Age of -out-of- Systems on a Gossip Network
Abstract
We consider information update systems on a gossip network, which consists of a single source and receiver nodes. The source encrypts the information into distinct keys with version stamps, sending a unique key to each node. For decoding the information in a -out-of- system, each receiver node requires at least different keys with the same version, shared over peer-to-peer connections. Each node determines based on a given function, ensuring that as increases, the precision of the decoded information also increases. We consider two different schemes: a memory scheme (in which the nodes keep the source’s current and previous encrypted messages) and a memoryless scheme (in which the nodes are allowed to only keep the source’s current message). We measure the “timeliness” of information updates by using the -keys version age of information. Our work focuses on determining closed-form expressions for the time average age of information in a heterogeneous random graph under both with memory and memoryless schemes.
I Introduction
In a peer-to-peer sensor or communication network, information spreading can be categorized into single-piece dissemination (when one node shares its information) and multicast dissemination (when all nodes share their information) [1]. But some applications lie between two categories, in which a node needs to collect a multitude of messages or observations generated at the same time to construct meaningful information. If any out of a total of messages are sufficient to construct the information in a system, it is called a -out-of- system. Such systems find applications in various domains including robotics, cryptography, and communication systems.
For example, in cryptography, the information source can apply -Threshold Signature Scheme (TSS) [2] on the information to put it into distinct keys such that any subset of keys with cardinality would be sufficient to decode the encrypted message. Furthermore, -out-of- systems enhance error correction performance in data transmission. For instance, the relative positioning of the target object using the Time Difference of Arrival (TDoA) technique [3] requires at least three simultaneously generated Time of Flight measurements while more measurement increase the accuracy of estimation of relative position of the object. Another common example is -MDS error correction codes [4], in which any codeword suffices for message decoding, with additional redundant codewords that facilitate error correction.
Motivated by these applications, we consider in this work an information source that generates updates and then encrypts (encodes) them by using a -out-of- systems, e.g. -TSS. For the sake of simplicity, we consider the source using -TSS, but it is worth noting that our results are applicable to any -out-of- system, some of examples are discussed above. The source is able to send the encrypted messages to the receiver nodes instantaneously. Upon receiving these updates, the nodes start to share their local messages with their neighboring nodes to decrypt the source’s update. Each node determines the required number of keys to achieve a given precision rate on the information for a given precision-rate function , which will be introduced later. The nodes that get different messages of the same update from their neighbors can decode source’s information. We study two different settings where () the nodes have memory, in which case they can hold the current and also the previous keys received from the source, and () the nodes do not have memory, in which case they can only hold the keys from the most current update. For both of these settings, we study the information freshness achieved by the receivers as a result of applying -TSS. Age of information (AoI) has been introduced as a new performance metric to measure the freshness of information in communication networks [5]. Inspired by recent studies, advancements in Age of Information (AoI) have been made in various gossip network scenarios, including those examining scalability, optimization, and security [6, 7, 8, 9, 10, 11, 12, 13]. In all these aforementioned works, the source sends its information to gossip nodes without using any encryption.
For the first time, in this work, we consider the version age of information in a gossip network where the source encrypts the information. Then, we have the following contributions:
-
•
We derive closed-form expressions for the time average of -keys version age for an arbitrary non-homogeneous network (e.g., independently activated channels).
-
•
We show that the time average of the -keys version age for a node in both schemes decreases as the edge activation rate increases, or as the number of keys required to decode the information decreases, or as the number of gossip pairs in the network increases in the numerical results,
-
•
We show that a memory scheme yields a lower time average of -keys version age compared to a memoryless scheme. However, the difference between the two schemes diminishes with infrequent source updates, frequent gossip between nodes, or a decrease in for a fixed number of nodes.
II System Model and Metric
We consider an information updating system consisting of a single source, which is labeled as node , and receiver nodes. The information at the source is updated at times distributed according to a Poisson counter, denoted by , with rate . We refer to the time interval between th and th information updates (messages) as the th version cycle and denote it by . Each update is stamped by the current value of the process and the time of the th update is labelled once it is generated. The stamp is called version-stamp of the information.
We assume that the source is able to instantaneously encrypt the information update by using -TSS once it is generated. To be more precise, we assume that the source puts the information update into distinct keys and sends one of the unique keys to each receiver node at the time , instantaneously. Once a node gets a unique key from the source at for version , it is aware of that there is new information at the source. Each node wishes its knowledge of the source to be as timely as possible. The timeliness is measured for an arbitrary node by the difference between the latest version of the message at the source node, , and the latest version of the message which can be decrypted at node , denoted by . This metric has been introduced as version age of information in [6, 14]. We call it -keys version age of node at time and denote it as
(2) |
Recall that in the -TSS, a node needs to have keys with the version stamp in order to decrypt the information at the source generated at . Since the source sends a unique key to all receiver nodes, a node needs additional distinct keys with version to decrypt the th message. We denote by the directed graph with node set and edge set . We let represent the communication network according to which nodes exchange information. If there is a directed edge , we call node gossiping neighbor of node . We consider a precision-rate function given by that quantifies how precisely a node decodes the status update if it collects out of symbols, where represents a relevant system parameter. For a given precision rate , the required number of keys for node is defined as . For simplicity, we assume . However, any function that is monotonically increasing in for fixed can serve as a precision-rate function. Here, the rate represents the amount of noise in each keys. We call a communication network -TSS feasible for rate if the node has out-bound connections to all other nodes and the smallest in-degree of the receiver nodes is greater than the smallest among all nodes.111In this work, all the nodes may have different s. Our results are directly applicable for any arbitrary selection of s. For that, we may omit the user index and instead use , directly.
We consider a -TSS feasible network, in which, nodes are allowed to communicate and share only the keys that are received from the source with their gossiping neighbor. The edge is activated at times distributed according to the Poisson counter , which has a rate and once activated, node sends a message to node , instantaneously. All counters are pairwise independent. This process occurs under two distinct schemes: with memory and memoryless.

In the memory scheme, nodes can store (and send) the keys of the previous updates. For example, if the edge is activated at , node sends node all the keys that the source has sent to node since the last activation of before . For the illustration in Fig. 1, node sends the set of keys with the versions to node in the memory scheme. Note that this can be implemented by finite memory in a finite node network with probability ; we will provide below the distribution of the number of keys in the message. In the memoryless scheme, nodes have no memory and only store the latest key obtained from the source. If the edge is activated at , node sends node only the last key that the source sent to node before . Referring again to the illustration in Fig. 1, node in this case sends only the key with the version to node .


Fig. 2(a) and Fig. 2(b) depict the sample path of the -keys version age process (resp. ) for a node with memory (resp. without memory). It is worth noting that we associate the notation with the memoryless scheme. It is assumed that edge activations and source updates occur at the same time in both schemes in the figures. In the memory scheme, we define the service time of information with version to an arbitrary node , denoted by , as the duration between and the time when node can decrypt the information with version , as shown in Fig. 2(a). In the memoryless scheme, a node can miss an information update with version if it cannot get more distinct keys before the next update arrives at . Thus, for a node without memory, we define as the duration between and the earliest time when the node can decrypt information with a version of at least . In Fig. 2(b), the node could only decode the information with version while missing and . Therefore, the service times and end at the same time as the service time ends.
Let be the total -keys version age of node , defined as the integrated -keys version age of node , , until time . For both schemes, the time average of -keys version age process of node is defined as follows:
(4) |
We interchangeably call the version age of -keys for node on . If nodes in the network have no memory, we denote the version age of -keys for node by .
III Age Analysis
In this section, we first introduce the main concepts that will be useful to derive age expressions and then provide closed-form expressions for the version age of -keys with memory, ; and without memory, .
Consider a set of random variables . We denote the smallest variable in the set by . We call the th order statistic of -samples () in the set . Let be the set of nodes with out-bound connections to node ; denote its cardinality by . Let be the times between successive activations of the edge . Then, is an exponential random variable with mean . Let be the set of random variables , . We denote the th order statistic of the set by .
III-A Nodes with Memory
In this section, we provide the closed-form expression in a -TSS feasible network for a given rate .
Theorem 1
Let the precision rate function be given and assume that is a -TSS feasible network for a given . Consider an arbitrary node in . The version age of -keys for node with memory (at ) obeys
(5) |
where is the interarrival time for the source update.
It is worth noting that Theorem 1 holds for any -TSS feasible network with heterogeneous (possibly different) edge activation rates. One can easily obtain an explicit form of for a given node and by using the c.d.f. of order statics provided in [15]. We need the following lemma for the proof of Theorem 1.
Lemma 1
If nodes have memory, then the service time of the information with version to node is the th order statistic of the set of exponential random variables .
Proof: We denote the set of the first activation times of edges that are connected to the node after by . For the case , the result trivially follows from the definitions. Consider the case . By definition, a new status update arrives at all nodes at ). However, the structure of a message sent after from a node to another node ensures that it has the key with version stamp . Therefore, the service time for a status update is also (regardless of the fact that a new update arrived).
We are now in a position to prove Theorem 1.
Proof: [Proof of Theorem 1] Let be for given . Let be the monotonically increasing sequence of times when status updates occur at the source node , with . Let be a subsequence of such that . Let be the time elapsed between two consecutive successful arrivals of the subsequence . Let be the version age of -keys, integrated over the duration in a node. Then, we have:
From Lemma 1, we have for any . It is worth noting that two random variables and are not independent in the memory scheme if for any , but they are identically distributed. Thus, we have and for any . By construction of the sequence , a pair of for any is . Then, from [16, Thm. 6], we find the time average , which completes the proof.
The case of a fully connected directed graph on nodes (including the source node) with for all edges in , is called scalable homogeneous network (SHN) and is the gossip rate.
Corollary 1
For a SHN, the version age of -keys for a node with memory is:
(6) |
Proof: In a SHN, every node has outbound connection; thus, and the processes are statistically identical for any node . Then, the set is the set of exponential random variables with rate for . From [15], we have where . From Theorem. 1, the results follows.
Corollary 2
For a finite and a SHN with a countable memory, we have the following scalability result:
One can easily take the limit as goes to in (6) to have Corollary 2 of Theorem 1. We now elaborate on the number of keys in the message that is sent over an edge. Let be the number of keys in the message that is sent over the edge . In each update cycle, either the source is updated before the edge is activated, which increases by or the edge is activated before a source update in which case node sends all the keys to node , and thus reduces to . From [17, Prob. 9.4.1], has a geometric distribution with success probability .
III-B Nodes without Memory
In the following section, we analyze the memoryless scheme, in which a message has only key in any time. We provide a closed-form expression , in a -TSS feasible network for a given rate .
Theorem 2
Let the precision rate function be given and assume that is a -TSS feasible network for a given . Consider an arbitrary node in . The version age of -keys for node without memory (at ) obeys
(7) |
where is the interarrival time for the source update.
We need the following Lemma for the proof of Theorem 2.
Lemma 2
Let be the version age of information at for the node . The sequence is homogeneous success-run with the rate .
Proof: We remove the index and the number of keys on notation, as it would be sufficient to prove the results for an arbitrary node and . We denote the set of the first arrival times of edges that are connected to the node after by . One can easily show that and for any are independent. This implies that the sequence has Markov property and it evolves as follows:
(8) |
and is by definition. Here, is a discrete-time Markov chain on infinite states with the initial distribution and the state transition matrix of
where . Then, it says the sequence is a homogeneous success-run chain with rate .
As an easy corollary to Lemma 2, the random variable has truncated geometric distribution at with success rate . Now, we can prove Theorem 2.
Proof: [Proof of Theorem 2] Let be for given and . Let be a subsequence of such that . Let be the time elapsed between two consecutive successful arrivals of the subsequence . Let be the version age of -keys, integrated over the duration in a node. Then, we have as follows:
where the event and we denote complement by . Then, we have;
(10) |
A pair of random variables and are identically distributed. Thus, we have and for any . Let be the number of information updates that the node has missed between and (that is, ). Then, we have:
(13) |
From Lemma 2, we know that is a succes-run chain with rate , then has geometric distribution for sufficiently large with rate . Then, we have:
By construction, a pair of for any is . From [16, Thm. 6], we find the time average .
Corollary 3
For a SHN, the version age of -keys TSS for an individual node without memory is:
(15) |
Proof: Let be . Let be the difference between th and th order statistics of the set for and . Let . One can see that, from memoryless property, corresponds to the minimum of a set of exponential random variables (r.v.) with mean . Thus, r.v. is also an exponential r.v. with the parameter where . Thus, r.v. is the minimum of two independent exponentially distributed r.v. From [17, Prob. 9.4.1], r.v. is exponentially distributed with the mean and we have:
(17) |
for . From the total law of expectation and memoryless property of , we have the following:
(19) | ||||
(20) | ||||
(21) |
If we rearrange the sum above and we plug above and in (LABEL:eqn:prob_ul) into (19), we obtain Cor. 3.
IV Numerical Results and Conclusion
In this section, we compare empirical results obtained from simulations to our analytical results.


We consider a SHN. Fig. 3 depicts the simulation and the theoretical results for both and as a function of gossip rate when . The simulation results for and align closely with the theoretical calculations provided in Theorems 1 and 2, respectively. In both schemes, we observe that the version age of -keys for a node decreases with the rise in the gossip rate , while keeping the network size and constant. We observe, in Fig. 3(a) and Fig. 3(b), that both and increase with the growth of for a fixed and and they decreases as increases for fixed and . Also, we observe, in Fig. 3, that is less than for the same values of and . Fig. 4 depicts as a function of the number of the nodes for various gossip rates . We observe, in Fig. 4, that converges to as grows. It aligns with Cor. 2. Fig. 5(b) depicts and as functions of for the given in the introduction. We observe that in Fig. 5(b), both and increase as the required precision increases. Additionally, for the same precision rate , higher noise in the measurement results in greater and .
To quantify the value of memory in a network, we define the memory critical gossip rate of a -TSS network for a margin , denoted by , as the smallest gossip rate such that . We first observe, in Fig. 5(a), that xponentially increases as increases for fixed . Now, consider the event , one can easily see that converges to as increases (frequent gossipping between nodes) or decreases for fixed . In this case, the expectation in (7). It implies that approach to as goes to . These observations show that approaches as increases or decreases.



Conclusion. In this work, we have provided closed-form expressions for the version age of -keys for both with memory and memoryless schemes. In our work, nodes only send the keys that are received from the source node, ensuring that any set of messages on the channels is not sufficient to decrypt the message at any time. An alternative approach might be to consider the case where nodes can share keys that they received from other nodes.
References
- [1] E. Bayram, M.-A. Belabbas, and T. Başar, “Vector-valued gossip over -holonomic networks,” arXiv preprint arXiv:2311.04455, 2023.
- [2] M.-S. Hwang, E. J.-L. Lu, and I.-C. Lin, “A practical threshold proxy signature scheme based on the rsa cryptosystem,” IEEE Trans. on knowledge and data Engineering, vol. 15, no. 6, pp. 1552–1560, 2003.
- [3] F. Gustafsson and F. Gunnarsson, “Positioning using time-difference of arrival measurements,” in 2003 IEEE ICASSP’03, 2003. Proceedings., vol. 6. IEEE, 2003, pp. VI–553.
- [4] B. Buyukates and S. Ulukus, “Timely distributed computation with stragglers,” IEEE Trans. on Communications, vol. 68, no. 9, pp. 5273–5282, 2020.
- [5] S. K. Kaul, R. D. Yates, and M. Gruteser, “Real-time status: How often should one update?” in IEEE Infocom, March 2012.
- [6] R. D. Yates, “The age of gossip in networks,” in IEEE ISIT, July 2021, pp. 2984–2989.
- [7] B. Buyukates, M. Bastopcu, and S. Ulukus, “Version age of information in clustered gossip networks,” IEEE Journal on Selected Areas in Information Theory, vol. 3, no. 1, pp. 85–97, March 2022.
- [8] M. Bastopcu, B. Buyukates, and S. Ulukus, “Gossiping with binary freshness metric,” in 2021 IEEE Globecom, December 2021.
- [9] M. Bastopcu, S. R. Etesami, and T. Başar, “The role of gossiping in information dissemination over a network of agents,” Entropy, vol. 26, no. 1, 2024.
- [10] P. Mitra and S. Ulukus, “Age-aware gossiping in network topologies,” IEEE Trans. on Communications, 2024.
- [11] E. Delfani and N. Pappas, “Version age-optimal cached status updates in a gossiping network with energy harvesting sensor,” in WiOpt. IEEE, 2023, pp. 143–150.
- [12] P. Kaswan and S. Ulukus, “Timestomping vulnerability of age-sensitive gossip networks,” IEEE Trans. on Communications, pp. 1–1, January 2024.
- [13] ——, “Choosing outdated information to achieve reliability in age-based gossiping,” in IEEE, ICC 2024. IEEE, 2024, pp. 2125–2130.
- [14] B. Abolhassani, J. Tadrous, A. Eryilmaz, and E. Yeh, “Fresh caching for dynamic content,” in IEEE Infocom, May 2021, pp. 1–10.
- [15] H. A. David and H. N. Nagaraja, Order statistics. Wiley & Sons, 2004.
- [16] R. G. Gallager, “Discrete stochastic processes,” Journal of the Operational Research Society, vol. 48, no. 1, pp. 103–103, 1997.
- [17] R. D. Yates and D. J. Goodman, Probability and stochastic processes: a friendly introduction for electrical and computer engineers. Wiley & Sons, 2014.