Abstract
Wireless body area network (WBAN) suffers secure challenges, especially the eavesdropping attack, due to constraint resources. In this article, deep reinforcement learning (DRL) and mobile edge computing (MEC) technology are adopted to formulate a DRL-MEC-based jamming-aided anti-eavesdropping (DMEC-JAE) scheme to resist the eavesdropping attack without considering the channel state information. In this scheme, a MEC sensor is chosen to send artificial jamming signals to improve the secrecy rate of the system. Power control technique is utilized to optimize the transmission power of both the source sensor and the MEC sensor to save energy. The remaining energy of the MEC sensor is concerned to ensure routine data transmission and jamming signal transmission. Additionally, the DMEC-JAE scheme integrates with transfer learning for a higher learning rate. The performance bounds of the scheme concerning the secrecy rate, energy consumption, and the utility are evaluated. Simulation results show that the DMEC-JAE scheme can approach the performance bounds with high learning speed, which outperforms the benchmark schemes.
- [1] IEEE. 2012. IEEE standard for local and metropolitan area networks: Part 15.6: Wireless body area networks. IEEE Std 802.15.6-2012 (Feb. 2012), 1–271.Google Scholar
- [2] . 2020. COVID-19 networking demand: An auction-based mechanism for automated selection of edge computing services. IEEE Transactions on Network Science and Engineering. Retrieved from https://ieeexplore.ieee.org/document/9205640.Google Scholar
- [3] . 2012. Link technologies and blackberry mobile health (mHealth) solutions: A review. IEEE Transactions on Information Technology in Biomedicine 16, 4 (
Jul. 2012), 586–597. Google ScholarDigital Library
- [4] . 2020. Using reinforcement learning to minimize the probability of delay occurrence in transportation. IEEE Transactions on Vehicular Technology 69, 3 (2020), 2424–2436.Google Scholar
Cross Ref
- [5] . 2016. A unified framework for vehicle rerouting and traffic light control to reduce traffic congestion. IEEE Transactions on Intelligent Transportation Systems 18, 7 (2016), 1958–1973.Google Scholar
Digital Library
- [6] . 2014. A survey on wireless body area networks: Technologies and design challenges. IEEE Communications Surveys Tutorials 16, 3 (
Feb. 2014), 1635–1657.Google ScholarCross Ref
- [7] . 2018. Reinforcement learning-based sensor access control for WBANs. IEEE Access 7 (
Dec. 2018), 8483–8494.Google ScholarCross Ref
- [8] . 2019. Smart-edge-cocaco: AI-enabled smart edge with joint computation, caching, and communication in heterogeneous IoT. IEEE Network 33, 2 (2019), 58–64.Google Scholar
Cross Ref
- [9] . 2017. Cloud-supported cyber-physical localization framework for patients monitoring. IEEE Systems Journal 11, 1 (2017), 118–127.Google Scholar
Cross Ref
- [10] . 2020. Scalable and communication-efficient decentralized federated edge learning with multi-blockchain framework. arXiv:2008.04743. Retrieved from https://arxiv.org/abs/2008.04743.Google Scholar
- [11] . 2018. Physical-layer security against smart eavesdroppers: Exploiting full-duplex receivers. IEEE Access 6 (
Jun. 2018), 32945–32957.Google ScholarCross Ref
- [12] . 2019. Secrecy outage probability analysis of friendly jammer selection aided multiuser scheduling for wireless networks. IEEE Transactions on Communications 67, 5 (
May 2019), 3482–3495.Google ScholarCross Ref
- [13] . 2017. Game theoretic study of protecting MIMO transmissions against smart attacks. In Proceedings of the 2017 IEEE International Conference on Communications. 1–6.Google Scholar
Cross Ref
- [14] . 2020. Deep anomaly detection for time-series data in industrial IoT: A communication-efficient on-device federated learning approach. IEEE Internet of Things Journal 8, 8 (2020), 6348–6358.Google Scholar
- [15] . 2020. Privacy-preserving traffic flow prediction: A federated learning approach. IEEE Internet of Things Journal 7, 8 (2020), 7751–7763.Google Scholar
- [16] . 2020. A secure federated learning framework for 5G networks. IEEE Wireless Communications 27, 4 (2020), 24–31.Google Scholar
Cross Ref
- [17] . 2020. Federated learning for 6G communications: Challenges, methods, and future directions. China Communications 17, 9 (2020), 105–118.Google Scholar
Cross Ref
- [18] . 2017. Improving physical layer security in untrusted relay networks: Cooperative jamming and power allocation. IET Communications 11, 3 (
Feb. 2017), 393–399.Google ScholarCross Ref
- [19] . 2010. Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing 58, 3 (
Mar. 2010), 1875–1888. Google ScholarDigital Library
- [20] . 2019. Learning-based computation offloading for IoT devices with energy harvesting. IEEE Transactions on Vehicular Technology 68, 2 (
Feb. 2019), 1930–1941.Google ScholarCross Ref
- [21] . 2013. Playing atari with deep reinforcement learning. ArXiv:1312.5602. Retrieved from https://arxiv.org/abs/1312.5602.Google Scholar
- [22] . 2015. Human-level control through deep reinforcement learning. Nature 518, 7540 (
Feb. 2015), 529–533.Google ScholarCross Ref
- [23] . 2016. Delay-aware optimization of physical layer security in multi-hop wireless body area networks. IEEE Transactions on Information Forensics and Security 11, 9 (
Sep. 2016), 1928–1939. Google ScholarDigital Library
- [24] . 2018. Joint optimal power allocation, cooperative beamforming, and jammer selection design to secure untrusted relaying network. Transactions on Emerging Telecommunications Technologies 29, 3 (
Jan. 2018), e3276.Google ScholarCross Ref
- [25] . 2014. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials 16, 3 (
Third 2014), 1550–1573.Google ScholarCross Ref
- [26] . 2013. On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming. IEEE Journal on Selected Areas in Communications 31, 9 (
Sep. 2013), 1741–1750.Google ScholarCross Ref
- [27] . 2019. Online deep reinforcement learning for computation offloading in blockchain-empowered mobile edge computing. IEEE Transactions on Vehicular Technology 68, 8 (2019), 8050–8062.Google Scholar
Cross Ref
- [28] . 2018. Reinforcement learning: An introduction. IEEE Transactions on Neural Networks 9, 5 (Sep. 1998), 1054–1054. Google Scholar
Digital Library
- [29] . 2017. Secure cooperative transmission against jamming-aided eavesdropper for ARQ based wireless networks. IEEE Access 5 (
Mar. 2017), 3763–3776.Google ScholarCross Ref
- [30] . 2020. Reinforcement learning-based joint task offloading and migration schemes optimization in mobility-aware MEC network. China Communications 17, 8 (2020), 31–44.Google Scholar
Cross Ref
- [31] . 2018. Jamming and eavesdropping defense in green cyber-physical transportation systems using a stackelberg game. IEEE Transactions on Industrial Informatics 14, 9 (Sep. 2018), 4232–4242.Google Scholar
Cross Ref
- [32] . 2017. Strategic anti-eavesdropping game for physical layer security in wireless cooperative networks. IEEE Transactions on Vehicular Technology 66, 10 (
Oct. 2017), 9448–9457. Google ScholarDigital Library
- [33] . 1975. The wire-tap channel. Bell System technical journal 54, 8 (
Oct. 1975), 1355–1387.Google ScholarCross Ref
- [34] . 2018. Reinforcement learning-based NOMA power allocation in the presence of smart jamming. IEEE Transactions on Vehicular Technology 67, 99 (
Apr. 2018), 3377–3389.Google ScholarCross Ref
- [35] . 2019. Deep reinforcement learning for dynamic access control with battery prediction for mobile-edge computing in green IoT networks. In Proceedings of the 2019 11th International Conference on Wireless Communications and Signal Processing. 1–6.Google Scholar
Cross Ref
- [36] . 2016. Deep relative attributes. IEEE Transactions on Multimedia 18, 9 (2016), 1832–1842. Google Scholar
Digital Library
- [37] . 2020. Learning to dispatch for job shop scheduling via deep reinforcement learning. Advances in Neural Information Processing Systems 33, (2020). ArXiv:2010.12367. Retrieved from https://arxiv.org/abs/2010.12367.Google Scholar
- [38] . 2013. Improving physical layer secrecy using full-duplex jamming receivers. IEEE Transactions on Signal Processing 61, 20 (
Oct. 2013), 4962–4974. Google ScholarDigital Library
- [39] . 2017. Promoting security and efficiency in D2D underlay communication: A bargaining game approach. In Proceedings of the GLOBECOM 2017-2017 IEEE Global Communications Conference. 1–6.Google Scholar
Cross Ref
Index Terms
MEC-Based Jamming-Aided Anti-Eavesdropping with Deep Reinforcement Learning for WBANs
Recommendations
Reinforcement Learning Based Sensor Encryption and Power Control for Low-Latency WBANs
Wireless Algorithms, Systems, and ApplicationsAbstractHealthcare sensing data in wireless body area networks are vulnerable to active eavesdropping that simultaneously performs sniffing and jamming attacks to raise the sensor transmit power and thus steal more data. In this paper, we propose a ...
Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming in Fog Computing Networks
ICCNS '22: Proceedings of the 2022 12th International Conference on Communication and Network SecurityWith the rapid development of IoT and fog computing, mobile devices can offload computing tasks into the fog layer to reduce energy consumption and transmission delay. However, the communication between fog nodes and end users is vulnerable to malicious ...
Distributed Power Controller of Massive Wireless Body Area Networks based on Deep Reinforcement Learning
AbstractWireless body area network (WBAN) is encountering a tough challenge in terms of energy efficiency due to multiple realistic factors like increasing scale of network environment, emerging demand of healthcare applications and limited manufacturing ...






Comments