Deep Transfer Learning for Physical Layer Security in Wireless Communication Systems

被引:3
作者
Rawat, Danda B. [1 ]
机构
[1] Howard Univ, Dept Elect Engn & Comp Sci, DoD Ctr Excellence Artificial Intelligence & Mach, Washington, DC 20059 USA
来源
2021 THIRD IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2021) | 2021年
关键词
Deep transfer learning; machine learning; physical layer security; wireless communications in Battlefield; large scale MIMO; secrecy rate; SECRECY CAPACITY; MIMO; TRANSMISSION;
D O I
10.1109/TPSISA52974.2021.00033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine learning has been used in wireless networking for wireless RF allocation, power allocations, predicting traffic load and inferencing/estimating channels. However, machine learning in wireless networking faces several challenges because of the big or small data, unlabeled data, system complexity, long training process, resource constrained (energy, storage, computing) wireless devices, and constantly changing user mobility, dynamic network topology, susceptibility of wireless jammers and eavesdroppers, and operating wireless environment. In order to address these challenges, transfer learning is regarded as one of the viable solutions as it leverages the knowledge from similar past tasks for learning of new problems. In this paper, we investigate deep transfer learning for physical layer security in wireless networks with large-scale multiple-input multiple output (MIMO) system where previously trained model is transferred to a new wireless environment to predict secure waveform vectors and power levels for users who coexist with eavesdroppers (who overhear communications passively for resulting in lower secrecy rate for legitimate users) and jammers (who actively jam the channels or deteriorate the received signal at the legitimate receivers). In this case, a legitimate transmitter adapts it's transmit waveform and power using transfer learning to avoid jamming and eavesdropping impacts. This is analogous to training war-fighters in a training camp and deploying them to a completely new real battlefield where they are expected to (learn instantly and) defeat the enemy based on their past training. We evaluate the performance of the proposed approach using numerical results obtained from extensive simulations.
引用
收藏
页码:289 / 296
页数:8
相关论文
共 33 条
[1]  
[Anonymous], 2015, CYBER PHYS SYSTEMS T
[2]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[3]  
Dean T, 2013, 2013 IEEE INFORMATION THEORY WORKSHOP (ITW)
[4]   Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding [J].
Geraci, Giovanni ;
Egan, Malcolm ;
Yuan, Jinhong ;
Razi, Adeel ;
Collings, Iain B. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2012, 60 (11) :3472-3482
[5]   Secrecy Outage in MISO Systems With Partial Channel Information [J].
Gerbracht, Sabrina ;
Scheunert, Christian ;
Jorswieck, Eduard A. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) :704-716
[6]   Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks [J].
Goeckel, Dennis ;
Vasudevan, Sudarshan ;
Towsley, Don ;
Adams, Stephan ;
Ding, Z. ;
Leung, K. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (10) :2067-2076
[7]   Energy and Spectral Efficiency of Very Large Multiuser MIMO Systems [J].
Hien Quoc Ngo ;
Larsson, Erik G. ;
Marzetta, Thomas L. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (04) :1436-1449
[8]  
Hoydis Jakob, 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton), P545
[9]  
Jeschke S, 2017, SP SER WIRELESS TECH, P1, DOI 10.1007/978-3-319-42559-7
[10]   A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel [J].
Liu, Tie ;
Shamai , Shlomo .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (06) :2547-2553