• ### An Online Optimization Framework for Distributed Fog Network Formation with Minimal Latency(1710.05239)

Feb. 22, 2019 cs.IT, math.IT
Fog computing is emerging as a promising paradigm to perform distributed, low-latency computation by jointly exploiting the radio and computing resources of end-user devices and cloud servers. However, the dynamic and distributed formation of local fog networks is highly challenging due to the unpredictable arrival and departure of neighboring fog nodes. Therefore, a given fog node must properly select a set of neighboring nodes and intelligently offload its computational tasks to this set of neighboring fog nodes and the cloud in order to achieve low-latency transmission and computation. In this paper, the problem of fog network formation and task distribution is jointly investigated while considering a hybrid fog-cloud architecture. The goal is to minimize the maximum computational latency by enabling a given fog node to form a suitable fog network and optimize the task distribution, under uncertainty on the arrival process of neighboring fog nodes. To solve this problem, a novel online optimization framework is proposed in which the neighboring nodes are selected by using a threshold-based online algorithm that uses a target competitive ratio, defined as the ratio between the latency of the online algorithm and the offline optimal latency. The proposed framework repeatedly updates its target competitive ratio and optimizes the distribution of the fog node's computational tasks in order to minimize latency. Simulation results show that the proposed framework can successfully select a set of neighboring nodes while reducing latency by up to 19.25% compared to a baseline approach based on the well-known online secretary framework. The results also show how, using the proposed framework, the computational tasks can be properly offloaded between the fog network and a remote cloud server in different network settings.
• ### Smart Routing of Electric Vehicles for Load Balancing in Smart Grids(1705.03805)

Dec. 28, 2019 cs.MA, cs.GT, cs.SY
Electric vehicles (EVs) are expected to be a major component of the smart grid. The rapid proliferation of EVs will introduce an unprecedented load on the existing electric grid due to the charging/discharging behavior of the EVs, thus motivating the need for novel approaches for routing EVs across the grid. In this paper, a novel gametheoretic framework for smart routing of EVs within the smart grid is proposed. The goal of this framework is to balance the electricity load across the grid while taking into account the traffic congestion and the waiting time at charging stations. The EV routing problem is formulated as a noncooperative game. For this game, it is shown that selfish behavior of EVs will result in a pure-strategy Nash equilibrium with the price of anarchy upper bounded by the variance of the ground load induced by the residential, industrial, or commercial users. Moreover, the results are extended to capture the stochastic nature of induced ground load as well as the subjective behavior of the owners of EVs as captured by using notions from the behavioral framework of prospect theory. Simulation results provide new insights on more efficient energy pricing at charging stations and under more realistic grid conditions.
• ### Proactive Resource Management for LTE in Unlicensed Spectrum: A Deep Learning Perspective(1702.07031)

Dec. 15, 2018 cs.IT, math.IT, cs.AI, cs.GT
LTE in unlicensed spectrum using licensed assisted access LTE (LTE-LAA) is a promising approach to overcome the wireless spectrum scarcity. However, to reap the benefits of LTE-LAA, a fair coexistence mechanism with other incumbent WiFi deployments is required. In this paper, a novel deep learning approach is proposed for modeling the resource allocation problem of LTE-LAA small base stations (SBSs). The proposed approach enables multiple SBSs to proactively perform dynamic channel selection, carrier aggregation, and fractional spectrum access while guaranteeing fairness with existing WiFi networks and other LTE-LAA operators. Adopting a proactive coexistence mechanism enables future delay-tolerant LTE-LAA data demands to be served within a given prediction window ahead of their actual arrival time thus avoiding the underutilization of the unlicensed spectrum during off-peak hours while maximizing the total served LTE-LAA traffic load. To this end, a noncooperative game model is formulated in which SBSs are modeled as Homo Egualis agents that aim at predicting a sequence of future actions and thus achieving long-term equal weighted fairness with WLAN and other LTE-LAA operators over a given time horizon. The proposed deep learning algorithm is then shown to reach a mixed-strategy Nash equilibrium (NE), when it converges. Simulation results using real data traces show that the proposed scheme can yield up to 28% and 11% gains over a conventional reactive approach and a proportional fair coexistence mechanism, respectively. The results also show that the proposed framework prevents WiFi performance degradation for a densely deployed LTE-LAA network.
• ### Virtual Reality over Wireless Networks: Quality-of-Service Model and Learning-Based Resource Management(1703.04209)

