IEEE Transactions on Network Science and Engineering最新文献

筛选
英文 中文
Reconfiguring Gene Regulatory Neural Network Computing for Regulating Biofilm Formation 基因调控神经网络计算在生物膜形成调控中的应用
IF 6.7 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2025-03-31 DOI: 10.1109/TNSE.2025.3555962
Adrian Ratwatte;Samitha Somathilaka;Sasitharan Balasubramaniam;Megan Taggart;Keerthi M. Nair;Alan O'Riordan;James Dooley
{"title":"Reconfiguring Gene Regulatory Neural Network Computing for Regulating Biofilm Formation","authors":"Adrian Ratwatte;Samitha Somathilaka;Sasitharan Balasubramaniam;Megan Taggart;Keerthi M. Nair;Alan O'Riordan;James Dooley","doi":"10.1109/TNSE.2025.3555962","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3555962","url":null,"abstract":"The Gene Regulatory Network (GRN) in biological cells orchestrates essential functions for adaptation and survival in diverse environments, drawing on structural similarities with the Artificial Neural Network (ANN), which can be transformed into a Gene Regulatory Neural Network (GRNN). This transformation enables exploration of their natural computing capabilities regarding network reconfigurability and controllability, facilitating dynamic adjustments of gene-gene interaction weights to regulate biological processes. In this paper, we present a control-theoretic model for the GRNN that determines optimal chemical input concentrations, steering the GRNN towards desired weight configurations using the Linear Quadratic Regulator (LQR) approach. This method enhances network robustness by balancing stability and reconfigurability, ensuring responsive weight adjustments in dynamic environments. We develop mathematical models to identify critical genes using a Continuous-Time Markov Chain (CTMC) and derive temporal weight configurations, providing insights into the system's reconfiguration dynamics, while also quantifying stability and reconfigurability. Our findings demonstrate the effectiveness of the control model in mitigating <italic>Clostridioides difficile</i> biofilm formation, outperforming sub-optimal and stochastic perturbation inputs, and highlighting the importance of determining optimal inputs for robust network behavior across diverse complexities.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 4","pages":"3002-3014"},"PeriodicalIF":6.7,"publicationDate":"2025-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144492475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Certificateless Blockchain-Assisted Authentication and Key Agreement Protocol for Internet of Drones 无人机互联网增强无证书区块链辅助认证与密钥协商协议
IF 6.7 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2025-03-31 DOI: 10.1109/TNSE.2025.3556400
Jintian Zhang;Xingxing Chen;Qingfeng Cheng;Xiaofeng Chen;Xiangyang Luo
{"title":"An Enhanced Certificateless Blockchain-Assisted Authentication and Key Agreement Protocol for Internet of Drones","authors":"Jintian Zhang;Xingxing Chen;Qingfeng Cheng;Xiaofeng Chen;Xiangyang Luo","doi":"10.1109/TNSE.2025.3556400","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3556400","url":null,"abstract":"The consumer drone market has grown rapidly, making it necessary to integrate drones with the internet to explore low-altitude areas. Internet of Drones (IoD) offers a more potent data stream to connect the global Big Data system, it will also have to deal with the issue of exposure and malicious use of flight trajectory, communication data, and identity information when a cyber attacker unlawfully eavesdrops, gains access to, attacks, or even takes control of drones. Numerous authentication protocols have been developed for the IoD context in order to solve the aforementioned issues. Ali et al. provide a cross-domain communication scheme (henceforth known as the AJ protocol) in IoD environment by utilizing blockchain-assisted authentication to improve the security of IoD data transmission. Nevertheless, this scheme is vulnerable to key compromise impersonation attack and fails to achieve the crucial security attribute of anonymity. In order to address the aforementioned security concerns, we develop an enhanced certificateless authentication and key agreement (CL-AKA) protocol in IoD environment, based on blockchain technology and Chebyshev chaotic mapping. Our protocol can achieve necessary security attributes for IoD and withstand a variety of known attacks, as demonstrated by proof of security under the eCK model and automated validation by the Scyther tool. Additionally, our protocol performs better in terms of computation and communication overhead when compared to similar protocols to achieve lightweight anonymous authentication.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 4","pages":"3065-3081"},"PeriodicalIF":6.7,"publicationDate":"2025-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144492418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opinion Dynamics Considering Matthew Effect With Time Delays and Stubborn Influence in Social Networks 考虑时滞和顽固影响下马太效应的社会网络舆论动态
IF 6.7 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2025-03-31 DOI: 10.1109/TNSE.2025.3556379
Meng Li;Jinyuan Zhang;Long Jin
