‘ ๐‘ฆ๐‘›๐‘ + ๐ธ๐‘ข

๐‘Ÿ๐‘Ÿ + ๐ธ๐‘ข๐‘ก๐‘ฅ + ๐ธ๐‘ข

๐‘  + ๐ธ๐‘‘๐‘ ๐‘ฆ๐‘›๐‘ + ๐ธ๐‘‘

๐‘Ÿ๐‘Ÿ + ๐ธ๐‘‘๐‘Ÿ ๐‘ฅ + ๐ธ๐‘‘

๐‘  ,

(20)

in which, ๐ธ๐‘ข๐‘ ๐‘ฆ๐‘›๐‘ , ๐ธ๐‘ข

๐‘Ÿ๐‘Ÿ , ๐ธ๐‘ข๐‘Ÿ๐‘Ÿ , ๐ธ๐‘‘

๐‘ ๐‘ฆ๐‘›๐‘ ,๐ธ๐‘‘๐‘Ÿ๐‘Ÿ , and ๐ธ๐‘‘

๐‘Ÿ ๐‘ฅ are energyconsumption of synchronization, resource reservation, and data

(a) End-to-End Latency (sec)

(b) Energy consumption

Fig. 8: Latency and Energy Consumption

transmission of uplink and downlink, respectively. Each ofthem are formally defined as follows:

๐ธ๐‘ ๐‘ฆ๐‘›๐‘ = ๐‘ƒ๐‘™ ยท ๐ฟ๐‘ ๐‘ฆ๐‘›๐‘ (21)๐ธ๐‘Ÿ๐‘Ž๐‘Ÿ = ๐‘ƒ๐‘™ ยท ๐ฟ๐‘Ÿ๐‘Ž๐‘Ÿ (22)

๐ธ๐‘Ÿ๐‘Ÿ =

๐‘๐‘š๐‘Ž๐‘ฅโˆ‘๐‘™=1

(1 โˆ’ ๐‘ƒ๐‘Ÿ๐‘Ÿ )๐‘™โˆ’1 ยท ๐‘ƒ๐‘Ÿ๐‘Ÿ ยท (๐ธ๐‘Ÿ๐‘Ž + ๐ธ๐‘Ÿ๐‘Ž๐‘Ÿ ) (23)

๐ธ๐‘Ÿ๐‘Ž = (๐ฟ๐‘Ÿ๐‘Ž โˆ’ ๐œ) ยท ๐‘ƒ๐ผ + ๐œ ยท (๐‘ƒ๐‘ + ๐‘ƒ๐‘’๐‘ƒ๐‘ก ) (24)

๐ธ๐‘ก ๐‘ฅ = (๐ฟ๐‘ก ๐‘ฅ โˆ’๐‘™๐‘Ž

R๐‘ข๐‘ค) ยท ๐‘ƒ๐ผ + (๐‘ƒ๐‘ + ๐‘ƒ๐‘’๐‘ƒ๐‘ก )

๐‘™๐‘Ž

R๐‘ข๐‘ค(25)

๐ธ๐‘Ÿ ๐‘ฅ = (๐ฟ๐‘Ÿ ๐‘ฅ โˆ’๐‘š1

R๐‘‘๐‘ฆ) ยท ๐‘ƒ๐ผ + ๐‘ƒ๐‘™

๐‘š1

R๐‘‘๐‘ฆ(26)

where ๐‘ƒ๐‘’, ๐‘ƒ๐ผ , ๐‘ƒ๐‘ , ๐‘ƒ๐‘™ , and ๐‘ƒ๐‘ก are the power amplifier effi-ciency, idle power consumption, circuit power consumptionof transmission, listening power consumption, and transmitpower consumption, respectively.

Following the PoW described above, the average energyconsumption of DLT to finish a single PoW round is:

๐ธ๐ท๐ฟ๐‘‡ = ๐‘ƒ๐‘๐ฟ๐‘Š๐‘–โˆ— + ๐‘ƒ๐‘ก๐ฟ๐‘ก๐‘š (27)

4) Results: The performance of DLT-based NB-IoT systemis shown in Fig. 8. The experiments demonstrate the totallatency Fig. 8a and energy efficient Fig. 8b of a DLT-basedNB-IoT system, respectively. In Fig. 8a, the E2E latency

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 12

....

Raw Data

Raw Data

Raw DataDat

a Pr

ovid

er

Select dataPre-

processing

StructuredData

Model TrainingData Processing

....

Model Aggregator

AggregatedModel

Sync Sync SyncEdge Nodes

C Component X executed in Edge Nodes

Edge Node with different computing capabilitiesDLT clients

ML Model

C1

C1

C2 C3

C3

Wireless Station

Aggregated Models

Aggregator

C3

Upload Models Download Models

Smart Contracts

Models updated on DLT

C2C2

C2

C2

C2

Fig. 9: Integration of enabling technologies.

is defined as the time elapsed from the generation of atransaction at the NB-IoT device until its verification. Thisincludes the latency at the NB-IoT radio link and at the DLT,which comprises the execution time of the smart contract andtransaction verification. We observe that increasing ๐‘ก and ๐‘‘

values at the first increases lifetime and decrease latency due tomore resources for NPUSCH and NPDSCH, but after certainpoint increasing ๐‘ก and ๐‘‘ decreases the lifetime by increasingthe expected time for resource reservation. In comparison withthe standard NB-IoT system in [56], [83], the DLT-basedsystem introduces a slight latency because of addition timeof consensus process and transaction verification. This is alatency and security trade-off between standard NB-IoT andDLT-based systems.

IV. TOWARDS ENERGY-EFFICIENT INTELLIGENT IOTENVIRONMENTS

Having the energy-performance characterization for each ofthe enabling technologies (Section III), we describe next howthey interact with each other in iIoTe. For this, we considerthe scenario in Figure 9, where a given learning applicationis considered. We split the task into sub-tasks such as dataprocessing, data training and model aggregation and distributethem in a decentralized way. Each of these sub-tasks (Sec-tion III-A) constitute the application components (๐ถ1, ๐ถ2, ...)that can be run at the available edge nodes. The optimalallocation of sub-tasks to edge nodes is determined using theILP-based algorithms presented in Section III-B. The requiredtrustworthiness (i.e., assuring security, privacy, immutabilityand transparency) between sub-tasks is provided through DLT(Section III-C). The heterogeneity of devices, capabilities

and tasks is exploited accordingly: The edge servers withhigh computation capability are selected to operate the DLTactivities, e.g, block mining, and aggregate the ML models(the head workers if the learning paradigms in Section III-Aare applied), while more constrained edge devices or mobiledevices are setup as DLT light clients that can participate inlocal training (the tail workers) and consensus. The involvednetwork components can communicate via wireless long-rangecommunication NB-IoT channels.

In detail, the communication workflow of the proposedscheme can be summarized as follows:

โ€ข Step 1: The data processing can be completed in differentedge devices with limited resources. The selected datafrom the data provider is pre-processed and structured.This process includes both a data engineering and fea-ture engineering sub-process, in which data engineeringconverts the raw data into prepared data and featureengineering tunes the prepared data to create featuresexpected by ML models.

โ€ข Step 2: Then, the edge nodes or IoT devices, which areresponsible for training, compute the local model basedon its own private data and then publish the local model toits associated edge server via, e.g., NB-IoT by registeringwith active smart contracts to upload their result securelyuntil the results are incorporated in the final aggregationand generation of DLT transactions.

โ€ข Step 3: Next, the edge servers with ML aggregationresponsibility gather transactions and arrange them inblocks following the Merkle tree. The structure of a DLTinvolves the hash of the previous block, a timestamp,โ€™nonceโ€™ and the structure of hash tree. These edge servers

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 13

with high computational capacity join in the DLT miningprocess to verify the created blocks and operate consen-sus in the edge network. After completing the miningprocess, the verified blocks are added to the ledger, andsynchronized among the nodes. The local models arepublished in the distributed ledger. Hence, the powerfuledge servers can compute the global model directly basedon the aggregation rules defined in smart contracts.

The advantages of this integration are two-folds. First, bydistributing the tasks to different edge nodes with differentcomputing capacities, the IoT devices or edge nodes with lim-ited resources can save significant amount of energy requiredfor training or mining and they can achieve lower latency.Second, by leveraging the DLT, the updates of ML modelsare securely formed in encrypted transactions and hashedblocks, which significantly enhances the security and privacyof distributed learning in the edge networks. The DLT providestrust, transparency and immutability baseline for distributedlearning to guarantee the security and privacy of data andML models, and naturally addresses the single-point of failureproblem of the current standard FL approach that relies ona centralized server to aggregate the models. Although theintegration of enabling technologies introduces advantages, italso has some drawbacks, for example, the time required ofDLT mining will increase the total latency of the system. Thisis a trade-off between trust and communication latency whichwe discussed in [66], [84].

V. CONCLUSIONS AND FUTURE WORK

In this paper, we address the evolution of next-generationof IoT networks towards the edge, driven by the introducedintelligent IoT environments. We use the iIoTe as the basicbuilding block to characterize the tradeoff energy-performanceof the three key enabling technologies, learning, edge com-puting and distributed ledger. Edge intelligence must rely ondistributed paradigms such as FL, and we have shown howexploiting spatial and temporal sparsity and quantization cansignificantly improve the performance and reduce the energyconsumption. Moreover, we have discussed the distribution ofthe FL model aggregator and the rest of sub-tasks to makethe framework more robust against failures. For edge comput-ing, the optimal allocation of the application components tonetwork resources is important to efficiently use the availableinfrastructure and optimize its energy consumption. DLT isa flexible solution for trustworthiness in these environments,but the energy and latency cost of implementing DLT overwireless and constrained devices is oftentimes overlooked. Wehave analyzed these parameters using NB-IoT as the baselinewireless technology.

