Securing Communication Networks at the Physical Layer: A DRL and Phase Optimization Approach
Securing communication between multiple users efficiently while there are too many potential eavesdroppers has become an important issue with the rise of the Internet of Things (IoTs). This paper extends on earlier research, moving from a single‐user and single‐eavesdropper scenario to a complex mul...
Uloženo v:
| Vydáno v: | IET signal processing Ročník 2025; číslo 1 |
|---|---|
| Hlavní autoři: | , , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Stevenage
John Wiley & Sons, Inc
01.01.2025
Wiley |
| Témata: | |
| ISSN: | 1751-9675, 1751-9683 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Securing communication between multiple users efficiently while there are too many potential eavesdroppers has become an important issue with the rise of the Internet of Things (IoTs). This paper extends on earlier research, moving from a single‐user and single‐eavesdropper scenario to a complex multiuser and multieavesdropper context, and incorporates an advanced physical layer security (PLS) technique for the first time. Using reconfigurable intelligent surfaces (RISs) enhances the strength and quality of signals for intended users, while those to the unintended users are suppressed. Real‐time control of the RIS phase shifts is enabled through a deep deterministic policy gradient (DDPG) algorithm and this control significantly changes the trade‐off between security and energy wastage. The simulation results demonstrate that the developed approach can scale up in densely populated urban centers, while increasing the bit error rate (BER) performance and the overall energy efficiency across different wireless mobile channels. |
|---|---|
| AbstractList | Securing communication between multiple users efficiently while there are too many potential eavesdroppers has become an important issue with the rise of the Internet of Things (IoTs). This paper extends on earlier research, moving from a single‐user and single‐eavesdropper scenario to a complex multiuser and multieavesdropper context, and incorporates an advanced physical layer security (PLS) technique for the first time. Using reconfigurable intelligent surfaces (RISs) enhances the strength and quality of signals for intended users, while those to the unintended users are suppressed. Real‐time control of the RIS phase shifts is enabled through a deep deterministic policy gradient (DDPG) algorithm and this control significantly changes the trade‐off between security and energy wastage. The simulation results demonstrate that the developed approach can scale up in densely populated urban centers, while increasing the bit error rate (BER) performance and the overall energy efficiency across different wireless mobile channels. Securing communication between multiple users efficiently while there are too many potential eavesdroppers has become an important issue with the rise of the Internet of Things (IoTs). This paper extends on earlier research, moving from a single-user and single-eavesdropper scenario to a complex multiuser and multieavesdropper context, and incorporates an advanced physical layer security (PLS) technique for the first time. Using reconfigurable intelligent surfaces (RISs) enhances the strength and quality of signals for intended users, while those to the unintended users are suppressed. Real-time control of the RIS phase shifts is enabled through a deep deterministic policy gradient (DDPG) algorithm and this control significantly changes the trade-off between security and energy wastage. The simulation results demonstrate that the developed approach can scale up in densely populated urban centers, while increasing the bit error rate (BER) performance and the overall energy efficiency across different wireless mobile channels. Keywords: deep deterministic policy gradient, deep reinforcement learning, internet of things, physical layer security, reconfigurable intelligent surface 6th generation network |
