Age of Information Games Between Power Constrained Schedulers and Adversaries

Subhankar Banerjee , Sennur Ulukus and Anthony

Abstract

Abstract: We consider a time slotted communication network consisting of a base station (BS), an adversary, 𝑁 users and 𝑁 𝑠 communication channels. In the first part of the paper, we consider the setting where 𝑁 𝑠 communication channelsN 𝑠 are heterogeneously divided among 𝑁 users. The BS transmits an update to the𝑖th user on a subset of the communication channels N 𝑠,𝑖 whereN 𝑠,𝑖 ∩N 𝑠,𝑗 is not necessarily an empty set. At each time slot, the BS transmits an update packet to a user through a communication channel and the adversary aims to block the update packet sent by the BS by blocking a communication channel. The BS has 𝑛 discrete transmission power levels to communicate with the users and the adversary has π‘š discrete blocking power levels to block the communication channels. The probability of successful transmission of an update packet depends on these power levels. The BS and the adversary have a transmission and blocking average power constraint, respectively. We provide a universal lower bound for the average age of information for this communication network. We prove that the uniform user choosing policy, the uniform communication channel choosing policy with any arbitrary feasible transmission power choosing policy is 4 optimal; and the max-age user choosing policy, the uniform communication channel choosing policy with any arbitrary feasible transmission power choosing policy is 2 optimal. In the second part of the paper, we consider the setting where the BS chooses a transmission policy and the adversary chooses a blocking policy from the set of randomized stationary policies andN 𝑠,𝑖 =N 𝑠 for all𝑖, i.e., all users can receive updates on all channels. We show that a Nash equilibrium may or may not exist for this communication network, and identify special cases where a Nash equilibrium always exists.

Keywords: Age of information , power constrained adversary , Nash equilibrium

I. INTRODUCTION

We consider a wireless communication system consisting of 𝑁 users, one base station (BS), [TeX:] $$N_s$$ communication channels and an adversary. A communication channel can have different channel gains to different users, and thus, all the sub-carriers may not be available to all the users for transmission of an update packet [1]. We consider the static setting. Thus, the communication channels are divided into 𝑁 potentially overlapping sets, where each set corresponds to a user. We denote the set of communication channels available to user 𝑖 as [TeX:] $$\mathcal{N}_{s, i}.$$ A sub-carrier can be an element of multiple sets, and thus, the set [TeX:] $$\mathcal{N}_{s, i} \cap \mathcal{N}_{s, j}$$ is not necessarily empty. The cardinality of [TeX:] $$\mathcal{N}_{s, i} \text { is } N_{s, i}$$. The set of all available channels is [TeX:] $$\mathcal{N}_s=\bigcup_i \mathcal{N}_{s, i},$$ and has cardinality [TeX:] $$N_s.$$ There are 𝑛 discrete power levels available to the BS for transmission of an update packet to the users and π‘š discrete power levels available to the adversary to block the transmission of an update packet. We consider a slotted time model. At each time slot, the BS chooses a transmission power to transmit an update packet to a user via a communication channel and the adversary chooses a communication channel and a blocking power to block any update packet that is being sent on the chosen channel. Though there are multiple communication channels available, because of the transmission power constraint, we assume that at each time slot, the BS can transmit an update packet to only one user. However, after choosing a power level, how the BS should split that power and transmit update packets to multiple users can be an interesting extension of this work. The system model studied in this paper is a useful abstraction of scenarios, where there is a transmitter who wants to minimize the age and a jammer who wants to maximize the age at a receiver, in the case the power constrained transmitter has multiple channels to use for transmitting update packets.

A large amount of work has been done on the analysis of age of information for various applications and system models, such as, scheduling policies for wireless networks, gossip networks, caching systems, source coding problem, remote estimation, energy harvesting systems and many more, see e.g., [2]–[46]. These papers consider systems without an adversary. The age of information in the presence of an adversary in a wireless communication network has been studied in the recent literature [47]–[55]. In particular, [54], [55] consider an adversarial gossip network. In this paper, we do not consider a gossip network, rather we consider that a central node, i.e., the BS transmits the update packets to the users. [47], [48] consider an adversary which decreases the signal to noise ratio of a communication link through jamming, due to which the rate of the communication decreases which results in a higher age for the communication system. In this paper, we consider that when the adversary blocks a communication channel it completely eliminates the update packet with a positive probability. [49] considers an adversary which blocks the communication channel for a duration in time which increases the average age of the system by disabling communication in that interval. In this paper, we consider that the adversary blocks the communication channel in a time slotted manner. [50], [51] consider an adversary which completely eliminates the update packet, however, they do not consider any power constraint on the adversary. In this paper, we consider a power constrained adversary. [52], [53] consider a power constrained adversary which completely eliminates the update packet. They have considered that on the time horizon 𝑇, the adversary blocks [TeX:] $$\alpha T$$ time slots where 0 < 0 < 1. On the contrary, in this paper, we consider that at each time slot 𝑑, the adversary chooses one of the π‘š blocking power levels with a pmf d(𝑑) and the expected power to be less than or equal to a power constraint. Different than the adversary in [52], [53], the adversary in this paper completely eliminates the update packet with a positive probability (strictly less than 1), and this probability depends on the blocking power chosen by the adversary and the transmission power chosen by the BS.

References [50], [51] have considered the problem in an online learning setting and studied the competitive ratio. Different than these works, in the first part of this paper, we study the behavior of the average age in the presence of the worst adversarial actions, as formally defined in (4). First, we find a lower bound on the average age for this setting. Then, we propose algorithms and study how they perform under the worst adversarial actions for the described wireless communication network. Specifically, we show that the uniform user choosing policy together with the uniform communication channel choosing policy and any arbitrary feasible transmission power choosing policy is 4 optimal, and in a special case, it is 2 optimal. We also show that the maximum-age user choosing policy together with the uniform communication channel choosing policy and any arbitrary feasible transmission power choosing policy is 2 optimal. References [52], [53] have considered a power constrained adversary, however due to the difference in how we define the power constraint in this paper compared to [52], [53], as discussed above, the techniques we use in this paper to prove the lower bound on the average age are different.

In the second part of this paper, we relax the system model and consider that at each time slot the BS can choose any one of the [TeX:] $$N_s$$ sub-carriers for transmission of an update packet to any one of the 𝑁 users, i.e., [TeX:] $$\mathcal{N}_{s, i}=\mathcal{N}_s,$$ for all 𝑖. We also restrict the action space of the BS and the action space of the adversary only to the stationary policies. As the BS aims to minimize the average age and the adversary aims to maximize the average age of the communication network, we pursue a multi-objective solution concept in a game theoretic setting. Specifically, we study the Nash equilibrium of this problem, as opposed to the first part of the paper, where we evaluate the performance of different transmission policies under the worst-case adversarial actions. If a Nash equilibrium for this problem exists, then we know that this point is optimal for both the adversary and the BS if they act simultaneously, i.e., neither of them could improve their performance by changing their policy while the other’s policy remains unchanged.

If the power level choosing algorithms are not fixed for the BS and for the adversary and if those are included in the action space of the BS and the action space of the adversary, then we show that in the stationary policy regime a Nash equilibrium may not exist. We give a counter example to prove this. We also show a special case in which the Nash equilibrium exists. However, when the power level choosing algorithms for the BS and for the adversary are fixed, i.e., those are not included in the list of the actions of the BS and the list of the actions of the adversary, then the Nash equilibrium always exists.

II. SYSTEM MODEL AND PROBLEM FORMULATION

At each time slot, the BS schedules a user 𝑖 out of 𝑁 users, 𝑁 > 1, with a user choosing algorithm [TeX:] $$\pi_u$$ and chooses a communication channel out of [TeX:] $$N_{s, i}$$ communication channels, [TeX:] $$N_{s, i}\gt 1 \text {, }$$ with a communication channel choosing algorithm [TeX:] $$\pi_s$$ to transmit an update packet to the scheduled user 𝑖. In this paper, we use sub-carrier and communication channel interchangeably. We consider that 𝑛 discrete transmission powers, namely [TeX:] $$\left\{p_1, p_2, \cdots, p_n\right\}$$ are available to the BS, and at each time slot the BS chooses one of these 𝑛 transmission powers, following a power choosing algorithm [TeX:] $$\pi_p.$$ Thus, an action of the BS is a triplet [TeX:] $$\left(\pi_u, \pi_s, \pi_p\right)$$ and we call a valid triplet as a BS scheduling algorithm Ο€. We call the set of all causal scheduling algorithms as Ξ . Let us consider that [TeX:] $$\pi_p$$ is such that at time slot 𝑑 the BS chooses the 𝑖th transmission power with probability [TeX:] $$e_i(t)$$. We consider the following power constraint for the BS,

(1)
[TeX:] $$\sum_{i=1}^n e_i(t) p_i \leq \bar{p}, \quad t \in\{1, \cdots, T\}$$

We consider that an adversary is present in the system as well. At each time slot, the adversary chooses a sub-carrier out of [TeX:] $$N_s$$ sub-carriers following an algorithm [TeX:] $$\psi_s$$ to block any update packet that is being transmitted by the BS in that subcarrier. We consider that π‘š discrete blocking powers, namely [TeX:] $$\left\{p_1^{\prime}, p_2^{\prime}, \cdots, p_m^{\prime}\right\}$$ are available to the adversary and at each time slot the adversary chooses one of these powers, following a blocking power choosing algorithm [TeX:] $$\psi_p,$$ to block any update packet on the sub-carrier chosen by [TeX:] $$\psi_s.$$ Thus, an action of the adversary is a pair [TeX:] $$\left(\psi_s, \psi_p\right)$$ and we call a valid pair as an adversarial action [TeX:] $$\psi$$. We call the set of all valid adversarial actions as [TeX:] $$\Psi$$. Let us consider that [TeX:] $$\psi_p$$ is such that at time slot 𝑑, the adversary chooses the 𝑖th blocking power with probability [TeX:] $$d_i(t).$$ We consider the following power constraint for the adversary,

(2)
[TeX:] $$\sum_{i=1}^m d_i(t) p_i^{\prime} \leq \tilde{p}, \quad t \in\{1, \cdots, T\}$$

We create an [TeX:] $$n \times m$$ matrix F, whose (𝑖, 𝑗 )th element, [TeX:] $$f_{i, j},$$ represents the probability of successful transmission of an update packet corresponding to the BS transmission power [TeX:] $$p_i$$ and adversary blocking power [TeX:] $$p_j^{\prime}.$$ Thus, at time slot 𝑑 if the BS schedules the user π‘˜, and chooses the sub-carrier 𝑙 to transmit an update packet with power [TeX:] $$p_i$$ and if the adversary blocks the sub-carrier 𝑙 with power [TeX:] $$p_j^{\prime},$$ then with probability [TeX:] $$f_{i, j},$$ the age of the π‘˜th user at time slot (𝑑 + 1) becomes 1 and with probability [TeX:] $$1-f_{i, j}$$ the age of the π‘˜th user at time slot 𝑑 + 1 increases by one.

The age of user 𝑖 at time slot 𝑑 is defined as [TeX:] $$t-t_i(t),$$ where [TeX:] $$t_i(t),$$ is the last time slot when the 𝑖th user has successfully received an update packet. Note that the minimum value for the age of user 𝑖 is 1. We consider that at each time slot the BS has a fresh update packet to transmit for every users present in the system. Here by fresh update packet, we mean the update packet for the 𝑖th user at time slot 𝑑 is generated at time slot 𝑑. As we are interested in freshness, we assume that if the 𝑖th user does not receive the corresponding update packet at time slot 𝑑, then that update packet gets dropped at the BS without any cost. This is a valid assumption used in [50]–[53]. For a pictorial representation of the system model and the evolution of age, please see Fig. 1.

Fig. 1.
The top figure illustrates the system model with 4 sub-carriers, 2 adversarial power levels, and 2 transmission power levels. The top figure shows how the BS chooses a sub-carrier and a transmission power level for a specific user, say user 1 for this example, and how the adversary chooses a sub-carrier and a blocking power level over the time horizon 𝑇. In this figure, for user 1, if the BS chooses the lower transmission power then the sub-carrier which is chosen by the BS is shown with a light green box, and if it chooses the higher transmission power then the sub-carrier which is chosen is shown with a light blue box. It can happen that the BS does not schedule user 1 at a given time slot, for example, see time slot 4, where there are no green or blue boxes. Similarly, at a given time slot, if the adversary chooses the lower blocking power then the sub-carrier which is chosen by the adversary at that time slot is shown with an orange cross, and if it chooses the higher blocking power then the sub-carrier which chosen is shown with a red cross. The bottom figure illustrates the age evolution for user 1, corresponding to the BS and adversarial actions in the top figure. Note that whenever the BS and the adversary choose the same sub-carrier the age of user 1 drops down by a certain probability, which depends on the corresponding blocking and transmission power levels.

The adversary has the knowledge of [TeX:] $$\pi_u, \pi_s \text { and } \pi_p.$$ However, as the BS uses a randomized algorithm at time slot 𝑑, the adversary has no knowledge about which user will get scheduled, which sub-carrier will get chosen and which transmission power will get used at time slot [TeX:] $$t^{\prime} \text { when } t \leq t^{\prime} \leq T.$$ However, at time slot 𝑑 it has full knowledge about all these for time slot [TeX:] $$t^{\prime} \text { when } t \leq t^{\prime} \lt t,$$ and the adversary can optimize its future actions based on these available information. The adversary has full knowledge about the elements of each set [TeX:] $$\mathcal{N}_{s, i}.$$ The age of user 𝑖 at time slot 𝑑 corresponding to a BS scheduling algorithm Ο€ and adversarial action ψ is denoted as [TeX:] $$v_i^{(\boldsymbol{\pi}, \boldsymbol{\psi})}(t),$$ thus, [TeX:] $$v_i^{(\boldsymbol{\pi}, \boldsymbol{\psi})}(t)=t-t_i(t),$$ and the expected age of user 𝑖 at time slot 𝑑, is denoted as [TeX:] $$\Delta_i^{(\pi, \psi)}(t).$$ Note that, if the BS successfully transmits an update packet to user 𝑖 at time slot 𝑑, then [TeX:] $$v_i^{(\boldsymbol{\pi}, \boldsymbol{\psi})}(t+1)=1,$$ otherwise [TeX:] $$v_i^{(\boldsymbol{\pi}, \boldsymbol{\psi})}(t+1)=v_i^{(\boldsymbol{\pi}, \boldsymbol{\psi})}(t)+1.$$ The average age of the overall system corresponding to the BS scheduling algorithm Ο€ and adversarial action ψ is,

(3)
[TeX:] $$\Delta^{(\pi, \psi)}=\limsup _{T \rightarrow \infty} \frac{1}{T} \sum_{t=1}^T \frac{1}{N} \sum_{i=1}^N \Delta_i^{(\pi, \psi)}(t)$$

For the simplicity presentation, in the rest of the paper we ignore the superscript [TeX:] $$(\pi, \psi)$$, unless we specify otherwise. Now as the BS has no control over the adversary, we consider the following constrained optimization problem,

(4)
[TeX:] $$\begin{aligned} \Delta^*=\sup _{\boldsymbol{\psi} \in \boldsymbol{\Psi}} \inf _{\boldsymbol{\pi} \in \boldsymbol{\Pi}} & \Delta^{(\boldsymbol{\pi}, \boldsymbol{\psi}} \\ \text { s.t. } & (1),(2) \end{aligned}$$

For the second part of the paper, we consider a relaxed system model. We consider that at each time slot, all the [TeX:] $$N_S$$, sub-carriers are available to the BS to transmit an update packet to any one of the 𝑁 users, i.e., [TeX:] $$\mathcal{N}_{s, i}=\mathcal{N}_s$$ for all 𝑖. The BS chooses a scheduling algorithm and the adversary chooses an adversarial action from the corresponding sets of stationary randomized policies. In other words, [TeX:] $$\pi_u$$ is such that at each time slot the BS chooses a user following a pmf [TeX:] $$\boldsymbol{u}=\left[u_1, u_2, \cdots, u_N\right], \pi_s$$ is such that at each time slot the BS chooses a sub-carrier following a pmf [TeX:] $$s=\left[s_1, s_2, \cdots, s_{N_s}\right]$$ and [TeX:] $$\pi_p$$ is such that at each time slot the the BS chooses a power following a pmf [TeX:] $$e=\left[e_1, e_2, \cdots, e_n\right].$$ Similarly, [TeX:] $$\psi_S$$ is such that at each time slot the adversary blocks a subcarrier following a pmf [TeX:] $$a=\left[a_1, a_2, \cdots, a_{N_s}\right] \text { and } \psi_p$$ is such that at each time slot the adversary chooses a blocking power following a pmf [TeX:] $$d=\left[d_1, d_2, \cdots, d_m\right].$$ Thus, the power constraints for the adversary and the BS become [TeX:] $$\sum_{i=1}^m d_i p^{\prime}(i) \leq \tilde{p}$$ and [TeX:] $$\sum_{i=1}^n e_i p(i) \leq \bar{p},$$ respectively. When we restrict ourselves only to the stationary randomized policies, instead of writing [TeX:] $$\Delta^{\pi, \psi}$$ as in (3), we write the average age of the overall system corresponding to pmfs u, s, e (these three pmfs are chosen by the BS) and the pmfs a, d (these two pmfs are chosen by the adversary) as [TeX:] $$\Delta^{u, s, e, a, d}$$. We denote the expected age of user 𝑖 at time slot 𝑑 as [TeX:] $$\Delta_i^{u, s, e, a, d}(t) .$$ Thus, the average age for the 𝑖th user becomes

(5)
[TeX:] $$\Delta_i^{\boldsymbol{u}, \boldsymbol{s}, \boldsymbol{e}, \boldsymbol{a}, \boldsymbol{d}}=\limsup _{T \rightarrow \infty} \frac{1}{T} \sum_{t=1}^T \Delta_i^{\boldsymbol{u}, \boldsymbol{s}, \boldsymbol{e}, \boldsymbol{a}, \boldsymbol{d}}(t)$$

Let us assume that the set of all valid user choosing pmfs, the set of all valid sub-carrier choosing pmfs and the set of all valid transmission power choosing pmfs are [TeX:] $$\mathcal{F}_u, \mathcal{F}_s \text { and } \mathcal{F}_e,$$ respectively. Similarly, the set of all valid sub-carrier blocking pmfs and the set for all valid blocking power choosing pmfs are [TeX:] $$\mathcal{F}_a \text { and } \mathcal{F}_d,$$ respectively. For a given adversarial action, namely a sub-carrier blocking pmf a, and a blocking power level choosing pmf d, the BS aims to minimize the average age of the overall system by selecting a scheduling algorithm, namely a user choosing pmf u, a sub-carrier choosing pmf s and a transmission power choosing pmf e from the set 𝐡(a, d), where 𝐡(a, d) is defined as follows,

(6)
[TeX:] $$B(\boldsymbol{a}, \boldsymbol{d})=\underset{\left(\boldsymbol{u} \in \mathcal{F}_u, \boldsymbol{s} \in \mathcal{F}_s, \boldsymbol{e} \in \mathcal{F}_e, \sum_{i=1}^n e_i p_i \leq \bar{p}\right)}{\arg \min } \Delta^{\boldsymbol{u}, \boldsymbol{s}, \boldsymbol{e}, \boldsymbol{a}, \boldsymbol{d}}$$

Similarly, for a given scheduling algorithm, i.e., a triplet of pmfs (u, s, e), the adversary aims to maximize the average age by choosing a pair of pmfs, namely (a, d) from the set 𝐡(u, s, e), where 𝐡(u, s, e) is defined as

(7)
[TeX:] $$B(\boldsymbol{u}, \boldsymbol{s}, \boldsymbol{e})=\underset{\left(\boldsymbol{a} \in \mathcal{F}_a, \boldsymbol{d} \in \mathcal{F}_d, \sum_{i=1}^m d_i p^{\prime}(i) \leq \tilde{p}\right)}{\arg \max } \Delta^{\boldsymbol{u}, \boldsymbol{s}, \boldsymbol{e}, \boldsymbol{a}, \boldsymbol{d}}$$

We call a 5-tuple of pmfs, namely (u, s, e, a, d) as a Nash equilibrium point if and only if [TeX:] $$(u, s, e) \in B(a, d) \text{ and } (a, d) \in B(u, s, e)$$

In the previous Nash equilibrium setting we consider that the transmission power choosing pmf e and blocking power choosing pmf d are components of the action space of the BS and the action space of the adversary, respectively. However, if e and d are fixed and not included in the action space of the BS and the action space of the adversary, respectively, then we define,

(8)
[TeX:] $$B(a)=\underset{\left(\boldsymbol{u} \in \mathcal{F}_u, \boldsymbol{s} \in \mathcal{F}_s\right)}{\arg \min } \Delta^{\boldsymbol{u}, \boldsymbol{s}, \boldsymbol{e}, \boldsymbol{a}, \boldsymbol{d}}$$

Similarly, we write,

(9)
[TeX:] $$B(\boldsymbol{u}, \boldsymbol{s})=\underset{\left(\boldsymbol{a} \in \mathcal{F}_a\right)}{\arg \max } \Delta^{\boldsymbol{u}, \boldsymbol{s}, \boldsymbol{e}, \boldsymbol{a}, \boldsymbol{d}}$$

We call a triplet of pmfs, namely (u, s, a) as a Nash equilibrium point if and only if [TeX:] $$(u, s) \in B(a,) \text { and } a \in B(u, s) \text {. }$$

III. ALGORITHM AND ANALYSIS OF AGE

We find a fundamental lower bound for the optimization problem in (4). Let us define [TeX:] $$x=\arg \max _{i \in\{1, \cdots, m\}} p_i^{\prime} \leq \tilde{p} .$$ Consider the following adversarial action: at each time slot the adversary blocks any one of the [TeX:] $$N_S$$ sub-carriers with a uniform pmf and chooses the power level [TeX:] $$p_x$$. We denote this adversarial action as [TeX:] $$\bar{\psi}=\left(\bar{\psi}_s, \bar{\psi}_p\right)$$. At each time slot, if the BS schedules the user which has the maximum age and breaks the tie with scheduling the lower indexed user, we call that user choosing policy as the max-age policy.

Lemma 1. For the adversarial action [TeX:] $$\bar{\psi}$$, an optimal user choosing policy is the max-age policy; and if the 𝑖th user gets chosen by the max-age policy, then an optimal sub-carrier choosing policy is to choose a sub-carrier in [TeX:] $$\mathcal{N}_{s, i}$$ uniformly.

Proof: Let us assume that the user choosing algorithm employed by the BS is [TeX:] $$\bar{\pi}_u,$$ and the action of the BS corresponding to the 𝑖th user at time slot 𝑑 is [TeX:] $$\bar{\pi}_{u, i}(t).$$ Here, [TeX:] $$\bar{\pi}_{u, i}(t) \in\{0,1\},$$ and [TeX:] $$\bar{\pi}_{u, i}(t)=0$$ implies that the BS does not schedule user 𝑖 at time slot 𝑑, [TeX:] $$\bar{\pi}_{u, i}(t)=1$$ implies that the BS schedules user 𝑖 at time slot 𝑑. Similarly, assume that the BS employs [TeX:] $$\bar{\pi}_S$$ as the sub-carrier choosing algorithm. At time slot 𝑑, the action of the BS corresponding to the sub-carrier 𝑗 , [TeX:] $$j \in \mathcal{N}_i,$$ is [TeX:] $$\bar{\pi}_{s, i}(t),$$ where [TeX:] $$\bar{\pi}_{s, i}(t) \in\{0,1\} .$$ Here, [TeX:] $$\bar{\pi}_{s, i}(t)=0$$ implies that the BS does not choose sub-carrier 𝑗 at time slot 𝑑, and [TeX:] $$\bar{\pi}_{s, i}(t)=1$$ implies that the BS chooses sub-carrier 𝑗 at time slot 𝑑. Assume that the BS chooses the transmission power [TeX:] $$p_y,$$ where [TeX:] $$y=\arg \max _{i \in\{1, \cdots, n\}} p_i \leq \bar{p} .$$ Now, we can write the expected age of user 𝑖 at time slot 𝑑 + 1, conditioned on the age of user 𝑖 at time slot 𝑑 as,

(10)
[TeX:] $$\begin{aligned} \mathbb{E}[ & \left.v_i(t+1) \mid v_i(t)\right] \\ = & \left(v_i(t)+1\right)\left(1-\bar{\pi}_{u, i}(t)\right)+\frac{f_{y, x} \bar{\pi}_{u, i}(t)}{N_{s, i}} \\ & +\left(v_i(t)+1\right)\left(\frac{1}{N_{s, i}} \sum_{j=1}^{N_{s, i}} \bar{\pi}_{s, j}(t)\right)\left(1-f_{y, x}\right) \bar{\pi}_{u, i}(t) \\ & +\left(\sum_{j=1}^{N_{s, i}} \bar{\pi}_{s, j}(t) \frac{N_{s, i}-1}{N_{s, i}}\right) \bar{\pi}_{u, i}(t) \end{aligned}$$

The first term of (10), corresponds to the fact that, if the BS does not schedule the 𝑖th user at time slot 𝑑, the age of the 𝑖th user increases irrespective of the sub-carrier choosing algorithm [TeX:] $$\bar{\pi}_S$$ and sub-carrier blocking algorithm [TeX:] $$\bar{\psi}_S .$$ Now, if the BS schedules user 𝑖 at time slot 𝑑, then the age of user 𝑖 at time slot 𝑑 + 1, depends on [TeX:] $$\bar{\pi}_s, \bar{\psi}_s$$ and the probability of successful transmission corresponding to the transmission power [TeX:] $$p_y$$ and the blocking power [TeX:] $$p_x,$$ i.e., [TeX:] $$f_{y, x}$$. These facts are reflected in the last three terms of (10).

Noting the fact that [TeX:] $$\sum_{j=1}^{N_{s, i}} \bar{\pi}_{s, j}(t)=1$$ for all 𝑑, taking the expectation of [TeX:] $$v_i(t)$$ in (10) and after simplifying, we obtain

(11)
[TeX:] $$\begin{aligned} \Delta_i(t+1)= & \left(\Delta_i(t)+1\right)\left(1-\bar{\pi}_{u, i}(t)+\frac{1}{N_{s, i}}\left(1-f_{y, x}\right) \bar{\pi}_{u, i}(t)\right) \\ & +\bar{\pi}_{u, i}(t)\left(\frac{N_{s, i}-1}{N_{s, i}}+\frac{f_{y, x}}{N_{s, i}}\right) \end{aligned}$$

Note that (10) is independent of [TeX:] $$\bar{\pi}_s,$$ thus we can choose any sub-carrier blocking policy and for simplicity of later theorems we choose it to be a uniform pmf over the sub-carriers of the set [TeX:] $$\mathcal{N}_{s, i},$$ if the BS chooses user 𝑖. We define the overall age of the communication system till time slot 𝑑 + π‘˜, starting from time slot 𝑑, corresponding to a scheduling policy Ο€, and an adversarial action ψ, as

(12)
[TeX:] $$v^{(\boldsymbol{\pi}, \boldsymbol{\psi})}(t, t+k)=\sum_{j=t}^{t+k} \sum_{i=1}^N v_i^{(\boldsymbol{\pi}, \boldsymbol{\psi})}(j)$$

Note that, [TeX:] $$v^{\boldsymbol{\pi}, \boldsymbol{\psi}}(t, t+k)$$ is the sum of all the instantaneous ages of all the users till time slot 𝑑 + π‘˜ from the time slot 𝑑. Now, consider the evolution of the overall age from time slot 𝑑 to time slot 𝑑 + π‘˜. Together with the uniform sub-carrier choosing policy over the set of sub-carriers corresponding to the max-age user and the transmission power level [TeX:] $$p_y,$$ we call the max-age user choosing policy as [TeX:] $$\tilde{\pi} .$$ Then, [TeX:] $$v^{\tilde{\pi}, \bar{\psi}}(t, t+1)$$ can take two values, one corresponding to the case when there is no successful transmission and the other corresponding to the case when there is a successful transmission. We call the possible values of [TeX:] $$v^{\tilde{\boldsymbol{\pi}}, \overline{\boldsymbol{\psi}}}(t, t+k)$$ as the states of [TeX:] $$v^{\tilde{\boldsymbol{\pi}}, \overline{\boldsymbol{\psi}}}(t, t+k).$$ Note that, [TeX:] $$v^{\tilde{\pi}, \bar{\psi}}\left(t, t+k_1\right), 0 \leq k_1 \leq k,$$ can take any one of the possible [TeX:] $$2^{k_1}$$ states. Now, consider a particular instance where the BS successfully transmits update packets for all π‘˜ time slots. There is only one possible state of [TeX:] $$v^{\tilde{\boldsymbol{\pi}}, \overline{\boldsymbol{\psi}}}(t, t+k)$$ which corresponds to this particular instance of BS transmission, and the evolution of [TeX:] $$v^{\tilde{\boldsymbol{\pi}}, \overline{\boldsymbol{\psi}}}(t, t+k_1)$$ corresponding to this particular instance is deterministic. The probability of occurrence of this particular BS transmission instance is [TeX:] $$\left(\frac{N_s-1}{N_s}+\frac{f_{y, x}}{N_s}\right)^k.$$ Note that there are no other instances of BS transmission for which the state of [TeX:] $$v^{\tilde{\boldsymbol{\pi}}, \overline{\boldsymbol{\psi}}}(t, t+k)$$ can be the same as the state of [TeX:] $$v^{\tilde{\boldsymbol{\pi}}, \overline{\boldsymbol{\psi}}}(t, t+k)$$ which corresponds to all successful BS transmission instance. Thus, with the probability [TeX:] $$\left(\frac{N_s-1}{N_s}+\frac{f_{y, x}}{N_s}\right)^k, v^{\tilde{\boldsymbol{\pi}}, \overline{\boldsymbol{\psi}}}(t, t+k)$$ will be in that particular state. Together with the uniform sub-carrier choosing policy and transmission power level [TeX:] $$p_y,$$ we call an arbitrary user choosing policy as [TeX:] $$\hat{\pi} .$$ Note that [TeX:] $$v^{\hat{\pi}, \bar{\psi}}(t, t+1)$$ can have maximum 𝑁 +1 states. Similarly, [TeX:] $$v^{\tilde{\boldsymbol{\pi}}, \overline{\boldsymbol{\psi}}}(t, t+k_1)$$ can have maximum [TeX:] $$(N+1)^{k_1}$$ states. Now, consider the BS transmission instance for which the BS successfully transmits the update packets in all the π‘˜ time slots, again the probability of this instance is [TeX:] $$\left(\frac{N_s-1}{N_s}+\frac{f_{y, x}}{N_s}\right)^k.$$ For this BS transmission instance, [TeX:] $$v^{\hat{\boldsymbol{\pi}}, \overline{\boldsymbol{\psi}}}(t, t+k)$$ can have maximum [TeX:] $$N^k$$ states. Using similar arguments to those we used for the max-age user choosing policy, we claim that the total probability of occurrence of all these states is [TeX:] $$\left(\frac{N_s-1}{N_s}+\frac{f_{y, x}}{N_s}\right)^k.$$ Note that the values of [TeX:] $$v^{\hat{\boldsymbol{\pi}}, \overline{\boldsymbol{\psi}}}(t, t+k)$$ corresponding to all these [TeX:] $$N^k$$ states are greater than or equal to the value of [TeX:] $$v^{\tilde{\boldsymbol{\pi}}, \overline{\boldsymbol{\psi}}}(t, t+k)$$ corresponding to the one state which occurs at the instance of all successful BS transmission. Thus,

(13)
[TeX:] $$\mathbb{E}\left[v^{\tilde{\pi}, \bar{\psi}}(t, t+k) \mid I\right] \leq \mathbb{E}\left[v^{\hat{\pi}, \bar{\psi}}(t, t+k) \mid I\right]$$

where 𝐼 is the instance that the BS transmits the update packets successfully for all the π‘˜ time slots. We can use the same arguments for any instances of BS transmission. Thus,

(14)
[TeX:] $$\mathbb{E}\left[v^{\hat{\pi}, \bar{\psi}}(t, t+k)\right] \leq \mathbb{E}\left[v^{\tilde{\pi}, \tilde{\psi}}(t, t+k)\right]$$

completing the proof.

[TeX:] $$\text { Let us define } \bar{y}=\arg \min _{i \in\{1, \cdots, n\}} p_i \geq \bar{p} \text {. }$$

Theorem 1. The average age of the communication network defined in (3) is lower bounded by [TeX:] $$\frac{(N+1) N_s}{2\left(N_s-1+f_{\bar{y}, x}\right)} \text {. }$$

Proof: From Lemma 1, we know that when the adversarial action is [TeX:] $$\bar{\psi},$$ at each time slot, the optimal sub-carrier choosing strategy for the BS is to choose any one of the sub-carriers uniformly from the set of sub-carriers corresponding to the max-age user and the optimal user choosing algorithm is the max-age algorithm. We consider that the BS chooses power [TeX:] $$p_{\bar{y}}$$ for the transmission of an update packet, this violates the power constraint of the BS, however, with this transmission power we get a lower bound on the average age. Together with the uniform sub-carrier choosing policy and the transmission power [TeX:] $$p_{\bar{y}}$$, we call the max-age user choosing policy as [TeX:] $$\check{\pi}$$. For a user 𝑖, the whole time horizon 𝑇 can be divided into multiple blocks, where each block consists of consecutive time slots where user 𝑖 does not receive any update packet and each block ends when the user 𝑖 successfully receives an update packet. Thus, if a block starts at time slot 𝑑, 𝑑 > 1, then it implies that at time slot 𝑑 βˆ’ 1 user 𝑖 has successfully received an update packet. Consider such a block Ξ“. Now, Ξ“ can be divided into several sub blocks, [TeX:] $$\Gamma_1, \Gamma_2, \cdots, \Gamma_N,$$ where [TeX:] $$\Gamma_j$$ is the length of the consecutive time slots for which user 𝑗 is scheduled by the BS but does not receive any update packet. We define the total age of user 𝑖 in Ξ“ as [TeX:] $$\Gamma_{\text {age }}$$. Thus,

(15)
[TeX:] $$\Gamma_{\text {age }}=\sum_{j=1}^N \frac{\Gamma_j\left(\Gamma_j+1\right)}{2}+\sum_{k=2}^N\left(\sum_{j=1}^{k-1} \Gamma_j\right) \Gamma_k$$

The evolution of age corresponding to [TeX:] $$\check{\pi} \text { and } \bar{\psi}$$ is a renewal process and Ξ“ is a renewal interval. Note that [TeX:] $$\Gamma_j, j \in\{1, \cdots, N\}$$ is a geometric distributed random variable with probability of successful transmission [TeX:] $$q=\frac{N_s-1}{N_s}+\frac{f_{\bar{y}, x}}{N_s},$$

(16)
[TeX:] $$\mathbb{E}\left[\Gamma_{\text {age }}\right]=\frac{N}{2} \mathbb{E}\left[\Gamma_1^2+\Gamma_1+(N-1) \Gamma_1 \Gamma_2\right]$$

(17)
[TeX:] $$=\frac{N}{2}\left(\frac{N+1}{q^2}\right)$$

and

(18)
[TeX:] $$\mathbb{E}[\Gamma]=N \mathbb{E}\left[\Gamma_1\right]=\frac{N}{q}$$

Thus, using the renewal reward theorem [56],

(19)
[TeX:] $$\limsup _{T \rightarrow \infty} \frac{1}{T} \sum_{t=1}^T \Delta_i^{\check{\pi}, \bar{\psi}}(t)=\frac{\mathbb{E}\left[\Gamma_{\text {age }}\right]}{\mathbb{E}[\Gamma]}$$

(20)
[TeX:] $$=\frac{N+1}{2 q}$$

(21)
[TeX:] $$=\frac{(N+1) N_s}{2\left(N_s-1+f_{\bar{y}, x}\right)}$$

proving the theorem.

Now, we consider that at each time slot the BS schedules a user 𝑖 with probability [TeX:] $$\frac{1}{N}$$ and chooses one of the [TeX:] $$N_{s, i}$$ subcarriers with probability [TeX:] $$\frac{1}{N_{s, i}},$$ to transmit an update packet to the scheduled user with transmission power [TeX:] $$p_y$$ with probability Ξ² and with transmission power [TeX:] $$p_{\bar{y}}$$ with provavility (1-Ξ²), where Ξ² satisfies the following identity:

(22)
[TeX:] $$\beta p_y+(1-\beta) p_{\bar{y}}=\bar{p}$$

Let us denote this BS scheduling policy as [TeX:] $$\hat{\tilde{\pi}}.$$ Let us define [TeX:] $$\bar{x}=\arg \min _{i \in\{1, \cdots, m\}} p_i^{\prime} \geq \tilde{p}.$$

Theorem 2. The average age of the communication system when the BS employs the scheduling algorithm [TeX:] $$\hat{\tilde{\pi}}.$$ is upper bounded by 2𝑁; when [TeX:] $$N_{s, i}=N_s$$ for all 𝑖, then the average age is upper bounded by [TeX:] $$\frac{N N_s}{N_s-1+\beta f_{y, \bar{x}}+(1-\beta) f_{\bar{y}, \bar{x}}} .$$

Proof: Let us assume that the blocking power for the adversary is [TeX:] $$p_{\bar{x}}^{\prime},$$ this violates the power constraint of the adversary, however, it gives an upper bound for the scheduling policy [TeX:] $$\hat{\tilde{\pi}}.$$ First, consider the case when [TeX:] $$N_{s, i}=N_s,$$ for all 𝑖. Note that the adversary always blocks one sub-carrier in every time slot. Thus, for scheduling policy [TeX:] $$\hat{\tilde{\pi}}.$$ and any adversarial sub-carrier choosing policy, the probability of successful transmission of the update packet to the 𝑖th user is given as,

(23)
[TeX:] $$q_i=\frac{1}{N}\left(\frac{N_s-1}{N_s}+\frac{\left(\beta f_{y, \bar{x}}+(1-\beta) f_{\bar{y}, \bar{x}}\right)}{N_s}\right)$$

Note that [TeX:] $$q_i$$ does not depend on the adversarial sub-carrier blocking algorithm, thus, we choose the uniform sub-carrier blocking pmf. Together with the blocking power [TeX:] $$p_{\bar{x}}^{\prime},$$ we call the uniform sub-carrier blocking pmf as adversarial action [TeX:] $$\tilde{\psi}.$$ Note that the age of user 𝑖 is a renewal process. Thus,

(24)
[TeX:] $$\limsup _{t \rightarrow \infty} \frac{1}{T} \sum_{t=1}^T \Delta_i^{\hat{\tilde{\pi}}, \tilde{\psi}}(t)=\frac{1}{q_i}$$

(25)
[TeX:] $$=\frac{N N_s}{N_s-1+\beta f_{y, \bar{x}}+(1-\beta) f_{\bar{y}, \bar{x}}}$$

where (24) follows from the renewal reward theory [56].

Next, we consider the case when at least one of the 𝑁 sets of the communication channels has less than [TeX:] $$N_S$$ sub-carriers. If we consider that at each time slot the adversary blocks a sub-carrier from each and every set [TeX:] $$\mathcal{N}_{s, i}$$, then, we get a lower bound on [TeX:] $$q_i$$. Thus,

(26)
[TeX:] $$q_i \geq \frac{1}{N}\left(\frac{N_{s, i}-1}{N_{s, i}}+\frac{\left(\beta f_{y, \bar{x}}+(1-\beta) f_{\bar{y}, \bar{x}}\right)}{N_{s, i}}\right)$$

Therefore,

(27)
[TeX:] $$\limsup _{t \rightarrow \infty} \frac{1}{T} \sum_{t=1}^T \Delta_i^{\hat{\tilde{\pi}}, \tilde{\psi}}(t)=\frac{1}{q_i}$$

(28)
[TeX:] $$\leq 2 N$$

completing the proof.

Now, we consider that at each time slot the BS schedules the max-age user, 𝑖, and chooses one of the [TeX:] $$N_{s, i}$$ sub-carriers with probability [TeX:] $$\frac{1}{N_{s, i}}.$$ We also consider that the BS chooses power [TeX:] $$p_y$$ with probability Ξ² and power [TeX:] $$p_{\bar{y}}$$ with probability 1-Ξ², where Ξ² satisfies (22). Denote this BS scheduling policy as [TeX:] $$\tilde{\tilde{\pi}} \text {. }$$

Theorem 3. The average age of the communication system when the BS employs the scheduling algorithm [TeX:] $$\tilde{\tilde{\pi}}$$ is upper bounded by [TeX:] $$\frac{(N+1) \bar{N}_s}{2\left(\bar{N}_s-1+\beta f_{y, \bar{x}}+(1-\beta) f_{\bar{y}, \bar{x}}\right)},$$ where [TeX:] $$\bar{N}_s=\min \left\{N_{s, 1}, N_{s, 2}, \cdots, N_{s, N}\right\} .$$

Proof: At each time slot, the optimal action for the adversary is to block any one sub-carrier from the set of sub-carriers corresponding to the maximum age user. We call this subcarrier choosing policy, together with the blocking power [TeX:] $$p_{\bar{x}}$$ as the adversarial action [TeX:] $$\breve{\psi}.$$ Thus, the probability of successful transmission for any user 𝑖, [TeX:] $$q_i,$$ is lower bounded as,

(29)
[TeX:] $$q_i \geq \frac{\bar{N}_{s, i}-1}{\bar{N}_{s, i}}+\frac{\beta f_{y, \bar{x}}+(1-\beta) f_{\bar{y}, \bar{x}}}{\bar{N}_{s, i}}$$

From (20), the average age of use 𝑖 can be upper bounded as,

(30)
[TeX:] $$\limsup _{T \rightarrow \infty} \frac{1}{T} \sum_{t=1}^T \Delta_i^{\tilde{\tilde{\pi}}, \breve{\psi}}(t)=\frac{N+1}{2 q_i}$$

(31)
[TeX:] $$\leq \frac{(N+1) \bar{N}_s}{2\left(\bar{N}_s-1+\beta f_{y, \bar{x}}+(1-\beta) f_{\bar{y}, \bar{x}}\right)}$$

completing the proof.

Next, we make some concluding remarks about the findings of this section. From Theorem 1 and Theorem 2, we see that in the general setting, [TeX:] $$\hat{\tilde{\pi}} \text { is } \frac{4 N\left(N_s-1+f_{\bar{y}, x}\right)}{(N+1) N_s}$$ optimal, where

(32)
[TeX:] $$\frac{4 N\left(N_s-1+f_{\bar{y}, x}\right)}{(N+1) N_s} \leq 4$$

For the special case, when [TeX:] $$\mathcal{N}_{s, i}=\mathcal{N}_s$$, for all 𝑖, [TeX:] $$\hat{\tilde{\pi}}$$ is [TeX:] $$\frac{2(N+1)\left(N_s-1+f_{\bar{y}, x}\right)}{N\left(N_s-1+f_{y, \bar{x}}\right)}$$ optimal, where

(33)
[TeX:] $$\frac{2(N+1)\left(N_s-1+f_{\bar{y}, x}\right)}{N\left(N_s-1+f_{y, \bar{x}}\right)} \leq \frac{2\left(N_s-1+f_{\bar{y}, x}\right)}{\left(N_s-1+f_{y, \bar{x}}\right)}$$

(34)
[TeX:] $$\leq \frac{2 N_s}{N_s-1}$$

(35)
[TeX:] $$\leq 4$$

If [TeX:] $$N_s$$ is large, then the right side of (34) can be approximated as 2. Thus, for the aforementioned special case and for large [TeX:] $$N_s$$, [TeX:] $$\hat{\tilde{\pi}}$$ is 2 optimal.

From Theorem 1 and Theorem 3, we see that the scheduling policy [TeX:] $$\tilde{\tilde{\pi}}$$ is [TeX:] $$\frac{\bar{N}_s}{\bar{N}_s-1}$$ optimal and as [TeX:] $$N_{s, i}\gt 1,$$ for all 𝑖, [TeX:] $$\tilde{\tilde{\pi}}$$ is 2 optimal. Note that when [TeX:] $$\bar{p}$$ exactly matches with one of the powers from the sets [TeX:] $$\left\{p_1, p_2, \cdots, p_n\right\}$$ and [TeX:] $$\mathcal{N}_{s, i}=\mathcal{N}_s$$, for all 𝑖, then [TeX:] $$\tilde{\tilde{\pi}}$$ is the optimal scheduling policy.

IV. EQUILIBRIUM POINTS OF THE AVERAGE AGE FOR RANDOMIZED STATIONARY ACTION SPACE

Let us assume that at each time slot the BS chooses a user following a pmf u, chooses a sub-carrier following a pmf s, chooses a transmission power with a pmf e and the adversary chooses a sub-carrier with a pmf a and chooses a blocking power following a pmf d. Recall that for this section we use a relaxed system model, where we consider that [TeX:] $$\mathcal{N}_{s, i}=\mathcal{N}_s,$$ for all 𝑖. At some ime slot 𝑑, user 𝑖 successfully receives an update packet transmitted by the BS and then after waiting for [TeX:] $$\Gamma_i,$$ time slots it again receives another update packet from the BS. Note that [TeX:] $$\Gamma_i$$ is a random variable. The evolution of the age for the 𝑖th user is a renewal process and [TeX:] $$\Gamma_i$$ is a renewal interval. Thus, from the renewal reward theorem,

(36)
[TeX:] $$\Delta_i^{u, s, e, a, d}=\frac{\mathbb{E}\left[\Gamma_i^2+\Gamma_i\right]}{2 \mathbb{E}\left[\Gamma_i\right]}$$

Let the probability of successful transmission of the update packet to user 𝑖 be [TeX:] $$q_i$$. Then, [TeX:] $$\Gamma_i$$ is geometrically distributed with success probability [TeX:] $$q_i$$. Thus, (36) simplifies as,

(37)
[TeX:] $$\Delta_i^{\boldsymbol{u}, \boldsymbol{s}, \boldsymbol{e}, \boldsymbol{a}, \boldsymbol{d}}=\frac{1}{q_i}$$

Theorem 4. The optimal sub-carrier choosing pmf s, for a given adversarial action, namely, a pair of pmfs (a, d), depends only on a and is independent of user choosing pmf u, transmission power choosing pmf e and d. Moreover, if the adversary blocks any 𝑙 sub-carriers with lowest probability then the optimal choice for the BS is to choose any subset of these 𝑙 sub-carriers with probability 1. Similarly, the optimal user scheduling pmf u does not depend on a, s, d, e. The optimal user scheduling pmf is the uniform pmf.

Proof: The probability of successful transmission of an update packet to the 𝑖th user [TeX:] $$q_i$$ is as follows,

(38)
[TeX:] $$q_i=u_i\left(\sum_{j=1}^{N_s} s_j\left(1-a_j\right)\right)\left(\sum_{x=1}^n e_x \sum_{y=1}^m d_y f_{x, y}\right)$$

Therefore, the total average age becomes,

(39)
[TeX:] $$\Delta^{\boldsymbol{u}, \boldsymbol{s}, \boldsymbol{e}, \boldsymbol{a}, \boldsymbol{d}}=\sum_{i=1}^N \frac{1}{q_i}$$

(40)
[TeX:] $$=\left(\sum_{i=1}^N \frac{1}{u_i}\right) \cdot\left(\frac{1}{\sum_{j=1}^{N_s} s_j\left(1-a_j\right)}\right) \cdot\left(\frac{1}{\sum_{x=1}^n e_x \sum_{y=1}^m d_y f_{x, y}}\right)$$

Thus, for a given (a, d), the optimization problem

(41)
[TeX:] $$\underset{\left(\boldsymbol{u} \in \mathcal{F}_{\boldsymbol{u}}, \boldsymbol{s} \in \mathcal{F}_s, \boldsymbol{e} \in \mathcal{F}_e, \sum_{i=1}^n e_i p_i \leq \bar{p}\right)}{\arg \min } \Delta^{\boldsymbol{u}, \boldsymbol{s}, \boldsymbol{e}, \boldsymbol{a}, \boldsymbol{d}}$$

becomes

(42)
[TeX:] $$\begin{aligned} & \left(\underset{\boldsymbol{u} \in \mathcal{F}_{\boldsymbol{u}}}{\arg \min } \sum_{i=1}^N \frac{1}{u_i}\right) \cdot\left(\underset{\boldsymbol{s} \in \mathcal{F}_s}{\arg \min } \frac{1}{\sum_{j=1}^{N_s} s_j\left(1-a_j\right)}\right) \\ & \cdot\left(\underset{\left(e \in \mathcal{F}_e, \sum_{i=1}^n e_i p_i \leq \bar{p}\right)}{\arg \min } \frac{1}{\sum_{x=1}^n e_x \sum_{y=1}^m d_y f_{x, y}}\right) \end{aligned}$$

Thus, for a given adversarial action (a, d), [TeX:] $$\Delta^{u, s, e, a, d}$$ can be optimized with respect to u independent of s and e. Similarly, [TeX:] $$\Delta^{u, s, e, a, d}$$ can be optimized with respect to s independent of u and e. First, we find the optimal solution for the following problem,

(43)
[TeX:] $$\underset{\boldsymbol{u} \in \mathcal{F}_{\boldsymbol{u}}}{\arg \min } \sum_{i=1}^N \frac{1}{u_i}$$

The Lagrangian for (43) is

(44)
[TeX:] $$\mathcal{L}(\boldsymbol{u}, \lambda)=\sum_{i=1}^N \frac{1}{u_i}+\lambda\left(\sum_{i=1}^N u_i-1\right)$$

The optimal solution [TeX:] $$\boldsymbol{u}^*$$ satisfies [TeX:] $$\left.\nabla \mathcal{L}(\boldsymbol{u}, \lambda)\right|_{\boldsymbol{u}^*}=0$$. Solving this gives, [TeX:] $$u_i=\frac{1}{\sqrt{\lambda}}, i=1, \cdots, N \text {, }$$ which using [TeX:] $$\sum_{i=1}^N u_i=1,$$ yields [TeX:] $$u_i=\frac{1}{N} \text {, }$$ for all 𝑖.

Now, for a given adversarial action (a, d), we find the optimal solution for the following problem,

(45)
[TeX:] $$\underset{\boldsymbol{s} \in \mathcal{F}_s}{\arg \min } \frac{1}{\sum_{j=1}^{N_s} s_j\left(1-a_j\right)}$$

Without loss of generality, consider that [TeX:] $$a_1 \geq a_2 \geq \cdots \geq a_{N_s-l}\gt a_{N_s-l+1}=a_{N_s-l+2}=\cdots=a_{N_s} \text {, }$$ i.e., the adversary blocks the last 𝑙 sub-carriers with the lowest probability. Then, the equivalent problem of (45) becomes

(46)
[TeX:] $$\underset{s \in \mathcal{F}_s}{\arg \max } \sum_{j=1}^{N_s-l} s_j\left(1-a_j\right)+\left(1-a_{N_s}\right) \sum_{j=N_s-l+1}^{N_s} s_j$$

Now, (46) is maximized when [TeX:] $$\sum_{j=N_s-l+1}^{N_s} s_j=1$$ and [TeX:] $$s_k=0, k=1, \cdots, N_s-l.$$

Theorem 5. The optimal sub-carrier blocking pmf, a, for a given BS scheduling policy depends only on s and is independent of u, e and d. Moreover, if the BS chooses any 𝑙 sub-carriers with the highest probability, then the optimal choice for the adversary is to block any subset of these 𝑙 subcarriers with probability 1.

Proof: Without loss of generality, let [TeX:] $$s=\left[s_1, s_2, \cdots, s_{N_s}\right]$$ and [TeX:] $$s_1=s_2=\cdots=s_l\gt s_{l+1} \geq \cdots \geq s_{N_s} .$$ From (42), we have to solve the following problem

(47)
[TeX:] $$\underset{\boldsymbol{s} \in \mathcal{F}_s}{\arg \min } \frac{1}{\sum_{j=1}^{N_s} s_j\left(1-a_j\right)}$$

which is equivalent to solving

(48)
[TeX:] $$\underset{s \in \mathcal{F}_s}{\arg \min } s_1 \sum_{j=1}^l\left(1-a_j\right)+\sum_{j=l+1}^{N_s} s_j\left(1-a_j\right)$$

which reduces to

(49)
[TeX:] $$\underset{\boldsymbol{s} \in \mathcal{F}_s}{\arg \max } s_1 \sum_{j=1}^l a_j+\sum_{j=l+1}^{N_s} s_j a_j$$

which is maximized when [TeX:] $$\sum_{j=1}^l s_j=1.$$

Without loss of generality, let [TeX:] $$p_1 \leq p_2 \leq \cdots \leq p_n$$ and [TeX:] $$p_1^{\prime} \leq p_2^{\prime} \leq \cdots \leq p_m^{\prime}.$$ Thus, we have [TeX:] $$f_{1, j} \leq f_{2, j} \leq \cdots \leq f_{n, j}$$ and [TeX:] $$f_{i, 1} \geq f_{i, 2} \geq \cdots \geq f_{i, m}, i=1, \cdots, n, j=1, \cdots, m .$$ Algorithm 1 below provides an optimal transmission power choosing pmf e for a given blocking power choosing pmf d. The algorithm states that, if [TeX:] $$\bar{p}\lt p_1,$$ then there does not exist a feasible e; if [TeX:] $$p_n \lt \bar{p},$$ then the optimal e is to choose the power [TeX:] $$p_n$$ with probability 1; if [TeX:] $$\bar{p}$$ exactly matches one of the powers from the set [TeX:] $$\left\{p_1, p_2, \cdots, p_n\right\},$$ then the optimal e is to choose that particular power with probability 1. If these three cases do not occur, then we define [TeX:] $$x=\arg \max _{i \in\{1, \cdots, n\}, p_i \leq \bar{p}} i$$ and [TeX:] $$y=\arg \min _{i \in\{1, \cdots, n\}, p_i \geq \bar{p}} i .$$ Clearly, x < y. We define a constant, [TeX:] $$g_i=\sum_{j=1}^m d_j f_{i, j},$$ [TeX:] $$i=1, \cdots, n \text {. }$$ We call the constant [TeX:] $$\left(g_i+g_x \frac{p_y-p_i}{p_x-p_y}-g_y \frac{p_x-p_i}{p_x-p_y}\right)$$ as the coefficient for power [TeX:] $$p_i, i \in\{1, \cdots, n\} \backslash\{x, y\}.$$ Then, we traverse from power [TeX:] $$p_{y+1}$$ to power [TeX:] $$p_n,$$ we call this procedure as the first traversing procedure. During this traversing process, if we find that [TeX:] $$\left(g_j+g_x \frac{p_y-p_j}{p_x-p_y}-g_y \frac{p_x-p_j}{p_x-p_y}\right), j\gt y,$$ is a strictly positive number, then we change the coefficient of the power [TeX:] $$p_k$$ as [TeX:] $$\left(g_k+g_x \frac{p_j-p_k}{p_x-p_j}-g_j \frac{p_x-p_k}{p_x-p_j}\right), k \in\{1, \cdots, n\} \backslash\{x, j\} .$$ We keep on doing this procedure till we reach [TeX:] $$p_n.$$ Let us assume that during this traversing procedure [TeX:] $$p_i$$ is the last power for which we get a positive coefficient, then we define 𝑦 = 𝑖. Then, we start performing a second traversing procedure from the power [TeX:] $$p_{x-1}$$ to the power [TeX:] $$p_1.$$ During this traversing process, if we find that the coefficient of [TeX:] $$p_l, l\lt x,$$ is a strictly positive number, then we change the coefficient of the power [TeX:] $$p_k$$ as [TeX:] $$\left(g_k+g_l \frac{p_y-p_k}{p_l-p_y}-g_y \frac{p_l-p_k}{p_l-p_y}\right), k \in\{1, \cdots, n\} \backslash\{l, y\} .$$ We keep on doing this procedure till we reach [TeX:] $$p_1.$$ Let us assume that during this second traversing procedure [TeX:] $$p_r$$ is the last power for which we get a positive coefficient, then we define π‘₯ = π‘Ÿ. Finally, the algorithm returns [TeX:] $$\left(\frac{\bar{p}-p_y}{p_x-p_y} z_x+\frac{p_x-\bar{p}}{p_x-p_y} z_y\right)$$ as an optimal e, where [TeX:] $$z_i$$ is the 𝑖th basis vector of [TeX:] $$\mathbb{R}^n \text {. }$$

We note that, Algorithm 1 finds an optimal solution in 𝑂(𝑛) time. Next, we prove the optimality of Algorithm 1.

Theorem 6. For a given blocking power pmf d, Algorithm 1 gives an optimal transmission power pmf e.

Proof: From (42), we have to solve the following problem,

(50)
[TeX:] $$\begin{aligned} \underset{e}{\arg \max } & \sum_{i=1}^n e_i \sum_{j=1}^m d_j f_{i, j} \\ \text { s.t. } & \sum_{i=1}^n e_i=1 \\ & 0 \leq e_i \leq 1, \quad i=1, \cdots, n \\ & \sum_{i=1}^n e_i p_i \leq \bar{p} \end{aligned}$$

For a given d finding an optimal e

The first two constraints ensure that [TeX:] $$e \in \mathcal{F}_e$$ and the last one is the constraint on the BS transmission power. Now, if [TeX:] $$\bar{p}\lt p_1,$$ then the optimization problem of (50) is infeasible. If [TeX:] $$p_n\lt \bar{p},$$ then the optimal solution for (50) is to choose [TeX:] $$p_n$$ with probability 1. If [TeX:] $$\bar{p}$$ is exactly equal to one of the feasible BS transmission powers, then the optimal solution for (50) is to choose that transmission power with probability 1. Now, we consider the case where [TeX:] $$p_x\lt \bar{p}\lt p_y.$$ First, we solve (50), ignoring the constraint [TeX:] $$0 \leq e_i \leq 1, i=1, \cdots, n.$$ Thus, the constraint set is given by

(51)
[TeX:] $$\begin{aligned} e_1+e_2+\cdots+e_n & =1 \\ e_1 p_1+e_2 p_2+\cdots+e_n p_n+s & =\bar{p} \\ s & \geq 0 \end{aligned}$$

where 𝑠 is a slack variable. Now, we ignore the constraint [TeX:] $$s \geq 0$$ and pivoting on variables [TeX:] $$e_x \text { and } e_y \text {, }$$ we get the following constraints

(52)
[TeX:] $$\begin{aligned} & e_1 \frac{p_1-p_y}{p_x-p_y}+e_2 \frac{p_2-p_y}{p_x-p_y}+\cdots+e_x+\cdots+e_{y-1} \frac{p_{y-1}-p_y}{p_x-p_y} \\ & +e_{y+1} \frac{p_{y+1}-p_y}{p_x-p_y}+\cdots+e_n \frac{p_n-p_y}{p_x-p_y}+\frac{s}{p_x-p_y}=\frac{\bar{p}-p_y}{p_x-p_y} \\ & e_1 \frac{p_x-p_1}{p_x-p_y}+e_2 \frac{p_x-p_2}{p_x-p_y}+\cdots+e_{x-1} \frac{p_x-p_{x-1}}{p_x-p_y} \\ & +e_{x+1} \frac{p_x-p_{x+1}}{p_x-p_y}+\cdots+e_y+\cdots+e_n \frac{p_x-p_n}{p_x-p_y}-\frac{s}{p_x-p_y} \\ & =\frac{p_x-\bar{p}}{p_x-p_y} \end{aligned}$$

Note that as [TeX:] $$p_x\lt \bar{p}\lt p_y,$$ the right hand sides in (52) for both the constraints are strictly positive. Now, replacing [TeX:] $$e_x \text { and } e_y$$ into the objective function of (50), we obtain

(53)
[TeX:] $$\begin{aligned} & e_1 h_1(x, y)+\cdots+e_{x-1} h_{x-1}(x, y)+e_{x+1} h_{x-1}(x, y)+\cdots \\ & +e_{y-1} h_{y-1}(x, y)+e_{y+1} h_{y+1}(x, y)+\cdots+e_n h_n(x, y) \\ & +s\left(\frac{g_y}{p_x-p_y}-\frac{g_x}{p_x-p_y}\right)+g_y \frac{p_x-\bar{p}}{p_x-p_y}+g_x \frac{\bar{p}-p_y}{p_x-p_y} \end{aligned}$$

where [TeX:] $$h_i(x, y)=\left(g_i+g_x \frac{p_y-p_i}{p_x-p_y}-g_y \frac{p_x-p_i}{p_x-p_y}\right) .$$ Note that the coefficient of 𝑠 in (53) is always a negative number as [TeX:] $$g_x \leq g_y.$$ Now, assume that [TeX:] $$h_i(x, y)\lt 0, i \in\{1, \cdots, n\} \backslash\{x, y\}.$$ Then, [TeX:] $$e_i=0, i \in\{1,2, \cdots, n\} \backslash\{x, y\}$$ and and 𝑠 = 0 optimize (53). Thus, we get an optimal e as [TeX:] $$\left(\frac{\bar{p}-p_y}{p_x-p_y} z_x+\frac{p_x-\bar{p}}{p_x-p_y} z_y\right).$$

Now, let us assume that during the first traversing procedure, we observe that [TeX:] $$h_{y_1}(x, y)\gt 0,$$ where [TeX:] $$y_1=\min \left\{\bar{y} \mid y\lt \bar{y} \leq n, h_{\bar{y}}(x, y)\gt 0\right\} .$$ Now, if we pivot [TeX:] $$e_x \text { and } e_{y_1} \text {, }$$ we claim that [TeX:] $$h_{\bar{y}}\left(x, y_1\right) \leq 0, \bar{y} \in\left\{y, \cdots, y_1-1\right\} .$$ From the definition of [TeX:] $$y_1, h_{y_1}(x, y)=\left(g_{y_1}+g_x \frac{p_y-p_{y_1}}{p_x-p_y}-g_y \frac{p_x-p_{y_1}}{p_x-p_y}\right)\gt 0.$$ Thus,

(54)
[TeX:] $$\frac{p_{y_1}-p_x}{p_x-p_y}\left(g_y-g_{y_1} \frac{p_x-p_y}{p_x-p_{y_1}}+g_x \frac{p_{y_1}-p_y}{p_x-p_{y_1}}\right)\gt 0$$

(55)
[TeX:] $$\frac{p_{y_1}-p_x}{p_x-p_y} h_y\left(x, y_1\right)\gt 0$$

As [TeX:] $$\frac{p_{y_1}-p_x}{p_x-p_y}\lt 0, h_y\left(x, y_1\right)\lt 0.$$ Now, consider [TeX:] $$h_{\bar{y}}\left(x, y_1\right) \text {, }$$ where [TeX:] $$y\lt \bar{y}\lt y_1.$$ From the previous discussion, we know that the following relations are true,

(56)
[TeX:] $$h_{\bar{y}}(x, y)=\left(g_{\bar{y}}+g_x \frac{p_y-p_{\bar{y}}}{p_x-p_y}-g_y \frac{p_x-p_{\bar{y}}}{p_x-p_y}\right) \leq 0$$

(57)
[TeX:] $$h_{y_1}(x, y)=\left(g_{y_1}+g_x \frac{p_y-p_{y_1}}{p_x-p_y}-g_y \frac{p_x-p_{y_1}}{p_x-p_y}\right)\gt 0$$

From (56), we get the following lower bound on [TeX:] $$g_y,$$

(58)
[TeX:] $$g_y \frac{p_x-p_{y_1}}{p_x-p_y} \geq\left(g_{\bar{y}}+g_x \frac{p_y-p_{\bar{y}}}{p_x-p_y}\right) \frac{p_x-p_{y_1}}{p_x-p_{\bar{y}}}$$

Now, substituting this lower bound to (57) and after simplification we get

(59)
[TeX:] $$g_{y_1}+g_x \frac{p_{\bar{y}}-p_{y_1}}{p_x-p_{\bar{y}}}-g_{\bar{y}} \frac{p_x-p_{y_1}}{p_x-p_{\bar{y}}}\gt 0$$

that is, [TeX:] $$h_{y_1}(x, \bar{y})\gt 0$$ and from the above discussion we know that, this implies [TeX:] $$h_{\bar{y}}\left(x, y_1\right)\lt 0.$$ Now, similar arguments can be made for the whole first traversing procedure and the second traversing procedure as well. At the end of both traversing procedures if the pivot variables are [TeX:] $$e_{x_2} \text { and } e_{y_2}$$ then [TeX:] $$h_{\bar{y}}\left(x_2, y_2\right)\lt 0, \bar{y} \in\{1, \cdots, n\} \backslash\left\{x_2, y_2\right\}\lt 0$$ and from the previous discussion we know that we get an optimal e as [TeX:] $$\left(\frac{\bar{p}-p_{y_2}}{p_{x_2}-p_{y_2}} z_x+\frac{p_{x_2}-\bar{p}}{p_{x_2}-p_{y_2}} z_y\right) .$$

Algorithm 2 provides an optimal blocking power choosing pmf d for a given e. In Algorithm 2, we perform a similar traversing procedure as Algorithm 1. The only difference is while traversing in Algorithm 1, we change the coefficient of a power level if the corresponding coefficient is strictly positive, in Algorithm 2, we change the coefficient if it is strictly negative. Next, we state the optimality of Algorithm 2.

Theorem 7. For a given transmission power choosing pmf e, Algorithm 2 gives an optimal blocking power pmf d.

Theorem 7 can be proved by similar lines of arguments as in the proof for Theorem 6.

For a given e finding an optimal d

Next, we present a counter example which suggests that when the transmission power choosing pmf and the blocking power choosing pmf are not fixed and are part of the action space of the BS and the action space of the adversary, respectively, then a Nash equilibrium may not exist. Consider a system where the BS has three power levels and the adversary has also three power levels, i.e., 𝑛 = π‘š = 3. Both the power constraint for the BS and the adversary is 3.5 watts. The feasible powers for the BS and for the adversary are the same, which is [1, 3, 5]. The matrix F is chosen as

(60)
[TeX:] $$\boldsymbol{F}=\left[\begin{array}{ccc} 0.5 & 0.35 & 0.2 \\ 0.6 & 0.55 & 0.4 \\ 0.8 & 0.7 & 0.65 \end{array}\right]$$

We can show that for this example, for a given d, e cannot be of the form [TeX:] $$\left[e_1, e_2, e_3\right],$$ where [TeX:] $$e_i\gt 0, i \in\{1,2,3\}$$ and satisfy [TeX:] $$\sum_{i=1}^3 e_i p_i \leq \bar{p}.$$ This can be shown by following the same line of arguments made in the proof for Theorem 6. Now, from Algorithm 1, we know that if the adversary chooses powers 3 and 5, then the optimal choice for the BS is to choose powers 3 and 5, similarly, if the adversary chooses powers 1 and 5, then the optimal choice for the BS is to choose powers 1 and 5. From Algorithm 2, we know that if the BS chooses powers 1 and 5, then the optimal choice for the adversary is to choose powers 3 and 5, similarly, if the BS chooses powers 3 and 5, then the optimal choice for the adversary is to choose powers 1 and 5. Thus, a Nash equilibrium does not exist for this example.

In the next theorem, we consider the Nash equilibrium when the transmission power choosing pmf and the blocking power choosing pmf are not included in the action space of the BS and in the action space of the adversary, respectively.

Theorem 8. The triplet of actions [TeX:] $$(\hat{\boldsymbol{u}}, \hat{\boldsymbol{s}}, \hat{\boldsymbol{a}})$$ is the Nash equilibrium point, where [TeX:] $$\hat{\boldsymbol{a}} \text { and } \hat{\boldsymbol{s}}$$ are the uniform pmfs over [TeX:] $$N_s$$ sub-carriers and [TeX:] $$\hat{\boldsymbol{u}}$$ is the uniform pmf over 𝑁 users.

Proof: First, we prove that [TeX:] $$(\hat{\boldsymbol{u}}, \hat{\boldsymbol{s}}, \hat{\boldsymbol{a}})$$ is a Nash equilibrium point, then we prove that this is the only possible Nash equilibrium point. From Theorem 4 and Theorem 5, it is clear that [TeX:] $$(\hat{\boldsymbol{u}}, \hat{\boldsymbol{s}}) \in B(\hat{\boldsymbol{a}}) \text { and } \hat{\boldsymbol{a}} \in B(\hat{\boldsymbol{u}}, \hat{\boldsymbol{s}}) \text {. }$$ Thus, [TeX:] $$(\hat{\boldsymbol{u}}, \hat{\boldsymbol{s}}, \hat{\boldsymbol{a}})$$ is a Nash equilibrium point. Now, assume that [TeX:] $$(\hat{\boldsymbol{u}}, \hat{\boldsymbol{s}}, \hat{\boldsymbol{a}})$$ is another Nash equilibrium point. From Theorem 4, it is clear that [TeX:] $$\Delta^{\hat{\boldsymbol{u}}, \check{\boldsymbol{s}}, \check{\boldsymbol{a}}} \leq \Delta^{\check{\boldsymbol{u}}, \check{\boldsymbol{s}}, \check{\boldsymbol{a}}}$$, the equality holds only when [TeX:] $$\check{\boldsymbol{u}}=\hat{\boldsymbol{u}}=\left[\frac{1}{N}, \frac{1}{N}, \cdots, \frac{1}{N}\right].$$ Without loss of generality, consider that [TeX:] $$\check{\boldsymbol{a}}=\left[\check{a}_1, \check{a}_2, \cdots, \check{a}_{N_s}\right] \text {, }$$ where [TeX:] $$\check{a}_1 \geq \check{a}_2 \geq \cdots \geq \check{a}_{N_s-l}\gt \check{a}_{N_s-l+1}=\check{a}_{N_s-l+2}=\cdots=\check{a}_{N_s} \text {. }$$ From the assumption and from Theorem 4, we can say that [TeX:] $$\sum_{i=N_s-l+1}^{N_s} \check{s}_i=1 .$$ However, from Theorem 5, we can say that [TeX:] $$\check{\boldsymbol{a}} \notin B(\check{\boldsymbol{u}}, \check{\boldsymbol{s}}).$$ Thus, the triplet [TeX:] $$(\check{\boldsymbol{u}}, \check{\boldsymbol{s}}, \check{\boldsymbol{a}})$$ cannot be a Nash equilibrium point. Hence, the Nash equilibrium unique.

Next, we present a special case in which the Nash equilibrium exists even when the transmission power choosing pmf and the blocking power choosing pmf are part of the action space of the BS and the action space of the adversary, respectively. Consider that the matrix F has the following property,

(61)
[TeX:] $$f_{i, j}-f_{1, j}=l_i, \quad j \in\{1, \cdots, m\}, i \in\{1, \cdots, n\}$$

where [TeX:] $$l_i$$ are non-negative constants. Consider a fixed blocking power choosing pmf d. Then, [TeX:] $$g_i$$ in Algorithm 1 is

(62)
[TeX:] $$g_i=\sum_{j=1}^m d_j f_{i, j}$$

(63)
[TeX:] $$=\sum_{j=1}^m d_j f_{1, j}+l_i$$

Thus,

(64)
[TeX:] $$\begin{aligned} & g_i+g_x \frac{p_y-p_i}{p_x-p_y}-g_y \frac{p_x-p_i}{p_x-p_y} \\ & =\left(\sum_{j=1}^m d_j f_{1, j}\right)\left(1+\frac{p_y-p_i}{p_x-p_y}-\frac{p_x-p_i}{p_x-p_y}\right)+l_x \frac{p_y-p_i}{p_x-p_y} \\ & \quad-l_y \frac{p_x-p_i}{p_x-p_y}+l_i \end{aligned}$$

Thus, the sign of [TeX:] $$g_i+g_x \frac{p_y-p_i}{p_x-p_y}-g_y \frac{p_x-p_i}{p_x-p_y}$$ does not depend on 𝒅, which implies that the optimal transmission power choosing pmf is the same for all d. Similarly, the sign of [TeX:] $$g_i+g_x \frac{p_y^{\prime}-p_i^{\prime}}{p_x^{\prime}-p_y^{\prime}}-g_y \frac{p_x^{\prime}-p_i^{\prime}}{p_x^{\prime}-p_y^{\prime}}$$ in Algorithm 2 does not depend on e, in other words the optimal blocking power choosing pmf is independent of e. Now, run Algorithm 1 for any arbitrary d and denote the output as [TeX:] $$\hat{e},$$ similarly run Algorithm 2 for any arbitrary e and denote the output as [TeX:] $$\hat{d} .$$ Then, using Theorem 8, we have that the 5 tuple [TeX:] $$(\hat{b}, \hat{c}, \hat{e}, \hat{a}, \hat{d})$$ is the unique Nash equilibrium.

V. NUMERICAL RESULT

We consider a system with two sub-carriers, four blocking power levels and four transmission power levels, i.e., [TeX:] $$N_s=2$$ π‘š = 𝑛 = 4. We assume that all sub-carriers are available to all users, i.e., [TeX:] $$N_{s, i}=N_s, i \in 1,2, \cdots, N \text {. }$$ We compare the performance of the policy [TeX:] $$\tilde{\tilde{\pi}}$$ and the policy [TeX:] $$\hat{\tilde{\pi}}$$ for varying numbers of users. The blocking power levels are 1, 2, 3 and 4, similarly, the transmission power levels are 1, 2, 3 and 4, the transmission power constraint [TeX:] $$\bar{p}=3.5$$ and the blocking power level constraint is [TeX:] $$\tilde{p}=3.$$ We assume that the matrix of probability of successful transmission F is,

(65)
[TeX:] $$\boldsymbol{F}=\left[\begin{array}{llll} 0.4 & 0.3 & 0.2 & 0.1 \\ 0.5 & 0.4 & 0.3 & 0.2 \\ 0.7 & 0.6 & 0.5 & 0.4 \\ 0.9 & 0.8 & 0.7 & 0.6 \end{array}\right]$$

For the simulations, we use the adversarial action [TeX:] $$\bar{\psi}$$, i.e., at each time slot the adversary chooses one of the two subcarriers uniformly and chooses the blocking power level 3. From Lemma 1, we know that the max-age user choosing policy and the uniform sub-carrier choosing policy are the optimal user choosing and the optimal sub-carrier choosing policy for the adversarial action [TeX:] $$\bar{\psi}$$, respectively. That is the reason we see in Fig. 2 that the lower bound of the average age and the average age for the policy [TeX:] $$\tilde{\tilde{\pi}}$$ are very close. Note that, the power choosing policies for both [TeX:] $$\tilde{\tilde{\pi}}$$ and [TeX:] $$\hat{\tilde{\pi}}$$ are the same, i.e., choose the power levels 3 and 4 with probability 0.5 each, however as the user choosing policy of [TeX:] $$\tilde{\tilde{\pi}}$$ is optimal for the adversarial action [TeX:] $$\bar{\psi}$$, we see that the policy [TeX:] $$\tilde{\tilde{\pi}}$$ outperforms [TeX:] $$\hat{\tilde{\pi}}$$ in terms of the average age. We also note in Fig. 2 that the performance gap between the policy [TeX:] $$\tilde{\tilde{\pi}}$$ and the policy [TeX:] $$\hat{\tilde{\pi}}$$ increases as we increase the number of users 𝑁. This can be intuitively explained as follows: Note that for the policy [TeX:] $$\hat{\tilde{\pi}}$$, the user choosing policy is the uniform user choosing policy and as 𝑁 increases the probability with which the BS chooses the maximum aged user decreases and as choosing the maximum aged user is the optimal user choosing policy for the adversarial action [TeX:] $$\bar{\psi}$$, the gap between the policies [TeX:] $$\tilde{\tilde{\pi}}$$ and [TeX:] $$\hat{\tilde{\pi}}$$ increases with 𝑁.

Fig. 2.
Comparison of the performances the the proposed algorithms.

VI. CONCLUSIONS

We considered a communication network with 𝑁 users, one BS, [TeX:] $$N_S$$ sub-carriers and one adversary. The BS transmits an update packet to the 𝑖th user via a communication channel from a subset of these [TeX:] $$N_S$$ communication channels, called [TeX:] $$\mathcal{N}_{s, i}$$. At each time slot, the BS transmits an update packet to a user via a communication channel to decrease the age of the system and the adversary aims to block this update packet to increase the age of the system. The BS has 𝑛 transmission powers and the adversary has π‘š blocking powers available. Both the BS and the adversary are subject to average power constraints. First, we determined a universal lower bound for the average age for this communication system. We showed that the uniform user choosing policy, the uniform sub-carrier choosing policy and any arbitrary power choosing policy is 4 optimal; and if [TeX:] $$\mathcal{N}_s = \mathcal{N}_{s, i}$$ and [TeX:] $$N_s$$ is large, then it is 2 optimal. We then showed that the max-age user choosing policy, the uniform sub-carrier choosing policy and any arbitrary power choosing policy is 2 optimal; and if [TeX:] $$\mathcal{N}_s = \mathcal{N}_{s, i}$$ and th BS power constraint exactly matches with one of the powers from the feasible BS powers, then it is the optimal scheduling policy. Second, we considered the scenario where [TeX:] $$\mathcal{N}_s = \mathcal{N}_{s, i}$$ and the BS chooses its scheduling policy, the adversary chooses its blocking policy from the set of stationary randomized policies. We found that if the power choosing policies are part of the action space of the BS and the action space of the adversary, then a Nash equilibrium may or may not exist. However, when those are not part of the action space of the BS and the adversary, then the uniform user choosing policy, the uniform sub-carrier choosing policy and the uniform subcarrier blocking policy form the Nash equilibrium point. Finding a Nash equilibrium point in the most general setting is an interesting research direction.

Biography

Subhankar Banerjee

Subhankar Banerjee received the B.Tech. degree in Electronics and Communication Engineering from West Bengal University of Technology, the M.S. Degree in Communication and Signal Processing from IIT Madras. He is currently pursuing the Ph.D. degree in the Department of Electrical and Computer Engineering, at University of Maryland. His research focus is on age of information, applied probability and mathematical optimization.

Biography

Sennur Ulukus

Sennur Ulukus is a Distinguished University Pro- fessor and the Anthony Ephremides Professor in Information Sciences and Systems in the Depart- ment of Electrical and Computer Engineering at the University of Maryland at College Park, where she also holds a joint appointment with the Institute for Systems Research (ISR). Prior to joining UMD, she was a Senior Technical Staff Member at AT&T Labs-Research. She received the Ph.D. degree in Electrical and Computer Engineering from Wireless Information Network Laboratory (WINLAB), Rut-gers University, and the B.S. and M.S. degrees in Electrical and Electronics Engineering from Bilkent University. Her research interests are in informa- tion theory, wireless communications, machine learning, signal processing, and networks; with recent focus on private information retrieval, age of information, machine learning for wireless, distributed coded computing, group testing, physical layer security, energy harvesting communications, and wireless energy and information transfer. Dr. Ulukus is a fellow of the IEEE, and a Distinguished Scholar-Teacher of the University of Maryland. She received the 2003 IEEE Marconi Prize Paper Award in Wireless Communications, the 2019 IEEE Communications Society Best Tutorial Paper Award, the 2020 IEEE Communications Society Women in Communications Engineering (WICE) Outstanding Achievement Award, the 2020 IEEE Communications Society Technical Committee on Green Communications and Computing (TCGCC) Distinguished Technical Achievement Recognition Award, a 2005 NSF CAREER Award, the 2011 ISR Outstanding Systems Engineering Faculty Award, and the 2012 ECE George Corcoran Outstanding Teaching Award. She was a Distinguished Lecturer of the IEEE Information Theory Society for 2018–2019. She is a Senior Editor for the IEEE Transactions on Green Communications and Networking (2020–present). She was an Area Editor for the IEEE Transactions on Wireless Communications (2019–2023), an Area Editor for the IEEE Transactions on Green Communications and Networking (2016– 2020), an Editor for the IEEE J. Sel. Areas Commun.-Series on Green Communications and Networking (2015–2016), an Associate Editor for the IEEE Transactions on Information Theory (2007–2010), and an Editor for the IEEE Transactions on Communications (2003–2007). She was a Guest Editor for the IEEE Journal on Selected Areas in Information Theory (2021, 2022, 2023), the IEEE Journal on Selected Areas in Communications (2008, 2015, 2021, 2022), the IEEE Journal of Selected Topics in Signal Processing (2021), Journal of Communications and Networks (2012), and the IEEE Transactions on Information Theory (2011). She is the TPC chair of 2021 IEEE Globecom, and is a TPC co-chair of 2024 IEEE Globecom, 2024 IEEE DySPAN, 2023 IEEE MILCOM, 2019 IEEE ITW, 2017 IEEE ISIT, 2016 IEEE Globecom, 2014 IEEE PIMRC, and 2011 IEEE CTW.

Biography

Anthony Ephremides

Anthony Ephremides received the Ph.D. degree in Electrical Engineering from Princeton University in 1971. He has been with the University of Maryland ever since. He held the Cynthia Kim Professorship of information technology with the Electrical and Computer Engineering Department, University of Maryland, College Park, where he is currently a Distinguished University Professor Emeritus and had a joint appointment with the Institute for Systems Research, of which he was among the founding members in 1986. He is the author of several 100papers, conference presentations, and patents. His current research interests include communication systems and networks and all related disciplines, such as information theory, control and optimization, satellite systems, queueing models, and signal processing. He is especially interested in wireless networks, energy-efficient systems, and the new notion of the age of information. He has received the IEEE Donald E. Fink Prize Paper Award in 1991, the First ACM Achievement Award for Contributions to Wireless Networking in 1996, the 2000 Fred W. Ellersick MILCOM Best Paper Award, the IEEE Third Millennium Medal, the 2000 Outstanding Systems Engineering Faculty Award from the Institute for Systems Research, the Kirwan Faculty Research and Scholarship Prize from the University of Maryland in 2001, and a few other official recognitions of his work. He also received the 2006 Aaron Wyner Award for Exceptional Service and Leadership from the IEEE Information Theory Society.

References

  • 1 A. Zaidi, F. Athley, J. Medbo, U. Gustavsson, G. Durisi, and X. Chen. "5G Physical Layer: Principles, Models and Technology Components," Academic Press, 2018.custom:[[[https://www.sciencedirect.com/book/9780128145784/5g-physical-layer]]]
  • 2 A. Kosta, N. Pappas, and V . Angelakis. "Age of information: A new concept, metric, and tool," Foundations and Trends in Networking, 12(3):162-259, 2017.custom:[[[https://ieeexplore.ieee.org/document/8187436]]]
  • 3 Y . Sun, I. Kadota, R. Talak, and E. Modiano. "Age of information: A new metric for information freshness," Synthesis Lectures on Communication Networks, 12(2):1-224, December 2019.custom:[[[https://link.springer.com/book/10.1007/978-3-031-79293-9]]]
  • 4 R. D. Yates, Y . Sun, R. Brown, S. K. Kaul, E. Modiano, and S. Ulukus. "Age of information: An introduction and survey," IEEE Journal on Selected Areas in Communications, 39(5):1183-1210, May 2021.doi:[[[10.48550/arXiv.2007.08564]]]
  • 5 I. Kadota, A. Sinha, E. Uysal-Biyikoglu, R. Singh, and E. Modiano. "Scheduling policies for minimizing age of information in broadcast wireless networks," IEEE/ACM Transactions on Networking, 26(6):26372650, December 2018.custom:[[[https://ieeexplore.ieee.org/document/8514816]]]
  • 6 E. Najm, R. D. Yates, and E. Soljanin. "Status updates through M/G/1/1 queues with HARQ," In IEEE ISIT, June 2017.doi:[[[10.48550/arXiv.1704.03937]]]
  • 7 A. Soysal and S. Ulukus. "Age of information in G/G/1/1 systems: Age expressions, bounds, special cases, and optimization," IEEE Transactions on Information Theory, 67(11):7477-7489, November 2021.custom:[[[https://ieeexplore.ieee.org/document/9478783]]]
  • 8 O. Ayan, M. Vilgelm, M. Klugel, S. Hirche, and W. Kellerer. "Age-ofinformation vs. value-of-information scheduling for cellular networked control systems," In ACM ICCPS, April 2019.doi:[[[10.48550/arXiv.1903.05356]]]
  • 9 R. D. Yates. "The age of information in networks: Moments, distributions, and sampling," IEEE Transactions on Information Theory, 66(9):57125728, September 2020.doi:[[[10.48550/arXiv.1806.03487]]]
  • 10 S. Farazi, A. G. Klein, and D. R. Brown III. "Average age of information for status update systems with an energy harvesting server," In IEEE Infocom, April 2018.custom:[[[https://ieeexplore.ieee.org/document/8406846]]]
  • 11 X. Wu, J. Yang, and J. Wu. "Optimal status update for age of information minimization with an energy harvesting source," IEEE Transactions on Green Communications and Networking, 2(1):193-204, March 2018.custom:[[[https://ieeexplore.ieee.org/document/8123937]]]
  • 12 A. Baknina, O. Ozel, J. Yang, S. Ulukus, and A. Yener. "Sending information through status updates," In IEEE ISIT, June 2018.custom:[[[https://ieeexplore.ieee.org/document/8437496]]]
  • 13 S. Leng and A. Yener. "Age of information minimization for an energy harvesting cognitive radio," IEEE Transactions on Cognitive Communications and Networking, 5(2):427-43, June 2019.custom:[[[https://ieeexplore.ieee.org/document/8712546]]]
  • 14 A. Arafa and S. Ulukus. "Timely updates in energy harvesting two-hop networks: Offline and online policies," IEEE Transactions on Wireless Communications, 18(8):4017-4030, August 2019.custom:[[[https://ieeexplore.ieee.org/document/8733195]]]
  • 15 Y . Gu, Q. Wang, H. Chen, Y . Li, and B. Vucetic. "Optimizing information freshness in two-hop status update systems under a resource constraint," IEEE Journal on Selected Areas in Communications, 39(5):1380-1392, March 2021.doi:[[[10.48550/arXiv.2007.02531]]]
  • 16 A. Arafa, J. Yang, S. Ulukus, and H. V . Poor. "Age-minimal transmission for energy harvesting sensors with finite batteries: Online policies," IEEE Transactions on Information Theory, 66(1):534-556, January 2020.custom:[[[https://ieeexplore.ieee.org/document/8822722]]]
  • 17 Q. He, D. Yuan, and A. Ephremides. "Optimal link scheduling for age minimization in wireless systems," IEEE Transactions on Information Theory, 64(7):5381-5394, July 2018.custom:[[[https://ieeexplore.ieee.org/document/8022894]]]
  • 18 B. Buyukates, A. Soysal, and S. Ulukus. "Age of information in multihop multicast networks," Journal of Communications and Networks, 21(3):256-267, July 2019.doi:[[[10.48550/arXiv.1812.10455]]]
  • 19 Y . Hsu. "Age of information: Whittle index for scheduling stochastic arrivals," In IEEE ISIT, June 2018.custom:[[[10.48550/arXiv.1801.03422]]]
  • 20 B. Buyukates, A. Soysal, and S. Ulukus. "Scaling laws for age of information in wireless networks," IEEE Transactions on Wireless Communications, 20(4):2413-2427, April 2021.custom:[[[https://ieeexplore.ieee.org/document/9288949]]]
  • 21 M. A. Abd-Elmagid, H. S. Dhillon, and N. Pappas. "A reinforcement learning framework for optimizing age of information in RF-powered communication systems," IEEE Transactions on Communications, 68(8):4747-4760, May 2020.custom:[[[https://ieeexplore.ieee.org/abstract/document/9085402/]]]
  • 22 E. T. Ceran, D. Gunduz, and A. Gyorgy. "A reinforcement learning approach to age of information in multi-user networks," In IEEE PIMRC, September 2018.custom:[[[https://ieeexplore.ieee.org/document/8580701]]]
  • 23 B. Buyukates and S. Ulukus. "Timely distributed computation with stragglers," IEEE Transactions on Communications, 68(9):5273-5282, September 2020.custom:[[[https://ieeexplore.ieee.org/document/9115646]]]
  • 24 P. Zou, O. Ozel, and S. Subramaniam. "Optimizing information freshness through computation-transmission tradeoff and queue management in edge computing," IEEE/ACM Transactions on Networking, 29(2):949963, February 2021.custom:[[[https://ieeexplore.ieee.org/document/9347556]]]
  • 25 H. H. Yang, A. Arafa, T. Q. S. Quek, and H. V . Poor. "Age-based scheduling policy for federated learning in mobile edge networks," In IEEE ICASSP, May 2020.doi:[[[10.48550/arXiv.1910.14648]]]
  • 26 E. Ozfatura, B. Buyukates, D. Gunduz, and S. Ulukus. "Age-based coded computation for bias reduction in distributed learning," In IEEE Globecom, December 2020.doi:[[[10.48550/arXiv.2006.01816]]]
  • 27 B. Buyukates and S. Ulukus. "Timely communication in federated learning," In IEEE Infocom, May 2021.doi:[[[10.48550/arXiv.2012.15831]]]
  • 28 J. Liu, X. Wang, and H. Dai. "Age-optimal trajectory planning for UAVassisted data collection," In IEEE Infocom, April 2018.custom:[[[https://ieeexplore.ieee.org/document/8406973]]]
  • 29 M. Wang, W. Chen, and A. Ephremides. "Reconstruction of counting process in real-time: The freshness of information through queues," In IEEE ICC, July 2019.custom:[[[https://ieeexplore.ieee.org/abstract/document/8762021]]]
  • 30 M. Bastopcu and S. Ulukus. "Who should Google Scholar update more often?," In IEEE Infocom, July 2020.doi:[[[10.48550/arXiv.2001.11500]]]
  • 31 Y . Sun, Y . Polyanskiy, and E. Uysal. "Remote estimation of the Wiener process over a channel with random delay," In IEEE ISIT, June 2017.doi:[[[10.48550/arXiv.1701.06734]]]
  • 32 J. Chakravorty and A. Mahajan. "Remote estimation over a packet-drop channel with Markovian state," IEEE Transactions on Automatic Control, 65(5):2016-2031, July 2020.doi:[[[10.48550/arXiv.1807.09706]]]
  • 33 M. Bastopcu and S. Ulukus. "Age of information for updates with distortion: Constant and age-dependent distortion constraints," IEEE/ACM Transactions on Networking, 29(6):2425-2438, December 2021.custom:[[[https://ieeexplore.ieee.org/abstract/document/9524846]]]
  • 34 N. Rajaraman, R. Vaze, and G. Reddy. "Not just age but age and quality of information," IEEE Journal on Selected Areas in Communications, 39(5):1325-1338, 2021.custom:[[[https://ieeexplore.ieee.org/document/9377455]]]
  • 35 M. Bastopcu and S. Ulukus. "Minimizing age of information with soft updates," Journal of Commun. and Networks, 21(3):233-243, June 2019.doi:[[[10.48550/arXiv.1812.08148]]]
  • 36 J. Zhong, R. D. Yates, and E. Soljanin. "Timely lossless source coding for randomly arriving symbols," In IEEE ITW, November 2018.custom:[[[https://ieeexplore.ieee.org/document/8613380]]]
  • 37 P. Mayekar, P. Parag, and H. Tyagi. "Optimal source codes for timely updates," IEEE Transactions on Information Theory, 66(6):3714-3731, March 2020.doi:[[[10.48550/arXiv.1810.05561]]]
  • 38 M. Bastopcu, B. Buyukates, and S. Ulukus. "Selective encoding policies for maximizing information freshness," IEEE Transactions on Communications, 69(9):5714-5726, September 2021.custom:[[[https://ieeexplore.ieee.org/document/9355167]]]
  • 39 R. D. Yates, P. Ciblat, A. Yener, and M. Wigger. "Age-optimal constrained cache updating," In IEEE ISIT, June 2017.custom:[[[https://ieeexplore.ieee.org/document/8006506]]]
  • 40 M. Bastopcu and S. Ulukus. "Information freshness in cache updating systems," IEEE Transactions on Wireless Communications, 20(3):18611874, March 2021.custom:[[[https://ieeexplore.ieee.org/document/9262040]]]
  • 41 B. Abolhassani, J. Tadrous, A. Eryilmaz, and E. Yeh. "Fresh caching for dynamic content," In IEEE Infocom, May 2021.custom:[[[https://ieeexplore.ieee.org/document/9488731]]]
  • 42 P. Kaswan, M. Bastopcu, and S. Ulukus. "Freshness based cache updating in parallel relay networks," In IEEE ISIT, July 2021.doi:[[[10.48550/arXiv.2105.05237]]]
  • 43 R. D. Yates. "The age of gossip in networks," In IEEE ISIT, July 2021.doi:[[[10.48550/arXiv.2102.02893]]]
  • 44 B. Buyukates, M. Bastopcu, and S. Ulukus. "Age of gossip in networks with community structure," In IEEE SPAWC, September 2021.doi:[[[10.48550/arXiv.2105.02867]]]
  • 45 M. Bastopcu, B. Buyukates, and S. Ulukus. "Gossiping with binary freshness metric," In IEEE Globecom, December 2021.doi:[[[10.48550/arXiv.2107.14218]]]
  • 46 C. Kam, S. Kompella, and A. Ephremides. "Age of incorrect information for remote estimation of a binary Markov source," In IEEE Infocom, July 2020.custom:[[[https://ieeexplore.ieee.org/abstract/document/9162726]]]
  • 47 A. Garnaev, W. Zhang, J. Zhong, and R. D. Yates. "Maintaining information freshness under jamming," In IEEE Infocom, May 2019.custom:[[[https://ieeexplore.ieee.org/document/8845146]]]
  • 48 G. D. Nguyen, S. Kompella, C. Kam, J. E. Wieselthier, and A. Ephremides. "Impact of hostile interference on information freshness: A game approach," In IEEE WiOpt, May 2017.custom:[[[https://ieeexplore.ieee.org/abstract/document/7959909]]]
  • 49 Y . Xiao and Y . Sun. "A dynamic jamming game for real-time status updates," In IEEE Infocom, April 2018.doi:[[[10.48550/arXiv.1803.03616]]]
  • 50 S. Banerjee, R. Bhattacharjee, and A. Sinha. "Fundamental limits of ageof-information in stationary and non-stationary environments," In IEEE ISIT, June 2020.doi:[[[10.48550/arXiv.2001.05471]]]
  • 51 R. Bhattacharjee and A. Sinha. "Competitive algorithms for minimizing the maximum age-of-information," In ACM SIGMETRICS Performance Evaluation Review, September 2020.doi:[[[10.48550/arXiv.2005.05873]]]
  • 52 S. Banerjee and S. Ulukus. "Age of information in the presence of an adversary," In IEEE Infocom, May 2022.doi:[[[10.48550/arXiv.2202.04050]]]
  • 53 S. Banerjee and S. Ulukus. "Game theoretic analysis of an adversarial status updating system," In IEEE ISIT, June 2022.doi:[[[10.48550/arXiv.2202.05233]]]
  • 54 P. Kaswan and S. Ulukus. "Age of gossip in ring networks in the presence of jamming attacks," In Asilomar Conference, October 2022.doi:[[[10.48550/arXiv.2205.03328]]]
  • 55 P. Kaswan and S. Ulukus. "Susceptibility of age of gossip to timestomping," In IEEE ITW, November 2022.doi:[[[10.48550/arXiv.2205.08510]]]
  • 56 R. G. Gallager. "Stochastic Processes: Theory for Applications," Cambridge University Press, 2013.custom:[[[https://www.cambridge.org/in/titles/stochastic-processes-theory-applications]]]
The top figure illustrates the system model with 4 sub-carriers, 2 adversarial power levels, and 2 transmission power levels. The top figure shows how the BS chooses a sub-carrier and a transmission power level for a specific user, say user 1 for this example, and how the adversary chooses a sub-carrier and a blocking power level over the time horizon 𝑇. In this figure, for user 1, if the BS chooses the lower transmission power then the sub-carrier which is chosen by the BS is shown with a light green box, and if it chooses the higher transmission power then the sub-carrier which is chosen is shown with a light blue box. It can happen that the BS does not schedule user 1 at a given time slot, for example, see time slot 4, where there are no green or blue boxes. Similarly, at a given time slot, if the adversary chooses the lower blocking power then the sub-carrier which is chosen by the adversary at that time slot is shown with an orange cross, and if it chooses the higher blocking power then the sub-carrier which chosen is shown with a red cross. The bottom figure illustrates the age evolution for user 1, corresponding to the BS and adversarial actions in the top figure. Note that whenever the BS and the adversary choose the same sub-carrier the age of user 1 drops down by a certain probability, which depends on the corresponding blocking and transmission power levels.
For a given d finding an optimal e
For a given e finding an optimal d
Comparison of the performances the the proposed algorithms.