Next Article in Journal
Brain Complexity and Parametrization of Power Spectral Density in Children with Specific Language Impairment
Previous Article in Journal
Deep Hybrid Models: Infer and Plan in a Dynamic World
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Transmitting Status Updates on Infinite Capacity Systems with Eavesdropper: Freshness Advantage of Legitimate Receiver

by
Jixiang Zhang
1,2,
Han Xu
3,
Anqi Zheng
1,2,
Daming Cao
4,
Yinfei Xu
3 and
Chengyu Lin
1,2,*
1
School of IoT Engineering, Wuxi Taihu University, Wuxi 214063, China
2
Provincial Key Laboratory of Intelligent Internet of Things Technology and Applications, Wuxi 214063, China
3
School of Information Science and Engineering, Southeast University, Nanjing 210096, China
4
School of Electrical and Information Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(6), 571; https://doi.org/10.3390/e27060571
Submission received: 18 April 2025 / Revised: 18 May 2025 / Accepted: 23 May 2025 / Published: 27 May 2025
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
We consider the scenario in which the source sends status updates, or packets, to the receiver through an infinite capacity transmitter, where the transmitted packets are subject to potential illegal eavesdropping. Time is discretized into identical time slots. In recent years, the age of information (AoI) metric, which was defined as the time has elapsed since the generation instant of the latest received packet, has been widely applied to characterize the freshness of obtained packets. Due to the presence of eavesdroppers, some packets may be eavesdropped during their transmissions, causing information leakages. To assess an infinite-capacity system’s performance of securely transmitting status updates, in this paper, we define an AoI-related metric called the freshness advantage of the legitimate receiver, F, to be average instantaneous gap between eavesdropper’s and legitimate receiver’s AoI. For arbitrarily distributed packet interarrival times, and assuming that in each time slot with probabilities γ d , γ E , the transmitted packet is received by the legitimate receiver and the eavesdropper, we derive the explicit formula of F. The concise expression shows that F is fully determined by the average interarrival time and the ratio of γ d to γ E . For special cases where the interarrival time follows geometric distributions, we first determine the explicit distribution of instantaneous AoI gap. Then, given γ d and γ E , we derive the optimal packet generation rate p that minimizes the combined performance Q, which is constructed as the average AoI minus the freshness advantage F. When imposing timeliness and security constraints at the same time, the feasible regions of p and γ d such that both two required performances can be satisfied are depicted and discussed. Finally, we investigate the impacts of different parameters on F and show the tradeoffs between timeliness performance and security performance through numerical simulations.

1. Introduction

Timely transmitting information plays an important role in the Internet of Things (IoT) applications and modern communication systems. In various applications on IoT networks, real-time transmission ensures the immediacy and accuracy of data between devices, which is crucial for fields such as autonomous driving, intelligent healthcare, and smart cities. For example, traffic monitoring systems in smart cities need to upload real-time traffic data to adjust traffic signals and route planning in a timely manner, which enhances traffic efficiency and safety. In modern communication systems such as 5G/6G systems, real-time transmission is also very important to ensuring normal system operations and improving user experience. It enables participants to interact in real-time without waiting for data transmission, especially for situations where quick responses are required.
In paper [1], Kaul and Yates et al. modeled a status updating system and proposed the age of information (AoI) metric to characterize the freshness of packets when they arrive at the receiver side. Since then, for different kinds of queues, stationary average AoI and its distribution property of various status updating systems has been investigated by researchers from multiple communities. According to transmission system’s structure, the average AoI of some basic systems, for example, system with M/M/1/1, M/M/1/2, M/M/1/ queues and their variants, were determined in works [2,3,4,5]. Then, age analysis was extended to more general status updating systems who has multiple source nodes and/or transmitters. To model multiple access situations in network communications, in papers [6,7,8], the authors considered a transmission scenario where multiple sources communicate with the receiver through one common transmitter. Assuming that the system applies different service disciplines, such as First-Come First-Serve (FCFS), Last-Come First-Serve (LCFS) with/without packet preemption, average AoI of each source was obtained. On the other hand, considering different control schemes such as priority strategy and packet deadline policy, each source’s average AoI in multi-source status updating systems was studied in works [9,10,11,12,13,14]. For systems with several parallel servers which model packet transmissions via multiple paths, characterizing AoI performance is more complex. Multi-path transmission makes it difficult to analyze AoI evolutions, as packets may not arrive at the receiver in chronological order that they were generated at the source. AoI of multi-server system was investigated in works [15,16,17]. AoI analysis reaches its peak when discussing average version age in a node of gossip networks. Timely transmitting status updates on gossip network was first studied by Yates in [18,19] and was extended by Buyukates and Ulukus et al. in subsequent works [20,21,22,23]. Apart from the above works, as an information freshness metric, AoI was considered in many resource scheduling and communication system design problems as well, for example, in papers [24,25,26,27,28,29,30]. Different from analyzing AoI in continuous time systems, the mean and the distribution properties of discrete-time AoI have also received significant attention in recent years. Studies considering discrete time AoI include [31,32,33,34], as well as our works in [35,36,37,38].
Recently, the issue of securely transmitting packets in real-time communication scenarios has attracted the attention of many researchers. Yang [39,40] considered a classical three-node wiretap channel. Assuming that there exists an eavesdropper, the author discussed transmission security perfomance of the system when the packets are transmitted based on a short-packet permutation-based protocol. Yang defined average secrecy margin to be a transmission security metric, which denotes the average area of a random region enclosed by AoI’s sample path and the time axis, from the instant that the legitimate receiver obtains a packet to the instant that the eavesdropper obtains it. A larger average secrecy margin means the transmission security of the system is higher, because the larger the region represented by average secrecy margin, the more likely a legitimate receiver will obtain the transmitted packet earlier than the eavesdropper. Within the paper, the author derived the optimal packet length such that the average secrecy margin is maximized. In reference [41], Wang and Chen et al. considered the same communication scenario. Unlike Yang’s work, they defined the secrecy age as instantaneous difference between eavesdropper’s AoI and legitimate receiver’s AoI, and secrecy age outage probability as the probability that the real time gap between two AoIs is less than some given threshold. On discrete-time communication models, for stationary random and threshold based packet generation strategies, the authors determined the accurate expressions of average secrecy age and average secrecy age outage probability of three-node wiretap transmission system. By jointly optimizing two security metrics, they derived the optimal packet generation rate that maximizes the security performance. Within the framework of AoI, simultaneously characterizing and designing transmission timeliness and transmission security has become a new research hotspot. In paper [42], the authors analyzed the average age of secure packets. They ignored all of insecure packets when those packets arrive at the receiver. The paper [43] considered the situation in which the eavesdropper is an energy harvesting node, and the authors discussed the optimal transmission strategy for minimizing average age of secure information (AoSI). Apart from these, from the perspective of secure transmission at physical layer, using Wyner secrecy capacity [44] as transmission security metric, simultaneously designing timeliness and security of some communication systems have been discussed in many works, for example, in [45,46,47,48] and some cited references of those works. In addition, securely transmitting data against the eavesdroppers was also investigated in intelligent transmission systems, such as mmWave vehicular networks, in papers [49,50].
In this paper, we characterize the performance of infinite capacity systems securely transmitting packets within the framework of AoI. We propose freshness advantage F of legitimate receiver as the metric to assess system’s transmission security. Similar to [41], freshness advantage F is constructed to be average instantaneous gap between eavesdropper’s and legitimate receiver’s AoI. However, we point out that the security metric proposed in paper [41] requires that the instantaneous AoI of eavesdropper must be greater than that of legitimate receiver, meaning that the constructed security metric takes only positive values (so does Yang’s work [39,40]). In contrast, we allow the instantaneous AoI of eavesdropper to be smaller than that of legitimate receiver, which implies that in some cases our security metric F can take negative values. Through the general formula derived in this paper, we will demonstrate that taking negative security performance into consideration will yield more comprehensive results. Another method of constructing transmission security metric is calculating the ratio of eavesdropper’s and legitimate’s AoI. Requiring that the eavesdropper’s AoI is less than certain threshold, from the perspective of game theory maximization of this ratio was investigated in paper [51]. By a Bergson social welfare framework, the author solved the problem of finding the optimal generation rate as a function of probability of data capture by the eavesdropper.
Another major difference between this work and the existing literatures lies at that we consider infinite capacity status updating systems, while those works discussed bufferless or finite capacity systems. The reason for considering infinite capacity transmission systems are twofold. Firstly, in some practical scenarios, assuming that the system has infinite capacity provides a simple modeling method. For example, when discussing timely source coding problem in [52,53], Yates et al assumed that the transmitter has an infinite capacity buffer such that all of packets that have not been transmitted can be stored in the system. On the other hand, the performance of infinite capacity systems can serve as a reference for the performance of finite capacity systems. For example, in paper [14] the average AoI of any finite capacity system with packet deadline will not be greater than that of an infinite capacity system with the same packet deadline. Therefore, the known average AoI of infinite capacity system provides an upper bound on the average AoI of any finite capacity systems.
Within the framework of AoI, assuming that there exists a passive eavesdropper, this paper considers the performance of infinite capacity status updating system securely transmitting packets. We define freshness advantage F to evaluate the transmission security, which is equal to average instantaneous gap between eavesdropper’s AoI and legitimate receiver’s AoI. The main contributions of the paper include the following aspects:
  • For arbitrary packet arrival processes, we derive the explicit expression of freshness advantage F and prove that F is completely determined by average packet interarrival time and the ratio of γ d and γ E ;
  • Assuming that packet arrivals form the Bernoulli ( p ) process, we determine the specific distribution of instantaneous gap between two AoIs;
  • By constructing the combined performance Q to be average AoI minus F, we derive the optimal packet generation rate p such that Q is minimized, such that investigating the tradeoffs between the timeliness and security;
  • In case of Bernoulli packet arrivals, and assuming that timeliness and security are both limited, we depict and analyze the feasible region composed of p and γ d .
The rest of the paper is organized as follows. In Section 2, we introduce the model of considered transmission system and define the proposed security metric, that is, the freshness advantage of legitimate receiver F. In Section 3, we first derive the explicit formula of F, then calculate the specific distribution of age gap g when packet arrivals form the Bernoulli ( p ) process. Joint optimization of timeliness and security are investigated in Section 4, where we define the combined performance metric Q as average AoI minus F and derive the optimal p such that Q is minimized. In addition, under the condition that both average AoI and F are limited, we also depict and discuss the feasible region composed of p and γ d in Section 4. Numerical simulations are provided in Section 5 to demonstrate the results obtained in the paper. In particular, we draw the average AoI-F curves to demonstrate the direct tradeoffs between two performances. We finally conclude the paper and discuss some possible further work in Section 6.