{"title":"Opinion Dynamics Considering Matthew Effect With Time Delays and Stubborn Influence in Social Networks","authors":"Meng Li;Jinyuan Zhang;Long Jin","doi":"10.1109/TNSE.2025.3556379","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3556379","url":null,"abstract":"In social networks, stubborn individuals are resistant to changing their opinions or positions, affecting the trend of opinion evolution. Communication among individuals inherently involves time delays, which could lead to instability in information dissemination between individuals. To address these gaps in existing works, a new Matthew effect with time delays and stubborn influence (METS) model is proposed. In this paper, stubbornness coefficients are introduced to quantify individuals' adherence to their initial opinions, and a new approach to assess the speed of opinion development is proposed. Additionally, the social network is modeled as a distributed communication system that incorporates time delays to depict the connections between opinions. Furthermore, the <inline-formula><tex-math>$k$</tex-math></inline-formula>-winners-take-all (<inline-formula><tex-math>$k$</tex-math></inline-formula>-WTA) operation is employed as the feedback mechanism of the model to differentiate the winners and losers within the Matthew effect. Then, a thorough analysis of the model's convergence and stability is provided. Besides, numerical experiments demonstrate the flexibility and practicality of the METS model. Finally, extensive simulations are conducted to examine the influence of individual stubbornness on the dynamics of opinion evolution.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 4","pages":"3082-3092"},"PeriodicalIF":6.7,"publicationDate":"2025-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144492407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Stackelberg Game Framework for Energy Internet System by Operator Approach 基于算子的能源互联网系统Stackelberg博弈框架
IF 6.7 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2025-03-28 DOI: 10.1109/TNSE.2025.3555604
Yue Chen;Peng Yi;Jinlong Lei;Xiangjun Li
{"title":"A Stackelberg Game Framework for Energy Internet System by Operator Approach","authors":"Yue Chen;Peng Yi;Jinlong Lei;Xiangjun Li","doi":"10.1109/TNSE.2025.3555604","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3555604","url":null,"abstract":"This paper proposes a Stackelberg game framework for managing an Energy Internet System that integratesrenewable energy generation, energy conversion, and energy trading. The system comprises hubs controlled by competing energy companies, incorporating both external energy trading and peer-to-peer energy exchanges. It involves multiple stakeholders whose decisions are interdependent, creating challenges in decision-making. To tackle these challenges, we propose a networked Stackelberg game framework with two main objectives. First, from the energy companies' perspective, the companies make decisions by considering strategic interactions with other companies while accounting for the best responses of passive consumers within peer-to-peer constraints. Second, from the consumer side, consumers adjust their decisions based on their observations of the companies' strategies. The framework adopts a hierarchical decision-making structure in which energy companies act as leaders, formulating strategies that anticipate consumer demand responses, while competing within a Nash game. Meanwhile, consumer clusters, managed by demand management centers, modify their energy usage based on an incentive price mechanism. To search for the equilibrium, we develop an operator-theoretic approach that combines implicit gradient methods with proximal operator splitting techniques, and prove its convergence. Numerical studies and simulations on a combined IEEE 37-bus and gas source model with multiple energy hubs validate the model's effectiveness and the efficiency of the proposed algorithms. The results demonstrate the operational efficiency and strategic stability of the system, emphasizing the advantages of active market participation for both energy companies and consumers.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 4","pages":"2942-2956"},"PeriodicalIF":6.7,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144492254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EMT: Extended Merkle Tree Structure for Inserted Data Redaction in Permissioned Blockchain 扩展的Merkle树结构在允许的bb0中插入数据编校
IF 6.7 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2025-03-28 DOI: 10.1109/TNSE.2025.3555979
Zihan Wu;Liangmin Wang;Xiaoyu Zhang;Xia Feng
{"title":"EMT: Extended Merkle Tree Structure for Inserted Data Redaction in Permissioned Blockchain","authors":"Zihan Wu;Liangmin Wang;Xiaoyu Zhang;Xia Feng","doi":"10.1109/TNSE.2025.3555979","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3555979","url":null,"abstract":"Inserted data redaction is an important and hot security topic for permissioned blockchain. However, existing redactable schemes have two problems: (i) <italic>Uncaptured Change:</i> Transaction-level redaction schemes modify both user-inserted data and system-generated transaction data, making it difficult to capture the changes in system-generated transactions data; (ii) <italic>Unexpected Spread:</i> When the redaction process deletes harmful data, the consensus process may take a long time, resulting in unexpected spread of harmful data. Instead of eliminating the influence of the harmful data, it promotes its spread. To tackle these problems, we propose an Extended Merkle Tree (EMT) structure for inserted data redaction in permissioned blockchain. EMT separates the system-generated transaction data from user-inserted data, ensuring that only the inserted data can be modified during redaction. Furthermore, we design an EMT-based blockchain ledger and develop a smart contract to implement the inserted data redaction. We prove that our redaction scheme preserves the core security features of blockchain and implements redaction operations in Hyperledger Fabric. The experimental results show that our EMT-based blockchain scheme is capable of redacting the harmful inserted data while incurring less than 5% overhead compared to current permissioned blockchains.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 4","pages":"3025-3038"},"PeriodicalIF":6.7,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144492424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Link-Centric Research on the Capability Resilience of Heterogeneous Information Combat Networks 以链路为中心的异构信息作战网络能力弹性研究
