A novel deep policy gradient action quantization for trusted collaborative computation in intelligent vehicle networks

被引:21
作者
Chen, Miaojiang [1 ]
Yi, Meng [2 ]
Huang, Mingfeng [1 ]
Huang, Guosheng [3 ]
Ren, Yingying [1 ]
Liu, Anfeng [1 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[2] Southeast Univ, Sch Comp Sci & Engn, Nanjing, Peoples R China
[3] Hunan First Normal Univ, Sch Comp Sci, Changsha, Peoples R China
基金
中国国家自然科学基金;
关键词
Deep reinforcement learning; Multi-agent; Trusted computing; Decision-making; Intelligent vehicle networks; MANAGEMENT SCHEME; EDGE; INTERNET;
D O I
10.1016/j.eswa.2023.119743
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The openness of the intelligent vehicle network makes it easy for selfish or untrustworthy vehicles to maliciously occupy limited resources in the mobile edge network or spread malicious information. However, most of the existing trust models rely on evaluating vehicles or data at the application level. For selfish or forgery attacks in intelligent vehicle networks, we propose a trusted deep reinforcement learning (DRL) cybersecurity approach for computation offloading to evaluate the safety and reliability performance in IoT edge networks, including our intelligent system model and a Deep Policy Gradient Action Quantization (DPGAQ) scheme. By introducing a reputation record table and designing a highly decisive communication trusted computing mode, we can accurately predict the untrusted selfish attack of vehicle in the task offloading of the Internet of things. Furthermore, in the multi-vehicle scenario, because the trusted offloading decision is a mixed integer programming problem, which leads to the dimension explosion of channel state and space, we propose a joint action-value quantization with attention mechanism to approximate the continuous actions values to a limited number of discrete values. Because it is not only inefficient but also unnecessary to generate high-dimensional decision actions in each time frame, we prune the infeasible action decisions by order preserving pruning to reduce the computational complexity of training and achieve efficient training on the premise of ensuring accuracy. To verify the feasibility and effectiveness of our proposed algorithm, millions of channels of edge vehicle networks are used as the input data. The simulation results show that compared with the benchmark trust model, DPGAQ achieves more than 72% reputation level, and improves 11%, 10% and 11% respectively in precision, recall and F-score.
引用
收藏
页数:13
相关论文
共 41 条
[11]   ARTIFICIAL INTELLIGENCE EMPOWERED EDGE COMPUTING AND CACHING FOR INTERNET OF VEHICLES [J].
Dai, Yueyue ;
Xu, Du ;
Maharjan, Sabita ;
Qiao, Guanhua ;
Zhang, Yan .
IEEE WIRELESS COMMUNICATIONS, 2019, 26 (03) :12-18
[12]   Driverless vehicle security: Challenges and future research opportunities [J].
De La Torre, Gonzalo ;
Rad, Paul ;
Choo, Kim-Kwang Raymond .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 :1092-1111
[13]   SDN-Based Resource Allocation in Edge and Cloud Computing Systems: An Evolutionary Stackelberg Differential Game Approach [J].
Du, Jun ;
Jiang, Chunxiao ;
Benslimane, Abderrahim ;
Guo, Song ;
Ren, Yong .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (04) :1613-1628
[14]   Machine Learning for 6G Wireless Networks: Carrying Forward Enhanced Bandwidth, Massive Access, and Ultrareliable/Low-Latency Service [J].
Du, Jun ;
Jiang, Chunxiao ;
Wang, Jian ;
Ren, Yong ;
Debbah, Merouane .
IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2020, 15 (04) :122-134
[15]   Computational Offloading for Energy Constrained Devices in Multi-Hop Cooperative Networks [J].
Funai, Colin ;
Tapparello, Cristiano ;
Heinzelman, Wendi .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 19 (01) :60-73
[16]  
He KM, 2015, PROC CVPR IEEE, P5353, DOI 10.1109/CVPR.2015.7299173
[17]   Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach [J].
He, Ting ;
Ciftcioglu, Ertugrul Necdet ;
Wang, Shiqiang ;
Chan, Kevin S. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (11) :2625-2636
[18]   Distance Encoded Product Quantization for Approximate K-Nearest Neighbor Search in High-Dimensional Space [J].
Heo, Jae-Pil ;
Lin, Zhe ;
Yoon, Sung-Eui .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2019, 41 (09) :2084-2097
[19]   Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks [J].
Huang, Liang ;
Bi, Suzhi ;
Zhang, Ying-Jun Angela .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 19 (11) :2581-2593
[20]   Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts [J].
Kosba, Ahmed ;
Miller, Andrew ;
Shi, Elaine ;
Wen, Zikai ;
Papamanthou, Charalampos .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, :839-858