Adaptive Energy Management For MATTER-Enabled Smart Homes
Adaptive Energy Management For MATTER-Enabled Smart Homes
ABSTRACT The proliferation of IoT devices in CSA MATTER-enabled smart homes presents new
challenges and opportunities for intelligent energy management. This paper proposes a unified machine
learning (ML) framework for dynamic energy optimization, integrating advanced prediction, anomaly
detection, and reinforcement learning (RL) techniques. The energy demand prediction module employs
a stacked ensemble learning model combining Random Forest Regression, Support Vector Regression,
Gradient Boosting Machines, and AdaBoost with a meta-learner, achieving a prediction accuracy of 92%.
For anomaly detection, a hybrid multi-stage approach incorporating Long Short-Term Memory (LSTM)
networks, One-Class SVMs (OCSVM), and autoencoders delivers a precision of 0.97 and recall of 0.95 in
identifying abnormal consumption patterns and potential cybersecurity threats. Resource allocation is
optimized via RL strategies, including Q-learning, Deep Q-Networks (DQN), and actor-critic methods,
achieving an Energy Efficiency Ratio (EER) of 0.82. The framework is evaluated across multiple metrics:
energy consumption, detection accuracy, system resilience, and computational efficiency under edge-
device constraints. A comprehensive analysis of hardware footprint, latency sensitivity, and data loss
impact is presented, along with detailed anomaly detection criteria and threshold tuning to minimize false
positives/negatives. The cybersecurity layer is validated through emulated attack scenarios, confirming
robust threat detection. Additionally, interpretability of the ML models is addressed through the proposed
future integration of Explainable AI (XAI) techniques such as SHAP and LIME, to foster end-user trust
and transparency. This work demonstrates a scalable, adaptive, and secure ML-driven solution for energy
management in MATTER-enabled smart homes, contributing significantly to sustainable and cost-efficient
smart living environments.
INDEX TERMS Machine learning, smart homes, energy management, reinforcement learning, anomaly
detection, predictive modeling, Internet of Things, energy efficiency.
I. INTRODUCTION diverse IoT devices [3], [4], [5]. MATTER achieves this
The proliferation of Internet of Things (IoT) devices within through the following key features:
smart homes has ushered in an era of unprecedented • Standardized Data Models: MATTER defines a com-
connectivity and data generation, creating opportunities to mon data model for various smart home devices,
develop intelligent energy management systems capable ensuring that data from different manufacturers is
of optimizing energy consumption patterns and promoting represented in a consistent and interoperable format.
sustainability. The emergence of the Connectivity Standards This facilitates seamless data exchange and integration
Alliance (CSA) MATTER protocol [1], [2] further amplifies between devices, regardless of their brand or underlying
this potential by enabling seamless interoperability between technology.
• Unified Communication Protocols: MATTER utilizes
a combination of IP-based protocols, such as Thread
The associate editor coordinating the review of this manuscript and and Wi-Fi, to enable reliable and secure communi-
approving it for publication was Maurizio Casoni . cation between devices. This eliminates the need for
2025 The Authors. This work is licensed under a Creative Commons Attribution 4.0 License.
VOLUME 13, 2025 For more information, see https://creativecommons.org/licenses/by/4.0/ 113773
N. Bhardwaj, P. Joshi: Adaptive Energy Management for MATTER-Enabled Smart Homes
are critical enablers of efficient energy management. The TABLE 1. Comparative analysis of related works.
article [17], investigated the role of adaptive learning mech-
anisms in international business contexts, demonstrating
their effectiveness in facilitating decision-making under
uncertainty. While Luo’s work focused on organizational
environments, the underlying principles of adaptive learning
are highly relevant to the context-aware energy manage-
ment required in smart homes. This research addresses
this gap by adapting these methodologies to optimize
energy consumption in response to dynamic household
demands [18]. While the literature showcases significant
progress in applying ML to energy management, several
critical gaps remain:
Limited Focus on Intersectionality: Many existing studies
concentrate on specific domains like cybersecurity [19], [20],
agriculture [21], [22], or climate information systems [23]
without adequately considering the intersection of energy
management, IoT, and ML in smart homes. This research
aims to bridge this gap by proposing a comprehensive
framework that integrates these critical aspects.
