首页 > 最新文献

IEEE Systems Journal最新文献

英文 中文
Power-Aware User Association and Content Caching Algorithm for Delay-Energy Tradeoff in Cache-Enabled Heterogeneous Cellular Networks 在支持缓存的异构蜂窝网络中实现延迟-能量权衡的功率感知用户关联和内容缓存算法
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-14 DOI: 10.1109/JSYST.2024.3524624
Weiyi Ni;Hailin Xiao;Xiaolan Liu;Anthony Theodore Chronopoulos;Petros A. Ioannou
A large number of devices communicating through the backhaul links in heterogeneous cellular networks (HetCNets) will incur severe traffic congestion, high delay, and huge energy consumption. Enabling caching capabilities has been regarded as a promising way to reduce the high-delay pressure of file delivery on the backhaul links. However, file delivery has different requirements on quality-of-service, and the increased densification of small base stations will consume more energy, thus it is essential to solve the problem of delay and energy in cache-enabled HetCNets. In this article, we employ a utility function with the weighted sum of energy consumption and delay cost to formulate the delay-energy tradeoff optimization problem that is a kind of multiobjective optimization problem. Considering a jointly performed mechanism comprising power control, user association, and content caching, the optimization problem is further decomposed into the primal problem and the main problem by generalized Benders decomposition method. Here, the primal problem is related to power-aware user association that dynamically associates with the base station, and the main problem is related to content caching. Furthermore, an iterative power-aware user association and content caching algorithm (PAUA-CC) is proposed. Finally, we present numerical simulation results to demonstrate the effectiveness of our proposed approach on the optimal delay-energy tradeoff.
在异构蜂窝网络(HetCNets)中,大量设备通过回程链路进行通信将导致严重的流量拥塞、高时延和巨大的能耗。启用缓存功能被认为是减少回程链路上文件传输的高延迟压力的一种有前途的方法。但是,文件传输对服务质量有不同的要求,而小型基站密度的增加会消耗更多的能量,因此在启用缓存的HetCNets中解决延迟和能量问题是至关重要的。本文采用能量消耗与延迟代价加权和的效用函数来表述延迟-能量权衡优化问题,这是一类多目标优化问题。考虑功率控制、用户关联和内容缓存共同执行的机制,采用广义Benders分解方法将优化问题进一步分解为原始问题和主问题。这里的主要问题与动态关联基站的功率感知用户关联有关,主要问题与内容缓存有关。在此基础上,提出了一种迭代的功率感知用户关联和内容缓存算法(paa - cc)。最后,我们给出了数值模拟结果,以证明我们所提出的方法在最佳延迟-能量权衡方面的有效性。
{"title":"Power-Aware User Association and Content Caching Algorithm for Delay-Energy Tradeoff in Cache-Enabled Heterogeneous Cellular Networks","authors":"Weiyi Ni;Hailin Xiao;Xiaolan Liu;Anthony Theodore Chronopoulos;Petros A. Ioannou","doi":"10.1109/JSYST.2024.3524624","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3524624","url":null,"abstract":"A large number of devices communicating through the backhaul links in heterogeneous cellular networks (HetCNets) will incur severe traffic congestion, high delay, and huge energy consumption. Enabling caching capabilities has been regarded as a promising way to reduce the high-delay pressure of file delivery on the backhaul links. However, file delivery has different requirements on quality-of-service, and the increased densification of small base stations will consume more energy, thus it is essential to solve the problem of delay and energy in cache-enabled HetCNets. In this article, we employ a utility function with the weighted sum of energy consumption and delay cost to formulate the delay-energy tradeoff optimization problem that is a kind of multiobjective optimization problem. Considering a jointly performed mechanism comprising power control, user association, and content caching, the optimization problem is further decomposed into the primal problem and the main problem by generalized Benders decomposition method. Here, the primal problem is related to power-aware user association that dynamically associates with the base station, and the main problem is related to content caching. Furthermore, an iterative power-aware user association and content caching algorithm (PAUA-CC) is proposed. Finally, we present numerical simulation results to demonstrate the effectiveness of our proposed approach on the optimal delay-energy tradeoff.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"246-257"},"PeriodicalIF":4.0,"publicationDate":"2025-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Leader–Follower Attack-Tolerant Algorithm for Resilient Rendezvous With Reduced Network Redundancy 一种降低网络冗余的弹性交会容错算法
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-10 DOI: 10.1109/JSYST.2024.3523485
Zirui Liao;Jian Shi;Yuwei Zhang;Shaoping Wang;Rentong Chen;Zhiyong Sun
This article addresses the resilient rendezvous problem for leader–follower multiagent systems (MASs) in the presence of adversarial attacks. A novel leader–follower attack-tolerant (LFAT) algorithm is developed to ensure that the healthy followers reach rendezvous on the reference value propagated by healthy leaders. Compared with the existing weighted mean-subsequence-reduced algorithm, the proposed LFAT algorithm includes a necessary state initialization step for leader and follower agents and an improved threat elimination step, so that more effective information can be retained for state updates. The necessary and sufficient condition on the network topology is further derived to ensure resilient rendezvous for leader–follower MASs. Compared with the existing resilient algorithms, the proposed LFAT algorithm enables MASs to achieve leader–follower resilient rendezvous under relaxed graph robustness conditions, so that the network redundancy is mitigated. Several numerical examples are given to illustrate the superior performance of the LFAT algorithm and the scalability to larger-scale and time-varying networks.
本文研究了存在对抗性攻击的leader-follower多智能体系统(MASs)的弹性交会问题。为了保证健康的follower在健康leader传播的参考值上到达集合点,提出了一种新的leader-follower容忍攻击(LFAT)算法。与现有加权均值子序列约简算法相比,本文提出的LFAT算法包含了领导和跟随agent的必要状态初始化步骤和改进的威胁消除步骤,可以保留更有效的信息进行状态更新。进一步推导了网络拓扑结构中保证leader-follower群体弹性交会的充分必要条件。与已有的弹性算法相比,本文提出的LFAT算法使MASs能够在宽松的图鲁棒性条件下实现leader-follower的弹性交会,从而降低了网络冗余度。数值算例说明了LFAT算法的优越性能和对更大规模时变网络的可扩展性。
{"title":"A Leader–Follower Attack-Tolerant Algorithm for Resilient Rendezvous With Reduced Network Redundancy","authors":"Zirui Liao;Jian Shi;Yuwei Zhang;Shaoping Wang;Rentong Chen;Zhiyong Sun","doi":"10.1109/JSYST.2024.3523485","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3523485","url":null,"abstract":"This article addresses the resilient rendezvous problem for leader–follower multiagent systems (MASs) in the presence of adversarial attacks. A novel leader–follower attack-tolerant (LFAT) algorithm is developed to ensure that the healthy followers reach rendezvous on the reference value propagated by healthy leaders. Compared with the existing weighted mean-subsequence-reduced algorithm, the proposed LFAT algorithm includes a necessary state initialization step for leader and follower agents and an improved threat elimination step, so that more effective information can be retained for state updates. The necessary and sufficient condition on the network topology is further derived to ensure resilient rendezvous for leader–follower MASs. Compared with the existing resilient algorithms, the proposed LFAT algorithm enables MASs to achieve leader–follower resilient rendezvous under relaxed graph robustness conditions, so that the network redundancy is mitigated. Several numerical examples are given to illustrate the superior performance of the LFAT algorithm and the scalability to larger-scale and time-varying networks.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"212-223"},"PeriodicalIF":4.0,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Failure Propagation Graphs for Studying Cascading Failure Propagation in Power Networks 研究电网级联故障传播的故障传播图
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-10 DOI: 10.1109/JSYST.2024.3524246
Biwei Li;Dong Liu;Junyuan Fang;Xi Zhang;Chi K. Tse
Cascading failure, characterized by the widespread propagation of failure events, is a common cause for severe blackouts in power networks. Strengthening critical branches in a power network is crucial for mitigating the risk of blackouts resulting from cascading failures. In this article, we propose a time-efficient greedy search method to identify critical branches in a power network. We address the challenge of computational constraints by using a failure propagation graph, which accurately captures the critical failure propagation patterns based on cascading failure simulation. Our approach minimizes cascading failure risk while strategically reinforcing a limited number of branches. The failure-propagation-graph greedy-search (FPG-GS) algorithm selects candidate branches based on cascading failure simulation and iteratively identifies the most crucial branches. Our experimental results on different power systems demonstrate the superior performance and efficiency of the FPG-GS algorithm compared to existing methods. In addition, our study highlights the importance of strategic branch selection, showing that reinforcing one-fifth of the branches can achieve a mitigation rate exceeding 80%.
