Risk-Aware Federated Reinforcement Learning-Based Secure IoV Communications

被引:1
作者
Lu, Xiaozhen [1 ,2 ]
Xiao, Liang [3 ]
Xiao, Yilin [4 ]
Wang, Wei [5 ]
Qi, Nan [6 ,7 ]
Wang, Qian [8 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Jiangsu, Peoples R China
[2] Minist Ind & Informat Technol, Key Lab Safety crit Software Dev & Verificat, Nanjing 210016, Jiangsu, Peoples R China
[3] Xiamen Univ, Dept Informat & Commun Engn, Xiamen 361005, Fujian, Peoples R China
[4] Shenzhen Inst Artificial Intelligence & Robot Soc, Shenzhen 518129, Guangdong, Peoples R China
[5] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 210016, Jiangsu, Peoples R China
[6] Nanjing Univ Aeronaut & Astronaut, Key Lab Dynam Cognit Syst Electromagnet Spectrum S, Nanjing 210016, Jiangsu, Peoples R China
[7] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R China
[8] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Hubei, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Eavesdropping; Training; Servers; Resource management; Training data; Accuracy; Optimization; Federated learning; Internet of Vehicles (IoV); reinforcement learning (RL); secure communications; INTERNET; AUTHENTICATION; VEHICLES;
D O I
10.1109/TMC.2024.3447019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth in the number of high-mobility vehicles and booming enhanced applications with restricted latency requirements, downlink communication in Internet of Vehicles (IoV) systems has become increasingly vulnerable to active eavesdropping attacks. This paper proposes a federated learning-enabled secure communication framework for IoV against active eavesdropping, in which the roadside units (RSUs) apply reinforcement learning (RL) model to optimize their downlink transmit power levels, and the server helps update the RL models of the RSUs. First, we design a multi-agent deep RL algorithm for each RSU, which designs a punishment and a blacklist mechanism to mitigate risky explorations related to severe data leakage or communication outages. Second, this framework designs a risk-aware RL for the server, which uses a two-level hierarchical structure to choose the number of participated RSUs and the corresponding local training data size for higher optimization speed. This framework considers both the reward and risk in the selection of policies to reduce the probability of exploring the risky training policies that cause defense failure of the RSUs against active eavesdropping. Third, we analyze the convergence performance, computational complexity, and reward upper bound, which reveals how the power constraint, radio bandwidth and data size affect the secure communication performance. Simulation and experimental results validate the effectiveness of our schemes, such as the reductions of the eavesdropping rate, training latency, and the loss of local models compared to the benchmarks.
引用
收藏
页码:14656 / 14671
页数:16
相关论文
共 43 条
[1]   An Intelligent Data-Driven Model to Secure Intravehicle Communications Based on Machine Learning [J].
Al-Saud, Mamdooh ;
Eltamaly, Ali M. ;
Mohamed, Mohamed A. ;
Kavousi-Fard, Abdollah .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2020, 67 (06) :5112-5119
[2]   On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System [J].
Bagga, Palak ;
Das, Ashok Kumar ;
Wazid, Mohammad ;
Rodrigues, Joel J. P. C. ;
Choo, Kim-Kwang Raymond ;
Park, YoungHo .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (02) :1736-1751
[3]   Performance Evaluation for Secure Communications in Mobile Internet of Vehicles With Joint Reactive Jamming and Eavesdropping Attacks [J].
Bajracharya, Chandra .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (11) :22563-22570
[4]   Edge Computing-Based Joint Client Selection and Networking Scheme for Federated Learning in Vehicular IoT [J].
Bao, Wugedele ;
Wu, Celimuge ;
Guleng, Siri ;
Zhang, Jiefang ;
Yau, Kok-Lim Alvin ;
Ji, Yusheng .
CHINA COMMUNICATIONS, 2021, 18 (06) :39-52
[5]   A Hierarchical Blockchain-Enabled Federated Learning Algorithm for Knowledge Sharing in Internet of Vehicles [J].
Chai, Haoye ;
Leng, Supeng ;
Chen, Yijin ;
Zhang, Ke .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (07) :3975-3986
[6]  
Chen S., 2023, Cellular Vehicle-to-Everything (C-V2X)
[7]   Joint Computation Offloading and Resource Allocation in Multi-Edge Smart Communities With Personalized Federated Deep Reinforcement Learning [J].
Chen, Zheyi ;
Xiong, Bing ;
Chen, Xing ;
Min, Geyong ;
Li, Jie .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (12) :11604-11619
[8]   On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers [J].
Chorti, Arsenia ;
Perlaza, Samir M. ;
Han, Zhu ;
Poor, H. Vincent .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1850-1863
[9]  
Dai CH, 2019, INT CONF ACOUST SPEE, P3057, DOI [10.1109/icassp.2019.8682983, 10.1109/ICASSP.2019.8682983]
[10]   Federated Deep Reinforcement Learning for Efficient Jamming Attack Mitigation in O-RAN [J].
El Houda, Zakaria Abou ;
Moudoud, Hajar ;
Brik, Bouziane .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (07) :9334-9343