June 20, 2018 cs.IT, math.IT
In this paper, the problem of resource management is studied for a network of wireless virtual reality (VR) users communicating over small cell networks (SCNs). In order to capture the VR users' quality-of-service (QoS) in SCNs, a novel VR model, based on multi-attribute utility theory, is proposed. This model jointly accounts for VR metrics such as tracking accuracy, processing delay, and transmission delay. In this model, the small base stations (SBSs) act as the VR control centers that collect the tracking information from VR users over the cellular uplink. Once this information is collected, the SBSs will then send the three dimensional images and accompanying surround stereo audio to the VR users over the downlink. Therefore, the resource allocation problem in VR wireless networks must jointly consider both the uplink and downlink. This problem is then formulated as a noncooperative game and a distributed algorithm based on the machine learning framework of echo state networks (ESNs) is proposed to find the solution of this game. The use of the proposed ESN algorithm enables the SBSs to predict the VR QoS of each SBS and guarantees the convergence to a mixed-strategy Nash equilibrium. The analytical result shows that each user's VR QoS jointly depends on both VR tracking accuracy and wireless resource allocation. Simulation results show that the proposed algorithm yields significant gains, in terms of total utility value of VR QoS, that reach up to 22.2% and 37.5%, respectively, compared to Q-learning and a baseline proportional fair algorithm. The results also show that the proposed algorithm has a faster convergence time than Q-learning and can guarantee low delays for VR services.
• ### Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems(1805.00983)

May 8, 2018 cs.AI, math.OC, cs.SY
To operate effectively in tomorrow's smart cities, autonomous vehicles (AVs) must rely on intra-vehicle sensors such as camera and radar as well as inter-vehicle communication. Such dependence on sensors and communication links exposes AVs to cyber-physical (CP) attacks by adversaries that seek to take control of the AVs by manipulating their data. Thus, to ensure safe and optimal AV dynamics control, the data processing functions at AVs must be robust to such CP attacks. To this end, in this paper, the state estimation process for monitoring AV dynamics, in presence of CP attacks, is analyzed and a novel adversarial deep reinforcement learning (RL) algorithm is proposed to maximize the robustness of AV dynamics control to CP attacks. The attacker's action and the AV's reaction to CP attacks are studied in a game-theoretic framework. In the formulated game, the attacker seeks to inject faulty data to AV sensor readings so as to manipulate the inter-vehicle optimal safe spacing and potentially increase the risk of AV accidents or reduce the vehicle flow on the roads. Meanwhile, the AV, acting as a defender, seeks to minimize the deviations of spacing so as to ensure robustness to the attacker's actions. Since the AV has no information about the attacker's action and due to the infinite possibilities for data value manipulations, the outcome of the players' past interactions are fed to long-short term memory (LSTM) blocks. Each player's LSTM block learns the expected spacing deviation resulting from its own action and feeds it to its RL algorithm. Then, the the attacker's RL algorithm chooses the action which maximizes the spacing deviation, while the AV's RL algorithm tries to find the optimal action that minimizes such deviation.
• ### Artificial Intelligence for Wireless Connectivity and Security of Cellular-Connected UAVs(1804.05348)

