首页 > 最新文献

IEEE Systems Journal最新文献

英文 中文
Resource Management for QoS-Guaranteed Marine Data Feedback Based on Space–Air–Ground–Sea Network 基于天-空-地-海网络的 QoS 保证海洋数据反馈资源管理
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1109/JSYST.2024.3439343
Yuanmo Lin;Zhiyong Xu;Jianhua Li;Jingyuan Wang;Cheng Li;Zhonghu Huang;Yanli Xu
More developed marine sensors for various applications has induced a rapid increase in marine data. The feedback from these marine data becomes challenging due to the backward marine communication techniques. The space–air–ground–sea integrated network (SAGSIN) provides a possible solution to solve this challenge by making use of the advantages of different networks. However, how to coordinate these networks and manage heterogeneous resources to satisfy the communication requirements of different marine applications remains to be solved. In this article, we investigate the resource management problem of SAGSIN for marine applications. A resource management architecture is proposed in which software-defined networking (SDN) controllers are employed. Based on this architecture, heterogeneous resources can be scheduled, and the data from devices with different communication modes can be transmitted via SAGSIN without changing the communication mode of the devices. We further propose two multiagent deep reinforcement learning resource management schemes to help individual devices find optimal access and resource allocation decisions to feed their data back to the terrestrial data centers. The design of these proposed schemes fully considers the scarce communication resources of marine scenarios, which makes data feedback more communication efficient while satisfying quality of service (QoS) requirements. Simulation results show that the improved MA_SDN_Centralized resource management scheme can significantly reduce the blocking probability of the system with guaranteed QoS, while reducing the communication overhead of learning.
用于各种应用的海洋传感器越来越发达,导致海洋数据迅速增加。由于海洋通信技术落后,这些海洋数据的反馈变得十分困难。天-空-地-海综合网络(SAGSIN)利用不同网络的优势,为解决这一难题提供了可能的解决方案。然而,如何协调这些网络并管理异构资源以满足不同海洋应用的通信需求仍是一个有待解决的问题。本文研究了 SAGSIN 在海洋应用中的资源管理问题。本文提出了一种资源管理架构,其中采用了软件定义网络(SDN)控制器。基于该架构,可以调度异构资源,并在不改变设备通信模式的情况下,通过 SAGSIN 传输来自不同通信模式设备的数据。我们进一步提出了两种多代理深度强化学习资源管理方案,以帮助单个设备找到最佳访问和资源分配决策,从而将其数据反馈给地面数据中心。这些方案的设计充分考虑了海洋场景中通信资源稀缺的特点,使数据反馈在满足服务质量(QoS)要求的同时提高了通信效率。仿真结果表明,改进后的 MA_SDN_Centralized 资源管理方案可以在保证 QoS 的前提下显著降低系统的阻塞概率,同时减少学习的通信开销。
{"title":"Resource Management for QoS-Guaranteed Marine Data Feedback Based on Space–Air–Ground–Sea Network","authors":"Yuanmo Lin;Zhiyong Xu;Jianhua Li;Jingyuan Wang;Cheng Li;Zhonghu Huang;Yanli Xu","doi":"10.1109/JSYST.2024.3439343","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3439343","url":null,"abstract":"More developed marine sensors for various applications has induced a rapid increase in marine data. The feedback from these marine data becomes challenging due to the backward marine communication techniques. The space–air–ground–sea integrated network (SAGSIN) provides a possible solution to solve this challenge by making use of the advantages of different networks. However, how to coordinate these networks and manage heterogeneous resources to satisfy the communication requirements of different marine applications remains to be solved. In this article, we investigate the resource management problem of SAGSIN for marine applications. A resource management architecture is proposed in which software-defined networking (SDN) controllers are employed. Based on this architecture, heterogeneous resources can be scheduled, and the data from devices with different communication modes can be transmitted via SAGSIN without changing the communication mode of the devices. We further propose two multiagent deep reinforcement learning resource management schemes to help individual devices find optimal access and resource allocation decisions to feed their data back to the terrestrial data centers. The design of these proposed schemes fully considers the scarce communication resources of marine scenarios, which makes data feedback more communication efficient while satisfying quality of service (QoS) requirements. Simulation results show that the improved MA_SDN_Centralized resource management scheme can significantly reduce the blocking probability of the system with guaranteed QoS, while reducing the communication overhead of learning.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 3","pages":"1741-1752"},"PeriodicalIF":4.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack Design for Maximum Malware Spread Through EVs Commute and Charge in Power-Transportation Systems 通过电力运输系统中的电动汽车通勤和充电实现最大程度恶意软件传播的攻击设计
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-29 DOI: 10.1109/JSYST.2024.3446231
Sushil Poudel;Mahmoud Abouyoussef;J. Eileen Baugh;Muhammad Ismail
The growing number of electric vehicles (EVs) on the roads led to a wide deployment of public EV charging stations (EVCSs). Recent reports revealed that both EVs and EVCSs are targets of cyber-attacks. In this context, a malware attack on vehicle-to-grid (V2G) communications increases the risk of malware spread among EVs and public EVCSs. However, the existing literature lacks practical studies on malware spread in power-transportation systems. Hence, this article demonstrates malicious traffic injection and proposes strategies to identify target EVCSs that can maximize physical malware spread within power-transportation systems. We first show the feasibility of injecting malicious traffic into the front-end V2G communication. Next, we establish a model that reflects the logical connectivity among the EVCSs, based on a realistic framework for large-scale EV commute and charge simulation. The logical connectivity is then translated into a malware spread probability, which we use to design an optimal attack strategy that identifies the locations of target EVCSs that maximize the malware spread. We compare malware spread due to random, cluster-based, and optimal attack strategies in both urban (Nashville) and rural (Cookeville) U.S. cities. Our results reveal that optimal attack strategies can accelerate malware spread by $10%$$33%$.
道路上的电动汽车(EV)数量不断增加,导致公共电动汽车充电站(EVCS)的广泛部署。最近的报告显示,电动汽车和电动汽车充电站都是网络攻击的目标。在这种情况下,针对车联网(V2G)通信的恶意软件攻击增加了恶意软件在电动汽车和公共 EVCS 之间传播的风险。然而,现有文献缺乏对电力运输系统中恶意软件传播的实际研究。因此,本文展示了恶意流量注入,并提出了识别目标 EVCS 的策略,以最大限度地提高恶意软件在电力传输系统中的物理传播。我们首先展示了在前端 V2G 通信中注入恶意流量的可行性。接下来,我们基于大规模电动汽车通勤和充电模拟的现实框架,建立了一个反映 EVCS 之间逻辑连接的模型。然后,逻辑连通性被转化为恶意软件传播概率,我们利用该概率设计出一种最佳攻击策略,确定目标 EVCS 的位置,使恶意软件传播最大化。我们在美国城市(纳什维尔)和乡村(库克维尔)比较了随机攻击策略、集群攻击策略和最优攻击策略导致的恶意软件传播。我们的研究结果表明,最优攻击策略可以将恶意软件的传播速度提高 10%$-33%$ 。
{"title":"Attack Design for Maximum Malware Spread Through EVs Commute and Charge in Power-Transportation Systems","authors":"Sushil Poudel;Mahmoud Abouyoussef;J. Eileen Baugh;Muhammad Ismail","doi":"10.1109/JSYST.2024.3446231","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3446231","url":null,"abstract":"The growing number of electric vehicles (EVs) on the roads led to a wide deployment of public EV charging stations (EVCSs). Recent reports revealed that both EVs and EVCSs are targets of cyber-attacks. In this context, a malware attack on vehicle-to-grid (V2G) communications increases the risk of malware spread among EVs and public EVCSs. However, the existing literature lacks practical studies on malware spread in power-transportation systems. Hence, this article demonstrates malicious traffic injection and proposes strategies to identify target EVCSs that can maximize physical malware spread within power-transportation systems. We first show the feasibility of injecting malicious traffic into the front-end V2G communication. Next, we establish a model that reflects the logical connectivity among the EVCSs, based on a realistic framework for large-scale EV commute and charge simulation. The logical connectivity is then translated into a malware spread probability, which we use to design an optimal attack strategy that identifies the locations of target EVCSs that maximize the malware spread. We compare malware spread due to random, cluster-based, and optimal attack strategies in both urban (Nashville) and rural (Cookeville) U.S. cities. Our results reveal that optimal attack strategies can accelerate malware spread by \u0000<inline-formula><tex-math>$10%$</tex-math></inline-formula>\u0000–\u0000<inline-formula><tex-math>$33%$</tex-math></inline-formula>\u0000.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 3","pages":"1809-1820"},"PeriodicalIF":4.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Performance of Wireless PBFT-Based Blockchain Network With IEEE 802.11 基于 IEEE 802.11 的无线 PBFT 区块链网络性能研究
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-28 DOI: 10.1109/JSYST.2024.3443541
Ziyi Zhou;Oluwakayode Onireti;Xinyi Lin;Lei Zhang;Muhammad Ali Imran
The ever-increasing mobile users pose a great challenge to the current centralized structure, where the failure of the network center significantly compromises privacy and data security. Practical byzantine fault tolerant (PBFT), a voting-based consensus blockchain, is a plausible solution to the wireless network for its distributed and decentralized traits, and it is not computation-intensive. The view change mechanism guarantees the liveness and resilience of PBFT, but it also causes delay. Moreover, spectrum is usually shared in the wireless network, introducing additional channel contention. Hence, we develop a framework investigating the impacts of channel contention on the wireless PBFT network using the IEEE 802.11 protocol. Based on the Markov model, we derive the throughput, transmission success probability, and transaction confirmation delay of such a network. Furthermore, we derive the view change delay in reference to the transaction confirmation delay. The analysis and results show that channel contention impacts in two ways. It impairs the success probability and increases the chance of view change. Optimal pairs of packet arrival rate and contention window size are formulated to maximize the consensus's success probability without sacrificing the overall network performance. Further, the optimal pairs under different network sizes are demonstrated for straightforward guidance.
