Pub Date : 2026-02-04DOI: 10.1109/TMC.2026.3653591
{"title":"2025 Reviewers List*","authors":"","doi":"10.1109/TMC.2026.3653591","DOIUrl":"https://doi.org/10.1109/TMC.2026.3653591","url":null,"abstract":"","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4455-4477"},"PeriodicalIF":9.2,"publicationDate":"2026-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11372682","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Accurate fall risk prediction is crucial for early intervention and prevention, effectively reducing the incidence of falls and the associated harm. This paper proposes a non-contact gait detection and fall risk prediction method based on the human electrostatic field and Stacking ensemble learning algorithm. A theoretical model for gait detection based on the human electrostatic field is established, and an experimental scheme is designed. The electrostatic gait measurement system is used to collect electrostatic gait signals from healthy young individuals, healthy elderly individuals, and elderly individuals with a history of falls. Gait features, including 28-dimensional quantifiable characteristics, are proposed for evaluating human balance and motor abilities, covering four aspects: gait time parameters, gait symmetry based on ratios and signal similarity, gait stability based on the maximum Lyapunov exponent and entropy information, and gait time parameter variability. A hybrid feature reduction method based on Particle Swarm Optimization (PSO) is used to obtain the optimal feature subset. Fall risk prediction models based on single classifiers (DT, SVM, KNN, and NB) are constructed using both the original feature set and the optimal feature subset. The single classifier based on the optimal feature subset achieves better classification performance. Furthermore, a Stacking ensemble learning model using LightGBM as the meta-learner is developed, achieving an accuracy of 97.78%. This study provides a novel approach for fall risk prediction that can predict the likelihood of falls and reduce the probability of their occurrence.
{"title":"Fall Risk Prediction Method Based on Human Electrostatic Field and Stacking Ensemble Learning Algorithm","authors":"Sichao Qin;Jiaao Yan;Ziyi Jiao;Weijie Yuan;Xi Chen","doi":"10.1109/TMC.2025.3647110","DOIUrl":"https://doi.org/10.1109/TMC.2025.3647110","url":null,"abstract":"Accurate fall risk prediction is crucial for early intervention and prevention, effectively reducing the incidence of falls and the associated harm. This paper proposes a non-contact gait detection and fall risk prediction method based on the human electrostatic field and Stacking ensemble learning algorithm. A theoretical model for gait detection based on the human electrostatic field is established, and an experimental scheme is designed. The electrostatic gait measurement system is used to collect electrostatic gait signals from healthy young individuals, healthy elderly individuals, and elderly individuals with a history of falls. Gait features, including 28-dimensional quantifiable characteristics, are proposed for evaluating human balance and motor abilities, covering four aspects: gait time parameters, gait symmetry based on ratios and signal similarity, gait stability based on the maximum Lyapunov exponent and entropy information, and gait time parameter variability. A hybrid feature reduction method based on Particle Swarm Optimization (PSO) is used to obtain the optimal feature subset. Fall risk prediction models based on single classifiers (DT, SVM, KNN, and NB) are constructed using both the original feature set and the optimal feature subset. The single classifier based on the optimal feature subset achieves better classification performance. Furthermore, a Stacking ensemble learning model using LightGBM as the meta-learner is developed, achieving an accuracy of 97.78%. This study provides a novel approach for fall risk prediction that can predict the likelihood of falls and reduce the probability of their occurrence.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4443-4454"},"PeriodicalIF":9.2,"publicationDate":"2025-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data integrity verification in geographically distributed edge systems remains a critical unsolved challenge. While centralized verification introduces bottlenecks and single points of failure, existing decentralized alternatives suffer from inefficiency due to their lack of batch verification capabilities. This limitation leads to prohibitive communication and computational overheads that scale poorly as data volume grows. This paper introduces EdgeBatch, the first decentralized protocol designed for efficient batch integrity verification, reducing communication rounds from $mathcal {O}(n)$ to $mathcal {O}(1)$ a small, constant number. At its core is a reputation-aware Combination Selection Algorithm (CSA), a polynomial-time heuristic that identifies near-optimal peer server combinations, balancing verifier group size against servers’ historical trustworthiness through intelligent pruning strategies. This process is orchestrated through distributed ledger technology and smart contracts, ensuring a secure, transparent, and trustless verification environment. The protocol’s design is underpinned by rigorous theoretical analysis, including formal proofs of security and correctness, and a probabilistic model for optimizing key system parameters. Extensive simulations show that EdgeBatch drastically outperforms state-of-the-art methods; it improves computational efficiency by an average of 518.60× over EdgeWatch and 1030.93× over CooperEDI, while also reducing communication overhead by 296.68× and 62.66×, respectively. A concluding ablation study confirms the vital role of our reputation mechanism, demonstrating it reduces the required verification rounds by 73% and is the key to the protocol’s efficiency.
{"title":"EdgeBatch: Efficient Decentralized Batch Verification for Edge Data Integrity via Reputation-Aware Combination Selection","authors":"Jian Li;Yibo Chen;Qinglin Zhao;Jincheng Cai;Shaohua Teng;Naiqi Wu","doi":"10.1109/TMC.2025.3645025","DOIUrl":"https://doi.org/10.1109/TMC.2025.3645025","url":null,"abstract":"Data integrity verification in geographically distributed edge systems remains a critical unsolved challenge. While centralized verification introduces bottlenecks and single points of failure, existing decentralized alternatives suffer from inefficiency due to their lack of batch verification capabilities. This limitation leads to prohibitive communication and computational overheads that scale poorly as data volume grows. This paper introduces EdgeBatch, the first decentralized protocol designed for efficient batch integrity verification, reducing communication rounds from <inline-formula><tex-math>$mathcal {O}(n)$</tex-math></inline-formula> to <inline-formula><tex-math>$mathcal {O}(1)$</tex-math></inline-formula> a small, constant number. At its core is a reputation-aware Combination Selection Algorithm (CSA), a polynomial-time heuristic that identifies near-optimal peer server combinations, balancing verifier group size against servers’ historical trustworthiness through intelligent pruning strategies. This process is orchestrated through distributed ledger technology and smart contracts, ensuring a secure, transparent, and trustless verification environment. The protocol’s design is underpinned by rigorous theoretical analysis, including formal proofs of security and correctness, and a probabilistic model for optimizing key system parameters. Extensive simulations show that EdgeBatch drastically outperforms state-of-the-art methods; it improves computational efficiency by an average of 518.60× over EdgeWatch and 1030.93× over CooperEDI, while also reducing communication overhead by 296.68× and 62.66×, respectively. A concluding ablation study confirms the vital role of our reputation mechanism, demonstrating it reduces the required verification rounds by 73% and is the key to the protocol’s efficiency.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4425-4442"},"PeriodicalIF":9.2,"publicationDate":"2025-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-24DOI: 10.1109/TMC.2025.3625547
Jin Cheng;Ningning Ding;John C.S. Lui;Jianwei Huang
In the Big Data era, data trading significantly enhances data-driven decision-making by facilitating data sharing. Streaming data from sources such as mobile devices and social media platforms creates new opportunities and challenges for data trading. Traditional data trading methods, designed for one-time queries over static database snapshots, neglect the growing need for trading continuous queries over streaming data. If applied directly to continuous queries, existing methods often result in repeated and imprecise charges that reduce the seller's profit, as they do not consider computation sharing during continuous query execution. To address these challenges, we propose CQTrade, the first mechanism for continuous query-based data trading, which incorporates computation sharing in query execution and integrates seamlessly with existing trading mechanisms. Our contributions are threefold: (1) we provide a theoretical analysis of prevalent computation-sharing techniques, including cost modeling and closed-form computation-sharing strategy derivation; (2) we formulate a general optimization problem to maximize the seller's profit, adaptable to various computation-sharing techniques; (3) we identify that our optimization problem merges vector bin packing and multidimensional knapsack challenges, and we tackle this complexity with a tailored branch-and-price algorithm that decomposes the problem into a masterproblem and multiple sub-problems, achieving a globally optimal solution. Evaluation shows CQTrade improves trading success rate by 12.8% and increases seller profit by 28.7% compared to traditional methods.
{"title":"Trading Continuous Queries","authors":"Jin Cheng;Ningning Ding;John C.S. Lui;Jianwei Huang","doi":"10.1109/TMC.2025.3625547","DOIUrl":"https://doi.org/10.1109/TMC.2025.3625547","url":null,"abstract":"In the Big Data era, data trading significantly enhances data-driven decision-making by facilitating data sharing. Streaming data from sources such as mobile devices and social media platforms creates new opportunities and challenges for data trading. Traditional data trading methods, designed for one-time queries over static database snapshots, neglect the growing need for trading continuous queries over streaming data. If applied directly to continuous queries, existing methods often result in repeated and imprecise charges that reduce the seller's profit, as they do not consider computation sharing during continuous query execution. To address these challenges, we propose CQTrade, the first mechanism for continuous query-based data trading, which incorporates computation sharing in query execution and integrates seamlessly with existing trading mechanisms. Our contributions are threefold: (1) we provide a theoretical analysis of prevalent computation-sharing techniques, including cost modeling and closed-form computation-sharing strategy derivation; (2) we formulate a general optimization problem to maximize the seller's profit, adaptable to various computation-sharing techniques; (3) we identify that our optimization problem merges vector bin packing and multidimensional knapsack challenges, and we tackle this complexity with a tailored branch-and-price algorithm that decomposes the problem into a masterproblem and multiple sub-problems, achieving a globally optimal solution. Evaluation shows CQTrade improves trading success rate by 12.8% and increases seller profit by 28.7% compared to traditional methods.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4253-4268"},"PeriodicalIF":9.2,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-23DOI: 10.1109/TMC.2025.3624756
Wenbin Huang;Ju Ren;Hangcheng Cao;Hongbo Jiang;Panlong Yang;Zhangjie Fu
Voice-enabled mobile applications (apps) are exploding in popularity as they could be manipulated with voice commands to achieve convenient man-machine interaction. These voice-enabled apps also raise security and privacy concerns about whether they would maliciously invoke microphones to realize voice eavesdropping. To explore this issue, in this work, we design baleful apps to access the microphone covertly, the results of test studies demonstrate that covert eavesdropping attacks can bypass existing device detection schemes as well as are unnoticeable to human users. To prevent the covert voice eavesdropping attack, we propose a versatile microphone icon detection (MicID) scheme inspired by the groundtruth that authorization of the voice function requires the user to touch the specific microphone icon in most of voice-based apps. Specifically, we devise a deep learning model, lightweight YOLO (L-YOLO), to locate the microphone icon on the screen quickly and accurately. By determining whether the located microphone icon is touched by the user, we can judge whether the current microphone access belongs to the app’s normal operation or illegal eavesdropping. Finally, we conduct extensive experiments by deploying the scheme on real devices and collecting dataset. The evaluation results show that the proposed MicID scheme achieves more than 99% accuracy with low computation cost.
{"title":"Learning Based Versatile Voice Eavesdropping Prevention for Mobile Devices","authors":"Wenbin Huang;Ju Ren;Hangcheng Cao;Hongbo Jiang;Panlong Yang;Zhangjie Fu","doi":"10.1109/TMC.2025.3624756","DOIUrl":"https://doi.org/10.1109/TMC.2025.3624756","url":null,"abstract":"Voice-enabled <italic>mobile applications</i> (apps) are exploding in popularity as they could be manipulated with voice commands to achieve convenient man-machine interaction. These voice-enabled apps also raise security and privacy concerns about whether they would maliciously invoke microphones to realize voice eavesdropping. To explore this issue, in this work, we design baleful apps to access the microphone covertly, the results of test studies demonstrate that covert eavesdropping attacks can bypass existing device detection schemes as well as are unnoticeable to human users. To prevent the covert voice eavesdropping attack, we propose a versatile <italic>microphone icon detection</i> (MicID) scheme inspired by the groundtruth that authorization of the voice function requires the user to touch the specific microphone icon in most of voice-based apps. Specifically, we devise a deep learning model, <italic>lightweight YOLO</i> (L-YOLO), to locate the microphone icon on the screen quickly and accurately. By determining whether the located microphone icon is touched by the user, we can judge whether the current microphone access belongs to the app’s normal operation or illegal eavesdropping. Finally, we conduct extensive experiments by deploying the scheme on real devices and collecting dataset. The evaluation results show that the proposed MicID scheme achieves more than 99% accuracy with low computation cost.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4393-4408"},"PeriodicalIF":9.2,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-23DOI: 10.1109/TMC.2025.3624628
Kai Peng;Tongxin Liao;Mingyuan Ren;Yi Hu;Liangliang Wu;Menglan Hu;Hongbo Jiang
With the rapid advancement of edge computing, service mesh has emerged as a critical technology for improving network performance, owing to its flexibility and scalability. However, massive online applications in edge clouds pose significant challenges to microservice orchestration, including high concurrency, complex service dependencies, strict response delay requirements, and fast orchestration needs. Addressing these challenges requires efficient and fast orchestration strategies, but existing approaches often lack accurate models and effective algorithms to handle these complexities. To tackle the above challenges, this paper proposes an efficient Symmetric Microservice Deployment (SMD) algorithm for fast orchestration. First, accurate modeling is achieved with the queuing network, which analyzes intertwined requests and calculates detailed delays. Moreover, the SMD algorithm simplifies the coupling between deployment and routing by considering internal dependencies during deployment. This integrated approach eliminates the need for separate routing solutions and ensures provable optimal performance under symmetric deployment. Experimental results demonstrate that, compared to four baseline algorithms, the proposed method reduces response delay by 25.5% and execution time by 58.4%, showcasing the potential and advantages of the algorithm for optimizing microservice orchestration in edge clouds networks.
{"title":"Symmetric Orchestration Under Service Mesh Paradigm: Empowering Massive Online Applications in Edge Clouds","authors":"Kai Peng;Tongxin Liao;Mingyuan Ren;Yi Hu;Liangliang Wu;Menglan Hu;Hongbo Jiang","doi":"10.1109/TMC.2025.3624628","DOIUrl":"https://doi.org/10.1109/TMC.2025.3624628","url":null,"abstract":"With the rapid advancement of edge computing, service mesh has emerged as a critical technology for improving network performance, owing to its flexibility and scalability. However, massive online applications in edge clouds pose significant challenges to microservice orchestration, including high concurrency, complex service dependencies, strict response delay requirements, and fast orchestration needs. Addressing these challenges requires efficient and fast orchestration strategies, but existing approaches often lack accurate models and effective algorithms to handle these complexities. To tackle the above challenges, this paper proposes an efficient Symmetric Microservice Deployment (SMD) algorithm for fast orchestration. First, accurate modeling is achieved with the queuing network, which analyzes intertwined requests and calculates detailed delays. Moreover, the SMD algorithm simplifies the coupling between deployment and routing by considering internal dependencies during deployment. This integrated approach eliminates the need for separate routing solutions and ensures provable optimal performance under symmetric deployment. Experimental results demonstrate that, compared to four baseline algorithms, the proposed method reduces response delay by 25.5% and execution time by 58.4%, showcasing the potential and advantages of the algorithm for optimizing microservice orchestration in edge clouds networks.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4300-4316"},"PeriodicalIF":9.2,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Exploiting on-device data and computing power for machine learning at the network edge is challenged by constrained device resources, privacy requirements, and local data heterogeneity. To address the above gap, this work proposes a dual-functional blockchain framework named BagChain for bagging-based decentralized ML. BagChain integrates blockchain with distributed ML by replacing the computationally costly hash computing in proof-of-work with ML model training and validation, and does not rely on any trusted central servers. Individual miners in BagChain train base models by using their local computing resources and private data and further aggregate these base models, which could be very weak, into strong ensemble models. More specifically, we design a three-layer blockchain structure and associated generation and validation mechanisms to enable distributed ML among uncoordinated miners without revealing raw data. To reduce computational waste due to blockchain forking, we further propose the cross fork sharing mechanism for practical networks with lengthy delay and limited bandwidth. Extensive experiments illustrate the superiority and efficacy of BagChain when handling various ML tasks on both independently and identically distributed (IID) and non-IID datasets. BagChain remains robust and effective even when facing resource-constrained mobile devices, heterogeneous private user data, and limited network connectivity.
{"title":"BagChain: A Dual-Functional Blockchain Leveraging Bagging-Based Distributed Machine Learning","authors":"Zixiang Cui;Xintong Ling;Xingyu Zhou;Jiaheng Wang;Zhi Ding;Xiqi Gao","doi":"10.1109/TMC.2025.3624804","DOIUrl":"https://doi.org/10.1109/TMC.2025.3624804","url":null,"abstract":"Exploiting on-device data and computing power for machine learning at the network edge is challenged by constrained device resources, privacy requirements, and local data heterogeneity. To address the above gap, this work proposes a dual-functional blockchain framework named BagChain for bagging-based decentralized ML. BagChain integrates blockchain with distributed ML by replacing the computationally costly hash computing in proof-of-work with ML model training and validation, and does not rely on any trusted central servers. Individual miners in BagChain train base models by using their local computing resources and private data and further aggregate these base models, which could be very weak, into strong ensemble models. More specifically, we design a three-layer blockchain structure and associated generation and validation mechanisms to enable distributed ML among uncoordinated miners without revealing raw data. To reduce computational waste due to blockchain forking, we further propose the cross fork sharing mechanism for practical networks with lengthy delay and limited bandwidth. Extensive experiments illustrate the superiority and efficacy of BagChain when handling various ML tasks on both independently and identically distributed (IID) and non-IID datasets. BagChain remains robust and effective even when facing resource-constrained mobile devices, heterogeneous private user data, and limited network connectivity.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4206-4222"},"PeriodicalIF":9.2,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper investigates the potential of movable antenna (MA)-enabled micro-mobility to replace UAV-enabled macro-mobility for enhancing physical layer security (PLS) in air-to-ground communications. While UAV trajectory optimization offers high flexibility and Line-of-Sight (LoS) advantages, it suffers from significant energy consumption, latency, and complex trajectory optimization. Conversely, MA technology provides fine-grained spatial reconfiguration (antenna positioning within a confined area) with ultra-low energy overhead and millisecond-scale response, enabling real-time channel manipulation and covert beam steering. To systematically compare these paradigms, we establish a dual-scale mobility framework where a UAV-mounted uniform linear array (ULA) serves as a base station transmitting confidential information to a legitimate user (Bob) in the presence of an eavesdropper (Eve). We formulate non-convex average secrecy rate (ASR) maximization problems for both schemes: 1) MA-based micro-mobility: Jointly optimizing antenna positions and beamforming (BF) vectors under positioning constraints; 2) UAV-based macro-mobility: Jointly optimizing the UAV’s trajectory and BF vectors under kinematic constraints. Extensive simulations reveal distinct operational regimes: MA micro-mobility demonstrates significant ASR advantages in low-transmit-power scenarios or under antenna constraints due to its energy-efficient spatial control. Conversely, UAV macro-mobility excels under resource-sufficient conditions (higher power, larger antenna arrays) by leveraging global mobility for optimal positioning. The findings highlight the complementary strengths of both approaches, suggesting hybrid micro-macro mobility as a promising direction for balancing security, energy efficiency, and deployment complexity in future wireless networks.
{"title":"Can Movable Antenna-Enabled Micro-Mobility Replace UAV-Enabled Macro-Mobility? A Physical Layer Security Perspective","authors":"Kaixuan Li;Kan Yu;Dingyou Ma;Yujia Zhao;Xiaowu Liu;Qixun Zhang;Zhiyong Feng","doi":"10.1109/TMC.2025.3624340","DOIUrl":"https://doi.org/10.1109/TMC.2025.3624340","url":null,"abstract":"This paper investigates the potential of movable antenna (MA)-enabled micro-mobility to replace UAV-enabled macro-mobility for enhancing physical layer security (PLS) in air-to-ground communications. While UAV trajectory optimization offers high flexibility and Line-of-Sight (LoS) advantages, it suffers from significant energy consumption, latency, and complex trajectory optimization. Conversely, MA technology provides fine-grained spatial reconfiguration (antenna positioning within a confined area) with ultra-low energy overhead and millisecond-scale response, enabling real-time channel manipulation and covert beam steering. To systematically compare these paradigms, we establish a dual-scale mobility framework where a UAV-mounted uniform linear array (ULA) serves as a base station transmitting confidential information to a legitimate user (Bob) in the presence of an eavesdropper (Eve). We formulate non-convex average secrecy rate (ASR) maximization problems for both schemes: 1) MA-based micro-mobility: Jointly optimizing antenna positions and beamforming (BF) vectors under positioning constraints; 2) UAV-based macro-mobility: Jointly optimizing the UAV’s trajectory and BF vectors under kinematic constraints. Extensive simulations reveal distinct operational regimes: MA micro-mobility demonstrates significant ASR advantages in low-transmit-power scenarios or under antenna constraints due to its energy-efficient spatial control. Conversely, UAV macro-mobility excels under resource-sufficient conditions (higher power, larger antenna arrays) by leveraging global mobility for optimal positioning. The findings highlight the complementary strengths of both approaches, suggesting hybrid micro-macro mobility as a promising direction for balancing security, energy efficiency, and deployment complexity in future wireless networks.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4317-4330"},"PeriodicalIF":9.2,"publicationDate":"2025-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-22DOI: 10.1109/TMC.2025.3623732
Jiayun Yan;Jie Chen;Haifeng Qian;Jianting Ning;Debiao He
Mobile social networks (MSNs) are integral to the digital era, but the current architectures raise fundamental challenges to user privacy and security. First, these systems rely on a trusted authority, which causes the single point of failure and raises concerns about data leakage. Second, there is a lack of cryptographic mechanisms to enforce bilateral access control, which ensures mutual consent communication by both senders and receivers. Therefore, it’s necessary to design a system to eliminate single-point trust and accurate consent-based matchmaking access control between users. To address these issues, we propose a decentralized multi-authority identity-based matchmaking encryption (DMA-IBME) scheme, including its formal syntax and security definitions. This primitive enables bilateral access control, which ensures both data privacy and user authenticity. Moreover, we formally prove the security of our scheme in the random oracle model under the standard bilinear Diffie-Hellman ($mathsf {BDH}$) assumption. Performance evaluation demonstrates the efficiency of our scheme. Compared to existing works, our construction reduces the setup time by approximately 50% and the encryption key generation time by 30%. Furthermore, the storage costs for public parameters, encryption keys, and ciphertexts are reduced by approximately 30%, 30%, and 88%, respectively.
{"title":"Decentralized Multi-Authority Accurate Matchmaking Encryption Scheme for Mobile Social Networks","authors":"Jiayun Yan;Jie Chen;Haifeng Qian;Jianting Ning;Debiao He","doi":"10.1109/TMC.2025.3623732","DOIUrl":"https://doi.org/10.1109/TMC.2025.3623732","url":null,"abstract":"Mobile social networks (MSNs) are integral to the digital era, but the current architectures raise fundamental challenges to user privacy and security. First, these systems rely on a trusted authority, which causes the single point of failure and raises concerns about data leakage. Second, there is a lack of cryptographic mechanisms to enforce bilateral access control, which ensures mutual consent communication by both senders and receivers. Therefore, it’s necessary to design a system to eliminate single-point trust and accurate consent-based matchmaking access control between users. To address these issues, we propose a decentralized multi-authority identity-based matchmaking encryption (DMA-IBME) scheme, including its formal syntax and security definitions. This primitive enables bilateral access control, which ensures both data privacy and user authenticity. Moreover, we formally prove the security of our scheme in the random oracle model under the standard bilinear Diffie-Hellman (<inline-formula><tex-math>$mathsf {BDH}$</tex-math></inline-formula>) assumption. Performance evaluation demonstrates the efficiency of our scheme. Compared to existing works, our construction reduces the setup time by approximately 50% and the encryption key generation time by 30%. Furthermore, the storage costs for public parameters, encryption keys, and ciphertexts are reduced by approximately 30%, 30%, and 88%, respectively.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4381-4392"},"PeriodicalIF":9.2,"publicationDate":"2025-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-22DOI: 10.1109/TMC.2025.3623636
