Cooperative Jamming for Physical Layer Security Enhancement Using Deep Reinforcement Learning
Abstract: Wireless data communications are always facing the risk of eavesdropping and interception. Conventional protection solutions which are based on encryption may not always be practical as is the case for wireless IoT networks or may soon become ineffective against quantum computers. In this regard, Physical Layer Security (PLS) presents a promising approach to secure wireless communications through the exploitation of the physical properties of the wireless channel. Cooperative Friendly Jamming (CFJ) is among the PLS techniques that have received attention in recent years. However, finding an optimal transmit power allocation that results in the highest secrecy is a complex problem that becomes more difficult to address as the size of the wireless network increases. In this paper, we propose an optimization approach to achieve CFJ in large Wi-Fi networks by using a Reinforcement Learning Algorithm. Obtained results show that our optimization approach offers better secrecy results and becomes more effective as the network size and the density of Wi-Fi access points increase.
- Y. Liu, H.-H. Chen et al., “Physical layer security for next generation wireless networks: Theories, technologies, and challenges,” IEEE Communications Surveys & Tutorials, vol. 19, no. 1, pp. 347–376, 2016.
- S. A. Hoseini, F. Bouhafs et al., “A practical implementation of physical layer security in wireless networks,” in 2022 IEEE 19th Annual Consumer Communications Networking Conference (CCNC), 2022, pp. 1–4.
- ——, “Realizing Physical Layer Security with common off-the-shelf WiFi equipment,” in CCNC 2023 : IEEE Consumer Communications and Networking Conference, 2023.
- F. Bouhafs, M. Mackay et al., “Wi-5: A programming architecture for unlicensed frequency bands,” IEEE Communications Magazine, vol. 56, no. 12, pp. 178–185, 2018.
- F. Bouhafs, F. den Hartog et al., “Realizing physical layer security in large wireless networks using spectrum programmability,” in 2020 IEEE Globecom Workshops, 2020, pp. 1–6.
- S. A. Hoseini, P. Sadeghi et al., “Network-Controlled Physical-Layer Security: Enhancing Secrecy Through Friendly Jamming,” in 27th IEEE Symposium on Computers and Communications (ISCC 2022), 2022.
- T. Erpek, T. O’Shea et al., “Deep learning for wireless communications,” Development and Analysis of Deep Learning Architectures, pp. 223–266, 2020.
- D. Janu, K. Singh et al., “Machine learning for cooperative spectrum sensing and sharing: A survey,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 1, p. e4352, 2022.
- M. Ahmed, B. Gabr et al., “Machine learning-based module for monitoring lte/wifi coexistence networks dynamics,” in 2021 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE, Conference Proceedings, pp. 1–6.
- K. Youssef, L. Bouchard et al., “Machine learning approach to rf transmitter identification,” IEEE Journal of Radio Frequency Identification, vol. 2, no. 4, pp. 197–205, 2018.
- Y. Arjoune, F. Salahdine et al., “A novel jamming attacks detection approach based on machine learning for wireless communication,” in 2020 International Conference on Information Networking (ICOIN). IEEE, Conference Proceedings, pp. 459–464.
- G. Kasturi, A. Jain et al., “Detection and classification of radio frequency jamming attacks using machine learning,” J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., vol. 11, no. 4, pp. 49–62, 2020.
- O. Puñal, I. Aktaş et al., “Machine learning-based jamming detection for ieee 802.11: Design and experimental evaluation,” in Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014. IEEE, Conference Proceedings, pp. 1–10.
- A. K. Kamboj, P. Jindal et al., “Machine learning-based physical layer security: techniques, open challenges, and applications,” Wireless Networks, vol. 27, pp. 5351–5383, 2021.
- L. Zhang, S. Lai et al., “Deep reinforcement learning based irs-assisted mobile edge computing under physical-layer security,” Physical Communication, vol. 55, p. 101896, 2022.
- T. Wang, Y. Li et al., “Secrecy driven federated learning via cooperative jamming: An approach of latency minimization,” IEEE Transactions on Emerging Topics in Computing, vol. 10, no. 4, pp. 1687–1703, 2022.
- T. Haarnoja, A. Zhou et al., “Soft actor-critic: Off-policy maximum entropy deep reinforcement learning with a stochastic actor,” in International conference on machine learning. PMLR, 2018, pp. 1861–1870.
- R. Eletreby, H. Rahbari et al., “Supporting phy-layer security in multi-link wireless networks using friendly jamming,” in 2015 IEEE Global Communications Conference (GLOBECOM). IEEE, 2015, pp. 1–6.
- M. Adams and V. K. Bhargava, “Using friendly jamming to improve route security and quality in ad hoc networks,” in 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), 2017, pp. 1–6.
- T. S. Rappaport, “Mobile radio propagation: Large-scale path loss,” Wireless communications: principles and practice, pp. 107–110, 2002.
- A. D. Wyner, “The wire-tap channel,” Bell system technical journal, vol. 54, no. 8, pp. 1355–1387, 1975.
- J. P. Vilela, M. Bloch et al., “Wireless secrecy regions with friendly jamming,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 256–266, 2011.
- F. Yang, J. Wang et al., “Physical-layer security for indoor VLC wiretap systems under multipath reflections,” IEEE Transactions on Wireless Communications, vol. 21, no. 12, pp. 11 179–11 192, 2022.
- M. Zhang, R. Xue et al., “Secrecy capacity optimization in coordinated multi-point processing,” in 2013 IEEE International Conference on Communications (ICC), 2013, pp. 5845–5849.
- “Soft actor-critic (sac).” [Online]. Available: https://spinningup.openai.com/en/latest/algorithms/sac.html
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.