| Audience | Academic |
| Author | Sharafian, Amin Ibrahim, Anwar Hassan Islam, Muhammad Abideen, Syed Zain Ul Habib, Shabana Kamal, Mian Muhammad |
| Author_xml | – sequence: 1 givenname: Mian Muhammad orcidid: 0000-0002-0159-9655 surname: Kamal fullname: Kamal, Mian Muhammad – sequence: 2 givenname: Syed Zain Ul surname: Abideen fullname: Abideen, Syed Zain Ul – sequence: 3 givenname: Amin orcidid: 0000-0002-5884-8480 surname: Sharafian fullname: Sharafian, Amin – sequence: 4 givenname: Anwar Hassan surname: Ibrahim fullname: Ibrahim, Anwar Hassan – sequence: 5 givenname: Muhammad surname: Islam fullname: Islam, Muhammad – sequence: 6 givenname: Shabana surname: Habib fullname: Habib, Shabana |
| BookMark | eNo9UdtuEzEQtVCRaAtvfIAlXklrry_r5S0KBSpFFHF5Q7LG3tnEIbsOtiMUvh6HraoZaUYzc47O6FyRiylOSMhrzm44k91tDvvmVsum4Vw9I5e8VXzRaSMunvpWvSBXOe8YU1rx5pL8_Ib-mMK0oas4jscpeCghTvQzlj8x_coUCi1bpF-2p1x3e7qGE6Z3dEnff11TmPq6gYz04VDCGP7O4OXhkCL47UvyfIB9xleP9Zr8-HD3ffVpsX74eL9arhdeaFUWfWtAahAIzoleSyUdDK1B1zGHg2p6B-C1UnxwCmoOXGJjuPY1Oi47cU3uZ94-ws4eUhghnWyEYP8PYtpYSCX4PVqBHTgEhm2n5SAMcAfKG8G0xF6YM9ebmau-8PuIudhdPKapyreiYbJlwrRNvbqZrzZQScM0xJLA1-hxDL66MoQ6XxrJhRQd0xXwdgb4FHNOODzJ5MyezbNn8-yjeeIfxJ-OZA |
| Cites_doi | 10.26599/TST.2023.9010128 10.1109/TWC.2024.3495720 10.23919/JCIN.2023.10087247 10.1109/TWC.2020.3048780 10.1109/TCCN.2022.3216406 10.1109/ACCESS.2024.3525036 10.1016/j.eswa.2023.120495 10.1016/j.comnet.2023.109581 10.1109/TITS.2024.3440391 10.1109/JIOT.2021.3094522 10.1109/ACCESS.2020.3041765 10.1109/JSEN.2024.3440849 10.1109/TVT.2023.3329992 10.1109/LWC.2023.3257267 10.1109/OJCOMS.2020.3036839 10.1109/TWC.2019.2922609 10.1109/TWC.2019.2933417 10.1109/JSYST.2023.3296012 10.1109/TVT.2021.3129075 10.3390/s23073762 10.1109/ACCESS.2024.3419888 10.1504/IJSNET.2021.117485 10.1007/s11036-023-02125-7 10.1109/JIOT.2020.3026819 10.1109/TWC.2020.3024860 10.62019/abbdm.v4i02.69 10.1109/IOTM.001.2300111 10.1109/JIOT.2022.3142932 10.1109/TCOMM.2019.2924010 10.1007/s11276-021-02781-1 10.3390/s23020807 10.1007/s11277-023-10400-9 10.1109/LWC.2020.3026712 10.1109/JIOT.2023.3264286 10.1109/TVT.2023.3269805 10.1007/s11227-021-04095-7 10.1109/JPROC.2015.2466548 10.1109/TVT.2022.3162044 10.1109/TVT.2022.3233469 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2025 John Wiley & Sons, Inc. 2025. This work is published under http://creativecommons.org/licenses/by/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: COPYRIGHT 2025 John Wiley & Sons, Inc. – notice: 2025. This work is published under http://creativecommons.org/licenses/by/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION JQ2 DOA |
| DOI | 10.1049/sil2/6422115 |
| DatabaseName | CrossRef ProQuest Computer Science Collection DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: Acceso a contenido Full Text - Doaj url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1751-9683 |
| ExternalDocumentID | oai_doaj_org_article_3e9abea0e7964f38a1ba5c83064ed389 A841343906 10_1049_sil2_6422115 |
| GroupedDBID | .DC 0R~ 0ZK 1OC 24P 29I 4.4 5GY 6IK 8FE 8FG AAHJG AAJGR AAMMB AAYXX ABJCF ABMDY ABQXS ACCMX ACESK ACGFO ACGFS ACIWK ACXQS ADEYR AEFGJ AEGXH AENEX AFFHD AFKRA AGXDD AIAGR AIDQK AIDYY ALMA_UNASSIGNED_HOLDINGS ALUQN ARAPS AVUZU BENPR BGLVJ CCPQU CITATION CS3 DU5 EBS EJD GROUPED_DOAJ HCIFZ HZ~ IAO IDLOA IGS IPLJI ITC J9A K6V K7- L6V LAI M43 M7S MCNEO O9- OK1 P2P P62 PHGZM PHGZT PQGLB PTHSS RNS RUI S0W UNMZH WIN ~ZZ JQ2 |
