The role of feedback in AoI optimization under limited transmission opportunities
Scheduling updates from remote sensors is a key task for the internet of things (IoT). In this
context, the mathematical concept of age of information is often used to capture the …
context, the mathematical concept of age of information is often used to capture the …
Age of information from two strategic sources analyzed via game theory
L Badia - 2021 IEEE 26th International Workshop on Computer …, 2021 - ieeexplore.ieee.org
This paper investigates a system with two strategic sources, both being able to update a
given information process at the receiver's end, but doing so independently and …
given information process at the receiver's end, but doing so independently and …
Age of information optimization for privacy-preserving mobile crowdsensing
Y Yang, B Zhang, D Guo, R Xu, C Su… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Mobile crowdsensing (MCS)-enabled data collection can be implemented in a cost-effective,
scalable, and flexible manner. However, joint sensing data freshness and security …
scalable, and flexible manner. However, joint sensing data freshness and security …
Cost and correlation in strategic wireless sensing driven by age of information
We extend available analytical studies that leverage queueing theory to compute closed-
form expressions for the average AoI in queueing systems with multiple sources …
form expressions for the average AoI in queueing systems with multiple sources …
Analytical evaluation of age of information in networks of correlated sources
Performance metrics such as Age of Information are used to represent data freshness, which
is a key element to track in sensing scenarios with sporadic reporting, as typical for ex-ample …
is a key element to track in sensing scenarios with sporadic reporting, as typical for ex-ample …
Analysis of age of information in slotted ALOHA networks with different strategic backoff schemes
Status update freshness in slotted ALOHA networks is an important issue for Internet of
things scenarios with large number of nodes and uncoordinated access. We compare the …
things scenarios with large number of nodes and uncoordinated access. We compare the …
Strategic Status Updates in an Eavesdropping Game
We analyze a system where a transmitter (Alice) sends status updates to a legitimate
receiver (Bob), but a fraction of them can be captured by an eavesdropper (Eve). Alice is …
receiver (Bob), but a fraction of them can be captured by an eavesdropper (Eve). Alice is …
The freshness game: Timely communications in the presence of an adversary
S Banerjee, S Ulukus - IEEE/ACM Transactions on Networking, 2024 - ieeexplore.ieee.org
We consider a communication system where a base station (BS) transmits update packets to
N users, one user at a time, over a wireless channel. We investigate the age of this status …
N users, one user at a time, over a wireless channel. We investigate the age of this status …
Medical self-reporting with adversarial data injection modeled via game theory
We present a game theoretic analysis of a personal e-health system, where a user reports
self-measured data to a collection center. Our focus lies on addressing the challenge of …
self-measured data to a collection center. Our focus lies on addressing the challenge of …
Green grant-free power allocation for ultra-dense Internet of Things: A mean-field perspective
Grant-free access, in which each Internet-of-Things (IoT) device delivers its packets through
a randomly selected resource without spending time on handshaking procedures, is a …
a randomly selected resource without spending time on handshaking procedures, is a …