In the integration of these technologies in iIoTe, we haveshown the interactions among them, which provides the basistowards an energy model and evaluation that encompasses thecontribution of each element. For instance, the learning andcomputation models can be easily broaden to consider theallocation of the different sub-tasks of the learning applicationin a representative topology, with each learning action andresource allocation playing the role of an action to be recorded

in the DLT. Future work also includes extending the proposedsolutions to dynamic environments where agents move andedge nodes are not always available. This is already supportedby the presented dynamic head/tail learning paradigms but theintegration of a dynamic resource allocation and DLT frame-work is pending. Another necessary direction is to investigatethe joint optimization of the computing and communicationresources from the energy perspective.

ACKNOWLEDGMENT

This work has received funding from the European Unionโ€™sHorizon 2020 research and innovation programme under grantagreement No. 957218 (Project IntellIoT).

REFERENCES

[1] L. Hou, S. Zhao, X. Xiong, K. Zheng, P. Chatzimisios, M. S. Hossain,and W. Xiang, โ€œInternet of things cloud: Architecture and implemen-tation,โ€ IEEE Communications Magazine, vol. 54, no. 12, pp. 32โ€“39,2016.

[2] A. Alnoman, S. K. Sharma, W. Ejaz, and A. Anpalagan, โ€œEmergingedge computing technologies for distributed iot systems,โ€ IEEE Network,vol. 33, no. 6, pp. 140โ€“147, 2019.

[3] S. Deng, H. Zhao, W. Fang, J. Yin, S. Dustdar, and A. Y. Zomaya,โ€œEdge intelligence: The confluence of edge computing and artificialintelligence,โ€ IEEE Internet of Things Journal, vol. 7, no. 8, pp. 7457โ€“7469, 2020.

[4] L. Hilty and B. Aebischer, ICT Innovations for sustainability, vol. 310.Springer, 2015.

[5] โ€œEan ict-towards digital sobriety,โ€ 2019.[6] D. Bol, G. de Streel, and D. Flandre, โ€œCan we connect trillions of iot

sensors in a sustainable way? a technology/circuit perspective (invited),โ€in 2015 IEEE SOI-3D-Subthreshold Microelectronics Technology Uni-fied Conference (S3S), pp. 1โ€“3, 2015.

[7] W. Yu, F. Liang, X. He, W. G. Hatcher, C. Lu, J. Lin, and X. Yang, โ€œAsurvey on the edge computing for the Internet of Things,โ€ IEEE access,vol. 6, pp. 6900โ€“6919, Nov. 2017.

[8] N. Hassan, S. Gillani, E. Ahmed, I. Yaqoob, and M. Imran, โ€œThe role ofedge computing in internet of things,โ€ IEEE Communications Magazine,vol. 56, no. 11, pp. 110โ€“115, 2018.

[9] M. Patel, B. Naughton, C. Chan, N. Sprecher, S. Abeta, and A. Neal,โ€œMobile-edge computing introductory technical white paper,โ€ ETSIWhite Paper, 2014.

[10] T. Taleb, K. Samdanis, B. Mada, H. Flinck, S. Dutta, and D. Sabella, โ€œOnmulti-access edge computing: A survey of the emerging 5g network edgecloud architecture and orchestration,โ€ IEEE Communications SurveysTutorials, vol. 19, no. 3, pp. 1657โ€“1681, 2017.

[11] M. S. Elbamby, M. Bennis, W. Saad, and et al., โ€œProactive edge comput-ing in fog networks with latency and reliability guarantees,โ€ EURASIPJournal on Wireless Communications and Networking, vol. 209, no. 1,2018.

[12] M. S. Elbamby, C. Perfecto, C. Liu, J. Park, S. Samarakoon, X. Chen,and M. Bennis, โ€œWireless edge computing with latency and reliabilityguarantees,โ€ Proceedings of the IEEE, vol. 107, no. 8, pp. 1717โ€“1737,2019.

[13] Y. Hu and A. Schmeink, โ€œDelay-constrained communication in edgecomputing networks,โ€ in 2018 IEEE 19th International Workshop onSignal Processing Advances in Wireless Communications (SPAWC),pp. 1โ€“5, 2018.

[14] X. Wang, Y. Han, V. C. M. Leung, D. Niyato, X. Yan, and X. Chen,โ€œConvergence of edge computing and deep learning: A comprehen-sive survey,โ€ IEEE Communications Surveys Tutorials, vol. 22, no. 2,pp. 869โ€“904, 2020.

[15] H. Li, K. Ota, and M. Dong, โ€œLearning IoT in edge: Deep learning forthe Internet of Things with edge computing,โ€ IEEE Network, vol. 32,pp. 96โ€“101, Jan. 2018.

[16] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, โ€œA surveyon mobile edge computing: The communication perspective,โ€ IEEECommunications Surveys Tutorials, vol. 19, no. 4, pp. 2322โ€“2358, 2017.

