首页 > 最新文献

IEEE Systems Journal最新文献

英文 中文
A High-Dimensional Dynamic Characteristics-Based Boundary Test Scenario Generation Method for UAVs in Dynamic Target Tracking 基于高维动态特性的无人机动态目标跟踪边界测试场景生成方法
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-24 DOI: 10.1109/JSYST.2025.3554840
Dezhen Yang;Yeyang Liu;Yi Ren;Xiaobin Li;Zili Wang
Effective boundary scenario generation methods are critical for dynamic target tracking when evaluating the performance of unmanned aerial vehicles. However, traditional methods primarily rely on exhaustive testing or random sampling and often assume that different contributing factors are independent. This results in the ineffective generation of boundary scenarios and a lack of realism. In this study, a novel high-dimensional dynamic characteristics-based boundary test scenario generation method is proposed using reinforcement learning (RL). Boundary test scenarios can be explored more purposive, by designing an appropriate reward function. First, an innovative scenario modeling method is developed to model the influence of environment, occlusion, and other interference. A joint distribution model of the key correlation factors, such as light intensity and clouds, is also established. This ensures scenario authenticity and test accuracy. Subsequently, a high-dimensional dynamic spatial Markov decision process (HDDS-MDP) model is constructed to facilitate the generation of boundary scenarios based on the scenario modeling. Ultimately, RL is employed to solve the HDDS-MDP model and generate boundary test scenario, thereby substantially improves the effectiveness of boundary test scenario generation. The simulation results indicate that the boundary test scenario generation effectiveness is improved by 91% over random sampling methods.
在评估无人机性能时,有效的边界场景生成方法是动态目标跟踪的关键。然而,传统的方法主要依赖于彻底的测试或随机抽样,并且经常假设不同的影响因素是独立的。这导致边界场景的无效生成和缺乏现实性。本文提出了一种基于强化学习的高维动态特征边界测试场景生成方法。通过设计适当的奖励函数,可以更有目的地探索边界测试场景。首先,提出了一种创新的场景建模方法,对环境、遮挡和其他干扰的影响进行建模。建立了光强和云量等关键相关因子的联合分布模型。这确保了场景的真实性和测试的准确性。在此基础上,构建了高维动态空间马尔可夫决策过程(HDDS-MDP)模型,便于边界场景的生成。最终,RL用于求解HDDS-MDP模型并生成边界测试场景,从而大大提高了边界测试场景生成的有效性。仿真结果表明,该方法的边界测试场景生成效率比随机抽样方法提高了91%。
{"title":"A High-Dimensional Dynamic Characteristics-Based Boundary Test Scenario Generation Method for UAVs in Dynamic Target Tracking","authors":"Dezhen Yang;Yeyang Liu;Yi Ren;Xiaobin Li;Zili Wang","doi":"10.1109/JSYST.2025.3554840","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3554840","url":null,"abstract":"Effective boundary scenario generation methods are critical for dynamic target tracking when evaluating the performance of unmanned aerial vehicles. However, traditional methods primarily rely on exhaustive testing or random sampling and often assume that different contributing factors are independent. This results in the ineffective generation of boundary scenarios and a lack of realism. In this study, a novel high-dimensional dynamic characteristics-based boundary test scenario generation method is proposed using reinforcement learning (RL). Boundary test scenarios can be explored more purposive, by designing an appropriate reward function. First, an innovative scenario modeling method is developed to model the influence of environment, occlusion, and other interference. A joint distribution model of the key correlation factors, such as light intensity and clouds, is also established. This ensures scenario authenticity and test accuracy. Subsequently, a high-dimensional dynamic spatial Markov decision process (HDDS-MDP) model is constructed to facilitate the generation of boundary scenarios based on the scenario modeling. Ultimately, RL is employed to solve the HDDS-MDP model and generate boundary test scenario, thereby substantially improves the effectiveness of boundary test scenario generation. The simulation results indicate that the boundary test scenario generation effectiveness is improved by 91% over random sampling methods.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"553-564"},"PeriodicalIF":4.0,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Performance Analysis of User Pairs in Active Reconfigurable Intelligent Surface-Aided IoT Systems 主动可重构智能表面辅助物联网系统中用户对安全性能分析
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-23 DOI: 10.1109/JSYST.2025.3553818
Minh-Sang Van Nguyen;Dinh-Thuan Do;Phu Tran Tin;Alireza Vahid
We investigate the integration of an active reconfigurable intelligent surface (ARIS) with nonorthogonal multiple access (NOMA) to enhance the secrecy performance and the security capabilities in Internet of Things (IoT) systems. The system model incorporates ARIS and NOMA, allowing for improved power allocation and higher security. In particular, the physical-layer security of an ARIS-NOMA system is investigated when the system is subject to eavesdropping by a malicious user in a user pair group. To provide real-world impact, we examine the main system performance metrics, including the connection outage probability, the secrecy outage probability (SOP), and the strictly positive secrecy capacity, which are important guidelines in evaluating the system's reliability, security, and achievable secrecy rates. We evaluate the impact of distances between the ARIS, the eavesdropper, and the base station on the SOP. We derive the optimal power allocation factors in the NOMA scheme, which provides insights into the system design and parameter adjustment to achieve robust and secure operation. In comparison to a benchmark model using the orthogonal multiple access, we show ARIS-NOMA is a promising solution to further enhance security and secrecy in IoT networks.
我们研究了主动可重构智能表面(ARIS)与非正交多址(NOMA)的集成,以提高物联网(IoT)系统的保密性能和安全能力。该系统模型结合了ARIS和NOMA,允许改进的功率分配和更高的安全性。特别研究了ARIS-NOMA系统在被用户对组中的恶意用户窃听时的物理层安全性。为了提供真实的影响,我们检查了主要的系统性能指标,包括连接中断概率、保密中断概率(SOP)和严格正保密能力,它们是评估系统可靠性、安全性和可实现保密率的重要指导方针。我们评估了ARIS、窃听者和基站之间的距离对SOP的影响。我们推导了NOMA方案的最佳功率分配因子,为系统设计和参数调整提供了见解,以实现稳健和安全的运行。与使用正交多址的基准模型相比,我们表明ARIS-NOMA是一种有前途的解决方案,可以进一步增强物联网网络的安全性和保密性。
{"title":"Secure Performance Analysis of User Pairs in Active Reconfigurable Intelligent Surface-Aided IoT Systems","authors":"Minh-Sang Van Nguyen;Dinh-Thuan Do;Phu Tran Tin;Alireza Vahid","doi":"10.1109/JSYST.2025.3553818","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3553818","url":null,"abstract":"We investigate the integration of an active reconfigurable intelligent surface (ARIS) with nonorthogonal multiple access (NOMA) to enhance the secrecy performance and the security capabilities in Internet of Things (IoT) systems. The system model incorporates ARIS and NOMA, allowing for improved power allocation and higher security. In particular, the physical-layer security of an ARIS-NOMA system is investigated when the system is subject to eavesdropping by a malicious user in a user pair group. To provide real-world impact, we examine the main system performance metrics, including the connection outage probability, the secrecy outage probability (SOP), and the strictly positive secrecy capacity, which are important guidelines in evaluating the system's reliability, security, and achievable secrecy rates. We evaluate the impact of distances between the ARIS, the eavesdropper, and the base station on the SOP. We derive the optimal power allocation factors in the NOMA scheme, which provides insights into the system design and parameter adjustment to achieve robust and secure operation. In comparison to a benchmark model using the orthogonal multiple access, we show ARIS-NOMA is a promising solution to further enhance security and secrecy in IoT networks.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"370-381"},"PeriodicalIF":4.0,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differentially Private Aperiodic Sampled-Data Consensus for Intelligent Interconnected Heterogeneous Vehicular Platoons 智能互联异构车辆队列的差分私有非周期采样数据一致性
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-21 DOI: 10.1109/JSYST.2025.3557729
Guoliang Chen;Wenqing Zhao;Jianwei Xia;Zhichuang Wang;Ju H. Park
In this article, the vehicular platoons under aperiodic sampled-data information exchange between connected neighbors are implemented with an average output consensus while achieving differential privacy protection. Initially, the complex vehicle dynamics system is simplified into a heterogeneous linear system interconnected through a communication graph. Subsequently, a distributed hybrid controller is deployed, specifically tailored for handling the intermittent sampled-data information, and is augmented with a dynamic noise generator. This framework restricts information exchange to a predefined neighborhood set of vehicles. To ensure differential privacy, design and incorporate random noise adhering to a Laplace distribution, where the decay index and control gain are adjustable parameters corresponding to the desired privacy level and system accuracy, respectively. This noise injection is guided by a differential privacy noise utilization algorithm. The controller design is then formulated and solved using a combination of the pole placement method and the generalized inverse concept, enabling effective networked control. Lastly, simulation examples are provided to rigorously validate the proposed theoretical framework, demonstrating its efficacy in maintaining platoon coherence while preserving the privacy of individual vehicle data.
