Next Article in Journal
Design and Implementation of CPU & FPGA Co-Design Tester for SDN Switches
Previous Article in Journal
Design of a 335 GHz Frequency Multiplier Source Based on Two Schemes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Machine Learning-Based Relay Selection for Secure Transmission in Multi-Hop DF Relay Networks

1
Department of Electronic Engineering, Myongji University, Yongin 17058, Korea
2
Telecommunication Division, Industrial University of Ho Chi Minh City, Ho Chi Minh City 700000, Vietnam
3
School of Electronic Engineering, Soongsil University, Seoul 06978, Korea
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(9), 949; https://doi.org/10.3390/electronics8090949
Submission received: 25 July 2019 / Revised: 21 August 2019 / Accepted: 23 August 2019 / Published: 28 August 2019
(This article belongs to the Special Issue Artificial Intelligence in Communication Systems)

Abstract

:
A relay selection method is proposed for physical-layer security in multi-hop decode-and-forward (DF) relaying systems. In the proposed method, cooperative relays are selected to maximize the achievable secrecy rates under DF-relaying constraints by the classification method. Artificial neural networks (ANNs), which are used for machine learning, are applied to classify the set of cooperative relays based on the channel state information of all nodes. Simulation results show that the proposed method can achieve near-optimal performance for an exhaustive search method for all combinations of relay selection, while computation time are reduced significantly. Furthermore, the proposed method outperforms the best relay selection method, in which the best relay in terms of secrecy performance is selected among active ones.

1. Introduction

Security for wireless communication networks has become a crucial issue because of the broadcast nature of wireless channels. Unauthorized nodes can easily overhear the confidential information of authorized nodes. Secure techniques utilize secret keys that deploy to the upper layers of wireless networks but require complex algorithms [1,2]. By exploiting the physical characteristics of wireless channels, physical-layer security has been regarded as a promising technique to enhance secure communications [3].
For two-hop systems, cooperative networks assisted by relay nodes have been widely investigated to improve the secrecy performance of the systems [4,5,6,7,8,9]. For the physical-layer security of cooperative relays, a node selection method has been proposed for amplify-and-forward and decode-and-forward (DF) relaying in a two-hop system [6,7]. The optimal relay selection has been investigated for cooperative wireless networks with multiple relays [8]. Maximum ratio combining (MRC), distributed selection combining, and distributed switch-and-stay combining schemes have been evaluated for opportunistic relay selection systems [9].
For multi-hop DF networks, the performance of multi-hop cooperative relay network has been analyzed using path selection and DF protocol at every hop [10] and a decentralized scheme has been proposed conducting the relay selection at each hop independently [11]. In addition, several approaches for selecting cluster-heads using interest of interaction among Internet of Thing (IoT) devices, physical proximity, channel quality and energy availability have been proposed in order to improve the performance of multi-hop systems [12,13]. The security problem for multi-hop wireless networks has been considered [14,15]. The geometric programming method was used to solve the transmit power allocation problem where full-duplex relays are deployed for multi-hop relaying systems [14]. A relay selection method was proposed to obtain the highest secrecy rate of the system for the scenarios of one-node relay and multiple relays at each hop [15]. However, the relay selection method presented previously [15] using exhaustive search requires high computational complexity when the number of relays increases.
In recent years, machine learning technologies have been applied to various fields such as image processing [16], energy management [17], security [18], and economics [19]. Machine learning has received considerable research interest in wireless networks, such as resource management for long-term evolution [20], predicting the best modulation order and coding rate for multiple-input–multiple-output (MIMO) orthogonal frequency-division multiplexing systems [21], channel estimation [22,23], antenna selection in wireless networks [24], and power allocation [25,26]. For physical-layer security, two machine learning methods, support vector machine (SVM) and naïve-Bayes, have been investigated for MIMO multiantenna-eavesdropper wiretap channels by transmit antenna selection [27].
In this paper, a relay selection problem was considered to maximize the achievable secrecy rate in a cooperative DF multi-hop network with the presence of an eavesdropper. Here, an artificial neural network (ANN) was used to determine the activation of cooperative relays. The proposed ANN model is trained using the training dataset, where the channel state information (CSI) of all nodes is the input, and the corresponding index for the activation of cooperative relays is the output. The effects of the different number of relays, as well as the positions of eavesdroppers, on the secrecy performance of the considered system were investigated. Simulation results show that the secrecy rate performance achieved by the proposed scheme is almost the same as that achieved by an exhaustive search for all combinations of relay selection. Furthermore, the secrecy performance of the proposed method is better than those of selecting the best relay. By using an offline-trained model, almost all the burden of the algorithm complexity is performed during the training stage. Hence, the complexity only depends on the classifying stage. The rest of this work is organized as follows. In Section 2, the system model is introduced, and the relay selection problem is formulated. In Section 3, details on steps of training data generation are provided, and an ANN model is obtained from the training data. The performance of proposed ANN is evaluated, and the results of different transmission schemes are compared in term of the secrecy rate in Section 4. Finally, the conclusion is presented in Section 5.
Notations: Vectors are noted by boldface small letters, and boldface capital letters are defined as matrices; E . is denoted as the expectation operator. R L x 1 represents the vector space of all L x 1 real matrices.

