Physical Layer Security in the Age of Artificial Intelligence and Edge Computing

被引:15
|
作者
Zhao, Lindong [1 ]
Zhang, Xuguang [2 ]
Chen, Jianxin [1 ]
Zhou, Liang [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Nanjing, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Informat & Commun Engn, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Optimization; Receivers; Wireless communication; Resource management; Communication system security; Artificial intelligence; WIRELESS NETWORKS; COMMUNICATION;
D O I
10.1109/MWC.001.2000044
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Physical layer security (PLS) is emerging as an attractive security paradigm to complement or even replace complex cryptography. Although information-theoretical transmission optimization and physical-layer key generation have been thoroughly researched, there still exist many critical issues to be tackled before PLS is extensively applied. In this article, we investigate the prospect for exploiting artificial intelligent (AI) and edge computing (EC) to facilitate the practical application of PLS. First, two outstanding challenges facing PLS designers are identified by analyzing the fundamental assumptions regarding eavesdroppers and wireless channels. Accordingly, two enhancement schemes are designed by reaping the benefits offered by AI and EC. Specifically, a novel secure resource management framework is developed to enhance the adaptability of an optimization-based PLS paradigm, and a robust physical-layer key generation method is designed to cope with reciprocity failure. Finally, we discuss a coordinated defense architecture with multi-layer, multi-domain, and multi-dimension, which is expected to exploit the compatibility and complementarity of the existing PLS methods.
引用
收藏
页码:174 / 180
页数:7
相关论文
共 50 条
  • [1] Edge Intelligence: The Confluence of Edge Computing and Artificial Intelligence
    Deng, Shuiguang
    Zhao, Hailiang
    Fang, Weijia
    Yin, Jianwei
    Dustdar, Schahram
    Zomaya, Albert Y.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 7457 - 7469
  • [2] The Security and Privacy of Mobile-Edge Computing: An Artificial Intelligence Perspective
    Wang, Cheng
    Yuan, Zenghui
    Zhou, Pan
    Xu, Zichuan
    Li, Ruixuan
    Wu, Dapeng Oliver
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (24): : 22008 - 22032
  • [3] A Comprehensive Physical Layer Security Mechanism for Mobile Edge Computing
    Chen, Yichao
    Zhao, Kai
    Zhang, Heng
    He, Shibo
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (19) : 16816 - 16829
  • [4] Analysis of Physical Expansion Training Based on Edge Computing and Artificial Intelligence
    Liu, Zhongle
    [J]. MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [5] Analysis of Physical Expansion Training Based on Edge Computing and Artificial Intelligence
    Liu, Zhongle
    [J]. Mobile Information Systems, 2021, 2021
  • [6] Artificial intelligence technology in internet financial edge computing and analysis of security risk
    Sun, Qi
    Wu, Hong
    Zhao, Binglong
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2022, 39 (04) : 201 - 210
  • [7] Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication
    Liao, Run-Fa
    Wen, Hong
    Wu, Jinsong
    Pan, Fei
    Xu, Aidong
    Song, Huanhuan
    Xie, Feiyi
    Jiang, Yixin
    Cao, Minggui
    [J]. IEEE ACCESS, 2019, 7 : 116390 - 116401
  • [8] Security and Privacy for Edge Artificial Intelligence
    Michael, James Bret
    [J]. IEEE SECURITY & PRIVACY, 2021, 19 (04) : 4 - 7
  • [9] Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing
    Zhou, Zhi
    Chen, Xu
    Li, En
    Zeng, Liekang
    Luo, Ke
    Zhang, Junshan
    [J]. PROCEEDINGS OF THE IEEE, 2019, 107 (08) : 1738 - 1762
  • [10] Artificial intelligence aware and security-enhanced traceback technique in mobile edge computing
    Liu, Yuxin
    Wang, Tian
    Zhang, Shaobo
    Liu, Xuxun
    Liu, Xiao
    [J]. COMPUTER COMMUNICATIONS, 2020, 161 : 375 - 386