IF 6.7 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2025-03-28 DOI: 10.1109/TNSE.2025.3555384
Renjie Xu;Jiahao Liu;Jichao Li;Kewei Yang
{"title":"Link-Centric Research on the Capability Resilience of Heterogeneous Information Combat Networks","authors":"Renjie Xu;Jiahao Liu;Jichao Li;Kewei Yang","doi":"10.1109/TNSE.2025.3555384","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3555384","url":null,"abstract":"The combat system-of-systems (CSoS) in high-tech information warfare consists of multiple interconnected combat entities, which can be abstracted as a complex heterogeneous information combat network (HICN). Research on the capability resilience of a HICN is highly valuable for optimizing network structure, enhancing network survivability, and improving network security. Accordingly, this paper presents an integrated framework called HICN capability resilience framework based on network percolation (HICNCR) for assessing the capability resilience of HICN. Specifically, first, we establish a HICN model of a CSoS, taking into account the heterogeneity of entities as well as the diversity and weight of information flow. Based on this, we present an index called operational capability resilience index (OCRI) to evaluate the capability resilience of HICN. This index directly identifies which CSoS is more resilient when facing identical operational tasks, while simultaneously considering both network structure and function. Finally, we conduct extensive experiments on a military case to demonstrate the effectiveness and superiority of the proposed HICNCR. Compared to natural connectivity and other resilience metrics, it provides more valuable insights to inform the operation and design of more resilient CSoS.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 4","pages":"2921-2931"},"PeriodicalIF":6.7,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144492215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structurally Controllable and Observable Optimal Disjoint Decomposition of Complex Systems: An Optimization Framework 复杂系统结构可控和可观察的最优不相交分解:一个优化框架
IF 6.7 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2025-03-28 DOI: 10.1109/TNSE.2025.3556365
Sahar Maleki;Mehdi Rahmani;Hassan Zarabadipour
{"title":"Structurally Controllable and Observable Optimal Disjoint Decomposition of Complex Systems: An Optimization Framework","authors":"Sahar Maleki;Mehdi Rahmani;Hassan Zarabadipour","doi":"10.1109/TNSE.2025.3556365","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3556365","url":null,"abstract":"Decomposition of a dynamic complex system into smaller subsystems can significantly reduce the complexity and simplify the analysis, particularly in networked control design. This paper proposes a structurally controllable and observable optimal disjoint <inline-formula><tex-math>$varepsilon$</tex-math></inline-formula>-decomposition for complex systems. The methodology for this decomposition is conducted through the perspective of graph theory in conjunction with an optimization framework. To achieve this kind of decomposition, an optimization problem is first presented for the disjoint <inline-formula><tex-math>$varepsilon$</tex-math></inline-formula>-decomposition. Then, the suggested optimization problem is extended to address optimal disjoint <inline-formula><tex-math>$varepsilon$</tex-math></inline-formula>-decomposition. Next, the resultant decomposition is developed to fulfill the structural controllability and observability of the subsystems. Afterward, the recommended optimization problem undergoes modifications to account for structural perturbations. Finally, the performance and effectiveness of the decomposition approach are evaluated. The simulation results demonstrate that it successfully decomposes a complex system under structural perturbation into controllable and observable weakly coupled subsystems. Additionally, this method outperforms existing methods in terms of both methodology and specifications.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 4","pages":"3051-3064"},"PeriodicalIF":6.7,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144492429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heartbeat: Effective Access to Off-Path Cached Content in NDN 心跳:在NDN中有效访问非路径缓存内容
IF 6.7 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2025-03-28 DOI: 10.1109/TNSE.2025.3555743
Junseok Lee;Dohyung Kim
