Secure Transmission in Cellular V2X Communications Using Deep Q-Learning

被引:15
作者
Jameel, Furqan [1 ]
Javed, Muhammad Awais [2 ]
Zeadally, Sherali [3 ]
Jantti, Riku [1 ]
机构
[1] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
[2] COMSATS Univ Islamabad, Elect & Comp Engn Dept, Islamabad 45550, Pakistan
[3] Univ Kentucky, Coll Commun & Informat, Lexington, KY 40506 USA
关键词
Vehicle-to-everything; Interference; Security; Q-learning; Resource management; Wireless communication; Signal to noise ratio; Deep Q-learning; interference management; physical layer security; V2X communications; RESOURCE-ALLOCATION; NETWORKS; OPTIMIZATION; LATENCY;
D O I
10.1109/TITS.2022.3165791
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Cellular vehicle-to-everything (V2X) communication is emerging as a feasible and cost-effective solution to support applications such as vehicle platooning, blind spot detection, parking assistance, and traffic management. To support these features, an increasing number of sensors are being deployed along the road in the form of roadside objects. However, despite the hype surrounding cellular V2X networks, the practical realization of such networks is still hampered by under-developed physical security solutions. To solve the issue of wireless link security, we propose a deep Q-learning-based strategy to secure V2X links. Since one of the main responsibilities of the base station (BS) is to manage interference in the network, the link security is ensured without compromising the interference level in the network. The formulated problem considers both the power and interference constraints while maximizing the secrecy rate of the vehicles. Subsequently, we develop the reward function of the deep Q-learning network for performing efficient power allocation. The simulation results obtained demonstrate the effectiveness of our proposed learning approach. The results provided here will provide a strong basis for future research efforts in the domain of vehicular communications.
引用
收藏
页码:17167 / 17176
页数:10
相关论文
共 46 条
[21]   Secrecy Rate Maximization via Radio Resource Allocation in Cellular Underlaying V2V Communications [J].
Liu, Yiliang ;
Wang, Wei ;
Chen, Hsiao-Hwa ;
Wang, Liangmin ;
Cheng, Nan ;
Meng, Weixiao ;
Shen, Xuemin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (07) :7281-7294
[22]   An introduction to convex optimization for communications and signal processing [J].
Luo, Zhi-Quan ;
Yu, Wei .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (08) :1426-1438
[23]   A Latency and Reliability Guaranteed Resource Allocation Scheme for LTE V2V Communication Systems [J].
Mei, Jie ;
Zheng, Kan ;
Zhao, Long ;
Teng, Yong ;
Wang, Xianbin .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (06) :3850-3860
[24]  
Niknam S., 2018, P IEEE INT C COMM WO, P1
[25]   Optimization of Learning Cycles in Online Reinforcement Learning Systems [J].
Notsu, Akira ;
Yasuda, Koji ;
Ubukata, Seiki ;
Honda, Katsuhiro .
2018 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2018, :3530-3534
[26]   Enabling Security-Aware D2D Spectrum Resource Sharing for Connected Autonomous Vehicles [J].
Peng, Xuesen ;
Zhou, Haibo ;
Qian, Bo ;
Yu, Kai ;
Lyu, Feng ;
Xu, Wenchao .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) :3799-3811
[27]  
Peng XS, 2019, IEEE VTS VEH TECHNOL, DOI [10.1109/vtcfall.2019.8891599, 10.1109/VTCFall.2019.8891599]
[28]   Optimal Access Scheme for Security Provisioning of C-V2X Computation Offloading Network With Imperfect CSI [J].
Qiu, Bin ;
Xiao, Hailin ;
Chronopoulos, Anthony Theodore ;
Zhou, Di ;
Ouyang, Shan .
IEEE ACCESS, 2020, 8 :9680-9691
[29]   Deep Deterministic Policy Gradient (DDPG)-Based Energy Harvesting Wireless Communications [J].
Qiu, Chengrun ;
Hu, Yang ;
Chen, Yan ;
Zeng, Bing .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8577-8588
[30]  
Sharma S, 2019, 2019 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), P489, DOI [10.1109/SPIN.2019.8711578, 10.1109/spin.2019.8711578]