不断增加的移动用户对当前的集中式结构提出了巨大挑战,网络中心的故障会严重损害隐私和数据安全。实用拜占庭容错(PBFT)是一种基于投票的共识区块链,因其分布式和去中心化的特性而成为无线网络的可行解决方案,而且不需要大量计算。视图变更机制保证了 PBFT 的有效性和弹性,但也会造成延迟。此外,无线网络中的频谱通常是共享的,会带来额外的信道争用。因此,我们开发了一个框架,利用 IEEE 802.11 协议研究信道争用对无线 PBFT 网络的影响。基于马尔可夫模型,我们推导出了这种网络的吞吐量、传输成功概率和交易确认延迟。此外,我们还参照交易确认延迟推导出了视图变化延迟。分析和结果表明,信道争用会产生两种影响。它损害了成功概率,增加了视图变化的几率。为了在不牺牲整体网络性能的情况下最大化共识的成功概率,我们制定了数据包到达率和争用窗口大小的最佳配对。此外,还展示了不同网络规模下的最佳配对,以提供直接指导。
{"title":"On the Performance of Wireless PBFT-Based Blockchain Network With IEEE 802.11","authors":"Ziyi Zhou;Oluwakayode Onireti;Xinyi Lin;Lei Zhang;Muhammad Ali Imran","doi":"10.1109/JSYST.2024.3443541","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3443541","url":null,"abstract":"The ever-increasing mobile users pose a great challenge to the current centralized structure, where the failure of the network center significantly compromises privacy and data security. Practical byzantine fault tolerant (PBFT), a voting-based consensus blockchain, is a plausible solution to the wireless network for its distributed and decentralized traits, and it is not computation-intensive. The view change mechanism guarantees the liveness and resilience of PBFT, but it also causes delay. Moreover, spectrum is usually shared in the wireless network, introducing additional channel contention. Hence, we develop a framework investigating the impacts of channel contention on the wireless PBFT network using the IEEE 802.11 protocol. Based on the Markov model, we derive the throughput, transmission success probability, and transaction confirmation delay of such a network. Furthermore, we derive the view change delay in reference to the transaction confirmation delay. The analysis and results show that channel contention impacts in two ways. It impairs the success probability and increases the chance of view change. Optimal pairs of packet arrival rate and contention window size are formulated to maximize the consensus's success probability without sacrificing the overall network performance. Further, the optimal pairs under different network sizes are demonstrated for straightforward guidance.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 3","pages":"1786-1797"},"PeriodicalIF":4.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilient Discrete-Time Quantization Communication for Distributed Secondary Control of AC Microgrids Under DoS Attacks 针对 DoS 攻击下交流微电网分布式二次控制的弹性离散时间量化通信
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-28 DOI: 10.1109/JSYST.2024.3444049
Xin Cai;Bingpeng Gao;Xinyuan Nan;Jie Yuan
For islanded ac microgrids with constrained digital communication networks under denial-of-service (DoS) attacks, this article proposes a resilient distributed secondary control strategy with a discrete-time quantization communication scheme to enhance the resilience to DoS attacks and to reduce communication loads. To cope with the time-constrained DoS attacks, the proposed discrete-time communication scheme combines a periodic communication attempt in the time intervals in presence of DoS attacks, and an event-triggered communication in the time intervals in absence of DoS attacks. Moreover, a dynamic quantization scheme for data transmission is introduced in the distributed control for the stability of the frequency and voltage at the reference. Then, a sufficient stability condition is established for the microgrid and the tradeoff between the communication attempt period and DoS attacks is obtained. Simulations of a microgrid are presented to verify the proposed resilient secondary control strategy.
