A novel deep policy gradient action quantization for trusted collaborative computation in intelligent vehicle networks

被引:17
作者
Chen, Miaojiang [1 ]
Yi, Meng [2 ]
Huang, Mingfeng [1 ]
Huang, Guosheng [3 ]
Ren, Yingying [1 ]
Liu, Anfeng [1 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[2] Southeast Univ, Sch Comp Sci & Engn, Nanjing, Peoples R China
[3] Hunan First Normal Univ, Sch Comp Sci, Changsha, Peoples R China
基金
中国国家自然科学基金;
关键词
Deep reinforcement learning; Multi-agent; Trusted computing; Decision-making; Intelligent vehicle networks; MANAGEMENT SCHEME; EDGE; INTERNET;
D O I
10.1016/j.eswa.2023.119743
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The openness of the intelligent vehicle network makes it easy for selfish or untrustworthy vehicles to maliciously occupy limited resources in the mobile edge network or spread malicious information. However, most of the existing trust models rely on evaluating vehicles or data at the application level. For selfish or forgery attacks in intelligent vehicle networks, we propose a trusted deep reinforcement learning (DRL) cybersecurity approach for computation offloading to evaluate the safety and reliability performance in IoT edge networks, including our intelligent system model and a Deep Policy Gradient Action Quantization (DPGAQ) scheme. By introducing a reputation record table and designing a highly decisive communication trusted computing mode, we can accurately predict the untrusted selfish attack of vehicle in the task offloading of the Internet of things. Furthermore, in the multi-vehicle scenario, because the trusted offloading decision is a mixed integer programming problem, which leads to the dimension explosion of channel state and space, we propose a joint action-value quantization with attention mechanism to approximate the continuous actions values to a limited number of discrete values. Because it is not only inefficient but also unnecessary to generate high-dimensional decision actions in each time frame, we prune the infeasible action decisions by order preserving pruning to reduce the computational complexity of training and achieve efficient training on the premise of ensuring accuracy. To verify the feasibility and effectiveness of our proposed algorithm, millions of channels of edge vehicle networks are used as the input data. The simulation results show that compared with the benchmark trust model, DPGAQ achieves more than 72% reputation level, and improves 11%, 10% and 11% respectively in precision, recall and F-score.
引用
收藏
页数:13
相关论文
共 41 条
  • [11] ARTIFICIAL INTELLIGENCE EMPOWERED EDGE COMPUTING AND CACHING FOR INTERNET OF VEHICLES
    Dai, Yueyue
    Xu, Du
    Maharjan, Sabita
    Qiao, Guanhua
    Zhang, Yan
    [J]. IEEE WIRELESS COMMUNICATIONS, 2019, 26 (03) : 12 - 18
  • [12] Driverless vehicle security: Challenges and future research opportunities
    De La Torre, Gonzalo
    Rad, Paul
    Choo, Kim-Kwang Raymond
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 1092 - 1111
  • [13] SDN-Based Resource Allocation in Edge and Cloud Computing Systems: An Evolutionary Stackelberg Differential Game Approach
    Du, Jun
    Jiang, Chunxiao
    Benslimane, Abderrahim
    Guo, Song
    Ren, Yong
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (04) : 1613 - 1628
  • [14] Machine Learning for 6G Wireless Networks: Carrying Forward Enhanced Bandwidth, Massive Access, and Ultrareliable/Low-Latency Service
    Du, Jun
    Jiang, Chunxiao
    Wang, Jian
    Ren, Yong
    Debbah, Merouane
    [J]. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2020, 15 (04): : 122 - 134
  • [15] Computational Offloading for Energy Constrained Devices in Multi-Hop Cooperative Networks
    Funai, Colin
    Tapparello, Cristiano
    Heinzelman, Wendi
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 19 (01) : 60 - 73
  • [16] He KM, 2015, PROC CVPR IEEE, P5353, DOI 10.1109/CVPR.2015.7299173
  • [17] Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach
    He, Ting
    Ciftcioglu, Ertugrul Necdet
    Wang, Shiqiang
    Chan, Kevin S.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (11) : 2625 - 2636
  • [18] Distance Encoded Product Quantization for Approximate K-Nearest Neighbor Search in High-Dimensional Space
    Heo, Jae-Pil
    Lin, Zhe
    Yoon, Sung-Eui
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2019, 41 (09) : 2084 - 2097
  • [19] Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
    Huang, Liang
    Bi, Suzhi
    Zhang, Ying-Jun Angela
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 19 (11) : 2581 - 2593
  • [20] Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
    Kosba, Ahmed
    Miller, Andrew
    Shi, Elaine
    Wen, Zikai
    Papamanthou, Charalampos
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 839 - 858