May 7, 2018 cs.IT, math.IT, cs.AI
Cellular-connected unmanned aerial vehicles (UAVs) will inevitably be integrated into future cellular networks as new aerial mobile users. Providing cellular connectivity to UAVs will enable a myriad of applications ranging from online video streaming to medical delivery. However, to enable a reliable wireless connectivity for the UAVs as well as a secure operation, various challenges need to be addressed such as interference management, mobility management and handover, cyber-physical attacks, and authentication. In this paper, the goal is to expose the wireless and security challenges that arise in the context of UAV-based delivery systems, UAV-based real-time multimedia streaming, and UAV-enabled intelligent transportation systems. To address such challenges, artificial neural network (ANN) based solution schemes are introduced. The introduced approaches enable the UAVs to adaptively exploit the wireless system resources while guaranteeing a secure operation, in real-time. Preliminary simulation results show the benefits of the introduced solutions for each of the aforementioned cellular-connected UAV application use case.
• ### Machine Learning for Predictive On-Demand Deployment of UAVs for Wireless Communications(1805.00061)

April 30, 2018 cs.IT, math.IT, eess.SP
In this paper, a novel machine learning (ML) framework is proposed for enabling a predictive, efficient deployment of unmanned aerial vehicles (UAVs), acting as aerial base stations (BSs), to provide on-demand wireless service to cellular users. In order to have a comprehensive analysis of cellular traffic, an ML framework based on a Gaussian mixture model (GMM) and a weighted expectation maximization (WEM) algorithm is introduced to predict the potential network congestion. Then, the optimal deployment of UAVs is studied to minimize the transmit power needed to satisfy the communication demand of users in the downlink, while also minimizing the power needed for UAV mobility, based on the predicted cellular traffic. To this end, first, the optimal partition of service areas of each UAV is derived, based on a fairness principle. Next, the optimal location of each UAV that minimizes the total power consumption is derived. Simulation results show that the proposed ML approach can reduce the required downlink transmit power and improve the power efficiency by over 20%, compared with an optimal deployment of UAVs with no ML prediction.
• ### Authentication of Everything in the Internet of Things: Learning and Environmental Effects(1805.00969)

April 24, 2018 cs.IT, math.IT, cs.CR
Reaping the benefits of the Internet of things (IoT) system is contingent upon developing IoT-specific security solutions. Conventional security and authentication solutions often fail to meet IoT security requirements due to the computationally limited and portable nature of IoT objects. In this paper, an IoT objects authentication framework is proposed. The framework uses device-specific information, called fingerprints, along with a transfer learning tool to authenticate objects in the IoT. The framework tracks the effect of changes in the physical environment on fingerprints and uses unique IoT environmental effects features to detect both cyber and cyber-physical emulation attacks. The proposed environmental effects estimation framework is proven to improve the detection rate of attackers without increasing the false positives rate. The proposed framework is also shown to be able to detect cyber-physical attackers that are capable of replicating the fingerprints of target objects which conventional methods are unable to detect. A transfer learning approach is proposed to allow the use of objects with different types and features in the environmental effects estimation process to enhance the performance of the framework while capturing practical IoT deployments with diverse object types. Simulation results using real IoT device data show that the proposed approach can yield a 40% improvement in cyber emulation attacks detection and is able to detect cyber-physical emulation attacks that conventional methods cannot detect. The results also show that the proposed framework improves the authentication accuracy while the transfer learning approach yields up to 70% additional performance gains.
• ### Joint Communication and Control for Wireless Autonomous Vehicular Platoon Systems(1804.05290)

April 15, 2018 cs.IT, math.IT
Autonomous vehicular platoons will play an important role in improving on-road safety in tomorrow's smart cities. Vehicles in an autonomous platoon can exploit vehicle-to-vehicle (V2V) communications to collect information, such as velocity and acceleration, from surrounding vehicles so as to maintain the target velocity and inter-vehicle distance. However, due to the dynamic on-vehicle data processing rate and the uncertainty of the wireless channel, V2V communications within a platoon will experience a delay. Such delay can impair the vehicles' ability to stabilize the operation of the platoon. In this paper, a novel framework is proposed to optimize a platoon's operation while jointly consider the delay of the wireless network and the stability of the vehicle's control system. First, stability analysis for the control system is performed and the maximum wireless system delay requirements which can prevent the instability of the control system are derived. Then, delay analysis is conducted to determine the end-to-end delay, including queuing, processing, and transmission delay for the V2V link in the wireless network. Subsequently, using the derived delay, a lower bound and an approximated expression of the reliability for the wireless system, defined as the probability that the wireless system meets the control system's delay needs, are derived. Then, the control parameters are optimized to maximize the derived wireless system reliability. Simulation results corroborate the analytical derivations and study the impact of parameters, such as the platoon size, on the reliability performance of the vehicular platoon. More importantly, the simulation results disclose the benefits of integrating control system and wireless network design while providing guidelines for designing autonomous platoons so as to realize the required wireless network reliability and control system stability.
• ### Echo-Liquid State Deep Learning for $360^\circ$ Content Transmission and Caching in Wireless VR Networks with Cellular-Connected UAVs(1804.03284)

April 10, 2018 cs.IT, math.IT
In this paper, the problem of content caching and transmission is studied for a wireless virtual reality (VR) network in which unmanned aerial vehicles (UAVs) capture videos on live games or sceneries and transmit them to small base stations (SBSs) that service the VR users. However, due to its limited capacity, the wireless network may not be able to meet the delay requirements of such 360 content transmissions. To meet the VR delay requirements, the UAVs can extract specific visible content (e.g., user field of view) from the original 360 data and send this visible content to the users so as to reduce the traffic load over backhaul and radio access links. To further alleviate the UAV-SBS backhaul traffic, the SBSs can also cache the popular contents that users request. This joint content caching and transmission problem is formulated as an optimization problem whose goal is to maximize the users' reliability, defined as the probability that the content transmission delay of each user satisfies the instantaneous VR delay target. To address this problem, a distributed deep learning algorithm that brings together new neural network ideas from liquid state machine (LSM) and echo state networks (ESNs) is proposed. The proposed algorithm enables each SBS to predict the users' reliability so as to find the optimal contents to cache and content transmission format for each UAV. Analytical results are derived to expose the various network factors that impact content caching and content transmission format selection. Simulation results show that the proposed algorithm yields 25.4% gain of reliability compared to Q-learning. The results also show that the proposed algorithm can achieve 14.7% gain of reliability due to the reduction of traffic load over backhaul compared to the proposed algorithm with random caching.
• ### Human-in-the-Loop Wireless Communications: Machine Learning and Brain-Aware Resource Management(1804.00209)

March 31, 2018 cs.IT, math.IT, eess.SP
Human-centric applications such as virtual reality and immersive gaming will be central to the future wireless networks. Common features of such services include: a) their dependence on the human user's behavior and state, and b) their need for more network resources compared to conventional cellular applications. To successfully deploy such applications over wireless and cellular systems, the network must be made cognizant of not only the quality-of-service (QoS) needs of the applications, but also of the perceptions of the human users on this QoS. In this paper, by explicitly modeling the limitations of the human brain, a concrete measure for the delay perception of human users in a wireless network is introduced. Then, a novel learning method, called probability distribution identification, is proposed to find a probabilistic model for this delay perception based on the brain features of a human user. The proposed learning method uses both supervised and unsupervised learning techniques to build a Gaussian mixture model of the human brain features. Given a model for the delay perception of the human brain, a novel brain-aware resource management algorithm based on Lyapunov optimization is proposed for allocating radio resources to human users while minimizing the transmit power and taking into account the reliability of both machine type devices and human users. The proposed algorithm is shown to have a low complexity. Moreover, a closed-form relationship between the reliability measure and wireless physical layer metrics of the network is derived. Simulation results using real data from actual human users show that a brain-aware approach can yield savings of up to 78% in power compared to the system
• ### Joint Communication, Computation, Caching, and Control in Big Data Multi-access Edge Computing(1803.11512)

March 30, 2018 cs.NI
The concept of multi-access edge computing (MEC) has been recently introduced to supplement cloud computing by deploying MEC servers to the network edge so as to reduce the network delay and alleviate the load on cloud data centers. However, compared to a resourceful cloud, an MEC server has limited resources. When each MEC server operates independently, it cannot handle all of the computational and big data demands stemming from the users devices. Consequently, the MEC server cannot provide significant gains in overhead reduction due to data exchange between users devices and remote cloud. Therefore, joint computing, caching, communication, and control (4C) at the edge with MEC server collaboration is strongly needed for big data applications. In order to address these challenges, in this paper, the problem of joint 4C in big data MEC is formulated as an optimization problem whose goal is to maximize the bandwidth saving while minimizing delay, subject to the local computation capability of user devices, computation deadline, and MEC resource constraints. However, the formulated problem is shown to be non-convex. To make this problem convex, a proximal upper bound problem of the original formulated problem that guarantees descent to the original problem is proposed. To solve the proximal upper bound problem, a block successive upper bound minimization (BSUM) method is applied. Simulation results show that the proposed approach increases bandwidth-saving and minimizes delay while satisfying the computation deadlines.
• ### A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems(1803.00680)

March 2, 2018 cs.IT, math.IT
The use of flying platforms such as unmanned aerial vehicles (UAVs), popularly known as drones, is rapidly growing in a wide range of wireless networking applications. In particular, with their inherent attributes such as mobility, flexibility, and adaptive altitude, UAVs admit several key potential applications in wireless systems. On the one hand, UAVs can be used as aerial base stations to enhance coverage, capacity, reliability, and energy efficiency of wireless networks. For instance, UAVs can be deployed to complement existing cellular systems by providing additional capacity to hotspot areas as well as to provide network coverage in emergency and public safety situations. On the other hand, UAVs can operate as flying mobile terminals within the cellular networks. In this paper, a comprehensive tutorial on the potential benefits and applications of UAVs in wireless communications is presented. Moreover, the important challenges and the fundamental tradeoffs in UAV-enabled wireless networks are thoroughly investigated. In particular, the key UAV challenges such as three-dimensional deployment, performance analysis, air-to-ground channel modeling, and energy efficiency are explored along with representative results. Then, fundamental open problems and potential research directions pertaining to wireless communications and networking with UAVs are introduced. To cope with the open research problems, various analytical frameworks and mathematical tools such as optimization theory, machine learning, stochastic geometry, transport theory, and game theory are described. The use of such tools for addressing unique UAV problems is also presented. In a nutshell, this tutorial provides key guidelines on how to analyze, optimize, and design UAV-based wireless communication systems.
• ### Generalized Colonel Blotto Game(1710.01381)

March 2, 2018 cs.IT, math.IT, cs.GT, math.OC, cs.SY
Competitive resource allocation between adversarial decision makers arises in a wide spectrum of real-world applications such as in communication systems, cyber-physical systems security, as well as financial, political, and electoral competition. As such, developing analytical tools to model and analyze competitive resource allocation is crucial for devising optimal allocation strategies and anticipating the potential outcomes of the competition. To this end, the Colonel Blotto game is one of the most popular game-theoretic frameworks for modeling and analyzing such competitive resource allocation problems. However, in many real-world competitive situations, the Colonel Blotto game does not admit solutions in deterministic strategies and, hence, one must rely on analytically complex mixed-strategies with their associated tractability, applicability, and practicality challenges. In this paper, a generalization of the Colonel Blotto game which enables the derivation of deterministic, practical, and implementable equilibrium strategies is proposed while accounting for the heterogeneity of the battlefields. In addition, the proposed generalized game enables accounting for the consumed resources in each battlefield, a feature that is not considered in the classical Blotto game. For the generalized game, the existence of a Nash equilibrium in pure-strategies is shown. Then, closed-form analytical expressions of the equilibrium strategies, are derived and the outcome of the game is characterized; based on the number of resources of each player as well as the valuation of each battlefield. The generated results provide invaluable insights on the outcome of the competition. For example, the results show that, when both players are fully rational, the more resourceful player can achieve a better total payoff at the Nash equilibrium, a result that is not mimicked in the classical Blotto game.
• ### Evolutionary Games for Correlation-Aware Clustering in Massive Machine-to-Machine Networks(1803.00283)

March 1, 2018 cs.IT, math.IT, cs.GT
In this paper, the problem of self-organizing, correlation-aware clustering is studied for a dense network of machine-type devices (MTDs) deployed over a cellular network. In dense machine-to-machine networks, MTDs are typically located within close proximity and will gather correlated data, and, thus, clustering MTDs based on data correlation will lead to a decrease in the number of redundant bits transmitted to the base station. To analyze this clustering problem, a novel utility function that captures the average MTD transmission power per cluster is derived, as a function of the MTD location, cluster size, and inter-cluster interference. Then, the clustering problem is formulated as an evolutionary game, which models the interactions among the massive number of MTDs, in order to decrease MTD transmission power. To solve this game, a distributed algorithm is proposed to allow the infinite number of MTDs to autonomously form clusters. It is shown that the proposed distributed algorithm converges to an evolutionary stable strategy (ESS), that is robust to a small portion of MTDs deviating from the stable cluster formation at convergence. The maximum fraction of MTDs that can deviate from the ESS, while still maintaining a stable cluster formation is derived. Simulation results show that the proposed approach can effectively cluster MTDs with highly correlated data, which, in turn, enables those MTDs to eliminate a large number of redundant bits. The results show that, on average, using the proposed approach yields reductions of up to 23.4% and 9.6% in terms of the transmit power per cluster, compared to forming clusters with the maximum possible size and uniformly selecting a cluster size, respectively.
• ### Deep Learning for Signal Authentication and Security in Massive Internet of Things Systems(1803.00916)

March 1, 2018 cs.CR, cs.GT, cs.LG
Secure signal authentication is arguably one of the most challenging problems in the Internet of Things (IoT) environment, due to the large-scale nature of the system and its susceptibility to man-in-the-middle and eavesdropping attacks. In this paper, a novel deep learning method is proposed for dynamic authentication of IoT signals to detect cyber attacks. The proposed learning framework, based on a long short-term memory (LSTM) structure, enables the IoT devices (IoTDs) to extract a set of stochastic features from their generated signal and dynamically watermark these features into the signal. This method enables the cloud, which collects signals from the IoT devices, to effectively authenticate the reliability of the signals. Moreover, in massive IoT scenarios, since the cloud cannot authenticate all the IoTDs simultaneously due to computational limitations, a game-theoretic framework is proposed to improve the cloud's decision making process by predicting vulnerable IoTDs. The mixed-strategy Nash equilibrium (MSNE) for this game is derived and the uniqueness of the expected utility at the equilibrium is proven. In the massive IoT system, due to a large set of available actions for the cloud, it is shown that analytically deriving the MSNE is challenging and, thus, a learning algorithm proposed that converges to the MSNE. Moreover, in order to cope with the incomplete information case in which the cloud cannot access the state of the unauthenticated IoTDs, a deep reinforcement learning algorithm is proposed to dynamically predict the state of unauthenticated IoTDs and allow the cloud to decide on which IoTDs to authenticate. Simulation results show that, with an attack detection delay of under 1 second the messages can be transmitted from IoT devices with an almost 100% reliability.
• ### Integrated Millimeter Wave and Sub-6 GHz Wireless Networks: A Roadmap for Ultra-Reliable Low-Latency Communications(1802.03837)

Feb. 11, 2018 cs.IT, math.IT, cs.NI, eess.SP
Emerging wireless services such as augmented reality require next-generation wireless networks to support ultra-reliable and low-latency communication (URLLC), while also guaranteeing high data rates. Existing wireless networks that solely rely on the scarce sub-6 GHz, microwave ($\mu$W) frequency bands will be unable to meet the low-latency, high capacity requirements of future wireless services. Meanwhile, operating at high-frequency millimeter wave (mmWave) bands is seen as an attractive solution, primarily due to the bandwidth availability and possibility of large-scale multi-antenna communication. However, even though leveraging the large bandwidth at mmWave frequencies can potentially boost the wireless capacity and reduce the transmission delay for low-latency applications, mmWave communication is inherently unreliable due to its susceptibility to blockage, high path loss, and channel uncertainty. Hence, to provide URLLC and high-speed wireless access, it is desirable to seamlessly integrate the reliability of $\mu$W networks with the high capacity of mmWave networks. To this end, in this paper, the first comprehensive tutorial for integrated mmWave-$\mu$W communications is introduced. This envisioned integrated design will enable wireless networks to achieve URLLC along with high data rates by leveraging the best of two worlds: reliable, long-range communications at the $\mu$W bands and directional high-speed communications at the mmWave frequencies. To achieve this goal, key solution concepts are developed that include new architectures for the radio interface, URLLC-aware frame structure and resource allocation methods along with learning techniques, as well as mobility management, to realize the potential of integrated mmWave-$\mu$W communications. The opportunities and challenges of each proposed scheme are discussed and key results are presented.
• ### Stochastic Optimization and Control Framework for 5G Network Slicing with Effective Isolation(1801.10282)

Jan. 31, 2018 cs.IT, math.IT, cs.NI
Network slicing is an emerging technique for providing resources to diverse wireless services with heterogeneous quality-of-service needs. However, beyond satisfying end-to-end requirements of network users, network slicing needs to also provide isolation between slices so as to prevent one slice's faults and congestion from affecting other slices. In this paper, the problem of network slicing is studied in the context of a wireless system having a time-varying number of users that require two types of slices: reliable low latency (RLL) and self-managed (capacity limited) slices. To address this problem, a novel control framework for stochastic optimization is proposed based on the Lyapunov drift-plus-penalty method. This new framework enables the system to minimize power, maintain slice isolation, and provide reliable and low latency end-to-end communication for RLL slices. Simulation results show that the proposed approach can maintain the system's reliability while providing effective slice isolation in the event of sudden changes in the network environment.
• ### Liquid State Machine Learning for Resource and Cache Management in LTE-U Unmanned Aerial Vehicle (UAV) Networks(1801.09339)

Jan. 29, 2018 cs.IT, math.IT
In this paper, the problem of joint caching and resource allocation is investigated for a network of cache-enabled unmanned aerial vehicles (UAVs) that service wireless ground users over the LTE licensed and unlicensed (LTE-U) bands. The considered model focuses on users that can access both licensed and unlicensed bands while receiving contents from either the cache units at the UAVs directly or via content server-UAV-user links. This problem is formulated as an optimization problem which jointly incorporates user association, spectrum allocation, and content caching. To solve this problem, a distributed algorithm based on the machine learning framework of liquid state machine (LSM) is proposed. Using the proposed LSM algorithm, the cloud can predict the users' content request distribution while having only limited information on the network's and users' states. The proposed algorithm also enables the UAVs to autonomously choose the optimal resource allocation strategies that maximize the number of users with stable queues depending on the network states. Based on the users' association and content request distributions, the optimal contents that need to be cached at UAVs as well as the optimal resource allocation are derived. Simulation results using real datasets show that the proposed approach yields up to 33.3% and 50.3% gains, respectively, in terms of the number of users that have stable queues compared to two baseline algorithms: Q-learning with cache and Q-learning without cache. The results also show that LSM significantly improves the convergence time of up to 33.3% compared to conventional learning algorithms such as Q-learning.
• ### Graph-Theoretic Framework for Unified Analysis of Observability and Data Injection Attacks in the Smart Grid(1801.08951)