[17] M. Kanj, V. Savaux, and M. Le Guen, โ€œA tutorial on nb-iot physicallayer design,โ€ IEEE Communications Surveys Tutorials, vol. 22, no. 4,pp. 2408โ€“2446, 2020.

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 14

[18] Y.-P. E. Wang, X. Lin, A. Adhikary, A. Grovlen, Y. Sui, Y. Blankenship,J. Bergman, and H. S. Razaghi, โ€œA primer on 3GPP narrowband Internetof Things,โ€ IEEE Communications Magazine, vol. 55, pp. 117โ€“123, Mar.2017.

[19] A. Azari, C. Stefanovic, P. Popovski, and C. Cavdar, โ€œOn the latency-energy performance of nb-iot systems in providing wide-area iot connec-tivity,โ€ IEEE Transactions on Green Communications and Networking,vol. 4, no. 1, pp. 57โ€“68, 2019.

[20] 3GPP, โ€œRadio resource control (rrc); protocol specification,โ€ no. TS 36.331 v9. 3.0, 2010.

[21] J. Konecny, H. B. McMahan, F. X. Yu, P. Richtarik, A. T. Suresh, andD. Bacon, โ€œFederated learning: strategies for improving communicationefficiency,โ€ in Proc. of NIPS Wksp. PMPML, (Barcelona, Spain), Dec.2016.

[22] T. Yang, G. Andrew, H. Eichner, H. Sun, W. Li, N. Kong, D. Ram-age, and F. Beaufays, โ€œApplied federated learning: Improving googlekeyboard query suggestions,โ€ arXiv preprint arXiv:1812.02903, 2018.

[23] S. Samarakoon, M. Bennis, W. Saad, and M. Debbah, โ€œDistributed fed-erated learning for ultra-reliable low-latency vehicular communications,โ€IEEE Transactions on Communications, vol. 68, no. 2, pp. 1146โ€“1159,2019.

[24] P. Kairouz, H. B. McMahan, B. Avent, A. Bellet, M. Bennis, A. N.Bhagoji, K. Bonawitz, Z. Charles, G. Cormode, R. Cummings, et al.,โ€œAdvances and open problems in federated learning,โ€ arXiv preprintarXiv:1912.04977, 2019.

[25] V. Smith, C.-K. Chiang, M. Sanjabi, and A. S. Talwalkar, โ€œFederatedmulti-task learning,โ€ in Proc. of NIPS (I. Guyon, U. V. Luxburg,S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett,eds.), (Long Beach, USA), pp. 4424โ€“4434, Curran Associates, Inc., Dec.2017.

[26] A. Lalitha, O. C. Kilinc, T. Javidi, and F. Koushanfar, โ€œPeer-to-peerfederated learning on graphs,โ€ arXiv preprint arXiv:1901.11173, 2019.

[27] Y. Zhao, M. Li, L. Lai, N. Suda, D. Civin, and V. Chandra, โ€œFederatedlearning with non-IID data,โ€ ArXiv preprint, vol. abs/1806.00582, June2018.

[28] F. Sattler, S. Wiedemann, K.-R. Mรผller, and W. Samek, โ€œRobust andcommunication-efficient federated learning from non-iid data,โ€ IEEEtransactions on neural networks and learning systems, 2019.

[29] Y. Zhao, J. Zhao, L. Jiang, R. Tan, D. Niyato, Z. Li, L. Lyu, and Y. Liu,โ€œPrivacy-preserving blockchain-based federated learning for iot devices,โ€IEEE Internet of Things Journal, pp. 1โ€“1, 2020.

[30] Y. Zhao, J. Zhao, M. Yang, T. Wang, N. Wang, L. Lyu, D. Niyato,and K. Y. Lam, โ€œLocal differential privacy based federated learning forinternet of things,โ€ 2020.

[31] L. Lyu, H. Yu, and Q. Yang, โ€œThreats to federated learning: A survey,โ€2020.

[32] M. Yang, L. Lyu, J. Zhao, T. Zhu, and K.-Y. Lam, โ€œLocal differentialprivacy and its applications: A comprehensive survey,โ€ 2020.

[33] Y. Koda, K. Yamamoto, T. Nishio, and M. Morikura, โ€œDifferentiallyprivate aircomp federated learning with power adaptation harnessingreceiver noise,โ€ 2020.

[34] A. Elgabli, J. Park, C. B. Issaid, and M. Bennis, โ€œHarnessing wirelesschannels for scalable and privacy-preserving federated learning,โ€ IEEETransactions on Communications, vol. 69, no. 8, pp. 5194โ€“5208, 2021.

[35] H. H. Yang, Z. Liu, T. Q. Quek, and H. V. Poor, โ€œScheduling policiesfor federated learning in wireless networks,โ€ IEEE transactions oncommunications, vol. 68, no. 1, pp. 317โ€“333, 2019.

[36] M. M. Wadu, S. Samarakoon, and M. Bennis, โ€œFederated learning underchannel uncertainty: Joint client scheduling and resource allocation,โ€in 2020 IEEE Wireless Communications and Networking Conference(WCNC), pp. 1โ€“6, 2020.

[37] K. Bonawitz, H. Eichner, W. Grieskamp, D. Huba, A. Ingerman,V. Ivanov, C. Kiddon, J. Konecny, S. Mazzocchi, H. B. McMahan, et al.,โ€œTowards federated learning at scale: System design,โ€ arXiv preprintarXiv:1902.01046, 2019.

[38] M. M. Amiri and D. Gรผndรผz, โ€œComputation scheduling for distributedmachine learning with straggling workers,โ€ IEEE Transactions on SignalProcessing, vol. 67, no. 24, pp. 6270โ€“6284, 2019.

[39] M. S. Elbamby, C. Perfecto, C. Liu, J. Park, S. Samarakoon, X. Chen,and M. Bennis, โ€œWireless edge computing with latency and reliabilityguarantees,โ€ Proceedings of the IEEE, vol. 107, pp. 1717โ€“1737, Aug.2019.

[40] M. Polese, R. Jana, V. Kounev, K. Zhang, S. Deb, and M. Zorzi, โ€œMa-chine learning at the edge: A data-driven architecture with applications to5G cellular networks,โ€ IEEE Transactions on Mobile Computing, 2020.

[41] T. Chen, G. B. Giannakis, T. Sun, and W. Yin, โ€œLag: Lazily aggre-gated gradient for communication-efficient distributed learning,โ€ arXivpreprint arXiv:1805.09965, 2018.

[42] J. C. Duchi, A. Agarwal, and M. J. Wainwright, โ€œDual averaging fordistributed optimization: Convergence analysis and network scaling,โ€IEEE Transactions on Automatic control, vol. 57, no. 3, pp. 592โ€“606,2011.

[43] T. AlShammari, S. Samarakoon, A. Elgabli, and M. Bennis, โ€œBaygo:Joint bayesian learning and information-aware graph optimization,โ€ inICC 2021-IEEE International Conference on Communications, pp. 1โ€“6,IEEE, 2021.

[44] J. Wang, A. K. Sahu, Z. Yang, G. Joshi, and S. Kar, โ€œMatcha: Speedingup decentralized sgd via matching decomposition sampling,โ€ in 2019Sixth Indian Control Conference (ICC), pp. 299โ€“300, IEEE, 2019.

[45] A. Elgabli, J. Park, A. S. Bedi, M. Bennis, and V. Aggarwal, โ€œGadmm:Fast and communication efficient framework for distributed machinelearning.,โ€ Journal of Machine Learning Research, vol. 21, no. 76, pp. 1โ€“39, 2020.

[46] C. B. Issaid, A. Elgabli, J. Park, and M. Bennis, โ€œCommunicationefficient distributed learning with censored, quantized, and generalizedgroup ADMM,โ€ arXiv preprint arXiv:2009.06459, 2020.

[47] G. T. Lakshmanan, Y. Li, and R. Strom, โ€œPlacement Strategies forInternet-Scale Data Stream Systems,โ€ IEEE Internet Computing, vol. 12,pp. 50โ€“60, Nov. 2008.

[48] A. M. Haubenwaller and K. Vandikas, โ€œComputations on the edge inthe internet of things,โ€ Procedia Computer Science, vol. 52, pp. 29โ€“34,2015.

[49] F. Samie, V. Tsoutsouras, L. Bauer, S. Xydis, D. Soudris, and J. Henkel,โ€œComputation offloading and resource allocation for low-power iot edgedevices,โ€ in 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 7โ€“12, IEEE, 2016.

[50] S. Sardellitti, G. Scutari, and S. Barbarossa, โ€œJoint optimization of radioand computational resources for multicell mobile-edge computing,โ€IEEE Transactions on Signal and Information Processing over Networks,vol. 1, no. 2, pp. 89โ€“103, 2015.

[51] Y. Sahni, J. Cao, S. Zhang, and L. Yang, โ€œEdge mesh: A new paradigmto enable distributed intelligence in internet of things,โ€ IEEE access,vol. 5, pp. 16441โ€“16458, 2017.

[52] N. Mohan and J. Kangasharju, โ€œEdge-fog cloud: A distributed cloud forinternet of things computations,โ€ in 2016 Cloudification of the Internetof Things (CIoT), pp. 1โ€“6, IEEE, 2016.

[53] V. Cardellini, V. Grassi, F. Lo Presti, and M. Nardelli, โ€œOptimaloperator placement for distributed stream processing applications,โ€ inProceedings of the 10th ACM International Conference on Distributedand Event-based Systems, pp. 69โ€“80, ACM Press, 2016.

[54] J. Seeger, A. Brรถring, and G. Carle, โ€œOptimally self-healing iot chore-ographies,โ€ ACM Transactions on Internet Technology (TOIT), vol. 20,no. 3, pp. 1โ€“20, 2020.

[55] T. M. Fernรกndez-Caramรฉs and P. Fraga-Lamas, โ€œA review on the use ofblockchain for the internet of things,โ€ Ieee Access, vol. 6, pp. 32979โ€“33001, 2018.

