
Fog computing is emerging as a promising paradigm to perform distributed,
lowlatency computation by jointly exploiting the radio and computing resources
of enduser devices and cloud servers. However, the dynamic and distributed
formation of local fog networks is highly challenging due to the unpredictable
arrival and departure of neighboring fog nodes. Therefore, a given fog node
must properly select a set of neighboring nodes and intelligently offload its
computational tasks to this set of neighboring fog nodes and the cloud in order
to achieve lowlatency transmission and computation. In this paper, the problem
of fog network formation and task distribution is jointly investigated while
considering a hybrid fogcloud architecture. The goal is to minimize the
maximum computational latency by enabling a given fog node to form a suitable
fog network and optimize the task distribution, under uncertainty on the
arrival process of neighboring fog nodes. To solve this problem, a novel online
optimization framework is proposed in which the neighboring nodes are selected
by using a thresholdbased online algorithm that uses a target competitive
ratio, defined as the ratio between the latency of the online algorithm and the
offline optimal latency. The proposed framework repeatedly updates its target
competitive ratio and optimizes the distribution of the fog node's
computational tasks in order to minimize latency. Simulation results show that
the proposed framework can successfully select a set of neighboring nodes while
reducing latency by up to 19.25% compared to a baseline approach based on the
wellknown online secretary framework. The results also show how, using the
proposed framework, the computational tasks can be properly offloaded between
the fog network and a remote cloud server in different network settings.

Electric vehicles (EVs) are expected to be a major component of the smart
grid. The rapid proliferation of EVs will introduce an unprecedented load on
the existing electric grid due to the charging/discharging behavior of the EVs,
thus motivating the need for novel approaches for routing EVs across the grid.
In this paper, a novel gametheoretic framework for smart routing of EVs within
the smart grid is proposed. The goal of this framework is to balance the
electricity load across the grid while taking into account the traffic
congestion and the waiting time at charging stations. The EV routing problem is
formulated as a noncooperative game. For this game, it is shown that selfish
behavior of EVs will result in a purestrategy Nash equilibrium with the price
of anarchy upper bounded by the variance of the ground load induced by the
residential, industrial, or commercial users. Moreover, the results are
extended to capture the stochastic nature of induced ground load as well as the
subjective behavior of the owners of EVs as captured by using notions from the
behavioral framework of prospect theory. Simulation results provide new
insights on more efficient energy pricing at charging stations and under more
realistic grid conditions.

LTE in unlicensed spectrum using licensed assisted access LTE (LTELAA) is a
promising approach to overcome the wireless spectrum scarcity. However, to reap
the benefits of LTELAA, a fair coexistence mechanism with other incumbent WiFi
deployments is required. In this paper, a novel deep learning approach is
proposed for modeling the resource allocation problem of LTELAA small base
stations (SBSs). The proposed approach enables multiple SBSs to proactively
perform dynamic channel selection, carrier aggregation, and fractional spectrum
access while guaranteeing fairness with existing WiFi networks and other
LTELAA operators. Adopting a proactive coexistence mechanism enables future
delaytolerant LTELAA data demands to be served within a given prediction
window ahead of their actual arrival time thus avoiding the underutilization of
the unlicensed spectrum during offpeak hours while maximizing the total served
LTELAA traffic load. To this end, a noncooperative game model is formulated in
which SBSs are modeled as Homo Egualis agents that aim at predicting a sequence
of future actions and thus achieving longterm equal weighted fairness with
WLAN and other LTELAA operators over a given time horizon. The proposed deep
learning algorithm is then shown to reach a mixedstrategy Nash equilibrium
(NE), when it converges. Simulation results using real data traces show that
the proposed scheme can yield up to 28% and 11% gains over a conventional
reactive approach and a proportional fair coexistence mechanism, respectively.
The results also show that the proposed framework prevents WiFi performance
degradation for a densely deployed LTELAA network.

