It Is Rude to Ask a Sensor Its Age-of-Information: Status Updates Against an Eavesdropping Node

We consider periodical status updates between a transmitter and a legitimate receiver, in the presence of an eavesdropper that is sometimes able to capture pieces of information. We assume that, in the absence of such a threat, the connection between the transmitter and the receiver is controlled by the transmitter with the aim to minimize the age of information at the receiver’s side. However, if the presence of an eavesdropper is known, the transmitter may further tune the generation rate of status updates to trade off the age of information values acquired by the eavesdropper and the receiver, respectively. To analyze this problem, we first propose a metric that combines both objectives according to a Bergson social welfare framework, and then we solve the problem of finding the optimal generation rate as a function of the probability of data capture by the eavesdropper. This enables us to derive notable and sometimes counter-intuitive conclusions, and possibly establish an extension of the age of information framework to security aspects from a performance evaluation perspective.

[1]  D. Niyato,et al.  Optimizing Age of Information and Security of the Next-Generation Internet of Everything Systems , 2022, IEEE Internet of Things Journal.

[2]  A. Munari,et al.  The Role of Feedback in AoI Optimization Under Limited Transmission Opportunities , 2022, GLOBECOM 2022 - 2022 IEEE Global Communications Conference.

[3]  Tao Jing,et al.  Joint timeliness and security provisioning for enhancement of dependability in Internet of Vehicle system , 2022, Int. J. Distributed Sens. Networks.

[4]  M. Zorzi,et al.  Game Theoretic Analysis of Age of Information for Slotted ALOHA Access With Capture , 2022, IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[5]  S. Ulukus,et al.  Age of Information in the Presence of an Adversary , 2022, IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[6]  Giovanni Perin,et al.  Adversarial Jamming and Catching Games over AWGN Channels with Mobile Players , 2021, 2021 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[7]  Tobias J. Oechtering,et al.  Minimum Achievable Peak Age of Information Under Service Preemptions and Request Delay , 2021, IEEE Journal on Selected Areas in Communications.

[8]  Qinyu Zhang,et al.  To Preempt or Not: Timely Status Update in the Presence of Non-trivial Propagation Delay , 2020, 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall).

[9]  Andrea Munari,et al.  Modern Random Access: An Age of Information Perspective on Irregular Repetition Slotted ALOHA , 2020, IEEE Transactions on Communications.

[10]  Elif Uysal,et al.  Analysis of Slotted ALOHA With an Age Threshold , 2020, IEEE Journal on Selected Areas in Communications.

[11]  Roy D. Yates,et al.  Age of Information: An Introduction and Survey , 2020, IEEE Journal on Selected Areas in Communications.

[12]  Qian Wang,et al.  Secure Status Updates under Eavesdropping: Age of Information-based Physical Layer Security Metrics , 2020, ArXiv.

[13]  Marian Codreanu,et al.  Average AoI in Multi-Source Systems With Source-Aware Packet Management , 2020, IEEE Transactions on Communications.

[14]  Eytan Modiano,et al.  Age-Delay Tradeoffs in Queueing Systems , 2019, IEEE Transactions on Information Theory.

[15]  Insoo Koo,et al.  Efficient attack strategy for legitimate energy-powered eavesdropping in tactical cognitive radio networks , 2019, Wirel. Networks.

[16]  Li Zhu,et al.  Joint Security and QoS Provisioning in Train-Centric CBTC Systems Under Sybil Attacks , 2019, IEEE Access.

[17]  R. Sarpong,et al.  Bio-inspired synthesis of xishacorenes A, B, and C, and a new congener from fuscol† †Electronic supplementary information (ESI) available. See DOI: 10.1039/c9sc02572c , 2019, Chemical science.

[18]  A. Ephremides,et al.  Information Freshness Over an Interference Channel: A Game Theoretic View , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[19]  Roy D. Yates,et al.  The Age of Information: Real-Time Status Updating by Multiple Sources , 2016, IEEE Transactions on Information Theory.

[20]  Robert W. Heath,et al.  Secure Communications in Millimeter Wave Ad Hoc Networks , 2016, IEEE Transactions on Wireless Communications.

[21]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[22]  Marian Codreanu,et al.  On the Age of Information in Status Update Systems With Packet Management , 2015, IEEE Transactions on Information Theory.

[23]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[24]  Leonardo Badia,et al.  Jamming in Underwater Sensor Networks as a Bayesian Zero-Sum Game with Position Uncertainty , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[25]  Roy D. Yates,et al.  Real-time status updating: Multiple sources , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[26]  Roy D. Yates,et al.  Real-time status: How often should one update? , 2012, 2012 Proceedings IEEE INFOCOM.

[27]  Nevio Benvenuto,et al.  Principles of Communications Networks and Systems: Benvenuto/Principles of Communications Networks and Systems , 2011 .

[28]  Sanjit Krishnan Kaul,et al.  Minimizing age of information in vehicular networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[29]  J. Nash THE BARGAINING PROBLEM , 1950, Classics in Game Theory.

[30]  Abram Burk A Reformulation of Certain Aspects of Welfare Economics , 1938 .

[31]  W. Marsden I and J , 2012 .

[32]  Neil Genzlinger A. and Q , 2006 .