2. System Model

A wireless relaying network is considered that consists of one source node S, one destination node D, DF trusted relay nodes R n | 1 n N r , and an eavesdropper node, E, as shown in Figure 1. All nodes are assumed to be equipped with a single antenna, and operate in half-duplex mode, and there exists a direct link from S to D. Next, two transmission schemes, namely cooperative transmission (CT) and two-hop transmission, are expressed.

2.1. Cooperative Transmission Scheme

In the design, multi-hop relaying transmission is employed. Hence, information transmission between S and D through N r relays is done during ( N r + 1 ) time slots. In the first time slot, S uses transmit power P 0 to transmit information signal s to all receivers. In this case, it is assumed that P 0 = P / 2 . Therefore, the received signals at D, the n th relay, and the eavesdropper can be, respectively, given as
y D ( 0 ) = P 0 h S D s + z D ( 0 ) ,
y R n 0 = P 0 h S R n s + z R n ( 0 ) ,
y E 0 = P 0 h S E s + z E ( 0 ) ,
where h S D denotes the complex channel gain of the S D link, and h S R n and h S E denote the complex channel gains of] the S n th relay link and the S–eavesdropper link, respectively. z D , z R n , and z E are additive white Gaussian noise with variance δ 2 at the receivers.
In the next time slots, S communicates with D via the assistance of the relays that correctly decode signal s (called the active relays). It is assumed that T N r active relays are selected among the total N r relays to consecutively transmit information to D during T time slots. Hence, the received signals at D, k th relay, and eavesdropper E in the m th time slot, can be, respectively, shown as
y D m = P m h R m D s + z D ( m ) ,
y R k m = P m h R m R k s + z R k ( m ) ,
y E m = P m h R m E s + z E ( m ) ,
where m = 1 , 2 , , T ; k = m + 1 , m + 2 , , T . P m is the transmit power of the m th active relay, h R m D , h R m R k and h R m E are the complex channel gains of the m th relay–D link, the m th relay– k th relay link, and the m th relay–E link, respectively.
It is assumed that the transmit power of each active relay is equal to P 1 / T , where P 1 is the total transmit power of all active relays and it is assumed that P 1 = P / 2 . In addition, all receivers are assumed to use the MRC technique for processing the received signals. Therefore, the rates at D, the eavesdropper E, and the m th active relay with their received signals during T + 1 time slots can be computed as
Γ D = 1 ( T + 1 ) log 2 1 + α S , D P 0 + α R , D P 1 / T ,
Γ E = 1 ( T + 1 ) log 2 1 + α S , E P 0 + α R , E P 1 / T ,
Γ R m = log 2 1 + α S , R m P 0 , m = 1 1 m log 2 1 + α S , R m P 0 + α R m P 1 T , m = 2 , 3 , , T ,
respectively, where α S , R m = h S R m 2 / δ 2 , α R , D = m = 1 T h R m D 2 / δ 2 , α R m = t = 1 m 1 h R t , R m 2 / δ 2 , and α R , E = m = 1 T h R m E 2 / δ 2 . Then, the achievable secrecy rate of the considered system can be calculated as
Γ c t = max Γ D Γ E , 0 ,
where Γ D and Γ E are given in Equations (7) and (8), respectively.
To guarantee that the above scenario is feasible, it is necessary to check that the active relays can correctly decode the signal from S. This is referred to as a “DF relaying constraint”, such as Γ R m Γ t h | m = 1 , 2 , , T , where Γ t h is the rate threshold.
When the DF-relaying constraint is not satisfied, the secrecy rate in Equation (10) cannot be achieved. In the case where T relays among N r relays are activated, one can consider T N r scenarios. Considering that 1 T N r , the number of possible relay selection scenarios is T = 1 N r T N r = T = 1 N r N r ! ( N r T ) ! = 2 N r 1 , where T ! denotes the factorial of a non-negative integer T. For each scenario, the feasibility of this scenario is checked by using the DF-relaying constraint and the secrecy rate is computed as in Equation (10). The scenario providing the highest secrecy rate is the optimal relay (or hop) selection.
Let the highest secrecy rate in this CT scheme be denoted as Γ c t , given in Equation (10). Furthermore, T = 0 indicates that the direct transmission (DT) scheme is used. In this scheme, the rates at D, and the eavesdropper E, respectively, can be computed as
Γ D d t = log 2 1 + α S , D P ,
Γ E d t = log 2 1 + α S , E P .
Then, the achievable secrecy rate of the considered system can be calculated as
Γ d t = max Γ D d t Γ E d t , 0 ,
In the no transmission (NT) scheme, the achievable secrecy rate Γ n t = 0 . The goal is to find one case among all possible relay selection scenarios to obtain the highest achievable secrecy rate of the system. Then, the problem of relay selection maximizing the achievable secrecy rate in this multi-hop DF relay network can be formulated as
Γ s = max Γ n t , Γ d t , Γ c t ,
where Γ d t , and Γ c t are given in Equations (10), and (13), respectively.
The solution to the problem can be summarized as the following “theoretical algorithm”.
  • For the DT scheme, compute the secrecy rate Γ d t as in Equation (13).
  • For the CT scheme, compute the secrecy rate Γ c t as in Equation (10) for all of T = 1 N r T N r cases where T relays are active.
  • Applying Equation (14) for all the secrecy rates, compute the corresponding DT and CT schemes to select the highest secrecy rate.

