{"title":"Guest Editorial of the Special Section on AI Powered Edge Computing for IoT","authors":"Zhongwen Guo;Hui Xia;Yu Wang;Radhouane Chouchane","doi":"10.1109/TSUSC.2024.3415951","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3415951","url":null,"abstract":"","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 6","pages":"814-816"},"PeriodicalIF":3.0,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10791341","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conditional Data-Sharing Privacy-Preserving Scheme in Blockchain-Based Social Internet of Vehicles","authors":"Zhuoqun Xia;Jiahuan Man;Ke Gu;Xiong Li;Longfei Huang","doi":"10.1109/TSUSC.2024.3452228","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3452228","url":null,"abstract":"Social Internet of Vehicles (SIoVs) is an important information exchange platform to provide comprehensive traffic services by sharing vehicle-aware data. However, traditional data sharing methods can not provide the security of decentralized data sharing, making it possible for some malicious third parties to initiate dishonest behaviors. Additionally, the lack of access control for data sharing in SIoVs easily leads to unauthorized data sharing, thus user privacy is threatened and the source of false data is difficult to be traced. In this paper, we propose a conditional data-sharing privacy-preserving scheme for blockchain-based social internet of vehicles. In our scheme, a lightweight ledger-based blockchain system is designed, which combines with the ciphertext-policy attribute-based encryption method to realize anonymous one-to-many sharing of data with fine-grained access management. Also, a collaborative identity tracing method is constructed to trace malicious users who provide false data. Our scheme can effectively prevent second-hand data sharing and safeguard user privacy. Moreover, related experimental results validate the efficiency of our scheme.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 2","pages":"378-395"},"PeriodicalIF":3.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143769400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pietro Rando Mazzarino;Martina Capone;Elisa Guelpa;Lorenzo Bottaccioli;Vittorio Verda;Edoardo Patti
{"title":"A Modular Co-Simulation Platform for Comparing Flexibility Solutions in District Heating Under Variable Operating Conditions","authors":"Pietro Rando Mazzarino;Martina Capone;Elisa Guelpa;Lorenzo Bottaccioli;Vittorio Verda;Edoardo Patti","doi":"10.1109/TSUSC.2024.3449977","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3449977","url":null,"abstract":"Integrated modeling and simulation are crucial for optimizing cities’ energy planning. Existing sector-specific analyses have implementation limitations in representing interactions across infrastructures, limiting optimization potentials. An integrated framework simulating multiple interacting components from a systemic perspective could reveal efficiency gains, flexibility, and synergies across urban energy networks to guide sustainable energy transitions. Co-simulation approaches are gaining attention for analyzing complex interconnected systems like District Heating (DH). Traditional single-discipline models present limitations in fully representing the interconnectivity between district heating networks and related subsystems, such as those in buildings and energy generation. Therefore, we propose a co-simulation based framework to simulate DH system behavior while easily integrating models of other subsystems and Functional Mock-up Unit (FMU) simulators. We tested this Plug&Play modular framework for Demand Side Management (DSM) and Storage-based strategies, evaluating their effectiveness in peak reduction while lowering the temperatures of the network.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 2","pages":"408-417"},"PeriodicalIF":3.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10648783","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143769401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic State Estimation for Multi-Machine Power Grids Under Randomly Occurring Cyber-Attacks: A Decentralized Framework","authors":"Bogang Qu;Zidong Wang;Bo Shen;Daogang Peng;Dong Yue","doi":"10.1109/TSUSC.2024.3448225","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3448225","url":null,"abstract":"Dynamic state estimation (DSE) plays a vitally important role in modern power systems, and the reliance on the communication network often render the systems to cyber-threats. This paper investigates the secure DSE problem for the multi-generator power grids in the presence of randomly occurring cyber-attacks. To facilitate the decentralized DSE, the synchronous generator is decoupled form the large-scale interconnected power grid with the aid of model decoupling method. A hybrid cyber-attack model, which includes three typical and representative attacks (i.e., denial-of-service attacks, bias injection attacks and replay attacks), is designed and launched in a random way. Attention is devoted to the secure algorithm design problem to light the negative impacts on the DSE performance from the nonlinearity/non-Gaussianity and the random occurrences of the cyber-attacks. Specifically, i) a likelihood function modification method is established where the knowledge of the hybrid-attack model is fully considered; and ii) the associated weights of the particles are updated according to the proposed likelihood function to resist the impacts caused by the randomly occurring cyber-attacks. Finally, simulation experiments with four scenarios are implemented on the IEEE 39-bus system and the corresponding analyses show the validity of the decentralized secure DSE scheme.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 2","pages":"396-407"},"PeriodicalIF":3.0,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143769495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved AFSA-Based Energy-Aware Content Caching Strategy for UAV-Assisted VEC","authors":"Kejun Long;Chunlin Li;Kun Jiang;Shaohua Wan","doi":"10.1109/TSUSC.2024.3444949","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3444949","url":null,"abstract":"UAV-assisted VEC can provide content caching services for vehicles by flying close to the vehicles for vehicle's QoS. However, in real-world scenarios with traffic congestion, due to the battery capacity and cache space limitations of UAVs, low content response speed and high response latency may occur. Based on this, we proposed a dynamic energy consumption-based content caching strategy in UAV-assisted VEC. We use the PSO algorithm to solve the problem and obtain the optimal UAV deployment location. For content caching, we construct a content caching model by considering UAV deployment, vehicle user preference, UAV cache capacity, and UAV energy consumption with the goal of minimizing content request latency. In addition, we propose an IAFSA-based content caching strategy. We reduce the solution space of the fish swarm algorithm, decrease the number of caching decisions, and improve the convergence performance of AFSA by employing dynamic horizons and step sizes. Experimental results show that the proposed IAFSA effectively reduces the average content request latency of the vehicle, improves the cache hit rate, and reduces the number of content return trips. Particularly, the proposed strategy reduces the average content request latency by more than 9.84% compared to the baseline algorithm.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 2","pages":"366-377"},"PeriodicalIF":3.0,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143769497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stochastic Computation Model for Solar Panel Size and Cost of Sustainable IoT Networks","authors":"Atul Banotra;Deepak Mishra;Sudhakar Modem","doi":"10.1109/TSUSC.2024.3443450","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3443450","url":null,"abstract":"The Internet of Things (IoT) applications require uninterrupted network operation which is often hindered by battery energy constraints. Literature suggests that solar energy harvesting is a promising approach to powering IoT devices in a sustainable manner. However, the available literature overlooks key factors of determining effective solar panel size and cost while considering the IoT consumption for sustainable operation. This article tackles these pivotal aspects by investigating viability of commercially available solar panels as a sustainable energy source for IoT applications. A novel stochastic computation model is introduced to characterize the unpredictability of solar irradiance across three different time regions of the day. By employing distribution fitting models, the proposed computation model accurately determines the required solar panel size in cm<inline-formula><tex-math>$^{2}$</tex-math></inline-formula> and panel cost in Indian Rupees for the sustainable operation of the IoT application. Further, the proposed model incorporates the assessment of outage and sustainability probabilities for user-specified solar panel size and cost. These insights are significant in settings where energy efficiency and sustainability are crucial. Numerical results are presented to validate the derived distribution models and performance metrics for sustainable IoT applications. The effectiveness and accuracy of the proposed model are validated by comparing results with baseline model.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 2","pages":"317-332"},"PeriodicalIF":3.