{"id":"https://openalex.org/W7141544848","doi":"https://doi.org/10.1109/icce67443.2026.11449758","title":"Deep Reinforcement Learning Based Medium Access Control Protocol for LoRa Networks","display_name":"Deep Reinforcement Learning Based Medium Access Control Protocol for LoRa Networks","publication_year":2026,"publication_date":"2026-02-03","ids":{"openalex":"https://openalex.org/W7141544848","doi":"https://doi.org/10.1109/icce67443.2026.11449758"},"language":null,"primary_location":{"id":"doi:10.1109/icce67443.2026.11449758","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce67443.2026.11449758","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130731961","display_name":"Norah Sumayli","orcid":null},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Norah Sumayli","raw_affiliation_strings":["King Fahd University of Petroleum &#x0026; Minerals (KFUPM),Computer Engineering Department,Dhahran,Saudi Arabia,31261"],"affiliations":[{"raw_affiliation_string":"King Fahd University of Petroleum &#x0026; Minerals (KFUPM),Computer Engineering Department,Dhahran,Saudi Arabia,31261","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049762656","display_name":"Louai Al-Awami","orcid":"https://orcid.org/0000-0002-1049-7343"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Louai Al-Awami","raw_affiliation_strings":["King Fahd University of Petroleum &#x0026; Minerals (KFUPM),Computer Engineering Department,Dhahran,Saudi Arabia,31261"],"affiliations":[{"raw_affiliation_string":"King Fahd University of Petroleum &#x0026; Minerals (KFUPM),Computer Engineering Department,Dhahran,Saudi Arabia,31261","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5130731961"],"corresponding_institution_ids":["https://openalex.org/I134085113"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.92965251,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.00139999995008111,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13553","display_name":"Age of Information Optimization","score":0.0012000000569969416,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.5575000047683716},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5562000274658203},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4916999936103821},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4020000100135803},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.31060001254081726},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.30889999866485596}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6366999745368958},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.5575000047683716},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5562000274658203},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4916999936103821},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49160000681877136},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4020000100135803},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.31060001254081726},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30979999899864197},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.30889999866485596},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3001999855041504},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.2906000018119812},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.26460000872612},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.25220000743865967}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce67443.2026.11449758","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce67443.2026.11449758","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1771697193","https://openalex.org/W1983244601","https://openalex.org/W2051376838","https://openalex.org/W2107710215","https://openalex.org/W2128569883","https://openalex.org/W2227916620","https://openalex.org/W2520480241","https://openalex.org/W2525332113","https://openalex.org/W2775543068","https://openalex.org/W2922273628","https://openalex.org/W2980805633","https://openalex.org/W3092138905","https://openalex.org/W3096675644","https://openalex.org/W3130302759","https://openalex.org/W3151728532","https://openalex.org/W3202515746","https://openalex.org/W4211202244","https://openalex.org/W4313583401","https://openalex.org/W4376629860"],"related_works":[],"abstract_inverted_index":{"LoRa":[0,61,174],"is":[1,99],"a":[2,165],"key":[3],"enabling":[4,89],"technology":[5],"for":[6,168],"large-scale":[7],"Internet":[8],"of":[9,75,130],"Things":[10],"(IoT)":[11],"deployments":[12],"due":[13],"to":[14,53,70,140,145,151],"its":[15,21,67],"long-range":[16],"and":[17,34,56,80,103,108,147],"low-power":[18],"capabilities.":[19],"However,":[20],"pure":[22],"ALOHA":[23,109,126],"Medium":[24],"Access":[25],"Control":[26],"(MAC)":[27],"protocol":[28,47],"suffers":[29],"from":[30],"high":[31],"collision":[32],"rates":[33],"poor":[35],"scalability":[36],"under":[37,110],"dense":[38],"network":[39,112,155],"conditions.":[40,113],"This":[41],"paper":[42],"proposes":[43],"an":[44],"intelligent":[45,169],"MAC":[46,119,135,170],"based":[48,84],"on":[49,85],"Deep":[50,161],"Q-learning":[51,107,152],"(DQN)":[52],"enhance":[54],"reliability":[55],"learning":[57],"efficiency":[58],"in":[59,172],"multichannel":[60],"networks.":[62,175],"Where":[63],"each":[64],"node":[65],"develops":[66],"own":[68],"policy":[69],"select":[71],"the":[72,128],"optimal":[73],"combination":[74],"channel,":[76],"spread":[77],"factor":[78],"(SF),":[79],"transmission":[81,87],"power":[82],"(TxP),":[83],"previous":[86],"outcomes,":[88],"distributed":[90],"optimization":[91],"without":[92],"centralized":[93],"coordination.":[94],"The":[95],"proposed":[96],"DQN-based":[97,134],"model":[98],"implemented":[100],"using":[101],"LoRaSim":[102],"compared":[104,144,150],"against":[105],"conventional":[106],"identical":[111],"Simulation":[114],"results":[115,158],"demonstrate":[116],"that":[117,160],"intelligence-based":[118],"protocols":[120],"maintained":[121],"higher":[122],"PDR":[123],"than":[124],"traditional":[125],"as":[127],"number":[129],"nodes":[131],"increased.":[132],"Moreover,":[133],"achieved":[136],"faster":[137],"convergence,":[138],"up":[139],"40%":[141],"fewer":[142],"collisions":[143],"ALOHA,":[146],"about":[148],"25%":[149],"across":[153],"various":[154],"densities.":[156],"These":[157],"confirm":[159],"Reinforcement":[162],"Learning(DRL)":[163],"offers":[164],"scalable":[166],"solution":[167],"design":[171],"dynamic":[173]},"counts_by_year":[],"updated_date":"2026-03-29T06:01:01.467347","created_date":"2026-03-28T00:00:00"}