本文在实现差分隐私保护的同时,以平均输出共识实现了连接邻居之间非周期采样数据信息交换下的车辆队列。首先,将复杂的车辆动力学系统简化为通过通信图相互连接的异构线性系统。随后,部署了一个分布式混合控制器,专门用于处理间歇性采样数据信息,并增加了一个动态噪声发生器。该框架将信息交换限制在预定义的邻近车辆集合中。为了保证差分隐私,设计并加入服从拉普拉斯分布的随机噪声,其中衰减指数和控制增益是可调参数,分别对应于期望的隐私级别和系统精度。这种噪声注入是由差分隐私噪声利用算法引导的。然后,将极点放置法与广义逆概念相结合,制定并求解了控制器设计,实现了有效的网络化控制。最后,给出了仿真实例,严格验证了所提出的理论框架,证明了其在保持车队一致性的同时保护单个车辆数据隐私的有效性。
{"title":"Differentially Private Aperiodic Sampled-Data Consensus for Intelligent Interconnected Heterogeneous Vehicular Platoons","authors":"Guoliang Chen;Wenqing Zhao;Jianwei Xia;Zhichuang Wang;Ju H. Park","doi":"10.1109/JSYST.2025.3557729","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3557729","url":null,"abstract":"In this article, the vehicular platoons under aperiodic sampled-data information exchange between connected neighbors are implemented with an average output consensus while achieving differential privacy protection. Initially, the complex vehicle dynamics system is simplified into a heterogeneous linear system interconnected through a communication graph. Subsequently, a distributed hybrid controller is deployed, specifically tailored for handling the intermittent sampled-data information, and is augmented with a dynamic noise generator. This framework restricts information exchange to a predefined neighborhood set of vehicles. To ensure differential privacy, design and incorporate random noise adhering to a Laplace distribution, where the decay index and control gain are adjustable parameters corresponding to the desired privacy level and system accuracy, respectively. This noise injection is guided by a differential privacy noise utilization algorithm. The controller design is then formulated and solved using a combination of the pole placement method and the generalized inverse concept, enabling effective networked control. Lastly, simulation examples are provided to rigorously validate the proposed theoretical framework, demonstrating its efficacy in maintaining platoon coherence while preserving the privacy of individual vehicle data.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"612-623"},"PeriodicalIF":4.0,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Leader–Followers Consensus for Nonlinear Multiagent Systems With Exogenous Disturbances via Dynamic Triggered Strategies 基于动态触发策略的非线性多智能体系统的鲁棒领导-追随者共识
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-11 DOI: 10.1109/JSYST.2025.3550132
Yuanshan Liu;Yude Xia
The article investigates the leader–followers consensus problem of nonlinear multiagent systems with nonlinear dynamics and uncertain exogenous disturbances, employing dynamic triggered strategies (DTSs). An active disturbance rejection control is utilized to design a disturbance observer for estimating the disturbances in the input channel. To enhance communication efficiency and reduce energy consumption during information interaction between agents, the disturbances estimator is integrated into the consensus controller to suppress these disturbances. The convergence condition and lower bound of DTSs are derived. Finally, numerical simulations validate the effectiveness of the proposed algorithm.

Note to Practitioners— The complete system composed of multiple controlled objects in industrial production, transportation, aerospace, and other fields is inevitably influenced by external uncertain signals to varying degrees. The disturbance observer-based control technique effectively addresses the robust consensus problem of MASs. This significantly enhances the stability of most controlled systems operating in complex environments. Simultaneously, the distributed DTSs efficiently reduce communication burden between devices, minimize microprocessor computing power requirements, and save substantial economic costs. Undoubtedly, this offers a novel approach for the development of MASs.

本文采用动态触发策略研究了具有非线性动力学和不确定外源干扰的非线性多智能体系统的领导-追随者共识问题。采用自抗扰控制设计干扰观测器,对输入信道中的干扰进行估计。为了提高智能体间信息交互时的通信效率和降低能量消耗,在共识控制器中集成了干扰估计器来抑制这些干扰。导出了该算法的收敛条件和下界。最后,通过数值仿真验证了算法的有效性。从业者须知——在工业生产、交通运输、航空航天等领域,由多个被控对象组成的完整系统不可避免地会受到不同程度的外部不确定信号的影响。基于扰动观测器的控制技术有效地解决了质量的鲁棒一致问题。这大大提高了在复杂环境中运行的大多数受控系统的稳定性。同时,分布式dts有效地减轻了设备之间的通信负担,最大限度地降低了对微处理器计算能力的要求,节省了大量的经济成本。毫无疑问,这为MASs的发展提供了一种新的途径。
{"title":"Robust Leader–Followers Consensus for Nonlinear Multiagent Systems With Exogenous Disturbances via Dynamic Triggered Strategies","authors":"Yuanshan Liu;Yude Xia","doi":"10.1109/JSYST.2025.3550132","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3550132","url":null,"abstract":"The article investigates the leader–followers consensus problem of nonlinear multiagent systems with nonlinear dynamics and uncertain exogenous disturbances, employing dynamic triggered strategies (DTSs). An active disturbance rejection control is utilized to design a disturbance observer for estimating the disturbances in the input channel. To enhance communication efficiency and reduce energy consumption during information interaction between agents, the disturbances estimator is integrated into the consensus controller to suppress these disturbances. The convergence condition and lower bound of DTSs are derived. Finally, numerical simulations validate the effectiveness of the proposed algorithm. <p><i>Note to Practitioners—</i> The complete system composed of multiple controlled objects in industrial production, transportation, aerospace, and other fields is inevitably influenced by external uncertain signals to varying degrees. The disturbance observer-based control technique effectively addresses the robust consensus problem of MASs. This significantly enhances the stability of most controlled systems operating in complex environments. Simultaneously, the distributed DTSs efficiently reduce communication burden between devices, minimize microprocessor computing power requirements, and save substantial economic costs. Undoubtedly, this offers a novel approach for the development of MASs.</p>","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"682-689"},"PeriodicalIF":4.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discovering Decision Manifolds to Assure Trusted Autonomous Systems 发现决策流形以保证可信自治系统
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-11 DOI: 10.1109/JSYST.2025.3554957
Matthew Litton;Doron Drusinsky;James Bret Michael
Developing and fielding complex systems requires proof that they are reliably correct with respect to their design and operating requirements. Especially for autonomous systems, which exhibit unanticipated emergent behavior, fully enumerating the range of possible correct and incorrect behaviors is intractable. Therefore, we propose an optimization-based search technique for generating high-quality, high-variance, and nontrivial data, which captures the range of correct and incorrect responses a system could exhibit. This manifold between desired and undesired behavior provides a more detailed understanding of system reliability than traditional testing or Monte Carlo simulations. After discovering data points along the manifold, we apply machine learning techniques to quantify the decision manifold's underlying mathematical function. Such models serve as correctness properties, which can be utilized to enable both verification during development and testing, as well as continuous assurance during operation, even amidst system adaptations and dynamic operating environments. This method can be applied in combination with a simulator in order to provide evidence of dependability to system designers and users, with the ultimate aim of establishing trust in the deployment of complex systems. In this proof-of-concept, we apply our method to a software-in-the-loop evaluation of an autonomous vehicle.
开发和部署复杂系统需要证明它们在设计和操作要求方面是可靠正确的。特别是对于表现出意外紧急行为的自治系统,充分列举可能的正确和错误行为的范围是难以解决的。因此,我们提出了一种基于优化的搜索技术,用于生成高质量、高方差和重要的数据,这些数据可以捕获系统可能显示的正确和错误响应的范围。与传统测试或蒙特卡罗模拟相比,期望行为和不期望行为之间的歧义提供了对系统可靠性更详细的理解。在发现流形上的数据点后,我们应用机器学习技术来量化决策流形的底层数学函数。这样的模型作为正确性属性,可以用来支持开发和测试期间的验证,以及操作期间的持续保证,甚至在系统调整和动态操作环境中也是如此。该方法可以与模拟器结合使用,以便为系统设计者和用户提供可靠性证据,最终目的是在复杂系统的部署中建立信任。在这个概念验证中,我们将我们的方法应用于自动驾驶汽车的软件在环评估。
{"title":"Discovering Decision Manifolds to Assure Trusted Autonomous Systems","authors":"Matthew Litton;Doron Drusinsky;James Bret Michael","doi":"10.1109/JSYST.2025.3554957","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3554957","url":null,"abstract":"Developing and fielding complex systems requires proof that they are reliably correct with respect to their design and operating requirements. Especially for autonomous systems, which exhibit unanticipated emergent behavior, fully enumerating the range of possible correct and incorrect behaviors is intractable. Therefore, we propose an optimization-based search technique for generating high-quality, high-variance, and nontrivial data, which captures the range of correct and incorrect responses a system could exhibit. This manifold between desired and undesired behavior provides a more detailed understanding of system reliability than traditional testing or Monte Carlo simulations. After discovering data points along the manifold, we apply machine learning techniques to quantify the decision manifold's underlying mathematical function. Such models serve as correctness properties, which can be utilized to enable both verification during development and testing, as well as continuous assurance during operation, even amidst system adaptations and dynamic operating environments. This method can be applied in combination with a simulator in order to provide evidence of dependability to system designers and users, with the ultimate aim of establishing trust in the deployment of complex systems. In this proof-of-concept, we apply our method to a software-in-the-loop evaluation of an autonomous vehicle.