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143769461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Solutions and Techniques for Internet of Things Integration in Combat Systems","authors":"Amirmohammad Pasdar;Nickolaos Koroniotis;Marwa Keshk;Nour Moustafa;Zahir Tari","doi":"10.1109/TSUSC.2024.3443256","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3443256","url":null,"abstract":"The Internet of Things (IoT) has enabled pervasive networking and multi-modal sensing, offering various services such as remote operations and augmenting existing processes. The military setting has increasingly and notably adopted IoT technologies, such as sensor-rich drones or autonomous vehicles, which provide military personnel with enhanced situational awareness, faster decision-making capabilities, and improved operational precision. However, integrating IoT into military systems introduces new security challenges due to increased connectivity and susceptibility to vulnerabilities. Cyberattacks on military IoT systems can have severe consequences, including operational disruptions and compromises of sensitive information. This article proposes a new perspective on examining threat models in IoT-enhanced combat systems, emphasising approaches for identifying threats, conducting vulnerability assessments, and suggesting countermeasures. It delves into the characteristics and structures of IoT-enhanced combat systems, exploring technical implementations and technologies. Additionally, it outlines five significant areas of focus, including blockchain, machine learning, game theory, protocols, and algorithms, to enhance understanding of IoT-enhanced combat systems. The insights gained from this analysis can inform the development of secure and resilient military IoT systems, ultimately enhancing the safety and effectiveness of military operations.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 2","pages":"345-365"},"PeriodicalIF":3.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143769463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Distributed Data-Driven and Machine Learning Method for High-Level Causal Analysis in Sustainable IoT Systems","authors":"Wangyang Yu;Jing Zhang;Lu Liu;Yuan Liu;Xiaojun Zhai;Ruhul Kabir Howlader","doi":"10.1109/TSUSC.2024.3441722","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3441722","url":null,"abstract":"A causal relationship forms when one event triggers another's change or occurrence. Causality helps to understand connections among events, explain phenomena, and facilitate better decision-making. In IoT systems, massive consumption of energy may lead to specific types of air pollution. There are causal relationships among air pollutants. Analyzing their interactions allows for targeted adjustments in energy use, like shifting to cleaner energy and cutting high-emission sources. This reduces air pollution and boosts energy sustainability, aiding sustainable development. This paper introduces a distributed data-driven machine learning method for high-level causal analysis (DMHC), which extracts general and high-level Complex Event Processing (CEP) rules from unlabeled data. CEP rules can capture the interactions among events and represent the causal relationships among them. DMHC deploys a two-layer LSTM attention mechanism model and decision tree algorithm to filter and label data, extracting general CEP rules. Afterward, it proceeds to generate event logs based on general rules with heuristic mining (HM), extracting high-level CEP rules that pertain to causal relationships. These high-level rules complement the extracted general rules and reflect the causal relationships among the general rules. The proposed high-level methodology is validated using a real air quality dataset.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 2","pages":"274-286"},"PeriodicalIF":3.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143769426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Restoration-Aware Sleep Scheduling Framework in Energy Harvesting Internet of Things: A Deep Reinforcement Learning Approach","authors":"Haneul Ko;Hongrok Choi;Sangheon Pack","doi":"10.1109/TSUSC.2024.3442918","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3442918","url":null,"abstract":"Energy harvesting Internet of Things (IoT) devices are capable of sensing only intermittent and coarse-grained data due to sleep scheduling; therefore, we develop a restoration mechanism (e.g., probabilistic matrix factorization (PMF)) that exploits spatial and temporal correlations of data to build up an environmental monitoring system. However, even with a well-designed restoration mechanism, a high accuracy of the environmental map cannot be achieved if an appropriate sleep scheduling of IoT devices is not incorporated (e.g., if IoT devices at necessary locations are in sleep mode or are not involved in restoration due to their insufficient energy). In this paper, we propose a restoration-aware sleep scheduling (RASS) framework for energy harvesting IoT-based environmental monitoring systems. Here, RASS involves customized deep reinforcement learning (DRL) considering the restoration mechanism, using which the controller performs sleep scheduling to achieve high accuracy of the restored environmental map while avoiding energy outage of IoT devices. The evaluation results demonstrate that RASS can achieve an environmental map with 5% or a lower difference from the actual values and fair energy consumption among IoT devices.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 1","pages":"190-198"},"PeriodicalIF":3.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143184141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}