Securing IoT Communication using Physical Sensor Data -- Graph Layer
Security with Federated Multi-Agent Deep Reinforcement Learning
- URL: http://arxiv.org/abs/2302.12592v1
- Date: Fri, 24 Feb 2023 12:10:23 GMT
- Title: Securing IoT Communication using Physical Sensor Data -- Graph Layer
Security with Federated Multi-Agent Deep Reinforcement Learning
- Authors: Liang Wang and Zhuangkun Wei and Weisi Guo
- Abstract summary: Internet-of-Things (IoT) devices are often used to transmit physical sensor data over digital wireless channels.
Traditional Physical Layer Security (PLS)-based cryptography approaches rely on accurate channel estimation and information exchange for key generation.
We present a new concept called Graph Layer Security (GLS), where digital keys are derived from physical sensor readings.
- Score: 12.941755390387295
- License: http://creativecommons.org/publicdomain/zero/1.0/
- Abstract: Internet-of-Things (IoT) devices are often used to transmit physical sensor
data over digital wireless channels. Traditional Physical Layer Security
(PLS)-based cryptography approaches rely on accurate channel estimation and
information exchange for key generation, which irrevocably ties key quality
with digital channel estimation quality. Recently, we proposed a new concept
called Graph Layer Security (GLS), where digital keys are derived from physical
sensor readings. The sensor readings between legitimate users are correlated
through a common background infrastructure environment (e.g., a common water
distribution network or electric grid). The challenge for GLS has been how to
achieve distributed key generation. This paper presents a Federated multi-agent
Deep reinforcement learning-assisted Distributed Key generation scheme (FD2K),
which fully exploits the common features of physical dynamics to establish
secret key between legitimate users. We present for the first time initial
experimental results of GLS with federated learning, achieving considerable
security performance in terms of key agreement rate (KAR), and key randomness.
Related papers
- Securing Hybrid Wireless Body Area Networks (HyWBAN): Advancements in Semantic Communications and Jamming Techniques [2.1676500745770544]
This paper explores novel strategies to strengthen the security of Hybrid Wireless Body Area Networks (HyWBANs)
Recognizing the vulnerability of HyWBAN to sophisticated cyber-attacks, we propose an innovative combination of semantic communications and jamming receivers.
Our approach addresses the primary security concerns and sets the baseline for future secure biomedical communication systems advancements.
arXiv Detail & Related papers (2024-04-24T18:21:08Z) - DT-DDNN: A Physical Layer Security Attack Detector in 5G RF Domain for
CAVs [11.15939066175832]
jamming attacks pose substantial risks to the 5G network.
This work presents a novel deep learning-based technique for detecting jammers in CAV networks.
Results show that the proposed method achieves 96.4% detection rate in extra low jamming power.
arXiv Detail & Related papers (2024-03-05T04:29:31Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Generative AI for Physical Layer Communications: A Survey [76.61956357178295]
generative artificial intelligence (GAI) has the potential to enhance the efficiency of digital content production.
GAI's capability in analyzing complex data distributions offers great potential for wireless communications.
This paper presents a comprehensive investigation of GAI's applications for communications at the physical layer, ranging from traditional issues, including signal classification, channel estimation, and equalization, to emerging topics, such as intelligent reflecting surfaces and joint source channel coding.
arXiv Detail & Related papers (2023-12-09T15:20:56Z) - Hierarchical certification of nonclassical network correlations [50.32788626697182]
We derive linear and nonlinear Bell-like inequalities for networks, whose violation certifies the absence of a minimum number of classical sources in them.
We insert this assumption, which leads to results more amenable to certification in experiments.
arXiv Detail & Related papers (2023-06-27T18:00:01Z) - Eavesdropper localization for quantum and classical channels via
nonlinear scattering [58.720142291102135]
Quantum key distribution (QKD) offers theoretical security based on the laws of physics.
We present a novel approach to eavesdropper location that can be employed in quantum as well as classical channels.
We demonstrate that our approach outperforms conventional OTDR in the task of localizing an evanescent outcoupling of 1% with cm precision inside standard optical fibers.
arXiv Detail & Related papers (2023-06-25T21:06:27Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Quantum Encryption in Phase Space for Coherent Optical Communications [0.0]
Quantum Encryption in Phase Space (QEPS) is a physical layer encryption method to secure data over the optical fiber.
We study two preventative measures for different modulation formats which will prevent an eavesdropper from obtaining any data.
arXiv Detail & Related papers (2023-01-15T15:08:53Z) - AFR-Net: Attention-Driven Fingerprint Recognition Network [47.87570819350573]
We improve initial studies on the use of vision transformers (ViT) for biometric recognition, including fingerprint recognition.
We propose a realignment strategy using local embeddings extracted from intermediate feature maps within the networks to refine the global embeddings in low certainty situations.
This strategy can be applied as a wrapper to any existing deep learning network (including attention-based, CNN-based, or both) to boost its performance.
arXiv Detail & Related papers (2022-11-25T05:10:39Z) - Experimental Demonstration of Discrete Modulation Formats for Continuous
Variable Quantum Key Distribution [0.23090185577016442]
Quantum key distribution (QKD) enables the establishment of secret keys between users connected via a channel vulnerable to eavesdropping.
We experimentally implement a protocol that allows for arbitrary, Gaussian-like, discrete modulations, whose security is based on a theoretical proof.
These modulation formats are compatible with the use of powerful tools of coherent optical telecommunication, allowing our system to reach a performance of tens of megabit per second secret key rates over 25 km.
arXiv Detail & Related papers (2022-07-24T09:45:07Z) - T-WaveNet: Tree-Structured Wavelet Neural Network for Sensor-Based Time
Series Analysis [9.449017120452675]
We propose a novel tree-structured wavelet neural network for sensor data analysis, namely emphT-WaveNet.
T-WaveNet provides more effective representation for sensor information than existing techniques, and it achieves state-of-the-art performance on various sensor datasets.
arXiv Detail & Related papers (2020-12-10T05:07:28Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.