[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Secure and Reliable D2D Communications with Active Attackers: A Game-Theoretic Perspective and Machine Learning Approaches

  • Conference paper
  • First Online:
Machine Learning and Intelligent Communications (MLICOM 2020)

Abstract

Frequent communications among massive terminal devices are ubiquitous in forthcoming 5G Internet of Thing (IoT) networks. It strengthens links of massive machine-type-communication (MMTC), pushes forward the process of Internet of everything. However, due to continual interactions among different devices and the broadcast characteristic of wireless channels, it also brings new security challenges. Recently, physical layer security launches a new solution to guarantee information theoretic security. To enhance the physical layer security performance of massive intelligent devices, especially in D2D communications, the game theory and machine learning methods are introduced. In this paper, we first review physical layer security problems on D2D communications under different attack scenarios. Game theory is proposed to describe hierarchical and heterogeneous interactions among legitimate users and active attackers in 5G IoT networks, then some distributed machine learning methods are proposed to obtain equilibrium states among different agents. Moreover, numerical results are provided to verify availability and efficiency of proposed game-theoretic learning approaches. Finally, we discuss open issues and future research directions in term of anti-eavesdropping and anti-jamming problems in D2D communications when facing active attackers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ahmed, K.-I., Tabassum, H., Hossain, E.: Deep learning for radio resource allocation in multi-cell networks. IEEE Network Early Access 33(6), 188–195 (2019)

    Article  Google Scholar 

  2. Nawaz, S.-J., Sharma, S.-K., Wyne, S., Patwary, M.-N., Asaduzzaman, M.: Quantum machine learning for 6G communication networks: state-of-the-art and vision for the future. IEEE Access 7, 46317–46350 (2019)

    Article  Google Scholar 

  3. Alrowaily, M., Lu, Z.: Secure edge computing in IoT systems: review and case studies. In: 2018 IEEE/ACM Symposium on Edge Computing (SEC), Seattle, WA, pp. 440–444 (2018)

    Google Scholar 

  4. Zhang, P., Niu, K., Tian, H., Nie, G.-F., Qi, Q., Zhang, J.: Technology prospect of 6G mobile communications. J. Commun. 40(1), 141–148 (2019)

    Google Scholar 

  5. Sim, G.-H., Klos, S., Asadi, A., Klein, A., Hollick, M.: An online context-aware machine learning algorithm for 5G mmWave vehicular communications. IEEE/ACM Trans. Networking 26(6), 2487–2500 (2018)

    Article  Google Scholar 

  6. Hamamreh, J.-M., Arslan, H.: Joint PHY/MAC layer security design using ARQ with MRC and null-space independent, PAPR-aware artificial noise in SISO systems. IEEE Trans. Wireless Communications 17(9), 6190–6204 (2018)

    Article  Google Scholar 

  7. Zheng, G., Krikidis, I., Li, J., Petropulu, A.P., Ottersten, B.: Improving physical layer secrecy using full-duplex jamming receivers. IEEE Trans. Signal Process. 61(20), 4962–4974 (2013)

    Article  MathSciNet  Google Scholar 

  8. Geraci, G., Egan, M., Yuan, J., Razi, A., Collings, I.-B.: Secrecy sum-rates for multi-user MIMO regularized channel inversion precoding. IEEE Trans. Commun. 60(11), 3472–3482 (2012)

    Article  Google Scholar 

  9. Zou, Y.-L., Champagne, B., Zhu, W.-P., Hanzo, L.: Relay-selection improves the security-reliability tradeoff in cognitive radio systems. IEEE Trans. Commun. 63(1), 215–228 (2015)

    Article  Google Scholar 

  10. Tang, X., Ren, P.-R., Wang, Y.-C., Han, Z.: Combating full-duplex active eavesdropper: a hierarchical game perspective. IEEE Trans. Commun. 65(3), 1379–1395 (2017)

    Article  Google Scholar 

  11. Abedi, M.-R., Mokari, N., Saeedi, H., Yanikomeroglu, H.: Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: active adversary. IEEE Trans. Wireless Commun. 16(2), 885–899 (2017)

    Article  Google Scholar 

  12. Li, L., Petropulu, A.-P., Chen, Z.: MIMO secret communications against an active eavesdropper. IEEE Trans. Inf. Forensics Secur. 12(10), 2387–2401 (2017)

    Article  Google Scholar 

  13. Qu, J., Cai, Y., Zheng, J., Yang, W., Wu, D., Hu, Y.: Power allocation for device-to-device communication underlaying cellular networks under a probabilistic eavesdropping scenario. Ann. Telecommun. 71(7), 389–398 (2016). https://doi.org/10.1007/s12243-016-0515-x

    Article  Google Scholar 

  14. Mei, W.-D., Chen, Z., Fang, J., Fu, B.: Secure D2D-enabled cellular communication against selective eavesdropping. In: IEEE ICC 2017 Communication and Information System Security Symposium, pp. 1–6 (2017)

    Google Scholar 

  15. Mukherjee, A., Swindlehurst, A.-L.: Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Trans. Signal Process. 61(1), 82–91 (2013)

    Article  MathSciNet  Google Scholar 

  16. Luo, Y., Yang, Y., Duan, Y., Yang, Z.: Joint D2D cooperative relaying and friendly jamming selection for physical layer security. In: Meng, L., Zhang, Y. (eds.) MLICOM 2018. LNICST, vol. 251, pp. 115–126. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00557-3_12

    Chapter  Google Scholar 

  17. Luo, Y.-L., Feng, Z., Jiang, H., Yang, Y., Huang, Y., Yao, J.: Game-theoretic learning approaches for secure D2D communications against full-duplex active eavesdropper. IEEE Access 7, 41324–41335 (2019)

    Article  Google Scholar 

  18. Yang, D., Xue, G., Zhang, J., Richa, A., Fang, X.: Coping with a smart jammer in wireless networks: a Stackelberg game approach. IEEE Trans. Wireless Commun. 12(8), 4038–4047 (2013)

    Article  Google Scholar 

  19. Xu, Y., et al.: A one-leader multi-follower Bayesian-Stackelberg game for anti-jamming transmission in UAV communication networks. IEEE Access 6, 21697–21709 (2018)

    Article  Google Scholar 

  20. Yu, L., Wu, Q., Xu, Y., Ding, G., Jia, L.: Power control games for multi-user anti-jamming communications. Wireless Netw. 25(5), 2365–2374 (2018). https://doi.org/10.1007/s11276-018-1664-9

    Article  Google Scholar 

  21. Tang, X., Ren, P., Wang, Y., Du, Q., Sun, L.: Securing wireless transmission against reactive jamming: a Stackelberg game framework. In: Proceeding of IEEE GLOBECOM, pp. 1–6 (2015)

    Google Scholar 

  22. Wu, Y., Wang, B., Liu, K.J.R., Clancy, T.C.: Anti-jamming games in multi-channel cognitive radio networks. IEEE J. Sel. Areas Commun. 30(1), 4–15 (2012)

    Article  Google Scholar 

  23. Liu, X., Xu, Y., Jia, L., Wu, Q., Anpalagan, A.: Anti-jamming communications using spectrum waterfall: a deep reinforcement learning approach. IEEE Commun. Lett. 22(5), 998–1001 (2018)

    Article  Google Scholar 

  24. Feng, Z.-B., et al.: Power control in relay-assisted anti-Jamming systems: a Bayesian three-layer Stackelberg game approach. IEEE Access 7, 14623–14636 (2019)

    Article  Google Scholar 

  25. Song, L., Niyato, D., Han, Z., Hossain, E.: Game-theoretic resource allocation methods for device-to-device communication. IEEE Commun. Mag. 21(3), 136–144 (2014)

    Google Scholar 

  26. Wang, F., Song, L., Han, Z., Zhao, Q., Wang, X.: Joint scheduling and resource allocation for device-to-device underlay communication. In: IEEE Wireless Communication and Networking Conference (WCNC), pp. 1–6 (2013)

    Google Scholar 

  27. Chu, Z., et al.: Game theory based secure wireless powered D2D communications with cooperative jamming. In: Wireless Days, pp. 95–98 (2017)

    Google Scholar 

  28. Luo, Y.-J., Yang, Y., Cui, L.: Research on physical layer security in D2D enabled cellular networks with an active eavesdropper. Sig. Process. 34(1), 119–125 (2018)

    Google Scholar 

  29. Tang, X., Ren, P., Han, Z.: Power-efficient secure transmission against full-duplex active eavesdropper: a game-theoretic framework. IEEE Access 5, 24632–24645 (2017)

    Article  Google Scholar 

  30. Huang, W., Chen, W., Bai, B., Han, Z.: Wiretap channel with full-duplex proactive eavesdropper: a game theoretic approach. IEEE Trans. Veh. Technol. 67(8), 7658–7663 (2018)

    Article  Google Scholar 

  31. Fang, H., Xu, L., Zou, Y., Wang, X., Choo, K.R.: Three-stage Stackelberg game for defending against full-duplex active eavesdropping attacks in cooperative communication. IEEE Trans. Veh. Technol. 67(11), 10788–10799 (2018)

    Article  Google Scholar 

  32. Luo, Y.-J., Yang, Y.: D2D friendly jamming and cooperative relaying for combating a full-duplex active eavesdropper. In: ICCT 2019, pp. 1–6 (2019)

    Google Scholar 

  33. Jia, L., Yao, F., Sun, Y., et al.: Bayesian Stackelberg game for anti-jamming transmission with incomplete information. IEEE Commun. Lett. 20(10), 1991–1994 (2016)

    Article  Google Scholar 

  34. Li, Y., Xiao, L., Liu, J., et al.: Power control Stackelberg game in cooperative anti-jamming communications. In: International Conference on Game Theory for Networks, pp. 1–6 (2015)

    Google Scholar 

  35. Jia, L., Yao, F., Sun, Y., et al.: A hierarchical learning solution for anti-jamming Stackelberg game with discrete power strategies. IEEE Wirel. Commun. Lett. 6(6), 818–821 (2017)

    Article  Google Scholar 

  36. Feng, Z., et al.: An anti-Jamming hierarchical optimization approach in relay communication system via Stackelberg game. Appl. Sci. 9, 1–14 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yijie Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Luo, Y., Yang, Y., An, S., Feng, Z. (2021). Secure and Reliable D2D Communications with Active Attackers: A Game-Theoretic Perspective and Machine Learning Approaches. In: Guan, M., Na, Z. (eds) Machine Learning and Intelligent Communications. MLICOM 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 342. Springer, Cham. https://doi.org/10.1007/978-3-030-66785-6_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66785-6_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66784-9

  • Online ISBN: 978-3-030-66785-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics