首页 > 最新文献

IEEE Systems Journal最新文献

英文 中文
Dynamic Clustering-Based Time Synchronization for PLC-TWACS Integrated Multimodal Power IoT in Smart Park 基于动态聚类的智能园区 PLC-TWACS 集成多模式电力物联网时间同步
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-15 DOI: 10.1109/JSYST.2024.3393232
Bin Liao;Yutong Wang;Jiapeng Xue;Zhenyu Zhou;Sunxuan Zhang;Xiaomei Chen
Power Internet of Things devices deployed in smart parks have strict time synchronization requirements. However, due to the limited availability of 4-G/5-G, optical fiber, and satellite, how to achieve low-cost, reliable, and efficient time synchronization based on existing power line carrier (PLC) and two-way power frequency automatic communication system (TWACS) integrated multimodal communication has become a key challenge. Motivated by this, a cluster-based time synchronization network structure is proposed that seamlessly integrates PLC and TWACS, which provides an accurate synchronization model by comprehensively considering frequency offset, timestamp recorded error, timestamp jitter error, and transmission delay. Moreover, we incorporate digital phase-locked loop to compensate synchronization error by correcting frequency offset in clusters. The goal is to realize the minimization of the average time synchronization error within clusters. To achieve this goal, we introduce a coalition formation game-based dynamic clustering algorithm (CFG-DC), designed to effectively address the proposed optimization challenge. CFG-DC achieves dynamic clustering with consideration of time synchronization error awareness by performing leave-and-join decision iteratively to maximize synchronization error-based utility function. Simulation distinctly demonstrate the remarkable achievement of CFG-DC in attaining heightened levels of accuracy in time synchronization.
部署在智慧园区的电力物联网设备对时间同步有严格要求。然而,由于 4-G/5-G、光纤和卫星的可用性有限,如何在现有电力线载波(PLC)和双向工频自动通信系统(TWACS)集成多模通信的基础上实现低成本、可靠、高效的时间同步成为关键挑战。为此,我们提出了一种基于集群的时间同步网络结构,它将 PLC 和 TWACS 无缝集成,综合考虑了频率偏移、时间戳记录误差、时间戳抖动误差和传输延迟,提供了精确的同步模型。此外,我们还结合了数字锁相环,通过校正集群中的频率偏移来补偿同步误差。目标是实现集群内平均时间同步误差最小化。为实现这一目标,我们引入了一种基于联盟形成博弈的动态聚类算法(CFG-DC),旨在有效解决所提出的优化难题。CFG-DC 考虑了时间同步误差意识,通过迭代执行离开和加入决策来最大化基于同步误差的效用函数,从而实现动态聚类。仿真清楚地表明,CFG-DC 在实现更高水平的时间同步精度方面取得了显著成就。
{"title":"Dynamic Clustering-Based Time Synchronization for PLC-TWACS Integrated Multimodal Power IoT in Smart Park","authors":"Bin Liao;Yutong Wang;Jiapeng Xue;Zhenyu Zhou;Sunxuan Zhang;Xiaomei Chen","doi":"10.1109/JSYST.2024.3393232","DOIUrl":"10.1109/JSYST.2024.3393232","url":null,"abstract":"Power Internet of Things devices deployed in smart parks have strict time synchronization requirements. However, due to the limited availability of 4-G/5-G, optical fiber, and satellite, how to achieve low-cost, reliable, and efficient time synchronization based on existing power line carrier (PLC) and two-way power frequency automatic communication system (TWACS) integrated multimodal communication has become a key challenge. Motivated by this, a cluster-based time synchronization network structure is proposed that seamlessly integrates PLC and TWACS, which provides an accurate synchronization model by comprehensively considering frequency offset, timestamp recorded error, timestamp jitter error, and transmission delay. Moreover, we incorporate digital phase-locked loop to compensate synchronization error by correcting frequency offset in clusters. The goal is to realize the minimization of the average time synchronization error within clusters. To achieve this goal, we introduce a coalition formation game-based dynamic clustering algorithm (CFG-DC), designed to effectively address the proposed optimization challenge. CFG-DC achieves dynamic clustering with consideration of time synchronization error awareness by performing leave-and-join decision iteratively to maximize synchronization error-based utility function. Simulation distinctly demonstrate the remarkable achievement of CFG-DC in attaining heightened levels of accuracy in time synchronization.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1296-1307"},"PeriodicalIF":4.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141058603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Observer-Centric Approach for Detecting Faults in Islanded AC Microgrids With Uncertainties 一种以观测器为中心的新方法,用于检测具有不确定性的岛式交流微电网故障
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-12 DOI: 10.1109/JSYST.2024.3365801
Gabriel Intriago;Andres Intriago;Charalambos Konstantinou;Yu Zhang
Fault detection (FD) is vital in ensuring ac microgrids' reliable and resilient operation. Its importance lies in swiftly identifying and isolating faults, preventing cascading failures, and enabling rapid power restoration. This article proposes a strategy based on observers and residuals for detecting internal faults in grid-forming inverters with power-sharing coordination. The dynamics of the inverters are captured through a nonlinear state-space model. The design of our observers and residuals considers $H_{-}/H_{infty }$ conditions to ensure robustness against disturbances and responsiveness to faults. The proposed design is less restrictive than existing observer-based FD schemes by leveraging the properties of quadratic inner-boundedness and one-sided Lipschitz conditions. The internal faults considered in this article include actuator faults, busbar faults, and inverter bridge faults, which are modeled using vector–matrix representations that modify the state-space model of the inverters. One significant advantage of the proposed approach is its cost-effectiveness, as it does not require additional sensors. Experiments are conducted on an islanded ac microgrid with three inductive lines, four inductive loads, and four grid-forming inverters to validate the merits of the proposed FD strategy. The results demonstrate that our design outperforms existing methods in the field.
