Generative Adversarial Networks for Secure Data Transmission in Wireless Network

被引:5
|
作者
Jayabalan, E. [1 ]
Pugazendi, R. [1 ]
机构
[1] Govt Arts Coll, Dept Comp Sci, Salem 636007, Tamil Nadu, India
来源
关键词
Generative adversarial learning neural network; Jammer; Minimax game theory; Attacks; COVERAGE; SCHEME;
D O I
10.32604/iasc.2023.031200
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a communication model in cognitive radios is developed and uses machine learning to learn the dynamics of jamming attacks in cognitive radios. It is designed further to make their transmission decision that automatically adapts to the transmission dynamics to mitigate the launched jamming attacks. The generative adversarial learning neural network (GALNN) or generative dynamic neural network (GDNN) automatically learns with the synthesized training data (training) with a generator and discriminator type neural networks that encompass minimax game theory. The elimination of the jamming attack is carried out with the assistance of the defense strategies and with an increased detection rate in the generative adversarial network (GAN). The GDNN with game theory is designed to validate the channel condition with the cross entropy loss function and back-propagation algorithm, which improves the communication reliability in the network. The simulation is conducted in NS2.34 tool against several performance metrics to reduce the misdetection rate and false alarm rates. The results show that the GDNN obtains an increased rate of successful transmission by taking optimal actions to act as a defense mechanism to mislead the jammer, where the jammer makes high misclassification errors on transmission dynamics.
引用
收藏
页码:3757 / 3784
页数:28
相关论文
共 50 条
  • [31] Training Generative Adversarial Networks with Limited Data
    Karras, Tero
    Aittala, Miika
    Hellsten, Janne
    Laine, Samuli
    Lehtinen, Jaakko
    Aila, Timo
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 33, NEURIPS 2020, 2020, 33
  • [32] Secure and Efficient Data Transmission over Body Sensor and Wireless Networks
    Narasimha Challa
    Hasan Çam
    Madhur Sikri
    EURASIP Journal on Wireless Communications and Networking, 2008
  • [33] Data Synthesis based on Generative Adversarial Networks
    Park, Noseong
    Mohammadi, Mahmoud
    Gorde, Kshitij
    Jajodia, Sushil
    Park, Hongkyu
    Kim, Youngmin
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2018, 11 (10): : 1071 - 1083
  • [34] Data Augmentation with Improved Generative Adversarial Networks
    Shi, Hongjiang
    Wang, Lu
    Ding, Guangtai
    Yang, Fenglei
    Li, Xiaoqiang
    2018 24TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2018, : 73 - 78
  • [35] Efficient User Authentication and Secure Data Transmission in Wireless Sensor Networks
    Das, Manik Lal
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 240 - 245
  • [36] Secure and Efficient Data Transmission over Body Sensor and Wireless Networks
    Challa, Narasimha
    Cam, Hasan
    Sikri, Madhur
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2008, 2008 (1)
  • [37] Data Augmentation Powered by Generative Adversarial Networks
    Poka, Karoly Bence
    Szemenyei, Marton
    2020 23RD IEEE INTERNATIONAL SYMPOSIUM ON MEASUREMENT AND CONTROL IN ROBOTICS (ISMCR), 2020,
  • [38] Secure data transmission of wireless sensor network based on information hiding
    Xiao, Xiangrong
    Sun, Xingming
    Yang, Lincong
    Chen, Minggang
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 393 - 398
  • [39] Generative Adversarial Network for Data Augmentation and Substitution
    Stankovic, Marko
    Bacanin, Nebojsa
    Zivkovic, Miodrag
    Jovanovic, Luka
    Sarac, Marko
    Antonijevic, Milos
    2024 ZOOMING INNOVATION IN CONSUMER TECHNOLOGIES CONFERENCE, ZINC 2024, 2024, : 7 - 12
  • [40] A secure and reliable data transmission scheme in wireless body area network
    Liu, Huaijin
    Chen, Yonghong
    Tian, Hui
    Wang, Tian
    Cai, Yiqiao
    International Journal of Network Security, 2019, 21 (04) : 648 - 660