Privacy-Preserving Database Assisted Spectrum Access for Industrial Internet of Things: A Distributed Learning Approach

Mengyuan Zhang, Jiming Chen, Shibo He, Lei Yang, Xiaowen Gong, Junshan Zhang

Research output: Contribution to journalArticlepeer-review

18 Scopus citations

Abstract

Industrial Internet of Things (IIoT) has been shown to be of great value to the deployment of smart industrial environment. With the immense growth of Internet of Things (IoT) devices, dynamic spectrum sharing is introduced, envisaged as a promising solution to the spectrum shortage in IIoT. Meanwhile, cyber-physical safety issue remains to be a great concern for the reliable operation of IIoT system. In this article, we consider the dynamic spectrum access in IIoT under a received signal strength-based adversarial localization attack. We employ a practical and effective power perturbation approach to mitigate the localization threat on the IoT devices and cast the privacy-preserving spectrum sharing problem as a stochastic channel selection game. To address the randomness induced by the power perturbation approach, we develop a two-timescale distributed learning algorithm that converges almost surely to the set of correlated equilibria of the game. The numerical results show the convergence of the algorithm and corroborate that the design of two-timescale learning process effectively alleviates the network throughput degradation brought by the power perturbation procedure.

Original languageEnglish (US)
Article number8825819
Pages (from-to)7094-7103
Number of pages10
JournalIEEE Transactions on Industrial Electronics
Volume67
Issue number8
DOIs
StatePublished - Aug 2020

Keywords

  • Distributed algorithm
  • game theory
  • industrial cyber-physical system security
  • spectrum access

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Privacy-Preserving Database Assisted Spectrum Access for Industrial Internet of Things: A Distributed Learning Approach'. Together they form a unique fingerprint.

Cite this