Applications of cyber technologies improve the quality of monitoring and decision making in smart grid. These cyber technologies are vulnerable to malicious attacks, and compromising them can have ...serious technical and economical problems. This paper specifies the effect of compromising each measurement on the price of electricity, so that the attacker is able to change the prices in the desired direction (increasing or decreasing). Attacking and defending all measurements are impossible for the attacker and defender, respectively. This situation is modeled as a zero-sum game between the attacker and defender. The game defines the proportion of times that the attacker and defender like to attack and defend different measurements, respectively. From the simulation results based on the PJM 5-Bus test system, we can show the effectiveness and properties of the studied game.
Smart pricing methods using auction mechanism allow more information exchange between users and providers, and they can meet users' energy demand at a low cost of grid operation, which contributes to ...the economic and environmental benefit in smart grid. However, when asked to report their energy demand, users may have an incentive to cheat in order to consume more while paying less, causing extra costs for grid operation. So it is important to ensure truthfulness among users for demand side management. In this paper, we propose an efficient pricing method that can prevent users' cheating. In the proposed model, the smart meter can record user's consumption information and communicate with the energy provider's terminal. Users' preferences and consumption patterns are modeled in form of a utility function. Based on this, we propose an enhanced AGV (Arrow-d'Aspremont-Gerard-Varet) mechanism to ensure truthfulness. In this incentive method, user's payment is related to its consumption credit. One will be punished to pay extra if there is a cheat record in its consumption history. We prove that the enhanced AGV mechanism can achieve the basic qualifications: incentive compatibility, individual rationality and budget balance. Simulation results confirm that the enhanced AGV mechanism can ensure truth-telling, and benefit both users and energy providers.
With the wide adoption of smart mobile devices, there is a rapid development of location-based services. One key feature of supporting a pleasant/excellent service is the access to adequate and ...comprehensive data, which can be obtained by mobile crowdsourcing. The main challenge in crowdsourcing is how the service provider (principal) incentivizes a large group of mobile users to participate. In this paper, we investigate the problem of designing a crowdsourcing tournament to maximize the principal's utility in crowdsourcing and provide continuous incentives for users by rewarding them based on the rank achieved. First, we model the user's utility of reward from achieving one of the winning ranks in the tournament. Then, the utility maximization problem of the principal is formulated, under the constraint that the user maximizes its own utility by choosing the optimal effort in the crowdsourcing tournament. Finally, we present numerical results to show the parameters' impact on the tournament design and compare the system performance under the different proposed incentive mechanisms. We show that by using the tournament, the principal successfully maximizes the utilities, and users obtain the continuous incentives to participate in the crowdsourcing activity.
It is known that the capacity of the cellular network can be significantly improved when cellular operators are allowed to access the unlicensed spectrum. Nevertheless, when multiple operators serve ...their user equipments (UEs) in the same unlicensed spectrum, the inter-operator interference management becomes a challenging task. In this paper, we develop a multi-operator multi-UE Stackelberg game to analyze the interaction between multiple operators and the UEs subscribed to the services of the operators in unlicensed spectrum. In this game, to avoid intolerable interference to the Wi-Fi access point (WAP), each operator sets an interference penalty price for each UE that causes interference to the WAP, and the UEs can choose their sub-bands and determine the optimal transmit power in the chosen sub-bands of the unlicensed spectrum. Accordingly, the operators can predict the possible actions of the UEs and hence set the optimal prices to maximize its revenue earned from UEs. Furthermore, we consider two possible scenarios for the interaction of operators in the unlicensed spectrum. In the first scenario, referred to as the non-cooperative scenario, the operators cannot coordinate with each other in the unlicensed spectrum. A sub-gradient approach is applied for each operator to decide its best-response action based on the possible behaviors of others. In the second scenario, referred to as the cooperative scenario, all operators can coordinate with each other to serve UEs and control the UEs' interference in the unlicensed spectrum. Simulation results have been presented to verify the performance improvement that can be achieved by our proposed schemes.
Given significant air pollution problems, air quality index (AQI) monitoring has recently received increasing attention. In this paper, we design a mobile AQI monitoring system boarded on the ...unmanned-aerial-vehicles, called ARMS, to efficiently build fine-grained AQI maps in real-time. Specifically, we first propose the Gaussian plume model on the basis of the neural network (GPM-NN), to physically characterize the particle dispersion in the air. Based on GPM-NN, we propose a battery efficient and adaptive monitoring algorithm to monitor AQI at the selected locations and construct an accurate AQI map with the sensed data. The proposed adaptive monitoring algorithm is evaluated in two typical scenarios, a 2-D open space like a roadside park, and a 3-D space like a courtyard inside a building. The experimental results demonstrate that our system can provide higher prediction accuracy of AQI with GPM-NN than other existing models, while greatly reducing the power consumption with the adaptive monitoring algorithm.
V2X communication facilitates information sharing between a vehicle and the infrastructure, pedestrians, devices, or any other entity that may affect the vehicle, which is known as a critical ...component in 5G that promises to realize the vision of connected and autonomous vehicles. Crowd sensing, a.k.a. collective perception, is one of the essential concepts of V2X networks, where vehicles share their information collected by local perception sensors about the environment for improving safety, saving energy, optimizing traffic, and so on. Although the operational aspects of V2X networks are being studied actively, its security aspect has received little attention. In this article, we discuss security issues that may pose serious threats to crowd sensing in V2X networks, and we focus on V2X-specific threats that are unique in V2X networks, e.g. platoon disruption and perception data falsification. We also discuss countermeasures against these threats and the technical challenges that must be overcome to implement such methods.
Failure detection (FD) is an important issue for supporting dependability in distributed healthcare systems to guarantee continuous, safe, secure, and dependable operation, and often is an important ...performance bottleneck in the event of node failure. FD can be used to manage the health status of communication for delivering telemedicine services, and then to help distributed healthcare system reduce fatal accident rate and increase the reliability and safety of systems. Ensuring acceptable quality of service (QoS) is made difficult by the relative unpredictability of the network environment. In this paper, first, we compare QoS metrics of several adaptive FDs, discuss their properties and their relation, and then propose one optimization over the existing methods, called tuning adaptive margin failure detector (TAM FD), which significantly improves QoS, especially in the aggressive range and when the network is unstable. Second, we address the problem of most adaptive schemes, namely their need for a large window of samples. So we also analyze the impact of memory size on the performance of FDs, and then prove that the presented scheme is designed to use a fixed and very limited amount of memory for the distributed system. Our experimental results over several kinds of networks (Cluster, WiFi, LAN, Intercontinental WAN) show that the properties of the existing adaptive failure detectors, and demonstrate that the optimization is reasonable and acceptable. Furthermore, the extensive experimental results show what is the effect of memory size on the overall QoS of each adaptive failure detector. For our TAM FD, the effect of window size on their QoS is very small and can be negligible.
Caching popular files in the storage of edge networks, namely edge caching, is a promising approach for service providers (SPs) to reduce redundant backhaul transmission to edge nodes (ENs). It is ...still an open problem to design an efficient incentive mechanism for edge caching in 5G networks with a large number of ENs and mobile users. In this paper, an edge network with one SP, a large number of ENs and mobile users with time-dependent requests is investigated. A convergent and scalable Stackelberg game for edge caching is designed. Specifically, the game is decomposed into two types of sub-games, a storage allocation game (SAG) and a number of user allocation games (UAGs). A Stackelberg game-based alternating direction method of multipliers (Stackelberg game-based ADMM) is proposed to solve either the SAG or each UAG in a distributed manner. Based on both analytical and simulation results, the convergence speed, the optimum of the entire game, and the amount of information exchange are linearly (or sublinearly) related to the network size, which indicates that this framework can potentially cope with large-scale caching problems. The proposed approach also requires less backhaul resource than the existed approaches.
In cognitive radio networks (CRNs), spectrum trading is an efficient way for secondary users (SUs) to achieve dynamic spectrum access and to bring economic benefits for the primary users (PUs). ...Existing methods require full payment from SU, which blocked many potential "buyers," and thus limited the PU's expected income. To better improve PUs' revenue from spectrum trading in a CRN, we introduce a financing contract, which is similar to a sealed non-cash auction that allows SU to do financing. Unlike previous mechanism designs in CRN, the financing contract allows the SU to only pay part of the total amount when the contract is signed, known as the down payment. Then, after the spectrum is released and utilized, the SU pays the rest of payment, known as the installment payment, from the revenue generated by utilizing the spectrum. The way the financing contract carries out and the sealed non-cash auction works similarly. Thus, contract theory is employed here as the mathematical framework to solve the non-cash auction problem and form mutually beneficial relationships between PUs and SUs. As the PU may not have the full acknowledgment of the SU's transmission status, the problems of adverse selection and moral hazard arise in the two scenarios, respectively. Therefore, a joint adverse selection and moral hazard model is considered here. In particular, we present three situations when either or both adverse selection and moral hazard are present during the trading. Furthermore, both discrete and continuous models are provided in this paper. Through simulations, we show that the adverse selection and moral hazard cases serve as the upper and lower bounds of the general case where both problems are present.
In this paper, the resource allocation and scheduling problem for a full-duplex (FD) orthogonal frequency-division multiple-access network is studied where an FD base station simultaneously ...communicates with multiple pairs of uplink (UL) and downlink (DL) half-duplex (HD) users bidirectionally. In this paper, we aim to maximize the network sum-rate through joint UL and DL user pairing, OFDM subchannel assignment, and power allocation. We formulate the problem as a non-convex optimization problem. The optimal algorithm requires an exhaustive search, which will become prohibitively complicated as the numbers of users and subchannels increase. To tackle this complex problem more efficiently, we formulate the user-pairing and subchannel allocation problem as a three-sided matching problem, and propose a novel low-complexity near-optimal matching algorithm. The algorithm is analyzed, and we prove that it converges to a stable matching. Simulation results show that the FD scheme can significantly improve the spectrum efficiency compared with the HD scheme. The proposed algorithm performs very close to the optimal algorithm, and significantly outperforms other resource allocation schemes.