{"title":"Heartbeat: Effective Access to Off-Path Cached Content in NDN","authors":"Junseok Lee;Dohyung Kim","doi":"10.1109/TNSE.2025.3555743","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3555743","url":null,"abstract":"In Information-centric networking(ICN), content is distributed across network caches and accessed using content names instead of location identifiers. This characteristic effectively reduces network costs and latency, but the benefits vary greatly depending on how effectively user requests reach the target content in the cache. Existing literature suggests two approaches for accessing cached content: utilizing replicated requests and exchanging cache catalogs periodically. However, replicated requests can result in redundant data transfer, leading to bandwidth waste. The volatile nature of cached content can render the exchanged cache catalogs outdated, leading to access failure. Moreover, the cache catalog itself can consume a significant amount of bandwidth. To address these issues and implement efficient content access in ICN, we design a novel scheme called <italic>Heartbeat</i>. <italic>Heartbeat</i> disseminates information solely about newly inserted or relocated content with the lifetime carefully calculated, which enables sufficient utilization of cached content while preventing access failures caused by outdated information. We further minimize the overhead of <italic>Heartbeat</i> significantly using several enhancement strategies. Simulation studies conducted on ndnSIM demonstrate that employing <italic>Heartbeat</i> enables 45% more requests to be serviced from network caches, while reducing service latency and bandwidth consumption by up to 11% and 47% respectively, compared to comparative schemes.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 4","pages":"2974-2988"},"PeriodicalIF":6.7,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144492414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Distributed Impulsive Synchronization Control for Multi-Agent Systems Under Switching Deception Attacks on Dual Channels 双信道切换欺骗攻击下多智能体系统的自适应分布脉冲同步控制
IF 6.7 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2025-03-27 DOI: 10.1109/TNSE.2025.3554169
Jiangyan He;Xing Guo;Zili Chen;Jianlong Ren
{"title":"Adaptive Distributed Impulsive Synchronization Control for Multi-Agent Systems Under Switching Deception Attacks on Dual Channels","authors":"Jiangyan He;Xing Guo;Zili Chen;Jianlong Ren","doi":"10.1109/TNSE.2025.3554169","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3554169","url":null,"abstract":"The paper explores the mean-square bounded synchronization problem of leader-following multi-agent systems (LF-MASs) with the directed network under dual-channel stochastic switching deception attacks. Compared with previous studies, a new dual-channel deception attack mode is considered. In this new attack mode: 1) the deception attacks suffered by the sensor-controller channel are edge-based. 2) the sensor-controller channel and the controller-actuator channel are subjected to stochastic switching deception attacks by different deception signals at different impulse moments, and the stochastic switching manner on each channel obeys the Bernoulli distribution. To tackle this challenging problem, a novel adaptive and switching secure impulsive synchronization control protocol is proposed. In this new protocol, the agents receive false signals from their neighbors due to edge-based deception attacks on the sensor-controller channel. Further, some criteria have been obtained under the designed novel control protocol by applying linear matrix inequality technique, matrix analytic theory and Lyapunov stability theory. Finally, two examples are given to verify the obtained results.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 4","pages":"2797-2809"},"PeriodicalIF":6.7,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144492250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Event-Triggered Time Synchronization With Varying Skews for Wireless Sensor Networks Based on Average Consensus 基于平均一致性的无线传感器网络变偏差事件触发时间同步
IF 6.7 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2025-03-27 DOI: 10.1109/TNSE.2025.3555260
Heng Wang;Xiong Zhu;Xiaojiang Liu;Yan Zou;Ting Tan;Min Li
{"title":"Event-Triggered Time Synchronization With Varying Skews for Wireless Sensor Networks Based on Average Consensus","authors":"Heng Wang;Xiong Zhu;Xiaojiang Liu;Yan Zou;Ting Tan;Min Li","doi":"10.1109/TNSE.2025.3555260","DOIUrl":"https://doi.org/10.1109/TNSE.2025.3555260","url":null,"abstract":"Existing event-triggered consensus-based time synchronization algorithms are proposed under the ideal wireless sensor networks without communication delays and varying skews of clocks. Nevertheless, delays and varying skews have a serious impact on the accuracy and reliability of time synchronization. Considering a more practical and challenging scenario with the above uncertainties, we investigate the average-consensus-based time synchronization algorithm. Specifically, a new triggering policy based on the event-triggered node interactions mechanism is presented, giving a threshold to constrain communication overhead. Furthermore, a memory-efficient relative skew estimator is utilized to counteract the influence of communication delays, which reduces storage requirements while achieving highly accurate estimation. To guarantee convergence under time-varying clock skews, a proportional-integral consensus skew estimator is considered to make compensation for skews. In addition, the convergence analysis of the proposed algorithm is proved theoretically. Simulation results demonstrate the effectiveness of the proposed algorithm, meanwhile, our proposed algorithm outperforms other existing algorithms in terms of energy consumption.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 4","pages":"2895-2906"},"PeriodicalIF":6.7,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144492256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信