Lack of User-Centric Approaches: While adaptability and
scalability are crucial, methodologies often lack a user-
centric focus [17], [24]. This research prioritizes user satis-
faction by incorporating mechanisms to personalize energy was collected from various sources within the smart home
management strategies based on individual preferences and environment to train and validate the ML models. These
comfort levels. sources include:
Limited Scalability to Urban Environments: Some method- • Energy Consumption: Real-time energy consumption
ologies, while effective in specific contexts, may not data [27], [28] for appliances and electrical devices is
scale well to data-intensive urban environments like smart collected from TP-Link HS110 smart plugs with energy
homes [23]. This research addresses this limitation by tai- monitoring capabilities integrated with various appli-
loring data-driven strategies specifically for urban household ances (refrigerator, TV, lighting fixtures, microwave
settings. oven).
This study addresses the identified gaps by proposing • Environmental Context: Ambient temperature and
a novel ML-driven framework for energy management in humidity are monitored using DHT22 sensors; light
CSA MATTER-enabled smart homes [25]. Comparative levels are measured using BH1750 light sensors;
analysis of these studies are shown in Table 1. Our occupancy is detected using HC-SR501 motion sensors.
framework integrates adaptive learning, IoT connectivity, and • User Interaction: User preferences and behaviors related
cybersecurity features to achieve dynamic optimization, user to device control (e.g., thermostat settings, appliance
satisfaction, and operational security. By incorporating real- usage patterns) are collected through a Google Nest
time environmental data and precision techniques, we aim to smart thermostat and logged through a custom mobile
maximize energy efficiency and support sustainability goals. application interface [29].
• Renewable Energy: Energy generation data from a
rooftop solar panel system is collected using SolarEdge
III. METHODOLOGY power optimizers and inverters with monitoring capabil-
This research employs a quantitative experimental approach ities, accessed through the SolarEdge API.
to develop and evaluate a sophisticated machine learning • Cybersecurity Events: Security-related events, including
(ML)-driven framework for optimizing energy consumption potential intrusions, device behavior anomalies, and
in Connectivity Standards Alliance (CSA) MATTER-enabled unauthorized access attempts, are monitored through
smart homes [26]. The research process is structured into network traffic analysis using Zeek (formerly Bro)
distinct stages: data acquisition, model development, and intrusion detection system, logs from connected devices,
model evaluation. and firewall logs [30].
Data is collected using a dedicated Raspberry Pi-based data
A. DATA ACQUISITION AND PREPROCESSING acquisition server with a custom Python script. The script
The real-world dataset used in this study was collected from collects data from all sensors and IoT devices at a sampling
a residential smart homes located in Germany and India frequency of 1 minute and stores it in a time-series database
and occupied by a nuclear family of 2 to 4 persons. Data (InfluxDB). The collected data undergoes preprocessing to
TABLE 2. Types of data collected and their sources. 2) GRADIENT BOOSTING MACHINES (GBM)
GBM builds an ensemble of decision trees sequentially,
where each tree corrects the errors of its predecessor. The
final prediction is a weighted sum of the predictions from all
trees.
Fm (x) = Fm−1 (x) + αm hm (x) (1)
where:
Fm (x) is the prediction at the mth iteration.
αm is the learning rate at the mth iteration.
hm (x) is the decision tree at the mth iteration.
3) AdaBoost
AdaBoost combines multiple weak learners (e.g., decision
stumps) by assigning weights to each learner based on
its performance. Learners that perform well on difficult
instances are given higher weights.
M
X
F(x) = sign( αm hm (x) (2)
m=1
where:
F(x) is the final prediction.
αm is the weight assigned to the mth weak learner.
hm (x) is the prediction of the mth weak learner.
4) MATHEMATICAL FORMULATION
These models are designed with the objective of predicting
prepare it for model training. This includes: the energy demand given some contextual features. The
energy consumption prediction equation is:
1) Normalization: Data is normalized using min-max n
X
scaling to ensure all features have a consistent range yˆt = wi xi,t + b (3)
between 0 and 1. i=1
2) Outlier Detection: Outliers are identified using the where:
Isolation Forest algorithm and handled by replac- yˆt is the predicted energy consumption at time t,
ing them with the median value of the respective xi,t represents the input features at time t (e.g., environmen-
feature. tal data, occupancy),
3) Feature Extraction: Relevant features are extracted wi are the learned weights of the model, b is the model bias.