故障检测(FD)对于确保交流微电网的可靠和弹性运行至关重要。其重要性在于迅速识别和隔离故障、防止级联故障并实现快速电力恢复。本文提出了一种基于观测器和残差的策略,用于检测具有功率共享协调功能的成网逆变器的内部故障。通过非线性状态空间模型捕捉逆变器的动态。我们的观测器和残差的设计考虑了 $H_{-}/H_{infty }$ 条件,以确保对干扰的鲁棒性和对故障的响应能力。与现有的基于观测器的 FD 方案相比,本文提出的设计方案利用了二次内界性和单边 Lipschitz 条件的特性,限制较少。本文考虑的内部故障包括致动器故障、母线故障和逆变器桥故障,这些故障使用向量矩阵表示法建模,修改了逆变器的状态空间模型。所提方法的一个显著优势是成本效益高,因为它不需要额外的传感器。我们在一个具有三条电感线路、四个电感负载和四个电网形成逆变器的孤岛交流微电网上进行了实验,以验证所提议的 FD 策略的优点。结果表明,我们的设计优于现有的现场方法。
{"title":"A Novel Observer-Centric Approach for Detecting Faults in Islanded AC Microgrids With Uncertainties","authors":"Gabriel Intriago;Andres Intriago;Charalambos Konstantinou;Yu Zhang","doi":"10.1109/JSYST.2024.3365801","DOIUrl":"10.1109/JSYST.2024.3365801","url":null,"abstract":"Fault detection (FD) is vital in ensuring ac microgrids' reliable and resilient operation. Its importance lies in swiftly identifying and isolating faults, preventing cascading failures, and enabling rapid power restoration. This article proposes a strategy based on observers and residuals for detecting internal faults in grid-forming inverters with power-sharing coordination. The dynamics of the inverters are captured through a nonlinear state-space model. The design of our observers and residuals considers \u0000<inline-formula><tex-math>$H_{-}/H_{infty }$</tex-math></inline-formula>\u0000 conditions to ensure robustness against disturbances and responsiveness to faults. The proposed design is less restrictive than existing observer-based FD schemes by leveraging the properties of quadratic inner-boundedness and one-sided Lipschitz conditions. The internal faults considered in this article include actuator faults, busbar faults, and inverter bridge faults, which are modeled using vector–matrix representations that modify the state-space model of the inverters. One significant advantage of the proposed approach is its cost-effectiveness, as it does not require additional sensors. Experiments are conducted on an islanded ac microgrid with three inductive lines, four inductive loads, and four grid-forming inverters to validate the merits of the proposed FD strategy. The results demonstrate that our design outperforms existing methods in the field.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1236-1247"},"PeriodicalIF":4.0,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140115316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS Awareness Transmit Beamforming for Secure Backscattering in Symbiotic Radio Networks 面向共生无线电系统安全反向散射的服务质量感知发射波束成形
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-10 DOI: 10.1109/JSYST.2024.3396176
Mingcheng Nie;Deepak Mishra;Azzam Al-nahari;Jinhong Yuan;Riku Jäntti
This article presents secure backscatter transmission against a multiantenna eavesdropper in a symbiotic radio (SR) system, where a single-antenna backscatter device (BD) can transmit confidential information to a primary receiver via a multiantenna primary transmitter's signal. The primary receiver jointly decodes the received signals. The aim is to ensure secure communication for BD while meeting the quality of service (QoS) requirements of the primary system. This article investigates two practical SR systems based on the eavesdropper's available channel state information (CSI). First, when the full CSI is known, an alternating optimization algorithm is proposed that maximizes the achievable secrecy rate of BD by jointly optimizing primary transmit beamforming and power sharing between information and artificial noise (AN) signals. Second, when no eavesdropper CSI is available, it is impossible to determine a secrecy rate expression. Consequently, secrecy communication is achieved by an AN-assisted optimal beamforming scheme where a minimum transmit power is used to meet the QoS constraints of the primary and backscatter systems before utilizing the remaining power for random AN to jam the eavesdropper. Successive convex approximation-based solutions are also obtained for comparison. Simulations verify the key analytical claims, provide nontrivial design insights, and quantify the achievable gains over the relevant benchmarks.