2. System Model and Problem Formulation

We depict the model of an infinite capacity status updating system in Figure 1. The transmission model and considered problem are explained as follows.
Considering the scenario where the source node s sends packets to the receiver d through an infinite capacity transmitter. Denote Y to be i.i.d. interarrival time between two successively generated packets. Following the First Come-First Serve (FCFS) discipline, these packets are delivered to the receiver d. Assuming that the transmitter has infinite capacity so that all of newly arrived packets that are not served in time can be stored in the buffer. At receiver side, age of information (AoI) process describes the evolution of difference between current time and the generation instant of the latest obtained packet. The value of AoI increases 1 after each time slot if no newer packet is obtained at the receiver. On the contrary, every time when a fresher packet, who has smaller age, arrives to d, the value of AoI decreases to instantaneous age of that packet, and we call these age reduction operations as AoI updatings. Let Δ ( k ) be the value of AoI process at the kth time slot, we can describe above AoI evolutions mathematically by
Δ ( k + 1 ) = Δ ( k ) + 1 , d obtains no packet Δ ( k ) + 1 Y , d obtains a newer packet
where Y is interarrival time between the last obtained packet and the current arrived one. Random variable Y characterizes the behavior of packet generations or packet arrivals. For the case where packet generations form a Bernoulli process, inter-arrival time Y follows an i.i.d. geometric distribution. Since the transmitter has infinite capacity, notation Y in Equation (1) is the same as that Y we depict in Figure 1. Stationary average AoI and other AoI-related quantities, such as average peak AoI and AoI-violation probability, have been widely used to characterize status updating system’s timeliness of transmitting packets. Apparently, a lower average AoI implies that the system has better transmission timeliness.
During packet transmissions, it is assumed that a passive eavesdropper E attempts to obtain the packets and steal the contained information illegally. Due to signal fadings and the unreliability of wireless channels, in the considered model we assume that in each time slot, a transmitted packet is obtained at legitimate receiver with probability γ d and the successful eavesdoppering probability at E is equal to γ E . In general cases, we have γ d > γ E , that is, the probability of transmitting a packet to legitimate receiver is higher than that of being eavesdropped.
In status updating systems, notice that as long as a packet is successfully sent to the receiver, the source will not transmit this packet again. Therefore, in order to improve the security of transmitting status updates, we should try to make legitimate receiver obtain the packet earlier than eavesdropper (Strictly speaking, requiring legitimate receiver obtaining packets before eavesdropper cannot guarantee that the transmitted status updates are absolutely secure. Imagining that in general network communication scenarios, the same message may be transmitted to the receiver through multiple paths. When eavesdropper gets a packet later than legitimate receiver from one path, and the same packet is the newest one that legitimate receiver currently owns, which has not been updated by fresher packets from the source. In this case, legitimate receiver’s packet becomes insecure. The current paper only discusses point-to-point transmission scenarios. Since a packet is never retransmitted once it is obtained by legitimate receiver, thus as long as a packet is transmitted to legitimate receiver earlier than eavesdropper, in point-to-point communication scenarios, this packet is absolutely secure. Those more general network communication situations and AoI-based transmission security will be interesting topics for future research). Applying AoI metric, we define freshness advantage F of legitimate receiver as the long-term average gap between instantaneous AoI of eavesdropper and that of legitimate receiver, i.e.,
F = lim K 1 K k = 1 K n E ( k ) n d ( k )
= E [ n E n d ]
which is used to measure the transmission security of status updating systems. Notice that in Figure 1, we have represented this instantaneous gap with g, that is, we denote g = n E n d . In obtaining (3), we have assumed that the evolution process of two AoIs’ gap is ergodic.
In following sections, we will derive the explicit formula of F for infinite capacity status updating system, investigate how different system parameters affect F, and discuss the trade-offs between transmission timeliness and transmission security, which are represented by average AoI and F.

3. Freshness Advantage of Legitimate Receiver of Infinite Capacity Status Updating Systems

By constructing a two-dimensional random process to simultaneously describe the evolutions of AoI and the age of served packet, we have derived the stationary distribution and the mean of infinite capacity system’s AoI in previous work [36]. Taking eavesdropping into consideration, of course it is feasible to characterize the evolutions of instantaneous gap g = n E n d , if we define a third-dimensional process, say { ( n E , k , n d , k , m k ) : k N } , to track random transfers of two AoIs and age of transmitted packet m at the same time. However, it turns out that using three-dimensional stochastic process involves a significant amount of computation, making the problem more complex. In the following, we will show that characterizing the random gap itself is actually simpler, and it is sufficient to use a one-dimensional process.

