Deep neural network-based clustering technique for secure IIoT

The advent of Industrial Internet of Things (IIoT) has determined the proliferation of smart devices connected to the Internet and injected a vast amount of data into it, which may undergo many computational stages at several clusters. On the one hand, the benefits brought by these technologies are well known; however, in the envisaged scenario, the exposure of data, services and infrastructures to malicious attacks has definitely grown. Even a single breach on any of the links of the data–service–infrastructure chain may seriously compromise the security of the end-user application. Therefore, the logical and smart clustering while satisfying security and reliability is a key issue for IIoT networks. A novel clustering method proposed based on power demand assures security of data information in IIoT-based applications. First, security capacity of the system is calculated from mutual information of primary channel and eavesdropping channel. Then, under the maximum transmit power constraint, an optimal transmit power is found based on deep learning technique, which maximizes security capacity of the system. Finally, the network is clustered according to the calculated power demand. Experimental results accredit the proposed method has higher security and reliability, as well as lower network time overhead and power consumption.

[1]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[2]  Gerhard P. Hancke,et al.  A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges , 2018, IEEE Access.

[3]  James Lam,et al.  An Energy-Efficient Adaptive Overlapping Clustering Method for Dynamic Continuous Monitoring in WSNs , 2017, IEEE Sensors Journal.

[4]  Matthieu R. Bloch,et al.  Physical Layer Security , 2020, Encyclopedia of Wireless Networks.

[5]  Richard Demo Souza,et al.  On the ergodic secrecy capacity and secrecy outage probability of the MIMOME Rayleigh wiretap channel , 2017, Trans. Emerg. Telecommun. Technol..

[6]  Jiachen Yang,et al.  Deep learning-based edge caching for multi-cluster heterogeneous networks , 2019, Neural Computing and Applications.

[7]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[8]  Tao Jiang,et al.  Deep learning for wireless physical layer: Opportunities and challenges , 2017, China Communications.

[9]  Li Sun,et al.  Safeguarding 5G Networks through Physical Layer Security Technologies , 2018, Wirel. Commun. Mob. Comput..

[10]  Baoyu Zheng,et al.  Physical-Layer Security and Reliability Challenges for Industrial Wireless Sensor Networks , 2017, IEEE Access.

[11]  Luca Sanguinetti,et al.  A deep Learning Framework for Power Allocation in Massive MIMO , 2018 .

[12]  Tao Liu,et al.  Toward Green and Secure Communications over Massive MIMO Relay Networks: Joint Source and Relay Power Allocation , 2017, IEEE Access.

[13]  Mérouane Debbah,et al.  Deep Learning Power Allocation in Massive MIMO , 2018, 2018 52nd Asilomar Conference on Signals, Systems, and Computers.

[14]  Amir H. Gandomi,et al.  I-SEP: An Improved Routing Protocol for Heterogeneous WSN for IoT-Based Environmental Monitoring , 2020, IEEE Internet of Things Journal.

[15]  Jakob Hoydis,et al.  An Introduction to Deep Learning for the Physical Layer , 2017, IEEE Transactions on Cognitive Communications and Networking.

[16]  Amrit Mukherjee,et al.  An energy efficient clustering using firefly and HML for optical wireless sensor network , 2019, Optik.

[17]  Yiqing Zhou,et al.  Realization of a computational efficient BBU cluster for cloud RAN , 2018 .

[18]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[19]  Amir H. Gandomi,et al.  Residual Energy-Based Cluster-Head Selection in WSNs for IoT Application , 2019, IEEE Internet of Things Journal.

[20]  Tiep Minh Hoang,et al.  Optimal Power Allocation for Multiuser Secure Communication in Cooperative Relaying Networks , 2016, IEEE Wireless Communications Letters.

[21]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[22]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[23]  Cheng Li,et al.  Dense-Device-Enabled Cooperative Networks for Efficient and Secure Transmission , 2018, IEEE Network.

[24]  Robert Simon Sherratt,et al.  On-demand fuzzy clustering and ant-colony optimisation based mobile data collection in wireless sensor network , 2019, Wirel. Networks.

[25]  Tony Morelli,et al.  A four-layer wireless sensor network framework for IoT applications , 2016, 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS).

[26]  Amrit Mukherjee,et al.  Distributed Artificial Intelligence Based Cluster Head Power Allocation in Cognitive Radio Sensor Networks , 2019, IEEE Sensors Letters.

[27]  Nan Liu,et al.  Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.

[28]  H. Vincent Poor,et al.  Power Allocation for Artificial-Noise Secure MIMO Precoding Systems , 2014, IEEE Transactions on Signal Processing.

[29]  Pranab K. Muhuri,et al.  Thermal-aware power-efficient deadline based task allocation in multi-core processor , 2017, J. Comput. Sci..

[30]  Brian D. O. Anderson,et al.  Simultaneous Velocity and Position Estimation via Distance-Only Measurements With Application to Multi-Agent System Control , 2014, IEEE Transactions on Automatic Control.

[31]  S. K. Mohapatra,et al.  Hybrid Heterogeneous Routing Scheme for Improved Network Performance in WSNs for Animal Tracking , 2019, Internet Things.

[32]  Joel J. P. C. Rodrigues,et al.  ADAI and Adaptive PSO-Based Resource Allocation for Wireless Sensor Networks , 2019, IEEE Access.

[33]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[34]  Ranjan K. Mallik,et al.  Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach , 2016, IEEE Transactions on Information Forensics and Security.

[35]  Amlan Datta,et al.  HML-Based Smart Positioning of Fusion Center for Cooperative Communication in Cognitive Radio Networks , 2016, IEEE Communications Letters.

[36]  Hongguang Sun,et al.  Spatial throughput of energy harvesting cognitive radio networks , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[37]  Angelo Brayner,et al.  Improving Multidimensional Wireless Sensor Network Lifetime Using Pearson Correlation and Fractal Clustering , 2017, Sensors.