Applications of Hidden Markov Model in Wireless
DOI:
https://doi.org/10.61841/85194a81Keywords:
- Machine Learning (ML), Hidden Markov Model (HMM),, Wireless Sensor Networks (WSN).Abstract
WSN is now widely used, due to its cost effectiveness and ease of deployment. Traditional sensor network approaches fail to respond dynamically; hence machine learning can be new techniques to be explored. The benefit of machine learning is that they can self learn, without human intervention or reprogramming. A concise introduction of classification of Machine learning algorithm is discussed. A review of one of the most promising technique Hidden Markov Model is covered. In recent decades, Hidden Markov model is being explored as the new technique for Wireless Sensor Networks. Hidden Markov model can efficiently perform time series prediction with generalization. This work emphasizes on recent applications of Hidden Markov Model to solve various issues and challenges in Wireless Sensor Networks.
Downloads
References
[1] J. Brownlee, “a-tour-of-machine-learning-algorithms,” 15 January 2020. [Online]. Available: https://machinelearningmastery.com/a-tour-of-machine-learning-algorithms/.
[2] L. R. Rabiner, “A tutorial on hidden Markov models and selected applications in Speech recognition,” in SIAM interdisciplinary Journal, 1989.
[3] B. T. &. B. V. &. K. S. &. J. V.Bala, “ A survey: Issues and challenges in wireless sensir network,”
International Journal of Engineering and Technology(UAE) , vol. 7, pp. 53-55, 2018.
[4] S. L. N.-P. T. Mohammad Abu Alsheikh, “Machine Learning in Wireless Sensor Networks:Algorithms, Strategies, and Applications,” IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1996 - 2018, 2014.
[5] Z. Z. Y. C. &. L. L. Xiaofei Xu, “ HMM-based predictive model for enhancing data quality in WSN,”
International Journal of Computers and Applications., 2017 .
[6] M. H. R. B. H. A. H. K. K. D. a. M. J. J. Ahmed, “Energy Saving In WSN Using Monitoring Values Prediction,” Procedia Computer Science, pp. vol. 32,1154-1159, 2014.
[7] Z. Z. L. L. Peng Hu, “The HMM-based Modeling for the Energy Level Prediction in Wireless Sensor Networks,” in Second IEEE Conference on Industrial Electronics and Applications., 2007.
[8] G. A. N. a. C. B. Margi, “Energy Map Model for Software-Defined Wireless,” XXXV Brazilian Symposium on Telecommunications …, 2017.
[9] V. &. K. S. &. J. V. Bhatia, “ Comparative study of cluster based routing protocols in WSN,” International Journal of Engineering & Technology, vol. 7, p. 171, 2017.
[10] S. Hugtenburg, “Reducing the need for communication in wireless sensor networks using machine learning and planning techniques,” DElFT, 2017.
[11] B. J. a. M. S. Rouhollah Goudarzi, “An Efficient Clustering Algorithm using Evolutionary HMM in wireless sensor Networks,” in International Conference on Embedded and Ubiquitous Computing IEEE, 2010.
[12] V. K. B. Veena K.N., “ Hidden Markov Model with Computational Intelligence for Dynamic Clustering in Wireless Sensor Networks,” in International Conference on Advances in Computing, Bangalore, 2012.
[13] N. N. a. M. N. C. B. Vinutha, “Cluster-based adaptive power control protocol using Hidden Markov Model for Wireless Sensor Networks,” International Journal of Electronics, pp. vol. 104, no. 6,, 2017.
[14] D. V. J. S. K. a. D. K. S. K. Varsha Bhatia, “A Hidden Markov Model based Prediction Mechanism for Cluster Head Selection in WSN,” International Journal of Advanced Science and Technology, vol. 28, no. 15, pp. 585 - 600, 2019.
[15] Y. &. W. J. &. L. L. &. L. P. Zang, “The Hybrid HMM for RSS-based Localization in Wireless Sensor Networks,” Applied Mechanics and Materials., pp. 347-350., 2013.