级联故障是电网严重停电的常见原因,其特征是故障事件的广泛传播。加强电网中的关键支路对于减轻由级联故障引起的停电风险至关重要。本文提出了一种省时的贪婪搜索方法来识别电网中的关键支路。我们通过使用故障传播图来解决计算约束的挑战,该图准确地捕获了基于级联故障模拟的关键故障传播模式。我们的方法最小化了级联故障风险,同时战略性地加强了有限数量的分支。故障传播图贪婪搜索(fpga - gs)算法基于级联故障仿真选择候选分支,迭代识别最关键的分支。我们在不同电力系统上的实验结果表明,与现有方法相比,fpga - gs算法具有优越的性能和效率。此外,我们的研究强调了战略分支选择的重要性,表明加固五分之一的分支可以实现超过80%的缓解率。
{"title":"Failure Propagation Graphs for Studying Cascading Failure Propagation in Power Networks","authors":"Biwei Li;Dong Liu;Junyuan Fang;Xi Zhang;Chi K. Tse","doi":"10.1109/JSYST.2024.3524246","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3524246","url":null,"abstract":"Cascading failure, characterized by the widespread propagation of failure events, is a common cause for severe blackouts in power networks. Strengthening critical branches in a power network is crucial for mitigating the risk of blackouts resulting from cascading failures. In this article, we propose a time-efficient greedy search method to identify critical branches in a power network. We address the challenge of computational constraints by using a failure propagation graph, which accurately captures the critical failure propagation patterns based on cascading failure simulation. Our approach minimizes cascading failure risk while strategically reinforcing a limited number of branches. The failure-propagation-graph greedy-search (FPG-GS) algorithm selects candidate branches based on cascading failure simulation and iteratively identifies the most crucial branches. Our experimental results on different power systems demonstrate the superior performance and efficiency of the FPG-GS algorithm compared to existing methods. In addition, our study highlights the importance of strategic branch selection, showing that reinforcing one-fifth of the branches can achieve a mitigation rate exceeding 80%.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"258-269"},"PeriodicalIF":4.0,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Detrimental Weak Emergent Behavior Considering Operational Factors: A Case Study in Search and Rescue 考虑操作因素的弱应急行为检测:以搜救为例
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-06 DOI: 10.1109/JSYST.2024.3521477
R. A. Haugen;S. Kokkula;A. Ghaderi;G. Muller;E. Syverud
This article applies the design of experiments approach for detecting detrimental weak emergent behavior of an autonomous surface vessel operating in a dynamic environment on a search and rescue mission. The research utilizes orthogonal arrays in combination with regression analysis to systematically test the parameter space of an engineered system function. We explored the parameter space of interest and detected where the system model does not comply with a defined measure of effectiveness. The findings from this case study suggest that these methods enable a systematic exploration of the system's parameter space, allowing for the effective detection of detrimental weak emergent behavior. This approach potentially enhances test coverage, expands system operating knowledge and facilitates mitigation efforts more efficiently.
本文采用实验设计的方法来检测在动态环境中执行搜索和救援任务的自主水面舰艇的有害弱紧急行为。本研究采用正交阵列与回归分析相结合的方法,对工程系统功能的参数空间进行系统检验。我们探索了感兴趣的参数空间,并检测了系统模型不符合定义的有效性度量的地方。本案例研究的结果表明,这些方法能够系统地探索系统的参数空间,从而有效地检测有害的弱紧急行为。这种方法潜在地提高了测试覆盖率,扩展了系统操作知识,并更有效地促进了缓解工作。
{"title":"Detection of Detrimental Weak Emergent Behavior Considering Operational Factors: A Case Study in Search and Rescue","authors":"R. A. Haugen;S. Kokkula;A. Ghaderi;G. Muller;E. Syverud","doi":"10.1109/JSYST.2024.3521477","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3521477","url":null,"abstract":"This article applies the design of experiments approach for detecting detrimental weak emergent behavior of an autonomous surface vessel operating in a dynamic environment on a search and rescue mission. The research utilizes orthogonal arrays in combination with regression analysis to systematically test the parameter space of an engineered system function. We explored the parameter space of interest and detected where the system model does not comply with a defined measure of effectiveness. The findings from this case study suggest that these methods enable a systematic exploration of the system's parameter space, allowing for the effective detection of detrimental weak emergent behavior. This approach potentially enhances test coverage, expands system operating knowledge and facilitates mitigation efforts more efficiently.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"43-54"},"PeriodicalIF":4.0,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game-Theoretic Joint Coalition Formation and Power Allocation Strategy for Multitarget Tracking in Distributed Radar Network 分布式雷达网络中多目标跟踪的博弈论联合联盟形成与功率分配策略
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-31 DOI: 10.1109/JSYST.2024.3522100
Chenguang Shi;Xuezhang Sun;Xiangrong Dai;Jianjiang Zhou
In this article, a game-theoretic joint coalition formation and power allocation (JCFPA) strategy is investigated for multitarget tracking (MTT) in a distributed radar network. The main objective of the presented strategy is to minimize the total transmit power consumption and enhance the target tracking accuracy concurrently, while adhering to predefined requirements on the MTT performance and system illumination resource budgets, thus improving the low probability of intercept performance. To achieve this, a utility function is developed to evaluate the coalition structure, transmit power consumption, and tracking accuracy. Then, by formulating the cooperative interactions among radars as a coalition game, we establish an optimization model to optimize the coalition structure and power allocation for the distributed radar network. The existence of the Nash equilibrium solution for the game is proven mathematically. To address the optimization model, an iterative three-step algorithm is developed based on the sequential quadratic programming. Numerical results reveal that the presented JCFPA strategy obtains superior system performance compared to other benchmarks.
本文研究了分布式雷达网络中多目标跟踪的博弈论联合联盟形成与权力分配策略。该策略的主要目标是最小化发射总功耗,同时提高目标跟踪精度,同时坚持对MTT性能和系统照明资源预算的预定要求,从而改善低概率拦截性能。为了实现这一目标,开发了效用函数来评估联盟结构、传输功耗和跟踪精度。然后,通过将雷达之间的合作互动表述为联盟博弈,建立了分布式雷达网络的联盟结构和功率分配优化模型。用数学方法证明了博弈纳什均衡解的存在性。针对该优化模型,提出了一种基于顺序二次规划的迭代三步算法。数值结果表明,与其他基准测试相比,所提出的JCFPA策略获得了更好的系统性能。
{"title":"Game-Theoretic Joint Coalition Formation and Power Allocation Strategy for Multitarget Tracking in Distributed Radar Network","authors":"Chenguang Shi;Xuezhang Sun;Xiangrong Dai;Jianjiang Zhou","doi":"10.1109/JSYST.2024.3522100","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3522100","url":null,"abstract":"In this article, a game-theoretic joint coalition formation and power allocation (JCFPA) strategy is investigated for multitarget tracking (MTT) in a distributed radar network. The main objective of the presented strategy is to minimize the total transmit power consumption and enhance the target tracking accuracy concurrently, while adhering to predefined requirements on the MTT performance and system illumination resource budgets, thus improving the low probability of intercept performance. To achieve this, a utility function is developed to evaluate the coalition structure, transmit power consumption, and tracking accuracy. Then, by formulating the cooperative interactions among radars as a coalition game, we establish an optimization model to optimize the coalition structure and power allocation for the distributed radar network. The existence of the Nash equilibrium solution for the game is proven mathematically. To address the optimization model, an iterative three-step algorithm is developed based on the sequential quadratic programming. Numerical results reveal that the presented JCFPA strategy obtains superior system performance compared to other benchmarks.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"234-245"},"PeriodicalIF":4.0,"publicationDate":"2024-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System-Level Analysis of the Directional Radar Coverage for UAV Localization in Dynamic Swarms 动态蜂群中无人机定位的定向雷达覆盖系统级分析
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-31 DOI: 10.1109/JSYST.2024.3519887
Anna Gaydamaka;Mahmoud T. Kabir;Andrey Samuylov;Dmitri Moltchanov;Bo Tan;Yevgeni Koucheryavy
Numerous mission-critical unmanned aerial vehicle (UAV) operations, such as rescue and surveillance missions, are conducted in areas lacking access to external infrastructure providing precise positioning information. To enhance situational awareness in such scenarios, millimeter wave (mmWave, $text{30}-text{300}$ GHz) and subterahertz (sub-THz, $text{100}-text{300}$ GHz) range or Doppler radars promising large resolution can be employed. However, the small antenna apertures in these bands naturally call for the use of massive antenna arrays to achieve reasonable detection distances. By employing directional antenna arrays, these radars need to exhaustively scan the surroundings to ensure situational awareness of a UAV in a swarm. The aim of this article is to characterize the system-level performance of mmWave/sub-THz range and Doppler radars as a function of system parameters by accounting for the propagation specifics of the considered bands. To this aim, we combine the tools of stochastic geometry and antenna simulations to determine the optimal half-power beamwidth that minimizes the full scanning time while maximizing the detection probability of all UAVs in a swarm. Our results demonstrate that both types of radars are characterized by qualitatively similar performance. Detection performance is highly sensitive to both UAV density and coverage radius, as the increase in these parameters leads to an abrupt drop in the detection performance. At small distances, $leq!text{50}$ m, antenna arrays with a smaller number of elements result in the best tradeoff between scanning time and detection probability. Specifically, both types of radars provide perfect knowledge of the surroundings (with detection probability higher than 0.99) within a 50-m radius with a scanning time of less than 1 ms. At greater distances, $geq! text{100}$ m, the only option to improve performance is a drastic increase in the emitted power or receiver sensitivity.
