Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

MEC-Based Jamming-Aided Anti-Eavesdropping with Deep Reinforcement Learning for WBANs

Published: 06 December 2021 Publication History

Abstract

Wireless body area network (WBAN) suffers secure challenges, especially the eavesdropping attack, due to constraint resources. In this article, deep reinforcement learning (DRL) and mobile edge computing (MEC) technology are adopted to formulate a DRL-MEC-based jamming-aided anti-eavesdropping (DMEC-JAE) scheme to resist the eavesdropping attack without considering the channel state information. In this scheme, a MEC sensor is chosen to send artificial jamming signals to improve the secrecy rate of the system. Power control technique is utilized to optimize the transmission power of both the source sensor and the MEC sensor to save energy. The remaining energy of the MEC sensor is concerned to ensure routine data transmission and jamming signal transmission. Additionally, the DMEC-JAE scheme integrates with transfer learning for a higher learning rate. The performance bounds of the scheme concerning the secrecy rate, energy consumption, and the utility are evaluated. Simulation results show that the DMEC-JAE scheme can approach the performance bounds with high learning speed, which outperforms the benchmark schemes.

References

[1]
IEEE. 2012. IEEE standard for local and metropolitan area networks: Part 15.6: Wireless body area networks. IEEE Std 802.15.6-2012 (Feb. 2012), 1–271.
[2]
Yassine Abdulsalam and M. Shamim Hossain. 2020. COVID-19 networking demand: An auction-based mechanism for automated selection of edge computing services. IEEE Transactions on Network Science and Engineering. Retrieved from https://ieeexplore.ieee.org/document/9205640.
[3]
S. Adibi. 2012. Link technologies and blackberry mobile health (mHealth) solutions: A review. IEEE Transactions on Information Technology in Biomedicine 16, 4 (Jul. 2012), 586–597.
[4]
Zhiguang Cao, Hongliang Guo, Wen Song, Kaizhou Gao, Zhenghua Chen, Le Zhang, and Xuexi Zhang. 2020. Using reinforcement learning to minimize the probability of delay occurrence in transportation. IEEE Transactions on Vehicular Technology 69, 3 (2020), 2424–2436.
[5]
Zhiguang Cao, Siwei Jiang, Jie Zhang, and Hongliang Guo. 2016. A unified framework for vehicle rerouting and traffic light control to reduce traffic congestion. IEEE Transactions on Intelligent Transportation Systems 18, 7 (2016), 1958–1973.
[6]
R. Cavallari, F. Martelli, R. Rosini, C. Buratti, and R. Verdone. 2014. A survey on wireless body area networks: Technologies and design challenges. IEEE Communications Surveys Tutorials 16, 3 (Feb. 2014), 1635–1657.
[7]
G. Chen, Y. Zhan, G. Sheng, L. Xiao, and Y. Wang. 2018. Reinforcement learning-based sensor access control for WBANs. IEEE Access 7 (Dec. 2018), 8483–8494.
[8]
Yixue Hao, Yiming Miao, Long Hu, M. Shamim Hossain, Ghulam Muhammad, and Syed Umar Amin. 2019. Smart-edge-cocaco: AI-enabled smart edge with joint computation, caching, and communication in heterogeneous IoT. IEEE Network 33, 2 (2019), 58–64.
[9]
M. Shamim Hossain. 2017. Cloud-supported cyber-physical localization framework for patients monitoring. IEEE Systems Journal 11, 1 (2017), 118–127.
[10]
Jiawen Kang, Zehui Xiong, Chunxiao Jiang, Yi Liu, Song Guo, Yang Zhang, Dusit Niyato, Cyril Leung, and Chunyan Miao. 2020. Scalable and communication-efficient decentralized federated edge learning with multi-blockchain framework. arXiv:2008.04743. Retrieved from https://arxiv.org/abs/2008.04743.
[11]
J. Kim, J. Kim, J. Lee, and J. P. Choi. 2018. Physical-layer security against smart eavesdroppers: Exploiting full-duplex receivers. IEEE Access 6 (Jun. 2018), 32945–32957.
[12]
B. Li, Y. Zou, J. Zhou, F. Wang, W. Cao, and Y. Yao. 2019. Secrecy outage probability analysis of friendly jammer selection aided multiuser scheduling for wireless networks. IEEE Transactions on Communications 67, 5 (May 2019), 3482–3495.
[13]
Y. Li, L. Xiao, H. Dai, and H. V. Poor. 2017. Game theoretic study of protecting MIMO transmissions against smart attacks. In Proceedings of the 2017 IEEE International Conference on Communications. 1–6.
[14]
Yi Liu, Sahil Garg, Jiangtian Nie, Yang Zhang, Zehui Xiong, Jiawen Kang, and M. Shamim Hossain. 2020. Deep anomaly detection for time-series data in industrial IoT: A communication-efficient on-device federated learning approach. IEEE Internet of Things Journal 8, 8 (2020), 6348–6358.
[15]
Yi Liu, JQ James, Jiawen Kang, Dusit Niyato, and Shuyu Zhang. 2020. Privacy-preserving traffic flow prediction: A federated learning approach. IEEE Internet of Things Journal 7, 8 (2020), 7751–7763.
[16]
Y. Liu, J. Peng, J. Kang, A. M. Iliyasu, D. Niyato, and A. A. A. El-Latif. 2020. A secure federated learning framework for 5G networks. IEEE Wireless Communications 27, 4 (2020), 24–31.
[17]
Y. Liu, X. Yuan, Z. Xiong, J. Kang, X. Wang, and D. Niyato. 2020. Federated learning for 6G communications: Challenges, methods, and future directions. China Communications 17, 9 (2020), 105–118.
[18]
Lv Lu, Chen Jian, Yang Long, and Yonghong Kuo. 2017. Improving physical layer security in untrusted relay networks: Cooperative jamming and power allocation. IET Communications 11, 3 (Feb. 2017), 393–399.
[19]
Dong Lun, Han Zhu, Athina P. Petropulu, and H. Vincent Poor. 2010. Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing 58, 3 (Mar. 2010), 1875–1888.
[20]
M. Min, L. Xiao, Y. Chen, P. Cheng, D. Wu, and W. Zhuang. 2019. Learning-based computation offloading for IoT devices with energy harvesting. IEEE Transactions on Vehicular Technology 68, 2 (Feb. 2019), 1930–1941.
[21]
Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Alex Graves, Ioannis Antonoglou, Daan Wierstra, and Martin Riedmiller. 2013. Playing atari with deep reinforcement learning. ArXiv:1312.5602. Retrieved from https://arxiv.org/abs/1312.5602.
[22]
V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G. Bellemare, A. Graves, M. Riedmiller, A. K. Fidjeland, and G. Ostrovski. 2015. Human-level control through deep reinforcement learning. Nature 518, 7540 (Feb. 2015), 529–533.
[23]
H. Moosavi and F. M. Bui. 2016. Delay-aware optimization of physical layer security in multi-hop wireless body area networks. IEEE Transactions on Information Forensics and Security 11, 9 (Sep. 2016), 1928–1939.
[24]
Majid Moradikia, Saeed Mashdour, and Ali Jamshidi. 2018. Joint optimal power allocation, cooperative beamforming, and jammer selection design to secure untrusted relaying network. Transactions on Emerging Telecommunications Technologies 29, 3 (Jan. 2018), e3276.
[25]
Amitav Mukherjee, S. A. A. Fakoorian, Jing Huang, and A. Lee Swindlehurst. 2014. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials 16, 3 (Third 2014), 1550–1573.
[26]
K. Park, T. Wang, and M. Alouini. 2013. On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming. IEEE Journal on Selected Areas in Communications 31, 9 (Sep. 2013), 1741–1750.
[27]
X. Qiu, L. Liu, W. Chen, Z. Hong, and Z. Zheng. 2019. Online deep reinforcement learning for computation offloading in blockchain-empowered mobile edge computing. IEEE Transactions on Vehicular Technology 68, 8 (2019), 8050–8062.
[28]
Richard S Sutton and Andrew G Barto. 2018. Reinforcement learning: An introduction. IEEE Transactions on Neural Networks 9, 5 (Sep. 1998), 1054–1054.
[29]
D. Wang, P. Ren, Q. Du, Y. Wang, and L. Sun. 2017. Secure cooperative transmission against jamming-aided eavesdropper for ARQ based wireless networks. IEEE Access 5 (Mar. 2017), 3763–3776.
[30]
D. Wang, X. Tian, H. Cui, and Z. Liu. 2020. Reinforcement learning-based joint task offloading and migration schemes optimization in mobility-aware MEC network. China Communications 17, 8 (2020), 31–44.
[31]
Kun Wang, Yuan Li, Toshiaki Miyazaki, Yuanfang Chen, and Zhang Yan. 2018. Jamming and eavesdropping defense in green cyber-physical transportation systems using a stackelberg game. IEEE Transactions on Industrial Informatics 14, 9 (Sep. 2018), 4232–4242.
[32]
Kun Wang, Li Yuan, Toshiaki Miyazhaki, Deze Zeng, Song Guo, and Yanfei Sun. 2017. Strategic anti-eavesdropping game for physical layer security in wireless cooperative networks. IEEE Transactions on Vehicular Technology 66, 10 (Oct. 2017), 9448–9457.
[33]
A. D. Wyner. 1975. The wire-tap channel. Bell System technical journal 54, 8 (Oct. 1975), 1355–1387.
[34]
L. Xiao, Y. Li, C. Dai, H. Dai, and H. V. Poor. 2018. Reinforcement learning-based NOMA power allocation in the presence of smart jamming. IEEE Transactions on Vehicular Technology 67, 99 (Apr. 2018), 3377–3389.
[35]
L. Xu, M. Qin, Q. Yang, and K. Kwak. 2019. Deep reinforcement learning for dynamic access control with battery prediction for mobile-edge computing in green IoT networks. In Proceedings of the 2019 11th International Conference on Wireless Communications and Signal Processing. 1–6.
[36]
Xiaoshan Yang, Tianzhu Zhang, Changsheng Xu, Shuicheng Yan, M. Shamim Hossain, and Ahmed Ghoneim. 2016. Deep relative attributes. IEEE Transactions on Multimedia 18, 9 (2016), 1832–1842.
[37]
Cong Zhang, Wen Song, Zhiguang Cao, Jie Zhang, Puay Siew Tan, and Xu Chi. 2020. Learning to dispatch for job shop scheduling via deep reinforcement learning. Advances in Neural Information Processing Systems 33, (2020). ArXiv:2010.12367. Retrieved from https://arxiv.org/abs/2010.12367.
[38]
G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten. 2013. Improving physical layer secrecy using full-duplex jamming receivers. IEEE Transactions on Signal Processing 61, 20 (Oct. 2013), 4962–4974.
[39]
Q. Zhou, W. Lu, S. Chen, L. Yang, and K. Wang. 2017. Promoting security and efficiency in D2D underlay communication: A bargaining game approach. In Proceedings of the GLOBECOM 2017-2017 IEEE Global Communications Conference. 1–6.