2.2. Two-Hop Transmission (Best Relay Selection) Scheme

In this subsection, the two-hop transmission scheme is considered as a baseline. One of the active relays that satisfies the DF constraint condition is selected to assist the source transmitting signal to the destination. In this case, T = 1 , information transmission occurs in a two-hop manner. In the first hop, the information is transmitted from S to the selected relay, and, in the second hop, the selected relay decodes the received signals and forwards to D.
For this scheme, the rates at D, the eavesdropper E, and the m th active relay with their received signals during two time slots can be computed as
Γ m , D 2 h o p = 1 2 log 2 1 + α S , D P 0 + α R m , D P 1 ,
Γ m , E 2 h o p = 1 2 log 2 1 + α S , E P 0 + α R m , E P 1 ,
Γ R m 2 h o p = 1 2 log 2 1 + α S , R m P 0 ,
where α R m , D = h R m D 2 / δ 2 , α S , R m = h S R m 2 / δ 2 , P 1 = P 0 = P / 2 . Then, the secrecy rate of the system for this scheme is obtained as
Γ c t 2 h o p = max m = 1 , 2 , , N r Γ m , c t 2 h o p ,
where Γ m , c t 2 h o p = max Γ m , D 2 h o p Γ m , E 2 h o p , 0 is the secrecy rate of each active relay. Then, the problem of relay selection maximizing the achievable secrecy rate in this scheme can be formulated as
Γ s = max Γ n t , Γ d t , Γ c t 2 h o p ,
where Γ d t , and Γ c t 2 h o p are given in Equations (13), and (18), respectively.
The results of the two-hop transmission scheme are only simulated as a benchmark for the proposed relay selection by a machine learning method. In this study, it was assumed that a global CSI is available at S. In practice, the end-users (i.e., E or D) estimate and feed the absolute values of CSIs from S and all relays back to S [27]. When N r relays exist, each end-user sends N r + 1 absolute values of CSIs for feedback information.

3. Machine Learning for Relay Selection

In this section, a machine learning method is introduced to deal with Equation (14) as a multiclass classification problem. First, features are extracted from the CSIs, and the corresponding class label is obtained for a training dataset. After that a machine learning method, such as the use of ANNs, is trained using the training dataset, where the class label is the corresponding index. In the test dataset, the proposed machine learning method predicts the class label for which the DF relay network can obtain the optimal achievable secrecy rate.

3.1. Training Data Design

In this subsection, how to create the training dataset by simulation is described.

3.1.1. Generating Input Data

For the training dataset, L CSIs are generated, and real-valued feature vectors are extracted from these CSIs. Then, the feature vectors are normalized. The feature vector generation is presented as follows:
Step 1 . Generate the lth feature vector d l containing the features from CSIs obtained by
d l = h S D l , h S R 1 l , , h S R N r l , h R 1 R 2 l , , h R N r 1 R N r l , h S E l , h R 1 D l , , h R N r D l , h R 1 E l , , h R N r E l T .
Step 2 . Generate L feature vectors for L CSIs using Step 1 .
Step 3 . Normalize feature vector d l to obtain the normalized vector z l . The nth feature element of normalized vector z l can be calculated as
z n l = d n l E d n max d n min d n ,
where d n l is the nth element of feature vector d l , d n R L x 1 is the vector containing all L samples for the nth feature and E d n is the expectation of d n .