In this paper, the problem of resource management is studied for a network of
wireless virtual reality (VR) users communicating over small cell networks
(SCNs). In order to capture the VR users' qualityofservice (QoS) in SCNs, a
novel VR model, based on multiattribute utility theory, is proposed. This
model jointly accounts for VR metrics such as tracking accuracy, processing
delay, and transmission delay. In this model, the small base stations (SBSs)
act as the VR control centers that collect the tracking information from VR
users over the cellular uplink. Once this information is collected, the SBSs
will then send the three dimensional images and accompanying surround stereo
audio to the VR users over the downlink. Therefore, the resource allocation
problem in VR wireless networks must jointly consider both the uplink and
downlink. This problem is then formulated as a noncooperative game and a
distributed algorithm based on the machine learning framework of echo state
networks (ESNs) is proposed to find the solution of this game. The use of the
proposed ESN algorithm enables the SBSs to predict the VR QoS of each SBS and
guarantees the convergence to a mixedstrategy Nash equilibrium. The analytical
result shows that each user's VR QoS jointly depends on both VR tracking
accuracy and wireless resource allocation. Simulation results show that the
proposed algorithm yields significant gains, in terms of total utility value of
VR QoS, that reach up to 22.2% and 37.5%, respectively, compared to Qlearning
and a baseline proportional fair algorithm. The results also show that the
proposed algorithm has a faster convergence time than Qlearning and can
guarantee low delays for VR services.

To operate effectively in tomorrow's smart cities, autonomous vehicles (AVs)
must rely on intravehicle sensors such as camera and radar as well as
intervehicle communication. Such dependence on sensors and communication links
exposes AVs to cyberphysical (CP) attacks by adversaries that seek to take
control of the AVs by manipulating their data. Thus, to ensure safe and optimal
AV dynamics control, the data processing functions at AVs must be robust to
such CP attacks. To this end, in this paper, the state estimation process for
monitoring AV dynamics, in presence of CP attacks, is analyzed and a novel
adversarial deep reinforcement learning (RL) algorithm is proposed to maximize
the robustness of AV dynamics control to CP attacks. The attacker's action and
the AV's reaction to CP attacks are studied in a gametheoretic framework. In
the formulated game, the attacker seeks to inject faulty data to AV sensor
readings so as to manipulate the intervehicle optimal safe spacing and
potentially increase the risk of AV accidents or reduce the vehicle flow on the
roads. Meanwhile, the AV, acting as a defender, seeks to minimize the
deviations of spacing so as to ensure robustness to the attacker's actions.
Since the AV has no information about the attacker's action and due to the
infinite possibilities for data value manipulations, the outcome of the
players' past interactions are fed to longshort term memory (LSTM) blocks.
Each player's LSTM block learns the expected spacing deviation resulting from
its own action and feeds it to its RL algorithm. Then, the the attacker's RL
algorithm chooses the action which maximizes the spacing deviation, while the
AV's RL algorithm tries to find the optimal action that minimizes such
deviation.

Cellularconnected unmanned aerial vehicles (UAVs) will inevitably be
integrated into future cellular networks as new aerial mobile users. Providing
cellular connectivity to UAVs will enable a myriad of applications ranging from
online video streaming to medical delivery. However, to enable a reliable
wireless connectivity for the UAVs as well as a secure operation, various
challenges need to be addressed such as interference management, mobility
management and handover, cyberphysical attacks, and authentication. In this
paper, the goal is to expose the wireless and security challenges that arise in
the context of UAVbased delivery systems, UAVbased realtime multimedia
streaming, and UAVenabled intelligent transportation systems. To address such
challenges, artificial neural network (ANN) based solution schemes are
introduced. The introduced approaches enable the UAVs to adaptively exploit the
wireless system resources while guaranteeing a secure operation, in realtime.
Preliminary simulation results show the benefits of the introduced solutions
for each of the aforementioned cellularconnected UAV application use case.

In this paper, a novel machine learning (ML) framework is proposed for
enabling a predictive, efficient deployment of unmanned aerial vehicles (UAVs),
acting as aerial base stations (BSs), to provide ondemand wireless service to
cellular users. In order to have a comprehensive analysis of cellular traffic,
an ML framework based on a Gaussian mixture model (GMM) and a weighted
expectation maximization (WEM) algorithm is introduced to predict the potential
network congestion. Then, the optimal deployment of UAVs is studied to minimize
the transmit power needed to satisfy the communication demand of users in the
downlink, while also minimizing the power needed for UAV mobility, based on the
predicted cellular traffic. To this end, first, the optimal partition of
service areas of each UAV is derived, based on a fairness principle. Next, the
optimal location of each UAV that minimizes the total power consumption is
derived. Simulation results show that the proposed ML approach can reduce the
required downlink transmit power and improve the power efficiency by over 20%,
compared with an optimal deployment of UAVs with no ML prediction.

Reaping the benefits of the Internet of things (IoT) system is contingent
upon developing IoTspecific security solutions. Conventional security and
authentication solutions often fail to meet IoT security requirements due to
the computationally limited and portable nature of IoT objects. In this paper,
an IoT objects authentication framework is proposed. The framework uses
devicespecific information, called fingerprints, along with a transfer
learning tool to authenticate objects in the IoT. The framework tracks the
effect of changes in the physical environment on fingerprints and uses unique
IoT environmental effects features to detect both cyber and cyberphysical
emulation attacks. The proposed environmental effects estimation framework is
proven to improve the detection rate of attackers without increasing the false
positives rate. The proposed framework is also shown to be able to detect
cyberphysical attackers that are capable of replicating the fingerprints of
target objects which conventional methods are unable to detect. A transfer
learning approach is proposed to allow the use of objects with different types
and features in the environmental effects estimation process to enhance the
performance of the framework while capturing practical IoT deployments with
diverse object types. Simulation results using real IoT device data show that
the proposed approach can yield a 40% improvement in cyber emulation attacks
detection and is able to detect cyberphysical emulation attacks that
conventional methods cannot detect. The results also show that the proposed
framework improves the authentication accuracy while the transfer learning
approach yields up to 70% additional performance gains.

Autonomous vehicular platoons will play an important role in improving
onroad safety in tomorrow's smart cities. Vehicles in an autonomous platoon
can exploit vehicletovehicle (V2V) communications to collect information,
such as velocity and acceleration, from surrounding vehicles so as to maintain
the target velocity and intervehicle distance. However, due to the dynamic
onvehicle data processing rate and the uncertainty of the wireless channel,
V2V communications within a platoon will experience a delay. Such delay can
impair the vehicles' ability to stabilize the operation of the platoon. In this
paper, a novel framework is proposed to optimize a platoon's operation while
jointly consider the delay of the wireless network and the stability of the
vehicle's control system. First, stability analysis for the control system is
performed and the maximum wireless system delay requirements which can prevent
the instability of the control system are derived. Then, delay analysis is
conducted to determine the endtoend delay, including queuing, processing, and
transmission delay for the V2V link in the wireless network. Subsequently,
using the derived delay, a lower bound and an approximated expression of the
reliability for the wireless system, defined as the probability that the
wireless system meets the control system's delay needs, are derived. Then, the
control parameters are optimized to maximize the derived wireless system
reliability. Simulation results corroborate the analytical derivations and
study the impact of parameters, such as the platoon size, on the reliability
performance of the vehicular platoon. More importantly, the simulation results
disclose the benefits of integrating control system and wireless network design
while providing guidelines for designing autonomous platoons so as to realize
the required wireless network reliability and control system stability.

In this paper, the problem of content caching and transmission is studied for
a wireless virtual reality (VR) network in which unmanned aerial vehicles
(UAVs) capture videos on live games or sceneries and transmit them to small
base stations (SBSs) that service the VR users. However, due to its limited
capacity, the wireless network may not be able to meet the delay requirements
of such 360 content transmissions. To meet the VR delay requirements, the UAVs
can extract specific visible content (e.g., user field of view) from the
original 360 data and send this visible content to the users so as to reduce
the traffic load over backhaul and radio access links. To further alleviate the
UAVSBS backhaul traffic, the SBSs can also cache the popular contents that
users request. This joint content caching and transmission problem is
formulated as an optimization problem whose goal is to maximize the users'
reliability, defined as the probability that the content transmission delay of
each user satisfies the instantaneous VR delay target. To address this problem,
a distributed deep learning algorithm that brings together new neural network
ideas from liquid state machine (LSM) and echo state networks (ESNs) is
proposed. The proposed algorithm enables each SBS to predict the users'
reliability so as to find the optimal contents to cache and content
transmission format for each UAV. Analytical results are derived to expose the
various network factors that impact content caching and content transmission
format selection. Simulation results show that the proposed algorithm yields
25.4% gain of reliability compared to Qlearning. The results also show that
the proposed algorithm can achieve 14.7% gain of reliability due to the
reduction of traffic load over backhaul compared to the proposed algorithm with
random caching.

Humancentric applications such as virtual reality and immersive gaming will
be central to the future wireless networks. Common features of such services
include: a) their dependence on the human user's behavior and state, and b)
their need for more network resources compared to conventional cellular
applications. To successfully deploy such applications over wireless and
cellular systems, the network must be made cognizant of not only the
qualityofservice (QoS) needs of the applications, but also of the perceptions
of the human users on this QoS. In this paper, by explicitly modeling the
limitations of the human brain, a concrete measure for the delay perception of
human users in a wireless network is introduced. Then, a novel learning method,
called probability distribution identification, is proposed to find a
probabilistic model for this delay perception based on the brain features of a
human user. The proposed learning method uses both supervised and unsupervised
learning techniques to build a Gaussian mixture model of the human brain
features. Given a model for the delay perception of the human brain, a novel
brainaware resource management algorithm based on Lyapunov optimization is
proposed for allocating radio resources to human users while minimizing the
transmit power and taking into account the reliability of both machine type
devices and human users. The proposed algorithm is shown to have a low
complexity. Moreover, a closedform relationship between the reliability
measure and wireless physical layer metrics of the network is derived.
Simulation results using real data from actual human users show that a
brainaware approach can yield savings of up to 78% in power compared to the
system

The concept of multiaccess edge computing (MEC) has been recently introduced
to supplement cloud computing by deploying MEC servers to the network edge so
as to reduce the network delay and alleviate the load on cloud data centers.
However, compared to a resourceful cloud, an MEC server has limited resources.
When each MEC server operates independently, it cannot handle all of the
computational and big data demands stemming from the users devices.
Consequently, the MEC server cannot provide significant gains in overhead
reduction due to data exchange between users devices and remote cloud.
Therefore, joint computing, caching, communication, and control (4C) at the
edge with MEC server collaboration is strongly needed for big data
applications. In order to address these challenges, in this paper, the problem
of joint 4C in big data MEC is formulated as an optimization problem whose goal
is to maximize the bandwidth saving while minimizing delay, subject to the
local computation capability of user devices, computation deadline, and MEC
resource constraints. However, the formulated problem is shown to be
nonconvex. To make this problem convex, a proximal upper bound problem of the
original formulated problem that guarantees descent to the original problem is
proposed. To solve the proximal upper bound problem, a block successive upper
bound minimization (BSUM) method is applied. Simulation results show that the
proposed approach increases bandwidthsaving and minimizes delay while
satisfying the computation deadlines.

The use of flying platforms such as unmanned aerial vehicles (UAVs),
popularly known as drones, is rapidly growing in a wide range of wireless
networking applications. In particular, with their inherent attributes such as
mobility, flexibility, and adaptive altitude, UAVs admit several key potential
applications in wireless systems. On the one hand, UAVs can be used as aerial
base stations to enhance coverage, capacity, reliability, and energy efficiency
of wireless networks. For instance, UAVs can be deployed to complement existing
cellular systems by providing additional capacity to hotspot areas as well as
to provide network coverage in emergency and public safety situations. On the
other hand, UAVs can operate as flying mobile terminals within the cellular
networks. In this paper, a comprehensive tutorial on the potential benefits and
applications of UAVs in wireless communications is presented. Moreover, the
important challenges and the fundamental tradeoffs in UAVenabled wireless
networks are thoroughly investigated. In particular, the key UAV challenges
such as threedimensional deployment, performance analysis, airtoground
channel modeling, and energy efficiency are explored along with representative
results. Then, fundamental open problems and potential research directions
pertaining to wireless communications and networking with UAVs are introduced.
To cope with the open research problems, various analytical frameworks and
mathematical tools such as optimization theory, machine learning, stochastic
geometry, transport theory, and game theory are described. The use of such
tools for addressing unique UAV problems is also presented. In a nutshell, this
tutorial provides key guidelines on how to analyze, optimize, and design
UAVbased wireless communication systems.

Competitive resource allocation between adversarial decision makers arises in
a wide spectrum of realworld applications such as in communication systems,
cyberphysical systems security, as well as financial, political, and electoral
competition. As such, developing analytical tools to model and analyze
competitive resource allocation is crucial for devising optimal allocation
strategies and anticipating the potential outcomes of the competition. To this
end, the Colonel Blotto game is one of the most popular gametheoretic
frameworks for modeling and analyzing such competitive resource allocation
problems. However, in many realworld competitive situations, the Colonel
Blotto game does not admit solutions in deterministic strategies and, hence,
one must rely on analytically complex mixedstrategies with their associated
tractability, applicability, and practicality challenges. In this paper, a
generalization of the Colonel Blotto game which enables the derivation of
deterministic, practical, and implementable equilibrium strategies is proposed
while accounting for the heterogeneity of the battlefields. In addition, the
proposed generalized game enables accounting for the consumed resources in each
battlefield, a feature that is not considered in the classical Blotto game. For
the generalized game, the existence of a Nash equilibrium in purestrategies is
shown. Then, closedform analytical expressions of the equilibrium strategies,
are derived and the outcome of the game is characterized; based on the number
of resources of each player as well as the valuation of each battlefield. The
generated results provide invaluable insights on the outcome of the
competition. For example, the results show that, when both players are fully
rational, the more resourceful player can achieve a better total payoff at the
Nash equilibrium, a result that is not mimicked in the classical Blotto game.

In this paper, the problem of selforganizing, correlationaware clustering
is studied for a dense network of machinetype devices (MTDs) deployed over a
cellular network. In dense machinetomachine networks, MTDs are typically
located within close proximity and will gather correlated data, and, thus,
clustering MTDs based on data correlation will lead to a decrease in the number
of redundant bits transmitted to the base station. To analyze this clustering
problem, a novel utility function that captures the average MTD transmission
power per cluster is derived, as a function of the MTD location, cluster size,
and intercluster interference. Then, the clustering problem is formulated as
an evolutionary game, which models the interactions among the massive number of
MTDs, in order to decrease MTD transmission power. To solve this game, a
distributed algorithm is proposed to allow the infinite number of MTDs to
autonomously form clusters. It is shown that the proposed distributed algorithm
converges to an evolutionary stable strategy (ESS), that is robust to a small
portion of MTDs deviating from the stable cluster formation at convergence. The
maximum fraction of MTDs that can deviate from the ESS, while still maintaining
a stable cluster formation is derived. Simulation results show that the
proposed approach can effectively cluster MTDs with highly correlated data,
which, in turn, enables those MTDs to eliminate a large number of redundant
bits. The results show that, on average, using the proposed approach yields
reductions of up to 23.4% and 9.6% in terms of the transmit power per cluster,
compared to forming clusters with the maximum possible size and uniformly
selecting a cluster size, respectively.

Secure signal authentication is arguably one of the most challenging problems
in the Internet of Things (IoT) environment, due to the largescale nature of
the system and its susceptibility to maninthemiddle and eavesdropping
attacks. In this paper, a novel deep learning method is proposed for dynamic
authentication of IoT signals to detect cyber attacks. The proposed learning
framework, based on a long shortterm memory (LSTM) structure, enables the IoT
devices (IoTDs) to extract a set of stochastic features from their generated
signal and dynamically watermark these features into the signal. This method
enables the cloud, which collects signals from the IoT devices, to effectively
authenticate the reliability of the signals. Moreover, in massive IoT
scenarios, since the cloud cannot authenticate all the IoTDs simultaneously due
to computational limitations, a gametheoretic framework is proposed to improve
the cloud's decision making process by predicting vulnerable IoTDs. The
mixedstrategy Nash equilibrium (MSNE) for this game is derived and the
uniqueness of the expected utility at the equilibrium is proven. In the massive
IoT system, due to a large set of available actions for the cloud, it is shown
that analytically deriving the MSNE is challenging and, thus, a learning
algorithm proposed that converges to the MSNE. Moreover, in order to cope with
the incomplete information case in which the cloud cannot access the state of
the unauthenticated IoTDs, a deep reinforcement learning algorithm is proposed
to dynamically predict the state of unauthenticated IoTDs and allow the cloud
to decide on which IoTDs to authenticate. Simulation results show that, with an
attack detection delay of under 1 second the messages can be transmitted from
IoT devices with an almost 100% reliability.

Emerging wireless services such as augmented reality require nextgeneration
wireless networks to support ultrareliable and lowlatency communication
(URLLC), while also guaranteeing high data rates. Existing wireless networks
that solely rely on the scarce sub6 GHz, microwave ($\mu$W) frequency bands
will be unable to meet the lowlatency, high capacity requirements of future
wireless services. Meanwhile, operating at highfrequency millimeter wave
(mmWave) bands is seen as an attractive solution, primarily due to the
bandwidth availability and possibility of largescale multiantenna
communication. However, even though leveraging the large bandwidth at mmWave
frequencies can potentially boost the wireless capacity and reduce the
transmission delay for lowlatency applications, mmWave communication is
inherently unreliable due to its susceptibility to blockage, high path loss,
and channel uncertainty. Hence, to provide URLLC and highspeed wireless
access, it is desirable to seamlessly integrate the reliability of $\mu$W
networks with the high capacity of mmWave networks. To this end, in this paper,
the first comprehensive tutorial for integrated mmWave$\mu$W communications is
introduced. This envisioned integrated design will enable wireless networks to
achieve URLLC along with high data rates by leveraging the best of two worlds:
reliable, longrange communications at the $\mu$W bands and directional
highspeed communications at the mmWave frequencies. To achieve this goal, key
solution concepts are developed that include new architectures for the radio
interface, URLLCaware frame structure and resource allocation methods along
with learning techniques, as well as mobility management, to realize the
potential of integrated mmWave$\mu$W communications. The opportunities and
challenges of each proposed scheme are discussed and key results are presented.

Network slicing is an emerging technique for providing resources to diverse
wireless services with heterogeneous qualityofservice needs. However, beyond
satisfying endtoend requirements of network users, network slicing needs to
also provide isolation between slices so as to prevent one slice's faults and
congestion from affecting other slices. In this paper, the problem of network
slicing is studied in the context of a wireless system having a timevarying
number of users that require two types of slices: reliable low latency (RLL)
and selfmanaged (capacity limited) slices. To address this problem, a novel
control framework for stochastic optimization is proposed based on the Lyapunov
driftpluspenalty method. This new framework enables the system to minimize
power, maintain slice isolation, and provide reliable and low latency
endtoend communication for RLL slices. Simulation results show that the
proposed approach can maintain the system's reliability while providing
effective slice isolation in the event of sudden changes in the network
environment.

In this paper, the problem of joint caching and resource allocation is
investigated for a network of cacheenabled unmanned aerial vehicles (UAVs)
that service wireless ground users over the LTE licensed and unlicensed (LTEU)
bands. The considered model focuses on users that can access both licensed and
unlicensed bands while receiving contents from either the cache units at the
UAVs directly or via content serverUAVuser links. This problem is formulated
as an optimization problem which jointly incorporates user association,
spectrum allocation, and content caching. To solve this problem, a distributed
algorithm based on the machine learning framework of liquid state machine (LSM)
is proposed. Using the proposed LSM algorithm, the cloud can predict the users'
content request distribution while having only limited information on the
network's and users' states. The proposed algorithm also enables the UAVs to
autonomously choose the optimal resource allocation strategies that maximize
the number of users with stable queues depending on the network states. Based
on the users' association and content request distributions, the optimal
contents that need to be cached at UAVs as well as the optimal resource
allocation are derived. Simulation results using real datasets show that the
proposed approach yields up to 33.3% and 50.3% gains, respectively, in terms of
the number of users that have stable queues compared to two baseline
algorithms: Qlearning with cache and Qlearning without cache. The results
also show that LSM significantly improves the convergence time of up to 33.3%
compared to conventional learning algorithms such as Qlearning.

In this paper, a novel graphtheoretic framework is proposed to generalize
the analysis of a broad set of security attacks, including observability and
data injection attacks, that target the smart grid. First, the notion of
observability attacks is defined based on a proposed graphtheoretic construct.
In this respect, an algorithm is proposed to characterize the critical set of
measurements which must be removed along with a certain measurement to make the
system unobservable. It is then shown that for the system to be observable
these critical sets must be part of a maximum matching over a proposed
bipartite graph. In addition, it is shown that stealthy data injection attacks
are a special case of these observability attacks. Then, various attack
strategies and defense policies for observability and data injection attacks
are shown to be amenable to analysis using variations of the formulated
maximummatching problem. The proposed framework is then shown to provide a
unified basis for exact analysis of four security problems (among others),
pertaining to the characterization of: 1) The sparsest stealthy attack, 2) The
sparsest stealthy attack including a certain specific measurement, 3) A set of
measurements which must be defended to thwart all potential stealthy attacks,
and 4) The set of measurements, which when protected, can thwart any attack
whose cardinality is below a certain threshold. A case study using the IEEE
14bus system containing a set of 17 measurement units is used to corroborate
the theoretical findings. In this case analysis, stealthy attacks of lowest
cardinality are characterized and shown to have a cardinality equal to 2. In
addition, it is shown that defending only 3 out of the 17 measurements is
enough to thwart any stealthy attack with cardinality lower than 3, while
defending a minimum of 13 measurements is needed to thwart all possible
stealthy attacks.

In this paper, the problem of misinformation propagation is studied for an
Internet of Battlefield Things (IoBT) system in which an attacker seeks to
inject false information in the IoBT nodes in order to compromise the IoBT
operations. In the considered model, each IoBT node seeks to counter the
misinformation attack by finding the optimal probability of accepting a given
information that minimizes its cost at each time instant. The cost is expressed
in terms of the quality of information received as well as the infection cost.
The problem is formulated as a meanfield game with multiclass agents which is
suitable to model a massive heterogeneous IoBT system. For this game, the
meanfield equilibrium is characterized, and an algorithm based on the forward
backward sweep method is proposed to find the meanfield equilibrium. Then, the
finite IoBT case is considered, and the conditions of convergence of the Nash
equilibria in the finite case to the meanfield equilibrium are presented.
Numerical results show that the proposed scheme can achieve a 1.2fold increase
in the quality of information (QoI) compared to a baseline scheme in which the
IoBT nodes are always transmitting. The results also show that the proposed
scheme can reduce the proportion of infected nodes by 99% compared to the
baseline.

In this paper, an interferenceaware path planning scheme for a network of
cellularconnected unmanned aerial vehicles (UAVs) is proposed. In particular,
each UAV aims at achieving a tradeoff between maximizing energy efficiency and
minimizing both wireless latency and the interference level caused on the
ground network along its path. The problem is cast as a dynamic game among
UAVs. To solve this game, a deep reinforcement learning algorithm, based on
echo state network (ESN) cells, is proposed. The introduced deep ESN
architecture is trained to allow each UAV to map each observation of the
network state to an action, with the goal of minimizing a sequence of
timedependent utility functions. Each UAV uses ESN to learn its optimal path,
transmission power level, and cell association vector at different locations
along its path. The proposed algorithm is shown to reach a subgame perfect Nash
equilibrium (SPNE) upon convergence. Moreover, an upper and lower bound for the
altitude of the UAVs is derived thus reducing the computational complexity of
the proposed algorithm. Simulation results show that the proposed scheme
achieves better wireless latency per UAV and rate per ground user (UE) while
requiring a number of steps that is comparable to a heuristic baseline that
considers moving via the shortest distance towards the corresponding
destinations. The results also show that the optimal altitude of the UAVs
varies based on the ground network density and the UE data rate requirements
and plays a vital role in minimizing the interference level on the ground UEs
as well as the wireless transmission delay of the UAV.

The notion of a fast uplink grant is emerging as a promising solution for
enabling massive machine type communications (MTCs) in the Internet of Things
over cellular networks. By using the fast uplink grant, machine type devices
(MTD) will no longer require random access (RA) channels to send scheduling
requests. Instead, uplink resources can be actively allocated to MTDs by the
base station. In this paper, the challenges and opportunities for adopting the
fast uplink grant to support MTCs are investigated. First, the fundamentals of
fast uplink grant and its advantages over conventional access schemes: i) fully
scheduled with RA process and ii) uncoordinated access, are presented. Then,
the key challenges that include the prediction of set of MTDs with data to
transmit, as well as the optimal scheduling of MTDs, are exposed. To overcome
these challenges, a twostage approach that includes traffic prediction and
optimized scheduling is proposed. For this approach, various solutions for
source traffic prediction for periodic MTD traffic are reviewed and novel
methods for eventdriven traffic prediction are proposed. For optimal
allocation of uplink grants, new solutions based on advanced machine learning
methods are presented. By using the proposed solutions, the fast uplink grant
has the potential to enable cellular networks to support massive MTCs and
effectively reduce the signaling overhead and overcome the delay and congestion
challenges of conventional RA schemes.

In this paper, the effective use of multiple quadrotor drones as an aerial
antenna array that provides wireless service to ground users is investigated.
In particular, under the goal of minimizing the airborne service time needed
for communicating with ground users, a novel framework for deploying and
operating a dronebased antenna array system whose elements are singleantenna
drones is proposed. In the considered model, the service time is minimized by
jointly optimizing the wireless transmission time as well as the control time
that is needed for movement and stabilization of the drones. To minimize the
transmission time, first, the antenna array gain is maximized by optimizing the
drone spacing within the array. In this case, using perturbation techniques,
the drone spacing optimization problem is addressed by solving successive,
perturbed convex optimization problems. Then, the optimal locations of the
drones around the array's center are derived such that the transmission time
for the user is minimized. Given the determined optimal locations of drones,
the drones must spend a control time to adjust their positions dynamically so
as to serve multiple users. To minimize this control time of the quadrotor
drones, the speed of rotors is optimally adjusted based on both the
destinations of the drones and external forces (e.g., wind and gravity). In
particular, using bangbang control theory, the optimal rotors' speeds as well
as the minimum control time are derived in closedform. Simulation results show
that the proposed approach can significantly reduce the service time to ground
users compared to a multidrone scenario in which the same number of drones are
deployed separately to serve ground users. The results also show that, in
comparison with the multidrones case, the network's spectral efficiency can be
significantly improved.

Devicetodevice (D2D) communication is a promising approach to efficiently
disseminate critical or viral information. Reaping the benefits of D2Denabled
networks is contingent upon choosing the optimal content dissemination policy
subject to resource and user distribution constraints. In this paper, a novel
D2D network analysis (DNA) framework is proposed to study the impacts of
frequently occurring subgraphs, known as motifs, on D2D network performance and
to determine an effective content dissemination strategy. In the proposed
framework, the distribution of devices in the D2D network is modeled as a
Thomas cluster process (TCP), and two graph structures, the star and chain
motifs, are studied in the communication graph. Based on the stochastic
properties of the TCP, closedform analytical expressions for the statistical
significance, the outage probability, as well as the average throughput per
device, are derived. Simulation results corroborate the analytical derivations
and show the influence of different system topologies on the occurrence of
motifs and the D2D system throughput. More importantly, the results highlight
that, as the statistical significance of motifs increases, the system
throughput will initially increase, and, then, decrease. Hence, network
operators can obtain statistical significance regions for chain and star motifs
that map to the optimal content dissemination performance. Furthermore, using
the obtained regions and the analytical expressions for statistical
significance, network operators can effectively identify which clusters of
devices can be leveraged for D2D communications while determining the number of
serving devices in each identified cluster.