Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments

Limited power and computational resources make the employment of complex classical encryption schemes unrealistic in resource-limited networks, e.g., the Internet of Things (IoT). To this end, physical layer security (PLS) has shown great potential in securing such resource-limited networks. To furt...

Full description

Bibliographic Details
Main Authors: Vahid Shahiri, Moslem Forouzesh, Hamid Behroozi, Ali Kuhestani, Kai-Kit Wong
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Open Journal of the Communications Society
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10479577/
_version_ 1797201302347841536
author Vahid Shahiri
Moslem Forouzesh
Hamid Behroozi
Ali Kuhestani
Kai-Kit Wong
author_facet Vahid Shahiri
Moslem Forouzesh
Hamid Behroozi
Ali Kuhestani
Kai-Kit Wong
author_sort Vahid Shahiri
collection DOAJ
description Limited power and computational resources make the employment of complex classical encryption schemes unrealistic in resource-limited networks, e.g., the Internet of Things (IoT). To this end, physical layer security (PLS) has shown great potential in securing such resource-limited networks. To further combat the power scarcity in IoT nodes, radio frequency (RF) based energy harvesting (EH) is an attractive energy source while relaying can enhance the energy efficiency and extend the range of data transmission. Additionally, due to deploying low-cost hardware, imperfections in the RF chain of IoT transceivers are common. Against this background, in this paper, we investigate an untrusted EH relay-aided secure communication with RF impairments. Specifically, the relay simultaneously receives the desired signal from the source and the jamming from the destination in the first phase. Hence the relay is unable to extract the confidential desired signal. The resultant composite signal is then amplified by the relay in the second phase by using the energy harvested from the composite signal followed by its transmission to the destination. Since the destination is the original source of the jamming, its effect can be readily subtracted from the composite signal to recover the original desired signal of the source. Moreover, in the face of hardware impairments (HWIs) in all nodes, maintaining optimal power management both at the source and destination may impose excessive computations on an IoT node. We solve this problem by deep learning (DL) based optimal power management maximizing the secrecy rate based on the instantaneous channel coefficients. We show that our learning-based scheme can reach the accuracy of the exhaustive search method despite its considerably lower computational complexity. Moreover, we developed an optimization framework for judiciously sharing HWIs across the nodes, so that we attain the maximum secrecy rate. To derive an efficient solution, we utilize a majorization-minimization (MM)algorithm, which is a particular instance in the family of successive convex approximation (SCA) methods. The simulation results show that the proposed HWI aware design considerably improves the secrecy rate.
first_indexed 2024-04-24T07:45:23Z
format Article
id doaj.art-1aed2dc57ec746d7bbe7b713b2c56caf
institution Directory Open Access Journal
issn 2644-125X
language English
last_indexed 2024-04-24T07:45:23Z
publishDate 2024-01-01
publisher IEEE
record_format Article
series IEEE Open Journal of the Communications Society
spelling doaj.art-1aed2dc57ec746d7bbe7b713b2c56caf2024-04-18T23:00:54ZengIEEEIEEE Open Journal of the Communications Society2644-125X2024-01-0152196221010.1109/OJCOMS.2024.338195110479577Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware ImpairmentsVahid Shahiri0https://orcid.org/0000-0002-7397-0257Moslem Forouzesh1Hamid Behroozi2https://orcid.org/0000-0001-9294-3134Ali Kuhestani3https://orcid.org/0000-0003-0725-3230Kai-Kit Wong4https://orcid.org/0000-0001-7521-0078Electrical Engineering Department, Sharif University of Technology, Tehran, IranFaculty of Engineering Technology, Amol University of Special Modern Technologies, Amol, IranElectrical Engineering Department, Sharif University of Technology, Tehran, IranElectrical and Computer Engineering Department, Qom University of Technology, Qom, IranDepartment of Electronic and Electrical Engineering, University College London, London, U.K.Limited power and computational resources make the employment of complex classical encryption schemes unrealistic in resource-limited networks, e.g., the Internet of Things (IoT). To this end, physical layer security (PLS) has shown great potential in securing such resource-limited networks. To further combat the power scarcity in IoT nodes, radio frequency (RF) based energy harvesting (EH) is an attractive energy source while relaying can enhance the energy efficiency and extend the range of data transmission. Additionally, due to deploying low-cost hardware, imperfections in the RF chain of IoT transceivers are common. Against this background, in this paper, we investigate an untrusted EH relay-aided secure communication with RF impairments. Specifically, the relay simultaneously receives the desired signal from the source and the jamming from the destination in the first phase. Hence the relay is unable to extract the confidential desired signal. The resultant composite signal is then amplified by the relay in the second phase by using the energy harvested from the composite signal followed by its transmission to the destination. Since the destination is the original source of the jamming, its effect can be readily subtracted from the composite signal to recover the original desired signal of the source. Moreover, in the face of hardware impairments (HWIs) in all nodes, maintaining optimal power management both at the source and destination may impose excessive computations on an IoT node. We solve this problem by deep learning (DL) based optimal power management maximizing the secrecy rate based on the instantaneous channel coefficients. We show that our learning-based scheme can reach the accuracy of the exhaustive search method despite its considerably lower computational complexity. Moreover, we developed an optimization framework for judiciously sharing HWIs across the nodes, so that we attain the maximum secrecy rate. To derive an efficient solution, we utilize a majorization-minimization (MM)algorithm, which is a particular instance in the family of successive convex approximation (SCA) methods. The simulation results show that the proposed HWI aware design considerably improves the secrecy rate.https://ieeexplore.ieee.org/document/10479577/Deep learningenergy harvestinghardware impairmentsmajorization-minimizationphysical layer securityuntrusted relaying
spellingShingle Vahid Shahiri
Moslem Forouzesh
Hamid Behroozi
Ali Kuhestani
Kai-Kit Wong
Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments
IEEE Open Journal of the Communications Society
Deep learning
energy harvesting
hardware impairments
majorization-minimization
physical layer security
untrusted relaying
title Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments
title_full Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments
title_fullStr Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments
title_full_unstemmed Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments
title_short Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments
title_sort deep learning aided secure transmission in wirelessly powered untrusted relaying in the face of hardware impairments
topic Deep learning
energy harvesting
hardware impairments
majorization-minimization
physical layer security
untrusted relaying
url https://ieeexplore.ieee.org/document/10479577/
work_keys_str_mv AT vahidshahiri deeplearningaidedsecuretransmissioninwirelesslypowereduntrustedrelayinginthefaceofhardwareimpairments
AT moslemforouzesh deeplearningaidedsecuretransmissioninwirelesslypowereduntrustedrelayinginthefaceofhardwareimpairments
AT hamidbehroozi deeplearningaidedsecuretransmissioninwirelesslypowereduntrustedrelayinginthefaceofhardwareimpairments
AT alikuhestani deeplearningaidedsecuretransmissioninwirelesslypowereduntrustedrelayinginthefaceofhardwareimpairments
AT kaikitwong deeplearningaidedsecuretransmissioninwirelesslypowereduntrustedrelayinginthefaceofhardwareimpairments