[16] A. a. K.Murugan, “ Localization in Wireless Sensor Networks by Hidden Markov Model,” in ICoAC, 2010.
[17] R. &. M. K. Arthi, Scenario Based Analysis of Localization of Sensor Nodes Using HMM, 2010.
[18] M. K. R. a. D. S. Debin Gao, “Behavioral Distance Measurement Using Hidden Markov Models,” LNCS
4219, p. 19–40, 09 2006.
[19] S. D. a. S. YanLing, “Detection of Network Intrusion Based on a HMM Model,” in 2010 Second International Conference on Multimedia and Information Technology, Kaifeng, 2010 .
[20] Z. C. a. X. Ji, “An Efficient Intrusion Detection Approach Based on Hidden Markov Model and Rough Set,” in International Conference on Machine Vision and Human-machine Interface, Kaifeng, 2010.
[21] Y.-S. L. a. S.-B. Cho, “Activity Recognition Using Hierarchical Hidden Markov Models on a Smartphone with 3D Accelerometer,” in Hybrid Artificial Intelligent Systems: 6th International Conference, HAIS 2011, Wroclaw Poland , 2011.
[22] M. R. H. K. T. a. S.-H. Y. M. Humayun Kabir, “Two-Layer Hidden Markov Model for Human Activity Recognition in Home Environments,” International Journal of Distributed Sensor Networks, p. 12, 2016.
[23] L. D. Alahakoon, “Controlling the spread of dynamic self-organizing maps,” Neural Computing & Applications, vol. Volume 13, no. 2, pp. 168-174, 2004.
[24] A. P. C. a. H. B. W. B. Heinzelman, “An application-specific protocol architecture for wireless micro sensor networks,” IEEE Transactions on Wireless Communications, vol. 1, pp. 660-670, 2002.
[25] S. K. H. a. B. S. D. Alahakoon, “Dynamic self-organizing maps with controlled growth for knowledge discovery,” Neural Networks, IEEE Transactions, vol. 11, pp. 601-614, 2000.
[26] Siddeswara Mayura Guru, Arthur Hsu, and Saman Halgamuge, “An Extended Growing Self-Organizing Map for Selection of Clusters in Sensor Networks,” International Journal of Distributed Sensor Networks , vol. 1, pp. 227-243, 2005.
[27] A. H. S. H. a. S. F. Siddeswara Mayura Guru, “Clustering Sensor Networks Using Growing Self- Organizing Map,” ISSNIP , 2004.
[28] E. U. A. M. &. T. K. Warriach, “ A Machine Learning Approach for Identifying and Classifying Faults in Wireless Sensor Networks,” in International Conference on Computational Science and Engineering, 2012.
[29] B. Y. a. T. Sasikala, “ Intrusion detection system for mitigating attacks using energy monitoring in wireless sensor networks,” International Journal of Mobile Network Design and Innovation, vol. 6, no. 4, 2016.
[30] B. A. a. M. Ponnavaikko, “Energy Efficient Hidden Markov Model Based Target Tracking Mechanism in Wireless Sensor Networks,” Journal of Computer Science, vol. 5, no. 12, pp. 1082-1090, 2009.
[31] K. D. a. Y. H. Victor Obado, “Hidden Markov Model for shortest paths testing to detect a Wormhole Attack in a localized Wireless Sensor Network,” in IST-AWSN, 2012.
[32] S. D. a. B. N. Nilayam Kumar Kamila, “Neural network Enabled WSN Management for Energy Effcient Routing Mechanism,” Indian Journal of Science and Technology, vol. 9, no. 26, July 2016.
[33] A. L. Q. F. a. B. J. K. Mengxue Cao, “Growing Self-Organizing Map Approach for Semantic Acquisition Modeling,” in International Conference on Cognitive Info communications, Budapest, Hungary, 2013.
[34] M. A. F. D. P. V. S. Bernard Robles, “HMM Framework, for Industrial Maintenance Activities,” in QUALITA, 2013.
[35] A. K.Murugan, “Localization in Wireless Sensor Networks by Hidden Markov Model,” in ICoAC, 2010.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.