Skip to main content
Top

2016 | OriginalPaper | Chapter

Preserving Privacy of Agents in Reinforcement Learning for Distributed Cognitive Radio Networks

Authors : Geong Sen Poh, Kok-Lim Alvin Yau

Published in: Neural Information Processing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Reinforcement learning (RL) is one of the artificial intelligence approaches that has been deployed effectively to improve performance of distributed cognitive radio networks (DCRNs). However, in existing proposals that involve multi-agents, perceptions of the agents are shared in plain in order to calculate optimal actions. This raises privacy concern where an agent learns private information (e.g. Q-values) of the others, which can then be used to infer, for instance, the actions of these other agents. In this paper, we provide a preliminary investigation and a privacy-preserving protocol on multi-agent RL in DCRNs. The proposed protocol provides RL computations without revealing agents’ private information. We also discuss the security and performance of the protocol.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Akyildiz, I.F., Lee, W.-Y., Vuran, M.C., Mohanty, S.: Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Comput. Netw. 50(13), 2127–2159 (2006)CrossRefMATH Akyildiz, I.F., Lee, W.-Y., Vuran, M.C., Mohanty, S.: Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Comput. Netw. 50(13), 2127–2159 (2006)CrossRefMATH
2.
go back to reference Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: Ning, P., Syverson, P.F., Jha, S. (eds.) CCS, pp. 257–266. ACM (2008) Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: Ning, P., Syverson, P.F., Jha, S. (eds.) CCS, pp. 257–266. ACM (2008)
3.
go back to reference Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192–206. Springer, Heidelberg (2008)CrossRef Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192–206. Springer, Heidelberg (2008)CrossRef
4.
go back to reference Bogetoft, P., Christensen, D.L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325–343. Springer, Heidelberg (2009)CrossRef Bogetoft, P., Christensen, D.L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325–343. Springer, Heidelberg (2009)CrossRef
5.
go back to reference Çatak, F.Ö.: Secure multi-party computation based privacy preserving extreme learning machine algorithm over vertically distributed data. In: Arik, S., Hunag, T., Lai, W.K., Liu, Q. (eds.) ICONIP 2015. LNCS, vol. 9490, pp. 337–345. Springer, Heidelberg (2015). doi:10.1007/978-3-319-26535-3_39 CrossRef Çatak, F.Ö.: Secure multi-party computation based privacy preserving extreme learning machine algorithm over vertically distributed data. In: Arik, S., Hunag, T., Lai, W.K., Liu, Q. (eds.) ICONIP 2015. LNCS, vol. 9490, pp. 337–345. Springer, Heidelberg (2015). doi:10.​1007/​978-3-319-26535-3_​39 CrossRef
6.
go back to reference Damgård, I., Jurik, M., Nielsen, J.B.: A generalization of Paillier’s public-key system with applications to electronic voting. Int. J. Inf. Sec. 9(6), 371–385 (2010)CrossRef Damgård, I., Jurik, M., Nielsen, J.B.: A generalization of Paillier’s public-key system with applications to electronic voting. Int. J. Inf. Sec. 9(6), 371–385 (2010)CrossRef
7.
go back to reference Erkin, Z.: Private data aggregation with groups for smart grids in a dynamic setting using CRT. In: WIFS, pp. 1–6. IEEE (2015) Erkin, Z.: Private data aggregation with groups for smart grids in a dynamic setting using CRT. In: WIFS, pp. 1–6. IEEE (2015)
8.
go back to reference Lindell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. IACR Cryptology ePrint Archive 2008:197 (2008) Lindell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. IACR Cryptology ePrint Archive 2008:197 (2008)
9.
go back to reference Ling, M.H., Yau, K.-L.A., Qadir, J., Poh, G.S., Ni, Q.: Application of reinforcement learning for security enhancement in cognitive radio networks. Appl. Soft Comput. 37, 809–829 (2015)CrossRef Ling, M.H., Yau, K.-L.A., Qadir, J., Poh, G.S., Ni, Q.: Application of reinforcement learning for security enhancement in cognitive radio networks. Appl. Soft Comput. 37, 809–829 (2015)CrossRef
10.
go back to reference Mitola, J., Maguire, G.Q.: Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999)CrossRef Mitola, J., Maguire, G.Q.: Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999)CrossRef
11.
go back to reference Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.1007/3-540-48910-X_16 Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.​1007/​3-540-48910-X_​16
12.
go back to reference Peng, J., Li, J., Li, S., Li, J.: Multi-relay cooperative mechanism with q-learning in cognitive radio multimedia sensor networks. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1624–1629 (2011) Peng, J., Li, J., Li, S., Li, J.: Multi-relay cooperative mechanism with q-learning in cognitive radio multimedia sensor networks. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1624–1629 (2011)
13.
go back to reference Qin, Z., Yi, S., Li, Q., Zamkov, D.: Preserving secondary users’ privacy in cognitive radio networks. In: INFOCOM, pp. 772–780. IEEE (2014) Qin, Z., Yi, S., Li, Q., Zamkov, D.: Preserving secondary users’ privacy in cognitive radio networks. In: INFOCOM, pp. 772–780. IEEE (2014)
14.
go back to reference Rahulamathavan, Y., Phan, R.C.-W., Chambers, J.A., Parish, D.J.: Facial expression recognition in the encrypted domain based on local fisher discriminant analysis. IEEE Trans. Affect. Comput. 4(1), 83–92 (2013)CrossRef Rahulamathavan, Y., Phan, R.C.-W., Chambers, J.A., Parish, D.J.: Facial expression recognition in the encrypted domain based on local fisher discriminant analysis. IEEE Trans. Affect. Comput. 4(1), 83–92 (2013)CrossRef
15.
go back to reference Sakuma, J., Kobayashi, S., Wright, R.N.: Privacy-preserving reinforcement learning. In: Cohen, W.W., McCallum, A., Roweis, S.T., (eds.) ICML, vol. 307. ACM International Conference Proceeding Series, pp. 864–871. ACM (2008) Sakuma, J., Kobayashi, S., Wright, R.N.: Privacy-preserving reinforcement learning. In: Cohen, W.W., McCallum, A., Roweis, S.T., (eds.) ICML, vol. 307. ACM International Conference Proceeding Series, pp. 864–871. ACM (2008)
16.
go back to reference Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. The MIT Press, Cambridge (1998) Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. The MIT Press, Cambridge (1998)
17.
go back to reference Talviste, R.: Applying Secure Multi-party Computation in Practice. Ph.D. thesis, University of Tartu (2016) Talviste, R.: Applying Secure Multi-party Computation in Practice. Ph.D. thesis, University of Tartu (2016)
18.
go back to reference Tang, Y., Grace, D., Clarke, T., Wei, J.: Multichannel non-persistent CSMA MAC schemes with reinforcement learning for cognitive radio networks. In: ISCIT 2011, pp. 502–506 (2011) Tang, Y., Grace, D., Clarke, T., Wei, J.: Multichannel non-persistent CSMA MAC schemes with reinforcement learning for cognitive radio networks. In: ISCIT 2011, pp. 502–506 (2011)
19.
go back to reference Yau, K.L.A., Komisarczuk, P., Paul, D.T.: Enhancing network performance in distributed cognitive radio networks using single-agent and multi-agent reinforcement learning. In: LCN 2010, pp. 152–159 (2010) Yau, K.L.A., Komisarczuk, P., Paul, D.T.: Enhancing network performance in distributed cognitive radio networks using single-agent and multi-agent reinforcement learning. In: LCN 2010, pp. 152–159 (2010)
Metadata
Title
Preserving Privacy of Agents in Reinforcement Learning for Distributed Cognitive Radio Networks
Authors
Geong Sen Poh
Kok-Lim Alvin Yau
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-46687-3_61

Premium Partner