3.1.2. Labeling

The achievable secrecy rate given in Equation (14) is chosen as the key performance indicator (KPI). From each training data sample and KPI, one can easily determine the class label corresponding to the current sample. There exists one transmission mode to be selected in the considered system during communication between S and D. The class labels are indices of cases that contain the important information consisting of the transmission mode and the index of the relay selection combinations. In general, the system has N r relays, and Π = 2 N r + 1 class labels are employed, where 2 N r class labels are for relay selection combinations and one class label is for NT scheme. An example for labeling is presented in Table 1. It is shown that, when the class label has t = 0 with the given the CSI, it means that the system is in an NT scheme. When t = 1 , the DT scheme is selected. When t = 2 , the system performs in the CT scheme, in which one relay is active and its index is the first relay, and so on.

3.1.3. Constructing the Training Dataset

After generating the input samples and labeling, the input–output pairs are concatenated to create the full training dataset.
D t r a i n = z 1 , t 1 , z 2 , t 2 , , z L , t L ,
where t i is the ith class label.

3.1.4. Network Structure Design

In this subsection, how an ANN classifier can solve the problem is described. Using the labeled training dataset, a trained ANN model is constructed. The input of the model is absolute values of CSIs and the output is important information such as index of the selected relay set, and one of the transmission schemes. Note that the information transmission of the considered system may occur in one of three transmission schemes, namely, DT, CT, and NT schemes. Here, a brief introduction of a neural network is given. The structure of the neural network contains multiple neural nodes (called units) implemented in each hidden layer. Each layer uses a nonlinear function called an “activation function”. The most universal choices for the activation function are the sigmoid function and the rectified linear unit (ReLU) function, which can be, respectively, expressed by
f sigmoid x = 1 1 + e x ,
f ReLU x = max 0 , x ,
where x is the argument of the function. The choice of activation function is a crucial part to ensure good performance of ANNs. The sigmoid activation function is the simplest activation function allowing the neurons learn more complex structures in the data [28]. For a long time, the default activation used on neural network has been the Sigmoid activation function. However, one of the biggest problems during training process with sigmoid activation is vanishing gradient, which may prevent the model from learning effectively as the number of layers get bigger. This is the reason why ReLU activation function is applied to all hidden layers in our experiment, since it helps the model converge faster without making the gradient saturated as with the sigmoid activation function [29,30].
In a multiclass classification case, an activation function is used at the output layer, which can be formulated as
f Softmax x i = exp x i j = 1 C exp x j ,
where C is the number of classes, i , j 1 , 2 , , C , and x i , x j are scores of the i th class and j th class, respectively.
In general, these layers are arranged in a chain structure in which each layer is an activation function of the previous layer, to form
o = f z , W = f ( k 1 ) f ( k 2 ) f ( k 3 ) f ( 1 ) z ,
where o , z , and W denote the output, the input and the weights of the neural model, respectively, and k is the number of layers of the neural model.
As illustrated in Figure 2, a network is designed containing five layers, which takes the absolute values of CSIs; the first hidden layer, the second hidden layer and the third hidden layer consist of 16 N r , 32 N r , and 64 N r units, respectively. There are 2 N r + 1 units at the output layer corresponding to 2 N r classes containing secrecy rate values of all combinatorial relay selection cases and one class presenting secrecy rate value of NT scheme. A Softmax function is applied to this layer to represent the probability distribution over all classes, and then obtain the best one with the maximum probability value. This class provides the best combinatorial relay selection or NT scheme corresponding to a given CSI.
For any scale network, an ANN model consists of one input layer, k 1 hidden layers and one output layer. The number of elements at the input layer is equal to the total CSIs of all nodes, N r N r + 5 / 2 + 2 , while the number of neurons of the k th hidden layer and the output layer are 2 k + 3 N r and 2 N r + 1 , respectively.

3.1.5. ANN Training

In this subsection, the selection of appropriate parameters to train the ANN is described. In total, 650,000 samples were generated for training data (i.e., L = 650,000). The training dataset was split into a training set and validation set. The training set was used to train the network parameters and the validation set was used to evaluate the trained model. As designed in the ANN structure above, cross entropy can be utilized as the loss function for the ANN model. Hence, the loss function for each i th sample input z i is formulated as
L o s s t i , o z i , W , b = log o z i , W , b
where t ( i ) is the label representing the best transmission case that provides the highest secrecy rate among 2 N r + 1 possible cases of the system, and o ( i ) z i , W , b is the output that is predicted by the ANN for t ( i ) with weight values W and bias values b . The target of the training process is to find the suitable parameters W and b that minimize the average loss (called the “cost function”) of entry training dataset. The cost function is defined as
L Θ = 1 M i = 1 M L o s s t i , o z i , W , b ,
where the set Θ = W , b contains every training parameter of the ANN model. Every parameter is generally updated iteratively using the gradient descent methods. At each iteration, every parameter is updated simultaneously as
Θ m + 1 = Θ m η Θ L Θ ,
where Θ represents as the gradient operator with respect to Θ , η is the learning rate, and m is the iteration number. To optimize the cost function, many gradient descent methods such as Adam, AdaGrad, and AdaDelta optimizers [31,32,33] are used for updating the network parameters. Based on adaptively changing the learning rate, these optimizers minimize the cost function in a precise manner. In this study, Adam optimization algorithm was applied to the proposed ANN model, because it requires only the first-order gradients to be calculated, thus reducing computational complexity [31]. In addition, to reduce overfit in training, the dropout technique in [34] is applied to ANN model; values of the dropout can be selected in the range 10–90%. However, too large value may result in a slow training and underfitting issue, while too small value may not produce enough dropout to prevent overfitting. Thus, after carefully checking each value of dropout to performance of ANN model, we chose 10% as dropout value, for which the proposed ANN model performs well.
Once the parameters W and b are obtained after the training process, the ANN is configured and can calculate the highest secrecy rate of the considered system corresponding to new input vectors z . This means that, any time the channel realizations change, the optimal secrecy rate is updated by feeding the new z to the trained ANN, without any need to solve the problem defined in Equation (14).
Remark 1.
Once the ANN model is trained, the parameters of the trained model can be used at least until the statistical characteristics (such as the probability distribution of complex gain of each channel) of channels change [35,36]. In that case, it is necessary to collect new CSIs from the channels to create the classifying model for the new channel conditions.

4. Numerical Experiments

The effectiveness of our proposed method was evaluated on the optimal achievable secrecy rate. To benchmark, the results of the DT and the two-hop transmission schemes were compared with those of the proposed relay selection method (CT scheme). In addition, for the machine learning method, the performance of ANN model was compared with that of the SVM model.
In the following, distances are denoted between S D , S R n , S E , R n D , and R n E as d S D , d S R n , d S E , d R n D , and d R n E , respectively. It was assumed that positions of S, R n , and D are in a line as in a previously study [15]. All channels were assumed to experience identical and independent distributed (i.i.d) Rayleigh fadings.
The overall transmit power, P = 30 dBm, the noise power δ 2 = 30 dBm, the pathloss exponent c = 3.5 , and the threshold rate Γ t h = 0.1 (bits/Hz/s) were set. It was assumed that S and D are placed at (0 m, 0 m) and (0 m, 120 m), respectively, or d S D = 120 m. All relay nodes were located between S and D, and the distance of relay nodes was d S D N r + 1 . It was assumed that the positions of the eavesdropper are changed randomly when d E x is moved along the parallel line to the line between S and D from 50 m to 180 m and d E y is located from 5 m to 10 m.
In total, 650,000 samples were generated for training data (i.e., L = 650,000). To select the hyper-parameters of the ANN model while avoiding the overfitting problem, 10% of these training data were used randomly for the validation phase. In the ANN model, the batch size was 1024. To ensure the best performance of the model, we trained the model with three different learning rates, 0.01, 0.001, and 0.0001. Based on the results shown in Figure 3, we can see that performance of ANN model with learning rate 0.001 outperforms that of ANN model with learning rates 0.01 and 0.0001 for a six-relay-based system. Hence, we selected the initial learning rate to be 0.001. After obtaining trained ANN model, 10,000 new samples were generated for test data to evaluate the performance of such a model.
Figure 4 depicts the convergence over each training epoch on the training and validation set for three different models corresponding to the number of relays. It can be seen that all lines of accuracies of both the training dataset and validation dataset increase steadily after each epoch. Moreover, the gap between the line of training and the line of validation for each model is minimal, meaning that there is no overfitting problem. In addition, the performance of the ANN method is inversely proportional to the number of relays or input size. Clearly, the accuracy of the ANN model is 95.51% and only 77.75% with two-relay-based system and six-relay-based system, respectively.
Figure 5 illustrates the achievable secrecy rate changing as a function of number of relays for positions of the eavesdropper corresponding to the horizontal axis d E x = 120 m and d E x = 160 m. In addition, this figure provides a comparison of the exhaustive search method and ANN machine learning method corresponding to different values of N r . The achievable secrecy rates of both the ANN-based system and the exhaustive search-based system increase when the number of relays N r increases. In addition, the secrecy performance of the ANN-based system is the same as that of the exhaustive search-based system with N r < 4 ; however, the secrecy performance of the ANN-based system decreases when the number of relays increases ( N r 4 ). The results also show that, with a given S D distance, the secrecy performance of the system can be improved by increasing the number of hops.
Figure 6 presents a comparison of the performances between the ANN method and SVM method and exhaustive search for change of eavesdropper position with different values of N r . Clearly, the position of the eavesdropper has a direct effect on the performance of the machine learning methods. When the eavesdropper is located near the source ( d E x < 100 m), the effectiveness of machine learning approach is significant, and the performance of SVM methods are reduced when the position of the eavesdropper is far from the source ( d E x > 100 m). In addition, the effectiveness of the ANN method is greater than that of the SVM method for all cases. Moreover, when the network becomes more complex with a greater number of relays, the performance of SVM method drops significantly while the results of ANN method is close to that of the exhaustive search method.
A comparison of three transmission schemes, i.e, the CT scheme, best relay selection (two-transmission) scheme, and DT scheme, is plotted in Figure 7. The secrecy performance of the CT scheme is always much better than that of the best relay selection (two-hop transmission) scheme and DT scheme. The performance of ANN method decreases when the number of relays of the network becomes larger, but it is always near the optimal values compared with the performance of the best relay selection scheme. This demonstrates the potential of the proposed scheme to be implemented in multi-hop networks. Moreover, the results presented in Figure 7 confirm again the effectiveness of our proposed machine learning method.
To provide a fair comparison, the exhaustive search algorithm and the proposed machine learning algorithm were implemented in the same platform in Python. Table 2 displays the averaged computational time per sample for both algorithms. The running time of the proposed algorithm outperforms that of exhaustive search algorithm for all values of the number of relays. Furthermore, the computational efficiency of the ANN algorithm is insensitive, whereas that of the exhaustive search algorithm is significantly changed with the increase of relay numbers.

5. Conclusions

In this work, it was demonstrated that the problem of determining the optimal achievable secrecy rate by selecting active relays for a multi-hop network with DF-relaying constraints can be overcome by using a machine-learning-based method (i.e., using an ANN). First, the simulation results indicate that the proposed method can achieve the secrecy performance of the considered system at optimal values as in the exhaustive search method while the computation time is significantly reduced. Second, increasing the number of hops can enhance the security of the system. Finally, the secrecy performance of the proposed relay selection scheme outperforms that of the two-hop transmission scheme and DT scheme. Moreover, it is hoped that, when applying realistic wireless channels to the simulated data-based model, it will only be necessary to retrain or make minor adjustments without building a new model from scratch. In addition, this study provides insights into the research of new machine learning methods for physical-layer security in wireless cooperative networks. In the future, the proposed model will be applied to a large scale network with multiple eavesdroppers. Moreover, CSIs of eavesdropper not known at the source will be considered.

Author Contributions

Y.-H.K. and J.-H.L. conceived of the presented idea. T.-T.N. and N.M.-T. developed the model and performed the computation. All authors discussed the results and contributed to the final manuscript.

Funding

This research was supported in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (NRF-2017R1C1B1012259), and in part by the Korea Institute of Energy Technology Evaluation and Planning (KETEP) and the Ministry of Trade, Industry & Energy (MOTIE) of the Republic of Korea (No. 17-02-N0202-04).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Genkin, D.; Shamir, A.; Tromer, E. RSA key extraction via low-bandwidth acoustic cryptanalysis. In Proceedings of the 34th Annu. Cryptology Conf. Advances Cryptology, Santa Barbara, CA, USA, 17–21 August 2014; pp. 444–461. [Google Scholar] [CrossRef]
  2. Choudary, M.O.; Kuhn, M.G. Efficient stochastic methods: Profiled attacks beyond 8 bits. Smart Card Res. Adv. Appl. 2015, 8968, 85–103. [Google Scholar] [CrossRef]
  3. Shiu, Y.S.; Change, S.Y.; Wu, H.C.; Huang, S.H.; Chen, H.H. Physical layer security in wireless networks: A tutorial. IEEE Wirel. Commun. 2011, 18, 66–74. [Google Scholar] [CrossRef]
  4. Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V. Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 2010, 58, 1875–1888. [Google Scholar] [CrossRef]
  5. Li, J.; Petropulu, A.P.; Petropulu, A.P.; Weber, S. On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process. 2011, 59, 4985–4997. [Google Scholar] [CrossRef]
  6. Su, Y.; Han, G.; Fu, X.; Xu, N.; Jin, Z. The physical layer security experiments of cooperative communication system with different relay behaviors. Sensors 2017, 17, 781. [Google Scholar] [CrossRef] [PubMed]
  7. Guo, H.; Yang, Z.; Zhang, L.; Zhu, J.; Zou, Y. Joint Cooperative Beamforming and Jamming for Physical-Layer Security of Decode-and-Forward Relay Networks. IEEE Access 2017, 5, 19620–19630. [Google Scholar] [CrossRef]
  8. Zou, Y.; Wang, X.; Shen, W. Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 2013, 31, 2099–2111. [Google Scholar] [CrossRef]
  9. Al-Qahtani, F.S.; Zhong, C.; Alnuweiri, H.M. Opportunistic relay selection for secrecy enhancement in cooperative networks. IEEE Trans. Commun. 2015, 63, 1756–1770. [Google Scholar] [CrossRef]
  10. Bhatnagar, M.R. Performance analysis of a path selection scheme in multi-hop decode-and-forward protocol. IEEE Commun. Lett. 2012, 16, 1980–1983. [Google Scholar] [CrossRef]
  11. Senanayake, R.; Atapattu, S.; Evans, J.S.; Smith, P.J. Decentralized relay selection in multi-user multihop decode-and-forward relay networks. IEEE Trans. Wirel. Commun. 2018, 17, 3313–3326. [Google Scholar] [CrossRef]
  12. Tsiropoulou, E.E.; Mitsis, G.; Papavassiliou, S. Interest-aware energy collection & resource management in machine to machine communications. Ad Hoc Netw. 2018, 68, 48–57. [Google Scholar] [CrossRef]
  13. Tsiropoulou, E.E.; Paruchuri, S.T.; Baras, J.S. Interest, energy and physical-aware coalition formation and resource allocation in smart IoT applications. In Proceedings of the 2017 51st Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA, 22–24 March 2017; pp. 1–6. [Google Scholar] [CrossRef]
  14. Lee, J.H. Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems. IEEE Commun. Lett. 2015, 19, 525–528. [Google Scholar] [CrossRef]
  15. Lee, J.H. Optimal Power Allocation for Physical Layer Security in Multi-Hop DF Relay Networks. IEEE Trans. Wirel. Commun. 2016, 15, 28–38. [Google Scholar] [CrossRef]
  16. Lei, L.; Vu, X.T.; You, L.; Flower, S.; Yuan, D. Efficient Minimum-Energy Scheduling with Machine-Learning Based Predictions for Multiuser MISO Systems. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar] [CrossRef]
  17. Ahmad, J.; Larijani, H.; Emmanuel, E.; Mannion, M.; Javed, A.; Phillipson, M. Energy demand prediction through novel random neural network predictor for large non-domestic buildings. In Proceedings of the Annual IEEE International Systems Conference (SysCon), Montreal, QC, Canada, 24–27 April 2017; pp. 1–6. [Google Scholar] [CrossRef]
  18. Ahmad, J.; Larijani, H.; Emmanuel, R.; Mannion, M.; Javed, A.A. Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera. In Intelligent Systems and Applications (IntelliSys 2018); Arai, K., Kapoor, S., Bhatia, R., Eds.; Advances in Intelligent Systems and Computing; Springer: Cham, Switzerland, 2018; Volume 869. [Google Scholar] [CrossRef]
  19. Mullainathan, S.; Spiess, J. Machine Learning: An Applied Econometric Approach. J. Econ. Perspect. 2017, 31, 87–106. [Google Scholar] [CrossRef]
  20. Challita, U.; Dong, L.; Saad, W. Proactive resource management in LTE-U systems: A deep learning perspectives. arXiv 2017, arXiv:1702.07031. [Google Scholar]
  21. Daniels, R.C.; Caramanis, C.M.; You, L.; Heath, R.W. Adaptation in Convolutionally Coded MIMO-OFDM Wireless Systems Through Supervised Learning and SNR Ordering. IEEE Trans. Veh. Technol. 2010, 59, 114–126. [Google Scholar] [CrossRef]
  22. Wen, C.K.; Jin, S.; Wong, K.K.; Chen, J.C.; Ting, P. Channel Estimation for Massive MIMO Using Gaussian-Mixture Bayesian Learning. IEEE Trans. Wirel. Commun. 2015, 14, 1356–1368. [Google Scholar] [CrossRef]
  23. Neumann, D.; Wiese, T.; Utschick, W. Learning the MMSE channel estimator. arXiv 2017, arXiv:1707.05674v3. [Google Scholar] [CrossRef]
  24. Young, J. Machine learning-based antenna selection in wireless communications. IEEE Commun. Lett. 2016, 20, 2241–2244. [Google Scholar] [CrossRef]
  25. Amiri, R.; Jin, S.; Mehrpouyan, H.; Fridman, L.; Mallik, R.K.; Nallanathan, A.; Matolak, D. A Machine Learning Approach for Power Allocation in HetNets Considering QoS. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–7. [Google Scholar] [CrossRef]
  26. Ghadimi, E.; Calabrese, F.D.; Peters, G.; Soldati, P. A reinforcement learning approach to power control and rate adaptation in cellular networks. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–7. [Google Scholar] [CrossRef]
  27. He, D.; Liu, C.; Quek, T.Q.S.; Wang, H. Transmit antenna selection in MIMO wiretap channels: A machine learning approach. IEEE Commun. Lett. 2018, 7, 634–637. [Google Scholar] [CrossRef]
