Reinforcement Learning Enabled Intelligent Energy Attack in Green IoT Networks

被引:6
作者
Li, Long [1 ]
Luo, Yu [2 ]
Yang, Jing [2 ]
Pu, Lina [1 ]
机构
[1] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
[2] Mississippi State Univ, Dept Elect & Commun Engn, Starkville, MS 39762 USA
关键词
Routing; Green products; Batteries; Radio frequency; Energy harvesting; Security; Routing protocols; Green IoT networks; security; malicious energy attack; reinforcement learning;
D O I
10.1109/TIFS.2022.3149148
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we study a new security issue brought by the renewable energy feature in green Internet of Things (IoT) network. We define a new attack method, called the malicious energy attack, where the attacker can charge specific nodes to manipulate routing paths. By intelligently selecting the victim nodes, the attacker can "encourage" most of the data traffic into passing through a compromised node and harm the information security. The performance of the energy attack depends on the charging strategies. We develop two reinforcement-learning enabled algorithms, namely, Q- learning enabled intelligent energy attack (Q-IEA) and Policy Gradient enabled intelligent energy attack (PG-IEA). Through interacting with the network environment, the attacker can intelligently take attack actions without knowing the private information of the IoT network. This can greatly enhance the adaptability of the attacker to different network settings. Simulation results verify that the proposed IEA methods can considerably increase the amount of traffic traveling through the compromised node. Compared with the network without attack, an additional 53.3% data traffic is lured to the compromised node, which is more than 4 times higher than the performance of Random Attack.
引用
收藏
页码:644 / 658
页数:15
相关论文
共 34 条
[1]  
Akhtar F, 2017, IT PROF, V19, P32, DOI 10.1109/MITP.2017.34
[2]   Enhanced Passive RF-DC Converter Circuit Efficiency for Low RF Energy Harvesting [J].
Chaour, Issam ;
Fakhfakh, Ahmed ;
Kanoun, Olfa .
SENSORS, 2017, 17 (03)
[3]   SECRECY WIRELESS INFORMATION AND POWER TRANSFER: CHALLENGES AND OPPORTUNITIES [J].
Chen, Xiaoming ;
Ng, Derrick Wing Kwan ;
Chen, Hsiao-Hwa .
IEEE WIRELESS COMMUNICATIONS, 2016, 23 (02) :54-61
[4]  
Coarasa A. H., 2013, 2013 International Conference on Computing, Networking and Communications (ICNC 2013), P573, DOI 10.1109/ICCNC.2013.6504149
[5]  
Di Mauro Alessio, 2012, Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems. PECCS 2012, P422
[6]   DEARER: A Distance-and-Energy-Aware Routing With Energy Reservation for Energy Harvesting Wireless Sensor Networks [J].
Dong, Yunquan ;
Wang, Jian ;
Shim, Byonghyo ;
Kim, Dong In .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (12) :3798-3813
[7]   Wireless Power Transfer via mmWave Power Beacons With Directional Beamforming [J].
Guo, Jing ;
Zhou, Xiangyun ;
Durrani, Salman .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (01) :17-20
[8]   Cross-layer optimized routing in wireless sensor networks with duty cycle and energy harvesting [J].
Han, Guangjie ;
Dong, Yuhui ;
Guo, Hui ;
Shu, Lei ;
Wu, Dapeng .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2015, 15 (16) :1957-1981
[9]   Harvesting aware power management for sensor networks [J].
Kansal, Aman ;
Hsu, Jason ;
Srivastava, Mani ;
Raghunathan, Vijay .
43RD DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2006, 2006, :651-+
[10]  
Kapetanakis S, 2002, EIGHTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AAAI-02)/FOURTEENTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE (IAAI-02), PROCEEDINGS, P326