Reinforcement Learning Enabled Intelligent Energy Attack in Green IoT Networks

被引:3
作者
Li, Long [1 ]
Luo, Yu [2 ]
Yang, Jing [2 ]
Pu, Lina [1 ]
机构
[1] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
[2] Mississippi State Univ, Dept Elect & Commun Engn, Starkville, MS 39762 USA
关键词
Routing; Green products; Batteries; Radio frequency; Energy harvesting; Security; Routing protocols; Green IoT networks; security; malicious energy attack; reinforcement learning;
D O I
10.1109/TIFS.2022.3149148
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we study a new security issue brought by the renewable energy feature in green Internet of Things (IoT) network. We define a new attack method, called the malicious energy attack, where the attacker can charge specific nodes to manipulate routing paths. By intelligently selecting the victim nodes, the attacker can "encourage" most of the data traffic into passing through a compromised node and harm the information security. The performance of the energy attack depends on the charging strategies. We develop two reinforcement-learning enabled algorithms, namely, Q- learning enabled intelligent energy attack (Q-IEA) and Policy Gradient enabled intelligent energy attack (PG-IEA). Through interacting with the network environment, the attacker can intelligently take attack actions without knowing the private information of the IoT network. This can greatly enhance the adaptability of the attacker to different network settings. Simulation results verify that the proposed IEA methods can considerably increase the amount of traffic traveling through the compromised node. Compared with the network without attack, an additional 53.3% data traffic is lured to the compromised node, which is more than 4 times higher than the performance of Random Attack.
引用
收藏
页码:644 / 658
页数:15
相关论文
共 34 条
  • [1] Akhtar F, 2017, IT PROF, V19, P32, DOI 10.1109/MITP.2017.34
  • [2] Enhanced Passive RF-DC Converter Circuit Efficiency for Low RF Energy Harvesting
    Chaour, Issam
    Fakhfakh, Ahmed
    Kanoun, Olfa
    [J]. SENSORS, 2017, 17 (03)
  • [3] SECRECY WIRELESS INFORMATION AND POWER TRANSFER: CHALLENGES AND OPPORTUNITIES
    Chen, Xiaoming
    Ng, Derrick Wing Kwan
    Chen, Hsiao-Hwa
    [J]. IEEE WIRELESS COMMUNICATIONS, 2016, 23 (02) : 54 - 61
  • [4] Coarasa A. H., 2013, 2013 International Conference on Computing, Networking and Communications (ICNC 2013), P573, DOI 10.1109/ICCNC.2013.6504149
  • [5] Di Mauro Alessio, 2012, Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems. PECCS 2012, P422
  • [6] DEARER: A Distance-and-Energy-Aware Routing With Energy Reservation for Energy Harvesting Wireless Sensor Networks
    Dong, Yunquan
    Wang, Jian
    Shim, Byonghyo
    Kim, Dong In
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (12) : 3798 - 3813
  • [7] Wireless Power Transfer via mmWave Power Beacons With Directional Beamforming
    Guo, Jing
    Zhou, Xiangyun
    Durrani, Salman
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (01) : 17 - 20
  • [8] Cross-layer optimized routing in wireless sensor networks with duty cycle and energy harvesting
    Han, Guangjie
    Dong, Yuhui
    Guo, Hui
    Shu, Lei
    Wu, Dapeng
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2015, 15 (16) : 1957 - 1981
  • [9] Harvesting aware power management for sensor networks
    Kansal, Aman
    Hsu, Jason
    Srivastava, Mani
    Raghunathan, Vijay
    [J]. 43RD DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2006, 2006, : 651 - +
  • [10] Kapetanakis S, 2002, EIGHTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AAAI-02)/FOURTEENTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE (IAAI-02), PROCEEDINGS, P326