Cited By

View all
  • (2024)Applied Machine Learning for Information SecurityDigital Threats: Research and Practice10.1145/36520295:1(1-5)Online publication date: 5-Apr-2024
  • (2024)CIM-MLC: A Multi-level Compilation Stack for Computing-In-Memory AcceleratorsProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 210.1145/3620665.3640359(185-200)Online publication date: 27-Apr-2024
  • (2024)Effect of Interfering Transmitter on the Secrecy of Diffusive Molecular Timing ChannelsIEEE Transactions on Communications10.1109/TCOMM.2024.336562972:6(3323-3337)Online publication date: Jun-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 22, Issue 3
August 2022
631 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3498359
  • Editor:
  • Ling Liu
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 December 2021
Accepted: 01 February 2021
Revised: 01 November 2020
Received: 01 October 2020
Published in TOIT Volume 22, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Wireless body area networks
  2. anti-eavesdropping
  3. mobile edge computing
  4. power control

Qualifiers

  • Research-article
  • Refereed

Funding Sources

  • Science and Technology Plan Project of Guangzhou City
  • Guangdong Special Project in Key Field of Artificial Intelligence for Ordinary University
  • Guangzhou Yuexiu District Science and Technology Plan Major Project
  • Taif Univer-sity Researchers Supporting Project

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)97
  • Downloads (Last 6 weeks)7
Reflects downloads up to 01 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Applied Machine Learning for Information SecurityDigital Threats: Research and Practice10.1145/36520295:1(1-5)Online publication date: 5-Apr-2024
  • (2024)CIM-MLC: A Multi-level Compilation Stack for Computing-In-Memory AcceleratorsProceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 210.1145/3620665.3640359(185-200)Online publication date: 27-Apr-2024
  • (2024)Effect of Interfering Transmitter on the Secrecy of Diffusive Molecular Timing ChannelsIEEE Transactions on Communications10.1109/TCOMM.2024.336562972:6(3323-3337)Online publication date: Jun-2024
  • (2024)A Survey of Edge Computing Privacy and Security Threats and Their Countermeasures2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)10.1109/ISVLSI61997.2024.00093(484-489)Online publication date: 1-Jul-2024
  • (2023)Reinforcement Learning Based Friendly Jamming for Digital Twins Against Active Eavesdropping2023 19th International Conference on Mobility, Sensing and Networking (MSN)10.1109/MSN60784.2023.00050(277-284)Online publication date: 14-Dec-2023
  • (2023)Multi-step reinforcement learning-based offloading for vehicle edge computing2023 15th International Conference on Advanced Computational Intelligence (ICACI)10.1109/ICACI58115.2023.10146186(1-8)Online publication date: 6-May-2023
  • (2022)Security in Wireless Body Sensor Network: A Multivocal Literature StudyApplied System Innovation10.3390/asi50400795:4(79)Online publication date: 15-Aug-2022
  • (2022)A Fusion Localization Algorithm with Adaptive Kalman Gain for Port Container Seamless PositioningWireless Communications & Mobile Computing10.1155/2022/74594082022Online publication date: 1-Jan-2022
  • (2022)A GRU-Based Lightweight System for CAN Intrusion Detection in Real TimeSecurity and Communication Networks10.1155/2022/58270562022Online publication date: 1-Jan-2022
  • (2022)Data-Driven Approach for the Short-Term Business Climate Forecasting Based on Power ConsumptionWireless Communications & Mobile Computing10.1155/2022/40370532022Online publication date: 1-Jan-2022
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media