3 research outputs found

    Adversarial Sample Generation using the Euclidean Jacobian-based Saliency Map Attack (EJSMA) and Classification for IEEE 802.11 using the Deep Deterministic Policy Gradient (DDPG)

    Get PDF
    One of today's most promising developments is wireless networking, as it enables people across the globe to stay connected. As the wireless networks' transmission medium is open, there are potential issues in safeguarding the privacy of the information. Though several security protocols exist in the literature for the preservation of information, most cases fail with a simple spoof attack. So, intrusion detection systems are vital in wireless networks as they help in the identification of harmful traffic. One of the challenges that exist in wireless intrusion detection systems (WIDS) is finding a balance between accuracy and false alarm rate. The purpose of this study is to provide a practical classification scheme for newer forms of attack. The AWID dataset is used in the experiment, which proposes a feature selection strategy using a combination of Elastic Net and recursive feature elimination. The best feature subset is obtained with 22 features, and a deep deterministic policy gradient learning algorithm is then used to classify attacks based on those features. Samples are generated using the Euclidean Jacobian-based Saliency Map Attack (EJSMA) to evaluate classification outcomes using adversarial samples. The meta-analysis reveals improved results in terms of feature production (22 features), classification accuracy (98.75% for testing samples and 85.24% for adversarial samples), and false alarm rates (0.35%).&nbsp

    Blockchain-empowered federated learning approach for an intelligent and reliable D2D caching scheme

    Get PDF
    Cache-enabled device-to-device (D2D) communication is a potential approach to tackle the resource shortage problem. However, public concerns of data privacy and system security still remain, which thus arises an urgent need for a reliable caching scheme. Fortunately, federated learning (FL) with a distributed paradigm provides an effective way to privacy issue by training a high-quality global model without any raw data exchanges. Besides privacy issue, blockchain can be further introduced into FL framework to resist the malicious attacks occurred in D2D caching networks. In this study, we propose a double-layer blockchain-based deep reinforcement FL (BDRFL) scheme to ensure privacy-preserved and caching-efficient D2D networks. In BDRFL, a double-layer blockchain is utilized to further enhance data security. Simulation results first verify the convergence of BDRFL-based algorithm, and then demonstrate that the download latency of the BDRFL-based caching scheme can be significantly reduced under different types of attacks when compared with some existing caching policies

    A Novel Distributed Q-Learning Based Resource Reservation Framework for Facilitating D2D Content Access Requests in LTE-A Networks

    No full text
    corecore