{"title":"基于深度学习和强化学习的C-V2X窃听防御方案","authors":"Shuang Gu , Minjie Wei , Longxia Liao , Junhui Zhao","doi":"10.1016/j.phycom.2025.102673","DOIUrl":null,"url":null,"abstract":"<div><div>The broadcast nature of wireless signals allows malicious eavesdroppers to stealthily intercept and disrupt communication links, while dynamic spectrum competition in dense scenarios further degrades the performance of legitimate links. This paper investigates a collaborative security framework that integrates physical-layer dynamic authentication and deep reinforcement learning (DRL) for vehicular networks with multiple eavesdropping vehicles. To mitigate spoofing risks, we design a Long Short-Term Memory (LSTM)-based authentication model that verifies legitimate vehicle identities by extracting time-varying channel characteristics, thereby reducing communication risks with unauthorized vehicles. Upon ensuring legitimate identities, we propose a joint optimization scheme for transmit power control and channel selection. To address dynamic channel fading and high vehicle mobility, a Double Deep Q-Learning (DDQN) algorithm is developed to adaptively allocate limited spectral resources for maximizing secrecy capacity. Simulation results demonstrate that our LSTM-DDQN anti-eavesdropping model outperforms the related methods in system secrecy rate and V2V energy efficiency.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"71 ","pages":"Article 102673"},"PeriodicalIF":2.0000,"publicationDate":"2025-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Eavesdropping defense scheme in C-V2X using deep learning and reinforcement learning\",\"authors\":\"Shuang Gu , Minjie Wei , Longxia Liao , Junhui Zhao\",\"doi\":\"10.1016/j.phycom.2025.102673\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The broadcast nature of wireless signals allows malicious eavesdroppers to stealthily intercept and disrupt communication links, while dynamic spectrum competition in dense scenarios further degrades the performance of legitimate links. This paper investigates a collaborative security framework that integrates physical-layer dynamic authentication and deep reinforcement learning (DRL) for vehicular networks with multiple eavesdropping vehicles. To mitigate spoofing risks, we design a Long Short-Term Memory (LSTM)-based authentication model that verifies legitimate vehicle identities by extracting time-varying channel characteristics, thereby reducing communication risks with unauthorized vehicles. Upon ensuring legitimate identities, we propose a joint optimization scheme for transmit power control and channel selection. To address dynamic channel fading and high vehicle mobility, a Double Deep Q-Learning (DDQN) algorithm is developed to adaptively allocate limited spectral resources for maximizing secrecy capacity. Simulation results demonstrate that our LSTM-DDQN anti-eavesdropping model outperforms the related methods in system secrecy rate and V2V energy efficiency.</div></div>\",\"PeriodicalId\":48707,\"journal\":{\"name\":\"Physical Communication\",\"volume\":\"71 \",\"pages\":\"Article 102673\"},\"PeriodicalIF\":2.0000,\"publicationDate\":\"2025-04-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Physical Communication\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S187449072500076X\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Physical Communication","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S187449072500076X","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
摘要
无线信号的广播性质使恶意窃听者能够隐蔽地拦截和破坏通信链路,而密集场景下的动态频谱竞争进一步降低了合法链路的性能。本文研究了一种集成物理层动态认证和深度强化学习(DRL)的协作安全框架,用于具有多窃听车辆的车辆网络。为了降低欺骗风险,我们设计了一个基于长短期记忆(LSTM)的身份验证模型,该模型通过提取时变信道特征来验证合法车辆的身份,从而降低与未经授权车辆的通信风险。在确保合法身份的前提下,我们提出了一种联合优化方案,用于发射功率控制和信道选择。为了解决动态信道衰落和车辆高移动性的问题,提出了一种双深度q -学习(Double Deep Q-Learning, DDQN)算法,自适应分配有限的频谱资源,使保密能力最大化。仿真结果表明,LSTM-DDQN反窃听模型在系统保密率和V2V能量效率方面优于相关方法。
Eavesdropping defense scheme in C-V2X using deep learning and reinforcement learning
The broadcast nature of wireless signals allows malicious eavesdroppers to stealthily intercept and disrupt communication links, while dynamic spectrum competition in dense scenarios further degrades the performance of legitimate links. This paper investigates a collaborative security framework that integrates physical-layer dynamic authentication and deep reinforcement learning (DRL) for vehicular networks with multiple eavesdropping vehicles. To mitigate spoofing risks, we design a Long Short-Term Memory (LSTM)-based authentication model that verifies legitimate vehicle identities by extracting time-varying channel characteristics, thereby reducing communication risks with unauthorized vehicles. Upon ensuring legitimate identities, we propose a joint optimization scheme for transmit power control and channel selection. To address dynamic channel fading and high vehicle mobility, a Double Deep Q-Learning (DDQN) algorithm is developed to adaptively allocate limited spectral resources for maximizing secrecy capacity. Simulation results demonstrate that our LSTM-DDQN anti-eavesdropping model outperforms the related methods in system secrecy rate and V2V energy efficiency.
期刊介绍:
PHYCOM: Physical Communication is an international and archival journal providing complete coverage of all topics of interest to those involved in all aspects of physical layer communications. Theoretical research contributions presenting new techniques, concepts or analyses, applied contributions reporting on experiences and experiments, and tutorials are published.
Topics of interest include but are not limited to:
Physical layer issues of Wireless Local Area Networks, WiMAX, Wireless Mesh Networks, Sensor and Ad Hoc Networks, PCS Systems; Radio access protocols and algorithms for the physical layer; Spread Spectrum Communications; Channel Modeling; Detection and Estimation; Modulation and Coding; Multiplexing and Carrier Techniques; Broadband Wireless Communications; Wireless Personal Communications; Multi-user Detection; Signal Separation and Interference rejection: Multimedia Communications over Wireless; DSP Applications to Wireless Systems; Experimental and Prototype Results; Multiple Access Techniques; Space-time Processing; Synchronization Techniques; Error Control Techniques; Cryptography; Software Radios; Tracking; Resource Allocation and Inference Management; Multi-rate and Multi-carrier Communications; Cross layer Design and Optimization; Propagation and Channel Characterization; OFDM Systems; MIMO Systems; Ultra-Wideband Communications; Cognitive Radio System Architectures; Platforms and Hardware Implementations for the Support of Cognitive, Radio Systems; Cognitive Radio Resource Management and Dynamic Spectrum Sharing.