[56] L. D. Nguyen, A. E. Kalor, I. Leyva-Mayorga, and P. Popovski,โ€œTrusted wireless monitoring based on distributed ledgers over nb-iotconnectivity,โ€ IEEE Communications Magazine, vol. 58, no. 6, pp. 77โ€“83, 2020.

[57] S. Nakamoto, โ€œBitcoin: A peer-to-peer electronic cash system,โ€ tech.rep., Manubot, 2008.

[58] G. Wood et al., โ€œEthereum: A secure decentralised generalised transac-tion ledger,โ€ Ethereum project yellow paper, vol. 151, no. 2014, pp. 1โ€“32, 2014.

[59] K. Christidis and M. Devetsikiotis, โ€œBlockchains and smart contracts forthe internet of things,โ€ Ieee Access, vol. 4, pp. 2292โ€“2303, 2016.

[60] L. D. Nguyen, I. Leyva-Mayorga, A. N. Lewis, and P. Popovski,โ€œModeling and analysis of data trading on blockchain-based market iniot networks,โ€ IEEE Internet of Things Journal, pp. 1โ€“1, 2021.

[61] C. Esposito, A. De Santis, G. Tortora, H. Chang, and K.-K. R. Choo,โ€œBlockchain: A panacea for healthcare cloud-based data security andprivacy?,โ€ IEEE Cloud Computing, vol. 5, no. 1, pp. 31โ€“37, 2018.

[62] K. N. Griggs, O. Ossipova, C. P. Kohlios, A. N. Baccarini, E. A.Howson, and T. Hayajneh, โ€œHealthcare blockchain system using smartcontracts for secure automated remote patient monitoring,โ€ Journal ofmedical systems, vol. 42, no. 7, pp. 1โ€“7, 2018.

[63] S. Saberi, M. Kouhizadeh, J. Sarkis, and L. Shen, โ€œBlockchain tech-nology and its relationships to sustainable supply chain management,โ€International Journal of Production Research, vol. 57, no. 7, pp. 2117โ€“2135, 2019.

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 15

[64] Y. Zhang, X. Xu, A. Liu, Q. Lu, L. Xu, and F. Tao, โ€œBlockchain-based trust mechanism for iot-based smart manufacturing system,โ€ IEEETransactions on Computational Social Systems, vol. 6, no. 6, pp. 1386โ€“1394, 2019.

[65] Z. Yang, K. Yang, L. Lei, K. Zheng, and V. C. Leung, โ€œBlockchain-baseddecentralized trust management in vehicular networks,โ€ IEEE Internetof Things Journal, vol. 6, no. 2, pp. 1495โ€“1505, 2018.

[66] P. Danzi, A. E. Kalor, R. B. Sorensen, A. K. Hagelskjรฆr, L. D.Nguyen, C. Stefanovic, and P. Popovski, โ€œCommunication aspects of theintegration of wireless iot devices with distributed ledger technology,โ€IEEE Network, vol. 34, no. 1, pp. 47โ€“53, 2020.

[67] S. Boyd, N. Parikh, and E. Chu, Distributed optimization and statisticallearning via the alternating direction method of multipliers. NowPublishers Inc, 2011.

[68] A. Elgabli, J. Park, A. S. Bedi, C. B. Issaid, M. Bennis, and V. Aggarwal,โ€œQ-gadmm: Quantized group admm for communication efficient de-centralized machine learning,โ€ IEEE Transactions on Communications,2020.

[69] D. Dua and C. Graff, โ€œUCI machine learning repository,โ€ 2017.[70] M. M. Amiri and D. Gรผndรผz, โ€œOver-the-air machine learning at the

wireless edge,โ€ in 2019 IEEE 20th International Workshop on SignalProcessing Advances in Wireless Communications (SPAWC), pp. 1โ€“5,IEEE, 2019.

[71] G. Zhu, Y. Wang, and K. Huang, โ€œBroadband analog aggregation forlow-latency federated edge learning,โ€ IEEE Transactions on WirelessCommunications, vol. 19, no. 1, pp. 491โ€“506, 2019.

[72] T. Sery and K. Cohen, โ€œOn analog gradient descent learning over mul-tiple access fading channels,โ€ IEEE Transactions on Signal Processing,vol. 68, pp. 2897โ€“2911, 2020.

[73] J. A. Nelder and R. Mead, โ€œA Simplex Method for Function Minimiza-tion,โ€ The Computer Journal, vol. 7, pp. 308โ€“313, Jan. 1965.

[74] Siemens, โ€œSIMATIC Box IPC,โ€ new.siemens.com, 2021.[75] MICROCHIP, โ€œENC28J60 - Stand-Alone Ethernet Controller with SPI

Interface,โ€ 2012.[76] S. Chiaravalloti, F. Idzikowski, and ลukasz Budzisz, โ€œPower consump-

tion of WLAN network elements,โ€ TKN Technical Reports Series, 2011.[77] P. Danzi, A. E. Kalor, R. B. Sorensen, A. K. Hagelskjaer, L. D.

