All articles published by MDPI are made immediately available worldwide under an open access license. No special
permission is required to reuse all or part of the article published by MDPI, including figures and tables. For
articles published under an open access Creative Common CC BY license, any part of the article may be reused without
permission provided that the original article is clearly cited. For more information, please refer to
https://www.mdpi.com/openaccess.
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature
Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for
future research directions and describes possible research applications.
Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive
positive feedback from the reviewers.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world.
Editors select a small number of articles recently published in the journal that they believe will be particularly
interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the
most exciting work published in the various research areas of the journal.
We consider that the source sends packets to the receiver through a Ber/Geo/1/2 queue modeled status updating system, where the transmitted packets are subject to potential eavesdropping. Time is discretized into identical time slots. This paper studies the tradeoffs between the information freshness and transmission security of a system, where freshness is characterized by the age of information (AoI) metric and transmission security is represented by the proportion of obtained insecure packets over a long period of time. We assume that in a time slot, the source generates a new packet with probability p, and a packet arrives at the receiver with probability . With probability , a transmitted packet is eavesdropped. At the receiver, AoI is defined as the elapsed time since the generation instant of the latest obtained packet. A packet is defined to be insecure if it is obtained by the eavesdropper earlier than the receiver. To control the proportion of insecure packets obtained in the receiver, we propose using the probabilistic deletion/retaining scheme. More specifically, when a packet is eavesdropped before arriving at the receiver, this packet is deleted with probability or retained with probability . Under this transmission policy, we derive the system’s average AoI which we call the average secure AoI, and investigate its relations with the insecure packet proportion, which is denoted as . The obtained formulas are then calculated in three special cases, including , , and . We explain that these cases correspond to the average AoI of a basic status updating system with Ber/Geo/1/2 queue, packet with random geometric deadline in service process, and average age of secure information (AoSI), respectively. Numerical simulations of obtained results are provided. In particular, the tradeoffs between average secure AoI and are analyzed in detail. We demonstrate that depending on the value of the eavesdropping probability , average secure AoI varies in different trends with , and in most cases the average secure AoI and can be minimized simultaneously.
Due to the rapid development of wireless communication networks, in recent years IoT technology has given rise to a large number of emerging applications. Among them, real-time data transmission plays an important role. One typical application is autonomous vehicles. In order to achieve intelligent and safe autonomous driving, different kinds of sensors installed on vehicles need to provide real-time feedback about the surrounding road conditions to the vehicle’s control center so that the speed, steering, and other driving states can be updated in a timely manner. In papers [1,2], Kaul and Yates et al. proposed using age of information (AoI) to measure the freshness of packets when they arrive at the receiver. Then, the freshness of the obtained packets represents the transmission timeliness performance of the system. Since then, as a metric characterizing packet freshness, AoI has been analyzed theoretically and been widely used in system design or scheduling problems.
Based on queuing theory, Yates et al. proposed a status updating system as a real-time communication model. They defined the age of information as the random process of current time minus , where is the instant that the latest obtained packet was generated. The average AoI of the system with basic queue was obtained in [1,2,3,4,5]. In particular, in work [5], the authors proved that a small-capacity system has a lower average AoI and preempting/replacingold packet helps to reduce the average AoI of the system. On the M/M/1/2 queue modeled system, in paper [6] Kam et al. demonstrated that by controlling the packet waiting time in the buffer, imposing an appropriate packet deadline can achieve a lower average AoI. Inoue proved the same conclusion for an infinite capacity system in work [7]. In another paper [8], by deriving a general formula which links the stationary distributions of AoI, peak AoI, and service time, Inoue determined most results about AoI on single-source single-server systems. Assuming that there are multiple sources, the AoI of every source was analyzed for example in works [9,10,11,12], while a system with multiple servers was investigated in papers [13,14,15]. Notice that analyzing AoI for a multiple-server system is more complex because sometimes the receiver may obtain one packet that is even older than that which the receiver currently has. In these cases, AoI will not be updated. In addition, AoI has often been used as timeliness measure, sometimes even as an optimization objective in designing optimal resource scheduling problems, such as in [16,17,18,19,20,21,22]. In recent years, many results have been obtained in deriving the average AoI and the stationary distribution of AoI for discrete time status updating systems. In [23,24,25,26], the authors determined the average AoI of system with several simple queuing models, such as FCFS Ber/G/1/1, Ber/G/1/∞, and a system with multiple sources. In previous works [27,28,29], the authors derived the average value and stationary distribution of discrete time AoI for Ber/Geo/1/1, Ber/Geo/1/2, and Ber/Geo/1/∞ queue modeled systems. In addition, the discrete age of information for systems with multiple prioritized sources was discussed in paper [30].
When transmitting packets via electromagnetic waves in open spaces, an illegal eavesdropper may eavesdrop on the transmitted packets through a wiretap channel. Recently, it was found that within the framework of AoI theory, constructing some new security measures based on real-time transmission performance, then studying the tradeoffs between transmission timeliness and transmission security of the system has become a noticeable research topic. Unlike the usual secure transmission research such as in works [31,32,33,34], in real-time communication scenario with eavesdroppers, one packet is defined to be insecure if it is obtained by the eavesdropper before arriving at the receiver.
In papers [35,36], using the short-packet permutation-based policy, Yang considered transmitting packets securely and in a timely manner, where an eavesdropper is present to probe their communication link. They proposed a new security measure called secrecy margin, which was defined as the area of random region enclosed by the AoI sample path from to , where is the instance that the receiver obtains a packet, and denotes the instance that the same packet is eavesdropped. By maximizing the average secrecy margin, they determined the optimal structure of short packets. Later, the same real-time and secure communication scenario was studied by Wang and Chen et al. in work [37]. To characterize transmission security, they constructed another two AoI-based security measurements by drawing inspiration from the concept of Wyner’s secrecy capacity [38]. They defined secrecy age to be average instantaneous gap between the eavesdropper’s and receiver’s AoI, and the secrecy age outage probability denoted the probability that this gap does not exceed some threshold. Under random and threshold-based packet generation policies, the optimal generation probability/packet transmission strategy was obtained by maximizing the joint measure, i.e., average secrecy age divided by average secrecy age outage probability. Age of secure information (AoSI) was defined and investigated in [39,40]. Just as its name implies, AoSI characterizes the evolution of the real-time age of the latest and secure packet in the receiver, and average AoSI equals average AoI calculated over those secure packets. In [39], the authors analyzed AoSI using finite block-length information theory, while [40] considered the situation where the eavesdropper is an energy harvesting node. The optimal transmission strategy that minimizes average AoSI was obtained by the certain optimization method. In work [41], considering the scenarios where packets are transmitted through infinite capacity systems, we defined the freshness advantage F to be the security measurement. Then, the relations and tradeoffs between transmission timeliness and transmission security were investigated. We proved that the average AoI of legitimate receivers and the freshness advantage cannot be minimized simultaneously. Therefore, there exist certain tradeoffs between reducing the average AoI and maintaining a sufficiently large freshness advantage F.