许多关键任务无人机(UAV)操作,如救援和监视任务,在缺乏外部基础设施提供精确定位信息的地区进行。为了增强在这种情况下的态势感知能力,可以采用具有大分辨率的毫米波(mmWave, $text{30}-text{300}$ GHz)和次太赫兹(sub-THz, $text{100}-text{300}$ GHz)范围或多普勒雷达。然而,这些波段的小天线孔径自然需要使用大量的天线阵列来实现合理的探测距离。通过使用定向天线阵列,这些雷达需要详尽地扫描周围环境,以确保无人机在蜂群中的态势感知。本文的目的是描述毫米波/亚太赫兹范围和多普勒雷达的系统级性能,通过考虑所考虑的波段的传播特性,作为系统参数的函数。为此,我们结合随机几何和天线模拟的工具来确定最优的半功率波束宽度,以最大限度地减少全扫描时间,同时最大限度地提高群中所有无人机的检测概率。我们的结果表明,这两种类型的雷达具有定性相似的性能。探测性能对无人机密度和覆盖半径都高度敏感,因为这些参数的增加会导致探测性能的突然下降。在较小距离($leq!text{50}$ m)下,单元数较少的天线阵列在扫描时间和探测概率之间取得了最佳折衷。具体来说,这两种雷达都能提供半径50米范围内的环境信息(探测概率高于0.99),扫描时间小于1毫秒。在更远的距离($geq! text{100}$ m),提高性能的唯一选择是大幅增加发射功率或接收器灵敏度。
{"title":"System-Level Analysis of the Directional Radar Coverage for UAV Localization in Dynamic Swarms","authors":"Anna Gaydamaka;Mahmoud T. Kabir;Andrey Samuylov;Dmitri Moltchanov;Bo Tan;Yevgeni Koucheryavy","doi":"10.1109/JSYST.2024.3519887","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3519887","url":null,"abstract":"Numerous mission-critical unmanned aerial vehicle (UAV) operations, such as rescue and surveillance missions, are conducted in areas lacking access to external infrastructure providing precise positioning information. To enhance situational awareness in such scenarios, millimeter wave (mmWave, <inline-formula><tex-math>$text{30}-text{300}$</tex-math></inline-formula> GHz) and subterahertz (sub-THz, <inline-formula><tex-math>$text{100}-text{300}$</tex-math></inline-formula> GHz) range or Doppler radars promising large resolution can be employed. However, the small antenna apertures in these bands naturally call for the use of massive antenna arrays to achieve reasonable detection distances. By employing directional antenna arrays, these radars need to exhaustively scan the surroundings to ensure situational awareness of a UAV in a swarm. The aim of this article is to characterize the system-level performance of mmWave/sub-THz range and Doppler radars as a function of system parameters by accounting for the propagation specifics of the considered bands. To this aim, we combine the tools of stochastic geometry and antenna simulations to determine the optimal half-power beamwidth that minimizes the full scanning time while maximizing the detection probability of all UAVs in a swarm. Our results demonstrate that both types of radars are characterized by qualitatively similar performance. Detection performance is highly sensitive to both UAV density and coverage radius, as the increase in these parameters leads to an abrupt drop in the detection performance. At small distances, <inline-formula><tex-math>$leq!text{50}$</tex-math></inline-formula> m, antenna arrays with a smaller number of elements result in the best tradeoff between scanning time and detection probability. Specifically, both types of radars provide perfect knowledge of the surroundings (with detection probability higher than 0.99) within a 50-m radius with a scanning time of less than 1 ms. At greater distances, <inline-formula><tex-math>$geq! text{100}$</tex-math></inline-formula> m, the only option to improve performance is a drastic increase in the emitted power or receiver sensitivity.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"164-175"},"PeriodicalIF":4.0,"publicationDate":"2024-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10818969","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Synchronous Lightweight AKA Protocol With Authority Management for Wireless Medical Sensor Networks 无线医疗传感器网络中具有权限管理的自适应同步轻量级AKA协议
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-31 DOI: 10.1109/JSYST.2024.3519516
Lei Zhang;Ting Wu;Jianwei Liu;Zhenyu Guan;Xiaodong Yin
The advancement of wireless network technology has propelled wireless medical sensor networks (WMSNs) to transform healthcare, offering efficient communication for enhanced quality of life. These networks employ sensitive and resource-efficient sensors to monitor and transmit patients' vital health data to medical professionals through wireless channels. However, the openness of these channels risks unauthorized access and data tampering, jeopardizing patient privacy and treatment efficacy. Ensuring the integrity and confidentiality of health data is crucial. Current authentication and key agreement (AKA) protocols have limitations, including susceptibility to sensor information disclosure and security flaws due to excessive user authority and mismatched pseudorandom identities. Given the resource constraints of WMSNs, traditional cryptographic methods are not always suitable. To overcome these challenges, a lightweight AKA protocol with self-adaptive synchronization and authority management is proposed. Formal verification through the real-or-random model, BAN logic, and ProVerif tool confirms its security and availability, while informal analysis demonstrates its robust security features. Comparative analysis with recent schemes also highlights its superiority and fitness for WMSNs.
无线网络技术的进步推动了无线医疗传感器网络(wmsn)改变医疗保健,为提高生活质量提供有效的通信。这些网络采用敏感且资源高效的传感器来监测患者的重要健康数据,并通过无线通道将其传输给医疗专业人员。然而,这些渠道的开放性存在未经授权访问和数据篡改的风险,危及患者隐私和治疗效果。确保卫生数据的完整性和保密性至关重要。当前的身份验证和密钥协议(AKA)协议存在局限性,包括易受传感器信息泄露的影响,以及由于过度的用户权限和不匹配的伪随机身份而导致的安全漏洞。由于wmsn的资源限制,传统的加密方法并不总是适用的。为了克服这些挑战,提出了一种具有自适应同步和权限管理功能的轻量级AKA协议。通过real-or-random模型、BAN逻辑和ProVerif工具进行的正式验证确认了其安全性和可用性,而非正式分析则证明了其健壮的安全特性。通过与现有方案的比较分析,突出了该方案在wmsn中的优越性和适用性。
{"title":"An Adaptive Synchronous Lightweight AKA Protocol With Authority Management for Wireless Medical Sensor Networks","authors":"Lei Zhang;Ting Wu;Jianwei Liu;Zhenyu Guan;Xiaodong Yin","doi":"10.1109/JSYST.2024.3519516","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3519516","url":null,"abstract":"The advancement of wireless network technology has propelled wireless medical sensor networks (WMSNs) to transform healthcare, offering efficient communication for enhanced quality of life. These networks employ sensitive and resource-efficient sensors to monitor and transmit patients' vital health data to medical professionals through wireless channels. However, the openness of these channels risks unauthorized access and data tampering, jeopardizing patient privacy and treatment efficacy. Ensuring the integrity and confidentiality of health data is crucial. Current authentication and key agreement (AKA) protocols have limitations, including susceptibility to sensor information disclosure and security flaws due to excessive user authority and mismatched pseudorandom identities. Given the resource constraints of WMSNs, traditional cryptographic methods are not always suitable. To overcome these challenges, a lightweight AKA protocol with self-adaptive synchronization and authority management is proposed. Formal verification through the real-or-random model, BAN logic, and ProVerif tool confirms its security and availability, while informal analysis demonstrates its robust security features. Comparative analysis with recent schemes also highlights its superiority and fitness for WMSNs.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"200-211"},"PeriodicalIF":4.0,"publicationDate":"2024-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AoI-Aware Resource Allocation for Smart Multi-QoS Provisioning 基于aoi感知的多qos智能资源分配
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-27 DOI: 10.1109/JSYST.2024.3519536
Jingqing Wang;Wenchi Cheng;Wei Zhang
The age of information (AoI) has recently gained recognition as a critical quality-of-service (QoS) metric for quantifying the freshness of status updates, playing a crucial role in supporting massive ultrareliable and low-latency communications (mURLLCs). In mURLLC scenarios, status updates generally involve the transmission through applying finite blocklength coding (FBC) to efficiently encode small update packets while meeting stringent error-rate and latency-bounded QoS constraints. However, due to inherent system dynamics and varying environmental conditions, optimizing AoI under such multi-QoS constraints often results in nonconvex and computationally intractable problems. Motivated by the demonstrated efficacy of deep reinforcement learning (DRL) in addressing large-scale networking challenges, this work aims to apply DRL techniques to derive optimal resource allocation solutions in real time. Despite its potential, the effective integration of FBC in DRL-based AoI optimization remains underexplored, especially in addressing the challenge of simultaneously upper bounding both delay and error rate. To address these challenges, we propose a DRL-based framework for AoI-aware optimal resource allocation in mURLLC-driven multi-QoS schemes, leveraging AoI as a core metric within the finite blocklength regime. First, we design a wireless communication architecture and AoI-based modeling framework that incorporates FBC. Second, we proceed by deriving upper bounded peak AoI and delay violation probabilities using stochastic network calculus. Subsequently, we formulate an optimization problem aimed at minimizing the peak AoI violation probability through FBC. Third, we develop DRL algorithms to determine optimal resource allocation policies that meet statistical delay and error-rate requirements for mURLLC. Finally, to validate the effectiveness of the developed schemes, we have executed a series of simulations.
