About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Machine Learning and Intelligent Communications. 5th International Conference, MLICOM 2020, Shenzhen, China, September 26-27, 2020, Proceedings

Research Article

Secure and Reliable D2D Communications with Active Attackers: A Game-Theoretic Perspective and Machine Learning Approaches

Download(Requires a free EAI acccount)
2 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-66785-6_55,
        author={Yijie Luo and Yang Yang and Sixuan An and Zhibin Feng},
        title={Secure and Reliable D2D Communications with Active Attackers: A Game-Theoretic Perspective and Machine Learning Approaches},
        proceedings={Machine Learning and Intelligent Communications. 5th International Conference, MLICOM 2020, Shenzhen, China, September 26-27, 2020, Proceedings},
        proceedings_a={MLICOM},
        year={2021},
        month={1},
        keywords={D2D communications Full-duplex active eavesdropper Physical layer security Hierarchical game Distributed machine learning},
        doi={10.1007/978-3-030-66785-6_55}
    }
    
  • Yijie Luo
    Yang Yang
    Sixuan An
    Zhibin Feng
    Year: 2021
    Secure and Reliable D2D Communications with Active Attackers: A Game-Theoretic Perspective and Machine Learning Approaches
    MLICOM
    Springer
    DOI: 10.1007/978-3-030-66785-6_55
Yijie Luo,*, Yang Yang, Sixuan An, Zhibin Feng
    *Contact email: yijieluo@sina.com

    Abstract

    Frequent communications among massive terminal devices are ubiquitous in forthcoming 5G Internet of Thing (IoT) networks. It strengthens links of massive machine-type-communication (MMTC), pushes forward the process of Internet of everything. However, due to continual interactions among different devices and the broadcast characteristic of wireless channels, it also brings new security challenges. Recently, physical layer security launches a new solution to guarantee information theoretic security. To enhance the physical layer security performance of massive intelligent devices, especially in D2D communications, the game theory and machine learning methods are introduced. In this paper, we first review physical layer security problems on D2D communications under different attack scenarios. Game theory is proposed to describe hierarchical and heterogeneous interactions among legitimate users and active attackers in 5G IoT networks, then some distributed machine learning methods are proposed to obtain equilibrium states among different agents. Moreover, numerical results are provided to verify availability and efficiency of proposed game-theoretic learning approaches. Finally, we discuss open issues and future research directions in term of anti-eavesdropping and anti-jamming problems in D2D communications when facing active attackers.

    Keywords
    D2D communications Full-duplex active eavesdropper Physical layer security Hierarchical game Distributed machine learning
    Published
    2021-01-24
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-030-66785-6_55
    Copyright © 2020–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL