Skip to main content

2016 | OriginalPaper | Buchkapitel

Preserving Privacy of Agents in Reinforcement Learning for Distributed Cognitive Radio Networks

verfasst von : Geong Sen Poh, Kok-Lim Alvin Yau

Erschienen in: Neural Information Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Reinforcement learning (RL) is one of the artificial intelligence approaches that has been deployed effectively to improve performance of distributed cognitive radio networks (DCRNs). However, in existing proposals that involve multi-agents, perceptions of the agents are shared in plain in order to calculate optimal actions. This raises privacy concern where an agent learns private information (e.g. Q-values) of the others, which can then be used to infer, for instance, the actions of these other agents. In this paper, we provide a preliminary investigation and a privacy-preserving protocol on multi-agent RL in DCRNs. The proposed protocol provides RL computations without revealing agents’ private information. We also discuss the security and performance of the protocol.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz, I.F., Lee, W.-Y., Vuran, M.C., Mohanty, S.: Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Comput. Netw. 50(13), 2127–2159 (2006)CrossRefMATH Akyildiz, I.F., Lee, W.-Y., Vuran, M.C., Mohanty, S.: Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Comput. Netw. 50(13), 2127–2159 (2006)CrossRefMATH
2.
Zurück zum Zitat Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: Ning, P., Syverson, P.F., Jha, S. (eds.) CCS, pp. 257–266. ACM (2008) Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: Ning, P., Syverson, P.F., Jha, S. (eds.) CCS, pp. 257–266. ACM (2008)
3.
Zurück zum Zitat Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192–206. Springer, Heidelberg (2008)CrossRef Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192–206. Springer, Heidelberg (2008)CrossRef
4.
Zurück zum Zitat Bogetoft, P., Christensen, D.L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325–343. Springer, Heidelberg (2009)CrossRef Bogetoft, P., Christensen, D.L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325–343. Springer, Heidelberg (2009)CrossRef
5.
Zurück zum Zitat Çatak, F.Ö.: Secure multi-party computation based privacy preserving extreme learning machine algorithm over vertically distributed data. In: Arik, S., Hunag, T., Lai, W.K., Liu, Q. (eds.) ICONIP 2015. LNCS, vol. 9490, pp. 337–345. Springer, Heidelberg (2015). doi:10.1007/978-3-319-26535-3_39 CrossRef Çatak, F.Ö.: Secure multi-party computation based privacy preserving extreme learning machine algorithm over vertically distributed data. In: Arik, S., Hunag, T., Lai, W.K., Liu, Q. (eds.) ICONIP 2015. LNCS, vol. 9490, pp. 337–345. Springer, Heidelberg (2015). doi:10.​1007/​978-3-319-26535-3_​39 CrossRef
6.
Zurück zum Zitat Damgård, I., Jurik, M., Nielsen, J.B.: A generalization of Paillier’s public-key system with applications to electronic voting. Int. J. Inf. Sec. 9(6), 371–385 (2010)CrossRef Damgård, I., Jurik, M., Nielsen, J.B.: A generalization of Paillier’s public-key system with applications to electronic voting. Int. J. Inf. Sec. 9(6), 371–385 (2010)CrossRef
7.
Zurück zum Zitat Erkin, Z.: Private data aggregation with groups for smart grids in a dynamic setting using CRT. In: WIFS, pp. 1–6. IEEE (2015) Erkin, Z.: Private data aggregation with groups for smart grids in a dynamic setting using CRT. In: WIFS, pp. 1–6. IEEE (2015)
8.
Zurück zum Zitat Lindell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. IACR Cryptology ePrint Archive 2008:197 (2008) Lindell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. IACR Cryptology ePrint Archive 2008:197 (2008)
9.
Zurück zum Zitat Ling, M.H., Yau, K.-L.A., Qadir, J., Poh, G.S., Ni, Q.: Application of reinforcement learning for security enhancement in cognitive radio networks. Appl. Soft Comput. 37, 809–829 (2015)CrossRef Ling, M.H., Yau, K.-L.A., Qadir, J., Poh, G.S., Ni, Q.: Application of reinforcement learning for security enhancement in cognitive radio networks. Appl. Soft Comput. 37, 809–829 (2015)CrossRef
10.
Zurück zum Zitat Mitola, J., Maguire, G.Q.: Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999)CrossRef Mitola, J., Maguire, G.Q.: Cognitive radio: making software radios more personal. IEEE Pers. Commun. 6(4), 13–18 (1999)CrossRef
11.
Zurück zum Zitat Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.1007/3-540-48910-X_16 Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.​1007/​3-540-48910-X_​16
12.
Zurück zum Zitat Peng, J., Li, J., Li, S., Li, J.: Multi-relay cooperative mechanism with q-learning in cognitive radio multimedia sensor networks. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1624–1629 (2011) Peng, J., Li, J., Li, S., Li, J.: Multi-relay cooperative mechanism with q-learning in cognitive radio multimedia sensor networks. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1624–1629 (2011)
13.
Zurück zum Zitat Qin, Z., Yi, S., Li, Q., Zamkov, D.: Preserving secondary users’ privacy in cognitive radio networks. In: INFOCOM, pp. 772–780. IEEE (2014) Qin, Z., Yi, S., Li, Q., Zamkov, D.: Preserving secondary users’ privacy in cognitive radio networks. In: INFOCOM, pp. 772–780. IEEE (2014)
14.
Zurück zum Zitat Rahulamathavan, Y., Phan, R.C.-W., Chambers, J.A., Parish, D.J.: Facial expression recognition in the encrypted domain based on local fisher discriminant analysis. IEEE Trans. Affect. Comput. 4(1), 83–92 (2013)CrossRef Rahulamathavan, Y., Phan, R.C.-W., Chambers, J.A., Parish, D.J.: Facial expression recognition in the encrypted domain based on local fisher discriminant analysis. IEEE Trans. Affect. Comput. 4(1), 83–92 (2013)CrossRef
15.
Zurück zum Zitat Sakuma, J., Kobayashi, S., Wright, R.N.: Privacy-preserving reinforcement learning. In: Cohen, W.W., McCallum, A., Roweis, S.T., (eds.) ICML, vol. 307. ACM International Conference Proceeding Series, pp. 864–871. ACM (2008) Sakuma, J., Kobayashi, S., Wright, R.N.: Privacy-preserving reinforcement learning. In: Cohen, W.W., McCallum, A., Roweis, S.T., (eds.) ICML, vol. 307. ACM International Conference Proceeding Series, pp. 864–871. ACM (2008)
16.
Zurück zum Zitat Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. The MIT Press, Cambridge (1998) Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. The MIT Press, Cambridge (1998)
17.
Zurück zum Zitat Talviste, R.: Applying Secure Multi-party Computation in Practice. Ph.D. thesis, University of Tartu (2016) Talviste, R.: Applying Secure Multi-party Computation in Practice. Ph.D. thesis, University of Tartu (2016)
18.
Zurück zum Zitat Tang, Y., Grace, D., Clarke, T., Wei, J.: Multichannel non-persistent CSMA MAC schemes with reinforcement learning for cognitive radio networks. In: ISCIT 2011, pp. 502–506 (2011) Tang, Y., Grace, D., Clarke, T., Wei, J.: Multichannel non-persistent CSMA MAC schemes with reinforcement learning for cognitive radio networks. In: ISCIT 2011, pp. 502–506 (2011)
19.
Zurück zum Zitat Yau, K.L.A., Komisarczuk, P., Paul, D.T.: Enhancing network performance in distributed cognitive radio networks using single-agent and multi-agent reinforcement learning. In: LCN 2010, pp. 152–159 (2010) Yau, K.L.A., Komisarczuk, P., Paul, D.T.: Enhancing network performance in distributed cognitive radio networks using single-agent and multi-agent reinforcement learning. In: LCN 2010, pp. 152–159 (2010)
Metadaten
Titel
Preserving Privacy of Agents in Reinforcement Learning for Distributed Cognitive Radio Networks
verfasst von
Geong Sen Poh
Kok-Lim Alvin Yau
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-46687-3_61