最近,信息时代(AoI)作为一种量化状态更新新鲜度的关键服务质量(QoS)指标得到了认可,在支持大规模超可靠和低延迟通信(murllc)方面发挥着至关重要的作用。在mURLLC场景中,状态更新通常涉及通过应用有限块长编码(FBC)来有效编码小更新数据包的传输,同时满足严格的错误率和延迟有限的QoS约束。然而,由于固有的系统动力学和多变的环境条件,在这种多qos约束下优化AoI往往会导致非凸和计算棘手的问题。由于深度强化学习(DRL)在解决大规模网络挑战方面的有效性,本工作旨在应用DRL技术实时获得最佳资源分配解决方案。尽管具有潜力,但FBC在基于drl的AoI优化中的有效集成仍未得到充分探索,特别是在解决延迟和错误率同时上界的挑战方面。为了解决这些挑战,我们提出了一个基于drl的框架,用于在murllc驱动的多qos方案中实现AoI感知的最佳资源分配,利用AoI作为有限块长度机制中的核心指标。首先,我们设计了一个包含FBC的无线通信架构和基于aoi的建模框架。其次,利用随机网络演算推导出峰值AoI的上界和延迟违反概率。随后,我们通过FBC构造了一个以最小化AoI峰值违反概率为目标的优化问题。第三,我们开发了DRL算法来确定满足mURLLC统计延迟和错误率要求的最优资源分配策略。最后,为了验证所开发方案的有效性,我们进行了一系列的仿真。
{"title":"AoI-Aware Resource Allocation for Smart Multi-QoS Provisioning","authors":"Jingqing Wang;Wenchi Cheng;Wei Zhang","doi":"10.1109/JSYST.2024.3519536","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3519536","url":null,"abstract":"The age of information (AoI) has recently gained recognition as a critical quality-of-service (QoS) metric for quantifying the freshness of status updates, playing a crucial role in supporting massive ultrareliable and low-latency communications (mURLLCs). In mURLLC scenarios, status updates generally involve the transmission through applying finite blocklength coding (FBC) to efficiently encode small update packets while meeting stringent error-rate and latency-bounded QoS constraints. However, due to inherent system dynamics and varying environmental conditions, optimizing AoI under such multi-QoS constraints often results in nonconvex and computationally intractable problems. Motivated by the demonstrated efficacy of deep reinforcement learning (DRL) in addressing large-scale networking challenges, this work aims to apply DRL techniques to derive optimal resource allocation solutions in real time. Despite its potential, the effective integration of FBC in DRL-based AoI optimization remains underexplored, especially in addressing the challenge of simultaneously upper bounding both delay and error rate. To address these challenges, we propose a DRL-based framework for AoI-aware optimal resource allocation in mURLLC-driven multi-QoS schemes, leveraging AoI as a core metric within the finite blocklength regime. First, we design a wireless communication architecture and AoI-based modeling framework that incorporates FBC. Second, we proceed by deriving upper bounded peak AoI and delay violation probabilities using stochastic network calculus. Subsequently, we formulate an optimization problem aimed at minimizing the peak AoI violation probability through FBC. Third, we develop DRL algorithms to determine optimal resource allocation policies that meet statistical delay and error-rate requirements for mURLLC. Finally, to validate the effectiveness of the developed schemes, we have executed a series of simulations.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"305-316"},"PeriodicalIF":4.0,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge Server and Service Deployment Considering Profit With Improved PSO in IoV 基于改进粒子群的车联网边缘服务器和服务部署
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-18 DOI: 10.1109/JSYST.2024.3512871
Junhui Zhao;Yuwen Huang;Qingmiao Zhang;Dongming Wang;Wei Xu
Mobile edge computing (MEC) plays a pivotal role in the Internet of Vehicles and the Internet of Things. Edge server deployment is the initial step in establishing edge computing systems, which impact the overall system performance significantly. Besides, the performance of an edge computing system is also contingent upon the type of service deployed on servers, in the case of the same server deployment, different deployment of services will bring different profits. Most current studies concentrate solely on the former aspect, neglecting the optimization of service deployment in MEC system. In this article, we proposed a two-step method KPSOP for edge server and edge service deployment, aiming to reduce time delay, balance load, and improve the profit of MEC system, and KPSOP includes clustering algorithm and heuristic algorithm. We considered the location distribution of base stations, the task requests of vehicle users, the resource limitations of edge servers, etc. First, the edge server deployment was completed with the goal of minimizing time delay and load balancing. Second, the service deployment was completed with the goal of maximizing edge server profit. The experiments were based on real world base station information. The simulation results validate that our algorithm is more stable and converges faster. In addition, compared to other algorithms, it performs better in load balance and increasing profit.