| ID | FETCH-LOGICAL-c365t-d78a46a3eabb3d6454baf78eb90bef52dbaac6551fb5ab5af14e2816c6c691493 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 4 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001487332700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1751-9675 |
| IngestDate | Fri Oct 03 12:50:02 EDT 2025 Wed Aug 13 07:41:15 EDT 2025 Mon Oct 20 16:52:57 EDT 2025 Thu Nov 13 04:18:29 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c365t-d78a46a3eabb3d6454baf78eb90bef52dbaac6551fb5ab5af14e2816c6c691493 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-5884-8480 0000-0002-0159-9655 |
| OpenAccessLink | https://doaj.org/article/3e9abea0e7964f38a1ba5c83064ed389 |
| PQID | 3204703872 |
| PQPubID | 1916341 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_3e9abea0e7964f38a1ba5c83064ed389 proquest_journals_3204703872 gale_infotracacademiconefile_A841343906 crossref_primary_10_1049_sil2_6422115 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-01-01 |
| PublicationDateYYYYMMDD | 2025-01-01 |
| PublicationDate_xml | – month: 01 year: 2025 text: 2025-01-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Stevenage |
| PublicationPlace_xml | – name: Stevenage |
| PublicationTitle | IET signal processing |
| PublicationYear | 2025 |
| Publisher | John Wiley & Sons, Inc Wiley |
| Publisher_xml | – name: John Wiley & Sons, Inc – name: Wiley |
| References | e_1_2_12_3_2 e_1_2_12_2_2 e_1_2_12_5_2 e_1_2_12_4_2 e_1_2_12_19_2 e_1_2_12_18_2 e_1_2_12_17_2 e_1_2_12_1_2 e_1_2_12_16_2 e_1_2_12_15_2 e_1_2_12_37_2 e_1_2_12_38_2 e_1_2_12_39_2 e_1_2_12_20_2 e_1_2_12_21_2 e_1_2_12_22_2 e_1_2_12_23_2 e_1_2_12_24_2 e_1_2_12_25_2 e_1_2_12_26_2 e_1_2_12_27_2 e_1_2_12_28_2 e_1_2_12_29_2 e_1_2_12_30_2 e_1_2_12_31_2 e_1_2_12_32_2 e_1_2_12_33_2 e_1_2_12_34_2 e_1_2_12_35_2 e_1_2_12_36_2 e_1_2_12_14_2 e_1_2_12_13_2 e_1_2_12_12_2 e_1_2_12_11_2 e_1_2_12_7_2 e_1_2_12_10_2 e_1_2_12_6_2 Hameed I. (e_1_2_12_9_2) 2025; 13 e_1_2_12_8_2 |
| References_xml | – ident: e_1_2_12_12_2 doi: 10.26599/TST.2023.9010128 – ident: e_1_2_12_16_2 doi: 10.1109/TWC.2024.3495720 – ident: e_1_2_12_31_2 doi: 10.23919/JCIN.2023.10087247 – ident: e_1_2_12_14_2 doi: 10.1109/TWC.2020.3048780 – ident: e_1_2_12_4_2 doi: 10.1109/TCCN.2022.3216406 – volume: 13 start-page: 4670 year: 2025 ident: e_1_2_12_9_2 article-title: Enhancing Physical Layer Security in WPCNs With IRS and Controlled Jamming for 6G IoT Applications publication-title: IEEE Access doi: 10.1109/ACCESS.2024.3525036 – ident: e_1_2_12_39_2 doi: 10.1016/j.eswa.2023.120495 – ident: e_1_2_12_35_2 doi: 10.1016/j.comnet.2023.109581 – ident: e_1_2_12_37_2 doi: 10.1109/TITS.2024.3440391 – ident: e_1_2_12_29_2 doi: 10.1109/JIOT.2021.3094522 – ident: e_1_2_12_10_2 doi: 10.1109/ACCESS.2020.3041765 – ident: e_1_2_12_18_2 doi: 10.1109/JSEN.2024.3440849 – ident: e_1_2_12_19_2 doi: 10.1109/TVT.2023.3329992 – ident: e_1_2_12_24_2 doi: 10.1109/LWC.2023.3257267 – ident: e_1_2_12_8_2 doi: 10.1109/OJCOMS.2020.3036839 – ident: e_1_2_12_23_2 doi: 10.1109/TWC.2019.2922609 – ident: e_1_2_12_7_2 doi: 10.1109/TWC.2019.2933417 – ident: e_1_2_12_11_2 doi: 10.1109/JSYST.2023.3296012 – ident: e_1_2_12_34_2 doi: 10.1109/TVT.2021.3129075 – ident: e_1_2_12_38_2 doi: 10.3390/s23073762 – ident: e_1_2_12_2_2 doi: 10.1109/ACCESS.2024.3419888 – ident: e_1_2_12_6_2 doi: 10.1504/IJSNET.2021.117485 – ident: e_1_2_12_27_2 doi: 10.1007/s11036-023-02125-7 – ident: e_1_2_12_36_2 doi: 10.1109/JIOT.2020.3026819 – ident: e_1_2_12_17_2 doi: 10.1109/TWC.2020.3024860 – ident: e_1_2_12_26_2 doi: 10.62019/abbdm.v4i02.69 – ident: e_1_2_12_21_2 doi: 10.1109/IOTM.001.2300111 – ident: e_1_2_12_32_2 doi: 10.1109/JIOT.2022.3142932 – ident: e_1_2_12_5_2 doi: 10.1109/TCOMM.2019.2924010 – ident: e_1_2_12_3_2 doi: 10.1007/s11276-021-02781-1 – ident: e_1_2_12_15_2 doi: 10.3390/s23020807 – ident: e_1_2_12_30_2 doi: 10.1007/s11277-023-10400-9 – ident: e_1_2_12_33_2 doi: 10.1109/LWC.2020.3026712 – ident: e_1_2_12_28_2 doi: 10.1109/JIOT.2023.3264286 – ident: e_1_2_12_22_2 doi: 10.1109/TVT.2023.3269805 – ident: e_1_2_12_13_2 doi: 10.1007/s11227-021-04095-7 – ident: e_1_2_12_1_2 doi: 10.1109/JPROC.2015.2466548 – ident: e_1_2_12_20_2 doi: 10.1109/TVT.2022.3162044 – ident: e_1_2_12_25_2 doi: 10.1109/TVT.2022.3233469 |
| SSID | ssj0056512 |
| Score | 2.3662286 |
| Snippet | Securing communication between multiple users efficiently while there are too many potential eavesdroppers has become an important issue with the rise of the... |
| SourceID | doaj proquest gale crossref |
| SourceType | Open Website Aggregation Database Index Database |
| SubjectTerms | Algorithms Bit error rate Communication Communication networks Cybersecurity Data security Deep learning Eavesdropping Energy consumption Energy efficiency Internet of Things Optimization techniques Power supply Reconfigurable intelligent surfaces Security software Signal quality Smart cities |
| Title | Securing Communication Networks at the Physical Layer: A DRL and Phase Optimization Approach |
| URI | https://www.proquest.com/docview/3204703872 https://doaj.org/article/3e9abea0e7964f38a1ba5c83064ed389 |
| Volume | 2025 |
| WOSCitedRecordID | wos001487332700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: Acceso a contenido Full Text - Doaj customDbUrl: eissn: 1751-9683 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0056512 issn: 1751-9675 databaseCode: DOA dateStart: 20210101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1751-9683 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0056512 issn: 1751-9675 databaseCode: 24P dateStart: 20130101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1751-9683 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0056512 issn: 1751-9675 databaseCode: WIN dateStart: 20130101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF6keNCD-MRqlT0onkKT3Ty91UdRKLWIYg_CMvuSgkZpo7_f2WQr7UG8SEIOSQjLTHbmm92Zbwg5samMlVU2sKnOXEkO2kEbF4FlGi1hpk2mdN1sIhsO8_G4GC20-nI5YQ09cCO4LjcFSAOhcTWTlucQSUhU7oCz0ehtnfUNs2IeTDU2GFFKxHyaO0Lg7mzyyrqItDHaSZYcUM3T_5s1rl1Mf5NseGxIe82YtsiKKbfJ-gJj4A559uvjL3SpsoMOm2zuGYWKIqSjIy9-OgDE1Oe0R6_uBxRKjU_Qb9E7tBRvvgST9jyv-C557F8_XN4EvkFCoHiaVIHOcohT4Aak5Npxc0mwWW5kEUpjE6YlgEoRE1mZAJ42ig3Lo1ThUWBoxPdIq3wvzT6hKmageCGtUhhiMSkZT7TJ8bMsUqFmbXI6l5r4aHgwRL1_HRfCSVd46bbJhRPpzzuOvbq-gToVXqfiL522yZlTiHBzrJqCAl8qgEN1bFWil6PrRSQVpm3SmetM-Mk3E5yFcea25dnBf4zmkKwx1_S3XnfpkFY1_TRHZFV9VZPZ9Lj-7_D6dDv8BsYl4Jo |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Securing+Communication+Networks+at+the+Physical+Layer%3A+A+DRL+and+Phase+Optimization+Approach&rft.jtitle=IET+signal+processing&rft.au=Kamal%2C+Mian+Muhammad&rft.au=Abideen%2C+Syed+Zain+Ul&rft.au=Sharafian%2C+Amin&rft.au=Ibrahim%2C+Anwar+Hassan&rft.date=2025-01-01&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1751-9675&rft.eissn=1751-9683&rft.volume=2025&rft.issue=1&rft_id=info:doi/10.1049%2Fsil2%2F6422115&rft.externalDBID=HAS_PDF_LINK |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-9675&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-9675&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-9675&client=summon |