A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning
Abstract
:1. Introduction
- We propose a secrecy transmission protocol based on Energy Harvesting (EH) and jammer selection to improve the PLS of PUs for FL, where the AN is transmitted by a cooperative jammer to obstruct eavesdroppers. Moreover, the influence of the basic power of the secondary transmitter on EH and the primary users is considered. In addition, the secondary outage performance is enhanced due to cooperation compensation and multi-user diversity gain.
- A dual secondary transmitter selection scheme is proposed to determine the secondary signal transmitter and friendly jammer. The ST that can offer the smallest OP is selected to transmit model parameters. Thus, the secondary transmission performance is enhanced by the ST selection. Another ST that can provide the smallest intercept probability (IP) is selected to transmit AN. Therefore, the primary security performance is enhanced by the friendly jammer selection.
- To compare the proposed protocol with optimal secondary transmission selection (OSTS) protocol, we derived the closed-form expressions of OP and IP of PUs and OP of SUs over Rayleigh fading channel for the above two protocols, respectively.
- The simulation results show that our protocol achieves better security performance than the OSTS and Optimal Cooperative Jammer Selection (OCJS) methods. Moreover, the secondary outage probabilities of the proposed scheme are lower than the OSTS and OCJS in high primary SNR, respectively. Furthermore, we improve the confidentiality of PUs and explore the influence of different parameters on the security performance.
2. System Model Descriptions
2.1. The Energy-Harvesting Cognitive Underlay System Model
2.2. Information Transmission
2.3. The Optimal Secondary Transmission Selection Model
3. The OP and IP Analysis for the Cooperation Transmission and Energy-Harvesting Protocol
3.1. The Primary OP Analysis
3.2. The Secondary OP Analysis Based on Optimal Selection Strategy
3.3. The Primary IP Analysis Based on Optimal Selection Strategy
4. The OP and IP Analysis for the Battery-Limited OSTS Protocol
5. Numerical Results
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Appendix B
References
- McMahan, H.B.; Moore, E.; Ramage, D.; Hampson, S.; Arcas, B.A.Y. Communication-efficient learning of deep networks from decentralized data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS), Lauderdale, FL, USA, 20–22 April 2017; pp. 1273–1282. [Google Scholar]
- Song, F.; Zhu, M.; Zhou, Y.; You, I.; Zhang, H. Smart collaborative tracking for ubiquitous power iot in edge-cloud interplay domain. IEEE Internet Things J. 2020, 7, 6046–6055. [Google Scholar] [CrossRef]
- Song, F.; Li, L.; You, I.; Zhang, H. Enabling heterogeneous deterministic networks with smart collaborative theory. IEEE Netw. 2021, 35, 64–71. [Google Scholar] [CrossRef]
- Mitola, J. Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio; K Thesis Royal Institute of Technology: Stockholm, Sweden, 2000. [Google Scholar]
- Haykin, S. Cognitive radio: Brain-empowered wireless communications. IEEE J. Select.Areas Commun. 2005, 23, 201–220. [Google Scholar] [CrossRef]
- Goldsmith, A.; Jafar, S.A.; Maric, I.; Srinivasa, S. Breaking spectrum gridlock with cognitive radios: An information theoretic perspective. Proc. IEEE 2009, 97, 894–914. [Google Scholar] [CrossRef]
- Song, F.; Ai, Z.; Zhou, Y.; You, I.; Choo, K.-K.R.; Zhang, H. Smart collaborative automation for receive buffer control in multipath industrial networks. IEEE Trans. Ind. Inform. 2020, 16, 1385–1394. [Google Scholar] [CrossRef]
- Song, F.; Ai, Z.; Zhang, H.; You, I.; Li, S. Smart collaborative balancing for dependable network components in cyber-physical systems. IEEE Trans. Ind. Inform. 2021, 17, 6916–6924. [Google Scholar] [CrossRef]
- Li, J.; Feng, Z.; Feng, Z.; Zhang, P. A survey of security issues in cognitive radio networks. China Commun. 2015, 12, 132–150. [Google Scholar] [CrossRef]
- Xie, N.; Chen, C.; Ming, Z. Security model of authentication at the physical layer and performance analysis over fading channels. IEEE Trans. Depend. Secure Comput. 2021, 18, 253–268. [Google Scholar] [CrossRef]
- Sharma, R.K.; Rawat, D.B. Advances on security threats and countermeasures for cognitive radio networks: A survey. IEEE Commun Surv. Tutorials 2015, 17, 1023–1043. [Google Scholar] [CrossRef]
- Nguyen, V.-D.; Hoang, T.M.; Shin, O.-S. Secrecy capacity of the primary system in a cognitive radio network. IEEE Trans. Veh. Technol. 2015, 64, 3834–3843. [Google Scholar] [CrossRef]
- Csiszar, I.; Korner, J. Broadcast channels with confidential messages. IEEE Trans. Inform. Theory 1978, 24, 339–348. [Google Scholar] [CrossRef] [Green Version]
- Tang, X.; Liu, R.; Spasojevic, P.; Poor, H.V. The Gaussian wiretap channel with a helping interferer. In Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, 6–11 July 2008; pp. 389–393. [Google Scholar]
- Oggier, F.; Hassibi, B. The secrecy capacity of the MIMO wiretap channel. In Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, 6–11 July 2008; pp. 524–528. [Google Scholar]
- Lei, H.; Gao, C.; Ansari, I.S.; Guo, Y.; Zou, Y.; Pan, G.; Qaraqe, K.A. Secrecy outage performance of transmit antenna selection for MIMO underlay cognitive radio systems over nakagami-m channels. IEEE Trans. Veh. Technol. 2017, 66, 2237–2250. [Google Scholar] [CrossRef]
- Wu, Y.; Schober, R.; Ng, D.W.K.; Xiao, C.; Caire, G. Secure massive MIMO transmission with an active eavesdropper. IEEE Trans. Inform. Theory 2016, 62, 3880–3900. [Google Scholar] [CrossRef] [Green Version]
- Wang, C.; Wang, H.-M. On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels. IEEE Trans. Inform. Forens. Secur. 2014, 9, 1814–1827. [Google Scholar] [CrossRef]
- Gong, C.; Yue, X.; Zhang, Z.; Wang, X.; Dai, X. Enhancing physical layer security with artificial noise in large-scale NOMA networks. IEEE Trans. Veh. Technol. 2021, 70, 2349–2361. [Google Scholar] [CrossRef]
- Perazzone, J.B.; Yu, P.L.; Sadler, B.M.; Blum, R.S. Artificial noise-aided MIMO physical layer authentication with imperfect CSI. IEEE Trans. Inform. Forens. Secur. 2021, 16, 2173–2185. [Google Scholar] [CrossRef]
- Li, B.; Zou, Y.; Zhou, J.; Wang, F.; Cao, W.; Yao, Y.-D. Secrecy outage probability analysis of friendly jammer selection aided multiuser scheduling for wireless networks. IEEE Trans. Commun. 2019, 67, 3482–3495. [Google Scholar] [CrossRef]
- Wang, L.; Sheng, M.; Zhang, Y.; Wang, X.; Xu, C. Robust energy efficiency maximization in cognitive radio networks: The worst-case optimization approach. IEEE Trans. Commun. 2015, 63, 51–65. [Google Scholar] [CrossRef]
- Mili, M.R.; Musavian, L.; Hamdi, K.A.; Marvasti, F. How to increase energy efficiency in cognitive radio networks. IEEE Trans. Commun. 2016, 64, 1829–1843. [Google Scholar] [CrossRef]
- Ozcan, G.; Gursoy, M.C.; Tang, J. Spectral and energy efficiency in cognitive radio systems with unslotted primary users and sensing uncertainty. IEEE Trans. Commun. 2017, 65, 4138–4151. [Google Scholar] [CrossRef] [Green Version]
- Li, D.; Cheng, J.; Leung, V.C.M. Adaptive spectrum sharing for half-duplex and full-duplex cognitive radios: From the energy efficiency perspective. IEEE Trans. Commun. 2018, 66, 5067–5080. [Google Scholar] [CrossRef]
- Mamaghani, M.T.; Kuhestani, A.; Wong, K.-K. Secure two-way transmission via wireless-powered untrusted relay and external jammer. IEEE Trans. Veh. Technol. 2018, 67, 8451–8465. [Google Scholar] [CrossRef] [Green Version]
- Ren, J.; Hu, J.; Zhang, D.; Guo, H.; Zhang, Y.; Shen, X. RF energy harvesting and transfer in cognitive radio sensor networks: Opportunities and challenges. IEEE Commun. Mag. 2018, 56, 104–110. [Google Scholar] [CrossRef]
- Jiang, X.; Li, P.; Li, B.; Zou, Y.; Wang, R. Secrecy performance of transmit antenna selection for underlay MIMO cognitive radio relay networks with energy harvesting. IET Commun. 2022, 16, 227–245. [Google Scholar] [CrossRef]
- Le, T.-D.; Shin, O.-S. Wireless energy harvesting in cognitive radio with opportunistic relays selection. In Proceedings of the 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Hong Kong, China, 30 August–2 September 2015; pp. 949–953. [Google Scholar]
- Nguyen, V.-D.; Dinh-Van, S.; Shin, O.-S. Opportunistic relaying with wireless energy harvesting in a cognitive radio system. In Proceedings of the 2015 IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA, 9–12 March 2015; pp. 87–92. [Google Scholar]
- Zheng, K.; Liu, X.; Zhu, Y.; Chi, K.; Liu, K. Total throughput maximization of cooperative cognitive radio networks with energy harvesting. IEEE Transactions Wirel. Commun. 2020, 19, 533–546. [Google Scholar] [CrossRef]
- Liu, X.; Zheng, K.; Chi, K.; Zhu, Y.-H. Cooperative spectrum sensing optimization in energy-harvesting cognitive radio networks. IEEE Trans. Wirel. Commun. 2020, 19, 7663–7676. [Google Scholar] [CrossRef]
- Hong, T.M.; Duong, T.Q.; Vo, N.; Kundu, C. Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer. IEEE Wirel.Commun. Lett. 2017, 6, 174–177. [Google Scholar] [CrossRef] [Green Version]
- Ding, X.; Zou, Y.; Zhang, G.; Wang, X.C.X.; Hanzo, L. The Security–Reliability Tradeoff of Multiuser Scheduling-Aided Energy Harvesting Cognitive Radio Networks. IEEE Trans. Commun. 2019, 67, 3890–3904. [Google Scholar] [CrossRef] [Green Version]
- Yan, P.; Zou, Y.; Ding, X.; Zhu, J. Energy-Aware Relay Selection Improves Security-Reliability Tradeoff in Energy Harvesting Cooperative Cognitive Radio Systems. IEEE Trans. Veh. Technol. 2020, 69, 5115–5128. [Google Scholar] [CrossRef]
- Yan, P.; Zou, Y.; Zhu, J. Energy-aware multiuser scheduling for physical-layer security in energy-harvesting underlay cognitive radio systems. IEEE Trans. Veh. Technol. 2018, 67, 2084–2096. [Google Scholar] [CrossRef]
- Liu, Y.; Mousavifar, S.A.; Deng, Y.; Leung, C.; Elkashlan, M. Wireless energy harvesting in a cognitive relay network. IEEE Trans. Wirel. Commun. 2016, 15, 2498–2508. [Google Scholar] [CrossRef] [Green Version]
- Xie, P.; Zhu, J.; Zhang, M.; Xing, L.; Wu, H. Aided opportunistic jammer selection for secrecy improvement in underlay cognitive radio networks. Wirel. Person. Commun. 2019, 107. [Google Scholar] [CrossRef]
- Zou, Y.; Champagne, B.; Zhu, W.-P.; Hanzo, L. Relay-selection improves the security-reliability trade-off in cognitive radio systems. IEEE Trans. Commun. 2015, 63, 215–228. [Google Scholar] [CrossRef] [Green Version]
- El-Malek, A.H.A.; Salhab, A.M.; Zummo, S.A.; Alouini, M.-S. Security-reliability trade-off analysis for multiuser SIMO mixed RF/FSO relay networks with opportunistic user scheduling. IEEE Trans. Wirel. Commun. 2016, 15, 5904–5918. [Google Scholar] [CrossRef]
- Al-Hraishawi, H.; Baduge, G.A.A. Wireless Energy Harvesting in Cognitive Massive MIMO Systems With Underlay Spectrum Sharing. IEEE Wirel. Commun. Lett. 2017, 6, 134–137. [Google Scholar] [CrossRef]
Methods | Major Domain | Metrics | Technique | Main Contributions |
---|---|---|---|---|
[15] | PLS | perfect secrecy capacity | algebraic Riccati equation | The perfect secrecy capacity of multi antenna MIMO channel is calculated. |
[21] | PLS | secrecy outage probability | friendly jammer, AN | Legitimate users achieved better secrecy performance. |
[32] | PLS, CR | throughput | CSS | According to the appropriate K value, an optimal CSS strategy is developed to maximize throughput. |
[33] | PLS, EH, CR | secrecy outage probability (SOP) | relay, jammer | It deduced the exact and asymptotic expressions of SOP. |
[34] | PLS, EH, CR | OP, IP | SRT | The results revealed that there is a constraint relationship between reliability and safety. |
[35] | PLS, EH, CR | OP, IP | SRT | It proposed two user-scheduling methods to improve the performance of secondary users. |
Ours | PLS, EH, CR | OP, IP | dual secondary transmitter selection, AN | It improved the security performance of primary users and the transmission performance of secondary users. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Xie, P.; Li, F.; You, I.; Xing, L.; Wu, H.; Ma, H. A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning. Sensors 2022, 22, 5506. https://doi.org/10.3390/s22155506
Xie P, Li F, You I, Xing L, Wu H, Ma H. A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning. Sensors. 2022; 22(15):5506. https://doi.org/10.3390/s22155506
Chicago/Turabian StyleXie, Ping, Fan Li, Ilsun You, Ling Xing, Honghai Wu, and Huahong Ma. 2022. "A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning" Sensors 22, no. 15: 5506. https://doi.org/10.3390/s22155506
APA StyleXie, P., Li, F., You, I., Xing, L., Wu, H., & Ma, H. (2022). A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning. Sensors, 22(15), 5506. https://doi.org/10.3390/s22155506