Physical-Layer Security Enhancement in Energy-Harvesting-Based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach

被引:13
|
作者
Lin, Ruiquan [1 ]
Qiu, Hangding [1 ]
Wang, Jun [1 ]
Zhang, Zaichen [2 ]
Wu, Liang [2 ]
Shu, Feng [3 ,4 ]
机构
[1] Fuzhou Univ, Coll Elect Engn & Automat, Fuzhou 350108, Peoples R China
[2] Southeast Univ, Frontiers Sci Ctr Mobile Informat Commun & Secur, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[3] Hainan Univ, Sch Informat & Commun Engn, Haikou 570228, Peoples R China
[4] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210094, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 03期
关键词
Jamming; Internet of Things; Wireless communication; Resource management; Communication system security; 6G mobile communication; Mobile handsets; Cognitive radio (CR) network; deep reinforcement learning (DRL); energy harvesting (EH); physical-layer security (PLS) enhancement; RESOURCE-ALLOCATION; INDUSTRIAL INTERNET; EFFICIENT; TRANSMISSION; NETWORKS; SYSTEMS; RADIOS;
D O I
10.1109/JIOT.2023.3300770
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cognitive radio (CR) is regarded as the key technology of the 6th-Generation (6G) wireless network. Because 6G CR networks are anticipated to offer worldwide coverage, increase cost efficiency, enhance spectrum utilization, and improve device intelligence and network safety. This article studies the secrecy communication in an energy-harvesting (EH)-enabled Cognitive Internet of Things (EH-CIoT) network with a cooperative jammer. The secondary transmitters (STs) and the jammer first harvest the energy from the received radio frequency (RF) signals in the EH phase. Then, in the subsequent wireless information transfer (WIT) phase, the STs transmit secrecy information to their intended receivers in the presence of eavesdroppers while the jammer sends the jamming signal to confuse the eavesdroppers. To evaluate the system secrecy performance, we derive the instantaneous secrecy rate and the closed-form expression of secrecy outage probability (SOP). Furthermore, we propose a deep reinforcement learning (DRL)-based framework for the joint EH time and transmission power allocation problems. Specifically, a pair of ST and jammer over each time block is modeled as an agent which is dynamically interacting with the environment by the state, action, and reward mechanisms. To better find the optimal solutions to the proposed problems, the long short-term memory (LSTM) network and the generative adversarial networks (GANs) are combined with the classical DRL algorithm. The simulation results show that our proposed method is highly effective in maximizing the secrecy rate while minimizing the SOP compared with other existing schemes.
引用
收藏
页码:4899 / 4913
页数:15
相关论文
共 28 条
  • [1] Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks
    Lin, Ruiquan
    Qiu, Hangding
    Jiang, Weibin
    Jiang, Zhenglong
    Li, Zhili
    Wang, Jun
    SENSORS, 2023, 23 (02)
  • [2] Deep Reinforcement Learning Optimal Transmission Algorithm for Cognitive Internet of Things With RF Energy Harvesting
    Guo, Shaoai
    Zhao, Xiaohui
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (02) : 1216 - 1227
  • [3] A lightweight physical-layer based security strategy for Internet of things
    Jiang, Yu
    Hu, Aiqun
    Huang, Jie
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 12971 - 12983
  • [4] A lightweight physical-layer based security strategy for Internet of things
    Yu Jiang
    Aiqun Hu
    Jie Huang
    Cluster Computing, 2019, 22 : 12971 - 12983
  • [5] Physical-layer security in Internet of Things based on compressed sensing and frequency selection
    Wang, Ning
    Jiang, Ting
    Li, Weiwei
    Lv, Shichao
    IET COMMUNICATIONS, 2017, 11 (09) : 1431 - 1437
  • [6] Physical Layer Security Enhancement in AAV-Assisted Cooperative Jamming for Cognitive Radio Networks: A MAPPO-LSTM Deep Reinforcement Learning Approach
    Wang, Jun
    Wang, Rong
    Zheng, Zibin
    Lin, Ruiquan
    Wu, Liang
    Shu, Feng
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2025, 74 (03) : 4713 - 4727
  • [7] Permissioned Blockchain and Deep Reinforcement Learning Enabled Security and Energy Efficient Healthcare Internet of Things
    Liu, Long
    Li, Zhichao
    IEEE ACCESS, 2022, 10 : 53640 - 53651
  • [8] Deep-Reinforcement-Learning-Based Energy-Efficient Resource Management for Social and Cognitive Internet of Things
    Yang, Helin
    Zhong, Wen-De
    Chen, Chen
    Alphones, Arokiaswami
    Xie, Xianzhong
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 5677 - 5689
  • [9] Security defense strategy algorithm for Internet of Things based on deep reinforcement learning
    Feng, Xuecai
    Han, Jikai
    Zhang, Rui
    Xu, Shuo
    Xia, Hui
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (01):
  • [10] An Actor-Critic Deep Reinforcement Learning Approach for Transmission Scheduling in Cognitive Internet of Things Systems
    Yang, Helin
    Xie, Xianzhong
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 51 - 60