3.1. Freshness Advantage in General Packet Arrival Process

In describing random transfers of age gap g, we use the assumption that the server is never empty. That is, when current packet completes its transmission, there always exists some new packets in the buffer such that the server can continue working. We point out that this assumption is reasonable, because it is unnecessary to consider the time period without packet transmission when characterizing transmission security of a system.
Define two binary random variables B d , B E to indicate in a time slot, if the transmitted packet is obtained by the receiver and the eavesdropper. Dividing into three cases, i.e., g > 0 , g = 0 , and g < 0 , we summarize the random transfers of age gap g in Table 1 and explain them as follows.
Notice that as long as the packets owned by legitimate receiver and the eavesdropper do not change, i.e., neither of them are updated by fresher packets from the source, the difference between two AoIs remains unchanged. This is because as time slot passes, both of two AoIs increase synchronously. Therefore, age gap evolution depends entirely on the situations that the legitimate receiver and the eavesdropper obtain the packets. According to different realizations of B d , B E , it divides into four cases. Firstly, we consider two simple situations. If B d = B E = 0 , which means neither of receiver and the eavesdropper obtain the packet, then g is unchanged. While if B d = B E = 1 , indicating that both of two nodes receive the transmitted packet, in this case g changes to zero become the receiver and the eavesdropper obtain the same packet. Next, assume that B d = 1 and B E = 0 . It represents that the legitimate receiver obtains the packet but the eavesdropper does not. At this time, within the age gap g = n E n d , n d decreases to the age of newly received packet, thus g increases and the random increment is exactly equal to interarrival time Y. For last case of B d = 0 , B E = 1 , that is the eavesdropper obtains the packet while the legitimate receiver has not. In this case, for age gap g = n E n d , n E is reduced to new packet’s age. It sees that g decreases to some negative values depending on different realizations of Y, because the eavesdropper obtains a newer packet that has not been transmitted to legitimate receiver, causing n E < n d . Starting from a negative g (notice that a negative g only occurs when eavesdropper obtains the transmitted packet earlier than legitimate receiver, thus when determining random transfers from negative g’s, we only need to consider B d ), for the case of B d = 0 , g does not change, since the packets owned at both nodes are not updated. Until the legitimate receiver obtains the packet that has been received by the eavesdropper, g returns to zero.
Remark 1.
After describing state transfers of age gap g, now we explain why the assumption that the server is never empty is necessary. In the cases where a packet is successfully transmitted to the receiver and there are no packets in transmitter’s buffer, the server will become idle. During the period when the server is waiting for next new packet, age gap g = n E n d remains unchanged because the packets owned by legitimate receiver and eavesdropper will not be updated, and the instantaneous age of these packets increases synchronously. Within these idle periods, the state transfer described in Table 1 is actually paused and restarts until the next new packet enters the server. It shows that the existence of server idle periods makes the random state transfers in Table 1 not continuous, but intermittent. When calculating time average g, g will also be averaged over these idle periods. However, characterizing the accurate distribution properties of these idle periods is not easy. Therefore, assuming that the server is never empty simplifies the calculation of average age gap, i.e., freshness advantage F. At the same time, from the perspective of practical applications, we point out that it is unnecessary to consider the time period during which no packets are transmitted in characterizing the transmission security of a communication system.
After long time evolutions, assuming that age gap process reaches steady state. For each g Z , define π g as corresponding stationary probability. From random transfers and their transition probabilities given in Table 1, we establish follwoing stationary equations.
π g = π g ( 1 γ d ) ( 1 γ E ) + π 0 γ d ( 1 γ E ) Pr { Y = g } + k = 1 g 1 π k γ d ( 1 γ E ) Pr { Y = g k } ( g 2 ) π 1 = π 1 ( 1 γ d ) ( 1 γ E ) + π 0 γ d ( 1 γ E ) Pr { Y = 1 } π 0 = π 0 [ ( 1 γ d ) ( 1 γ E ) + γ d γ E ] + j = 1 π j γ d + k = 1 + π k γ d γ E π g = π g ( 1 γ d ) + π 0 ( 1 γ d ) γ E Pr { Y = | g | } + k = 1 + π k ( 1 γ d ) γ E Pr { Y = | g | } ( g 1 )
Each equation in (4) shows that under the corresponding conditions, the state on the left side can be transferred to from those states on the right side.
In following paragraphs, we derive the general formula of freshness advantage F using stationary Equations (4). According to its definition, we have that
F = g = + g π g = g = 1 g π g + g = 1 + g π g = β + ( 1 ) β ( 1 )
In Equation (5), for 0 < z 1 we define
β + ( z ) = g = 1 + z g π g , β ( z ) = g = 1 z | g | π g
and β + ( 1 ) , β ( 1 ) are their derivatives at point z = 1 . Both functions are determined in following Lemma 1.
Lemma 1.
Functions β + ( z ) and β ( z ) are derived as
β + ( z ) = π 0 γ d ( 1 γ E ) Y ( z ) 1 ( 1 γ d ) ( 1 γ E ) γ d ( 1 γ E ) Y ( z )
β ( z ) = ( 1 γ d ) γ E Y ( z ) 1 ( 1 γ d ) ( 1 γ E )
in which Y ( z ) = j = 1 z j Pr { Y = j } is probability generation function (PGF) of Y, and π 0 is determined to be
π 0 = γ d γ E [ 1 ( 1 γ d ) ( 1 γ E ) ] 2
Notice that π 0 is independent of Y, i.e., packet arrival process.
Proof. 
Lemma 1 is proved in Appendix A. □
Using the results given in Lemma 1, we calculate β + ( 1 ) and β ( 1 ) as follows. Firstly, Equation (7) shows that
β + ( z ) 1 ( 1 γ d ) ( 1 γ E ) γ d ( 1 γ E ) Y ( z ) = π 0 γ d ( 1 γ E ) Y ( z )
Taking derivative of z in both sides, then letting z = 1 yields
β + ( 1 ) γ E β + ( 1 ) γ d ( 1 γ E ) E [ Y ] = π 0 γ d ( 1 γ E ) E [ Y ]
where Y ( 1 ) = E [ Y ] is obtained from its definition. From Equation (11) we solve that
β + ( 1 ) = π 0 + β + ( 1 ) γ d ( 1 γ E ) E [ Y ] γ E
= γ d 2 ( 1 γ E ) E [ Y ] γ E [ 1 ( 1 γ d ) ( 1 γ E ) ]
in which
π 0 + β + ( 1 ) = γ d 1 ( 1 γ d ) ( 1 γ E )
is obtained in Appendix A in Equation (A12).
Similarly, it is easy to obtain β ( 1 ) from (8) as
β ( 1 ) = ( 1 γ d ) γ E E [ Y ] 1 ( 1 γ d ) ( 1 γ E )
Applying above results, we derive the explicit expression of F in Theorem 1.
Theorem 1.
Assuming that there exists passive eavesdroppers. When transmitting packets through an infinite capacity status updating system, the freshness advantage F of legitimate receiver is determined as
F = E [ Y ] γ d γ E 1
where Y is packet interarrival time, γ d , γ E are success probabilities of transmitting one packet to legitimate receiver and eavesdropper in a time slot.
Proof. 
Substituting (13) and (15) into (5), we have
F = β + ( 1 ) β ( 1 )
= E [ Y ] γ d 2 ( 1 γ E ) ( 1 γ d ) γ E 2 γ E [ 1 ( 1 γ d ) ( 1 γ E ) ]
= E [ Y ] ( γ d + γ E γ d γ E ) ( γ d γ E ) γ E [ 1 ( 1 γ d ) ( 1 γ E ) ]
= E [ Y ] γ d γ E 1
This completes the proof of Theorem 1. □
For Theorem 1, we provide following three aspects discussion.
Remark 2.
Firstly, the surprisingly concise expression (16) indicates that when transmitting packets through an infinite capacity system, the freshness advantage of legitimate receiver over eavesdropper is fully determined by average packet interarrival time and the ratio γ d / γ E , and γ d / γ E > 1 serves as the sufficient and necessary condition such that F > 0 . At the same time, it shows that F can be unbounded as E [ Y ] or γ d / γ E tends to be infinite. Of course, this is unrealistic. When designing practical transmission systems, a very large E [ Y ] will deteriorate average AoI performance achieved at the receiver, meanwhile, increasing the ratio γ d / γ E requires the transmitter to pay greater emission energy. All of these demonstrate that there are certain trade-offs among transmission security, transmission timeliness, and energy efficiency when sending packets on infinite capacity status updating systems.
Secondly, notice that Equations (13) and (15) represent average age gaps obtained by calculating positive and negative g’s. Non-ignorable negative part (15) indicates that it is necessary to take into consideration those negative g’s, i.e., negative security performance, when evaluating the transmission security of status updating systems. Therefore, previous works [40,41] who considered only the positive part where g = n E n d > 0 , and designing optimal transmission policies based on positive security metrics may not truly achieve optimal performance. It sees from (13) and (15) that β + ( 1 ) and β ( 1 ) are proportional to E [ Y ] , thus when reducing packet generation rate to increase E [ Y ] , both of positive and negetive parts of security metric are improved. Applying the general Formula (16) and infinite capacity system’s average AoI derived in previous work [36], transmission security and transmission timeliness will be jointly optimized in Section 4.
At last, it sees that the general expression of F, especially in Equations (17) and (18), demonstrate the symmetry of average age gap between eavesdropper and legitimate receiver with respect to γ d and γ E . This symmetry is determined by the symmetrical position of two nodes. We speculate that this symmetry will still exist in other status updating systems, for example, in bufferless systems and finite capacity systems.

3.2. Age Gap g in Bernoulli Arrival Process Case

In Section 3.1, assuming that Y follows an arbitrary distribution, we have derived the general Formula (16) for infinite capacity system’s freshness advantage. In special case of Bernoulli arrival process, the accurate distribution of instantaneous age gap g is determined in this subsection.
Let Y be a geometric random variable, that is,
Pr { Y = j } = ( 1 p ) j 1 p ( j 1 )
where p is the probability that the source node generates a new packet in each time slot. In this case, we rewrite the stationary Equations (4) as follows.
π g = π g ( 1 γ d ) ( 1 γ E ) + p γ d ( 1 γ E ) k = 0 g 1 π k ( 1 p ) g k 1 ( g 1 ) π 0 = π 0 [ ( 1 γ d ) ( 1 γ E ) + γ d γ E ] + γ d j = 1 π j + γ d γ E k = 1 + π k π g = π g ( 1 γ d ) + p ( 1 γ d ) γ E k = 0 + π k ( 1 p ) | g | 1 ( g 1 )
All of stationary probabilities π g , g Z are fully determined by solving Equations (21). We state the obtained results in following Theorem 2.
Theorem 2.
Assuming that packet interarrival time Y follows the geometric distribution with arriving rate p. In this case, the instantaneous age gap g = n E n d is distributed according to following equations. For k 1 ,
Pr { g = k } = p γ d 2 γ E ( 1 γ E ) 1 p γ E 1 ( 1 γ d ) ( 1 γ E ) k 1 [ 1 ( 1 γ d ) ( 1 γ E ) ] 3
and,
Pr { g = 0 } = γ d γ E [ 1 ( 1 γ d ) ( 1 γ E ) ] 2
In addition, for each k 1 ,
Pr { g = k } = p ( 1 γ d ) γ E ( 1 p ) | k | 1 1 ( 1 γ d ) ( 1 γ E )
Notice that Pr { g = 0 } is independent of Y, such that for any packet arrival processes, Pr { g = 0 } is always determined by Equation (23).
Proof. 
Directly from the last row of (21), we obtain that for g 1 ,
π g = p ( 1 γ d ) γ E k = 0 + π k ( 1 p ) | g | 1 γ d
In Equation (A12), we have obtained that
k = 0 + π k = γ d 1 ( 1 γ d ) ( 1 γ E )
which relies only on γ d and γ E , thus also holds for geometric Y case. Substituting (A12) into (25) gives that
π g = p ( 1 γ d ) γ E ( 1 p ) | g | 1 1 ( 1 γ d ) ( 1 γ E ) ( g 1 )
Similarly, notice that in (A13), we determine that
π 0 = γ d γ E [ 1 ( 1 γ d ) ( 1 γ E ) ] 2
This is true for all the cases where Y follows an arbitrary distribution. Finally, from the first row of (21), we have that for g 1 ,
[ 1 ( 1 γ d ) ( 1 γ E ) ] p γ d ( 1 γ E ) π g = k = 0 g 1 π k ( 1 p ) g k 1
Do once interation yields
[ 1 ( 1 γ d ) ( 1 γ E ) ] p γ d ( 1 γ E ) π g 1 = k = 0 g 2 π k ( 1 p ) g k 2
It is easy to calculate that
[ 1 ( 1 γ d ) ( 1 γ E ) ] p γ d ( 1 γ E ) π g ( 1 p ) π g 1 = π g 1
from which we obtain
π g = 1 p γ E 1 ( 1 γ d ) ( 1 γ E ) π g 1
Using Equation (31) repeatedly, it shows that
π g = 1 p γ E 1 ( 1 γ d ) ( 1 γ E ) g 1 π 1
While letting g = 1 in the first row of (21), we have
π 1 = p γ d ( 1 γ E ) 1 ( 1 γ d ) ( 1 γ E ) π 0
= p γ d 2 γ E ( 1 γ E ) [ 1 ( 1 γ d ) ( 1 γ E ) ] 3
Substituting (34) into (32), we determine that for g 1 ,
π g = p γ d 2 γ E ( 1 γ E ) 1 p γ E 1 ( 1 γ d ) ( 1 γ E ) g 1 [ 1 ( 1 γ d ) ( 1 γ E ) ] 3
Finally, collecting Equations (26), (27) and (35), we have fully determined the distribution of age gap g. This completes the proof of Theorem 2. □
Since
γ E 1 ( 1 γ d ) ( 1 γ E ) = γ E γ E + γ d ( 1 γ E ) < 1
then we have that
1 p γ E 1 ( 1 γ d ) ( 1 γ E ) > 1 p
Equations (22) and (24) show that as | g | increases, negative age gap g decays faster than positive g. We will depict this distribution in numerical simulation section.

4. Joint Optimization of Transmission Timeliness and Security for Infinite Capacity Systems

In this Section, we discuss the issue of jointly designing transmission timeliness and transmission security when sending packets through infinite capacity systems. The timeliness is characterized by average AoI Δ ¯ d , which has been obtained in [36], while the transmission security is represented by freshness advantage F. We will consider following two problems. Firstly, in Section 4.1, for some α > 0 , we construct Q = Δ ¯ d α F as combined performance comprising both timeliness and security metric, and determine the optimal packet generation rate p such that Q is minimized. Secondly, under the conditions that Δ ¯ d and F are limited, in Section 4.2 the feasible region of ( p , γ d ) pairs are determined explicitly through numerical simulations, where we analyze and explain how these constrains affect the region composed of feasible p’s and γ d ’s.

4.1. Minimizing Combined Performance Metric Q

For Bernoulli packet arrivals, in work [36] we derived that average AoI of an infinite capacity system, Δ ¯ d , is equal to
Δ ¯ d = 1 γ d ( 1 γ d ) + 1 ρ d + ρ d 2 ( 1 γ d ) 1 ρ d
in which ρ d = p / γ d is discrete traffic intensity.
In order to optimize timeliness and security of transmitting packets simultaneously, we construct
Q = Δ ¯ d α F
= 1 γ d ( 1 γ d ) + 1 ρ d + ρ d 2 ( 1 γ d ) 1 ρ d α ρ d γ d γ d γ E 1
= ( 1 γ d ) + 1 α γ d γ E 1 1 ρ d + ρ d 2 ( 1 γ d ) 1 ρ d γ d
as weighted difference between average AoI Δ ¯ d and freshness advantage F, because we want to minimize average AoI and maximize freshness advantage, and indicate unequal emphasis levels on timeliness performance and security performance. In Equation (39), notice that E [ Y ] = 1 / p = 1 / ( ρ d γ d ) in the case of Bernoulli packet arrivals.
Theorem 3.
For given γ d and γ E , the optimal packet generation rate p that minimizes combined performance metric Q is determined as follows. If 1 α ( γ d / γ E 1 ) 1 γ d 0 , it shows that Q is increasing as p becomes large. Thus, p is equal to some minimal allowable packet generation rate p min . While for the cases of 1 α ( γ d / γ E 1 ) 1 γ d > 0 , p is determined to be
p = ρ d γ d
in which 0 < ρ d < 1 is the real root of equation
ρ d 1 ρ d 2 ρ d 2 = 1 α ( γ d / γ E 1 ) 1 γ d
Proof. 
Considering Q as the function of ρ d , then minimizing Q is the same as minimizing the numerator of (40), which is denoted as Q n . Calculating following derivative and making it greater than zero, we obtain that
Q n ( ρ d ) = 1 α γ d γ E 1 1 ρ d 2 + ( 1 γ d ) [ 2 ρ d ( 1 ρ d ) + ρ d 2 ] ( 1 ρ d ) 2 0
which is equivalent to
( 1 γ d ) [ 1 ( 1 ρ d ) 2 ] ( 1 ρ d ) 2 1 α ( γ d / γ E 1 ) ρ d 2 ρ d 1 ρ d 2 ρ d 2 1 α ( γ d / γ E 1 ) 1 γ d
Notice that Equation (44) is a quartic inequality, from which it is difficult to obtain the accurate expression of ρ d . Instead, we give following analysis.
Define function f ( ρ d ) as
f ( ρ d ) = ρ d 1 ρ d 2 ρ d 2
and denote
Γ = 1 α ( γ d / γ E 1 ) 1 γ d
we consider the intersection point of f ( ρ d ) ’s graph and the line of y = Γ .
Calculating the derivative of f ( ρ d ) or drawing its graph, it is easy to verify that f ( ρ d ) is monotonically increasing as ρ d becomes large, and f ( ρ d ) min = f ( 0 ) = 0 . Therefore, in the first case when Γ 0 , Q n ( ρ d ) 0 always holds true. This implies that Q n is increasing in all the range of 0 < ρ d < 1 , thus Q n , also Q, is minimized by setting ρ d to be the minimal allowable value ρ d , min . We denote the corresponding packet generation rate to be p min = ρ d , min γ d .
Consider the other case where Γ > 0 . Since f ( ρ d ) is an increasing function from 0, thus for any Γ > 0 , there exists the unique ρ d ( 0 , 1 ) such that
f ( ρ d ) = ρ d 1 ρ d 2 ρ d 2 = Γ
and in the range of ( 0 , ρ d ) , Q n , Q decreases, while for ρ d < ρ d < 1 , Q n , Q increases. Thus, p = ρ d γ d minimizes the combined metric Q. Since it is difficult to obtain the accurate expression of ρ d , in following Table 2 we list the numerical correspondence between optimal traffic intensity ρ d and Γ .
So far, summarize above discussions, we complete the proof of Theorem 3. □

4.2. Feasible p and γ d When Timeliness and Security Are Limited

For some given ξ , η > 0 , and assuming that Δ ¯ d ξ , F η , in the second part of this Section, we describe the feasible region composed of p and γ d . Notice that in designing transmission performance of status updating systems, both packet generation rate p and transmission success probability to legitimate receiver γ d are adjustable. We depict the situation that Δ ¯ d ξ , F η and mark some points in Figure 2a.
We consider the case where packet arrivals form a Bernoulli process. According to Equations (16) and (38), we require that
1 γ d ( 1 γ d ) + γ d p + p 2 ( 1 γ d ) γ d ( γ d p ) ξ
and
1 p γ d γ E 1 η
which represent transmission timeliness constraint and transmission security constraint.
From (49), it is easy to obtain that
γ d p γ E η + γ E
That is, security requirement (49) derives a linear constraint between γ d and p. While timeliness requirement (48) provides a nonlinear constraint which is difficult to describe.
In the following, through numerical examples, we depict the feasible ( p , γ d ) pairs such that both of (48) and (49) are satisfied. According to the slope of linear constraint (50), i.e., γ E η is greater than 1 or less than 1, in Figure 3a,b, we describe the feasible regions in two cases.
In Figure 3a, the blue line represents the linear security constraint, and its intersection with the vertical axis is equal to γ E , that is, the success probability of transmitting a packet to eavesdropper. While the red line shows the nonlinear constraint incurred by timeliness requirement. It is not hard to determine that the feasible ( p , γ d ) pairs are located above the blue and red lines. For the red line, when fixing packet generation rate p, the average AoI is monotonically decreasing as γ d increases. Therefore, when some γ d meets the constraint (48), any γ d > γ d can also satisfy (48). This explains that all the feasible ( p , γ d ) are located above the red and blue line. Since the y-axis denotes γ d and the x-axis represents p, then the slope of any line drawn from the origin is equal to the reciprocal of traffic intensity, i.e., 1 / ρ d . In order to ensure the stability of the service system (status updating system), we have ρ d < 1 . Thus, the feasible p and γ d pairs are located above γ d = p line, and it sees that the red curve which represents timeliness constraint approaches the asymptote γ d = p when p 1 . Figure 3a shows that the infeasible ( p , γ d ) pairs that do not meet security constraint (49) are located in the bottom of red line. Here, an interesting point is that when we consider the impact of transmission security constraints on traffic intensity ρ d , it turns out that there is in fact no limitation on the feasible range of ρ d . This is because for any point located in infeasible region, say V ( p , γ d ) , by connecting O V and extending the line, we can always find a point V ( p , γ d ) in feasible region, such that
ρ d ( V ) = p γ d = p γ d = ρ d ( V )
From this example, we show that using feasible ( p , γ d ) region to describe the feasible system parameter settings are more accurate than using the single parameter ρ d .
For γ E η > 1 , we plot the blue line and the red curve that correspond to timeliness and security constraints in Figure 3b, in which the feasible region of ( p , γ d ) ’s are clearly marked with dashed lines. Notice that comparing with previous case where γ E η < 1 , in this case the probability that a transmitted packet is eavesdropped becomes large. Similarly, the red curve has the asymptote γ d = p when p approaches to 1, and the feasible ( p , γ d ) pairs are located above the blue and red lines. Unlike the situation of γ E η < 1 , notice that the infeasible ( p , γ d ) ’s form an open area. From the perspective of ρ d , in this case not all ρ d ’s that meet the timeliness constraint can also meet the security constraint. Observing that for some infeasible pair ( p , γ d ) , say point V in Figure 3b, connecting the segment O V and extending, it sees that all the lines are located within infeasible region, which means that when setting traffic intensity ρ d to be p / γ d , transmission timeliness constraint is satisfied but transmission security constraint is violated. In other words, for the case of γ E η > 1 , security constraint (49) truly limits the range of ρ d ’s, if we use ρ d to distinguish the feasible and infeasible cases. More specifically, Figure 3b indicates that in order to meet the security constraint, very high ρ d ’s that are represented by ( p , γ d ) ’s near the asymptote γ d = p , are not feasible. Thus, the reciprocal of blue line’s slope, i.e., 1 / ( η γ E ) , approximately provides an upper bound of feasible ρ d ’s, especially when γ E , i.e., the intersection of linear security constraint and the vertical axis, is small.
Finally, when reducing the timeliness threshold ξ and increasing the security threshold η , the red curve will move upward, and the blue line will rotate upward to the left with ( 0 , γ E ) as the endpoint. This will narrow down the feasible region of ( p , γ d ) . On the contrary, by increasing ξ and reducing η , we can expand the feasible area, which means more ( p , γ d ) pairs can meet the timeliness and security constraints.

5. Numerical Simulations

In this Section, dividing into two parts, the numerical simulations for the main results obtained in the paper are provided. In Section 5.1, the relations between freshness advantage F and traffic intensity ρ d are depicted, where in the same figure average AoI of the system is also plotted. Then, in order to explicitly show the tradeoffs between F and average AoI Δ ¯ d , we plot Δ ¯ d F curves to show the direct relationships between Δ ¯ d and F. According to Theorem 2 and Table 2, in Section 5.2 we draw the distribution of instantaneous age gap g and illustrate the correspondence between the optimal traffic intensity ρ d and the given Γ , which is defined in (46).

5.1. Relationship Between F, Δ ¯ d and ρ d as Well as Their Interrelations

In Figure 2a, we simultaneously depict the changing curves of freshness advantage F and average AoI Δ ¯ d as ρ d increases. It has been proved previously that average AoI of an infinite capacity status updating system first decreases then increases when traffic intensity ρ becomes large, which indicates the tradeoffs between server’s utilization and network congestion. From the general formula of freshness advantage F in Equation (16), it sees that F will decrease monotonically with ρ d . Notice that F is also related to the eavesdropping probability γ E . When reducing γ E , that is decreasing the probability that the eavesdropper obtains packets, then F increases and the corresponding F ρ d curve moves upward. More specifically, in Figure 2a, as ρ d increases from 0.55 to 0.9, it shows that freshness advantage F decreases while average AoI Δ ¯ d increases, representing that both of transmission timeliness and transmission security of the system are deteriorating, which is the least desirable situation. On the other hand, when ρ d varies from 0.1 to 0.55, Figure 2a shows that average AoI decreases but freshness advantage F also decreases, from which we can conclude that the enhancement of system’s timeliness performance comes at the cost of the weakening of system’s security performance.
In order to clearly reveal the relationships between transmission timeliness and transmission security for an infinite capacity status updating system, in Figure 2b we provide the Δ ¯ d F curves when setting different system parameters. These graphs are depicted by representing Δ ¯ d and F to be parameter equations of ρ d . Figure 2b shows that as F increases (in this case, ρ d is decreasing), average AoI of the system is first decreasing, reaching the minimum value, and then increasing. For the cases where the security constraint is not strict, i.e., F is not required to be very large, for example, not exceeding 20 in Figure 2b, a low level average AoI can be obtained and at the same time meeting the security limitation. However, if it requires that freshness advantage F must be greater than some given large threshold, then Figure 2b clearly shows that system’s average AoI cannot take small values. This implies that if we want good transmission security, we must accept the compromise on transmission timeliness. From the perspective of freshness advantage F and average AoI Δ ¯ d , based on numerical simulations, we point out that there is no optimal system designs that can optimize both F and Δ ¯ d at the same time.

5.2. Distribution of Instantaneous Gap g and the Correspondence Between Γ and p

In Figure 4a, by fixing p = 0.2 , γ d = 0.4 and setting γ E to be 0.1, 0.2, and 0.3, we plot the probability distribution of instantaneous age gap g. Strictly speaking, because the age age g takes only integer values, we should draw a series of scatter points. To better illustrate distributional trend of g, in Figure 4a we have plotted two continuous curves, one for positive gs and the other for negative gs. Notice that the distribution curves of negative g’s and positive g’s are depicted separately, and we point out that the probability that g equals 0 is discontinuous with the distributions on both sides, therefore, we list π 0 individually in the legend of the figure. It sees that the distribution of g is centered around 0 and decays towards both sides. As we pointed out in brief discussion below Theorem 2’s proof, as | g | increases, the distribution curve of negative g’s has a greater decay rate than that of positive g’s. Careful observations show that for negative g, when increasing γ E , the probability of taking the same g is also increasing, and the distribution curves decreases faster as γ E increases. On the contrary, for the positive side, the decay rate of the curve corresponding to smaller γ E is slower. For slightly large g’s, the situations that probabilities distribute are opposite to the cases of negative g’s. More specifically, for some g < 0 , it shows that π g ( 0.1 ) < π g ( 0.2 ) < π g ( 0.3 ) . However, on the positive side, we have π g ( 0.3 ) < π g ( 0.2 ) < π g ( 0.1 ) . This is because the probability distributions corresponding to same color curves in the positive and negative parts are complementary. In particular, for case of g = 0 , we show that for all of three cases depicted in Figure 4a, π 0 is much higher than the probabilities that g takes other values. Overall, the numerical simulation of g’s distribution shows the symmetrical and decaying trend, which actually demonstrate the symmetry of instantaneous age gap g = n E n d , because we can treat the eavesdropper as another legitimate receiver.
At last, in Figure 4b we draw the correspondence relationships between optimal traffic intensity ρ d and the given Γ , where we let Γ varies from 0 to 10. Numerical result verifies that as Γ increases, ρ d is increasing with a decreasing rate. Generally speaking, it shows that the optimal traffic intensity ρ d , also the optimal packet generation rate p , is the concave function of Γ . Here, we provide following discussions about the values that Γ takes.
Remember than we define in Equation (46) that
Γ = 1 α ( γ d / γ E 1 ) 1 γ d
in which α > 0 . Assuming that γ d / γ E > 1 , then α ( γ d / γ E 1 ) > 0 , which gives that
Γ = 1 α ( γ d / γ E 1 ) 1 γ d < 1 1 γ d
i.e., Γ is upper bounded. While for γ d / γ E < 1 , since α > 0 , it is easy to obtain that
Γ = 1 α ( γ d / γ E 1 ) 1 γ d > 1 1 γ d
is lower bounded. Therefore, for example, if setting γ d = 0.8 , then in Figure 4b, 0 < Γ < 5 corresponds to the cases where γ d > γ E , and Γ > 5 only occurs when γ d < γ E .

6. Conclusions

In this paper, assuming that there exist passive eavesdroppers, we assess the security performance of timely transmitting packets on infinite capacity status updating systems. We define freshness advantage F as transmission security metric, which is equal to average instantaneous gap between eavesdropper’s AoI and legitimate receiver’s AoI. We derive the general formula of F and prove that F depends only on average packet interarrival time and the ratio γ d / γ E . For special case of Bernoulli ( p ) packet arrivals, the explicit distribution of age gap g = n E n d is calculated. Notice that the eavesdropper can be treated as another legitimate receiver, we demonstrate the symmetry in freshness advantage F and its probability distribution. This is a point that was not mentioned in previous works. To design and optimize system’s average AoI Δ ¯ d and freshness advantage F simultaneously, on the one hand, we construct the combined performance Q and determine the optimal p that minimizes it. On the other hand, by imposing constraints on Δ ¯ d and F, the feasible regions of p and γ d are determined through numerical examples. Finally, we provide sufficient numerical simulations to explain the relationships between F and other system parameters, as well as the relations between F and average AoI Δ ¯ d , so that revealing the tradeoffs between transmission timeliness and transmission security. It proves that there is no system designs that can optimize timeliness and security at the same time.
For possible future works, one direction is deriving the freshness advantage F for bufferless and finite capacity status updating systems, so that characterizing the transmission security of these systems. Compared to previous works, allowing age gap g to take arbitrary values will lead to more comprehensive results. Another major problem of this paper is that we do not deal with the packet when it is eavesdropped and becomes insecure. Notice that this will cause information leakage at the receiver side. We point out that how to handle insecure packets and determine the accurate tradeoffs between the amount of leaked information and the average AoI will be very meaningful and valuable topics in future research works.

Author Contributions

Conceptualization, H.X.; Formal analysis, A.Z., D.C. and Y.X.; Writing—original draft, J.Z.; Writing—review & editing, C.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Special Research Funding from Wuxi Taihu University under Grant 2025THQD059, in part by the National Natural Science Foundation of China under Grant 62371119 and Grant 62301266; in part by the Zhi Shan Young Scholar Program of Southeast University; and in part by the Startup Foundation for Introducing Talent of NUIST under Grant 2023r014.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Proof of Lemma 1

In this appendix, β + ( z ) , β ( z ) are determined using Equations (4).
Firstly, merging the first two rows, we show that for g 1 ,
π g = π g ( 1 γ d ) ( 1 γ E ) + γ d ( 1 γ E ) k = 0 g 1 π k Pr { Y = g k }
Then, β + ( z ) is calculated as
β + ( z ) = g = 1 + z g π g = g = 1 + z g π g ( 1 γ d ) ( 1 γ E ) + γ d ( 1 γ E ) k = 0 g 1 π k Pr { Y = g k }
= ( 1 γ d ) ( 1 γ E ) g = 1 + z g π g + γ d ( 1 γ E ) π 0 + g = 1 + z g π g Y ( z )
= ( 1 γ d ) ( 1 γ E ) β + ( z ) + γ d ( 1 γ E ) π 0 + β + ( z ) Y ( z )
in which
g = 1 + z g k = 0 g 1 π k Pr { Y = g k } = π 0 + g = 1 + z g π g Y ( z )
is obtained by exchanging the summation order, and
Y ( z ) = j = 1 + z j Pr { Y = j }
is the probability generation function (PGF) of Y, i.e., random packet interarrival time.
From Equation (A3) we solve that
β + ( z ) = π 0 γ d ( 1 γ E ) Y ( z ) 1 ( 1 γ d ) ( 1 γ E ) γ d ( 1 γ E ) Y ( z )
Similarly, we first write the last row of (4) as
π g = π g ( 1 γ d ) + ( 1 γ d ) γ E k = 0 + π k Pr { Y = | g | }
then calculate β ( z ) as
β ( z ) = g = 1 z | g | π g = g = 1 z | g | π g ( 1 γ d ) + ( 1 γ d ) γ E k = 0 + π k Pr { Y = | g | } = ( 1 γ d ) β ( z ) + ( 1 γ d ) γ E k = 0 + π k Y ( z )
from which we obtain
β ( z ) = ( 1 γ d ) γ E k = 0 + π k Y ( z ) γ d
= ( 1 γ d ) γ E π 0 + β + ( 1 ) Y ( z ) γ d
To derive the complete expressions of β + ( z ) , β ( z ) , in following part we determine π 0 and π 0 + β + ( 1 ) .
In Equation (A6), letting z = 1 gives that
β + ( 1 ) = π 0 γ d ( 1 γ E ) γ E
In addition, since all of stationary probabilities add up to 1, we have
1 = g = 1 π g + π 0 + g = 1 + π g = β ( 1 ) + π 0 + β + ( 1 )
= ( 1 γ d ) γ E π 0 + β + ( 1 ) γ d + π 0 + β + ( 1 )
= [ 1 ( 1 γ d ) ( 1 γ E ) ] π 0 + β + ( 1 ) γ d
where Equation (A8) is used to obtain (A10). Equation (A11) gives that
π 0 + β + ( 1 ) = γ d 1 ( 1 γ d ) ( 1 γ E )
Combining (A9) and (A12), one can solve that
π 0 = γ d γ E [ 1 ( 1 γ d ) ( 1 γ E ) ] 2
Substituting (A12) into Equation (A8), we determine that
β ( z ) = ( 1 γ d ) γ E Y ( z ) 1 ( 1 γ d ) ( 1 γ E )
Finally, collecting Equations (A6), (A13) and (A14), we complete the proof of Lemma 1.

References

  1. Kaul, S.; Gruteser, M.; Rai, V.; Kenney, J. Minimizing age of information in vehicular networks. In Proceedings of the 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECOM), Salt Lake City, UT, USA, 27–30 June 2011; pp. 350–358. [Google Scholar] [CrossRef]
  2. Kaul, S.; Yates, R.; Gruteser, M. Real-time status: How often should one update? In Proceedings of the IEEE Computer and Communications Societies (INFOCOM), Orlando, FL, USA, 25–30 March 2012; pp. 2731–2735. [Google Scholar] [CrossRef]
  3. Kaul, S.K.; Yates, R.D.; Gruteser, M. Status updates through queues. In Proceedings of the 2012 46th Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 21–23 March 2012; pp. 1–6. [Google Scholar] [CrossRef]
  4. Sun, Y.; Uysal-Biyikoglu, E.; Yates, R.; Koksal, C.E.; Shroff, N.B. Update or wait: How to keep your data fresh. In Proceedings of the 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; pp. 1–9. [Google Scholar] [CrossRef]
  5. Inoue, Y.; Masuyama, H.; Takine, T.; Tanaka, T. A General Formula for the Stationary Distribution of the Age of Information and Its Application to Single-Server Queues. IEEE Trans. Inf. Theory 2019, 65, 8305–8324. [Google Scholar] [CrossRef]
  6. Yates, R.D.; Kaul, S.K. The Age of Information: Real-Time Status Updating by Multiple Sources. IEEE Trans. Inf. Theory 2019, 65, 1807–1827. [Google Scholar] [CrossRef]
  7. Pappas, N.; Gunnarsson, J.; Kratz, L.; Kountouris, M.; Angelakis, V. Age of information of multiple sources with queue management. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 5935–5940. [Google Scholar] [CrossRef]
  8. Kosta, A.; Pappas, N.; Ephremides, A.; Angelakis, V. Age of information performance of multiaccess strategies with packet management. J. Commun. Netw. 2019, 21, 244–255. [Google Scholar] [CrossRef]
  9. Kaul, S.K.; Yates, R.D. Age of Information: Updates with Priority. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 2644–2648. [Google Scholar] [CrossRef]
  10. Xu, J.; Gautam, N. Peak Age of Information in Priority Queuing Systems. IEEE Trans. Inf. Theory 2021, 67, 373–390. [Google Scholar] [CrossRef]
  11. Dogan, O.; Akar, N. The Multi-Source Probabilistically Preemptive M/PH/1/1 Queue with Packet Errors. IEEE Trans. Commun. 2021, 69, 7297–7308. [Google Scholar] [CrossRef]
  12. Kam, C.; Kompella, S.; Nguyen, G.D.; Wieselthier, J.E.; Ephremides, A. Age of information with a packet deadline. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain, 10–15 July 2016; pp. 2564–2568. [Google Scholar] [CrossRef]
  13. Kam, C.; Kompella, S.; Nguyen, G.D.; Wieselthier, J.E.; Ephremides, A. On the Age of Information with Packet Deadlines. IEEE Trans. Inf. Theory 2018, 64, 6419–6428. [Google Scholar] [CrossRef]
  14. Inoue, Y. Analysis of the Age of Information with Packet Deadline and Infinite Buffer Capacity. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 2639–2643. [Google Scholar] [CrossRef]
  15. Kam, C.; Kompella, S.; Nguyen, G.D.; Ephremides, A. Effect of Message Transmission Path Diversity on Status Age. IEEE Trans. Inf. Theory 2016, 62, 1360–1374. [Google Scholar] [CrossRef]
  16. Javani, A.; Zorgui, M.; Wang, Z. Age of Information for Multiple-Source Multiple-Server Networks. IEEE-ACM Trans. Netw. 2024, 33, 17–34. [Google Scholar] [CrossRef]
  17. Chen, Z.; Yang, T.; Pappas, N.; Yang, H.H.; Tian, Z.; Wang, M. Improving Information Freshness via Multi-Sensor Parallel Status Updating. IEEE Trans. Commun. 2024, 73, 540–554. [Google Scholar] [CrossRef]
  18. Yates, R.D. The Age of Gossip in Networks. In Proceedings of the 2021 IEEE International Symposium on Information Theory (ISIT), Melbourne, Australia, 12–20 July 2021; pp. 2984–2989. [Google Scholar] [CrossRef]
  19. Yates, R.D. Timely Gossip. In Proceedings of the 2021 IEEE 22nd International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Lucca, Italy, 27–30 September 2021; pp. 331–335. [Google Scholar] [CrossRef]
  20. Kaswan, P.; Bastopcu, M.; Ulukus, S.; Etesami, S.R.; Basar, T. Optimizing Profitability in Timely Gossip Networks. In Proceedings of the 2024 IEEE 25th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Lucca, Italy, 10–13 September 2024; pp. 806–810. [Google Scholar] [CrossRef]
  21. Buyukates, B.; Bastopcu, M.; Ulukus, S. Age of Gossip in Networks with Community Structure. In Proceedings of the 2021 IEEE 22nd International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Lucca, Italy, 27–30 September 2021; pp. 326–330. [Google Scholar] [CrossRef]
  22. Bastopcu, M.; Buyukates, B.; Ulukus, S. Gossiping with Binary Freshness Metric. In Proceedings of the 2021 IEEE Globecom Workshops (GC Wkshps), Madrid, Spain, 7–11 December 2021; pp. 1–6. [Google Scholar] [CrossRef]
  23. Buyukates, B.; Bastopcu, M.; Ulukus, S. Version Age of Information in Clustered Gossip Networks. IEEE J. Sel. Areas Inf. Theory 2022, 3, 85–97. [Google Scholar] [CrossRef]
  24. Ramakanth, R.V.; Tripathi, V.; Modiano, E. Monitoring Correlated Sources: AoI-Based Scheduling is Nearly Optimal. IEEE Trans. Mob. Comput. 2025, 24, 1043–1054. [Google Scholar] [CrossRef]
  25. Moradian, M.; Dadlani, A.; Khonsari, A.; Tabassum, H. Age-Aware Dynamic Frame Slotted ALOHA for Machine-Type Communications. IEEE Trans. Commun. 2024, 72, 2639–2654. [Google Scholar] [CrossRef]
  26. Tang, Z.; Yang, N.; Sadeghi, P.; Zhou, X. Age of Information in Downlink Systems: Broadcast or Unicast Transmission? IEEE J. Sel. Areas Commun. 2023, 41, 2057–2070. [Google Scholar] [CrossRef]
  27. Wang, Q.; Chen, H. Age of Information in Reservation Multi-Access Networks With Stochastic Arrivals: Analysis and Optimization. IEEE Trans. Commun. 2023, 71, 4707–4720. [Google Scholar] [CrossRef]
  28. Fountoulakis, E.; Charalambous, T.; Ephremides, A.; Pappas, N. Scheduling Policies for AoI Minimization with Timely Throughput Constraints. IEEE Trans. Commun. 2023, 71, 3905–3917. [Google Scholar] [CrossRef]
  29. Zheng, H.; Xiong, K.; Fan, P.; Zhong, Z.; Letaief, K.B. Age of Information-Based Wireless Powered Communication Networks with Selfish Charging Nodes. IEEE J. Sel. Areas Commun. 2021, 39, 1393–1411. [Google Scholar] [CrossRef]
  30. Feng, S.; Yang, J. Precoding and Scheduling for AoI Minimization in MIMO Broadcast Channels. IEEE Trans. Inf. Theory 2022, 68, 5185–5202. [Google Scholar] [CrossRef]
  31. Tripathi, V.; Talak, R.; Modiano, E. Age of Information for Discrete Time Queues. arXiv 2019, arXiv:1901.10463v1. [Google Scholar]
  32. Kosta, A.; Pappas, N.; Ephremides, A.; Angelakis, V. Non-linear Age of Information in a Discrete Time Queue: Stationary Distribution and Average Performance Analysis. In Proceedings of the IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
  33. Kosta, A.; Pappas, N.; Ephremides, A.; Angelakis, V. The Age of Information in a Discrete Time Queue: Stationary Distribution and Non-Linear Age Mean Analysis. IEEE J. Sel. Areas Commun. 2021, 39, 1352–1364. [Google Scholar] [CrossRef]
  34. Akar, N.; Dogan, O. Discrete-Time Queueing Model of Age of Information with Multiple Information Sources. IEEE Internet Things J. 2021, 8, 14531–14542. [Google Scholar] [CrossRef]
  35. Zhang, J.; Xu, Y. On Age of Information for Discrete Time Status Updating System with Ber/G/1/1 Queues. In Proceedings of the IEEE Information Theory Workshop (ITW), Kanazawa, Japan, 17–21 October 2021; pp. 1–6. [Google Scholar] [CrossRef]
  36. Zhang, J.; Xu, Y. On Age of Information for Discrete Time Status Updating System with Infinite Size. In Proceedings of the IEEE Information Theory Workshop (ITW), Mumbai, India, 1–9 November 2022; pp. 392–397. [Google Scholar] [CrossRef]
  37. Zhang, J.; Xu, Y. Age Analysis of Status Updating System with Probabilistic Packet Preemption. Entropy 2022, 24, 785. [Google Scholar] [CrossRef] [PubMed]
  38. Zhang, J.; Xu, H.; Cao, D.; Xu, Y. Discrete Age of Information for Bufferless System with Multiple Prioritized Sources. IEEE Internet Things J. 2024, 11, 20099–20119. [Google Scholar] [CrossRef]
  39. Yang, Y.; Hanzo, L. Permutation-Based Short-Packet Transmissions Improve Secure URLLCs in the Internet of Things. IEEE Internet Things J. 2023, 10, 11024–11037. [Google Scholar] [CrossRef]
  40. Yang, Y. Secure and Timely Status Updates in the IoT using Short-Packet Permutation-Based Transmissions. In Proceedings of the 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), Hong Kong, China, 10–13 October 2023; pp. 1–6. [Google Scholar] [CrossRef]
  41. Wang, Q.; Chen, H.; Mohapatra, P.; Pappas, N. Secure Status Updates under Eavesdropping: Age of Information-based Secrecy Metrics. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Vancouver, BC, Canada, 20 May 2024; pp. 1–6. [Google Scholar] [CrossRef]
  42. Xu, H.; Hu, Y.; Zhu, Y.; Yuan, X.; Schmeink, A. Achieving Secure and Fresh Information Updates via Short-Packet Communications. IEEE Wirel. Commun. Lett. 2024, 13, 3232–3236. [Google Scholar] [CrossRef]
  43. Yuan, F.; Tang, S.; Liu, D. AoI-Based Transmission Scheduling for Cyber Physical Systems Over Fading Channel Against Eavesdropping. IEEE Internet Things J. 2024, 11, 5455–5466. [Google Scholar] [CrossRef]
  44. Wyner, A.D. The wiretap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  45. Ma, Y.; Liu, K.; Liu, Y.; Zhu, L. Timeliness and Secrecy-Aware Uplink Data Aggregation for Large-Scale UAV-IoT Networks. IEEE Internet Things J. 2024, 11, 17341–17356. [Google Scholar] [CrossRef]
  46. Costa, M.; Sagduyu, Y.E. Timely NextG Communications with Decoy Assistance against Deep Learning-based Jamming. In Proceedings of the IEEE International Conference on Communications Workshops (ICC Workshops), Denver, CO, USA, 9–13 June 2024; pp. 554–559. [Google Scholar] [CrossRef]
  47. Kim, D.; Yun, S.; Lee, S.; Lee, J.; Quek, T.Q.S. Reinforcement Learning-Based Sensing Decision for Data Freshness in Blockchain-Empowered Wireless Networks. IEEE Wirel. Commun. Lett. 2024, 13, 3276–3280. [Google Scholar] [CrossRef]
  48. Yang, Y.; Zhang, B.; Guo, D.; Xiong, Z.; Niyato, D.; Han, Z. Can We Realize Data Freshness Optimization for Privacy Preserving-Mobile Crowdsensing with Artificial Noise? IEEE Trans. Mob. Comput. 2024, 23, 11357–11374. [Google Scholar] [CrossRef]
  49. Ju, Y.; Gao, Z.; Wang, H.; Liu, L.; Pei, Q.; Dong, M.; Mumtaz, S.; Leung, V.C.M. Energy-Efficient Cooperative Secure Communications in mmWave Vehicular Networks Using Deep Recurrent Reinforcement Learning. IEEE Trans. Intell. Transp. Syst. 2024, 25, 14460–14475. [Google Scholar] [CrossRef]
  50. Ju, Y.; Cao, Z.; Chen, Y.; Liu, L.; Pei, Q.; Mumtaz, S.; Dong, M.; Guizani, M. NOMA-Assisted Secure Offloading for Vehicular Edge Computing Networks with Asynchronous Deep Reinforcement Learning. IEEE Trans. Intell. Transp. Syst. 2024, 25, 2627–2640. [Google Scholar] [CrossRef]
  51. Crosara, L.; Laurenti, N.; Badia, L. Age of information is not just a number: Status updates against an eavesdropping node. Ad Hoc Netw. 2024, 155, 103388. [Google Scholar] [CrossRef]
  52. Zhong, J.; Yates, R.D. Timeliness in Lossless Block Coding. In Proceedings of the Data Compression Conference (DCC), Snowbird, UT, USA, 30 March–1 April 2016; pp. 339–348. [Google Scholar] [CrossRef]
  53. Zhong, J.; Yates, R.D.; Soljanin, E. Timely Lossless Source Coding for Randomly Arriving Symbols. In Proceedings of the IEEE Information Theory Workshop (ITW), Guangzhou, China, 25–29 November 2018; pp. 1–5. [Google Scholar] [CrossRef]
Figure 1. Model of infinite capacity status updating system with an eavesdropper: characterizing instantaneous gap g between eavesdropper’s AoI n E and legitimate receiver’s AoI n d .
Figure 1. Model of infinite capacity status updating system with an eavesdropper: characterizing instantaneous gap g between eavesdropper’s AoI n E and legitimate receiver’s AoI n d .
Entropy 27 00571 g001
Figure 2. Relationships between freshness advantage F, average AoI Δ ¯ d and ρ d , as well as their interrelations.
Figure 2. Relationships between freshness advantage F, average AoI Δ ¯ d and ρ d , as well as their interrelations.
Entropy 27 00571 g002
Figure 3. Feasible region of ( p , γ d ) pairs under the constraints that Δ ¯ d ξ , F η .
Figure 3. Feasible region of ( p , γ d ) pairs under the constraints that Δ ¯ d ξ , F η .
Entropy 27 00571 g003
Figure 4. Distribution of instantaneous age gap g and the optimal traffic intensity ρ d corresponding to given Γ .
Figure 4. Distribution of instantaneous age gap g and the optimal traffic intensity ρ d corresponding to given Γ .
Entropy 27 00571 g004
Table 1. Random Transfers of Instantaneous Age Gap g = γ E γ d .
Table 1. Random Transfers of Instantaneous Age Gap g = γ E γ d .
Initial StateR.V.sNext State and Transtion Probability
g > 0 , n E > n d B d , B E ( 0 , 0 ) : g with ( 1 γ d ) ( 1 γ E )
( 0 , 1 ) : y with ( 1 γ d ) γ E Pr { Y = y }
( 1 , 0 ) : g + y with γ d ( 1 γ E ) Pr { Y = y }
( 1 , 1 ) : 0 with γ d γ E
g = 0 , n E = n d B d , B E ( 0 , 0 ) : 0 with ( 1 γ d ) ( 1 γ E )
( 0 , 1 ) : y with ( 1 γ d ) γ E Pr { Y = y }
( 1 , 0 ) : y with γ d ( 1 γ E ) Pr { Y = y }
( 1 , 1 ) : 0 with γ d γ E
g < 0 , n E < n d B d B d = 0 : g with 1 γ d
B d = 1 : 0 with γ d
Table 2. Correspondence Between Optimal Traffic Intensity ρ d and Γ .
Table 2. Correspondence Between Optimal Traffic Intensity ρ d and Γ .
Mathematic Relation Γ ρ d Γ ρ d Γ ρ d Γ ρ d Γ ρ d
ρ d 1 ρ d 2 ρ d 2 = Γ ,
Γ = 1 α ( γ d / γ E 1 ) 1 γ d
002.00.6064.00.6796.00.7198.00.745
0.20.3662.20.6164.20.6846.20.7228.20.747
0.40.4342.40.6264.40.6886.40.7258.40.750
0.60.4762.60.6344.60.6936.60.7288.60.752
0.80.5072.80.6424.80.6976.80.7308.80.754
1.00.5313.00.6495.00.7017.00.7339.00.756
1.20.5513.20.6565.20.7057.20.7369.20.758
1.40.5683.40.6625.40.7087.40.7389.40.760
1.60.5823.60.6685.60.7127.60.7419.60.761
1.80.5953.80.6735.80.7157.80.7439.80.762
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, J.; Xu, H.; Zheng, A.; Cao, D.; Xu, Y.; Lin, C. Transmitting Status Updates on Infinite Capacity Systems with Eavesdropper: Freshness Advantage of Legitimate Receiver. Entropy 2025, 27, 571. https://doi.org/10.3390/e27060571

AMA Style

Zhang J, Xu H, Zheng A, Cao D, Xu Y, Lin C. Transmitting Status Updates on Infinite Capacity Systems with Eavesdropper: Freshness Advantage of Legitimate Receiver. Entropy. 2025; 27(6):571. https://doi.org/10.3390/e27060571

Chicago/Turabian Style

Zhang, Jixiang, Han Xu, Anqi Zheng, Daming Cao, Yinfei Xu, and Chengyu Lin. 2025. "Transmitting Status Updates on Infinite Capacity Systems with Eavesdropper: Freshness Advantage of Legitimate Receiver" Entropy 27, no. 6: 571. https://doi.org/10.3390/e27060571

APA Style

Zhang, J., Xu, H., Zheng, A., Cao, D., Xu, Y., & Lin, C. (2025). Transmitting Status Updates on Infinite Capacity Systems with Eavesdropper: Freshness Advantage of Legitimate Receiver. Entropy, 27(6), 571. https://doi.org/10.3390/e27060571

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop