I-SEE: Intelligent, Secure, and Energy-Efficient Techniques for Medical Data Transmission Using Deep Reinforcement Learning

被引:12
作者
Allahham, Mhd Saria [1 ]
Abdellatif, Alaa Awad [1 ]
Mohamed, Amr [1 ]
Erbad, Aiman [2 ]
Yaacoub, Elias [1 ]
Guizani, Mohsen [1 ]
机构
[1] Qatar Univ, Coll Engn, Doha, Qatar
[2] Hamad Bin Khalifa Univ, Coll Sci & Engn, Doha, Qatar
关键词
Heuristic algorithms; Data communication; Batteries; Wireless communication; Monitoring; Distortion; Security; Deep reinforcement learning (DRL); edge computing; physical-layer security (PLS); remote monitoring; secrecy outage; PHYSICAL LAYER SECURITY; WIRELESS; OPTIMIZATION;
D O I
10.1109/JIOT.2020.3027048
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid evolution of remote health monitoring applications is foreseen to be a crucial solution for facing an unpredictable health crisis and improving the quality of life. However, such applications come with many challenges, including: the transmission of a large amount of private medical data and the limited power budget for battery-operated devices. Thus, this article proposes an intelligent, secure, and energy-efficient (I-SEE) framework for secure and energy-efficient medical data transmission, leveraging the potential of physical-layer security. In particular, we incorporate a practical secrecy metric, namely, the secrecy outage probability (SOP), along with the adaptive compression at the edge for providing a secure solution for health monitoring applications. In the proposed framework, we first formulate an optimization problem that maximizes the energy efficiency, while maintaining quality-of-service constraints of the health application. Second, we propose a deep reinforcement learning process that obtains the optimal strategy for secure data transmission. Specifically, a multiobjective reward function is defined to optimize energy efficiency and distortion, resulting from the compression scheme. Then, a deep deterministic policy gradients (DDPGs) algorithm, named Static-DDPG is proposed to solve our problem efficiently. Third, the problem is extended to consider the battery lifetime maximization with varying channel conditions. Indeed, a Dynamic-DDPG algorithm is proposed in order to allow the edge to adapt to the environment dynamics while maximizing its battery lifetime. The conducted simulations validate the efficiency of the proposed algorithms in terms of finding the optimal policy that addresses the tradeoff between the considered conflicting objectives, along with the battery lifetime maximization
引用
收藏
页码:6454 / 6468
页数:15
相关论文
共 39 条
  • [1] Edge Computing for Smart Health: Context-Aware Approaches, Opportunities, and Challenges
    Abdellatif, Alaa Awad
    Mohamed, Amr
    Chiasserini, Carla Fabiana
    Tlili, Mounira
    Erbad, Aiman
    [J]. IEEE NETWORK, 2019, 33 (03): : 196 - 203
  • [2] Edge-based compression and classification for smart healthcare systems: Concept, implementation and evaluation
    Abdellatif, Alaa Awad
    Emam, Ahmed
    Chiasserini, Carla-Fabiana
    Mohamed, Amr
    Jaoua, Ali
    Ward, Rabab
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2019, 117 : 1 - 14
  • [3] Ahnn JH, 2013, IEEE ENG MED BIO, P7257, DOI 10.1109/EMBC.2013.6611233
  • [4] Distributed in-network processing and resource optimization over mobile-health systems
    Awad, Alaa
    Mohamed, Amr
    Chiasserini, Carla-Fabiana
    Elfouly, Tarek
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 82 : 65 - 76
  • [5] Awad A, 2014, 2014 10TH INTERNATIONAL CONFERENCE ON HETEROGENEOUS NETWORKING FOR QUALITY, RELIABILITY, SECURITY AND ROBUSTNESS (QSHINE), P108, DOI [10.1109/QSHINE.2014.6928668, 10.4108/icst.qshine.2014.256334]
  • [6] Secrecy capacity of wireless channels
    Barros, Joao
    Rodrigues, Miguel R. D.
    [J]. 2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 356 - +
  • [7] A Deep Learning Approach for Vital Signs Compression and Energy Efficient Delivery in mhealth Systems
    Ben Said, Ahmed
    Al-Sa'd, Mohammad Fathi
    Tlili, Mounira
    Abdellatif, Alaa Awad
    Mohamed, Amr
    Elfouly, Tarek
    Harras, Khaled
    O'Connor, Mark Dennis
    [J]. IEEE ACCESS, 2018, 6 : 33727 - 33739
  • [8] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [9] Boyd L., 2004, Convex Optimization, DOI DOI 10.1017/CBO9780511804441
  • [10] Chatterjee A, 2017, 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), P1116, DOI 10.1109/I2CT.2017.8226301