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"413-424"},"PeriodicalIF":4.0,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the Stealth of Load Redistribution Attacks: A Novel Cluster-Driven Approach 增强负载重分配攻击的隐蔽性:一种新的集群驱动方法
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-09 DOI: 10.1109/JSYST.2025.3554205
Rohini Haridas;Chenghong Gu;Satish Sharma;Rohit Bhakar
This letter proposes a novel cluster-driven bilevel Load Redistribution (LR) attack model in cyber physical power systems. The main goal is on overloading multiple transmission lines while maintaining a high level of stealth. The proposed model employs cluster-based approach to form distinct clusters, each representing different load patterns within the power system. This enables the design of attack vectors that seamlessly blend with these load patterns, thereby challenging advanced anomaly detection systems. The stealth of the attack is quantified by the Stealth Distance Index (SDI), ensuring that injected false data remain within the maximum permissible distance from the centroid of its corresponding cluster. The proposed model is validated on the modified IEEE 14-bus and 30-bus systems, demonstrating enhanced stealth capabilities in LR attacks.
本文提出了一种新的集群驱动的双级负载重分配(LR)网络物理电力系统攻击模型。主要目标是使多条传输线过载,同时保持高水平的隐身性。该模型采用基于集群的方法形成不同的集群,每个集群代表电力系统内不同的负荷模式。这使得攻击向量的设计能够与这些负载模式无缝融合,从而挑战高级异常检测系统。攻击的隐身性通过隐身距离指数(SDI)来量化,确保注入的虚假数据保持在与其相应簇的质心的最大允许距离内。该模型在改进的IEEE 14总线和30总线系统上进行了验证,展示了增强的LR攻击隐身能力。
{"title":"Enhancing the Stealth of Load Redistribution Attacks: A Novel Cluster-Driven Approach","authors":"Rohini Haridas;Chenghong Gu;Satish Sharma;Rohit Bhakar","doi":"10.1109/JSYST.2025.3554205","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3554205","url":null,"abstract":"This letter proposes a novel cluster-driven bilevel Load Redistribution (LR) attack model in cyber physical power systems. The main goal is on overloading multiple transmission lines while maintaining a high level of stealth. The proposed model employs cluster-based approach to form distinct clusters, each representing different load patterns within the power system. This enables the design of attack vectors that seamlessly blend with these load patterns, thereby challenging advanced anomaly detection systems. The stealth of the attack is quantified by the Stealth Distance Index (SDI), ensuring that injected false data remain within the maximum permissible distance from the centroid of its corresponding cluster. The proposed model is validated on the modified IEEE 14-bus and 30-bus systems, demonstrating enhanced stealth capabilities in LR attacks.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"712-715"},"PeriodicalIF":4.0,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architecting Path Selection Method for Incremental Evolution in System-of-Systems 系统-系统中增量进化的架构路径选择方法
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-09 DOI: 10.1109/JSYST.2025.3553965
Zhemei Fang;Dazhi Chen;Qi Ju;Jianbo Wang
Architecture design for system-of-systems (SoSs) is a complex challenge due to interdependencies, uncertainties, and the large design space. The evolutionary nature of SoSs necessitates a multistage architecting process, adding further complexity. This article, thus, proposes a deep reinforcement learning based evolutionary architecture path selection method that considers uncertainties and interdependency. The approach employs an architecture framework to guide the design and defines SoS architecture decisions as the addition of systems and the allocation of operational architecture to physical architecture across sequential stages. Capability evaluation leverages a capability-activity-system structure, supported by a functional dependency network analysis method. Utilizing a deep neural network as a functional approximator to predict future SoS capability, the article develops a proximal policy optimization (PPO) algorithm that balances immediate and future needs. Applied to a mosaic warfare-oriented naval antisubmarine SoS, the proposed method outperforms heuristic optimization techniques by achieving higher SoS capability, reduced instability, and fewer violations of budget and intermediate requirements constraints in both deterministic and stochastic scenarios. These results highlight the PPO method's effectiveness in addressing SoS architecting path selection challenges under uncertainty.
由于相互依赖性、不确定性和较大的设计空间,系统的体系结构设计是一项复杂的挑战。soa的进化本质需要一个多阶段的架构过程,这进一步增加了复杂性。因此,本文提出了一种考虑不确定性和相互依赖性的基于深度强化学习的进化架构路径选择方法。该方法使用体系结构框架来指导设计,并将SoS体系结构决策定义为系统的添加以及跨顺序阶段将操作体系结构分配到物理体系结构。能力评估利用由功能依赖网络分析方法支持的能力-活动-系统结构。利用深度神经网络作为函数逼近器来预测未来的SoS能力,本文开发了一种平衡当前和未来需求的近端策略优化(PPO)算法。应用于面向马赛克战争的海军反潜SoS,该方法优于启发式优化技术,在确定性和随机场景下实现更高的SoS能力,减少不稳定性,减少违反预算和中间需求约束的情况。这些结果突出了PPO方法在解决不确定性下SoS架构路径选择挑战方面的有效性。
{"title":"Architecting Path Selection Method for Incremental Evolution in System-of-Systems","authors":"Zhemei Fang;Dazhi Chen;Qi Ju;Jianbo Wang","doi":"10.1109/JSYST.2025.3553965","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3553965","url":null,"abstract":"Architecture design for system-of-systems (SoSs) is a complex challenge due to interdependencies, uncertainties, and the large design space. The evolutionary nature of SoSs necessitates a multistage architecting process, adding further complexity. This article, thus, proposes a deep reinforcement learning based evolutionary architecture path selection method that considers uncertainties and interdependency. The approach employs an architecture framework to guide the design and defines SoS architecture decisions as the addition of systems and the allocation of operational architecture to physical architecture across sequential stages. Capability evaluation leverages a capability-activity-system structure, supported by a functional dependency network analysis method. Utilizing a deep neural network as a functional approximator to predict future SoS capability, the article develops a proximal policy optimization (PPO) algorithm that balances immediate and future needs. Applied to a mosaic warfare-oriented naval antisubmarine SoS, the proposed method outperforms heuristic optimization techniques by achieving higher SoS capability, reduced instability, and fewer violations of budget and intermediate requirements constraints in both deterministic and stochastic scenarios. These results highlight the PPO method's effectiveness in addressing SoS architecting path selection challenges under uncertainty.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"636-647"},"PeriodicalIF":4.0,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GA-Optimized Co-Design of Jump-Like FlexRay Protocol and Dynamic Control for NCSs and Its Applications 类跳跃FlexRay协议与ncs动态控制的ga优化协同设计及其应用
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-08 DOI: 10.1109/JSYST.2025.3550559
Tao Yu;Hao Xu;Shuping He
This article is considered with the co-design problem of jump-like FlexRay protocol (FRP) and dynamic control for a class of discrete-time networked systems. A jump-like FRP is proposed to address the constraints of communication resources as well as nonperiodic denial of service (DoS) attacks in the sensor-to-controller communication network. The proposed novel protocol has the characteristics of traditional FRP time-triggered and event-triggered mechanisms. In addition, such protocol is able to avoid selecting sensors affected by DoS attacks. Subsequently, a set of dynamic output feedback controllers related to the selection of sensor nodes is designed to guarantee the finite-time boundedness of the closed-loop system with the prescribed $H_infty$ performance. However, the co-design problem of protocol and dynamic control includes more nonlinear terms, making the problem more challenging to be solved. In order to address the co-design problem and enhance system performance, a genetic-algorithm-based controller design approach has been proposed. Finally, a numerical example and a two-area power system example are given to illustrate the effectiveness of the proposed method.
研究一类离散时间网络系统的类跳变FlexRay协议(FRP)与动态控制的协同设计问题。为了解决传感器到控制器通信网络中通信资源的限制以及非周期性拒绝服务攻击,提出了一种跳变FRP。该协议具有传统FRP时间触发机制和事件触发机制的特点。此外,该协议能够避免选择受DoS攻击影响的传感器。随后,设计了一组与传感器节点选择相关的动态输出反馈控制器,以保证闭环系统具有规定$H_infty$性能的有限时间有界性。然而,协议与动态控制的协同设计问题包含了更多的非线性项,使得问题的求解更具挑战性。为了解决协同设计问题,提高系统性能,提出了一种基于遗传算法的控制器设计方法。最后通过一个数值算例和一个两区电力系统算例说明了所提方法的有效性。
{"title":"GA-Optimized Co-Design of Jump-Like FlexRay Protocol and Dynamic Control for NCSs and Its Applications","authors":"Tao Yu;Hao Xu;Shuping He","doi":"10.1109/JSYST.2025.3550559","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3550559","url":null,"abstract":"This article is considered with the co-design problem of jump-like FlexRay protocol (FRP) and dynamic control for a class of discrete-time networked systems. A jump-like FRP is proposed to address the constraints of communication resources as well as nonperiodic denial of service (DoS) attacks in the sensor-to-controller communication network. The proposed novel protocol has the characteristics of traditional FRP time-triggered and event-triggered mechanisms. In addition, such protocol is able to avoid selecting sensors affected by DoS attacks. Subsequently, a set of dynamic output feedback controllers related to the selection of sensor nodes is designed to guarantee the finite-time boundedness of the closed-loop system with the prescribed <inline-formula><tex-math>$H_infty$</tex-math></inline-formula> performance. However, the co-design problem of protocol and dynamic control includes more nonlinear terms, making the problem more challenging to be solved. In order to address the co-design problem and enhance system performance, a genetic-algorithm-based controller design approach has been proposed. Finally, a numerical example and a two-area power system example are given to illustrate the effectiveness of the proposed method.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"670-681"},"PeriodicalIF":4.0,"publicationDate":"2025-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
$mu$-Trust: Trustworthy and Transparent Service Composition for Microservice-Based IoT Systems $mu$-Trust:基于微服务的物联网系统的可信和透明的服务组合
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-01 DOI: 10.1109/JSYST.2025.3547967
Prajnamaya Dass;Sudip Misra
The distributed Internet of Things (IoT) systems facilitate real-time services through the composition of loosely coupled microservices. The composed IoT service is the output of multiple microservices, executed at computationally capable edge or fog nodes, which we consider as the facility nodes (FNs). However, the service composition process in IoT microservice architectures is abstracted from the users that gives freedom to the FNs to act maliciously and provide low-quality IoT services. Further, the service composition needs to be transparent so that the FNs involved in a service cannot repudiate their involvement at a later time. In this article, we propose a novel, lightweight, trustworthy, and verifiable service composition framework for IoT-based systems that adopt microservice architecture. First, we propose a dynamic programming approach to select trustworthy FNs for each user request, while considering the trust scores of the FNs and the delay requirements of the users. Next, we propose a transparent service composition framework that uses lightweight cryptography functions to generate the proof-of-involvement for the FNs in each service. With the help of a trust controller, we verify the proofs generated by the FNs and update the trust scores of the FNs. Considering the user traces from Berlin city in the simulation of urban mobility tool, we show the efficacy of the proposed framework in maximizing user trust and detecting malicious FNs involved in user services. Further, we show that the delay and communication overhead of the proposed framework are very low compared to the state-of-the-art methods.
分布式物联网(IoT)系统通过松散耦合的微服务组合来促进实时服务。组合物联网服务是多个微服务的输出,在具有计算能力的边缘或雾节点上执行,我们将其视为设施节点(FNs)。然而,物联网微服务架构中的服务组合过程是从用户中抽象出来的,这给了FNs恶意行为和提供低质量物联网服务的自由。此外,服务组合需要是透明的,以便服务中涉及的fn不能在以后拒绝它们的参与。在本文中,我们为采用微服务架构的基于物联网的系统提出了一种新颖的、轻量级的、可信赖的、可验证的服务组合框架。首先,我们提出了一种动态规划方法,在考虑FNs信任分数和用户延迟需求的情况下,为每个用户请求选择可信赖的FNs。接下来,我们提出了一个透明的服务组合框架,该框架使用轻量级加密功能为每个服务中的fn生成参与证明。在信任控制器的帮助下,我们验证了由FNs生成的证明,并更新了FNs的信任分数。在城市移动工具的模拟中,考虑到来自柏林市的用户痕迹,我们证明了所提出的框架在最大化用户信任和检测用户服务中涉及的恶意FNs方面的有效性。此外,我们表明,与最先进的方法相比,所提出的框架的延迟和通信开销非常低。
{"title":"$mu$-Trust: Trustworthy and Transparent Service Composition for Microservice-Based IoT Systems","authors":"Prajnamaya Dass;Sudip Misra","doi":"10.1109/JSYST.2025.3547967","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3547967","url":null,"abstract":"The distributed Internet of Things (IoT) systems facilitate real-time services through the composition of loosely coupled microservices. The composed IoT service is the output of multiple microservices, executed at computationally capable edge or fog nodes, which we consider as the facility nodes (FNs). However, the service composition process in IoT microservice architectures is abstracted from the users that gives freedom to the FNs to act maliciously and provide low-quality IoT services. Further, the service composition needs to be transparent so that the FNs involved in a service cannot repudiate their involvement at a later time. In this article, we propose a novel, lightweight, trustworthy, and verifiable service composition framework for IoT-based systems that adopt microservice architecture. First, we propose a dynamic programming approach to select trustworthy FNs for each user request, while considering the trust scores of the FNs and the delay requirements of the users. Next, we propose a transparent service composition framework that uses lightweight cryptography functions to generate the proof-of-involvement for the FNs in each service. With the help of a trust controller, we verify the proofs generated by the FNs and update the trust scores of the FNs. Considering the user traces from Berlin city in the simulation of urban mobility tool, we show the efficacy of the proposed framework in maximizing user trust and detecting malicious FNs involved in user services. Further, we show that the delay and communication overhead of the proposed framework are very low compared to the state-of-the-art methods.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"404-412"},"PeriodicalIF":4.0,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System-Level Simulation Framework for NB-IoT: Key Features and Performance Evaluation NB-IoT系统级仿真框架:关键特性和性能评估
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-29 DOI: 10.1109/JSYST.2025.3569189
Shutao Zhang;Wenkun Wen;Peiran Wu;Hongqing Huang;Liya Zhu;Yijia Guo;Tingting Yang;Minghua Xia
Narrowband Internet of Things (NB-IoT) is a technology specifically designated by the 3 rd Generation Partnership Project (3GPP) to meet the explosive demand for massive machine-type communications (mMTC), and it is evolving to RedCap. Industrial companies have increasingly adopted NB-IoT as the solution for mMTC due to its lightweight design and comprehensive technical specifications released by 3GPP. This article presents a system-level simulation framework for NB-IoT networks to evaluate their performance. The system-level simulator is structured into four parts: Initialization, pregeneration, main simulation loop, and postprocessing. In addition, three essential features are investigated to enhance coverage, support massive connections, and ensure low power consumption. Simulation results demonstrate that the cumulative distribution function curves of the signal-to-interference-and-noise ratio fully comply with industrial standards. Furthermore, the throughput performance explains how NB-IoT networks realize massive connections at the cost of data rate. This work highlights its practical utility and paves the way for developing NB-IoT networks.
窄带物联网(NB-IoT)是第三代合作伙伴计划(3GPP)为满足大规模机器类型通信(mMTC)的爆炸性需求而专门指定的技术,目前正在向RedCap演进。由于NB-IoT的轻量化设计和3GPP发布的全面技术规范,工业企业越来越多地采用NB-IoT作为mMTC的解决方案。本文提出了一个用于NB-IoT网络的系统级仿真框架,以评估其性能。系统级模拟器分为四个部分:初始化、预生成、主仿真循环和后处理。此外,还研究了三个基本特性,以增强覆盖范围、支持大规模连接并确保低功耗。仿真结果表明,信噪比的累积分布函数曲线完全符合工业标准。此外,吞吐量性能解释了NB-IoT网络如何以数据速率为代价实现大规模连接。这项工作突出了其实用性,并为NB-IoT网络的发展铺平了道路。
{"title":"System-Level Simulation Framework for NB-IoT: Key Features and Performance Evaluation","authors":"Shutao Zhang;Wenkun Wen;Peiran Wu;Hongqing Huang;Liya Zhu;Yijia Guo;Tingting Yang;Minghua Xia","doi":"10.1109/JSYST.2025.3569189","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3569189","url":null,"abstract":"Narrowband Internet of Things (NB-IoT) is a technology specifically designated by the 3 rd Generation Partnership Project (3GPP) to meet the explosive demand for massive machine-type communications (mMTC), and it is evolving to RedCap. Industrial companies have increasingly adopted NB-IoT as the solution for mMTC due to its lightweight design and comprehensive technical specifications released by 3GPP. This article presents a system-level simulation framework for NB-IoT networks to evaluate their performance. The system-level simulator is structured into four parts: Initialization, pregeneration, main simulation loop, and postprocessing. In addition, three essential features are investigated to enhance coverage, support massive connections, and ensure low power consumption. Simulation results demonstrate that the cumulative distribution function curves of the signal-to-interference-and-noise ratio fully comply with industrial standards. Furthermore, the throughput performance explains how NB-IoT networks realize massive connections at the cost of data rate. This work highlights its practical utility and paves the way for developing NB-IoT networks.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"577-588"},"PeriodicalIF":4.0,"publicationDate":"2025-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Systems Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1