对于在拒绝服务(DoS)攻击下具有受限数字通信网络的孤岛交流微电网,本文提出了一种具有离散时间量化通信方案的弹性分布式二次控制策略,以增强对 DoS 攻击的弹性并减少通信负载。为应对时间受限的 DoS 攻击,所提出的离散时间通信方案结合了在存在 DoS 攻击的时间间隔内的周期性通信尝试和在不存在 DoS 攻击的时间间隔内的事件触发通信。此外,在分布式控制中引入了数据传输动态量化方案,以确保频率和电压在基准点的稳定性。然后,建立了微电网的充分稳定条件,并得到了通信尝试周期与 DoS 攻击之间的权衡。本文还对微电网进行了仿真,以验证所提出的弹性二次控制策略。
{"title":"Resilient Discrete-Time Quantization Communication for Distributed Secondary Control of AC Microgrids Under DoS Attacks","authors":"Xin Cai;Bingpeng Gao;Xinyuan Nan;Jie Yuan","doi":"10.1109/JSYST.2024.3444049","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3444049","url":null,"abstract":"For islanded ac microgrids with constrained digital communication networks under denial-of-service (DoS) attacks, this article proposes a resilient distributed secondary control strategy with a discrete-time quantization communication scheme to enhance the resilience to DoS attacks and to reduce communication loads. To cope with the time-constrained DoS attacks, the proposed discrete-time communication scheme combines a periodic communication attempt in the time intervals in presence of DoS attacks, and an event-triggered communication in the time intervals in absence of DoS attacks. Moreover, a dynamic quantization scheme for data transmission is introduced in the distributed control for the stability of the frequency and voltage at the reference. Then, a sufficient stability condition is established for the microgrid and the tradeoff between the communication attempt period and DoS attacks is obtained. Simulations of a microgrid are presented to verify the proposed resilient secondary control strategy.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 3","pages":"1798-1808"},"PeriodicalIF":4.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inferring Intents From Equivariant–Invariant Representations and Relational Learning in Multiagent Systems 从等价不变表征推断意图与多代理系统中的关系学习
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1109/JSYST.2024.3440472
Xihe Qiu;Haoyu Wang;Xiaoyu Tan
Accurately understanding intentions is crucial in various real-world multiagent scenarios, which helps comprehend motives and predict actions within these contexts. Existing methods tend to either concentrate too much on single agents' isolated characteristics or model complex interactions among multiple agents, failing to adequately address both aspects simultaneously. To address this challenge, we propose a novel framework called integrative multiagent behavior prediction framework to systematically incorporate individual features and interagent relational dynamics. Our approach not only models multiagent interactions by learning from visual data, but also integrates mining of imagery and videos to leverage intrinsic invariant and variant qualities of each agent's extrinsic morphology. Meanwhile, inspired by time -series forecasting, we represent interagent history and connections as seasonal and trend features in time-series patterns, capturing past behavioral influences that are often ignored. We also design an encoder that efficiently learns time-dependencies and concatenates individual invariant–variant feature learning modules with multiagent interaction representations to accurately infer intentions and trajectory predictions. Our approach not only models multiagent interactions by learning from visual data, but also integrates mining of imagery and videos to leverage intrinsic invariant qualities of each agent's extrinsic morphology (e.g., body shape, color) and variant qualities (e.g., pose, expression, attire). Extensive experiments demonstrate that, compared to current state-of-the-art intention analysis models, our framework improves behavioral prediction performance in multiagent environments.
在现实世界的各种多代理场景中,准确理解意图至关重要,这有助于理解动机并预测这些场景中的行动。现有的方法往往要么过于关注单个代理的孤立特征,要么对多个代理之间的复杂互动进行建模,无法同时充分解决这两方面的问题。为了应对这一挑战,我们提出了一个名为 "多代理行为综合预测框架 "的新框架,系统地将个体特征和代理间的关系动态结合起来。我们的方法不仅通过从视觉数据中学习来建立多代理互动模型,还整合了对图像和视频的挖掘,以利用每个代理外在形态的内在不变性和变异性。同时,受时间序列预测的启发,我们将代理间的历史和联系表示为时间序列模式中的季节和趋势特征,从而捕捉到通常被忽视的过去行为影响因素。我们还设计了一种编码器,可以高效地学习时间依赖性,并将单个无变量特征学习模块与多代理交互表征结合起来,从而准确地推断出意图和轨迹预测。我们的方法不仅通过从视觉数据中学习来建立多代理互动模型,而且还整合了图像和视频挖掘,以利用每个代理的外在形态(如体形、颜色)和变异品质(如姿势、表情、服饰)的内在不变品质。大量实验证明,与目前最先进的意图分析模型相比,我们的框架提高了多代理环境中的行为预测性能。
{"title":"Inferring Intents From Equivariant–Invariant Representations and Relational Learning in Multiagent Systems","authors":"Xihe Qiu;Haoyu Wang;Xiaoyu Tan","doi":"10.1109/JSYST.2024.3440472","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3440472","url":null,"abstract":"Accurately understanding intentions is crucial in various real-world multiagent scenarios, which helps comprehend motives and predict actions within these contexts. Existing methods tend to either concentrate too much on single agents' isolated characteristics or model complex interactions among multiple agents, failing to adequately address both aspects simultaneously. To address this challenge, we propose a novel framework called integrative multiagent behavior prediction framework to systematically incorporate individual features and interagent relational dynamics. Our approach not only models multiagent interactions by learning from visual data, but also integrates mining of imagery and videos to leverage intrinsic invariant and variant qualities of each agent's extrinsic morphology. Meanwhile, inspired by time -series forecasting, we represent interagent history and connections as seasonal and trend features in time-series patterns, capturing past behavioral influences that are often ignored. We also design an encoder that efficiently learns time-dependencies and concatenates individual invariant–variant feature learning modules with multiagent interaction representations to accurately infer intentions and trajectory predictions. Our approach not only models multiagent interactions by learning from visual data, but also integrates mining of imagery and videos to leverage intrinsic invariant qualities of each agent's extrinsic morphology (e.g., body shape, color) and variant qualities (e.g., pose, expression, attire). Extensive experiments demonstrate that, compared to current state-of-the-art intention analysis models, our framework improves behavioral prediction performance in multiagent environments.