  28. Goodfellow, I.; Bengio, Y.; Courville, A. Deep Learning; The MIT Press: Cambridge, MA, USA, 2016. [Google Scholar]
  29. Krizhevsky, A.; Sutskever, I.; Hinton, G.E. Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems 25; Pereira, F., Burges, C.J.C., Bottou, L., Weinberger, K.Q., Eds.; Curran Associates, Inc.: New York, NY, USA, 2012. [Google Scholar]
  30. Nair, V.; Hilton, G.E. Rectified Linear Units Improve Restricted Boltzmann Machines. In Proceedings of the 27th International Conference on International Conference on Machine Learning, Haifa, Israel, 21–24 June 2010; pp. 807–814. [Google Scholar]
  31. Kingma, D.; Ba, J. Adam: A method for stochastic optimization. arXiv 2017, arXiv:1412.6980. [Google Scholar]
  32. Duchi, J.; Hazan, E.; Singer, Y. Adaptive subgradient methods for online learning and stochastic optimization. J. Mach. Learn. Res. 2011, 12, 2121–2159. [Google Scholar]
  33. Zeiler, M.D. ADADELTA: An adaptive learning rate method. arXiv 2012, arXiv:1212.5701. [Google Scholar]
  34. Srivastava, N.; Hinton, G.; Krizhevsky, A.; Sutskever, I.; Salakhutdinov, R. Dropout: A simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 2014, 15, 1929–1958. [Google Scholar]
  35. Zappone, A.; Debbah, M.; Zwi Altman, Z. Online Energy-Efficient Power Control in Wireless Networks by Deep Neural Networks. In Proceedings of the 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata, Greece, 25–28 June 2018; pp. 1–5. [Google Scholar]
  36. Long, Y.; Chen, Z.; Fang, J.; Tellambura, C. Data-Driven-Based Analog Beam Selection for Hybrid Beamforming Under mm-Wave Channels. IEEE J. Sel. Top. Signal Process. 2018, 12, 340–352. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Electronics 08 00949 g001
Figure 2. ANN model.
Figure 2. ANN model.
Electronics 08 00949 g002
Figure 3. Learning rate selection.
Figure 3. Learning rate selection.
Electronics 08 00949 g003
Figure 4. Performance converenge versus epochs.
Figure 4. Performance converenge versus epochs.
Electronics 08 00949 g004
Figure 5. The achievable secrecy rate for different number of relays.
Figure 5. The achievable secrecy rate for different number of relays.
Electronics 08 00949 g005
Figure 6. Comparison of performance of ANN method with SVM method.
Figure 6. Comparison of performance of ANN method with SVM method.
Electronics 08 00949 g006
Figure 7. Comparison of different transmission schemes.
Figure 7. Comparison of different transmission schemes.
Electronics 08 00949 g007
Table 1. Example of labeling for the system with two relays ( N r = 2 ).
Table 1. Example of labeling for the system with two relays ( N r = 2 ).
Transmission SchemesLabels (t)
NT0
DT1
CT (the first relay is active )2
CT (the second relay is active)3
CT (both relays are active)4
Table 2. Comparison of computation time (s).
Table 2. Comparison of computation time (s).
Number of RelaysExhaustive SearchANN (Test Phase)
N r = 2 0.002860.00009
N r = 4 0.006480.00018
N r = 6 0.034980.00030

Share and Cite

MDPI and ACS Style

Nguyen, T.-T.; Lee, J.-H.; Nguyen, M.-T.; Kim, Y.-H. Machine Learning-Based Relay Selection for Secure Transmission in Multi-Hop DF Relay Networks. Electronics 2019, 8, 949. https://doi.org/10.3390/electronics8090949

AMA Style

Nguyen T-T, Lee J-H, Nguyen M-T, Kim Y-H. Machine Learning-Based Relay Selection for Secure Transmission in Multi-Hop DF Relay Networks. Electronics. 2019; 8(9):949. https://doi.org/10.3390/electronics8090949

Chicago/Turabian Style

Nguyen, Tien-Tung, Jong-Ho Lee, Minh-Tuan Nguyen, and Yong-Hwa Kim. 2019. "Machine Learning-Based Relay Selection for Secure Transmission in Multi-Hop DF Relay Networks" Electronics 8, no. 9: 949. https://doi.org/10.3390/electronics8090949

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop