Federated Deep Reinforcement Learning for Efficient Jamming Attack Mitigation in O-RAN

被引:17
作者
El Houda, Zakaria Abou [1 ]
Moudoud, Hajar [2 ]
Brik, Bouziane [3 ]
机构
[1] Inst Natl Rech Sci INRS EMT, Ctr Energie Mat Telecommun, Varennes, PQ J3X 1S2, Canada
[2] ISEN Yncrea Ouest, L bISEN, F-58000 Nevers, France
[3] Sharjah Univ, Coll Comp & Informat, Comp Sci Dept, Sharjah J3X 1S2, U Arab Emirates
关键词
Jamming; Data models; Security; Training; Biological system modeling; Decision making; Real-time systems; Federated learning; jamming attacks; multi-agent reinforcement learning; Open RAN; wireless sensor networks; SECURE; INTERNET;
D O I
10.1109/TVT.2024.3359998
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Open RAN (ORAN or O-RAN) revolutionizesRadio Access Networks (RAN) by offering flexibility and cost-efficiency through inter-vendor equipment interoperability.More importantly, it addresses emerging security threats, such as jamming attacks, by incorporating network softwarization and leveraging Artificial Intelligence (AI) techniques. However, AI-based systems face challenges such as limited training data, slow convergence, and vulnerability to dynamic attack patterns like Zero-day attacks. To enhance jamming attack mitigation in O-RAN, Multi-Agent Reinforcement Learning (MARL) has been introduced for improved flexibility and robustness. However, MARL requires data sharing, which consumes network bandwidth and slows down training, and the curse of dimensionality limits its benefits due to the exponential growth of the state-action space. To overcome these limitations, we provide a novel framework that combines federated learning (FL) and deep reinforcement learning (DRL) for efficient jamming attack detection in O-RAN. FL allows decentralized agents to train local models using their data sources, and the models are aggregated into a global model at a Non-real-time RAN Intelligent Controller (RIC) to guide decision-making. The federated learning process enables distributed intelligence, while deep reinforcement learning ensures adaptive and robust jamming attack detection. Our proposed framework improves security, privacy, and resilience in ORAN through collaborative FL and adaptive DRL. Extensive simulations demonstrate its superiority in detection accuracy, resource efficiency, and scalability.
引用
收藏
页码:9334 / 9343
页数:10
相关论文
共 35 条
[21]   Distributed Computation Offloading with Low Latency for Artificial Intelligence in Vehicular Networking [J].
Liu D. ;
Sun F. ;
Wang W. ;
Dev K. .
IEEE Communications Standards Magazine, 2023, 7 (01) :74-80
[22]   Privacy-Preserving Traffic Flow Prediction: A Federated Learning Approach [J].
Liu, Yi ;
Yu, James J. Q. ;
Kang, Jiawen ;
Niyato, Dusit ;
Zhang, Shuyu .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) :7751-7763
[23]   Open RAN security: Challenges and opportunities [J].
Liyanage, Madhusanka ;
Braeken, An ;
Shahabuddin, Shahriar ;
Ranaweera, Pasika .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 214
[24]   Blockchain Empowered Asynchronous Federated Learning for Secure Data Sharing in Internet of Vehicles [J].
Lu, Yunlong ;
Huang, Xiaohong ;
Zhang, Ke ;
Maharjan, Sabita ;
Zhang, Yan .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (04) :4298-4311
[25]   A comprehensive survey and taxonomy of the SVM-based intrusion detection systems [J].
Mohammadi, Mokhtar ;
Rashid, Tarik A. ;
Karim, Sarkhel H. Taher ;
Aldalwie, Adil Hussain Mohammed ;
Quan Thanh Tho ;
Bidaki, Moazam ;
Rahmani, Amir Masoud ;
Hosseinzadeh, Mehdi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 178
[26]   RF Fingerprinting of LoRa Transmitters Using Machine Learning with Self-Organizing Maps for Cyber Intrusion Detection [J].
Nair, Manish ;
Cappello, Tommaso ;
Dang, Shuping ;
Kalokidou, Vaia ;
Beach, Mark A. .
2022 IEEE/MTT-S INTERNATIONAL MICROWAVE SYMPOSIUM (IMS 2022), 2022, :491-494
[27]   Malicious Node Detection Using Machine Learning and Distributed Data Storage Using Blockchain in WSNs [J].
Nouman, Muhammad ;
Qasim, Umar ;
Nasir, Hina ;
Almasoud, Abdullah ;
Imran, Muhammad ;
Javaid, Nadeem .
IEEE ACCESS, 2023, 11 :6106-6121
[28]   Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey [J].
Pirayesh, Hossein ;
Zeng, Huacheng .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (02) :767-809
[29]   Intelligent Drones Trajectory Generation for Mapping Weed Infested Regions Over 6G Networks [J].
Raja, Gunasekaran ;
Philips, Nisha Deborah ;
Ramasamy, Ramesh Krishnan ;
Dev, Kapal ;
Kumar, Neeraj .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (07) :7506-7515
[30]   Securing Federated Learning: A Covert Communication-Based Approach [J].
Xie, Yuan-Ai ;
Kang, Jiawen ;
Niyato, Dusit ;
Van, Nguyen Thi Thanh ;
Luong, Nguyen Cong ;
Liu, Zhixin ;
Yu, Han .
IEEE NETWORK, 2023, 37 (01) :118-124