移动边缘计算(MEC)在车联网和物联网中发挥着举足轻重的作用。边缘服务器部署是建立边缘计算系统的第一步,它对整个系统的性能影响很大。此外,边缘计算系统的性能还取决于服务器上部署的服务类型,在相同服务器部署的情况下,不同的服务部署将带来不同的利润。目前的研究大多集中在前一个方面,而忽略了MEC系统中业务部署的优化。本文提出了一种边缘服务器和边缘服务部署的两步法KPSOP,旨在减少MEC系统的时延、平衡负载和提高利润,KPSOP包括聚类算法和启发式算法。考虑了基站的位置分布、车辆用户的任务请求、边缘服务器的资源限制等问题。首先,以最小化时间延迟和负载平衡为目标完成了边缘服务器部署。其次,以最大化边缘服务器利润为目标完成服务部署。实验是基于真实世界的基站信息。仿真结果验证了该算法的稳定性和收敛速度。此外,与其他算法相比,它在负载平衡和增加利润方面表现更好。
{"title":"Edge Server and Service Deployment Considering Profit With Improved PSO in IoV","authors":"Junhui Zhao;Yuwen Huang;Qingmiao Zhang;Dongming Wang;Wei Xu","doi":"10.1109/JSYST.2024.3512871","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3512871","url":null,"abstract":"Mobile edge computing (MEC) plays a pivotal role in the Internet of Vehicles and the Internet of Things. Edge server deployment is the initial step in establishing edge computing systems, which impact the overall system performance significantly. Besides, the performance of an edge computing system is also contingent upon the type of service deployed on servers, in the case of the same server deployment, different deployment of services will bring different profits. Most current studies concentrate solely on the former aspect, neglecting the optimization of service deployment in MEC system. In this article, we proposed a two-step method KPSOP for edge server and edge service deployment, aiming to reduce time delay, balance load, and improve the profit of MEC system, and KPSOP includes clustering algorithm and heuristic algorithm. We considered the location distribution of base stations, the task requests of vehicle users, the resource limitations of edge servers, etc. First, the edge server deployment was completed with the goal of minimizing time delay and load balancing. Second, the service deployment was completed with the goal of maximizing edge server profit. The experiments were based on real world base station information. The simulation results validate that our algorithm is more stable and converges faster. In addition, compared to other algorithms, it performs better in load balance and increasing profit.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"55-64"},"PeriodicalIF":4.0,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Output Feedback Tracking Consensus of Switched Stochastic Uncertain Multiagent Systems via Event-Triggered Control 基于事件触发控制的切换随机不确定多智能体系统输出反馈跟踪一致性
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-17 DOI: 10.1109/JSYST.2024.3511914
Jiayi Cai;Chengbo Yi;Xue Luo;Canrong Xiao
This article explores the adaptive event-triggered output consensus control problem for a class of switched stochastic multiagent systems (MASs) with unmeasured states and unknown nonlinearity. First, in order to overcome the limitations facing the average dwell-time method of consensus for switched MASs proposed in the existing works, the adaptive control protocol within the framework of mode-dependent average dwell time (MDADT) is introduced to expand the scope of applications. Furthermore, through a novel gain-scheduled state observer, the fuzzy logic systems are applied to approximate the unknown nonlinear functions. The dynamic surface design method is used to remove the need for derivative calculations of the constructed virtual controls, significantly the complexity of calculations. In addition, under the framework of backstepping design, the switching threshold event-triggered control strategy is developed to effectively decrease the communication load and balance the performance of MASs. The proposed control protocol ensures that all signals within the closed-loop systems are ultimately bounded under the MDADT switching property. Finally, the simulation results are obtained to validate the proposed control mechanism.
本文研究了一类具有不可测状态和未知非线性的切换随机多智能体系统的自适应事件触发输出一致性控制问题。首先,为了克服现有工作中提出的交换质量一致性平均停留时间方法所面临的局限性,引入了模式相关平均停留时间(MDADT)框架下的自适应控制协议,扩大了应用范围。此外,通过一种新的增益调度状态观测器,应用模糊逻辑系统逼近未知的非线性函数。采用动态曲面设计方法,消除了对所构造的虚拟控制器进行导数计算的需要,大大降低了计算的复杂度。此外,在退步设计框架下,开发了切换阈值事件触发控制策略,有效降低通信负载,平衡MASs性能。所提出的控制协议确保闭环系统内的所有信号最终在MDADT切换特性下有界。最后,仿真结果验证了所提出的控制机制。
{"title":"Output Feedback Tracking Consensus of Switched Stochastic Uncertain Multiagent Systems via Event-Triggered Control","authors":"Jiayi Cai;Chengbo Yi;Xue Luo;Canrong Xiao","doi":"10.1109/JSYST.2024.3511914","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3511914","url":null,"abstract":"This article explores the adaptive event-triggered output consensus control problem for a class of switched stochastic multiagent systems (MASs) with unmeasured states and unknown nonlinearity. First, in order to overcome the limitations facing the average dwell-time method of consensus for switched MASs proposed in the existing works, the adaptive control protocol within the framework of mode-dependent average dwell time (MDADT) is introduced to expand the scope of applications. Furthermore, through a novel gain-scheduled state observer, the fuzzy logic systems are applied to approximate the unknown nonlinear functions. The dynamic surface design method is used to remove the need for derivative calculations of the constructed virtual controls, significantly the complexity of calculations. In addition, under the framework of backstepping design, the switching threshold event-triggered control strategy is developed to effectively decrease the communication load and balance the performance of MASs. The proposed control protocol ensures that all signals within the closed-loop systems are ultimately bounded under the MDADT switching property. Finally, the simulation results are obtained to validate the proposed control mechanism.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"130-141"},"PeriodicalIF":4.0,"publicationDate":"2024-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Systems Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1