Long He;Geng Sun;Zemin Sun;Jiacheng Wang;Hongyang Du;Dusit Niyato;Jiangchuan Liu;Victor C. M. Leung
The emergence of space-air-ground integrated multi-access edge computing (SAGIMEC) networks opens a significant opportunity for the rapidly growing low altitude economy (LAE), facilitating the development of various applications by offering efficient communication and computing services. However, the heterogeneous nature of SAGIMEC networks, coupled with the stringent computational and communication requirements of diverse applications in the LAE, introduces considerable challenges in integrating SAGIMEC into the LAE. In this work, we first present a digital twin-assisted SAGIMEC paradigm for LAE, where digital twin enables reliable network monitoring and management, while SAGIMEC provides efficient computing offloading services for Internet of Things sensor devices (ISDs). Then, a joint satellite selection, computation offloading, communication resource allocation, computation resource allocation and uncrewed aerial vehicle (UAV) trajectory control optimization problem ($text{JSC}^{4}text{OP}$) is formulated to maximize the quality of service (QoS) of ISDs. Given the complexity of $text{JSC}^{4}text{OP}$, we propose an online decentralized optimization approach (ODOA) to address the problem. Specifically, $text{JSC}^{4}text{OP}$ is first transformed into a real-time decision-making optimization problem (RDOP) by leveraging Lyapunov optimization. Then, to solve the RDOP, we introduce an online learning-based latency prediction method to predict the uncertain system environment and a game theoretic decision-making method to make real-time decisions. Finally, theoretical analysis confirms the effectiveness of the ODOA. Simulation results show that the proposed ODOA outperforms various benchmark approaches and improves the QoS of ISDs by at least 14.5% compared to deep reinforcement learning (DRL)-based approaches, thereby validating the superiority of the proposed approach.
{"title":"Digital Twin-Assisted Space-Air-Ground Integrated Multi-Access Edge Computing for Low-Altitude Economy: An Online Decentralized Optimization Approach","authors":"Long He;Geng Sun;Zemin Sun;Jiacheng Wang;Hongyang Du;Dusit Niyato;Jiangchuan Liu;Victor C. M. Leung","doi":"10.1109/TMC.2025.3623636","DOIUrl":"https://doi.org/10.1109/TMC.2025.3623636","url":null,"abstract":"The emergence of space-air-ground integrated multi-access edge computing (SAGIMEC) networks opens a significant opportunity for the rapidly growing low altitude economy (LAE), facilitating the development of various applications by offering efficient communication and computing services. However, the heterogeneous nature of SAGIMEC networks, coupled with the stringent computational and communication requirements of diverse applications in the LAE, introduces considerable challenges in integrating SAGIMEC into the LAE. In this work, we first present a digital twin-assisted SAGIMEC paradigm for LAE, where digital twin enables reliable network monitoring and management, while SAGIMEC provides efficient computing offloading services for Internet of Things sensor devices (ISDs). Then, a <u><b>j</b></u>oint <u><b>s</b></u>atellite selection, <u><b>c</b></u>omputation offloading, <u><b>c</b></u>ommunication resource allocation, <u><b>c</b></u>omputation resource allocation and uncrewed aerial vehicle (UAV) trajectory <u><b>c</b></u>ontrol optimization problem (<inline-formula><tex-math>$text{JSC}^{4}text{OP}$</tex-math></inline-formula>) is formulated to maximize the quality of service (QoS) of ISDs. Given the complexity of <inline-formula><tex-math>$text{JSC}^{4}text{OP}$</tex-math></inline-formula>, we propose an online decentralized optimization approach (ODOA) to address the problem. Specifically, <inline-formula><tex-math>$text{JSC}^{4}text{OP}$</tex-math></inline-formula> is first transformed into a real-time decision-making optimization problem (RDOP) by leveraging Lyapunov optimization. Then, to solve the RDOP, we introduce an online learning-based latency prediction method to predict the uncertain system environment and a game theoretic decision-making method to make real-time decisions. Finally, theoretical analysis confirms the effectiveness of the ODOA. Simulation results show that the proposed ODOA outperforms various benchmark approaches and improves the QoS of ISDs by at least 14.5% compared to deep reinforcement learning (DRL)-based approaches, thereby validating the superiority of the proposed approach.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"25 3","pages":"4363-4380"},"PeriodicalIF":9.2,"publicationDate":"2025-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146116875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}