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 3","pages":"1765-1775"},"PeriodicalIF":4.0,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Cognitive Networks: Reinforcement Learning Meets Energy Harvesting Over Cascaded Channels 优化认知网络:级联信道上的强化学习与能量收集
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1109/JSYST.2024.3442017
Deemah H. Tashman;Soumaya Cherkaoui;Walaa Hamouda
This article presents a reinforcement learning-based approach to improve the physical layer security of an underlay cognitive radio network over cascaded channels. These channels are utilized in highly mobile networks such as cognitive vehicular networks (CVN). In addition, an eavesdropper aims to intercept the communications between secondary users (SUs). The SU receiver has full-duplex and energy harvesting capabilities to generate jamming signals to confound the eavesdropper and enhance security. Moreover, the SU transmitter extracts energy from ambient radio frequency signals in order to power subsequent transmissions to its intended receiver. To optimize the privacy and reliability of the SUs in a CVN, a deep Q-network (DQN) strategy is utilized where multiple DQN agents are required such that an agent is assigned at each SU transmitter. The objective for the SUs is to determine the optimal transmission power and decide whether to collect energy or transmit messages during each time period in order to maximize their secrecy rate. Thereafter, we propose a DQN approach to maximize the throughput of the SUs while respecting the interference threshold acceptable at the receiver of the primary user. According to our findings, our strategy outperforms two other baseline strategies in terms of security and reliability.
本文提出了一种基于强化学习的方法来提高级联信道上底层认知无线电网络的物理层安全性。这些渠道被用于高度移动的网络,如认知车辆网络(CVN)。另外,窃听器的目的是拦截辅助用户之间的通信。SU接收机具有全双工和能量收集能力,能够产生干扰信号,迷惑窃听者,提高安全性。此外,SU发射器从环境射频信号中提取能量,以便为后续传输提供动力到其预期的接收器。为了优化CVN中SU的隐私性和可靠性,在需要多个DQN代理的情况下使用了深度q网络(DQN)策略,以便在每个SU发送器上分配一个代理。SUs的目标是确定最优的传输功率,并决定在每个时间段内是收集能量还是发送消息,以最大限度地提高其保密率。此后,我们提出了一种DQN方法,以最大限度地提高单元的吞吐量,同时尊重主用户接收端可接受的干扰阈值。根据我们的发现,我们的策略在安全性和可靠性方面优于其他两种基准策略。
{"title":"Optimizing Cognitive Networks: Reinforcement Learning Meets Energy Harvesting Over Cascaded Channels","authors":"Deemah H. Tashman;Soumaya Cherkaoui;Walaa Hamouda","doi":"10.1109/JSYST.2024.3442017","DOIUrl":"10.1109/JSYST.2024.3442017","url":null,"abstract":"This article presents a reinforcement learning-based approach to improve the physical layer security of an underlay cognitive radio network over cascaded channels. These channels are utilized in highly mobile networks such as cognitive vehicular networks (CVN). In addition, an eavesdropper aims to intercept the communications between secondary users (SUs). The SU receiver has full-duplex and energy harvesting capabilities to generate jamming signals to confound the eavesdropper and enhance security. Moreover, the SU transmitter extracts energy from ambient radio frequency signals in order to power subsequent transmissions to its intended receiver. To optimize the privacy and reliability of the SUs in a CVN, a deep Q-network (DQN) strategy is utilized where multiple DQN agents are required such that an agent is assigned at each SU transmitter. The objective for the SUs is to determine the optimal transmission power and decide whether to collect energy or transmit messages during each time period in order to maximize their secrecy rate. Thereafter, we propose a DQN approach to maximize the throughput of the SUs while respecting the interference threshold acceptable at the receiver of the primary user. According to our findings, our strategy outperforms two other baseline strategies in terms of security and reliability.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 4","pages":"1839-1848"},"PeriodicalIF":4.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Periodic Event-Triggered Consensus of Second-Order Nonlinear Multiagent Systems With Switching Topologies 具有切换拓扑的二阶非线性多代理系统的分布式周期性事件触发共识
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-26 DOI: 10.1109/JSYST.2024.3443332
Yongsheng Chen;Shi Li;Yujing Yan;Guobao Liu
In this letter, a distributed periodic event-triggered (PET) consensus protocol is proposed for nonlinear multiagent systems under directed communication topology switchings. Only at the sampling instants, the information exchanges and the modes of topologies are used. Then, a distributed PET controller with a discrete event-triggering mechanism is proposed to reduce the burden of communication. By deriving a novel average dwell time constraint and constructing multiple Lyapunov functions, the leader–following consensus objective can be achieved. Finally, the proposed method's effectiveness is demonstrated by simulation results.