本文介绍了在共生无线电(SR)系统中针对多天线窃听者的安全反向散射传输,其中单天线反向散射装置(BD)可通过多天线主发射器的信号向主接收器传输机密信息。主接收器对接收到的信号进行联合解码。其目的是确保 BD 的安全通信,同时满足主系统的服务质量(QoS)要求。本文研究了两种基于窃听者可用信道状态信息(CSI)的实用 SR 系统。首先,在已知完整 CSI 的情况下,提出了一种交替优化算法,通过联合优化主发射波束成形以及信息和人工噪声(AN)信号之间的功率共享,最大化 BD 的可实现保密率。其次,当没有窃听者 CSI 时,无法确定保密率表达式。因此,保密通信是通过人工噪音辅助优化波束成形方案来实现的,该方案使用最小发射功率来满足主系统和反向散射系统的服务质量限制,然后再利用剩余功率进行随机人工噪音干扰窃听者。为了进行比较,还获得了基于凸近似的连续解决方案。仿真验证了关键的分析主张,提供了非同一般的设计见解,并量化了与相关基准相比可实现的增益。
{"title":"QoS Awareness Transmit Beamforming for Secure Backscattering in Symbiotic Radio Networks","authors":"Mingcheng Nie;Deepak Mishra;Azzam Al-nahari;Jinhong Yuan;Riku Jäntti","doi":"10.1109/JSYST.2024.3396176","DOIUrl":"10.1109/JSYST.2024.3396176","url":null,"abstract":"This article presents secure backscatter transmission against a multiantenna eavesdropper in a symbiotic radio (SR) system, where a single-antenna backscatter device (BD) can transmit confidential information to a primary receiver via a multiantenna primary transmitter's signal. The primary receiver jointly decodes the received signals. The aim is to ensure secure communication for BD while meeting the quality of service (QoS) requirements of the primary system. This article investigates two practical SR systems based on the eavesdropper's available channel state information (CSI). First, when the full CSI is known, an alternating optimization algorithm is proposed that maximizes the achievable secrecy rate of BD by jointly optimizing primary transmit beamforming and power sharing between information and artificial noise (AN) signals. Second, when no eavesdropper CSI is available, it is impossible to determine a secrecy rate expression. Consequently, secrecy communication is achieved by an AN-assisted optimal beamforming scheme where a minimum transmit power is used to meet the QoS constraints of the primary and backscatter systems before utilizing the remaining power for random AN to jam the eavesdropper. Successive convex approximation-based solutions are also obtained for comparison. Simulations verify the key analytical claims, provide nontrivial design insights, and quantify the achievable gains over the relevant benchmarks.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1356-1367"},"PeriodicalIF":4.0,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reputation-Based Evidential Reasoning Approach Improves Cooperative Evolution of Supply Chain Network Under Disruption Risk 基于声誉的证据推理方法改进了中断风险下供应链网络的合作演化
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-10 DOI: 10.1109/JSYST.2024.3396231
Xiaoxia Huang;Peng Guo;Ding Wang;Xiaonan Wang;Chengbin Sun
In the supply chain network frequently facing disruption risk, sustaining a high reputation is essential for ensuring long-term sustainability. While existing studies have investigated how reputation evidence influences the overall network structure and cooperative behaviors, they have not extensively examined how variations in reputation evidence affect cooperative dynamics in the bipartite graph consisting of upstream and downstream enterprises. To bridge this gap, our research introduces a novel, reputation-based approach utilizing evidential reasoning theory to assess dynamic environments prone to disruption risk. This improved approach assigns specific weights and reliability to reputation evidence. In this article, we analyze the evolution of cooperation between upstream and downstream enterprises in the supply chain, considering varied distributions of reputation evidence. We also conduct numerical simulations to evaluate the impact of these reputation distributions on the cooperative evolution of the supply chain network under diverse disruption scenarios, including both direct and indirect risks. Our findings offer insightful guidance for managers to refine their reputation distribution strategies, effectively navigate different disruption risk scenarios, and lessen negative impacts on cooperation. Moreover, our study provides significant implications for partner selection and managing disruption risk in a dynamic and uncertain supply chain network.
在经常面临中断风险的供应链网络中,保持高声誉对于确保长期可持续性至关重要。虽然现有研究已经探究了声誉证据如何影响整体网络结构和合作行为,但还没有广泛研究声誉证据的变化如何影响由上下游企业组成的双向图中的合作动态。为了弥补这一差距,我们的研究引入了一种基于声誉的新方法,利用证据推理理论来评估易受干扰风险影响的动态环境。这种改进的方法为声誉证据分配了特定的权重和可靠性。在本文中,我们分析了供应链中上下游企业之间合作的演变,并考虑了声誉证据的不同分布。我们还进行了数值模拟,以评估这些声誉分布在不同的中断情景(包括直接和间接风险)下对供应链网络合作演化的影响。我们的研究结果为管理者提供了深刻的指导,帮助他们完善声誉分布策略,有效驾驭不同的破坏风险情景,减少对合作的负面影响。此外,我们的研究还为在动态和不确定的供应链网络中选择合作伙伴和管理中断风险提供了重要启示。
{"title":"Reputation-Based Evidential Reasoning Approach Improves Cooperative Evolution of Supply Chain Network Under Disruption Risk","authors":"Xiaoxia Huang;Peng Guo;Ding Wang;Xiaonan Wang;Chengbin Sun","doi":"10.1109/JSYST.2024.3396231","DOIUrl":"10.1109/JSYST.2024.3396231","url":null,"abstract":"In the supply chain network frequently facing disruption risk, sustaining a high reputation is essential for ensuring long-term sustainability. While existing studies have investigated how reputation evidence influences the overall network structure and cooperative behaviors, they have not extensively examined how variations in reputation evidence affect cooperative dynamics in the bipartite graph consisting of upstream and downstream enterprises. To bridge this gap, our research introduces a novel, reputation-based approach utilizing evidential reasoning theory to assess dynamic environments prone to disruption risk. This improved approach assigns specific weights and reliability to reputation evidence. In this article, we analyze the evolution of cooperation between upstream and downstream enterprises in the supply chain, considering varied distributions of reputation evidence. We also conduct numerical simulations to evaluate the impact of these reputation distributions on the cooperative evolution of the supply chain network under diverse disruption scenarios, including both direct and indirect risks. Our findings offer insightful guidance for managers to refine their reputation distribution strategies, effectively navigate different disruption risk scenarios, and lessen negative impacts on cooperation. Moreover, our study provides significant implications for partner selection and managing disruption risk in a dynamic and uncertain supply chain network.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"848-859"},"PeriodicalIF":4.0,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-UAV-Assisted Offloading for Joint Optimization of Energy Consumption and Latency in Mobile Edge Computing 多无人机辅助卸载,联合优化移动边缘计算的能耗和延迟
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-09 DOI: 10.1109/JSYST.2024.3395845
Qiang Tang;Sihao Wen;Shiming He;Kun Yang
To address the performance limitations caused by the insufficient computing capacity and energy of edge internet of things devices (IoTDs), we proposed a multi-unmanned aerial vehicles (UAV)-assisted mobile edge computing (MEC) application framework in this article. In this framework, UAVs equipped with high-performance computing devices act as aerial servers deployed in the target area to support data offloading and task computing for IoTDs. We formulated an optimization problem to jointly optimize the connection scheduling, computing resource allocation, and UAVs' flying trajectories, considering the device offloading priority, to achieve a joint optimization of energy consumption and latency for all IoTDs during a given time period. Subsequently, to address this problem, we employed deep reinforcement learning for dynamic trajectory planning, supplemented by optimization theory and heuristic algorithm based on matching theory to assist in solving connection scheduling and computing resource allocation. To evaluate the performance of proposed algorithm, we compared it with deep deterministic policy gradient, particle swarm optimization, random moving, and local execution schemes. Simulation results demonstrated that the multi-UAV-assisted MEC significantly reduces the computing cost of IoTDs. Moreover, our proposed solution exhibited effectiveness in terms of convergence and optimization of computing costs compared to other benchmark schemes.
为解决边缘物联网设备(IoTD)计算能力和能源不足所造成的性能限制,我们在本文中提出了一种多无人机辅助移动边缘计算(MEC)应用框架。在该框架中,配备高性能计算设备的无人机充当部署在目标区域的空中服务器,为物联网设备的数据卸载和任务计算提供支持。我们提出了一个优化问题,即在考虑设备卸载优先级的情况下,联合优化连接调度、计算资源分配和无人机飞行轨迹,以实现给定时间段内所有物联网终端的能耗和延迟的联合优化。随后,针对这一问题,我们采用深度强化学习进行动态轨迹规划,并辅以优化理论和基于匹配理论的启发式算法来辅助解决连接调度和计算资源分配问题。为了评估所提算法的性能,我们将其与深度确定性策略梯度、粒子群优化、随机移动和局部执行方案进行了比较。仿真结果表明,多无人机辅助 MEC 大幅降低了 IoTD 的计算成本。此外,与其他基准方案相比,我们提出的解决方案在收敛性和计算成本优化方面表现出了有效性。
{"title":"Multi-UAV-Assisted Offloading for Joint Optimization of Energy Consumption and Latency in Mobile Edge Computing","authors":"Qiang Tang;Sihao Wen;Shiming He;Kun Yang","doi":"10.1109/JSYST.2024.3395845","DOIUrl":"10.1109/JSYST.2024.3395845","url":null,"abstract":"To address the performance limitations caused by the insufficient computing capacity and energy of edge internet of things devices (IoTDs), we proposed a multi-unmanned aerial vehicles (UAV)-assisted mobile edge computing (MEC) application framework in this article. In this framework, UAVs equipped with high-performance computing devices act as aerial servers deployed in the target area to support data offloading and task computing for IoTDs. We formulated an optimization problem to jointly optimize the connection scheduling, computing resource allocation, and UAVs' flying trajectories, considering the device offloading priority, to achieve a joint optimization of energy consumption and latency for all IoTDs during a given time period. Subsequently, to address this problem, we employed deep reinforcement learning for dynamic trajectory planning, supplemented by optimization theory and heuristic algorithm based on matching theory to assist in solving connection scheduling and computing resource allocation. To evaluate the performance of proposed algorithm, we compared it with deep deterministic policy gradient, particle swarm optimization, random moving, and local execution schemes. Simulation results demonstrated that the multi-UAV-assisted MEC significantly reduces the computing cost of IoTDs. Moreover, our proposed solution exhibited effectiveness in terms of convergence and optimization of computing costs compared to other benchmark schemes.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1414-1425"},"PeriodicalIF":4.0,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online-Learning-Based Multi-RIS-Aided Wireless Systems 基于在线学习的多 RIS 辅助无线系统
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-07 DOI: 10.1109/JSYST.2024.3391856
Ishaan Sharma;Rohit Kumar;Sumit J. Darak
The evolution of software-defined radios and reconfigurable intelligent surfaces (RIS) has enabled on-the-fly control and reconfigurability at the physical layer parameters and radio propagation environment. In multi-RIS-aided communication, the RIS block, comprising a certain number of RIS elements from one or more RIS, is selected to achieve high throughput reliable communication between transmitter and receiver. However, selecting an RIS block when there are multiple RIS and receivers is not trivial due to the large number of candidate blocks. In this article, a novel multiarmed bandit (MAB) framework, which can learn and select the optimal RIS block using focused exploration, is proposed. We provide the theoretical regret bound for the proposed algorithm and demonstrate the gain in performance over existing state-of-the-art statistical and MAB approaches via detailed simulation results in terms of rate, ergodic capacity, outage probability, energy efficiency, and received SNR. The proposed algorithm offers 33%–85% lower latency than existing MAB algorithms on various edge platforms. Furthermore, the gain in performance and latency improves with the increase in the number and size of the RIS in the network.
软件定义无线电和可重新配置智能表面(RIS)的发展实现了对物理层参数和无线电传播环境的实时控制和重新配置。在多 RIS 辅助通信中,从一个或多个 RIS 中选择由一定数量的 RIS 元素组成的 RIS 块,以实现发射器和接收器之间的高吞吐量可靠通信。然而,由于候选块数量众多,在有多个 RIS 和接收器的情况下选择 RIS 块并非易事。本文提出了一种新颖的多臂匪徒(MAB)框架,它可以通过集中探索来学习和选择最佳 RIS 块。我们提供了所提算法的理论遗憾边界,并通过详细的仿真结果,从速率、遍历容量、中断概率、能效和接收信噪比等方面证明了与现有的最先进统计方法和 MAB 方法相比,所提算法在性能上的优势。在各种边缘平台上,拟议算法的延迟比现有 MAB 算法低 33%-85%。此外,随着网络中 RIS 数量和规模的增加,性能和延迟方面的增益也会提高。
{"title":"Online-Learning-Based Multi-RIS-Aided Wireless Systems","authors":"Ishaan Sharma;Rohit Kumar;Sumit J. Darak","doi":"10.1109/JSYST.2024.3391856","DOIUrl":"10.1109/JSYST.2024.3391856","url":null,"abstract":"The evolution of software-defined radios and reconfigurable intelligent surfaces (RIS) has enabled on-the-fly control and reconfigurability at the physical layer parameters and radio propagation environment. In multi-RIS-aided communication, the RIS block, comprising a certain number of RIS elements from one or more RIS, is selected to achieve high throughput reliable communication between transmitter and receiver. However, selecting an RIS block when there are multiple RIS and receivers is not trivial due to the large number of candidate blocks. In this article, a novel multiarmed bandit (MAB) framework, which can learn and select the optimal RIS block using focused exploration, is proposed. We provide the theoretical regret bound for the proposed algorithm and demonstrate the gain in performance over existing state-of-the-art statistical and MAB approaches via detailed simulation results in terms of rate, ergodic capacity, outage probability, energy efficiency, and received SNR. The proposed algorithm offers 33%–85% lower latency than existing MAB algorithms on various edge platforms. Furthermore, the gain in performance and latency improves with the increase in the number and size of the RIS in the network.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1174-1185"},"PeriodicalIF":4.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational Secure Physical Layer Algorithm for MIMO Wireless Systems 多输入多输出无线系统的计算安全物理层算法
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-06 DOI: 10.1109/JSYST.2024.3370613
Raed Mesleh;Sahel Alouneh;Omar Hiari
A computationally secure physical layer wireless communication multiple-input–multiple-output (MIMO) system is proposed and analyzed in this article. The proposed algorithm is shown to be general for arbitrary MIMO systems, and very robust against brute–force attacks and cryptanalysis techniques. The algorithm relies on the knowledge of the wireless channel statistics between the transmitter and the legitimate receiver through channel reciprocity, which is random and varies every coherence time. Both the transmitter and the legitimate receiver create a permutation vector from the sorted powers of the channel fading paths from each transmit antenna to all receive antennas. The generated permutation vector is used to shuffle the rows of the constellation matrix creating the security key. It is reported that the number of possible combinations is huge, especially for large MIMO configurations, which makes key decryption nearly impossible even with advanced supercomputers. For illustration purposes, several MIMO techniques are considered in this study, including space shift keying (SSK), quadrature SSK, quadrature spatial modulation, and spatial multiplexing.
本文提出并分析了一种计算安全的物理层无线通信多输入多输出(MIMO)系统。研究表明,所提出的算法适用于任意 MIMO 系统,对暴力破解攻击和密码分析技术具有很强的抵抗力。该算法依赖于发射机和合法接收机之间通过信道互易性获得的无线信道统计信息。发射器和合法接收器都会根据从每个发射天线到所有接收天线的信道衰落路径的排序功率创建一个置换向量。生成的置换向量用于洗牌星座矩阵的行,从而创建安全密钥。据报道,可能的组合数量非常大,尤其是对于大型多输入多输出(MIMO)配置而言,即使使用先进的超级计算机,也几乎不可能解密密钥。为了说明问题,本研究考虑了几种多输入多输出技术,包括空间移动键控(SSK)、正交 SSK、正交空间调制和空间多路复用。
{"title":"Computational Secure Physical Layer Algorithm for MIMO Wireless Systems","authors":"Raed Mesleh;Sahel Alouneh;Omar Hiari","doi":"10.1109/JSYST.2024.3370613","DOIUrl":"10.1109/JSYST.2024.3370613","url":null,"abstract":"A computationally secure physical layer wireless communication multiple-input–multiple-output (MIMO) system is proposed and analyzed in this article. The proposed algorithm is shown to be general for arbitrary MIMO systems, and very robust against brute–force attacks and cryptanalysis techniques. The algorithm relies on the knowledge of the wireless channel statistics between the transmitter and the legitimate receiver through channel reciprocity, which is random and varies every coherence time. Both the transmitter and the legitimate receiver create a permutation vector from the sorted powers of the channel fading paths from each transmit antenna to all receive antennas. The generated permutation vector is used to shuffle the rows of the constellation matrix creating the security key. It is reported that the number of possible combinations is huge, especially for large MIMO configurations, which makes key decryption nearly impossible even with advanced supercomputers. For illustration purposes, several MIMO techniques are considered in this study, including space shift keying (SSK), quadrature SSK, quadrature spatial modulation, and spatial multiplexing.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"805-813"},"PeriodicalIF":4.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140054929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECC-Based Certificateless Aggregate Signcryption Scheme in Cyber-Physical Power Systems 网络物理电力系统中基于 ECC 的无证书聚合签名加密方案
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-05 DOI: 10.1109/JSYST.2024.3365848
Xue Li;Renqing Zhu;Dajun Du;Cheng Jiang;Zhe Zhou
The signcryption schemes play an important role in keeping the security of information interactions among the devices in cyber-physical power systems (CPPSs). However, the existing schemes based on bilinear pairing have heavy computation and communication costs, making it challenging to deploy to resource-constrained devices (RCDs). Moreover, the most existing aggregate signcryption schemes do not validate the signcryption ciphertext when the data are aggregated by the aggregation device, jeopardizing the security and stability of the CPPSs. To solve these issues, this article explores a novel certificateless aggregate signcryption scheme based on elliptic curve cryptography applied to information interaction among RCDs of CPPSs. First, a lightweight signcryption scheme is proposed to achieve secure information interaction of RCDs. Then, to efficiently discover illegal signcryption in the aggregate signcryption, a method of constructing a 2-D matrix is proposed, which improves the robustness of secure information interaction. Furthermore, the security of the proposed signcryption scheme is theoretically proven by the elliptic curve discrete logarithm problem and computational Diffie–Hellman problem assumptions, and the scheme is theoretically analyzed to meet the security requirements of RCDs. Finally, experiments are carried out to validate the efficacy and appropriateness of the proposed signcryption scheme.
在网络物理电力系统(CPPS)中,签名加密方案在保证设备间信息交互安全方面发挥着重要作用。然而,现有的基于双线性配对的方案计算和通信成本高昂,因此在资源受限的设备(RCD)中部署具有挑战性。此外,大多数现有的聚合签名加密方案在数据被聚合设备聚合时不会验证签名加密密文,从而危及 CPPS 的安全性和稳定性。为解决这些问题,本文探讨了一种基于椭圆曲线密码学的新型无证书聚合签名加密方案,并将其应用于 CPPS 的 RCD 之间的信息交互。首先,本文提出了一种轻量级签名加密方案,以实现 RCD 之间的安全信息交互。然后,为了有效发现聚合加密中的非法加密,提出了一种构建二维矩阵的方法,从而提高了安全信息交互的鲁棒性。此外,通过椭圆曲线离散对数问题和计算 Diffie-Hellman 问题假设从理论上证明了所提签名加密方案的安全性,并从理论上分析了该方案满足 RCD 的安全要求。最后,通过实验验证了所提签名加密算法的有效性和适用性。
{"title":"ECC-Based Certificateless Aggregate Signcryption Scheme in Cyber-Physical Power Systems","authors":"Xue Li;Renqing Zhu;Dajun Du;Cheng Jiang;Zhe Zhou","doi":"10.1109/JSYST.2024.3365848","DOIUrl":"10.1109/JSYST.2024.3365848","url":null,"abstract":"The signcryption schemes play an important role in keeping the security of information interactions among the devices in cyber-physical power systems (CPPSs). However, the existing schemes based on bilinear pairing have heavy computation and communication costs, making it challenging to deploy to resource-constrained devices (RCDs). Moreover, the most existing aggregate signcryption schemes do not validate the signcryption ciphertext when the data are aggregated by the aggregation device, jeopardizing the security and stability of the CPPSs. To solve these issues, this article explores a novel certificateless aggregate signcryption scheme based on elliptic curve cryptography applied to information interaction among RCDs of CPPSs. First, a lightweight signcryption scheme is proposed to achieve secure information interaction of RCDs. Then, to efficiently discover illegal signcryption in the aggregate signcryption, a method of constructing a 2-D matrix is proposed, which improves the robustness of secure information interaction. Furthermore, the security of the proposed signcryption scheme is theoretically proven by the elliptic curve discrete logarithm problem and computational Diffie–Hellman problem assumptions, and the scheme is theoretically analyzed to meet the security requirements of RCDs. Finally, experiments are carried out to validate the efficacy and appropriateness of the proposed signcryption scheme.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"893-904"},"PeriodicalIF":4.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140045247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable Model Predictive Control for Large Scale Distributed Systems 大规模分布式系统的可重构模型预测控制
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-04 DOI: 10.1109/JSYST.2024.3366911
Jun Chen;Lei Zhang;Weinan Gao
For large scale distributed systems, centralized model predictive control (MPC) often requires high computational resources, while generally distributed MPC can only achieve suboptimal control performance. To address these limitations, this article proposes a new reconfigurable MPC framework for large scale distributed systems, in which an optimal control problem with a time-varying structure is formulated and solved for each control loop. More specifically, at each time step, a subset of the control inputs is dynamically selected to be optimized by MPC, while the previous optimal solution is applied to the remaining control inputs. A theoretical upper bound on the performance loss, due to the fact that only a subset of inputs is optimized, is then derived to guarantee the worst-case performance. To minimize the performance loss, this upper bound is then used to guide the reconfiguration of MPC, i.e., the selection of control inputs for optimization. The applicability of the proposed approach is illustrated through case studies, including battery cell-to-cell balancing control and multivehicle formation control. Numerical results confirm that the proposed approach can achieve better control performance than distributed MPC and requires less computation time than conventional centralized MPC.
对于大规模分布式系统而言,集中式模型预测控制(MPC)往往需要大量计算资源,而分布式 MPC 一般只能实现次优控制性能。为了解决这些局限性,本文提出了一种适用于大规模分布式系统的新的可重构 MPC 框架,其中为每个控制环路制定并求解了一个具有时变结构的最优控制问题。更具体地说,在每个时间步长,控制输入的一个子集会被动态地选择出来通过 MPC 进行优化,而之前的最优解则应用于其余的控制输入。由于只对一个输入子集进行优化,因此会产生性能损失的理论上限,以保证最坏情况下的性能。为了将性能损失降至最低,该上限将用于指导 MPC 的重新配置,即优化控制输入的选择。通过案例研究,包括电池单元间平衡控制和多车编队控制,说明了所提方法的适用性。数值结果证实,与传统的集中式 MPC 相比,所提出的方法可以实现更好的控制性能,而且所需的计算时间更少。
{"title":"Reconfigurable Model Predictive Control for Large Scale Distributed Systems","authors":"Jun Chen;Lei Zhang;Weinan Gao","doi":"10.1109/JSYST.2024.3366911","DOIUrl":"10.1109/JSYST.2024.3366911","url":null,"abstract":"For large scale distributed systems, centralized model predictive control (MPC) often requires high computational resources, while generally distributed MPC can only achieve suboptimal control performance. To address these limitations, this article proposes a new reconfigurable MPC framework for large scale distributed systems, in which an optimal control problem with a time-varying structure is formulated and solved for each control loop. More specifically, at each time step, a subset of the control inputs is dynamically selected to be optimized by MPC, while the previous optimal solution is applied to the remaining control inputs. A theoretical upper bound on the performance loss, due to the fact that only a subset of inputs is optimized, is then derived to guarantee the worst-case performance. To minimize the performance loss, this upper bound is then used to guide the reconfiguration of MPC, i.e., the selection of control inputs for optimization. The applicability of the proposed approach is illustrated through case studies, including battery cell-to-cell balancing control and multivehicle formation control. Numerical results confirm that the proposed approach can achieve better control performance than distributed MPC and requires less computation time than conventional centralized MPC.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"965-976"},"PeriodicalIF":4.0,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140034048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Output Consensus of Heterogeneous Multiagent Systems With Mismatched Uncertainties and Measurement Noises: An ADRC Approach 具有不匹配不确定性和测量噪声的异构多代理系统的输出共识:一种 ADRC 方法
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-04 DOI: 10.1109/JSYST.2024.3368020
Mengling Li;Ze-Hao Wu;Feiqi Deng;Zhi-Liang Zhao
This article addresses the practical output consensus of a class of heterogeneous leader–follower multiagent systems with directed network topology. The total disturbance of each agent, which is the nonlinear coupling effect of disturbances, uncertainties, and measurement noises mismatched with control inputs in large scale, is estimated in real time by a set of extended state observers. Extended state observers-based consensus protocols are then designed to obtain the output consensus, with the total disturbance of each agent be rejected actively. Both the convergence of the tracking error between outputs of all followers and the output of the leader in practical sense and the boundedness of all states are presented with theoretical analysis. Finally, the rationality of the control strategy and main result are verified by a numerical example.
本文探讨了一类具有定向网络拓扑结构的异构领导者-追随者多代理系统的实际输出共识。通过一组扩展状态观测器实时估计每个代理的总扰动,即扰动、不确定性和测量噪声与大规模控制输入不匹配的非线性耦合效应。然后设计基于扩展状态观测器的共识协议,以获得输出共识,并主动拒绝每个代理的总干扰。理论分析了所有跟随者输出与领导者输出之间的实际跟踪误差收敛性以及所有状态的有界性。最后,通过一个数值实例验证了控制策略的合理性和主要结果。
{"title":"Output Consensus of Heterogeneous Multiagent Systems With Mismatched Uncertainties and Measurement Noises: An ADRC Approach","authors":"Mengling Li;Ze-Hao Wu;Feiqi Deng;Zhi-Liang Zhao","doi":"10.1109/JSYST.2024.3368020","DOIUrl":"10.1109/JSYST.2024.3368020","url":null,"abstract":"This article addresses the practical output consensus of a class of heterogeneous leader–follower multiagent systems with directed network topology. The total disturbance of each agent, which is the nonlinear coupling effect of disturbances, uncertainties, and measurement noises mismatched with control inputs in large scale, is estimated in real time by a set of extended state observers. Extended state observers-based consensus protocols are then designed to obtain the output consensus, with the total disturbance of each agent be rejected actively. Both the convergence of the tracking error between outputs of all followers and the output of the leader in practical sense and the boundedness of all states are presented with theoretical analysis. Finally, the rationality of the control strategy and main result are verified by a numerical example.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"1436-1446"},"PeriodicalIF":4.0,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140033961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Systems Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1