Jan. 26, 2018 cs.IT, math.IT, math.OC, cs.SY
In this paper, a novel graph-theoretic framework is proposed to generalize the analysis of a broad set of security attacks, including observability and data injection attacks, that target the smart grid. First, the notion of observability attacks is defined based on a proposed graph-theoretic construct. In this respect, an algorithm is proposed to characterize the critical set of measurements which must be removed along with a certain measurement to make the system unobservable. It is then shown that for the system to be observable these critical sets must be part of a maximum matching over a proposed bipartite graph. In addition, it is shown that stealthy data injection attacks are a special case of these observability attacks. Then, various attack strategies and defense policies for observability and data injection attacks are shown to be amenable to analysis using variations of the formulated maximum-matching problem. The proposed framework is then shown to provide a unified basis for exact analysis of four security problems (among others), pertaining to the characterization of: 1) The sparsest stealthy attack, 2) The sparsest stealthy attack including a certain specific measurement, 3) A set of measurements which must be defended to thwart all potential stealthy attacks, and 4) The set of measurements, which when protected, can thwart any attack whose cardinality is below a certain threshold. A case study using the IEEE 14-bus system containing a set of 17 measurement units is used to corroborate the theoretical findings. In this case analysis, stealthy attacks of lowest cardinality are characterized and shown to have a cardinality equal to 2. In addition, it is shown that defending only 3 out of the 17 measurements is enough to thwart any stealthy attack with cardinality lower than 3, while defending a minimum of 13 measurements is needed to thwart all possible stealthy attacks.
• ### A Multiclass Mean-Field Game for Thwarting Misinformation Spread in the Internet of Battlefield Things (IoBT)(1802.06887)

Jan. 23, 2018 cs.GT
In this paper, the problem of misinformation propagation is studied for an Internet of Battlefield Things (IoBT) system in which an attacker seeks to inject false information in the IoBT nodes in order to compromise the IoBT operations. In the considered model, each IoBT node seeks to counter the misinformation attack by finding the optimal probability of accepting a given information that minimizes its cost at each time instant. The cost is expressed in terms of the quality of information received as well as the infection cost. The problem is formulated as a mean-field game with multiclass agents which is suitable to model a massive heterogeneous IoBT system. For this game, the mean-field equilibrium is characterized, and an algorithm based on the forward backward sweep method is proposed to find the mean-field equilibrium. Then, the finite IoBT case is considered, and the conditions of convergence of the Nash equilibria in the finite case to the mean-field equilibrium are presented. Numerical results show that the proposed scheme can achieve a 1.2-fold increase in the quality of information (QoI) compared to a baseline scheme in which the IoBT nodes are always transmitting. The results also show that the proposed scheme can reduce the proportion of infected nodes by 99% compared to the baseline.
• ### Cellular-Connected UAVs over 5G: Deep Reinforcement Learning for Interference Management(1801.05500)

Jan. 16, 2018 cs.IT, math.IT, cs.AI, cs.GT
In this paper, an interference-aware path planning scheme for a network of cellular-connected unmanned aerial vehicles (UAVs) is proposed. In particular, each UAV aims at achieving a tradeoff between maximizing energy efficiency and minimizing both wireless latency and the interference level caused on the ground network along its path. The problem is cast as a dynamic game among UAVs. To solve this game, a deep reinforcement learning algorithm, based on echo state network (ESN) cells, is proposed. The introduced deep ESN architecture is trained to allow each UAV to map each observation of the network state to an action, with the goal of minimizing a sequence of time-dependent utility functions. Each UAV uses ESN to learn its optimal path, transmission power level, and cell association vector at different locations along its path. The proposed algorithm is shown to reach a subgame perfect Nash equilibrium (SPNE) upon convergence. Moreover, an upper and lower bound for the altitude of the UAVs is derived thus reducing the computational complexity of the proposed algorithm. Simulation results show that the proposed scheme achieves better wireless latency per UAV and rate per ground user (UE) while requiring a number of steps that is comparable to a heuristic baseline that considers moving via the shortest distance towards the corresponding destinations. The results also show that the optimal altitude of the UAVs varies based on the ground network density and the UE data rate requirements and plays a vital role in minimizing the interference level on the ground UEs as well as the wireless transmission delay of the UAV.
• ### Fast Uplink Grant for Machine Type Communications: Challenges and Opportunities(1801.04953)

Jan. 15, 2018 cs.IT, math.IT