本文针对定向通信拓扑切换下的非线性多代理系统提出了一种分布式周期事件触发(PET)共识协议。该协议仅在采样时刻使用信息交换和拓扑模式。然后,提出了一种具有离散事件触发机制的分布式 PET 控制器,以减轻通信负担。通过推导新的平均停留时间约束条件和构建多个 Lyapunov 函数,可以实现领导-跟随共识目标。最后,模拟结果证明了所提方法的有效性。
{"title":"Distributed Periodic Event-Triggered Consensus of Second-Order Nonlinear Multiagent Systems With Switching Topologies","authors":"Yongsheng Chen;Shi Li;Yujing Yan;Guobao Liu","doi":"10.1109/JSYST.2024.3443332","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3443332","url":null,"abstract":"In this letter, a distributed periodic event-triggered (PET) consensus protocol is proposed for nonlinear multiagent systems under directed communication topology switchings. Only at the sampling instants, the information exchanges and the modes of topologies are used. Then, a distributed PET controller with a discrete event-triggering mechanism is proposed to reduce the burden of communication. By deriving a novel average dwell time constraint and constructing multiple Lyapunov functions, the leader–following consensus objective can be achieved. Finally, the proposed method's effectiveness is demonstrated by simulation results.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 3","pages":"1821-1824"},"PeriodicalIF":4.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Coding Scheme for the AWGN Relay Network With Receiver–Transmitter Feedback 带接收器-发射器反馈的 AWGN 中继网络的高效编码方案
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-23 DOI: 10.1109/JSYST.2024.3437232
Han Deng;Dengfeng Xia;Han Cai;Qifa Yan;Peng Xu;Bin Dai
In this article, the relay network (RN) with receiver-transmitter feedback is investigated. First, we propose an efficient feedback coding scheme for the additive white Gaussian noise (AWGN) RN with noiseless receiver-transmitter feedback, which generalizes the Schalkwijk–Kailath (SK) type scheme for the AWGN channel with a single relay and noiseless receiver-transmitter feedback. The corresponding achievable rate of our proposed scheme is obtained under fixed coding block length and the receiver's decoding error probability, and it is shown that channel feedback significantly enhances the achievable rate of the same model without feedback. Then, we extend the above scheme to the same model with an AWGN feedback channel, where a modulo lattice function is applied to mitigate the impact of the feedback channel noise on the performance of the SK-type scheme. Finally, we further extend our proposed scheme to the quasi-static Rayleigh fading RN by using a precoding strategy. The results of this article are further explained via numerical examples, and this article provides a new method to construct low complexity coding schemes for relay networks.
本文研究了具有接收机-发送机反馈的中继网络(RN)。首先,我们提出了一种具有无噪声接收机-发送机反馈的加性白高斯噪声(AWGN)RN 的高效反馈编码方案,它概括了具有单中继和无噪声接收机-发送机反馈的 AWGN 信道的 Schalkwijk-Kailath (SK)型方案。在固定编码块长度和接收机解码错误概率的条件下,我们提出的方案得到了相应的可实现率,并证明信道反馈显著提高了无反馈相同模型的可实现率。然后,我们将上述方案扩展到具有 AWGN 反馈信道的同一模型,并在此基础上应用模格函数来减轻反馈信道噪声对 SK 型方案性能的影响。最后,我们通过使用预编码策略,进一步将我们提出的方案扩展到准静态瑞利衰落 RN。本文通过数值示例进一步解释了本文的结果,为构建中继网络的低复杂度编码方案提供了一种新方法。
{"title":"An Efficient Coding Scheme for the AWGN Relay Network With Receiver–Transmitter Feedback","authors":"Han Deng;Dengfeng Xia;Han Cai;Qifa Yan;Peng Xu;Bin Dai","doi":"10.1109/JSYST.2024.3437232","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3437232","url":null,"abstract":"In this article, the relay network (RN) with receiver-transmitter feedback is investigated. First, we propose an efficient feedback coding scheme for the additive white Gaussian noise (AWGN) RN with noiseless receiver-transmitter feedback, which generalizes the Schalkwijk–Kailath (SK) type scheme for the AWGN channel with a single relay and noiseless receiver-transmitter feedback. The corresponding achievable rate of our proposed scheme is obtained under fixed coding block length and the receiver's decoding error probability, and it is shown that channel feedback significantly enhances the achievable rate of the same model without feedback. Then, we extend the above scheme to the same model with an AWGN feedback channel, where a modulo lattice function is applied to mitigate the impact of the feedback channel noise on the performance of the SK-type scheme. Finally, we further extend our proposed scheme to the quasi-static Rayleigh fading RN by using a precoding strategy. The results of this article are further explained via numerical examples, and this article provides a new method to construct low complexity coding schemes for relay networks.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 3","pages":"1717-1728"},"PeriodicalIF":4.0,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Caching for Doubly Selective Fading Channels via Model-Agnostic Meta-Reinforcement Learning 通过模型诊断元强化学习实现双选择性衰减信道缓存
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1109/JSYST.2024.3442958
Weibao He;Fasheng Zhou;Dong Tang;Fang Fang;Wei Chen
Edge caching is expected to alleviate the traffic consumption in next-generation communications. In this article, we consider the transmission delay in wideband communications deteriorated by rapid user movements, where the frequency-selective wideband fading channels become fast time-varying and hence doubly-selective due to the user movements. To preferably allocate the caching resource in such circumstance, we introduce a coordinated caching network and accordingly formulate an allocation problem. However, the formulated problem is shown to be NP-hard. By considering the extremely high computational complexity to solve the NP-hard problem by traditional optimization algorithm, and considering only a few samples can be obtained for each training instance due to shortened coherence-time in the dynamical doubly selective fading channels, we propose a model-agnostic meta-reinforcement learning method to address the formulated problem. Particularly, the proposed method can efficiently recognize the unstable mobile channels and accordingly cache to reduce the overall transmission delay while only requires a few training samples. Numerical simulations are performed to verify the effectiveness of the proposed method and results show that the proposed one outperforms the commonly adopted existing method of deep-deterministic-policy-gradient learning in terms of average delay and cache hit rate.
边缘缓存有望缓解下一代通信的流量消耗。在本文中,我们考虑了宽带通信中因用户快速移动而恶化的传输延迟问题,在这种情况下,频率选择性宽带衰落信道会因用户移动而变得快速时变,从而产生双重选择性。在这种情况下,为了更好地分配缓存资源,我们引入了协调缓存网络,并相应地提出了一个分配问题。然而,所提出的问题被证明是 NP 难的。考虑到用传统优化算法解决 NP 难问题的计算复杂度极高,并且由于动态双选择性衰落信道的相干时间缩短,每个训练实例只能获得少量样本,我们提出了一种与模型无关的元强化学习方法来解决所提出的问题。特别是,所提出的方法能有效识别不稳定的移动信道,并相应地缓存以减少整体传输延迟,同时只需要少量的训练样本。为了验证所提方法的有效性,我们进行了数值模拟,结果表明,所提方法在平均延迟和缓存命中率方面优于目前普遍采用的深度-确定性-策略梯度学习方法。
{"title":"Caching for Doubly Selective Fading Channels via Model-Agnostic Meta-Reinforcement Learning","authors":"Weibao He;Fasheng Zhou;Dong Tang;Fang Fang;Wei Chen","doi":"10.1109/JSYST.2024.3442958","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3442958","url":null,"abstract":"Edge caching is expected to alleviate the traffic consumption in next-generation communications. In this article, we consider the transmission delay in wideband communications deteriorated by rapid user movements, where the frequency-selective wideband fading channels become fast time-varying and hence \u0000<italic>doubly-selective</i>\u0000 due to the user movements. To preferably allocate the caching resource in such circumstance, we introduce a coordinated caching network and accordingly formulate an allocation problem. However, the formulated problem is shown to be NP-hard. By considering the extremely high computational complexity to solve the NP-hard problem by traditional optimization algorithm, and considering only a few samples can be obtained for each training instance due to shortened coherence-time in the dynamical doubly selective fading channels, we propose a model-agnostic meta-reinforcement learning method to address the formulated problem. Particularly, the proposed method can efficiently recognize the unstable mobile channels and accordingly cache to reduce the overall transmission delay while only requires a few training samples. Numerical simulations are performed to verify the effectiveness of the proposed method and results show that the proposed one outperforms the commonly adopted existing method of deep-deterministic-policy-gradient learning in terms of average delay and cache hit rate.