Nguyen, C. Stefanovic, and P. Popovski, โ€œCommunication aspects of theintegration of wireless iot devices with distributed ledger technology,โ€IEEE Network, vol. 34, no. 1, pp. 47โ€“53, 2020.

[78] S. Popli, R. K. Jha, and S. Jain, โ€œA survey on energy efficient narrowbandinternet of things (nbiot): architecture, application and challenges,โ€ IEEEAccess, vol. 7, pp. 16739โ€“16776, 2018.

[79] O. Liberg, M. Sundberg, E. Wang, J. Bergman, and J. Sachs, CellularInternet of things: technologies, standards, and performance. AcademicPress, 2017.

[80] C.-H. Wei, G. Bianchi, and R.-G. Cheng, โ€œModeling and analysisof random access channels with bursty arrivals in ofdma wirelessnetworks,โ€ IEEE transactions on wireless communications, vol. 14,no. 4, pp. 1940โ€“1953, 2014.

[81] H. Akimaru and K. Kawashima, Teletraffic: theory and applications.Springer Science & Business Media, 2012.

[82] S. Nakamoto, โ€œBitcoin: A peer-to-peer electronic cash system,โ€ tech.rep., Manubot, 2008.

[83] S. Popli, R. K. Jha, and S. Jain, โ€œA survey on energy efficient narrowbandinternet of things (nbiot): Architecture, application and challenges,โ€IEEE Access, vol. 7, pp. 16739โ€“16776, 2019.

[84] L. D. Nguyen, A. E. Kalor, I. Leyva-Mayorga, and P. Popovski,โ€œTrusted wireless monitoring based on distributed ledgers over nb-iotconnectivity,โ€ IEEE Communications Magazine, vol. 58, no. 6, pp. 77โ€“83, 2020.

Beatriz Soret [Mโ€™11] received her M.Sc. and Ph.D.degrees in Telecommunications from the Universityof Malaga, Spain, in 2002 and 2010, respectively.She is currently an associate professor at the Depart-ment of Electronic Systems, Aalborg University, anda Senior Research Fellow at the CommunicationsEngineering Department, University of Malaga. Herresearch interests include LEO satellite communi-cations, distributed and intelligent IoT, timing incommunications, and 5G and post-5G systems.

Lam D. Nguyen (Sโ€™20) is a Ph.D. Fellow at AalborgUniversity. He obtained Master Degree in ComputerScience at Seoul National University, and a Bach-elor in Telecommunication at Hanoi University ofScience and Technologies in 2019 and 2015, respec-tively. His research includes Distributed Systems,Blockchain, Smart Contracts, the Internet of Things,and applying Blockchain and Federated Learningto enhance the efficiency of Blockchain-based IoTmonitoring Networks. He receives Outstanding Pa-per Award for the research about scaling Blockchain

in Massive IoT at the IEEE World Forum Internet of Things 2020, travelgrant from Linux Foundation 2020, Best Research Award for a solutionof Blockchain-based CO2 Emission Trading from VEHITS 2021. He isHyperledger Member, IEEE Student Member, and IEEE ComSoc StudentMember.

Jan Seeger is a Ph.D. Researcher with the Tech-nical University of Munich, Munich, Germany. Heis active in the areas of Internet of Things andautomation research, and how semantic technologiescan improve the engineering of automation systems.He received the M.Sc. degree in computer sciencefrom the TU Munich.

Arne Brรถring is a Senior Key Expert ResearchScientist at Siemens Technology in Munich. Hereceived his PhD in 2012 from the University ofTwente (Netherlands). Dr. Brรถring has contributedto over 90 publications in the field of distributedsystems and has served on various program commit-tees and editorial boards. His research interests rangefrom distributed system designs, over sensor net-works, and Semantic Web, to the Internet of Things.At Siemens, he has been in charge of the technical &scientific coordination of large EU research projects

(BIG IoT and IntellIoT). Before joining Siemens, Dr. Brรถring worked forthe Environmental Systems Research Institute in Zurich, the 52ยฐNorth OpenSource Initiative, and led the Sensor Web and Simulation Lab at the Universityof Mรผnster.

Chaouki Ben Issaid received the Diplรดmedโ€™Ingรฉnieur with majors in economics and financialengineering from the Ecole Polytechnique de Tunisie(EPT) in 2013, the masterโ€™s degree in applied math-ematics and computational science (AMCS) andthe Ph.D. degree in statistics from King AbdullahUniversity of Science and Technology (KAUST)in 2015 and 2019, respectively. He is currently aPost-Doctoral Fellow with the Centre for WirelessCommunications (CWC), University of Oulu. Hiscurrent research interests include communication-

efficient distributed learning and machine learning applications for wirelesscommunication.

IEEE TRANSACTION ON GREEN COMMUNICATION AND NETWORKING 16

Sumudu Samarakoon [Mโ€™12] received the B.Sc.degree (honors) in electronic and telecommunicationengineering from the University of Moratuwa, SriLanka, in 2009, the M.Eng. degree from the AsianInstitute of Technology, Thailand, in 2011, and thePh.D. degree in communication engineering fromthe University of Oulu, Finland, in 2017. He iscurrently an Assistant Professor and a member of in-telligent connectivity and networks/systems (ICON)group with the Centre for Wireless Communications,University of Oulu. His main research interests are

in heterogeneous networks, small cells, radio resource management, machinelearning at wireless edge, and game theory. Dr. Samarakoon received theBest Paper Award at the European Wireless Conference, Excellence Awardsfor innovators and the outstanding doctoral student in the Radio TechnologyUnit, CWC, University of Oulu, in 2016. He is also a Guest Editor of Telecom(MDPI) special issue on โ€œmillimeter wave communications and networkingin 5G and beyondโ€.

Anis Elgabli received the B.Sc. degree in elec-trical and electronic engineering from the Univer-sity of Tripoli, Libya, in 2004, the M.Eng. degreefrom UKM, Malaysia, in 2007, and the M.Sc. andPh.D. degrees from the Department of Electricaland Computer Engineering, Purdue University, WestLafayette, IN, USA, in 2015 and 2018, respectively.He is currently a Post-Doctoral Researcher at theCentre of Wireless Communications, University ofOulu. His main research interests include heteroge-neous networks, radio resource management, vehic-

ular communications, video streaming, and distributed/decentralized machinelearning and optimization.

Vivek Kulkarni He did a Master of Science inโ€œCommunications Engineeringโ€ from Technical Uni-versity of Munich (TUM) in 2000 and an MBAin โ€œInnovation and Business Creationโ€ from TUMSchool of Management in 2014. In more than20 years of industrial experience, Vivek Kulkarniworked in several industry domains such as In-dustrial automation, Renewable energy, Carrier andMobile networks with focus on communication pro-tocols, future network architecture, MPLS, GMPLS,carrier-grade Ethernet and Profinet. Since 2013, his

main focus is on Software Defined Networking, Industry 4.0 and Next-Generation IoT. Currently he is the Project Coordinator of the EU H2020project IntellIoT (Next-Generation IoT project) and in the past he wascoordinator of EU-project SEMIoTICS (IoT project) as well as the EU H2020project VirtuWind, which was one of the prestigious vertical domain projectsin the 5G PPP phase-1 projects.

Dr Mehdi Bennis is a full (tenured) Professor atthe Centre for Wireless Communications, Universityof Oulu, Finland, Academy of Finland ResearchFellow and head of the intelligent connectivity andnetworks/systems group (ICON). His main researchinterests are in radio resource management, hetero-geneous networks, game theory and distributed ma-chine learning in 5G networks and beyond. He haspublished more than 200 research papers in interna-tional conferences, journals and book chapters. Hehas been the recipient of several prestigious awards

including the 2015 Fred W. Ellersick Prize from the IEEE CommunicationsSociety, the 2016 Best Tutorial Prize from the IEEE Communications Society,the 2017 EURASIP Best paper Award for the Journal of Wireless Commu-nications and Networks, the all-University of Oulu award for research, the2019 IEEE ComSoc Radio Communications Committee Early AchievementAward and the 2020 Clarviate Highly Cited Researcher by the Web of Science.Dr Bennis is an editor of IEEE TCOM and Specialty Chief Editor forData Science for Communications in the Frontiers in Communications andNetworks journal. Dr Bennis is an IEEE Fellow.

Petar Popovski (Fellow, IEEE) is a Professor atAalborg University, where he heads the section onConnectivity and a Visiting Excellence Chair at theUniversity of Bremen. He received his Dipl.-Ing andM. Sc. degrees in communication engineering fromthe University of Sts. Cyril and Methodius in Skopjeand the Ph.D. degree from Aalborg University in2005. He is a Fellow of the IEEE. He received anERC Consolidator Grant (2015), the Danish EliteResearcher award (2016), IEEE Fred W. Ellersickprize (2016), IEEE Stephen O. Rice prize (2018),

Technical Achievement Award from the IEEE Technical Committee on SmartGrid Communications (2019), the Danish Telecommunication Prize (2020)and Villum Investigator Grant (2021). He is a Member at Large at theBoard of Governors in IEEE Communication Society, Vice-Chair of the IEEECommunication Theory Technical Committee and IEEE TRANSACTIONSON GREEN COMMUNICATIONS AND NETWORKING. He is currentlyan Area Editor of the IEEE TRANSACTIONS ON WIRELESS COM-MUNICATIONS and, from 2022, an Editor-in-Chief of IEEEE JOURNALON SELECTED AREAS IN COMMUNICATIONS. Prof. Popovski was theGeneral Chair for IEEE SmartGridComm 2018 and IEEE CommunicationTheory Workshop 2019. His research interests are in the area of wirelesscommunication and communication theory. He authored the book โ€œWirelessConnectivity: An Intuitive and Fundamental Guideโ€, published by Wiley in2020.