from the raw data. This includes creating time-based
features (hour of day, day of week, weekend/weekday), C. USING DEEP LEARNING
aggregating energy consumption over different time Our anomaly detection module follows a hybrid, multi-stage
intervals (hourly, daily), and calculating the time approach combining LSTM, OCSVM, and autoencoders.
elapsed since the last motion sensor trigger. LSTM models are employed for capturing temporal trends
in energy consumption. Their outputs—prediction errors—
B. MACHINE LEARNING MODELS are analyzed using OCSVM for boundary-based anomaly
1) PREDICTIVE ENERGY CONSUMPTION MODELING detection. Simultaneously, autoencoders evaluate reconstruc-
We implement a stacked ensemble architecture, where RFR, tion errors. A simple voting fusion mechanism aggregates the
SVR, GBM, and AdaBoost are trained as base learners outputs from the three methods to finalize anomaly labels.
on the input feature set. Their individual predictions are This ensemble ensures improved detection accuracy and
used as input features to a meta-learner, specifically Ridge robustness. To identify irregularities in energy consumption,
Regression, which learns the final output. This two-stage we use the Long Short-Term Memory (LSTM) networks – a
training enhances predictive accuracy by leveraging the type of deep learning model [32]. The recurrence relation for
strengths of each model. The stacked architecture reduces LSTM is:
overfitting and bias, offering robust generalization for varying
consumption patterns [31]. ht = σ (Whh ht−1 + Wxh xt + bh ) (4)
where: ht is the hidden state at time t, Whh and Wxh are where:
the weight matrices for the recurrent and input connections, • µ is the mean of reconstruction errors on a validation set
respectively, of normal data,
σ is the activation function (such as tanh or ReLU), • σ is the standard deviation of those errors, and
bh is the bias term, • k is a tunable parameter that controls sensitivity.
xt is the input data vector at time t. Data points with reconstruction errors exceeding this
threshold are flagged as anomalies. This method helps
1) ONE-CLASS SVM (OCSVM) minimize false positives by learning from expected normal
OCSVM learns a hyperplane that separates the normal data patterns, while deviations beyond the threshold indicate
points from the origin in a high-dimensional feature space. potential anomalies or system issues.
Data points that lie far from this hyperplane are considered Note that Isolation Forests are not used in general anomaly
anomalies. detection here but are instead reserved for cybersecurity
1 1X
n threat detection, as discussed in Section III-E.
min ∥w∥2 + ξi − ρ
w,ξ ,ρ 2 m
i=1 D. THE Q-LEARNING ALGORITHM
subject to: w φ(xi ) ≥ ρ − ξi ,
T
ξi ≥ 0, i = 1, . . . , n A model-free reinforcement learning technique, optimizes
(5) energy resource allocation to minimize consumption [33],
[34]. The Q-learning update rule for energy optimization is
where: w is the weight vector. given by:
ξi are slack variables.
Q(st , at ) = Q(st , at ) + α rt+1 + γ max Q(st+1 , a′ )
ρ is the offset. ′
a
v is a parameter controlling the proportion of outliers. − Q(st , at ) (7)
φxi is the feature map of the,ith data point.
In OCSVM, an anomaly is identified if a data point falls where: Q(st , at ) represents the expected reward for acting at
on the ‘wrong’ side of the learned hyperplane, beyond a in state st ,
certain margin, or if its distance from the origin in the feature rt+1 is the immediate reward at time t + 1,
space, relative to the learned boundary, is too large. The α is the learning rate,
parameter ν directly controls the trade-off between detecting γ is the discount factor for future rewards.
true anomalies and tolerating novel but normal variations,
1) DEEP Q-NETWORKS (DQN)
implicitly managing the false positive rate. A lower ν aims
for fewer false positives but might miss more true anomalies DQN uses a deep neural network to approximate the
(higher false negatives), while a higher ν can detect more Q-function, allowing it to handle high-dimensional state
anomalies but might increase false positives. spaces and learn complex relationships between states,
actions, and rewards. The neural network takes the state as
2) AUTOENCODERS
input and outputs Q-values for each possible action
Autoencoders consist of an encoder that compresses the input
2) ACTOR-CRITIC METHODS
data into a lower-dimensional representation and a decoder
Actor-critic methods consist of two components: an actor
that reconstructs the original data from the compressed
that learns the policy (mapping from states to actions) and a
1 representation. Anomalies are detected by comparing the
critic that learns the value function (estimating the expected
input data with the reconstructed data; large reconstruction
return for a given state). The actor and critic work together
errors indicate anomalies. The loss function used to train the
to improve the policy and value function estimates. The actor
autoencoder is typically Mean Squared Error (MSE):
updates its policy based on the feedback from the critic, while
n
1X the critic updates its value function based on the observed
Loss = (xi − x̂i )2 (6) rewards.
n
i=0
where: xi is the ith input data point. E. CYBERSECURITY AND SYSTEM RESILIENCE
x̂i is the reconstructed data point. Within our cybersecurity framework, Isolation Forests are
An anomaly is formally defined as an instance where the specifically employed to detect anomalies in the IoT network
reconstruction error for a given data point significantly devi- traffic and device behavior logs, complementing the general
ates from the distribution of reconstruction errors observed energy consumption anomaly detection. This provides a
during training on normal data. robust layer against intrusion attempts and data manipulation.
A dynamic threshold is set on the reconstruction error, The anomaly score is calculated using the formula:
typically calculated as: −N
2 splitcount
AnomalyScore = (8)
µ + kσ c(t)
F. MATTER INTEGRATION
This research explicitly addresses the integration of ML
where: models within the CSA MATTER ecosystem. MATTER’s
N is the number of data points, split count refers to the standardized data models and communication protocols are
number of splits required to isolate an observation, leveraged to ensure seamless interoperability between diverse
c(t) is the normalization constant to adjust for the tree IoT devices [35], [36]. The ML framework accommodates the
depth. heterogeneity of data formats and communication protocols
For Isolation Forests, an anomaly is defined as a data inherent in MATTER by employing appropriate data transfor-
point that is easily isolated from the rest of the dataset mation and normalization techniques. For instance, data from
with fewer random partitions. Data points with anomaly different manufacturers using different units (e.g., Celsius vs.
scores approaching 1 are considered strong anomalies. Fahrenheit for temperature) is converted to a common format
A fixed threshold on the anomaly score (e.g., scores above before being fed into the ML models.
0.7 or 0.8) is used to classify data points as anomalous.
The threshold is typically determined empirically on a
G. WORKFLOW STRUCTURE
validation set to balance precision and recall. False positives
occur when a normal variation is too easily isolated, while The approach is sequential but not siloed as depicted in Fig 2
false negatives occur when a true anomaly is embedded below, each step is dependent on the previous one and the
within normal data and requires many partitions to isolate. result is a seamless integration of machine learning models
Isolation Forests are employed for detecting cybersecurity- with IoT architecture. The workflow is outlined as follows:
related anomalies, such as unusual IoT traffic patterns or 1) Data Collection: Gather data from IoT devices and
unauthorized access attempts. These models analyze device sensors.
is computed:
UsefulEnergyOutput
EER = (9)
TotalEnergyConsumed
N
1 X
MAE = yi − ŷi (10)
N
i=1
v
u
u1 X N
2
RMSE = t yi − ŷi (11)
N
i=1
are used to assess the cybersecurity measures: TABLE 3. Energy efficiency across operational scenarios.
TP
Precision = (12)
TP + FP
TP
Recall = (13)
TP + FN
Precision × Recall
F1 − Score = 2 × (14)
Precision + Recall
where: TP = True Positives (correct detection of
anomalies), FP = False Positives (false alarms), FN =
False Negatives (missed anomalies).
5) Validation Techniques: Model performance is validated
using 5-fold cross-validation, where the dataset is
divided into 5 subsets, and the model is trained and
evaluated 5 times, each time using a different subset as
the validation set. This helps to ensure that the model
generalizes well to unseen data.
6) Robustness Testing: System robustness and scalabil-
ity are evaluated by simulating different scenarios,
including varying the number of connected IoT devices
(from 10 to 50), introducing network latency (up to
100ms), and simulating data loss (up to 5% packet
loss). The system’s performance is monitored under
these conditions to assess its ability to maintain energy
efficiency and prediction accuracy.
V. DISCUSSION
This research presents a systematic approach to enhancing
energy management in CSA MATTER-focused smart homes
by leveraging the synergy between machine learning (ML)
algorithms and Internet of Things (IoT) technology [38], [39].
The memory footprint for these models in inference mode is appliance-specific consumption breakdowns, and the ratio-
typically in the order of tens to hundreds of megabytes. nale behind automated adjustments. This would bridge the
The reinforcement learning algorithms (Q-learning, DQN, gap between complex AI operations and human understand-
and Actor-Critic) are central to dynamic energy resource ing, empowering users to not only benefit from energy effi-
allocation. While Q-learning can operate with a Q-table ciency but also to actively manage and trust their smart home
that scales with state-action space, DQN and Actor-Critic energy system.
methods involve neural network approximations, making Our findings demonstrate the efficacy of predictive
their training computationally demanding. However, for real- modeling, anomaly detection, and reinforcement learning in
time decision-making (exploitation phase) in smart homes, optimizing energy consumption, improving system robust-
the trained RL agent acts as a policy network, which executes ness, and enhancing user experience [43]. This discussion
a forward pass similar to other deep learning inference tasks. delves into the key findings, their connection to existing
This can be handled by edge devices, with the computational literature, and their implications for various stakeholders. Our
load primarily tied to the complexity of the neural network predictive energy consumption model, employing Random
architecture used to approximate the Q-function or policy. Forest Regression (RFR) and Support Vector Regression
For highly complex environments or frequent policy updates, (SVR), achieved high accuracy in estimating energy demand
a hybrid approach could be adopted, where model training based on contextual information, including occupancy and
occurs in the cloud, and only the trained models are environmental conditions. This aligns with previous studies
deployed to edge devices for inference, minimizing on-device emphasizing the importance of contextual awareness in
computational demands. energy consumption prediction [6], [14], [18]. However, our
The current system operates with a 1-minute sampling model demonstrates greater efficiency in terms of scalability
frequency, which allows for sufficient time for model and flexibility, particularly when handling heterogeneous
inference on the Raspberry Pi 4 without significant latency. data from diverse IoT devices. Unlike in [23], who focused on
Future work could explore model quantization, pruning, rural agricultural systems with limited device diversity, our
or knowledge distillation techniques to further reduce the model effectively accommodates the wide range of devices
computational footprint and enable deployment on even more and data formats typical of urban smart homes, showcasing
resource-constrained devices, ensuring sub-second response its adaptability to more complex IoT ecosystems.
times crucial for critical energy management decisions. This The Long Short-Term Memory (LSTM) network-based
approach optimizes the trade-off between model sophisti- anomaly detection module effectively identified unusual
cation and real-time operational feasibility in typical smart energy usage patterns, achieving a high precision of 0.97 and
home environments.’’ recall of 0.95. This underscores the capability of deep learn-
ing in identifying energy wastage, corroborating findings
B. MODEL INTERPRETABILITY AND USER TRUST by [19], who employed deep learning for anomaly detection
While deep learning and reinforcement learning models in IoT networks. Moreover, our LSTM-based approach
offer powerful capabilities for energy optimization, their outperformed traditional statistical methods by effectively
inherent ‘black-box’ nature can pose challenges for user trust capturing temporal dependencies and long-range correlations
and practical adoption. For energy management systems, inherent in energy consumption data. This highlights the
understanding why a particular decision is made (e.g., why advantage of LSTM networks in discerning subtle anomalies
energy consumption was optimized in a specific way at a that may be missed by simpler techniques. Our reinforcement
given time) is crucial for homeowners and energy providers. learning-based energy resource allocation strategy, utilizing
This interpretability enhances transparency, facilitates trou- Q-learning, resulted in a significant enhancement in energy
bleshooting, and enables users to confidently interact with efficiency, achieving an Energy Efficiency Ratio (EER)
and even fine-tune the system. of 0.82. This demonstrates the system’s ability to optimize
Our current framework focuses on optimizing performance renewable energy utilization and minimize consumption
metrics. However, for future work and enhanced user during peak hours. While these results are consistent with
experience, integrating Explainable AI (XAI) techniques the findings of [22], who applied reinforcement learning to
will be vital. Methods such as SHAP (SHapley Additive resource management in agriculture, our research extends
Explanations) or LIME (Local Interpretable Model-agnostic their framework by explicitly addressing the unique chal-
Explanations) could be applied to provide insights into lenges of IoT environments, such as data heterogeneity and
the contribution of various input features (e.g., occupancy, system scalability. Specifically, our approach incorporates
temperature, renewable energy availability) to the energy mechanisms to handle diverse data formats from various IoT
prediction and optimization decisions. For reinforcement devices and dynamically adjust energy allocation strategies
learning policies, visualizing the learned policy or high- based on real-time system conditions. Our findings extend
lighting the most influential states and actions could the work in [17] on adaptive learning in organizational
make the optimization logic more transparent. Furthermore, contexts to the domain of context-aware energy management
simple visualization techniques within the mobile applica- in smart homes. By incorporating adaptive learning models,
tion interface could show users predicted energy savings, our system dynamically responds to real-time changes in
[22] M. K. Sott, L. B. Furstenau, L. M. Kipper, F. D. Giraldo, J. R. López- [44] M. A. Hasan et al., ‘‘A survey on blockchain technology for smart grid
Robles, M. J. Cobo, A. Zahid, Q. H. Abbasi, and M. A. Imran, ‘‘Precision applications,’’ IEEE Access, vol. 10, pp. 2000–2015, 2022.
techniques and agriculture 4.0 technologies to promote sustainability in the [45] S. Khan and A. Gani, ‘‘Security and privacy in IoT: A survey,’’ IEEE
coffee sector: State of the art, challenges and future trends,’’ IEEE Access, Access, vol. 9, pp. 26867–26884, 2021.
vol. 8, pp. 149854–149867, 2020. [46] L. G. Zhang et al., ‘‘Blockchain for smart grid: A survey,’’ IEEE Trans.
[23] T. H. Pindura, W. T. Vambe, W. Nel, and L. Zhou, ‘‘Dissemination of Smart Grid, vol. 12, no. 1, pp. 798–812, Jan. 2021.
climate information: Insights from a case of rural small-scale farmers [47] N. U. Huda, I. Ahmed, M. Adnan, M. Ali, and F. Naeem, ‘‘Experts and
in Raymond Mhlaba municipality, South Africa,’’ in Proc. Conf. (IDIA), intelligent systems for smart homes’ transformation to sustainable smart
2022, p. 42. cities: A comprehensive review,’’ Expert Syst. Appl., vol. 238, Mar. 2024,
[24] M. Rixen, M. Dowell, F. Immler, J. Dusart, and E. Kristopaitis, ‘‘Earth Art. no. 122380.
observation strategic research and innovation agenda,’’ Publications Office [48] L. Yu, W. Xie, D. Xie, Y. Zou, D. Zhang, Z. Sun, L. Zhang, Y. Zhang, and T.
Eur. Union, Luxembourg, Tech. Rep. JRC136730, 2024. Jiang, ‘‘Deep reinforcement learning for smart home energy management,’’
[25] N. Koltsaklis, I. Panapakidis, G. Christoforidis, and J. Knápek, ‘‘Smart IEEE Internet Things J., vol. 7, no. 4, pp. 2751–2762, Apr. 2020.
home energy management processes support through machine learning
algorithms,’’ Energy Rep., vol. 8, pp. 1–6, Jun. 2022.
[26] N. Bhardwaj and P. Joshi, ‘‘A MATTER-enabled IoT framework for
enhanced fire detection and real-time decision-making,’’ Social Netw.
Comput. Sci., vol. 5, no. 8, p. 1088, Nov. 2024.
[27] N. Bhardwaj, P. Joshi, and P. Rani, ‘‘Revolutionizing healthcare IoT:
A low-energy connectivity paradigm,’’ in Proc. IEEE Int. Conf. Cloud
Comput. Emerg. Markets (CCEM), Nov. 2023, pp. 47–50.
[28] M. Collotta and G. Pau, ‘‘An innovative approach for forecasting of energy
requirements to improve a smart home management system based on
BLE,’’ IEEE Trans. Green Commun. Netw., vol. 1, no. 1, pp. 112–120,
Mar. 2017.
[29] S. Hu, C. Qiu, and S. Zhu, ‘‘Floor acceleration control of self-centering
braced frames using viscous dampers,’’ J. Building Eng., vol. 74,
Sep. 2023, Art. no. 105944.
[30] H. Setia, A. Chhabra, S. K. Singh, S. Kumar, S. Sharma, V. Arya, NAVODIT BHARDWAJ (Senior Member, IEEE)
B. B. Gupta, and J. Wu, ‘‘Securing the road ahead: Machine learning- received the B.E. degree in electronics and com-
driven DDoS attack detection in VANET cloud environments,’’ Cyber munication engineering and the M.Tech. degree
Secur. Appl., vol. 2, May 2024, Art. no. 100037. in computer science and engineering from CDAC,
[31] M. S. Islam, M. R. Hossain, and M. Jubair, ‘‘A comprehensive review on Noida. He is currently pursuing the Ph.D. degree,
machine learning-based anomaly detection techniques for IoT networks focused on low-energy connectivity protocols and
in smart home environments,’’ IEEE Access, vol. 11, pp. 132402–132422, standards. He is a Connectivity Architect with
2023. Bosch Global Software Technologies, with over
[32] X. Xu, Y. Jia, Y. Xu, Z. Xu, S. Chai, and C. S. Lai, ‘‘A multi- 20 years of experience in the wireless connectivity
agent reinforcement learning-based data-driven method for home energy domain. His expertise spans protocol develop-
management,’’ IEEE Trans. Smart Grid, vol. 11, no. 4, pp. 3201–3211,
ment, performance evaluation, and compliance testing across multiple
Jul. 2020.
connectivity technologies. He is an active member of industry-leading
[33] Y. Chen et al., ‘‘Deep reinforcement learning for integrated energy
standardization bodies, including the Wi-Fi Alliance, Connectivity Standards
management in smart grids: A review,’’ Appl. Energy, vol. 305, Jan. 2022,
Art. no. 117865. Alliance (CSA), Connected Car Consortium, FIRA, LoRA, and Open
[34] R. Liu et al., ‘‘Multi-agent reinforcement learning for distributed energy Alliance.
management in smart grids: A survey,’’ IEEE Trans. Smart Grid, vol. 13,
no. 1, pp. 248–261, Jan. 2022.
[35] T. Ahmad, R. Madonski, D. Zhang, C. Huang, and A. Mujeeb, ‘‘Data-
driven probabilistic machine learning in sustainable smart energy/smart
energy systems: Key developments, challenges, and future research
opportunities in the context of smart grid paradigm,’’ Renew. Sustain.
Energy Rev., vol. 160, May 2022, Art. no. 112128.
[36] A. Computing, ‘‘Middleware demos/posters,’’ Tech. Rep.
[37] G. Kousalya, P. Balakrishnan, and C. P. Raj, Automated Workflow
Scheduling in Self-Adaptive Clouds: Concepts, Algorithms and Methods.
Springer, 2017.
[38] R. S. L. Tso et al., ‘‘Smart home energy management systems: A review
of machine learning approaches and future trends,’’ Sustain. Cities Soc.,
vol. 84, Sep. 2022, Art. no. 104037.
[39] S. Khan and A. Gani, ‘‘Big data analytics for smart homes: A survey,’’ PALLAVI JOSHI (Senior Member, IEEE) received
IEEE Access, vol. 9, pp. 12345–12360, 2021.
the B.E. degree in electronics and communications
[40] A. A. Al-Mousa, M. Al-Shamma, and M. I. Al-Sarayreh, ‘‘A user
from Rajiv Gandhi Technical University, Bhopal,
behavioral model for energy consumption prediction in smart homes using
India, in 2011, the M.Tech. degree in embedded
machine learning,’’ IEEE Access, vol. 10, pp. 23456–23470, 2022.
systems from VIT University, Vellore, India,
[41] B. L. Taha, H. J. Abdula, and H. H. Abdul-Majeed, ‘‘Real-time smart home
energy management system based on IoT and machine learning,’’ J. Phys., in 2016, and the Ph.D. degree in electronics and
Conf. Ser., vol. 1804, no. 1, 2021, Art. no. 012010. communications from the National Institute of
[42] R. Zhang, W. H. Tan, and G. Xu, ‘‘A review of smart home energy Technology, Raipur, India. She is an Assistant Pro-
management systems: Opportunities and challenges,’’ Renew. Sustain. fessor with the Department of Computer Science.
Energy Rev., vol. 149, Oct. 2021, Art. no. 111352. Her areas of interest focus on model development
[43] W. Pinthurat, T. Surinkaew, and B. Hredzak, ‘‘An overview of rein- of data transmission in IoT-enabled WSN applications and sustainable
forcement learning-based approaches for smart home energy management development, resource optimization in data aggregation in sensor networks
systems with energy storages,’’ Renew. Sustain. Energy Rev., vol. 202, using machine learning approaches, and cybersecurity in wireless networks.
Sep. 2024, Art. no. 114648.