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 3","pages":"1776-1785"},"PeriodicalIF":4.0,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cell-Free Massive MIMO-NOMA Systems With Nonreciprocal Channels: Performance Analysis and Calibration Method Design 具有非互易信道的无小区大规模 MIMO-NOMA 系统:性能分析与校准方法设计
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-21 DOI: 10.1109/JSYST.2024.3437769
Siyi Li;Xiaojie Fang;Heng Dong;Wei Wu;Fugang Liu;Zhuoming Li
The integration of communication technologies is regarded as a potential direction of future network. Combining cell-free massive multiple-input multiple-output (CF-mMIMO) with nonorthogonal multiple access (NOMA) can achieve substantial access and uniform coverage, but it also poses challenges on channel state information (CSI) acquisition. Although systems operating in time division duplex can approximate uplink CSI for downlink precoding design, the performance degradation resulting from nonreciprocity is still nonnegligible. This article proposes a calibration method to improve system sum rate of CF-mMIMO-NOMA with nonreciprocal channels. The proposed method exploits the impact of all access points (APs) on achievable rate to provide a prioritization and calibrates the selected APs orderly, finding an optimal compromise between pilot overhead and performance gain. The order and number of calibrated APs can be adjusted according to the parameters including coherence interval, number of users, etc. Based on the calibration method, a power allocation algorithm focusing on maximizing the minimum rate is presented. The nonconvex initial model is transformed into a standard second-order cone programming problem through slack variables for bisection solution. Simulation results validate the importance of calibration and indicate that the proposed method provides enhanced achievable rate with flexibility and adaptability.
通信技术的整合被视为未来网络的一个潜在发展方向。将无小区大规模多输入多输出(CF-mMIMO)与非正交多址(NOMA)相结合,可以实现大量接入和均匀覆盖,但也给信道状态信息(CSI)获取带来了挑战。虽然以时分双工方式运行的系统可以近似上行 CSI 来进行下行预编码设计,但非互易性导致的性能下降仍然不可忽视。本文提出了一种校准方法,以提高具有非互易信道的 CF-mMIMO-NOMA 的系统总和率。所提方法利用所有接入点(AP)对可实现速率的影响来提供优先级,并有序地校准所选的接入点,在试点开销和性能增益之间找到最佳折中方案。校准接入点的顺序和数量可根据相干性间隔、用户数量等参数进行调整。根据校准方法,提出了一种功率分配算法,重点是最大化最小速率。通过松弛变量将非凸初始模型转化为标准的二阶圆锥编程问题,从而实现分段求解。仿真结果验证了校准的重要性,并表明所提出的方法具有灵活性和适应性,可提高可实现速率。
{"title":"Cell-Free Massive MIMO-NOMA Systems With Nonreciprocal Channels: Performance Analysis and Calibration Method Design","authors":"Siyi Li;Xiaojie Fang;Heng Dong;Wei Wu;Fugang Liu;Zhuoming Li","doi":"10.1109/JSYST.2024.3437769","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3437769","url":null,"abstract":"The integration of communication technologies is regarded as a potential direction of future network. Combining cell-free massive multiple-input multiple-output (CF-mMIMO) with nonorthogonal multiple access (NOMA) can achieve substantial access and uniform coverage, but it also poses challenges on channel state information (CSI) acquisition. Although systems operating in time division duplex can approximate uplink CSI for downlink precoding design, the performance degradation resulting from nonreciprocity is still nonnegligible. This article proposes a calibration method to improve system sum rate of CF-mMIMO-NOMA with nonreciprocal channels. The proposed method exploits the impact of all access points (APs) on achievable rate to provide a prioritization and calibrates the selected APs orderly, finding an optimal compromise between pilot overhead and performance gain. The order and number of calibrated APs can be adjusted according to the parameters including coherence interval, number of users, etc. Based on the calibration method, a power allocation algorithm focusing on maximizing the minimum rate is presented. The nonconvex initial model is transformed into a standard second-order cone programming problem through slack variables for bisection solution. Simulation results validate the importance of calibration and indicate that the proposed method provides enhanced achievable rate with flexibility and adaptability.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 3","pages":"1729-1740"},"PeriodicalIF":4.0,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Systems Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1