通信学报 ›› 2023, Vol. 44 ›› Issue (12): 1-14.doi: 10.11959/j.issn.1000-436x.2023238
• 专题:空天地一体化网络频谱博弈关键技术 •
王云涛1, 苏洲1, 许其超2, 刘怡良1, 彭海霞1, 栾浩1
修回日期:
2023-09-27
出版日期:
2023-12-01
发布日期:
2023-12-01
作者简介:
王云涛(1995- ),男,江苏南京人,博士,西安交通大学助理教授,主要研究方向为空天地一体化安全、智能博弈、区块链等基金资助:
Yuntao WANG1, Zhou SU1, Qichao XU2, Yiliang LIU1, Haixia PENG1, Hao LUAN1
Revised:
2023-09-27
Online:
2023-12-01
Published:
2023-12-01
Supported by:
摘要:
针对群智协作频谱感知中恶意感知终端的投毒与搭便车攻击,结合事前威慑与事后惩罚机制提出了一种基于审计博弈的新型防御方案。首先,考虑审计预算约束,构建了一种不完全信息下的混合策略审计博弈模型,在协作感知前设置惩罚策略威慑恶意协作者,并在感知数据融合后进行审计进而实施惩罚。其次,设计了链上链下协同的轻量审计区块链模型,其中,审计证据存储在链下数据仓库,其元数据公开发布在审计链上。再次,设计了基于强化学习的分布式智能审计算法,以在动态环境下自适应地计算审计博弈的渐近混合策略均衡。仿真结果表明,相比传统方案,所提方案能快速获取稳定且渐近最优的审计策略,并积极抑制恶意协作者的投毒与搭便车行为。
中图分类号:
王云涛, 苏洲, 许其超, 刘怡良, 彭海霞, 栾浩. 基于审计博弈的安全协作频谱感知方案[J]. 通信学报, 2023, 44(12): 1-14.
Yuntao WANG, Zhou SU, Qichao XU, Yiliang LIU, Haixia PENG, Hao LUAN. Secure and collaborative spectrum sensing scheme based on audit game[J]. Journal on Communications, 2023, 44(12): 1-14.
[1] | WANG Y T , SU Z , NI J B ,et al. Blockchain-empowered space-air-ground integrated networks:opportunities,challenges,and solutions[J]. IEEE Communications Surveys & Tutorials, 2022,24(1): 160-209. |
[2] | ZHOU Y Q , LIU L , WANG L ,et al. Service-aware 6G:an intelligent and open network based on the convergence of communication,computing and caching[J]. Digital Communications and Networks, 2020,6(3): 253-260. |
[3] | WANG Y T , PAN Y H , YAN M ,et al. A survey on ChatGPT:AI-generated contents,challenges,and solutions[J]. IEEE Open Journal of the Computer Society, 2023,4: 280-302. |
[4] | 杨静雅, 唐晓刚, 周一青 ,等. 意图抽象与知识联合驱动的6G内生智能网络架构[J]. 通信学报, 2023,44(2): 12-26. |
YANG J Y , TANG X G , ZHOU Y Q ,et al. 6G native intelligence network architecture enabled by intent abstraction and knowledge[J]. Journal on Communications, 2023,44(2): 12-26. | |
[5] | LU W D , HU S , LIU X ,et al. Incentive mechanism based cooperative spectrum sharing for OFDM cognitive IoT network[J]. IEEE Transactions on Network Science and Engineering, 2020,7(2): 662-672. |
[6] | ZHANG R , ZHANG J X , ZHANG Y C ,et al. Secure crowdsourcing-based cooperative spectrum sensing[C]// Proceedings of IEEE INFOCOM. Piscataway:IEEE Press, 2013: 2526-2534. |
[7] | 曹龙, 赵杭生, 鲍丽娜 ,等. 基于辅助节点的安全协作频谱感知[J]. 计算机工程, 2014,40(2): 123-127,139. |
CAO L , ZHAO H S , BAO L N ,et al. Secure cooperative spectrum sensing based on helper nodes[J]. Computer Engineering, 2014,40(2): 123-127,139. | |
[8] | JANA S , ZENG K , CHENG W ,et al. Trusted collaborative spectrum sensing for mobile cognitive radio networks[J]. IEEE Transactions on Information Forensics and Security, 2013,8(9): 1497-1507. |
[9] | SAGDUYU Y E , SHI Y , ERPEK T . Adversarial deep learning for over-the-air spectrum poisoning attacks[J]. IEEE Transactions on Mobile Computing, 2021,20(2): 306-319. |
[10] | XU Z Y , SUN Z G , GUO L L . Throughput maximization of collaborative spectrum sensing under SSDF attacks[J]. IEEE Transactions on Vehicular Technology, 2021,70(8): 8378-8383. |
[11] | WANG Y T , SU Z , LUAN T H ,et al. Federated learning with fair incentives and robust aggregation for UAV-aided crowdsensing[J]. IEEE Transactions on Network Science and Engineering, 2022,9(5): 3179-3196. |
[12] | 孙志国, 任欣悦, 陈增茂 ,等. 基于证据间相似性的协作频谱感知方法与性能分析[J]. 通信学报, 2020,41(12): 139-147. |
SUN Z G , REN X Y , CHEN Z M ,et al. Cooperative spectrum sensing method and performance analysis based on similarity between evidences[J]. Journal on Communications, 2020,41(12): 139-147. | |
[13] | 王小毛, 黄传河, 吕怡龙 ,等. 模拟人群信任和决策机制的协作频谱感知方法[J]. 通信学报, 2014,35(3): 94-108. |
WANG X M , HUANG C H , LYU Y L ,et al. Cooperative spectrum sensing scheme based on crowd trust and decision-making mechanism[J]. Journal on Communications, 2014,35(3): 94-108. | |
[14] | FENG J Y , LI S P , LV S Q ,et al. Securing cooperative spectrum sensing against collusive false feedback attack in cognitive radio networks[J]. IEEE Transactions on Vehicular Technology, 2018,67(9): 8276-8287. |
[15] | LUO X Q . Secure cooperative spectrum sensing strategy based on reputation mechanism for cognitive wireless sensor networks[J]. IEEE Access, 2020,8: 131361-131369. |
[16] | HU Y D , ZHANG R . A spatiotemporal approach for secure crowdsourced radio environment map construction[J]. IEEE/ACM Transactions on Networking, 2020,28(4): 1790-1803. |
[17] | 吴晓晓, 李刚强, 张胜利 . 分布式协作频谱感知网络中恶意节点检测和定位方法研究[J]. 电子学报, 2022,50(6): 1370-1380. |
WU X X , LI G Q , ZHANG S L . Detection and localization of malicious nodes in distributed cooperative spectrum sensing network[J]. Acta Electronica Sinica, 2022,50(6): 1370-1380. | |
[18] | ZHANG Y R , WU Q R , SHIKH-BAHAEI M R . On ensemble learning-based secure fusion strategy for robust cooperative sensing in full-duplex cognitive radio networks[J]. IEEE Transactions on Communications, 2020,68(10): 6086-6100. |
[19] | ZHANG Y , LI A , LI J W ,et al. SpecKriging:GNN-based secure cooperative spectrum sensing[J]. IEEE Transactions on Wireless Communications, 2022,21(11): 9936-9946. |
[20] | DU B , XUE R , ZHAO L ,et al. Coalitional graph game for air-to-air and air-to-ground cognitive spectrum sharing[J]. IEEE Transactions on Aerospace and Electronic Systems, 2020,56(4): 2959-2977. |
[21] | LU Y , DUEL-HALLEN A . A sensing contribution-based two-layer game for channel selection and spectrum access in cognitive radio ad-hoc networks[J]. IEEE Transactions on Wireless Communications, 2018,17(6): 3631-3640. |
[22] | MAKHDOMI A A , BEGH G R . Energy efficient distributed spectrum sensing in presence of malicious users[J]. IEEE Networking Letters, 2022,4(2): 64-67. |
[23] | WANG Y T , SU Z , BENSLIMANE A ,et al. Collaborative honeypot defense in UAV networks:a learning-based game approach[J]. IEEE Transactions on Information Forensics and Security, 2023,PP(99): 1. |
[24] | PATNAIK M , PRABHU G , REBEIRO C ,et al. ProBLeSS:a proactive blockchain based spectrum sharing protocol against SSDF attacks in cognitive radio IoBT networks[J]. IEEE Networking Letters, 2020,2(2): 67-70. |
[25] | JIN X C , ZHANG Y C . Privacy-preserving crowdsourced spectrum sensing[J]. IEEE/ACM Transactions on Networking, 2018,26(3): 1236-1249. |
[26] | SCHWARTZ M . Mobile wireless communications[M]. Cambridge: Cambridge University Press, 2006. |
[27] | ALGANS A , PEDERSEN K I , MOGENSEN P E . Experimental analysis of the joint statistical properties of azimuth spread,delay spread,and shadow fading[J]. IEEE Journal on Selected Areas in Communications, 2002,20(3): 523-531. |
[28] | SMADI M A , PRABHU V K . Performance analysis of generalized-faded coherent PSK channels with equal-gain combining and carrier phase error[J]. IEEE Transactions on Wireless Communications, 2006,5(3): 509-513. |
[29] | AWIN F , ABDEL-RAHEEM E , AHMADI M . Joint optimal transmission power and sensing time for energy efficient spectrum sensing in cognitive radio system[J]. IEEE Sensors Journal, 2017,17(2): 369-376. |
[30] | WANG Y T , SU Z , LUAN T H ,et al. SEAL:a strategy-proof and privacy-preserving UAV computation offloading framework[J]. IEEE Transactions on Information Forensics and Security, 2023,18: 5213-5228. |
[31] | WANG Y T , SU Z , ZHANG N ,et al. SPDS:a secure and auditable private data sharing scheme for smart grid based on blockchain[J]. IEEE Transactions on Industrial Informatics, 2021,17(11): 7688-7699. |
[32] | YANG J W , DAI J H , GOOI H B ,et al. A proof-of-authority blockchain-based distributed control system for islanded microgrids[J]. IEEE Transactions on Industrial Informatics, 2022,18(11): 8287-8297. |
[33] | BONEH D , DRIJVERS M , NEVEN G . Compact multi-signatures for smaller blockchains[C]// Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2018: 435-464. |
[34] | WATSON J . Strategy:an introduction to game theory[M]. New York: W.W.Norton & Company, 2002. |
[35] | BECKER G S . Crime and punishment:an economic approach[J]. Journal of Political Economy, 1968,76(2): 169-217. |
[36] | WANG Y T , SU Z , XU Q C ,et al. A secure and intelligent data sharing scheme for UAV-assisted disaster rescue[J]. IEEE/ACM Transactions on Networking, 2023,31(6): 2422-2438. |
[37] | BENADDI H , IBRAHIMI K , BENSLIMANE A ,et al. Robust enhancement of intrusion detection systems using deep reinforcement learning and stochastic game[J]. IEEE Transactions on Vehicular Technology, 2022,71(10): 11089-11102. |
[38] | BOWLING M , VELOSO M . Rational and convergent learning in stochastic games[C]// Proceedings of the 17th International Joint Conference on Artificial Intelligence. New York:ACM Press, 2001: 1021-1026. |
[39] | WATKINS C J C H , DAYAN P . Q-learning[J]. Machine Learning, 1992,8(3): 279-292. |
[40] | ZOU Q Y , ZHENG S F , SAYED A H . Cooperative sensing via sequential detection[J]. IEEE Transactions on Signal Processing, 2010,58(12): 6266-6283. |
[1] | 李斌, 彭思聪, 费泽松. 基于边缘计算的无人机通感融合网络波束成形与资源优化[J]. 通信学报, 2023, 44(9): 228-237. |
[2] | 王志恒, 徐彦彦. 室内定位隐私保护综述[J]. 通信学报, 2023, 44(9): 188-204. |
[3] | 李致远, 徐丙磊, 周颖仪. 基于图神经网络的账户余额模型区块链地址分类方法[J]. 通信学报, 2023, 44(9): 115-126. |
[4] | 刘乔寿, 周雄, 刘爽, 邓义锋. 基于深度强化学习的OFDM自适应导频设计[J]. 通信学报, 2023, 44(9): 104-114. |
[5] | 燕锋, 林晓薇, 李正浩, 徐霞, 夏玮玮, 沈连丰. 智能电网中基于多智能体强化学习的频谱分配算法[J]. 通信学报, 2023, 44(9): 12-24. |
[6] | 杨亚涛, 董辉, 刘建韬, 张艳硕. AEUR:基于uBlock轮函数的认证加密算法设计[J]. 通信学报, 2023, 44(8): 168-178. |
[7] | 巩小雪, 庞嘉豪, 张琦涵, 徐长乐, 秦文帅, 郭磊. 基于机器学习的光网络干扰攻击检测、识别与恢复方法[J]. 通信学报, 2023, 44(7): 159-170. |
[8] | 陈宁江, 练林明, 欧平杰, 袁雪梅. 基于图协同过滤模型的D2D协作缓存策略[J]. 通信学报, 2023, 44(7): 136-148. |
[9] | 曾锋, 张政, 陈志刚. 基于深度强化学习的计算卸载与资源分配策略[J]. 通信学报, 2023, 44(7): 124-135. |
[10] | 陈越, 郝增航, 魏江宏, 胡学先, 杨冬梅. 支持陷门撤销和编辑次数限制的可编辑区块链[J]. 通信学报, 2023, 44(7): 100-113. |
[11] | 马卓, 金嘉玉, 杨易龙, 刘洋, 应作斌, 李腾, 张俊伟. 基于门限同态加密的自适应联邦学习安全聚合方案[J]. 通信学报, 2023, 44(7): 76-85. |
[12] | 张世铂, 高洪元, 苏雨萌, 程建华, 赵立帅. 安全雾计算物联网的联合资源配置方法[J]. 通信学报, 2023, 44(7): 26-37. |
[13] | 叶海军, 王国峰, 冯志勇. 有人无人网络化信息系统动态协同技术研究[J]. 通信学报, 2023, 44(7): 185-196. |
[14] | 刘润滋, 马天赐, 吴伟华, 要趁红, 杨清海. 基于分层强化学习的中继卫星网络任务动态调度方法[J]. 通信学报, 2023, 44(7): 207-217. |
[15] | 赵仕祺, 黄小红, 钟志港. 基于信誉的域间路由选择机制的研究与实现[J]. 通信学报, 2023, 44(6): 47-56. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|