Assuming that there is an eavesdropper, this paper considers transmitting packets over Ber/Geo/1/2 queue modeled status updating systems, and analyzes the relations between packet freshness and transmission security, where freshness is characterized using average AoI while security performance is measured by the proportion of obtained insecure packets. The motivation of considering systems with Ber/Geo/1/2 queue are explained as follows. Firstly, notice that the system with capacity 1 buffer is the simplest buffer-equipped transmission system, and this model simplifies the analysis and calculations for both average AoI and insecure packet proportion. In addition, although the numerical simulations in work [5,6] demonstrated that the average AoI of the M/M/1/2 queue modeled system almost has no advantage over that of the system with the M/M/1/1 queue, reserving some arriving packets waiting for transmission not only improves utilization of the source node’s energy but the packets themselves may convey some useful information, such as synchronization signals and the estimation state of wireless channels.
In order to control the number of insecure packets arriving at the receiver, we adopt a probabilistic deletion/retaining transmission scheme. Specifically speaking, in each time slot, an insecure packet is deleted with probability , and with probability this packet is retained and transmission continues. Here, we explain that deleting one insecure packet may be very effective. In real-time communication scenarios, in order to reduce the average AoI, usually each packet has a few bytes such that transmitting one packet takes a short time. Consequently, it is necessary not for an eavesdropper to have a strong eavesdropping ability for a long time but for the eavesdropper to have a strong eavesdropping ability for a short period of time. Then, with large probability one packet can be eavesdropped. Considering that each packet contains only a small amount of data, we believe that in real-time applications, such as autonomous vehicles, deleting an insecure packet directly is more appropriate than using some secure transmission policies, for example, encrypting the transmitted packets.
Based on system models and transmission policy, we derive the average AoI of the system, which we call average secure AoI, . In addition, as the function of deletion probability , the proportion of insecure packets obtained in the receiver, , is also determined. Combining and , the relationships between transmission timeliness and transmission security can be analyzed. Provided and , actually we establish the following achievability relationships: we can achieve average AoI under the restriction that the proportion of the obtained insecure packet is at most .
In this paper, we use insecure packet proportion to be the transmission security measurement. Here, we propose one situation where the insecure packets proportion can be linked to the amount of information leaked to the eavesdropper. Consider that the packets are encoded to be identical-length codewords, for example, by maximum distance separable (MDS) codes. Assuming that each codeword is composed of L symbols, and decoding a codeword requires at least symbols, in the legitimate receiver, as long as is controlled below , with large probability the eavesdropper cannot restore the original packet, and thus obtains no information. By introducing encoding and decoding procedures, one can establish the relationships between and average leaked information. In practical applications such as autonomous driving, encoding packets are usually necessary, which facilitates the unified processing of packets in the entire system. Under the redundancy protection mechanism brought by encoding strategies, allowing some packets to be insecure rather than waiting for enough secure packets can advance the decoding time at the receiver, thereby accelerating the response speed of autonomous cars. Using packet encoding and decoding provides helpful inspiration for the design of real-time systems like autonomous vehicles and some others.
The main contributions of this paper are summarized as follows.
Under probabilistic deletion/retaining transmission policy, we derive the formula of average secure AoI and the insecure packet proportion . To verify the correctness of the average AoI formula, we prove that in cases of , average secure AoI reduces to , i.e., the average AoI of system with basic Ber/Geo/1/2 queues.
We further consider two special cases. In the first one, , and in the second case, . We determine the average AoI for both cases and explain that when , the considered problem degenerates to analyzing AoI for the system with a random service time deadline, while by setting , the average secure AoI is actually equal to the average AoSI of the system.
The relationships between and are investigated through numerical simulations. We demonstrate that depending on the value of , the average secure AoI varies in different trends with . In most cases, especially when , it is shown that and can be minimized simultaneously by setting .
For a system with random service time deadline, numerical simulations show that in most cases, imposing such a deadline cannot reduce the average AoI. This result actually negates the effectiveness of imposing a service time deadline in improving transmission timeliness, at least in Ber/Geo/1/2 queue modeled systems.
In the Discussion and Conclusion section, we provide brief comments discussing the rationality of different security measures proposed in real-time communication scenarios.
The rest of the paper is organized as follows. We introduce the system model, the parameters, and transmission policy in Section 2. By constructing a four-dimensional state vector and calculating the probability generation function of AoI, we derive the formula of average secure AoI in Section 3. It is verified that when , average secure AoI degenerates to , which checks the correctness of the obtained formula. In Section 4, two other special cases are analyzed, where we let in the first one and in the second one. The average AoI for both cases are determined. In Section 5, we provide numerical simulation for the results obtained in Section 3 and Section 4. The relationships between and are investigated by analyzing numerical examples. In particular, we show that when changing the value of , varies in different trends with . Finally, in Section 6, we conclude the paper, make brief comments on the security measures, and discuss some possible further works.
2. System Model and Problem Formulation
We describe the considered status updating system depicted in Figure 1.
At each time slot, the source s generates a new packet with probability p. Following the First Come-First Served (FCFS) rule, these packets are delivered to the receiver d through the transmitter. The newly arrived packets that are unable to be served are temporarily stored in the capacity 1 buffer. When there are packets in both the server and the buffer, other arriving new packets are blocked and discarded. At the receiver, the age of information (AoI) is defined as the difference between the current time and the generation instant of the latest obtained packet. The value of AoI increases by 1 after each time slot if no newer packet is obtained. Every time a fresher packet, with a smaller age, arrives at d, this packet replaces the old one, and the value of the AoI is reduced to its instantaneous age. Long-term average AoI or other AoI-related quantities have been used widely to measure the freshness of obtained packets and demonstrate the system’s timeliness of transmitting status updates. Obviously, a lower average AoI means the system has better real-time transmission performance.
During packet transmissions from the source to the receiver, it is assumed that an eavesdropper attempts to probe the communication link between s and d and steal the information contained in the packets. Due to signal fadings and the unreliability of wireless channels, in the considered model, we assume that a transmitted packet is obtained at the legitimate receiver with probability , and the successful eavesdropping probability is equal to . Equivalently, both transmission links are modeled as i.i.d. erasure channels. In general situations, we have . That is, for each packet the probability of successfully transmitting to a legitimate receiver is higher than that of being eavesdropped. If a transmitted packet is eavesdropped before arriving at d, we define it as an insecure packet. Once a packet becomes insecure due to eavesdropping, we assume that a help ACK signal is sent back to the transmitter. Therefore, the transmitter knows whether the current packet is secure or not at all times.
The goal of this paper is deriving achievable average AoI under the condition that the proportion of insecure packets that the receiver obtains is controlled. To do this, we apply the random deletion/retaining transmission scheme. More specifically, we consider that at the beginning of each time slot, with probability , the transmitter discards an insecure packet and starts sending the next new and secure one, if there is such a packet, in the buffer. Otherwise, with probability , the transmitter will still send the insecure packet in this time slot. If this packet is not obtained by the receiver, this probabilistic deletion/retaining scheme is performed again at the beginning of the next time slot until this insecure packet arrives at d, or is deleted by the transmitter. Based on the proposed system assumptions and the above transmission scheme, in this paper we derive the average AoI of the system, which we call the average secure AoI. Provided average secure AoI and insecure packet proportion, the relationships between packet freshness and transmission security are investigated in depth.
3. Analysis of Age of Secure Information for Ber/Geo/1/2 Queue Modeled Status Updating System
As a whole, we define four-dimensional state vectors and to represent the AoI, age of packet under the service, and age of packet in the buffer. The last component 0 indicates that the currently served packet is secure, while 1 denotes that the packet in the server is insecure. Here, there is nothing special about 0 and 1; they can be replaced by any two distinguishable notations. In the following, we show that the random transfers of and can be described clearly, and average secure AoI is obtained by analyzing the steady state of the four-dimensional random process constructed by and .
In a time slot, we define binary random variables A, , , and F to represent if the source generates a new packet, if the transmitted packet arrives at the receiver and the eavesdropper, and whether the transmitter deletes the insecure packet. According to different values of these variables, we list all of the state vector transfers in Table 1. State vectors , denote that the buffer is empty, and the packet under service is secure if the last component is 0, or is insecure when the last component is 1. The last case means that both the server and the buffer are empty. Since there is no packet in the server, in these cases, the last component 0 does not indicate a secure packet.
Brief explanations are given for state vector transfers in Table 1. For initial state vector , a secure packet of age m is under the service. The realizations of and represent the packet being transmitted to d and E. For the case of , it means that at (the right endpoint of) this time slot, neither the receiver nor the eavesdropper obtains the packet, and thus the state vector changes to . If , that is, the eavesdropper obtains the packet but the receiver does not, in this case, the transmitted packet becomes insecure and the random deletion/retaining scheme is performed. The insecure packet is deleted with probability , which is denoted by , resulting in the state vector transferring to . Since the new packet of age is secure, the last component is reset to 0. On the contrary, with probability , i.e., when , the insecure packet is retained, and it sees that the initial state vector changes to . According to similar discussions, it is easy to determine the state vector transfers under the conditions and , and that from other initial states. It is worth noticing that for and , the packet under the service is insecure because it has been obtained by an eavesdropper. Therefore, when describing state vector transfers, we only need to consider the realizations of A, , and F.
Assuming that the constructed random process reaches the steady state, according to the probability balance conditions, we determine the stationary equations as follows:
Each equation in (1) shows how the state vector on the left can be transferred to from the state vectors on the right under their corresponding conditions.
We denote as the stationary AoI of the system when a probabilistic deletion/retaining scheme is applied. From the expectation formula, the average secure AoI is calculated as
where in general cases
since the AoI is represented by the first component of the four-dimensional state vector.
Define the probability generation function as
Equation (5) is obtained by substituting (3). It sees from (4) that
In the following paragraphs, we obtain the average secure AoI by deriving and calculating its derivative at .
To obtain , we denote that
Lemma 1.
The functions defined in (7)–(9) satisfy the relationships that
We prove Lemma 1 in Appendix A. Using Equations (10)–(12), it shows that
By calculating the derivative of (13) and letting , the average secure AoI is determined to be
in which we denote that , .
We determine , , , and in the following Lemma 2.
Lemma 2.
The derivatives of and at are determined by equations
in which
and for the second equation,
Define , it proves that is determined by
Denote
then , and finally is given as
Derivations of results (15)–(27) are given in Appendix B. Combining Lemma 2 and Equation (14), we derive average secure AoI as follows.
Theorem 1.
Assuming that the packets transmitted through a Ber/Geo/1/2 queue modeled status updating system are eavesdropped with probability in each time slot, when applying the probabilistic deletion/retaining transmission scheme, the average secure AoI of the system is derived to be
where
the superscript represents transposition. In Equation (28), we denote and to be
Substituting (33) into (14) gives the average secure AoI in Equation (28). This completes the proof of Theorem 1. □
The formula given in Theorem 1 is complex. With special case , we first verify that Equation (28) reduces to the average AoI of a basic Ber/Geo/1/2 queue modeled status updating system.
In the case of , Equations (A15) and (A16) are simplified to
Combining (13), (40), (41), and (38), one can calculate that
Finally, through direct calculation,
where in (44), we denote as the discrete traffic intensity. Equation (44) is exactly the average AoI of the status updating system that uses the Ber/Geo/1/2 queue, which was determined in our previous work [29].
Notice that when , all of the packets that are sent out from transmitter will never be obtained by the eavesdropper. As a result, the probabilistic deletion/retaining is never triggered, and all the packets are transmitted to the receiver securely. In this case, it is proved that average secure AoI degenerates to . Since the probabilistic deletion/retaining scheme is never performed, it is observed that deletion probability disappears in Equations (34)–(41), and finally is not contained in the average AoI formula.
We use average AoI to characterize packet freshness, while the transmission security of the system is measured by the proportion of insecure packets that the receiver obtains. In following theorem, we determine this insecure packet proportion under a probabilistic deletion/retaining transmission scheme.
Theorem 2.
Let the deletion probability be δ. When applying the probabilistic deletion/retaining scheme to transmit packets over the Ber/Geo/1/2 queue modeled status updating system, the probability that an insecure packet arrives at the receiver, as well as the proportion of insecure packets that the receiver obtains over a long period of time, which is denoted as , is determined to be
Proof.
Define three events as
Then,
Let , , and be the time that a packet is transmitted to d, E, and that of being deleted under the probabilistic deletion/retaining scheme. Event requires that , while event needs . Due to the memoryless property of geometric distributions, these two events are independent. Therefore,
This derives the results in Theorem 2. □
For the given deletion probability , characterizes the freshness of the obtained packets, while , i.e., the proportion of insecure packets that are transmitted to the receiver, can be viewed as the security measurement of the system. Combining Theorem 1 and Theorem 2, and by introducing deletion probability , we actually establish the relationships between the timeliness performance and security performance of the considered status updating system, which enables us to investigate the tradeoffs between these two performance types.
4. Packet with Random Service Time Deadline and Average Age of Secure Information
Before investigating the relationships between , and system parameters p, , and , in this section we further consider two special cases of Equation (28) by setting and . We explain that corresponds to the situation with the packet with geometric deadline in service process. When , the average secure AoI is equal to the average age of secure information (AoSI) that was studied in works [39,40] for bufferless systems.
4.1. Packet with Random Geometric Deadline in Service Process:
Assuming that , then in every time slot, each packet that enters the server will be obtained by an eavesdropper. This is equivalent to saying that each transmitted packet is insecure and a probabilistic deletion/retaining scheme will be performed in every time slot as long as there is a packet in service. With probability , the packet is deleted, and with probability , this packet is retained. Observing that this transmission situation is exactly the scenario of transmitting packets under the restriction that the packets are controlled by the geometric deadline in service process, in this subsection, we derive the explicit formula of average AoI.
Letting , the main results required to derive are simplified to be
and
From Equations (49)–(55), we have the following theorem.
Theorem 3.
For the case where packets are restricted by a random geometric deadline during service process, the average AoI of Ber/Geo/1/2 queue modeled status updating system is determined as
in which δ is the expiration probability in each time slot. Two numbers and are given in (49) and (50) by noting that , and , are obtained by
and
in which N represents that
Proof.
Calculating the derivative of (53) and letting , we have
This derives the average AoI in (56). Since and were obtained in Equations (49) and (50), the remaining work to determine is obtaining and .
Taking the derivative of both sides of (54) and (55), it proves that
and
Notice that during the calculations, we substitute
which is then combined with (64) to determine that
So far, both and are obtained. Thus, the proof is completed. □
4.2. Average Age of Secure Information:
Different from in Section 4.1, in the second case we let . This means the transmitter will delete one packet immediately upon it becoming insecure. It is interesting to compare the differences in the impact on packets caused by controlling strategies in these two cases. Notice that if , then packet deletion is performed with probability in each time slot. However, in the case of , the packet is deleted with probability 1 but is not performed in every time slot, i.e., only in time slots when the served packet is insecure. The average AoI derived in the case is exactly the average age of secure information (AoSI) of the Ber/Geo/1/2 queue modeled status updating system.
Like in Section 4.1, we start the analysis from a series of simplified results. By setting , we show that
and
Theorem 4.
For the Ber/Geo/1/2 queue modeled status updating system, assuming that with probability , a transmitted packet is eavesdropped in each time slot. Then, the average age of secure information, , is obtained to be
in which
and
Proof.
The proof of Theorem 4 is similar to that of Theorem 3. Thus, here we omit the derivation details of Theorem 4. □
5. Numerically Analyzing Relationships Between Freshness and Transmission Security
In Section 5.1, through numerical examples, we first investigate the change trends of average secure AoI and insecure packet proportion with respect to deletion probability , as well as the tradeoffs between these two quantities. For the two cases discussed in Section 4, the average AoI with a random geometric service time deadline is numerically analyzed in Section 5.2. Letting , we depict the relation curves of the average AoSI versus packet generation probability p, and eavesdropping probability in Section 5.3.
5.1. Average Secure AoI and Insecure Packet Proportion
First of all, in Figure 2a we depict the relationship curves showing how varies when increasing packet deletion probability from 0 to 1. We select , , and plot four curves by setting eavesdropping probability to be 0.25, 0.35, 0.4, and 0.5. Numerical results show that in general, is monotonically decreasing as becomes large, except for cases where is much larger than . These results are explained as follows. Notice that a large implies that it is more likely to delete an insecure packet, which will reduce the number of insecure packets arriving at the receiver. In some cases, deleting these insecure packets helps to improve the freshness of the obtained packets because the newer packet in the buffer can enter the server earlier and arrives at the receiver earlier. The curves with , 0.35, and 0.4 are exactly this situation. However, when increasing further, the probability that a transmitted packet becomes insecure becomes high, and a large will result in many packet deletions before they can arrive at the receiver, which deteriorates the freshness of the obtained packets. Remember that in the proof of Theorem 2, the probability that a transmitted packet becomes insecure, i.e., , is equal to
which is increasing when becomes large. It is proved by the curve corresponding to that the average secure AoI first falls then rises when becomes large from 0 to 1. From the numerical results in Figure 2a, we can conclude that in general cases, especially when , the average secure AoI is decreasing as the packet deletion probability increases. In extreme situations where is much larger than , as increases, first falls then rises, and there exists one optimal deletion probability that minimizes (approximately 0.35 in Figure 2a).
In Figure 2b, we depict the insecure packet proportion when increasing from 0 to 1. It is easy to understand that decreases as becomes large because the number of insecure packets that are transmitted to the receiver is reduced by increasing the packet deletion probability. We also plot three curves where is set to be 0.25, 0.55, and 0.75. As explained in the previous paragraph, increases when becomes large. As a result, for large , more packets change to be insecure, and the same deletion probability will cause a higher insecure packet proportion. It is verified in Figure 2b that the black curve with has the highest .
By increasing packet deletion probability , we draw the relationship curves of and in Figure 3 so as to investigate the direct tradeoffs of packet freshness and transmission security. Since is decreasing when increases, Figure 3 is read from the right to the left. It is shown in Figure 3 that as increases from 0.4 to 0.7, has different change trends when varies. When is 0.4, as reduces, is decreasing as well. Increasing to 0.5, first falls then rises. Finally, for extremely large , such as , is increasing when reduces. These results have the same explanations as those for results in Figure 2. Extremely large increases the probability that a packet becomes insecure. Then, when is large, there is a large probability that those insecure packet are deleted before being transmitted to the receiver, resulting in the average AoI increasing. Characterizing packet freshness by average AoI and representing transmission security using , numerical simulations in Figure 3 prove that depending on eavesdropping probability , varies in different trends with . In some cases, for example, the blue curve in Figure 3, both and can be minimized by setting . However, in extreme cases where is much larger than , when reducing , is increasing. That is, these two performance types cannot be optimized simultaneously.
Notice that in Figure 4 and Figure 7 of paper [5], the authors proved that the average AoI of the M/M/1/2 queue modeled system is decreasing when the packet arriving rate and service rate become large. If the probability of deleting a served packet is very small such that the average AoI is not significantly affected, in these cases, the average AoI of the system should have the similar change trends as in [5], that is, monotonically decreasing with p and . When is greater than , according to Equation (81), the probability that a packet becomes insecure is very small such that even if equals 1, the probability of deleting a packet is still not very high. Consequently, the average AoI should follow a similar change trend to that in [5], which decreases with p and . On the other hand, increasing the packet deletion probability can always reduce insecure packet proportion, and in summary, we conclude that when such that the probability of deleting a packet is small, by setting , both the average AoI and can be minimized at the same time. For extreme cases where , i.e., the capability that the eavesdropper obtains a packet is stronger than the legitimate receiver, to obtain lower average secure AoI, one should increase the emission power of the transmitter such that is increased. If is much larger than , then it is more appropriate to cancel the current transmission and restart sending the packet when decreases.
5.2. Average AoI of the Ber/Geo/1/2 Queue Modeled System with Geometric Service Time Deadline
In this part, we provide numerical examples of average AoI for the Ber/Geo/1/2 queue modeled system when the packets are controlled by a random service time deadline. Firstly, the relationship curve between average AoI and expiration probability are illustrated in Figure 4a. By fixing and increasing p from 0.25 to 0.29, we plot three curves. Referring also to Equation (81), when expiration probability is greater than , then many packets will be deleted before arriving at the receiver. This leads to an increase in the system’s average AoI. We limit the range of graphs in Figure 4a so as to make the varying trends prominent. The blue curve with shows that there exists an optimal but extremely small that minimizes (approximately 0.05 in Figure 4a), and for other two cases with larger p, is monotonically increasing as varies. Overall, the numerical results in Figure 4a prove that for most values of , which is denoted as , letting , i.e., without using a random service time deadline can achieve the minimal average AoI. Only in some extreme cases where is very high can be slightly reduced by setting a very small expiration probability.
Remember that in work [6,7], the authors demonstrated that by imposing a carefully selected waiting time deadline, one can achieves lower average AoI for M/M/1/2 queue modeled and infinity capacity status updating systems. The waiting time deadline can reduce the average AoI, while in most cases the service time deadline cannot; this reveals that if you want to delete one packet for reducing average AoI, then it is better to delete it in the earlier stages.
We depict the relations between and p in Figure 4b, in which and p varies from 0 to 0.29 such that takes the value from 0 to approximately 1. It is observed that for three cases of , 0.2, and 0.4, is decreasing with respect to p, as well as . In addition, the curve corresponding to is located at the bottom such that letting , or without using a random deadline in service process, achieves the minimal average AoI for the Ber/Geo/1/2 queue modeled system.
5.3. Average AoI of Secure Information for Ber/Geo/1/2 Queue Modeled System
Finally, we investigate how the average AoSI varies when system parameters p and change through numerical examples in Figure 5. It is shown in Figure 5a that the average AoSI decreases as p becomes large, and Figure 5b demonstrates that is increasing when the eavesdropping probability varies from small to large. Here, the main observation is that the relationships between and p, and that between and , are both monotonic. Apart from the endpoints, there is no other or that minimizes or maximizes . Notice that characterizes the average age of the secure packet; thus, increasing the eavesdropping probability will deteriorate , which is shown in Figure 5a where black curve with is located at the top, and is directly illustrated in Figure 5b. Again, this can be explained as , i.e., the probability that a packet changes to be insecure is increasing as becomes large, which leads to more packet deletions before they can arrive at the receiver.
6. Discussion and Conclusions
Assuming that there is an eavesdropper, we consider transmitting packets in a timely manner to the receiver through a Ber/Geo/1/2 queue modeled status updating system. The aim is investigating the tradeoffs between information freshness and transmission security. In this paper, packet freshness is measured by the age of information, and we use the insecure packet proportion to represent system’s transmission security, where a packet is defined to be insecure if it is obtained by the eavesdropper earlier than the receiver. We derive the formula of the average AoI , and the proportion of obtained insecure packets , under a probabilistic deletion/retaining transmission scheme. This enables us to analyze the relationships between these two performance types. As a special case of , we determine the average AoI of the system in which the transmitted packets are limited by a random service time deadline, and the average age of secure AoI. Through numerical simulations, the main conclusion is that we demonstrate that the average AoI varies in different trends depending on the value of eavesdropping probability . In general cases when , both and are minimized by setting . While for extreme cases where is very large, is increasing as reduces such that and cannot be optimized at the same time. For a system with other queuing models, for example, when the service time is deterministic, or assuming that the used deadline itself follows an arbitrary deadline, it is interesting to find the impacts of restricting the packet waiting time or service time on the average AoI of the system.
We discuss the tradeoffs of transmission timeliness and transmission security for infinity capacity system in work [41], in which we define freshness advantage F as a security measurement. In [41], F was defined as the average instantaneous gap between the eavesdropper’s AoI and legitimate receiver’s AoI. Here, it is interesting to compare the rationality of two transmission security measurements and F. Optimizing F aims to increase the time interval between the legitimate receiver and the eavesdropper obtaining the same packet, while controlling focuses on reducing the insecure packets obtained by the legitimate receiver and isolating the impact of the insecure packets on the system’s transmission security. From the authors’ point of view, if there are strong correlations between the transmitted packets, using F as a security measurement is more appropriate. Improving F expands the time interval between the legitimate receiver and eavesdropper obtaining the packets, which helps to reduce the possibility of the eavesdropper inferring other packets based on those he/she has obtained. However, for other cases of sending independent data, such as transmitting encoded packets, is more suitable because reducing insecure packets and using secure packets to restore original data can effectively enhance the security of transmitted information.
Combining the two performance types derived in the paper, i.e., , we establish the following achievability relationships: we can achieve average AoI under the restriction that the proportion of obtained insecure packets is at most . Then, a natural question is what is the minimum average AoI that the receiver can obtain when the insecure packet proportion is no larger than a certain threshold? This is one of the follow-up problems that we will consider in the future. In addition, we desire to find the freshness advantage F for the Ber/Geo/1/2 queue modeled status updating system. By comparing with F of infinite capacity systems, the effects of the buffer size on the freshness advantage can be analyzed. Notice that the average AoIs of systems with the Ber/Geo/1/2 queue and Ber/Geo/1/∞ queue vary in different trends with traffic intensity, so it is expected that there are many interesting relations and tradeoffs to be analyzed. Apart from this, there is still much work in studying the relationship between transmission timeliness and transmission security. For example, introducing encryption and decryption operations in real-time packet transmission, and exploring the relationship between a system’s real-time performance and transmission security if the packets are encoded before being sent to the receiver.
Author Contributions
Formal analysis, H.X., A.Z., D.C. and Y.X.; Writing—original draft, J.Z.; Writing—review & editing, C.L. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported by the Special Research Funding from Wuxi Taihu University under Grant 2025THQD059, in part by the National Natural Science Foundation of China under Grant 62371119 and Grant 62301266; in part by the Zhi Shan Young Scholar Program of Southeast University; and in part by the Startup Foundation for Introducing Talent of NUIST under Grant 2023r014.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.
Conflicts of Interest
The authors declare no conflicts of interest.
Appendix A. Proof of Lemma 1
We prove the relationships given in Lemma 1.
According to its definition and use stationary Equation (1), we have that
from which we obtain
For functions and , firstly we derive the following two relations about probabilities and .
From the first two rows of Equation (1), it is shown that
For probability , the third row of Equation (1) shows that
which is the recursive relation of . Applying (A3) repeatedly and using the fourth row of (1), one can verify that for ,
Collecting Equations (A1), (A5) and (A6), the proof of Lemma 1 is completed.
Appendix B. Proof of Lemma 2
In this appendix, we derive the results given in Lemma 2.
Using Equation (1), we first calculate . According to its definition and (1),
in which we define
Notice that in obtaining and in (A8), we have replaced the variables in the original summations.
Similarly, for function we have that
Using the equations in (1) and calculating each summation term, it is shown that
where
To simplify Equations (A7) and (A9), we eliminate , , and using Lemma 1. In addition, we show without detailed calculations that the relationships given in Lemma 1 also hold for functions , . More specifically, we prove that
Applying (A12)–(A14), , , and in (A7) and (A9) can be represented by and .
Omitting the calculation details, we prove that (A7) and (A9) are equivalent to
and
Calculating the derivative of z from both sides of (A15) and (A16), omitting those direct calculations, we obtain that
Notice that this relation is used in (A24) to eliminate . Combining (A26) and (A27), we obtain that
Denote
then, . Combining with (A25), we finally determine that
So far, we have obtained all the results in Lemma 2. This completes the proof.
References
Kaul, S.; Gruteser, M.; Rai, V.; Kenney, J. Minimizing age of information in vehicular networks. In Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECOM), Salt Lake City, UT, USA, 27–30 June 2011; pp. 350–358. [Google Scholar] [CrossRef]
Kaul, S.; Yates, R.; Gruteser, M. Real-time status: How often should one update? In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Orlando, FL, USA, 25–30 March 2012; pp. 2731–2735. [Google Scholar] [CrossRef]
Kaul, S.K.; Yates, R.D.; Gruteser, M. Status updates through queues. In Proceedings of the 46th Annual Conference on Information Sciences and Systems, Princeton, NJ, USA, 21–23 March 2012; pp. 1–6. [Google Scholar] [CrossRef]
Sun, Y.; Uysal-Biyikoglu, E.; Yates, R.; Koksal, C.E.; Shroff, N.B. Update or wait: How to keep your data fresh. In Proceedings of the 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; pp. 1–9. [Google Scholar] [CrossRef]
Costa, M.; Codreanu, M.; Ephremides, A. On the Age of Information in Status Update Systems with Packet Management. IEEE Trans. Inf. Theory2016, 62, 1897–1910. [Google Scholar] [CrossRef]
Kam, C.; Kompella, S.; Nguyen, G.D.; Wieselthier, J.E.; Ephremides, A. On the Age of Information with Packet Deadlines. IEEE Trans. Inf. Theory2018, 64, 6419–6428. [Google Scholar] [CrossRef]
Inoue, Y. Analysis of the Age of Information with Packet Deadline and Infinite Buffer Capacity. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 2639–2643. [Google Scholar] [CrossRef]
Inoue, Y.; Masuyama, H.; Takine, T.; Tanaka, T. A General Formula for the Stationary Distribution of the Age of Information and Its Application to Single-Server Queues. IEEE Trans. Inf. Theory2019, 65, 8305–8324. [Google Scholar] [CrossRef]
Yates, R.D.; Kaul, S.K. The Age of Information: Real-Time Status Updating by Multiple Sources. IEEE Trans. Inf. Theory2019, 65, 1807–1827. [Google Scholar] [CrossRef]
Pappas, N.; Gunnarsson, J.; Kratz, L.; Kountouris, M.; Angelakis, V. Age of information of multiple sources with queue management. In Proceedings of the IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 5935–5940. [Google Scholar] [CrossRef]
Kosta, A.; Pappas, N.; Ephremides, A.; Angelakis, V. Age of information performance of multiaccess strategies with packet management. J. Commun. Netw.2019, 21, 244–255. [Google Scholar] [CrossRef]
Dogan, O.; Akar, N. The Multi-Source Probabilistically Preemptive M/PH/1/1 Queue with Packet Errors. IEEE Trans. Commun.2021, 69, 7297–7308. [Google Scholar] [CrossRef]
Kam, C.; Kompella, S.; Nguyen, G.D.; Ephremides, A. Effect of Message Transmission Path Diversity on Status Age. IEEE Trans. Inf. Theory2016, 62, 1360–1374. [Google Scholar] [CrossRef]
Javani, A.; Zorgui, M.; Wang, Z. Age of Information for Multiple-Source Multiple-Server Networks. IEEE Trans. Netw.2025, 33, 17–34. [Google Scholar] [CrossRef]
Chen, Z.; Yang, T.; Pappas, N.; Yang, H.H.; Tian, Z.; Wang, M. Improving Information Freshness via Multi-Sensor Parallel Status Updating. IEEE Trans. Commun.2025, 73, 540–554. [Google Scholar] [CrossRef]
Moradian, M.; Dadlani, A.; Khonsari, A.; Tabassum, H. Age-Aware Dynamic Frame Slotted ALOHA for Machine-Type Communications. IEEE Trans. Commun.2024, 72, 2639–2654. [Google Scholar] [CrossRef]
Tang, Z.; Yang, N.; Sadeghi, P.; Zhou, X. Age of Information in Downlink Systems: Broadcast or Unicast Transmission? IEEE J. Sel. Areas Commun.2023, 41, 2057–2070. [Google Scholar] [CrossRef]
Wang, Q.; Chen, H. Age of Information in Reservation Multi-Access Networks with Stochastic Arrivals: Analysis and Optimization. IEEE Trans. Commun.2023, 71, 4707–4720. [Google Scholar] [CrossRef]
Fountoulakis, E.; Charalambous, T.; Ephremides, A.; Pappas, N. Scheduling Policies for AoI Minimization with Timely Throughput Constraints. IEEE Trans. Commun.2023, 71, 3905–3917. [Google Scholar] [CrossRef]
Zheng, H.; Xiong, K.; Fan, P.; Zhong, Z.; Letaief, K.B. Age of Information-Based Wireless Powered Communication Networks with Selfish Charging Nodes. IEEE J. Sel. Areas Commun.2021, 39, 1393–1411. [Google Scholar] [CrossRef]
Feng, S.; Yang, J. Precoding and Scheduling for AoI Minimization in MIMO Broadcast Channels. IEEE Trans. Inf. Theory2022, 68, 5185–5202. [Google Scholar] [CrossRef]
Tripathi, V.; Talak, R.; Modiano, E. Age of Information for Discrete Time Queues. arXiv2019, arXiv:1901.10463v1. [Google Scholar] [CrossRef]
Kosta, A.; Pappas, N.; Ephremides, A.; Angelakis, V. Non-linear Age of Information in a Discrete Time Queue: Stationary Distribution and Average Performance Analysis. In Proceedings of the IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
Kosta, A.; Pappas, N.; Ephremides, A.; Angelakis, V. The Age of Information in a Discrete Time Queue: Stationary Distribution and Non-Linear Age Mean Analysis. IEEE J. Sel. Areas Commun.2021, 39, 1352–1364. [Google Scholar] [CrossRef]
Akar, N.; Dogan, O. Discrete-Time Queueing Model of Age of Information with Multiple Information Sources. IEEE Internet Things J.2021, 8, 14531–14542. [Google Scholar] [CrossRef]
Zhang, J.; Xu, Y. On Age of Information for Discrete Time Status Updating System with Ber/G/1/1 Queues. In Proceedings of the IEEE Information Theory Workshop (ITW), Kanazawa, Japan, 17–21 October 2021; pp. 1–6. [Google Scholar] [CrossRef]
Zhang, J.; Xu, Y. On Age of Information for Discrete Time Status Updating System with Infinite Size. In Proceedings of the IEEE Information Theory Workshop (ITW), Mumbai, India, 1–9 November 2022; pp. 392–397. [Google Scholar] [CrossRef]
Zhang, J.; Xu, Y. Age Analysis of Status Updating System with Probabilistic Packet Preemption. Entropy2022, 24, 785. [Google Scholar] [CrossRef] [PubMed]
Zhang, J.; Xu, H.; Cao, D.; Xu, Y. Discrete Age of Information for Bufferless System with Multiple Prioritized Sources. IEEE Internet Things J.2024, 11, 20099–20119. [Google Scholar] [CrossRef]
Yang, Y.; Zhang, B.; Guo, D.; Xiong, Z.; Niyato, D.; Han, Z. Can We Realize Data Freshness Optimization for Privacy Preserving-Mobile Crowdsensing with Artificial Noise? IEEE. Trans. Mob. Comput.2024, 23, 11357–11374. [Google Scholar] [CrossRef]
Kim, D.; Yun, S.; Lee, S.; Lee, J.; Quek, T.Q.S. Reinforcement Learning-Based Sensing Decision for Data Freshness in Blockchain-Empowered Wireless Networks. IEEE Wirel. Commun. Lett.2024, 13, 3276–3280. [Google Scholar] [CrossRef]
Costa, M.; Sagduyu, Y.E. Timely NextG Communications with Decoy Assistance against Deep Learning-based Jamming. In Proceedings of the IEEE International Conference on Communications Workshops (ICC Workshops), Denver, CO, USA, 9–13 June 2024; pp. 554–559. [Google Scholar] [CrossRef]
Ma, Y.; Liu, K.; Liu, Y.; Zhu, L. Timeliness and Secrecy-Aware Uplink Data Aggregation for Large-Scale UAV-IoT Networks. IEEE Internet Things J.2024, 11, 17341–17356. [Google Scholar] [CrossRef]
Yang, Y.; Hanzo, L. Permutation-Based Short-Packet Transmissions Improve Secure URLLCs in the Internet of Things. IEEE Internet Things J.2023, 10, 11024–11037. [Google Scholar] [CrossRef]
Yang, Y. Secure and Timely Status Updates in the IoT using Short-Packet Permutation-Based Transmissions. In Proceedings of the IEEE 98th Vehicular Technology Conference (VTC2023-Fall), Hong Kong, China, 10–13 October 2023; pp. 1–6. [Google Scholar] [CrossRef]
Wang, Q.; Chen, H.; Mohapatra, P.; Pappas, N. Secure Status Updates under Eavesdropping: Age of Information-based Secrecy Metrics. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Vancouver, BC, Canada, 20 May 2024; pp. 01–06. [Google Scholar] [CrossRef]
Wyner, A.D. The wiretap channel. Bell Syst. Tech. J.1975, 54, 1355–1387. [Google Scholar] [CrossRef]
Xu, H.; Hu, Y.; Zhu, Y.; Yuan, X.; Schmeink, A. Achieving Secure and Fresh Information Updates via Short-Packet Communications. IEEE Wirel. Commun. Lett.2024, 13, 3232–3236. [Google Scholar] [CrossRef]
Yuan, F.; Tang, S.; Liu, D. AoI-Based Transmission Scheduling for Cyber Physical Systems Over Fading Channel Against Eavesdropping. IEEE Internet Things J.2024, 11, 5455–5466. [Google Scholar] [CrossRef]
Zhang, J.; Xu, H.; Zheng, A.; Cao, D.; Xu, Y.; Lin, C. Transmitting Status Updates on Infinite Capacity Systems with Eavesdropper: Freshness Advantage of Legitimate Receiver. Entropy2025, 27, 571. [Google Scholar] [CrossRef]
Figure 1.
Ber/Geo/1/2 queue modeled status updating system with probabilistic packet deletion during the service process incurred by eavesdropping. Packet arrivals form the Bernoulli process. The objective is studying the relationships between the transmission timeliness and transmission security, which are represented by the average AoI of the legitimate receiver and the proportion of insecure packets that the receiver obtains over a long period of time.
Figure 1.
Ber/Geo/1/2 queue modeled status updating system with probabilistic packet deletion during the service process incurred by eavesdropping. Packet arrivals form the Bernoulli process. The objective is studying the relationships between the transmission timeliness and transmission security, which are represented by the average AoI of the legitimate receiver and the proportion of insecure packets that the receiver obtains over a long period of time.
Figure 2.
Numerical examples of average secure AoI and insecure packet proportion versus deletion probability . (a) Relations between and probability ; (b) Insecure packet proportion vs. .
Figure 2.
Numerical examples of average secure AoI and insecure packet proportion versus deletion probability . (a) Relations between and probability ; (b) Insecure packet proportion vs. .
Figure 3.
Tradeoffs between average secure AoI and insecure packet proportion as a function of packet deletion probability .
Figure 3.
Tradeoffs between average secure AoI and insecure packet proportion as a function of packet deletion probability .
Figure 4.
Relations between average AoI and , p in cases of system with random service time deadline. (a) Average AoI versus expiration probability; (b) Relations of average AoI and probability p.
Figure 4.
Relations between average AoI and , p in cases of system with random service time deadline. (a) Average AoI versus expiration probability; (b) Relations of average AoI and probability p.
Figure 5.
Average AoSI varies as packet generation probability p and eavesdropping probability increases. (a) Average AoSI varies as p increases; (b) Relations between average AoSI and .
Figure 5.
Average AoSI varies as packet generation probability p and eavesdropping probability increases. (a) Average AoSI varies as p increases; (b) Relations between average AoSI and .
Table 1.
State vector transfers of and .
Table 1.
State vector transfers of and .
Initial State Vector
Considered Random Variables
State Vector at Next Time Slot
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Zhang, J.; Xu, H.; Zheng, A.; Cao, D.; Xu, Y.; Lin, C.
Timely Updating on Ber/Geo/1/2 Queue Modeled Status Updating System with Eavesdropper. Entropy2025, 27, 972.
https://doi.org/10.3390/e27090972
AMA Style
Zhang J, Xu H, Zheng A, Cao D, Xu Y, Lin C.
Timely Updating on Ber/Geo/1/2 Queue Modeled Status Updating System with Eavesdropper. Entropy. 2025; 27(9):972.
https://doi.org/10.3390/e27090972
Chicago/Turabian Style
Zhang, Jixiang, Han Xu, Anqi Zheng, Daming Cao, Yinfei Xu, and Chengyu Lin.
2025. "Timely Updating on Ber/Geo/1/2 Queue Modeled Status Updating System with Eavesdropper" Entropy 27, no. 9: 972.
https://doi.org/10.3390/e27090972
APA Style
Zhang, J., Xu, H., Zheng, A., Cao, D., Xu, Y., & Lin, C.
(2025). Timely Updating on Ber/Geo/1/2 Queue Modeled Status Updating System with Eavesdropper. Entropy, 27(9), 972.
https://doi.org/10.3390/e27090972
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.
Article Metrics
No
No
Article Access Statistics
For more information on the journal statistics, click here.
Multiple requests from the same IP address are counted as one view.
Zhang, J.; Xu, H.; Zheng, A.; Cao, D.; Xu, Y.; Lin, C.
Timely Updating on Ber/Geo/1/2 Queue Modeled Status Updating System with Eavesdropper. Entropy2025, 27, 972.
https://doi.org/10.3390/e27090972
AMA Style
Zhang J, Xu H, Zheng A, Cao D, Xu Y, Lin C.
Timely Updating on Ber/Geo/1/2 Queue Modeled Status Updating System with Eavesdropper. Entropy. 2025; 27(9):972.
https://doi.org/10.3390/e27090972
Chicago/Turabian Style
Zhang, Jixiang, Han Xu, Anqi Zheng, Daming Cao, Yinfei Xu, and Chengyu Lin.
2025. "Timely Updating on Ber/Geo/1/2 Queue Modeled Status Updating System with Eavesdropper" Entropy 27, no. 9: 972.
https://doi.org/10.3390/e27090972
APA Style
Zhang, J., Xu, H., Zheng, A., Cao, D., Xu, Y., & Lin, C.
(2025). Timely Updating on Ber/Geo/1/2 Queue Modeled Status Updating System with Eavesdropper. Entropy, 27(9), 972.
https://doi.org/10.3390/e27090972
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.